LIVING IN THE IT ERA MODULE 1: INTRODUCTION TO LIVING IN THE INFORMATION TECHNOLOGY ERA OVERVIEW OF ICT The term TECHNOLOGY presently includes advancements in communication and how information is handled, thus enabling governments, organizations, industries, and ordinary individuals to improve on their decision making, business processes and everyday living. Information and communication technology (ICT) - These are related to technologies that facilitate the transfer of information and variou types of electronically mediated communication (Zuppo, 2012) ICT Hierarchy by colrain zuppo SLIDE 6 PICTURE When do we use the term ICT and how does it differ from IT? Information technology • Pertains to the industry that involves computers, software, networking, and other IT infrastructure to help relay or manage information important in modernday living as seen primarily in large companies or corporations. Information communication technology • Described as using computers and other digital technologies to assist individuals or institutions in handling or using information. • ICT is technology that supports activities involving information such as gathering, processing, storing, and presenting data. Uses of ICT In Our Daily Lives • Communication • Job Opportunities • Education • Socializing Four Basic Periods of Computer History - PRE- MECHANICAL AGE - MECHANICAL AGE - ELECTROMECHANICAL AGE - ELECTRONIC AGE THE PRE-MECHANICAL AGE (3,000 BC TO 1450 AD) WRITING AND ALPHABETS PAGE 12-13 • At around 2000 BC the Phoenicians created symbols that expressed single syllables and consonants (the first true alphabet) • Greek adopted the Phoenician alphabet and added vowels • Romans gave the letters Latin name to create the alphabet we use today PAPER AND PENS PAGE 15 THE FIRST CALCULATOR - Abacus- first recorded adding machine. Invented in Babylonia and popularized in China. PAGE 16 MECHANICAL AGE (1450-1840) First Information Explosion - Johann Guttenberg; Movable metal type printing process in 1450. THE FIRST GENERAL PURPOSE COMPUTERS • John Napier – (1614) a Baron of Merchiston, Scotland invented LOGS (Logarithm). • LOGS – allows multiplication and division to be reduce in addition and subtraction. • 1614 – Arabian Lattice – lays out a special version of the multiplication tables on a set of four-sided wooden rods.(multiply, divide large numbers and find square and cube root). PAGE 18 • Wilhelm Shickard – 1623 - (Professor at University of Tubingen, Germany) – invented the first mechanical calculator that can work with six digits and can carries digits across columns. • William Oughtred – (1575 – 1660) invented the slide rule. PAGE 19 • Blaise Pascal (1642) – invented the Pascaline. (made of clock gears and levers) that could solve mathematical problems like addition and subtraction. • Gottfried Leibniz – (1617) invented Stepped Reckoner that could multiply 5 digit and 12 digit numbers yielding up to 16 digit numbers. • Joseph-Marie Jacquard (1801) developed the automatic loom (weaving loom) that was controlled by punched cards. PAGE 20 • Charles Xavier Thomas de Colmar -1820 – developed Arithmometer (the first mass produced calculator). • Charles Babbage – invented the difference engine (1821) and analytical engine (1832). - Father of modern computer. • Lady Ada Augusta Lovelace Byron – 1842 – the first computer programmer. PAGE 21 ELECTROMECHANICAL AGE (1840-1940) * The Beginning of Telecommunications * • Voltaic Battery – first electric battery known as voltaic pile. • Telegraph Samuel F.B. Morse – conceived of his version of an Electromagnetic Telegraph (1832) PAGE 22 TELEPHONE AND RADIO • Graham Bell – 1879 - developed the first working telephone. • Guglielmo Marconi – 1894 – (RADIO) discovered that electrical waves travel through space and can produce and effect far from the point at which it. PAGE 23 • Dorr Felt – 1885 – devises the comptometer, a key driven adding and subtracting calculator. • Comptograph containing a built-in printer. PAGE 24 • Herman Hollerith – father of information processing. • Punched Card – provided computer programmers with a new way to put information into their machines. • He founded the Tabulating Machine Company , later became the Computer Tabulating Recording Company and International Business Machines Corporation (IBM) PAGE 25 Lee de Forest – 1906 – developed vacuum tubes This is important for it provided electrically controlled switch. Computers on the Job - Computers have become a universal on the job tool for decision- making, productivity, and communication. COMPUTERS ON THE GO - Consumer Kiosks - ATM Transactions - POS Systems at retail stores - Self- checkout systems - Portable computers or mobile devices - M- commerce systems - GPS Systems PAGE 26 ELECTRONIC AGE (1941 – PRESENT) • Konrad Zuse – 1941 – built the first programmable computer called Z3. • Howard Aiken – 1942 – developed Mark I the first stored program computer. • John Atanasoff and Clifford Berry – 1942 – completed the first all electronic computer called ABC or Atanasoff-Berry Computer MODULE 2: WORLD OF COMPUTERS COMPUTERS IN THE HOME - CONVERGENCE - WIRELESS NETWORKING - SMART APPLIANCES - SMART HOMES COMPUTERS IN EDUCATION - Many students today have access to computers either in a classroom or a computer lab - Colleges and Universities are even more integrated. - Distance Learning WHAT IS A COMPUTER AND WHAT DOES IT DO? Input- use types in the numbers 2 and 5 Processing- Computer adds 2 and 5. Output- computer displays the results (output). Storage- Computer saves data (in this case, the output) for future use. GENERATION OF COMPUTERS VACUUM TUBES (1946-1957) - Very Expensive - Very Large - Used a lot of electrivity - Generated a lot of heat - Relied on machine language - Solve one problem at a time - Input was based on punched cards and paper tape - Output was displayed on printouts - Unreliable - Need AC - Non-portable - Slow input and output devices TRANSISTORS (1958-1963) - Smaller - More energy- efficient - More reliable - Generated a lot of heat - Still rely on punch cards for input - Prinouts for output - Consumed less power - More compact in size - More reliable and faster - Still very costly - AC Required INTEGRATED CIRCUITS (1964- 1970) - smaller in size - reliable and efficient - started remote processing, time-sharing, multi-programming - high level programming - generated less heat - Faster - Lesser maintenance - Costly - AC required - Lesser electricity - Keyboards and monitors introduced MICROPROCESSORS (1971) - More powerful - Internet introduced - Development of GUIs, mouses, and handheld devices - very cheap - Portable and reliable - Use of PCs - Very small in size - No AC required - Easily available FIFTH-GENERATION (NOW AND THE FUTURE) - Artificial Intelligence - High level programming - Ultra large-scale integration (ULSI) - User-friendly interface - Multimedia features - Very powerful - Cheaper rates - Still in development CATEGORIES OF COMPUTERS EMBEDDED COMPUTERS - Embedded into a product and designed to perform specific tasks or functions for that product. MOBILE DEVICES - A very small device with some type of built-in computing or Internet capability. PERSONAL COMPUTERS (PCs) - A small computer designed to be used by one person at a time. PORTABLE COMPUTERS - is a computer designed to be easily moved from one place to another, as opposed to those designed to remain stationary at a single location such as desktops and workstations. MIDRANGE SERVERS - A medium-sized computer used to host programs and data for a small network. MAINFRAME COMPUTERS - Powerful computer used by several large organizations to manage large amounts of centralized data. SUPERCOMPUTERS - Fastest, most expensive, most powerful type of computer. MODULE 3:ELEMENTS OF COMPUTER SYSTEM AND BASIC COMPUTER COMPONENTS HARDWARE - Computer hardware is the collection of physical elements that constitutes a computer system. Computer hardware is the physical parts or components of a computer, such as the monitor, mouse, keyboard, computer data storage, hard disk drive (HDD), graphic cards, sound cards, memory, motherboard, and so on, all of which are physical objects that are tangible. SOFTWARE (a) SYSTEM SOFTWARE (b) APPLICATION SOFTWARE (c) OPERATING SYSTEM (d) DEVICE DRIVER (e) UTILITY SOFTWARE PEOPLE - The most important element of a computer system is its users. They are also called live-ware of the computer system. (a) System Analysts (b) System Programmers (c) System Operators PROCEDURES - Procedure is a step by step series of instructions to perform a specific function and achieve the desired output. (a) Hardware oriented procedure (b) Software oriented procedure (c) Internal procedure DATA - The facts and figures that are fed into a computer for further processing are called data. Data is raw until the computer system interprets it using machine language, stores it in memory, classifies it for processing, and produces results in conformance with the instructions given to it. Processed and useful data is called information that is used for decision making. CONNECTIVITY -When two or more computers are connected, they can share information and resources such as sharing of files (data/music, etc.), sharing of the printer, sharing of facilities like the internet, etc. This sharing is possible using wires, cables, satellite, infra-red, Bluetooth, microwave transmission, etc. COMPONENTS OF COMPUTER CASE -The computer case is a plastic or metal enclosure that houses most of the components. POWER SUPPLY - A power supply unit (PSU) converts alternating current (AC) electric power to low-voltage DC power for the internal components of the computer. Laptops are capable of running from a built-in battery, normally for a period of hours MOTHERBOARD - The motherboard is the main component of a computer. It is a large rectangular board with integrated circuitry that connects the other parts of the computer including the CPU, the RAM, the disk drives (CD, DVD, hard disk, or any others) as well as any peripherals connected via the ports or the expansion slots. INSIDE THE MOTHERBOARD - CPU - RAM - ROM - BUSES - CMOS BATTERY CPU - The CPU (Central Processing Unit) performs most of the calculations which enable a computer to function and is sometimes referred to as the “brain” of the computer. It is usually cooled by a heat sink and fan. Most new CPUs include an on-die Graphics Processing Unit (GPU). RAM - The Random-Access Memory (RAM) stores the code and data that are being actively accessed by the CPU. READ-ONLY MEMORY (ROM) - The Read-Only Memory (ROM) stores the BIOS that runs when the computer is powered on or otherwise begins execution, a process known as Bootstrapping, or “booting” or “booting up”. The BIOS (Basic Input Output System) includes boot firmware and power management firmware. BUSES - Buses connect the CPU to various internal components and to expand cards for graphics and sound. CMOS BATTERY - The CMOS battery is also attached to the motherboard. This battery is the same as a watch battery or a battery for a remote to a car’s central locking system. EXPANSION CARD - An expansion card in computing is a printed circuit board the can be inserted into an expansion slot of a computer motherboard or backplane to add functionality to a computer system vie the expansion bus. Expansions cards can be used to obtain or expand on feature not offered by the motherboard. INPUT DEVICES - Input devices allow the user to enter information into the system or control its operation. OUTPUT DEVICES - Output devices display information in a human readable form. INPUT DEVICES KEYBOARD - Most common and very popular input device which helps to input data to the computer. The layout of the keyboard is like that a traditional typewriter, although there are some additional keys provided for performing additional functions. MOUSE - The mouse is the most popular pointing device. It is a very famous cursor control device having a palm size box with around a ball at its base, which senses the movement of the mouse and sends corresponding signals to the CPU when the mouse buttons are pressed. JOYSTICK - Is also a pointing device, which is used to move the cursor position on a monitor screen. It is a stick having a spherical ball at its both lower and upper ends. The lower spherical ball moves in a socket. The joystick can be moved in all four directions. MICROPHONE - The microphone is an input device to input sound that is then stored in a digital form. The microphone is used for various applications such as adding sound to a multimedia presentation or for mixing music. LIGHT PEN - It is a pointing device similar to a pen. It is used to select a displayed menu item or draw pictures on the monitor screen. It consists of a photocell and an optical system placed in a small tube. MAGNETIC INK CARD READER (MICR) - MICR input device is generally used in banks as the large numbers of cheques to be processed every day. The bank's code number and cheque number