
CCTV AND DATA PRIVACY
The usage of closed-circuit television (CCTV) nowadays became even more prevalent in the world of technology. Installing CCTVs aids in identifying future anomalies, provides people with the feeling of safety, and gives a long-term cost-effective solution to privacy and security concerns. CCTVs are tools which support safety and security of personal information controllers (PICs) andContinue reading “CCTV AND DATA PRIVACY”

School Children and Online Classes
School season is already starting. With the ‘new normal’ in place, there would be no physical classes, only online classes. That being said, there is a need for children to create their own accounts in whatever platform the school and teacher uses to facilitate learning. There is all the more reason to teach online privacyContinue reading “School Children and Online Classes”

A More Privacy-Conscious World
Let us look at some options that gives more power to the user and have them be involved in the protection, security and privacy of their own accounts.

Facial Recognition, Fingerprint Password, and Contact Less Payment
But, the question is, have you opted to enable your two-factor authentication?
How to Protect Data in the Academe
More and more schools are adopting their own platforms that their students can accessed online to view their records and grades, conduct surveys, see their schedules and remaining classes, and even enroll. Know how to protect the data in your care today.

Top 5 Facebook Privacy Tips and Tricks
Social media are websites and applications that enable users to create posts, share content, and even participate in social networking. It facilitates the sharing of content quickly, effectively, and in-real time. One of the most well-known social media platforms that we have is Facebook. Facebook builds technologies that give people the power to connect withContinue reading “Top 5 Facebook Privacy Tips and Tricks”

Understanding App Permissions
Permissions are the activities that the app can perform on your phone or device. These include access to your calendar, camera, contacts, microphone, phone, and even your location. The permissions asked by apps vary depending on the purpose where the data collected are to be used. The following are some common app permissions as describedContinue reading “Understanding App Permissions”
DATA BREACH REPORT: Student Portal Systems Unauthorized Access
In the last week, two universities experienced a hacking incident of their respective student portal systems. San Beda University’s Student portal was hacked, while University of the Philippines Cebu confirmed a breach of their Student Evaluation on Teaching, which is a separate system from their student portal. San Beda University What Happened? June 5- SanContinue reading “DATA BREACH REPORT: Student Portal Systems Unauthorized Access”
True End-to-End Encryption
With the current situation of accounts being hacked and other poser accounts popping up, I decided to change my password for the better. As I was changing my password to further secure my many many, truly, may accounts. I’ve come across one platform I used which offers true end-to-end encryption (E2EE). Okay back to myContinue reading “True End-to-End Encryption”
Data Protection v. Data Privacy
Understanding the term itself is the first step in order to be able to fully grasp its concept and how it is applied. Data Protection and Data Privacy, being synonymous to each other, are always most likely to be interchanged. However, no matter how interconnected these both are, the two have different meanings and applicationsContinue reading “Data Protection v. Data Privacy”
Loading…
Something went wrong. Please refresh the page and/or try again.
Follow ADM’s Blog
Get new content delivered directly to your inbox.