SlideShare a Scribd company logo
Privacy & Freedom
of Expression
Prepared by: Mark Jhon C. Oxillo
PRIVACY
THE RIGHT TO PRIVACY
• The right to be left alone – the
most comprehensive of rights,
and the right most valued by a
free people
INFORMATION PRIVACY
• First coined Roger Clarke,
director of Australian
Privacy Foundation
• Is the combination of
communications privacy and
data privacy
COMMUNICATIONS PRIVACY
• the ability to communicate with
others without those
communications being monitored
by other persons or organization
DATA PRIVACY
• the ability to limit access one’s
personal data by other individuals
and organizations in order to
exercise a substantial degree of
control over that data and its use
Republic Act 10173
• Or the Data Privacy Act of 2012 (PH)
• is a law that seeks to protect all forms of
information, be it private, personal, or
sensitive. It is meant to cover both
natural and juridical persons involved in
the processing of personal information.
Republic Act 10173
• This comprehensive privacy law
also established a National
Privacy Commission that
enforces and oversees it and is
endowed with rulemaking power.
Republic Act 10173
OPT OUT POLICY
• To refuse to give an
institution the right to
collect and share
personal data
OPT IN POLICY
• To give an institution
the right to collect and
share personal data
KEY PRIVACY AND
ANONYMITY ISSUES
IDENTITY THEFT
• Occurs when someone steals key
pieces of personal information to
impersonate a person. This
information may include data such
as name, address, date of birth, SSS
number, passport number, driver’s
license number, etc.
VISHING
• is the telephone equivalent of
phishing. It is described as the act of
using the telephone in an attempt
to scam the user into surrendering
private information that will be used
for identity theft.
ELECTRONIC DISCOVERY
• Is the collection, preparation,
review and production of
electronically stored information
for use in criminal and civil
actions and proceedings
• Includes any form of digital
information such as emails,
drawings, graphs, web pages,
photographs, word-processing
files, sound recording and
databases
CONSUMER PROFILING
• Collecting personal information
about internet users when they
register at websites, complete
survey, fill out forms or enter
contests online
CLICK-STREAM DATA
• Information gathered
by monitoring a
consumer’s online
activity
BEACONS
• Are small pieces of software
that run on a web page and are
able to track what a viewer is
doing on the page, such as
what is being typed or where
the mouse is moving
PERSONALIZATION
SOFTWARE
• Used to optimize the
number, frequency, and
mixture of their ad
placement and to evaluate
how visitors react to new ads
MEASURES TO IMPROVE
THE PROTECTION OF
CONSUMER PRIVACY:
• Implementing a “Do Not Track”
option for web browsing
software that would keep online
services from collecting surfing
or ad-targeting data
MEASURES TO IMPROVE
THE PROTECTION OF
CONSUMER PRIVACY:
• Requiring that companies collect
only the data they need and
then delete it after it has met its
purpose
MEASURES TO IMPROVE
THE PROTECTION OF
CONSUMER PRIVACY:
• Requiring that online companies
simplify their privacy policies so
that consumers can read and
understand them
CHIEF PRIVACY OFFICER
(CPO):
• a senior manager within an
organization whose role is to ensure
that the organization does not
violate government regulations
while reassuring customers that
their privacy will be protected
FREEDOM OF
EXPRESSION
FREEDOM OF EXPRESSION
• The right to freedom of
expression is one of the most
important rights for free
people everywhere.
FREEDOM OF EXPRESSION
• Right to express one's ideas and
opinions freely through speech,
writing, and other forms of
communication but without
deliberately causing harm to others'
character and/or reputation by false
or misleading statements.
TYPES OF SPEECHES
• OBSCENE SPEECH
• DEFAMATION
• PERJURY
• FRAUD
• INCITEMENT OF
PANIC
• INCITEMENT TO
CRIME
• “FIGHTING
WORDS”
• HATE SPEECH
• SEDITION
OBSCENE SPEECH
• Appeals to “prurient interest”
(causes lust)
• “Obviously offensive” description
of defined sexual conduct
• No serious literary, artistic,
political, or scientific value
DEFAMATION
• Oral or written statement of
alleged fact that is false and
harms another person
* Slander - oral defamatory
statement
* Libel - written defamatory
statement
PERJURY
• is the intentional act of
swearing a false oath or
falsifying an affirmation to tell
the truth, whether spoken or in
writing, concerning matters
material to an official
proceeding.
FRAUD
• is intentional deception
to secure unfair or
unlawful gain, or to
deprive a victim of a legal
right.
INCITEMENT OF PANIC
• is when a person causes
the evacuation of any
public place, or otherwise
cause serious public
inconvenience or alarm
INCITEMENT TO CRIME
• is the encouragement
of another person to
commit a crime
FIGHTING WORDS
• are written or spoken words
intended to incite hatred or
violence from their target
• are words indicating a
willingness to fight or
challenge someone
HATE SPEECH
• abusive or threatening
speech or writing that
expresses prejudice against a
particular group, especially
on the basis of race, religion,
or sexual orientation.
SEDITION
• a conduct or speech
inciting people to rebel
against the authority of
a state or monarch
Article III (Bill of Rights)
• Section 4. No law shall be passed
abridging the freedom of speech, of
expression, or of the press, or the right
of the people peaceably to assemble
and petition the government for redress
of grievances.
FOE: KEY ISSUES
• Controlling access to information on
the Internet
• Anonymity on the Internet
• Defamation and hate speech
• Corporate blogging
• Pornography
FOE: KEY ISSUES
Controlling access to information on
the Internet:
• Internet Filter – a software that can
be used to block access to certain
websites that contain material
deemed inappropriate or offensive
FOE: KEY ISSUES
Anonymity on the Internet
• Anonymous Expression – the
expression of opinions by people
who do not reveal their identity
FOE: KEY ISSUES
Defamation and Hate Speech
• Ex: A threatening private message
sent over the internet to a person,
and a libel directed at a particular
person can be punishable by law.
FOE: KEY ISSUES
Corporate Blogging
• is the practice of allowing
employees to create their own
personal blogs relating to their
employment
FOE: KEY ISSUES
Pornography
• often colloquially referred to as porn,
is any material — whether written,
visual, or others — that consists of
sexually explicit material and that is
intended to sexually arouse.
FOE: KEY ISSUES
Sexting
• sending sexual messages, nudes
or seminude photos or sexually
explicit videos over a cellphone
END

