dndfeature

Accessing Geolocation without a Search Warrant There have been reports on the police using the global positioning tracker (GPS) of stolen vehicles[1] or smartphones[2] to catch suspects. Last December 2015, the Philippine National Police Highway Patrol Group (PNP-HPG) had a breakthrough in the “rent-sangla” scheme where...

What is AI and how is it created? Artificial intelligence is no longer a creation of science fiction. It now exists in everyday life, from stock market trading to facial recognition in social media. Artificial Intelligence has become a staple in everyday life even without people...

In the midst of growing data breaches affecting a wide array of industries and applications, it has been increasingly necessary to safeguard personal data collection and processing through more stringent policies. The latest General Data Protection Regulation (GDPR) of the EU requires companies which handle...

[vc_row css_animation="" row_type="row" use_row_as_full_screen_section="no" type="grid" angled_section="no" text_align="left" background_image_as_pattern="without_pattern"][vc_column][vc_column_text]The year 2017 saw the proliferation of cyber crimes[1], with ransomware being the most notorious of such crimes. The likes of “WannaCry” and “Bad Rabbit” took over numerous computers all over the world, threatening its users with harm,...

[vc_row css_animation="" row_type="row" use_row_as_full_screen_section="no" type="grid" angled_section="no" text_align="left" background_image_as_pattern="without_pattern"][vc_column][vc_column_text] The efficiency and objectivity that algorithms provide account for the growing reliance on algorithmic decision-making processes. Decisions that were historically made by humans are now made by algorithms: votes are counted, loan and credit card applications are approved,...

[vc_row css_animation="" row_type="row" use_row_as_full_screen_section="no" type="grid" angled_section="no" text_align="left" background_image_as_pattern="without_pattern"][vc_column][vc_column_text]Over the past few years, consumers have gained more control of their financial lives. This is largely due to the rise of FinTech companies. These companies provide financial services through the use of technology. They offer a wide...

[vc_row css_animation="" row_type="row" use_row_as_full_screen_section="no" type="grid" angled_section="no" text_align="left" background_image_as_pattern="without_pattern"][vc_column][vc_column_text]The term "cyberspace" was coined by a science fiction writer[1] to describe the boundless electronic system of interlinked networks of computers that provide access to information and interactive communication.[2] Today, cyberspace and the internet refers basically to the...

[vc_row css_animation="" row_type="row" use_row_as_full_screen_section="no" type="grid" angled_section="no" text_align="left" background_image_as_pattern="without_pattern"][vc_column][vc_column_text]The Data Privacy Act of 2012 was passed to extend protection to people and their data in this modern age. It provides a regime for regulating the processing and storage of particularly personal and sensitive information, given the...

[vc_row css_animation="" row_type="row" use_row_as_full_screen_section="no" type="grid" angled_section="no" text_align="left" background_image_as_pattern="without_pattern"][vc_column][vc_column_text]The extent to which an organization is subject to obligations under the Data Privacy Act (hereinafter “DPA”) depends on whether or not they are a personal information controller or processor. Generally speaking, a party that handles personal personal...