GEE FINALS Flashcards
(91 cards)
According to privacy.gov.ph, what is Data Privacy?
a) The right of a company to protect its proprietary information.
b) The right of an individual not to have private information disclosed, and to live freely from surveillance and intrusion.
c) The government’s right to monitor citizens for national security.
d) The process of encrypting all online communications.
The right of an individual not to have private information disclosed, and to live freely from surveillance and intrusion.
Why is Data Privacy considered important?
a) It primarily protects corporations from competitors.
b) Because when private data gets in the wrong hands, bad things can happen, such as identity theft or national security risks.
c) It ensures that all data is publicly accessible for transparency.
d) It mainly focuses on preventing software bugs.
Because when private data gets in the wrong hands, bad things can happen, such as identity theft or national security risks.
A data breach at which type of organization could put students’ Personal Identifiable Information (PII) in the hands of criminals?
a) A government agency
b) A corporation
c) A school
d) A hospital
A school
What is the full name of R.A. 10173?
a) National Privacy Commission Act of 2012
b) Cybercrime Prevention Act of 2012
c) Data Privacy Act of 2012 (DPA)
d) Information Security Act of 2012
Data Privacy Act of 2012 (DPA)
What is the stated purpose of the Data Privacy Act of 2012?
a) To regulate the use of social media.
b) To protect individual personal information in information and communications systems in the government and the private sector.
c) To establish guidelines for ethical hacking.
d) To ensure all government data is open to the public.
To protect individual personal information in information and communications systems in the government and the private sector.
Under the DPA, companies must comply if they meet which of the following criteria?
a) Have 100 employees or 250 data subjects.
b) Have 250 employees or 1000 data subjects.
c) Have 500 employees or 500 data subjects.
d) Are exclusively government agencies.
Have 250 employees or 1000 data subjects.
According to the text, who else besides companies meeting specific size thresholds must comply with the DPA?
a) Only individuals processing data for personal use.
b) Only international organizations operating in the Philippines.
c) Any natural and juridical persons involved in personal information processing.
d) Only companies that process financial data.
Any natural and juridical persons involved in personal information processing.
What is a “Data Subject” as defined in the text?
a) The topic or theme of a database.
b) An individual whose personal information is processed.
c) A company that collects data.
d) A government agency regulating data.
An individual whose personal information is processed.
Which of the following is an example of “Offline Identity” that needs protection?
a) A social media profile.
b) An email address.
c) Identification cards used for physical authentication.
d) A username for an online game.
Identification cards used for physical authentication
What does “Personal Identifiable Information” (PII) refer to?
a) Any information about a company’s financial status.
b) Information that is publicly available and not sensitive.
c) Any information from which the identity of an individual is apparent or can be reasonably and directly ascertained.
d) Information related to an individual’s opinions or beliefs.
Any information from which the identity of an individual is apparent or can be reasonably and directly ascertained.
Which of the following is listed as Personal Information that is protected?
a) Favorite color
b) Political affiliation
c) Mother’s Maiden Name
d) Blood type
Mother’s Maiden Name
Which of the following categories falls under “Sensitive Personal Information”?
a) Job position
b) Home number
c) An individual’s race, ethnic origin, or marital status.
d) Present address
An individual’s race, ethnic origin, or marital status.
Sensitive personal information includes information about an individual’s:
a) Preferred brand of coffee.
b) Health, education, or genetic life.
c) Social media username.
d) Vehicle registration number
Health, education, or genetic life.
Who is defined as a “Personal Information Controller” (PIC)?
a) An individual whose data is being processed.
b) A government agency that audits data practices.
c) A person or organization who controls the collection, holding, processing, or use of personal information.
d) A software used to manage databases.
A person or organization who controls the collection, holding, processing, or use of personal information.
What is a “Personal Information Processor” (PIP)?
a) The main computer server where data is stored.
b) The individual data subject providing the information.
c) Any natural or juridical person to whom a PIC may outsource the processing of personal data.
d) The software algorithm that processes information.
Any natural or juridical person to whom a PIC may outsource the processing of personal data.
What does “Consent” mean in the context of data privacy?
a) A one-time agreement that cannot be revoked.
b) Implied agreement by using a service.
c) Giving data subjects genuine choice and control over how a PIC uses their data, including the right to refuse or withdraw.
d) A legal document signed only by corporations.
Giving data subjects genuine choice and control over how a PIC uses their data, including the right to refuse or withdraw.
Which right under R.A. 10173 treats personal data almost like personal property, requiring explicit consent for collection unless otherwise provided by law?
a) The right to access
b) The right to rectify
c) The right to be informed
d) The right to damages
The right to be informed
The “right to be informed” also requires PICs to do what in a timely manner if your data has been compromised?
a) Offer financial compensation immediately.
b) Notify you.
c) Delete all your data.
d) Change their security protocols.
Notify you.
Which right allows you to find out whether an organization holds any personal data about you and gain “reasonable access” to it?
a) The right to be informed
b) The right to access
c) The right to rectify
d) The right to file a complaint
The right to access
Under the “right to access,” which of the following can you NOT demand?
a) The contents of your personal data that were processed.
b) The names and addresses of the recipients of your data.
c) The personal data of other individuals processed by the PIC.
d) The date when your data was last accessed and modified.
The names and addresses of the recipients of your data.
What does the “right to rectify” allow a data subject to do?
a) Delete all their data from the PIC’s system.
b) Dispute and have corrected any inaccuracy or error in the data a PIC holds about them.
c) Receive monetary compensation for any data breach.
d) Access the PIC’s internal security protocols.
Dispute and have corrected any inaccuracy or error in the data a PIC holds about them.
Under what circumstances can you claim compensation according to the “right to damages”?
a) If you simply disagree with how your data is used.
b) If you suffered damages due to inaccurate, incomplete, outdated, false, unlawfully obtained, or unauthorized use of personal data.
c) Anytime your data is processed by a PIC.
d) Only if the NPC explicitly orders it.
If you suffered damages due to inaccurate, incomplete, outdated, false, unlawfully obtained, or unauthorized use of personal data.
If you feel your personal information has been misused or your data privacy rights have been violated, what right can you exercise?
a) The right to demand the PIC cease operations.
b) The right to file a complaint with the National Privacy Commission (NPC).
c) The right to publicly disclose the PIC’s internal data.
d) The right to directly access and modify the PIC’s database.
The right to file a complaint with the National Privacy Commission (NPC).
What problem arises when a computer is fed bad information or someone misinterprets information from a computer?
a) It always leads to improved decision-making.
b) It can lead to trivial inconveniences or even severe consequences like fatalities.
c) It primarily affects the speed of the computer.
d) It enhances the security of the system.
It can lead to trivial inconveniences or even severe consequences like fatalities.