More Related Content

PPT
Chapter i introduction to strategic management
PPTX
Cyber attack
PPTX
Emmanuel Kant Ethics
PPTX
Intellectual property right
PPTX
Formulas and functions
PPTX
Performance art
PPTX
Computer Security Presentation
PPTX
Mga teorya ng pinagmulan ng wika
Chapter i introduction to strategic management
Cyber attack
Emmanuel Kant Ethics
Intellectual property right
Formulas and functions
Performance art
Computer Security Presentation
Mga teorya ng pinagmulan ng wika

What's hot (20)

PPTX
Privacy in simple
PPT
Personal privacy and computer technologies
PPTX
Internet connectivity
PPT
Ethical Issues In ICT
PPTX
Data protection ppt
PPTX
Cyber Security
PPTX
Virus and malware presentation
PPTX
Cyber Security
PPTX
Privacy issues and internet privacy
PPTX
Data Security
PPTX
Presentation on Information Privacy
PPTX
INFORMATION SECURITY SYSTEM
PPTX
Malware & Anti-Malware
PPT
Introduction to Cyber Security
PPTX
Computer security
PDF
1. introduction to cyber security
PDF
Social engineering attacks
PPTX
Digital Security
PPTX
convergence of technologies
PPTX
Network security (vulnerabilities, threats, and attacks)
Privacy in simple
Personal privacy and computer technologies
Internet connectivity
Ethical Issues In ICT
Data protection ppt
Cyber Security
Virus and malware presentation
Cyber Security
Privacy issues and internet privacy
Data Security
Presentation on Information Privacy
INFORMATION SECURITY SYSTEM
Malware & Anti-Malware
Introduction to Cyber Security
Computer security
1. introduction to cyber security
Social engineering attacks
Digital Security
convergence of technologies
Network security (vulnerabilities, threats, and attacks)
Ad

