Advantages Of Unauthorized Processing Of Personal Information

Decent Essays
Register to read the introduction… 25. Unauthorized Processing of Personal Information and Sensitive Personal Information. – (a) The unauthorized processing of personal information shall be penalized by imprisonment ranging from one (1) year to three (3) years and a fine of not less than Five hundred thousand pesos (Php500,000.00) but not more than Two million pesos (Php2,000,000.00) shall be imposed on persons who process personal information without the consent of the data subject, or without being authorized under this Act or any existing law. (b) The unauthorized processing of personal sensitive information shall be penalized by imprisonment ranging from three (3) years to six (6) years and a fine of not less than Five hundred thousand pesos (Php500,000.00) but not more than Four million pesos (Php4,000,000.00) shall be imposed on persons who process personal information without the consent of the data subject, or without being authorized under this Act or any existing law. SEC. 26. Accessing Personal Information and Sensitive Personal Information Due to Negligence. – (a) Accessing personal information due to negligence shall be penalized by imprisonment ranging from one (1) year to three (3) …show more content…
(b) Accessing sensitive personal information due to negligence shall be penalized by imprisonment ranging from three (3) years to six (6) years and a fine of not less than Five hundred thousand pesos (Php500,000.00) but not more than Four million pesos (Php4,000,000.00) shall be imposed on persons who, due to negligence, provided access to personal information without being authorized under this Act or any existing law. SEC. 27. Improper Disposal of Personal Information and Sensitive Personal Information. – (a) The improper disposal of personal information shall be penalized by imprisonment ranging from six (6) months to two (2) years and a fine of not less than One hundred thousand pesos (Php100,000.00) but not more than Five hundred thousand pesos (Php500,000.00) shall be imposed on persons who knowingly or negligently dispose, discard or abandon the personal information of an individual in an area accessible to the public or has otherwise placed the personal information of an individual in its container for trash collection. b) The improper disposal of sensitive personal information shall be penalized by imprisonment ranging from one (1) year to three (3) years and a fine of not less than One hundred thousand pesos (Php100,000.00) but not more than One million pesos (Php1,000,000.00) shall be imposed on persons who knowingly or negligently dispose, discard or abandon the personal information of an individual in an area accessible to the public or has otherwise placed the personal information of an individual in its container for trash collection. SEC. 28. Processing of Personal Information and Sensitive Personal Information for Unauthorized Purposes. – The processing of personal

Related Documents

  • Decent Essays

    Law 25.326

    • 84 Words
    • 1 Pages

    Law of Protection of Personal Data or known Law 25.326 was enacted in 2000. The purpose of this Act is the comprehensive protection of personal information recorded in files, records, databases, databanks or other technical means of data treatment, either public or private for purposes of providing reports, in order to guarantee the right of individuals to their honor and privacy, as well as the access to information recorded thereupon, in accordance with the provisions of Section 43, Third Paragraph of the National Constitution.…

    • 84 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    The reading talks about where the line should be drawn between doing what is good for society and an invasion of privacy. Amitai Etzioni claims that what makes a good society is concerns for public health and safety even if it means the diminution of privacy. He gives an example that infants should be tested for HIV early on so it can be treated. However, the test will show that the mother is a carrier, there for violating the privacy of the mother. The problem occurs when it becomes a requirement that infants should be tested.…

    • 406 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    There are so many citizens of the United States who do not agree or like the NSA’s involvement in communication networks. For example, “This country was founded on the notion of liberty. So it is striking to us that we have reached a point in our history when the expectation of privacy and liberty is dissolving” (Paul and Yoho). A major argument against the NSA is that it violates the rights of the countries people. Paul and Yoho say “We need to go back to the basics and use the Fourth Amendment as our guide.”…

    • 967 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    “In 2004, the government passed the Identity Theft Penalty Enhancement Act, which increased the severity of the punishment for identity theft crimes” (Crimes, 2006-2014). It brings a sense of relief to know that the criminals get what they truly deserve. Identity Theft is truly a selfish crime and the perpetrators should be penalized accordingly. According to the Identity Theft Penalty Enhancement Act, “The prison sentence for identity theft starts at up to five years, plus two more years for using the stolen identity in another crime. The prison sentence grows from there, depending on how many related crimes were committed” (Crimes, 2006-2014).…

    • 834 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Why Privacy Matter Even If You Have “Nothing to Hide” In the article “Why Privacy Matter Even If You Have ‘Nothing to Hide,”’ Daniel J. Solove, talking about the government governed the information to analyze without the permission. Many people didn’t realize how many problems by let the government take their information to analyze. Solove does a great job to persuade the readers that we deserve more the privacy by using the appeal to authority and anecdote.…

