School season is already starting. With the ‘new normal’ in place, there would be no physical classes, only online classes. That being said, there is a need for children to create their own accounts in whatever platform the school and teacher uses to facilitate learning. There is all the more reason to teach online privacyContinue reading “School Children and Online Classes”
But, the question is, have you opted to enable your two-factor authentication?
More and more schools are adopting their own platforms that their students can accessed online to view their records and grades, conduct surveys, see their schedules and remaining classes, and even enroll. Know how to protect the data in your care today.
Social media are websites and applications that enable users to create posts, share content, and even participate in social networking. It facilitates the sharing of content quickly, effectively, and in-real time. One of the most well-known social media platforms that we have is Facebook. Facebook builds technologies that give people the power to connect withContinue reading “Top 5 Facebook Privacy Tips and Tricks”
Permissions are the activities that the app can perform on your phone or device. These include access to your calendar, camera, contacts, microphone, phone, and even your location. The permissions asked by apps vary depending on the purpose where the data collected are to be used. The following are some common app permissions as describedContinue reading “Understanding App Permissions”
In the last week, two universities experienced a hacking incident of their respective student portal systems. San Beda University’s Student portal was hacked, while University of the Philippines Cebu confirmed a breach of their Student Evaluation on Teaching, which is a separate system from their student portal. San Beda University What Happened? June 5- SanContinue reading “DATA BREACH REPORT: Student Portal Systems Unauthorized Access”
With the current situation of accounts being hacked and other poser accounts popping up, I decided to change my password for the better. As I was changing my password to further secure my many many, truly, may accounts. I’ve come across one platform I used which offers true end-to-end encryption (E2EE). Okay back to myContinue reading “True End-to-End Encryption”
Understanding the term itself is the first step in order to be able to fully grasp its concept and how it is applied. Data Protection and Data Privacy, being synonymous to each other, are always most likely to be interchanged. However, no matter how interconnected these both are, the two have different meanings and applicationsContinue reading “Data Protection v. Data Privacy”
Since some of the establishments will be reopening under the MEQC and GCQ, processing of personal data will play a role in preventing further spread of Covid19. Under the DTI and DOLE Interim Guidelines on Workplace Prevention and Control of Covid-19, there are measures that should be implemented in all workplaces consistent with the objectives ofContinue reading “Mandatory Data Processing Activities during MECQ and GCQ”
Something went wrong. Please refresh the page and/or try again.
Follow ADM’s Blog
Get new content delivered directly to your inbox.