are printed on the cheques with a special type of ink that contains particles of magnetic material that are machine-readable. TRACKBALL - It is an input device that is mostly used in a notebook or laptop computer, instead of a mouse. This is a ball that his half inserted and by moving fingers on the ball, the pointer can be moved. SCANNER - Scanners an input device, which works more like a photocopy machine. It is used when some information is available on paper and it is to be transferred to the hard disk of the computer for further manipulation. DIGITAL DIGITIZER - It is an input that waivers analog information into digital A digitizer can convert a signal from the television or camera into a series of numbers that would be sent to the computer. They can be used by the computer to create a picture of whatever the camera had been pointed at. OPTICAL CHARACTER READER (OCR) - OCR is an input device used to read a printed text. OCR scans the text optically, character by character, converts them into a chinereadable code, and stores the text on the system memory. BAR CODE READERS - Bar Code Reader is a device used for reading bar coded data (data in the form of light and dark lines). Barcoded data is generally used in labeling goods, numbering the books, etc. It may be a handheld scanner or may be embedded in a stationary scanner. OPTICAL MARK READER (OMR) - OMR is a special type of optical scanner used to recognize the type of mark made by pea nor pencil. It is used where one out of a few alternatives is to be selected and marked. OUTPUT DEVICES MONITORS - Monitors, commonly called as Visual Display Unit (VDU), are the main output device of a computer. It forms images from tiny dots, called pixels that are arranged in a rectangular form. The sharpness of the image depends upon the number of pixels. SECONDARY STORAGE DEVICE- Depending on whether the second memory device is part of the CPU or not, there are two types of secondary memory – fixed and removable. FIXED DEVICES - HARD DISK DRIVE - CD/DVD DRIVE CATHOD- RAY TUBE (CRT) FLAT- PANEL DISPLAY PRINTERS - The printer is an output device, which is used to print information on paper. There are two types of printers − • Impact Printers • Non-Impact Printers IMPACT PRINTERS:CHARACTER PRINTERS * DOT MATRIX PRINTER (DMP) * DAISY WHEEL IMPACT PRINTERS:LINE PRINTERS * DRUM PRINTER * CHAIN PRINTER NON-IMPACT PRINTERS - Laser Printers - Inkjet Printers SPEAKERS HEADSETS PRIMARY STORAGE DEVICE- As primary memory is expensive, technologies are developed to optimize its use. These are broad types of primary memory available. REMOVABLE DEVICES - PEN DRIVE/ THUMB DRIVE/ FLASH DISK - BLU RAY DISK STORAGE DEVICES -SSD, MEMORY CARD MODULE 4: OPERATING SYSTEM System software: It is designed to run a computer’s hardware and application software, and make the computer system available for use. It serves as the interface between hardware, application software, and the user. Application software: Programs that allow a user to perform specific tasks on a computer Operating system: A collection of programs that manage and coordinate the activities taking place within a computer system. Acts as an intermediary between the user and the computer. Functions of an Operating System ▪ Memory Management ▪ Processor Management ▪ Device Management ▪ File Management ▪ Security ▪ Control over system performance ▪ Job accounting ▪ Error detecting aids ▪ Coordination between other software and users ▪ Interaction with the Operators in Windows Differences Among Operating Systems Command line vs. graphical user interface (GUI) ▪ Most operating systems use GUI today MAC OS ▪ Mac OS: Proprietary operating system for computers made by Apple Corporation ▫ Based on the UNIX operating system; originally set the standard for graphical user interfaces Personal operating system: designed to be installed on a single computer ▪ Server operating system: designed to be installed on a network server ▪ Mobile and embedded operating systems also exist Types of processors supported ▫ Desktop, mobile, server, etc. • Number of processors ▫ 32-bit or 64-bit CPUs ▪ Support for other technologies ▫ New types of buses ▫ Virtualization ▫ Power-saving features ▫ Touch and gesture input Operating Systems for Personal Computers and Servers DOS: Disk Operating System ▫ PC-DOS: Created