IT Ethics, Professional Responsibilities, and Privacy Concerns in Philippines

0.0(0)
studied byStudied by 0 people
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/47

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

48 Terms

1
New cards

IT Professionals

A calling that requires specialized knowledge and often long and intensive academic preparation.

2
New cards

Professional Relationships

Relationships that IT Workers must manage with Employers, Clients, Suppliers, Other Professionals, IT Users, and Society.

3
New cards

Professional Code of Ethics

States the principles and core values that are essential to the work of a particular occupational group.

4
New cards

Association for Computing Machinery (ACM)

Founded in 1947, is a leading organization in computing and information technology. The ACM Code of Ethics provides a framework for ethical computing practices.

5
New cards

Public Good

Prioritizing societal benefit over personal or corporate gain.

6
New cards

Avoiding Harm

Ensuring technology does not cause harm to individuals or society.

7
New cards

Honesty

Being truthful and transparent in professional work.

8
New cards

Privacy

Protecting user data and confidentiality.

9
New cards

Institute of Electrical and Electronics Engineers Computer Society (IEEE-CS)

Established in 1963, is a global leader in engineering and technology. The IEEE Code of Ethics outlines standards for professional conduct.

10
New cards

Public Safety

Prioritizing safety and welfare in engineering solutions.

11
New cards

Integrity

Maintaining honesty and transparency in all professional interactions.

12
New cards

Avoiding Conflicts

Identifying and mitigating conflicts of interest.

13
New cards

Continual Learning

Committing to ongoing education and skill improvement.

14
New cards

Information Systems Audit and Control Association (ISACA)

A global professional association focused on IT governance, risk management, and cybersecurity.

15
New cards

COBIT

Control Objectives for Information and Related Technologies framework, which provides guidelines for IT governance and management.

16
New cards

Training and Resources

ISACA offers training, publications, and conferences to support professionals in information systems.

17
New cards

Certification

Indicates that a professional possesses a particular set of skills, knowledge, or abilities, in the opinion of the certifying organization.

18
New cards

Cryptographic techniques

Used to protect personal data by providing secure (confidential) connections for browsing (HTTPS) and networking (VPN).

19
New cards

Data Breaching

Subject to threat if cryptographic techniques are not applied correctly; by itself, it does not protect against data breaching.

20
New cards

Homomorphic encryption

A form of encryption that permits users to perform computations on its encrypted data without first decrypting it.

21
New cards

Licensing

Government-issued permission to engage in an activity or to operate a business.

22
New cards

Whistleblower

Someone who exposes activities within an organization that they believe to be illegal, unethical, or not in the public interest.

23
New cards

Workplace issues

Problems that affect employees and the overall work environment, crucial for maintaining a productive, healthy, and positive workplace.

24
New cards

Harassment and Discrimination

Includes sexual harassment, racial or gender discrimination, and other forms of unfair treatment.

25
New cards

Bullying

Workplace bullying can involve verbal abuse, sabotage of work, or other behaviors intended to intimidate or undermine colleagues.

26
New cards

Poor Communication

Misunderstandings, lack of transparency, or inadequate feedback that can lead to confusion and conflict.

27
New cards

Brain-computer interfaces

Possible to change one's behavior by means of such technology.

28
New cards

Privacy norms

Technology influences privacy by changing the accessibility of information and the privacy norms themselves.

29
New cards

Communication Surveillance

The interception of communications, including laws such as the Anti-Wiretapping Law of 1965 and the Cybercrime Prevention Act of 2012.

30
New cards

President Duterte's policies

Policies presented by President Duterte in 2016, including the war on drugs, which pose risks of unlawful surveillance and human rights violations.

31
New cards

Joint Oversight Committee

A committee composed of senators and members of congress that has the power to summon police and law enforcement authorities regarding surveillance practices.

32
New cards

Anti-Wiretapping Law of 1965

Republic Act No. 4200 that regulates the interception of communications.

33
New cards

Anti-Photo and Video Voyeurism Act of 2009

Republic Act No. 9995 that addresses voyeurism in photography and video.

34
New cards

Cybercrime Prevention Act of 2012

Republic Act No. 10175 that aims to prevent cybercrime.

35
New cards

Human Security Act of 2007

Republic Act No. 9372 that addresses security concerns, including surveillance.

36
New cards

Cybercrime Prevention Act

Section 12 (Real-Time Collection of Traffic Data) of the Cybercrime Prevention Act was stricken down as unconstitutional by the Supreme Court.

37
New cards

Implementing Rules and Regulations (IRR)

The IRR of the Cybercrime Prevention Act, promulgated in August 2015, effectively reinstated the struck down provision.

38
New cards

Data Retention

The National Telecommunications Commission released a memorandum (MC 04-06-2007) in June 2007 on the data log retention of telecommunications traffic.

39
New cards

Public Telecommunications Entities (PTEs)

PTEs shall retain the call data records on voice calls and similar records for non-voice traffic, which includes SMS, MMS, and other similar telecommunications services.

40
New cards

SIM Card Registration

A requirement for users to register their SIM cards to enhance accountability and traceability in communications.

41
New cards

Data Privacy Act

Although enacted in 2012, the National Privacy Commission, tasked to administer and implement the law, was appointed only in March 2016.

42
New cards

COMELEC Breach

A massive breach of the Government's Electoral Commission (COMELEC) leaked online the personal information of approximately 55 million registered Filipino voters.

43
New cards

Rational Basis Test

Under the Rational Basis Test, the court must determine whether a law is rationally related to a legitimate government interest.

44
New cards

Lowest Standard of Review

In the context of constitutional law, the rational basis test is considered to be the 'lowest' standard of review, making it relatively easy for a law to pass.

45
New cards

Republic Act No. 10175

Enacted in 2012, it is known as the Cybercrime Prevention Act, which enumerates cybercrimes and provides for their penalties.

46
New cards

Identity Theft

A crime defined under the Cybercrime Prevention Act.

47
New cards

Aiding or Abetting Cyber Criminals

Also considered a crime under the Cybercrime Prevention Act.

48
New cards

Penalty for Identity Theft

The Cybercrime Prevention Act provides specific penalties for identity theft.