Similar to Privacy and Freedom of Expression (20)

PPTX
Freedom of expression
PPTX
PPTX
PPTX
Mass Media and Society Chapter 15: Media and Government
PPTX
Free Speech and Hate Speech: Regulatory Challenge of Internet Freedom in Nigeria
PDF
Using Social Media Ethically
PPTX
Cyber defamtion
PPTX
9 ictasplatformforchange
PPTX
9 ictasplatformforchange
PPTX
9 ictasplatformforchange
PPTX
9 ictasplatformforchange
PPTX
9 ictasplatformforchange
PPTX
9 ictasplatformforchange
PDF
LEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdf
PDF
Chapter 5_dp-_pertemuan_7_8
PPTX
9-ictasplatformforchange-180206004734(1).pptx
PPTX
ICT as Platform for Change - Empowerment Technologies
PDF
9-ictasplatformforchange-180206004734.pdf
PDF
Misuse of computer
PPTX
9-ictasplatformforchange-180206004734.pptx
Freedom of expression
Mass Media and Society Chapter 15: Media and Government
Free Speech and Hate Speech: Regulatory Challenge of Internet Freedom in Nigeria
Using Social Media Ethically
Cyber defamtion
9 ictasplatformforchange
9 ictasplatformforchange
9 ictasplatformforchange
9 ictasplatformforchange
9 ictasplatformforchange
9 ictasplatformforchange
LEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdf
Chapter 5_dp-_pertemuan_7_8
9-ictasplatformforchange-180206004734(1).pptx
ICT as Platform for Change - Empowerment Technologies
9-ictasplatformforchange-180206004734.pdf
Misuse of computer
9-ictasplatformforchange-180206004734.pptx
Ad

More from Mark Jhon Oxillo (20)

PPTX
Social Networking
PPTX
Software Development
DOCX
FIELD STUDY (FS) 6 - EPISODE 3 (2018)
DOCX
FIELD STUDY (FS) 6 - EPISODE 1 (2018)
DOCX
Field Study 2 (FS 2) - Episode 3 [2018]
PPTX
Ethics for IT Workers and IT Users
PPTX
An Overview of Ethics for IT Professionals
PPTX
Introduction to the Study of Government and Constitution
PPTX
Readings in Philippine History - Introduction to Philippine History
PDF
The Significant Relationship of Physics - Mechanics & Heat and Discrete Math...
PDF
The Saber Tooth Curriculum
PDF
Field Study 2 (FS 2) - Episode 2 [2018]
PDF
Civil Service (CS) Examination Reviewer
PPTX
Reflecting on the ICT Learning Process
PPTX
Sustaining an ICT Project for Social Change
PPTX
ICT Project Publication and Statistics
PPTX
ICT Project for Social Change - Empowerment Technologies
PPTX
Interactive Multimedia - Empowerment Technologies
PPTX
Collaborative ICT Development - Empowerment Technologies
PPTX
Online Platforms for ICT Content Development - Empowerment Technologies
Social Networking
Software Development
FIELD STUDY (FS) 6 - EPISODE 3 (2018)
FIELD STUDY (FS) 6 - EPISODE 1 (2018)
Field Study 2 (FS 2) - Episode 3 [2018]
Ethics for IT Workers and IT Users
An Overview of Ethics for IT Professionals
Introduction to the Study of Government and Constitution
Readings in Philippine History - Introduction to Philippine History
The Significant Relationship of Physics - Mechanics & Heat and Discrete Math...
The Saber Tooth Curriculum
Field Study 2 (FS 2) - Episode 2 [2018]
Civil Service (CS) Examination Reviewer
Reflecting on the ICT Learning Process
Sustaining an ICT Project for Social Change
ICT Project Publication and Statistics
ICT Project for Social Change - Empowerment Technologies
Interactive Multimedia - Empowerment Technologies
Collaborative ICT Development - Empowerment Technologies
Online Platforms for ICT Content Development - Empowerment Technologies

