Awareness
Breach Management
Compliance
Key Roles
Security Measures
100

This refers to the right of data subjects to access their personal information under the Data Privacy Act of 2012.
A. Right to block or remove 

B. Right to access 

C. Right to data portability

B. Right to access 

100

The Data Privacy Act requires that personal information controllers and processors must implement measures to protect personal information against this, whether accidental or unlawful destruction, alteration, or disclosure. 

A. Data Breach 

B. Security Incident 

C. Personal Breach 

A. Data Breach 

100

This is the penalty for the unauthorized processing of personal information under the Data Privacy Act of 2012. 

A. Imprisonment of up to 5 years and fines not exceeding P1,000,000 

B. Imprisonment of up to 6 years and fines not exceeding P4,000,000 

C. Imprisonment of up to 6 years and fines not exceeding P1,000,000 

B. Imprisonment of up to 6 years and fines not exceeding P4,000,000 

100

This is the term used in the Data Privacy Act of 2012 to refer to an organization or individual that processes personal information on behalf of a personal information controller. 

A. Personal Information Processor 

B. National Privacy Commission 

C. Data Subjects 

A. Personal Information Processor 

100

A security measure that prevents unauthorized sharing of data by using password with multi-factor authentication. 

A. Organizational Measure 

B. Technical Security Measure 

C. Physical Measure 

B. Technical Security Measure 

200

This act in the Philippines protects individual personal information in information and communications systems. 

A. Data Privacy Act of 2012 

B. Data Privacy Law of 2012 

C. Data Privacy Commission of 2012 

A. Data Privacy Act of 2012 

200

What breach occurs when personal data is accessed or disclosed by an unauthorized individual or organization? 

A. Integrity Breach 

B. Availability Breach 

C. Confidentiality Breach 

C. Confidentiality Breach 

200

This is the term used in the Data Privacy Act of 2012 to refer to any information that identifies an individual, including but not limited to, a person's name and date of birth. 

A. Sensitive Information 

B. Personal Information 

C. Privileged Information 

B. Personal Information 

200

This is the term used in the Data Privacy Act of 2012 to refer to an individual whose sensitive, personal, or privileged information is processed. 

A. Personal Information Controller 

B. Data Protection Officer 

C. Data Subjects 

C. Data Subjects 

200

Which of the following is an example of physical security measure? 

A. Physical forms storage 

B. Data backup 

C. Regular employee training 

A. Physical forms storage 

300

Since when has Mynimo been registered with the National Privacy Commission? 

A. 2016 

B. 2023 

C. 2021 

A. 2016 

300

It's a broader term that includes any event that compromises the security of information systems. 

A. Security Incident 

B. Personal Breach

C. Data Breach 

A. Security Incident 

300

What is the first phase of the personal data life cycle under the Data Privacy Act of 2012? 

A. Storage 

B. Acquisition

C. Transfer

B. Acquisition

300

This independent body is responsible for administering and implementing the Data Privacy Act of 2012. 

A. Data Subjects 

B. National Privacy Commission

C. Personal Information Processor 

B. National Privacy Commission

300

A security measure that involves promoting awareness among employees by providing training on data protection and integrating data protection into their business practices. 

A. Physical measure 

B. Technical security measure 

C. Organizational measure

C. Organizational measure

400

What right under the Data Privacy Act of 2012 allows individuals to know whether their personal information has been processed? 

A. Right to block/remove 

B. Right to data portability 

C. Right to be informed

C. Right to be informed

400

All data breaches are security incidents, but not all security incidents are necessarily data breaches. 

A. TRUE

B. FALSE 

C. It depends 

A. TRUE

400

This is the term used in the Data Privacy Act for a document that describes the policies, measures, and procedures implemented by a personal information controller to ensure compliance with the Act. 

A. Disclosure Policy 

B. Data Access and Correction Policy 

C. Privacy Policy

C. Privacy Policy

400

Who is Pytera Inc.'s current Data Protection Officer?

Jessa Zairene Mondoñedo

400

A security measure that involves shredding of paper documents to dispose personal information. 

A. Technical Security Measure 

B. Physical Measure

C. Organizational Measure 

B. Physical Measure

500

Individuals can exercise this right if their personal data is inaccurate, incomplete, outdated, false,or unlawfully obtained. 

A. Right to correct 

B. Right to block/remove

C. Right to access 

B. Right to block/remove

500

Which of the following can be a long-term consequence of data breach? 

A. Trust and confidence in the Company and Services 

B. Good reputation of the Company 

C. Loss of business

C. Loss of business

500

Personal information can be sensitive personal information, too. 

A. TRUE

B. FALSE 

C. It depends 

A. TRUE

500

In the context of Data Privacy Act of 2012, what is the role of HR partners regarding the forwarding of employee's personal information to other departments for processing? 

A. Personal Information Controller

B. Personal Information Processor 

C. Data Subjects 

A. Personal Information Controller

500

What's our main role as Pytera Inc.'s employee to ensure that the data we handle is secured? 

A. To comply with the Data Privacy Act of 2012

B. To protect the privacy of Mynimo.com 

C. To foster a culture that values privacy through awareness 

A. To comply with the Data Privacy Act of 2012