Save
Upgrade to remove ads
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

Formative 4 - law

QuestionAnswer
Which RA 10175 offense involves registering misleading domains in bad faith? Group of answer choices System interference Identity theft Misuse of devices Cyber-squatting Cyber-squatting
Which rights are granted to data subjects under RA 10173? Group of answer choices Right to access Right to rectification Right to company profits Right to be informed Right to access Right to rectification Right to be informed
An IT staff member mistakenly sends health records to the wrong recipient. This is negligent access under RA 10173. Group of answer choices True False True
A hospital requires its contractors to comply with the same privacy standards it follows. This aligns with RA 10173. Group of answer choices False True True
A student records a private phone call with a friend without consent. This is a violation of RA 4200. Group of answer choices True False True
An employee leaks a co-worker’s medical record on social media out of spite. This is malicious disclosure under RA 10173. Group of answer choices False True True
A blogger copies entire copyrighted articles and reposts them online without permission. This violates RA 8293. Group of answer choices True False True
Which law criminalizes online child pornography with penalties one degree higher than RA 9775? Group of answer choices RA 9995 RA 8792 RA 8293 RA 10175 RA 10175
A bank encrypts its transaction logs and limits access to authorized employees. This follows proper security measures under RA 10173. Group of answer choices True False True
The COMELEC 2016 data breach exposed how many voters’ personal data? Group of answer choices 5 million 100 million 25 million 55 million 55 million
The NPC reports directly to: Group of answer choices DOJ Supreme Court Congress Office of the President Office of the President
Which agencies are involved in cybercrime enforcement in the Philippines? Group of answer choices NBI Cybercrime Division DOJ – Office of Cybercrime Bureau of Immigration PNP Anti-Cybercrime Group NBI Cybercrime Division DOJ – Office of Cybercrime PNP Anti-Cybercrime Group
Which law protects intellectual property rights, including software and databases? Group of answer choices RA 9995 RA 8293 RA 8792 RA 4200 RA 8293
Which law directly addresses identity theft? Group of answer choices RA 8293 RA 10175 RA 4200 RA 9995 RA 10175
A company transfers Filipino customer data to a foreign server without ensuring equivalent protection. This is a compliance issue under RA 10173. Group of answer choices False True True
A government agency mandates all employees to use certified digital signatures for internal communication. This aligns with E.O. 810. Group of answer choices False True True
Which are security measures recommended under RA 10173? Group of answer choices Encryption of sensitive data Access controls Regular security audits Ignoring breach notifications Encryption of sensitive data Access controls Regular security audits
Which type of data requires stricter protection under RA 10173? Group of answer choices Website cookies Sensitive personal information Employee ID number Publicly posted contact details Sensitive personal information
Under RA 10175, system interference refers to: Group of answer choices Encrypting your own data Disrupting or destroying a computer system Viewing a profile without consent Posting on social media Disrupting or destroying a computer system
Which Philippine agency investigates cybercrime complaints? Group of answer choices PNP Anti-Cybercrime Group (PNP-ACG) NPC BSP IPOPHL PNP Anti-Cybercrime Group (PNP-ACG)
What is the penalty for illegal access to critical infrastructure under RA 10175? Group of answer choices ₱50K fine 6 months imprisonment NPC administrative fine only Reclusion temporal (12–20 years) Reclusion temporal (12–20 years)
A telecom company clearly informs customers about data collection purposes before signing a contract. This follows the principle of transparency under RA 10173. Group of answer choices True False True
Which is an example of a cross-border compliance challenge? Group of answer choices Encrypting internal files Hiring a local DPO Deleting expired records Transferring Filipino personal data to servers abroad Transferring Filipino personal data to servers abroad
Which law required government websites to migrate to secure hosting? Group of answer choices RA 8792 E.O. 810 A.O. 39 RA 8293 A.O. 39
Which provisions extend privileged communication to electronic formats? Group of answer choices Lawyer–client communication Teacher–student communication Citizen–mayor communication Doctor–patient communication Lawyer–client communication Doctor–patient communication
Which are functions of the National Privacy Commission (NPC)? Group of answer choices Promote data privacy awareness Conduct banking regulation Investigate data breaches Issue compliance orders Promote data privacy awareness Investigate data breaches Issue compliance orders
A bank employee accidentally leaves printed client files on a bus. This is considered negligent access under RA 10173. Group of answer choices False True True
Which was the first successful conviction under RA 10175? Group of answer choices ATM skimming case DFA passport breach People vs. Sy COMELEC leak People vs. Sy
Which are common compliance challenges in the Philippines? Group of answer choices Cross-border transfer complexities Lack of awareness of privacy laws Overfunded privacy departments Limited resources among SMEs Cross-border transfer complexities Lack of awareness of privacy laws Limited resources among SMEs
A news outlet publishes the grades of students with names without consent. This is an authorized disclosure under RA 10173. Group of answer choices False True True
Created by: cinnamonbr34d
 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards