1/47
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
IT Professionals
A calling that requires specialized knowledge and often long and intensive academic preparation.
Professional Relationships
Relationships that IT Workers must manage with Employers, Clients, Suppliers, Other Professionals, IT Users, and Society.
Professional Code of Ethics
States the principles and core values that are essential to the work of a particular occupational group.
Association for Computing Machinery (ACM)
Founded in 1947, is a leading organization in computing and information technology. The ACM Code of Ethics provides a framework for ethical computing practices.
Public Good
Prioritizing societal benefit over personal or corporate gain.
Avoiding Harm
Ensuring technology does not cause harm to individuals or society.
Honesty
Being truthful and transparent in professional work.
Privacy
Protecting user data and confidentiality.
Institute of Electrical and Electronics Engineers Computer Society (IEEE-CS)
Established in 1963, is a global leader in engineering and technology. The IEEE Code of Ethics outlines standards for professional conduct.
Public Safety
Prioritizing safety and welfare in engineering solutions.
Integrity
Maintaining honesty and transparency in all professional interactions.
Avoiding Conflicts
Identifying and mitigating conflicts of interest.
Continual Learning
Committing to ongoing education and skill improvement.
Information Systems Audit and Control Association (ISACA)
A global professional association focused on IT governance, risk management, and cybersecurity.
COBIT
Control Objectives for Information and Related Technologies framework, which provides guidelines for IT governance and management.
Training and Resources
ISACA offers training, publications, and conferences to support professionals in information systems.
Certification
Indicates that a professional possesses a particular set of skills, knowledge, or abilities, in the opinion of the certifying organization.
Cryptographic techniques
Used to protect personal data by providing secure (confidential) connections for browsing (HTTPS) and networking (VPN).
Data Breaching
Subject to threat if cryptographic techniques are not applied correctly; by itself, it does not protect against data breaching.
Homomorphic encryption
A form of encryption that permits users to perform computations on its encrypted data without first decrypting it.
Licensing
Government-issued permission to engage in an activity or to operate a business.
Whistleblower
Someone who exposes activities within an organization that they believe to be illegal, unethical, or not in the public interest.
Workplace issues
Problems that affect employees and the overall work environment, crucial for maintaining a productive, healthy, and positive workplace.
Harassment and Discrimination
Includes sexual harassment, racial or gender discrimination, and other forms of unfair treatment.
Bullying
Workplace bullying can involve verbal abuse, sabotage of work, or other behaviors intended to intimidate or undermine colleagues.
Poor Communication
Misunderstandings, lack of transparency, or inadequate feedback that can lead to confusion and conflict.
Brain-computer interfaces
Possible to change one's behavior by means of such technology.
Privacy norms
Technology influences privacy by changing the accessibility of information and the privacy norms themselves.
Communication Surveillance
The interception of communications, including laws such as the Anti-Wiretapping Law of 1965 and the Cybercrime Prevention Act of 2012.
President Duterte's policies
Policies presented by President Duterte in 2016, including the war on drugs, which pose risks of unlawful surveillance and human rights violations.
Joint Oversight Committee
A committee composed of senators and members of congress that has the power to summon police and law enforcement authorities regarding surveillance practices.
Anti-Wiretapping Law of 1965
Republic Act No. 4200 that regulates the interception of communications.
Anti-Photo and Video Voyeurism Act of 2009
Republic Act No. 9995 that addresses voyeurism in photography and video.
Cybercrime Prevention Act of 2012
Republic Act No. 10175 that aims to prevent cybercrime.
Human Security Act of 2007
Republic Act No. 9372 that addresses security concerns, including surveillance.
Cybercrime Prevention Act
Section 12 (Real-Time Collection of Traffic Data) of the Cybercrime Prevention Act was stricken down as unconstitutional by the Supreme Court.
Implementing Rules and Regulations (IRR)
The IRR of the Cybercrime Prevention Act, promulgated in August 2015, effectively reinstated the struck down provision.
Data Retention
The National Telecommunications Commission released a memorandum (MC 04-06-2007) in June 2007 on the data log retention of telecommunications traffic.
Public Telecommunications Entities (PTEs)
PTEs shall retain the call data records on voice calls and similar records for non-voice traffic, which includes SMS, MMS, and other similar telecommunications services.
SIM Card Registration
A requirement for users to register their SIM cards to enhance accountability and traceability in communications.
Data Privacy Act
Although enacted in 2012, the National Privacy Commission, tasked to administer and implement the law, was appointed only in March 2016.
COMELEC Breach
A massive breach of the Government's Electoral Commission (COMELEC) leaked online the personal information of approximately 55 million registered Filipino voters.
Rational Basis Test
Under the Rational Basis Test, the court must determine whether a law is rationally related to a legitimate government interest.
Lowest Standard of Review
In the context of constitutional law, the rational basis test is considered to be the 'lowest' standard of review, making it relatively easy for a law to pass.
Republic Act No. 10175
Enacted in 2012, it is known as the Cybercrime Prevention Act, which enumerates cybercrimes and provides for their penalties.
Identity Theft
A crime defined under the Cybercrime Prevention Act.
Aiding or Abetting Cyber Criminals
Also considered a crime under the Cybercrime Prevention Act.
Penalty for Identity Theft
The Cybercrime Prevention Act provides specific penalties for identity theft.