originally for IBM microcomputers ▫ MS-DOS: used with IBMcompatible computers ▫ DOS traditionally used a command-line interface ▫ Can enter DOS commands WINDOWS ▪ Windows: The predominate personal operating system developed by Microsoft Corporation UNIX ▪ UNIX: Operating system developed in the late 1960s for midrange servers LINUX ▪ Linux: Version (flavor) of UNIX available without charge over the Internet Operating Systems for Mobile Phones and Other Devices ▪ Windows Mobile: Designed for mobile phones ▫ Look and feel of desktop versions ▫ Current version 6.1, next version to be called Microsoft Phone. ▪ Windows Embedded: Designed for consumer and industrial devices that are not personal computers ▫ Cash register, GPS devices, ATMs, medical devices and robots. ▫ Windows Automotive and Microsoft Auto for cars ▪ Android: Linux based OS developed by Open Handset Alliance (including Google) ▪ iPhone OS: Designed for Apple Mobile phones and mobile devices. ▪ BlackBerry Operating System: Designed for BlackBerry devices ▪ Palm OS and Palm webOS: Designed for Palm devices ▪ Symbian OS: Designed for use with smart phones ▪ Embedded Linux: Used with mobile phones, GPS devices, and other mobile devices COMPUTER NETWORK WHAT IS NETWORK? - Infrastructure is the basic underlying physical structure or framework needed for the operation of a service or enterprise . In the case of networking, infrastructure is the hardware that supports high -speed communications and data transfer WHY NETWORK? - Networks are in wide use today because they are practical and useful. They enable users to share many things, including: ▪ Files ▪ Resources ▪ Internet Connections COMPUTER NETWORK DEVICES - NETWORK INTERFACE CARD - REPEATER - HUB - BRIDGE - SWITCH - ROUTER - SERVER - GATEWAY NETWORK ARCHITECTURE - CLIENT- SERVER - PEER- TO- PEER - PERSONAL AREA NETWORK (PAN) - LOCAL AREA NETWORK (LAN) - METROPOLITAN AREA NETWORK (MAN) - WIDE AREA NETWORK (WAN) - WIRELESS LAN (WLAN) - CAMPUS AREA NETWORK (CAN) WHAT IS CLOUD COMPUTING? - Cloud computing is a technology that allows you to access and use computing resources (such as servers, storage, databases, and software) over the internet, rather than on your local computer or data center. It provides on-demand, scalable, and often cost-effective services, enabling businesses and individuals to run applications and store data without the need for extensive hardware and infrastructure investments. - create web applications to serve business needs; buy a computer to act as a server add your files and code. - you have more problems with managing more computers: * network connections * manage the power * cool it sufficiently ADVANTAGES OF CLOUD COMPUTING ❑It offers to all sectors or businesses ❑Ability to use software from any device via browser ❑Carry the files and settings to other devices ❑We can access the services from multiple devices ❑Back up our files ❑No server space required ❑Better data security ❑Disaster recovery ❑Collaboration is possible ❑Cost saving potential ❑Save storage space on their desktops and laptops ❑Upgrade software more quickly CLOUD COMPUTING PROVIDERS - Microsoft Azure - Amazon Web Services - Google Cloud Platform - IBM Cloud - Alibaba Cloud CLOUD COMPUTING GRANT US AMAZING SCALABILITY FLEXIBILITY -flexible - create hundreds of servers - delete them all just quickly - we don't have to manually do the creation process - increase the number of resources - it might reduce the resources to cut costs BUSINESS CONTINUITY - If something can happen, it will happen, so we have to be prepared for the worst. CLOUD PLATFORMS - create backups - Do migrations - Switch to working copies CLOUD PROVIDERS - Create contingency plans - Compensate you with credits COST-EFFECTIVENESS - Cost has a major factor when making infrastructure decisions. - Solutions must be cost-effective while being useful. CAPITAL EXPENDITURE - The money you spend on the things that are bought beforehand as assets. OPERATIONAL EXPENDITURE (OPEX) - The money you spend on things you need while doing the operations. CLOUD SERVICES - you only pay for what you use - when you can't pay for it anymore, the resources you provisioned will no longer be accessible to you. - it is cheaper to use the cloud than buying your own servers. CLOUD PROVIDERS - bought machines by bulk - they are able to