Posts

ENTRY 04 - Do Not COLLECT If You Cannot PROTECT

Image
Just on March 14, 2022 meeting, my professor's presentation displayed the slogan, "Do not COLLECT if you cannot PROTECT," which piqued my interest because it has something to do with data security. So, the idea behind such a phrase is that when an organization or a person collects personal information from its subject, the organization or person collecting the data is required to protect and safeguard that information because if they do not, their subject's information would be compromised, likely to result in issues, problems, identity theft, and other concerns. They will suffer legal ramifications, most notably RA 10173, and maybe arrested for being reckless in safeguarding the subject's information and data. As per my understanding, the simple explanation of this term's lesson is that when acquiring data from the target topic, be always cautious and sensitive to how and where you store it to prevent being locked up.     The presentation exhibited images of ...

ENTRY 03 - The Dark Side of Using Public WiFi

Image
The goal of this blog is to create awareness among many individuals that accessing public free WiFi can be harmful and that if they do access it, they must do so with the understanding that they will be putting their personal information at risk of fraud or theft. Our professor began last week's lesson with a PowerPoint presentation of a post urging people not to use public free Wifi. Why? Merely because scammers may take advantage of the opportunity to steal your personal information and obtain access to your account, which may be terrible, especially if you were undertaking a vital business activity. What gadgets are used by cybercriminals to steal your credentials? Let me first point out that there is a YouTube video link in the same picture presentation that our lecturer gave that highlights social media scams. In the video, the specialist adds that the internet is a dangerous and scary place and that there need to be someone to guide elderly and young people because they ...

Entry 02 - Last Week's Meet

Image
This will be a brief blog article regarding the meeting last week. Our professor covered crucial functions in the Data Privacy Act, which assisted me in learning the various jobs by distinguishing their purposes. The distinction between a Personal Information Controller and a Personal Information Processor, for example, is that the (PIC) defines the goals and methods of processing personal data, whilst the (PIP) processes personal data on behalf of the controller. He also covered the three forms of personal data: personal data, sensitive personal data, and privileged information. During his presentation of data principles, he used the class list as a great example, pointing out that the information in the class list was excessive when it came to proportionality because he just needed our names to identify us. Also, keep in mind that transparency is essential since when we give our consent to submit our personal data, we should know what it will be used for and where it will be kept.

Entry 01 - My Second Meeting with Sir and His Unusual Question "Are you for sale?"

Image
Good morning, everyone! This is my first entry, and I'm very excited to share my experience and the storyline of what occurred during my second meeting with our professor. During the meet, this was Valentine's Day, though it wasn't my heart that really was filled, but rather my brains from Sir's talk with us about data and privacy security. "I was curious about the distinction between "data privacy" with "data security." " and I wondered, "Are they really not the same? ". However, upon listening to Sir's story, I recognized that, while they are not the same, they are still essential together. As a result, I've been more cautious about what I publish online or the personal information I enter on websites, as I don't want to end up in the same situation as Sir, whose photo was easily located on the internet and tampered with. Nonetheless, I'm grateful for being made aware of these circumstances, which will undoubtedl...