    • 704 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    According to the United Nations, privacy is basic human right that should be protected by law. The United States Constitution also implies a right to privacy in the Fourth Amendment. Recent laws passed by the government have raised questions about whether the government’s actions infringe upon a citizen’s right to privacy. The USA Patriot Act was the first of many laws that increased the powers of government organizations such as the NSA and the FBI. The law allowed these agencies to access private records of US citizens without the need of a warrant or judge’s consent.…

    • 716 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    2a. The criminal act that Rodriguez has committed of violating the Computer Fraud and Abuse Act. The Administration prohibits accessing information on its databases for nonbusiness reasons, and Rodriguez at trial admitted that he accessed information for nonbusiness reasons when he obtained personal identifying information, such as birth dates and home addresses, of 17 persons he knew or their relatives. 2b. Rodriguez was charged with 17 misdemeanor counts because Rodriguez violated policy from his employer because he accesses a computer without authorized access and thereby obtaining information from any department or agency of the united states.…

    • 147 Words
    • 1 Pages
    Decent Essays
  • Superior Essays

    Since the terrorist attacks on September 11, 2001, national security has been a top priority, physically and electronically. The United States Government has created programs and institutions to handle and prevent threats and attacks within, or towards, our nation. The United States Government does not deny domestic surveillance programs and justifies monitoring the lives of civilians by stating that the programs are for the overall national security of the nation, rather than defending the private lives of American citizens. Because most domestic surveillance is superfluous, American citizens retain the right to private lives and should be sheltered from redundant surveillance.…

    • 1730 Words
    • 7 Pages
    Superior Essays
  • Improved Essays

    When working in childcare, you can discover info about the children and their families. You might hear about personal information e.g. divorces, abuse, drug addiction etc. and also other individual and complex info. All of this info must be handled very sensibly. To maintain confidentiality, you should; - keep up to date with all the laws and the regulations which regard handling of personal information - not share any information with people who don’t need to know.…

    • 413 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Public perceptions concerning civil liberty infringement by government entities can be reduced by increasing public awareness of non-sensitive, unclassified information sharing across public communication portals in a manner that is concise and easily digestible. This assertion seems to be supported by the myriad of public outcries demanding more transparency in homeland security policies and procedures. Homeland security is formulated around the basic principle that the government is dutifully bound to provide for the safety and security of the nation. This rudimentary duty is expected in spite of a landscape populated with dynamic, evolving threats that can be slowly emergent or unpredictable (Margarit, 2010). This mission is further complicated by a number of inhibitions and stumbling…

    • 238 Words
    • 1 Pages
    Improved Essays
  • Improved Essays

    With the advancement of technology comes a startling decrease in privacy. Nothing is considered ‘personal’ by the internet, or private, or kept a secret. Anything put on the internet is forever immortalized. Technology like cellphones, laptops, and drones have invaded the sense of personal privacy and eliminated the prospects of privacy returning to those who possess technology.…

    • 382 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Electronic Privacy: When Is It Acceptable to Violate? In the twenty-first century, Americans pride themselves in their right to privacy. In fact, they take it for granted. Today, privacy is an expectation.…

    • 839 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Why Privacy Matters

    • 1428 Words
    • 6 Pages

    Assignment Submitted By Yours Name here Submitted To Yours Instructor Name here To Meet the Needs of the Course Nov., 2015. For this rhetorical analysis task, I have selected the article which is titles as Why Privacy Matters Even if You Have Nothing to Hide, written by Daniel J. Solove.…

    • 1428 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    The enforcement agencies in the country have failed to deal effectively with drug peril and thus has not achieved desired outcome. With the exception of the Narcotics Control Bureau all other agencies like the Customs; Central excise; Department of Revenue Intelligence; Police etc have drug law enforcement as an additional responsibility. The existing webs of agencies are facing several problems which hampers their efficiency and effectiveness viz. ; the shortage of staff; lack of co-ordination and sharing of sensitive information; inter-departmental transfers; procedural irregularities committed by the enforcement officials pertaining to the ignorance of the provisions of the NDPS act, constituting one of the prime reasons for the observance…

    • 177 Words
    • 1 Pages
    Improved Essays
  • Improved Essays

    From 2012 -2016, Businesses – Other (BSO) industry has a total of 85% data records affected compared to any other organizations. Businesses - Retail/Merchant (BSR) were at 5%, Government (GOV) at 2%, Medical (MED) at 1%, Businesses - Financial/Insurance Services (BSF) at 7% and Education (EDU) and Non-profit (NGO) organization reveals at 0%. Even though, Education and Non-profit organization resulted at 0% that doesn’t mean that these two organizations had been spared from data breaches. Their overall data records breached were 4,207,097 and 312,462 respectively. The result was very much lower that the average were only in the range of 62,492 to 841,419 compared to other organization’s million average of data records being breached in the last five years.…

    • 952 Words
    • 4 Pages
    Improved Essays