This refers to the right of data subjects to access their personal information under the Data Privacy Act of 2012.
A. Right to block or remove
B. Right to access
C. Right to data portability
B. Right to access
The Data Privacy Act requires that personal information controllers and processors must implement measures to protect personal information against this, whether accidental or unlawful destruction, alteration, or disclosure.
A. Data Breach
B. Security Incident
C. Personal Breach
A. Data Breach
This is the penalty for the unauthorized processing of personal information under the Data Privacy Act of 2012.
A. Imprisonment of up to 5 years and fines not exceeding P1,000,000
B. Imprisonment of up to 6 years and fines not exceeding P4,000,000
C. Imprisonment of up to 6 years and fines not exceeding P1,000,000
B. Imprisonment of up to 6 years and fines not exceeding P4,000,000
This is the term used in the Data Privacy Act of 2012 to refer to an organization or individual that processes personal information on behalf of a personal information controller.
A. Personal Information Processor
B. National Privacy Commission
C. Data Subjects
A. Personal Information Processor
A security measure that prevents unauthorized sharing of data by using password with multi-factor authentication.
A. Organizational Measure
B. Technical Security Measure
C. Physical Measure
B. Technical Security Measure
This act in the Philippines protects individual personal information in information and communications systems.
A. Data Privacy Act of 2012
B. Data Privacy Law of 2012
C. Data Privacy Commission of 2012
A. Data Privacy Act of 2012
What breach occurs when personal data is accessed or disclosed by an unauthorized individual or organization?
A. Integrity Breach
B. Availability Breach
C. Confidentiality Breach
C. Confidentiality Breach
This is the term used in the Data Privacy Act of 2012 to refer to any information that identifies an individual, including but not limited to, a person's name and date of birth.
A. Sensitive Information
B. Personal Information
C. Privileged Information
B. Personal Information
This is the term used in the Data Privacy Act of 2012 to refer to an individual whose sensitive, personal, or privileged information is processed.
A. Personal Information Controller
B. Data Protection Officer
C. Data Subjects
C. Data Subjects
Which of the following is an example of physical security measure?
A. Physical forms storage
B. Data backup
C. Regular employee training
A. Physical forms storage
Since when has Mynimo been registered with the National Privacy Commission?
A. 2016
B. 2023
C. 2021
A. 2016
It's a broader term that includes any event that compromises the security of information systems.
A. Security Incident
B. Personal Breach
C. Data Breach
A. Security Incident
What is the first phase of the personal data life cycle under the Data Privacy Act of 2012?
A. Storage
B. Acquisition
C. Transfer
B. Acquisition
This independent body is responsible for administering and implementing the Data Privacy Act of 2012.
A. Data Subjects
B. National Privacy Commission
C. Personal Information Processor
B. National Privacy Commission
A security measure that involves promoting awareness among employees by providing training on data protection and integrating data protection into their business practices.
A. Physical measure
B. Technical security measure
C. Organizational measure
C. Organizational measure
What right under the Data Privacy Act of 2012 allows individuals to know whether their personal information has been processed?
A. Right to block/remove
B. Right to data portability
C. Right to be informed
C. Right to be informed
All data breaches are security incidents, but not all security incidents are necessarily data breaches.
A. TRUE
B. FALSE
C. It depends
A. TRUE
This is the term used in the Data Privacy Act for a document that describes the policies, measures, and procedures implemented by a personal information controller to ensure compliance with the Act.
A. Disclosure Policy
B. Data Access and Correction Policy
C. Privacy Policy
C. Privacy Policy
Who is Pytera Inc.'s current Data Protection Officer?
Jessa Zairene Mondoñedo
A security measure that involves shredding of paper documents to dispose personal information.
A. Technical Security Measure
B. Physical Measure
C. Organizational Measure
B. Physical Measure
Individuals can exercise this right if their personal data is inaccurate, incomplete, outdated, false,or unlawfully obtained.
A. Right to correct
B. Right to block/remove
C. Right to access
B. Right to block/remove
Which of the following can be a long-term consequence of data breach?
A. Trust and confidence in the Company and Services
B. Good reputation of the Company
C. Loss of business
C. Loss of business
Personal information can be sensitive personal information, too.
A. TRUE
B. FALSE
C. It depends
A. TRUE
In the context of Data Privacy Act of 2012, what is the role of HR partners regarding the forwarding of employee's personal information to other departments for processing?
A. Personal Information Controller
B. Personal Information Processor
C. Data Subjects
A. Personal Information Controller
What's our main role as Pytera Inc.'s employee to ensure that the data we handle is secured?
A. To comply with the Data Privacy Act of 2012
B. To protect the privacy of Mynimo.com
C. To foster a culture that values privacy through awareness
A. To comply with the Data Privacy Act of 2012