Social media are websites and applications that enable users to create posts, share content, and even participate in social networking. It facilitates the sharing of content quickly, effectively, and in-real time. One of the most well-known social media platforms that we have is Facebook. Facebook builds technologies that give people the power to connect withContinue reading “Top 5 Facebook Privacy Tips and Tricks”
Permissions are the activities that the app can perform on your phone or device. These include access to your calendar, camera, contacts, microphone, phone, and even your location. The permissions asked by apps vary depending on the purpose where the data collected are to be used. The following are some common app permissions as describedContinue reading “Understanding App Permissions”
In the last week, two universities experienced a hacking incident of their respective student portal systems. San Beda University’s Student portal was hacked, while University of the Philippines Cebu confirmed a breach of their Student Evaluation on Teaching, which is a separate system from their student portal. San Beda University What Happened? June 5- SanContinue reading “DATA BREACH REPORT: Student Portal Systems Unauthorized Access”
With the current situation of accounts being hacked and other poser accounts popping up, I decided to change my password for the better. As I was changing my password to further secure my many many, truly, may accounts. I’ve come across one platform I used which offers true end-to-end encryption (E2EE). Okay back to myContinue reading “True End-to-End Encryption”
Understanding the term itself is the first step in order to be able to fully grasp its concept and how it is applied. Data Protection and Data Privacy, being synonymous to each other, are always most likely to be interchanged. However, no matter how interconnected these both are, the two have different meanings and applicationsContinue reading “Data Protection v. Data Privacy”
Since some of the establishments will be reopening under the MEQC and GCQ, processing of personal data will play a role in preventing further spread of Covid19. Under the DTI and DOLE Interim Guidelines on Workplace Prevention and Control of Covid-19, there are measures that should be implemented in all workplaces consistent with the objectives ofContinue reading “Mandatory Data Processing Activities during MECQ and GCQ”
One of the functions of a Data Protection Officer (DPO) is to inform and cultivate awareness on privacy and data protection within the organization of the Personal Information Controller (PIC) or Personal Information Processor (PIP), including all relevant laws, rules and regulations and issuances of the National Privacy Commission (NPC). Such task is not asContinue reading “Tips for DPOs when Discussing Data Privacy”
Nowadays, majority of people have access to the internet. The window to the world wide web, physically is our gadgets (be it our mobile devices, laptops or computers). But digitally, in order to access information in the internet, you most likely need a browser. Have you ever given a thought about the browser you use?Continue reading “Creating a “Private Set-Up””
Data privacy greatly influenced the changing regulatory landscape of businesses around the globe. Companies, corporations and offices that are mandated to comply must be prepared for additional works, increase of administrative activities, audits and compliance checks. According to the PriveSec report of TrustArc, these are achievable by observing a continuous compliance program which involves implementing policies,Continue reading “DATA PRIVACY: FIVE STEPS FOR CONTINUOUS COMPLIANCE PROGRAM by Rachel Granates”
Privacy Impact Assessment (PIA) is the second pillar of data privacy accountability and compliance. After registering your Data Protection Officer (DPO) with the National Privacy Commission (NPC), the next step is to know, evaluate, and manage the data privacy risks that are present in your operations. Here are some tips that can help you inContinue reading “Tips in Conducting your PIA by Asha Abdulraheem”
Something went wrong. Please refresh the page and/or try again.
Follow ADM’s Blog
Get new content delivered directly to your inbox.