rent it for cheap. - total cost of cloud - cost calculators CLOUD COMPUTING MODELS - Infrastructure-as-a-Service (IaaS) - Platform-as-a-Service (PaaS) - Software-as-a-Service (SaaS) - Infrastructure-as-a-Service (IaaS) we get resources at the server level. Hardware set up. Storage and networking. Ex: Virtual Machines- Azure VMs & Google VMs, AWS EC2; Containers- Docker & Kubernetes Ex: Application Platforms- Azure App Service & Heroku: Some Data Processing Systems- Data bricks When to use PaaS? - used when we only want to worry about our application logic - Building Web Applications= Just write code and deploy to the platform and let it do the rest. - Data Processing= write the data processing logic and let the platform worry about how to run the process. - Software-as-a-Service (SaaS) It is software, usually available online, that is offered as a service for multiple customers. When to use IaaS - Use IaaS when we need direct access to our machines. * Customizing a machine- Installing Software Dependencies & Configurations * Using A Machine's Full Capacity- Using a GPU for Graphics Rendering or Machine Learning * Migrating Existing Physical Servers- Move from your existing physical servers and use the cloud EX: Office Suites- Micrsoft Office, Google Workspace; Workflow Apps- Power Automate & Zapier Lift-and-Shift - Lifting the applications from on-premises servers and transferring them to cloud servers. What is Cloud Storage? - add files - plugging a USB thumb drive - How do you store and access files in the cloud? - Platform-as-a-Service (PaaS) A model of cloud computing wherein the hardware and runtime is already handled for you by the cloud provider. When to use SaaS? - used when you just need ready-made software - Online Software= accomplishes things mostly without coding is typically SaaS - No Code Software= Creates software without coding is SaaS as well. EX: BLOB STORAGE- for storing files like images, videos, documents, etc. that are not stored together with the application DISK STORAGE- storage disks that are attached to servers. FILES SHARES- act as folders and can be mounted as a folder on your own laptop or machine. QUEUES- you can send data to queues and process the data in sequence afterwards. MODULE 5: TECHNOLOGY CONSULTING; CYBERCRIMES Cyber - It is the characteristics of the culture of computers, information, technology and virtual reality. Cybercrime - Defined as a crime in which a computer is the object of the crime is used as a tool to commit an offense. Republic Act No. 10175 Cybercrime Prevention Act of 2012 - A law in the Philippines approved on September 12, 2012 which aims to address legal issues concerning online interactions and internet Republic Act No. 10173 Data Privacy Act of 2012 - An act protecting individual personal information. COMMON FORMS OF CYBERCRIMES - COPYRIGHT - PLAGIARISM - COMPUTER ADDICTION HACKING • Infection of IT Systems with Malware – if the act is committed against critical infrastructure of the Philippines the, penalty is between 12-20 years reclusion temporal • Six years up to twelve years of imprisonment also known as prison mayor. COMPUTER-RELATED FORGERY, FRAUD AND/OR IDENTITY THEFT - Maximum of Php 200,000 fine or prison mayor ELECTRONIC THEFT • Copyright Infringement • Penalty of Php 50,000 – 500, 000 and or prison mayor CYBERBULLYING - The Anti-Bullying Act of 2013 (RA 10627) CYBERSEX - Penalty at least Php 200,000 and or prison mayor CHILD PORNOGRAPHY • Unlawful or prohibited acts defined and punishable by Republic Act No. 9775 or the AntiChild Pornography Act of 2009, committed through a computer system. • Penalty of 12-20 years of imprisonment or reclusion temporal CYBER DEFAMATION - Penalty of 6-12 years of imprisonment or prison mayor. Internet Threats Hacking- Hacking is a term used to describe actions taken by someone to gain unauthorized access to a computer. The availability of information online on the tools, techniques, and malware makes it easier for even non-technical people to undertake malicious activities. Malware- Malware is one of the more common ways to infiltrate or damage your computer. Malicious software that infects your computer, such as computer viruses, worms, Trojan horses, spyware, and adware. Pharming- Pharming is a common type of online fraud. A means to point you to a malicious and