dndfeature

[vc_row css_animation="" row_type="row" use_row_as_full_screen_section="no" type="grid" angled_section="no" text_align="left" background_image_as_pattern="without_pattern"][vc_column][vc_column_text] The efficiency and objectivity that algorithms provide account for the growing reliance on algorithmic decision-making processes. Decisions that were historically made by humans are now made by algorithms: votes are counted, loan and credit card applications are approved,...

[vc_row css_animation="" row_type="row" use_row_as_full_screen_section="no" type="grid" angled_section="no" text_align="left" background_image_as_pattern="without_pattern"][vc_column][vc_column_text]Over the past few years, consumers have gained more control of their financial lives. This is largely due to the rise of FinTech companies. These companies provide financial services through the use of technology. They offer a wide...

[vc_row css_animation="" row_type="row" use_row_as_full_screen_section="no" type="grid" angled_section="no" text_align="left" background_image_as_pattern="without_pattern"][vc_column][vc_column_text]The term "cyberspace" was coined by a science fiction writer[1] to describe the boundless electronic system of interlinked networks of computers that provide access to information and interactive communication.[2] Today, cyberspace and the internet refers basically to the...

[vc_row css_animation="" row_type="row" use_row_as_full_screen_section="no" type="grid" angled_section="no" text_align="left" background_image_as_pattern="without_pattern"][vc_column][vc_column_text]The Data Privacy Act of 2012 was passed to extend protection to people and their data in this modern age. It provides a regime for regulating the processing and storage of particularly personal and sensitive information, given the...

[vc_row css_animation="" row_type="row" use_row_as_full_screen_section="no" type="grid" angled_section="no" text_align="left" background_image_as_pattern="without_pattern"][vc_column][vc_column_text]The extent to which an organization is subject to obligations under the Data Privacy Act (hereinafter “DPA”) depends on whether or not they are a personal information controller or processor. Generally speaking, a party that handles personal personal...

[vc_row css_animation="" row_type="row" use_row_as_full_screen_section="no" type="grid" angled_section="no" text_align="left" background_image_as_pattern="without_pattern"][vc_column][vc_column_text]In many, if not all, organizations, a new project or policy is normally preceded by a series of studies and consultations before actual implementation. These studies are conducted for the purpose of determining the project or policy’s feasibility,...

[vc_row css_animation="" row_type="row" use_row_as_full_screen_section="no" type="grid" angled_section="no" text_align="left" background_image_as_pattern="without_pattern"][vc_column][vc_column_text]The Right to Be Forgotten In May 2014, the Court of Justice of the European Union allowed the removal of the links to articles published online by newspaper La Vanguardia, detailing a real estate auction, from results pulled up...

[vc_row css_animation="" row_type="row" use_row_as_full_screen_section="no" type="grid" angled_section="no" text_align="left" background_image_as_pattern="without_pattern"][vc_column][vc_column_text]Sometime in October 2017, when news of a possible data breach involving its clients was made public, COL Financial – the largest online stock broker in the Philippines with about 225,000 registered investors – was quick to assuage...

[vc_row css_animation="" row_type="row" use_row_as_full_screen_section="no" type="grid" angled_section="no" text_align="left" background_image_as_pattern="without_pattern"][vc_column][vc_column_text]Sometime in August 2014, popular blogger Michael Sy Lim of Fashion Pulis posted screenshots of what were alleged to be leaked medical records of model Deniece Cornejo from Healthway Clinic showing her to be suffering from a sexually...

[vc_row css_animation="" row_type="row" use_row_as_full_screen_section="no" type="grid" angled_section="no" text_align="left" background_image_as_pattern="without_pattern"][vc_column][vc_column_text]In November 2017, the San Francisco-based Uber Technologies, Inc. of the eponymous ride-sharing app disclosed that a massive breach of its systems had exposed the data of its 57 million users and drivers across the globe.1 The belated...