Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 2

Kent Royd N.

Aying BSEE III-H

TECHNICAL WEBINAR 7
DATA PRIVACY ACT: A REACTION PAPER

The technical webinar entitled “Data Privacy Act” that was conducted last August 7,
2021 and was led by the Industrial Engineering department opened my understanding as to how
crucial it is preserving data and keeping it as confidential as possible. Moreover, the experience
after the webinar was fun and I gathered a lot of takeaways.

It was Engr. Norisse Gorrero, our webinar's speaker who elaborated about data privacy.
Data privacy is data protection in order to meet legislative obligations as well as protecting
confidentiality and immutabilities, in particular, personal data but also other confidential data
such as some Financial Data and intellectual property data. She also stated that the Data Privacy
Act of 2012 or Republic Act 10173 is a state's policy to protect the fundamental human right to
privacy and communication while ensuring the free flow of information to promote innovation
and growth; recognizes the critical role of information and communications technology in
nation-building, as well as its inherent responsibility to ensure the security and protection of
personal information in government and private sector information and communications systems.
Furthermore, the penalties for noncompliance with the Data Privacy Act, accountability for
personal processing, proper processing of personal information, data subject rights, and data
security are all covered under the Data Privacy Act. She also provided us some advice on how to
secure our personal information when using public Wi-Fi; anti-hacking measures included
locking down devices or disabling auto-connect to prevent location sharing, as well as installing
anti-virus protection and updating operating systems. She then continued tackling about the
Internet Privacy that includes the advancement of technologies, the potential risks, the social
media, the face recognizers, face recognizers cont’d, public photographs, HTTP cookies, HTTP
cookies cont’d, Government Control, the steps to secure ourselves from hackers, and online
protection videos. Moreover, Engr. Norisse also explained the examples of phishing, types of
phishing, dangers of phishing, protection against phishing attacks, the causes, and the effects of
phishing. Lastly, Engr. Norisse gave us some insights in ensuring accounts through the creation
of passwords wherein hackers may find it harder to decode. She stated that one should have a
upper case letter and it should be no less than eight characters. She also added that incorporating
numbers may also be a great aid in securing the account's privacy.

The webinar is interesting considering how it affects me on a daily basis. Sites are often
not secure risking data in exchange for you to use the site for your convenience. Funny as it
seems but data privacy may be sometimes overlooked not realizing how deadly it is when one
has reached your information and maybe at one point weaponized it against you. Moreover, the
internet is a double-edged sword, one may bring you fortune and one may cost your fall.
Regardless, we should always bear in mind that in this technological era, information is like a
coin where it is traded for you to avail what it has to offer. Make sure you spend yours rightly.

You might also like