illegitimate website by redirecting the legitimate URL. Even if the URL is entered correctly, it can still be redirected to a fake website. Phishing- Phishing is used most often by cyber criminals because it's easy to execute and can produce the results they're looking for with very little effort. Ransomware- Ransomware is a type of malware that restricts access to your computer or your files and displays a message that demands payment in order for the restriction to be removed. Spam- The mass distribution of unsolicited messages, advertising or pornography to addresses which can be easily found on the Internet through things like social networking sites, company websites and personal blogs. Spyware (Spyware & Adware)- Software that collects personal information about you without you knowing. They often come in the form of a ‘free' download and are installed automatically with or without your consent. These are difficult to remove and can infect your computer with viruses. Trojan Horses- A malicious program that is disguised as, or embedded within, legitimate software. It is an executable file that will install itself and run automatically once it's downloaded. Viruses- Malicious computer programs that are often sent as an email attachment or a download with the intent of infecting your computer, as well as the computers of everyone in your contact list. Just visiting a site can start an automatic download of a virus. Wi-Fi Eavesdropping- WiFi eavesdropping is another method used by cyber criminals to capture personal information. Virtual “listening in” on information that's shared over an unsecure (not encrypted) WiFi network. Worms- A worm, unlike a virus, goes to work on its own without attaching itself to files or programs. It lives in your computer memory, doesn't damage or alter the hard drive and propagates by sending itself to other computers in a network. Which is more valuable? DATA THAN MONEY "Data is more valuable than Money. If someone takes your money, that's all they have. if you let someone take your data, they may eventually take your money too." from former Deputy Privacy Commissioner Dondi Mapa What is the Republic Act # for Data Privacy ? -DATA PRIVACY Republic Act 10173 AN ACT PROTECTING INDIVIDUAL PERSONAL INFORMATION IN INFORMATION AND COMMUNICATIONS SYSTEMS IN THE GOVERNMENT AND THE PRIVATE SECTOR, CREATING FOR THIS PURPOSE A NATIONAL PRIVACY COMMISSION, AND FOR OTHER PURPOSES Data Privacy Act of 2012 The National Privacy Commission (NPC) is a body that is mandated to administer and implement this law. The functions of the NPC include: ** rulemaking ** advisory **public education **compliance and monitoring **investigations and complaints **enforcement What is the definition of a data subject under the Data Privacy Act of 2012? A. An individual who provides personal information to a personal information controller B. A government agency that collects personal information for public records C. An organization that collects personal information from its employees Know your Data Privacy Rights Under RA10173, people whose personal information is collected, stored, and processed are called data subjects. Organizations that deal with your personal details, whereabouts, and preferences are dutybound to observe and respect your data privacy rights. If you feel that your personal data has been misused, maliciously disclosed or improperly disposed of, or if any of the rights discussed here have been violated, the data subject has the right to file a complaint. Limitation on Rights The provisions of the law regarding transmissibility of rights and the right to data portability will not apply if the processed personal data are used only for the needs of scientific and statistical research and based on such, no activities are carried out and no decisions are taken regarding the data subject. There should also be an assurance that the personal data will be held under strict confidentiality and used for the declared purpose. They will not also apply to the processing of personal data gathered for investigations in relation to any criminal, administrative, or tax liabilities of a data subject. Any limitations on the rights of the data subject should only be to the minimum extent necessary to achieve the purpose of said research or investigation. Imprisonment: NOTEBOOK