Recently uploaded (20)

PPTX
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
PDF
LDMMIA Reiki Yoga Finals Review Spring Summer
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PDF
FOISHS ANNUAL IMPLEMENTATION PLAN 2025.pdf
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PDF
Paper A Mock Exam 9_ Attempt review.pdf.
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PDF
My India Quiz Book_20210205121199924.pdf
PPTX
Virtual and Augmented Reality in Current Scenario
PPTX
20th Century Theater, Methods, History.pptx
PDF
Indian roads congress 037 - 2012 Flexible pavement
PDF
AI-driven educational solutions for real-life interventions in the Philippine...
PDF
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
PPTX
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
PDF
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 1)
PDF
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
PDF
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
PPTX
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
PDF
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
PDF
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
LDMMIA Reiki Yoga Finals Review Spring Summer
Chinmaya Tiranga quiz Grand Finale.pdf
FOISHS ANNUAL IMPLEMENTATION PLAN 2025.pdf
202450812 BayCHI UCSC-SV 20250812 v17.pptx
Paper A Mock Exam 9_ Attempt review.pdf.
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
My India Quiz Book_20210205121199924.pdf
Virtual and Augmented Reality in Current Scenario
20th Century Theater, Methods, History.pptx
Indian roads congress 037 - 2012 Flexible pavement
AI-driven educational solutions for real-life interventions in the Philippine...
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 1)
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf

Privacy and Freedom of Expression

  • 1. Privacy & Freedom of Expression Prepared by: Mark Jhon C. Oxillo
  • 3. THE RIGHT TO PRIVACY • The right to be left alone – the most comprehensive of rights, and the right most valued by a free people
  • 4. INFORMATION PRIVACY • First coined Roger Clarke, director of Australian Privacy Foundation • Is the combination of communications privacy and data privacy
  • 5. COMMUNICATIONS PRIVACY • the ability to communicate with others without those communications being monitored by other persons or organization
  • 6. DATA PRIVACY • the ability to limit access one’s personal data by other individuals and organizations in order to exercise a substantial degree of control over that data and its use
  • 7. Republic Act 10173 • Or the Data Privacy Act of 2012 (PH) • is a law that seeks to protect all forms of information, be it private, personal, or sensitive. It is meant to cover both natural and juridical persons involved in the processing of personal information.
  • 8. Republic Act 10173 • This comprehensive privacy law also established a National Privacy Commission that enforces and oversees it and is endowed with rulemaking power.
  • 10. OPT OUT POLICY • To refuse to give an institution the right to collect and share personal data
  • 11. OPT IN POLICY • To give an institution the right to collect and share personal data
  • 13. IDENTITY THEFT • Occurs when someone steals key pieces of personal information to impersonate a person. This information may include data such as name, address, date of birth, SSS number, passport number, driver’s license number, etc.
  • 14. VISHING • is the telephone equivalent of phishing. It is described as the act of using the telephone in an attempt to scam the user into surrendering private information that will be used for identity theft.
  • 15. ELECTRONIC DISCOVERY • Is the collection, preparation, review and production of electronically stored information for use in criminal and civil actions and proceedings
  • 16. • Includes any form of digital information such as emails, drawings, graphs, web pages, photographs, word-processing files, sound recording and databases
  • 17. CONSUMER PROFILING • Collecting personal information about internet users when they register at websites, complete survey, fill out forms or enter contests online
  • 18. CLICK-STREAM DATA • Information gathered by monitoring a consumer’s online activity
  • 19. BEACONS • Are small pieces of software that run on a web page and are able to track what a viewer is doing on the page, such as what is being typed or where the mouse is moving
  • 20. PERSONALIZATION SOFTWARE • Used to optimize the number, frequency, and mixture of their ad placement and to evaluate how visitors react to new ads
  • 21. MEASURES TO IMPROVE THE PROTECTION OF CONSUMER PRIVACY: • Implementing a “Do Not Track” option for web browsing software that would keep online services from collecting surfing or ad-targeting data
  • 22. MEASURES TO IMPROVE THE PROTECTION OF CONSUMER PRIVACY: • Requiring that companies collect only the data they need and then delete it after it has met its purpose
  • 23. MEASURES TO IMPROVE THE PROTECTION OF CONSUMER PRIVACY: • Requiring that online companies simplify their privacy policies so that consumers can read and understand them
  • 24. CHIEF PRIVACY OFFICER (CPO): • a senior manager within an organization whose role is to ensure that the organization does not violate government regulations while reassuring customers that their privacy will be protected
  • 26. FREEDOM OF EXPRESSION • The right to freedom of expression is one of the most important rights for free people everywhere.
  • 27. FREEDOM OF EXPRESSION • Right to express one's ideas and opinions freely through speech, writing, and other forms of communication but without deliberately causing harm to others' character and/or reputation by false or misleading statements.
  • 28. TYPES OF SPEECHES • OBSCENE SPEECH • DEFAMATION • PERJURY • FRAUD • INCITEMENT OF PANIC • INCITEMENT TO CRIME • “FIGHTING WORDS” • HATE SPEECH • SEDITION
  • 29. OBSCENE SPEECH • Appeals to “prurient interest” (causes lust) • “Obviously offensive” description of defined sexual conduct • No serious literary, artistic, political, or scientific value
  • 30. DEFAMATION • Oral or written statement of alleged fact that is false and harms another person * Slander - oral defamatory statement * Libel - written defamatory statement
  • 31. PERJURY • is the intentional act of swearing a false oath or falsifying an affirmation to tell the truth, whether spoken or in writing, concerning matters material to an official proceeding.
  • 32. FRAUD • is intentional deception to secure unfair or unlawful gain, or to deprive a victim of a legal right.
  • 33. INCITEMENT OF PANIC • is when a person causes the evacuation of any public place, or otherwise cause serious public inconvenience or alarm
  • 34. INCITEMENT TO CRIME • is the encouragement of another person to commit a crime
  • 35. FIGHTING WORDS • are written or spoken words intended to incite hatred or violence from their target • are words indicating a willingness to fight or challenge someone
  • 36. HATE SPEECH • abusive or threatening speech or writing that expresses prejudice against a particular group, especially on the basis of race, religion, or sexual orientation.
  • 37. SEDITION • a conduct or speech inciting people to rebel against the authority of a state or monarch
  • 38. Article III (Bill of Rights) • Section 4. No law shall be passed abridging the freedom of speech, of expression, or of the press, or the right of the people peaceably to assemble and petition the government for redress of grievances.
  • 39. FOE: KEY ISSUES • Controlling access to information on the Internet • Anonymity on the Internet • Defamation and hate speech • Corporate blogging • Pornography
  • 40. FOE: KEY ISSUES Controlling access to information on the Internet: • Internet Filter – a software that can be used to block access to certain websites that contain material deemed inappropriate or offensive
  • 41. FOE: KEY ISSUES Anonymity on the Internet • Anonymous Expression – the expression of opinions by people who do not reveal their identity
  • 42. FOE: KEY ISSUES Defamation and Hate Speech • Ex: A threatening private message sent over the internet to a person, and a libel directed at a particular person can be punishable by law.
  • 43. FOE: KEY ISSUES Corporate Blogging • is the practice of allowing employees to create their own personal blogs relating to their employment
  • 44. FOE: KEY ISSUES Pornography • often colloquially referred to as porn, is any material — whether written, visual, or others — that consists of sexually explicit material and that is intended to sexually arouse.
  • 45. FOE: KEY ISSUES Sexting • sending sexual messages, nudes or seminude photos or sexually explicit videos over a cellphone
  • 46. END