FQ4 Flashcards
(36 cards)
Refers to unique and original works, such as ideas, inventions, arts, writings, processes, company and product names and logos.
Intellectual Property
What right regarding personal information allows to obtain and electronically move, copy or transfer data in a secure manner, for further use?
Data Portability
Which among the following is NOT TRUE about Integrity?
Integrity is the foundation of character
It is an independent body created under Republic Act No. 10173, mandated to administer and implement the provisions of the Act, and to monitor and ensure compliance of the country with international standards set for data protection.
Data Privacy Act of 2012
It is an independent body created under Republic Act No. 10173, mandated to administer and implement the provisions of the Act, and to monitor and ensure compliance of the country with international standards set for data protection.
National Privacy Commission
What is the date Republic Act No. 10844 was signed into law?
May 23, 2016
This law prohibits anyone from overhearing, intercepting, or recording any private communication by tapping wire or using the electronic device without authorization by all parties?
RA 4200
It is a small text file that a web server stores on the computer.
Cookies
What is the minimum penalty for hacking, cracking, and piracy as prescribed in RA 8792.
100,000.00
The right of individual or organization to exchange information without fear or repercussion or censorship.
Freedom of Expression
The mechanism by which professionals ensure that their members use their knowledge and skills to benefit society.
Code of Ethics
This is unauthorized copying, reproduction, dissemination, distribution, importation, use, removal. alteration, substitution, modification, storage, uploading, downloading, communication, making available to the public, or broadcasting of protected material, electronic signature or copyrighted works including legally protected sound recordings or phonograms or information material on protected works, through the use of telecommunication networks?
Piracy
What are the moral guidelines that governs the use of computers, mobile devices, information systems, and related technologies?
Technology Ethics
Which of the following government agency, Issues and promulgates guidelines, advisories, and procedures in all matters related to cybercrime investigation, forensic evidence recovery, and forensic data analysis consistent with industry-standard practices?
OOC
What is a security technique that creates a fake, but realistic version of the organizational data with the goal of protecting sensitive data, while providing functional alternative when real data is not needed?
Data Masking
Which right under Republic Act 10173 should be exercised when organizations or personal controllers are processing data without the consent for the purpose of direct marketing purposes.
The right to object
This organization is mandated to be the primary policy, planning, coordinating, implementing, and administrative entity of the Executive Branch of the government that will plan, develop, and promote the national ICT development agenda.
DICT
There is a need to criminalize porn actors playing a role as minors. Having porn actors play as minors provokes the intention to have children partake in sexual activity and insults children’s rights and, therefore, should be banned. Which law applies the above context?
RA 9775
This may include personal details, such as age, address, phone number, marital status, number and ages of dependents, interests, and spending habits.
Electronic Profiles
The McDonald’s® has golden arches design , the company Nike Nike® with their swoosh (check) logo. These are examples of what type of intellectual property?
Trademarks
What word, phrase, symbol, and/or design that identifies and distinguishes the source of the goods of one party from those of others?
Trademark
A type of cybercrime where unauthorized acquisition, use, misuse, transfer, possession, alteration or deletion of identifying information belonging to another, whether natural or juridical.
Computer-related Identity Theft
This law was patterned after the “UNCITRAL Model Law on Electronic Commerce” adopted by the United Nations Commission on International Trade Law (UNCITRAL) in 1996.
Republic Act 8792
Which law penalizes the mere possession of any type of skimming devices or even attempts to access an application or online banking account, regardless of whether or not it will result in monetary loss to the account holder, and is also punishable with imprisonment?
RA 8484