“The Importance of Data Privacy for Travel Agencies: Protecting Your Customers’ Personal Information”

Data privacy is a crucial issue for businesses in the Philippines, including travel agencies. For travel agencies, data privacy is important because they collect and process a significant amount of personal data from their customers, including names, addresses, email addresses, phone numbers, and payment information. In some cases, they may also collect sensitive data suchContinue reading ““The Importance of Data Privacy for Travel Agencies: Protecting Your Customers’ Personal Information””

Privacy Pitfalls: Why You Should be Wary of Sharing Personal Information in Surveys

As consumers, it is not uncommon to encounter businesses that solicit feedback on their products and services. However, many of these surveys require respondents to provide personal information such as their name, email address, and phone number. It is important to consider the safety of this information and to question the necessity of providing it.Continue reading “Privacy Pitfalls: Why You Should be Wary of Sharing Personal Information in Surveys”

Privacy Matters: Understanding Data Privacy in the Philippines

The Data Privacy Act of 2012 is a law in the Philippines that aims to protect the privacy of individuals with respect to their personal data in information and communications systems. The law sets out rules for the collection, use, storage, and processing of personal data by both government and private entities. Some of theContinue reading “Privacy Matters: Understanding Data Privacy in the Philippines”

The Privacy Impact of Social Media Platform on Our Lives

Social media has become an integral part of our lives, and its impact on society cannot be overstated. It has transformed the way we communicate, share information, and connect with each other. With billions of users worldwide, social media platforms have the power to influence opinions, shape public discourse, and even mobilize people to action.Continue reading “The Privacy Impact of Social Media Platform on Our Lives”

What information can you divulge during a job interview?

Even while every job application is unique, in order to successfully complete the application, you’ll need to gather a variety of personal information. This contains information about your professional background, academic background, and current contact details. Here are some tips that you may provide in a job interview: Only Share Data That Is Relevant: You wantContinue reading “What information can you divulge during a job interview?”

How can you stop hackers from accessing your data through inactive devices?

When an individual stops using a product, they typically just discard it, sell it online, or abandon their gadget. However, there is no guarantee that data on destroyed devices can no longer be recovered. Some business owners, in particular, who are tech savvy, can still recover data from abandoned or destroyed devices. From this pointContinue reading “How can you stop hackers from accessing your data through inactive devices?”

Good Tips for Data Protection in Online Dating!

The majority of single people dream of finding true love. Nevertheless, they jumped at the chance on using online dating apps to meet “THE ONE”. Some individuals are fortunate while some are not. But is it safe for us to utilize this online app? Here are a few pointers that can help us stay safeContinue reading “Good Tips for Data Protection in Online Dating!”

How to Protect your Online Game Account from Hackers.

Nowadays, not just geeks play video games. The number of individuals that play games globally has made the gaming business one of the sectors with the quickest rate of growth on earth. This is due to the variety of platforms that are available, ranging from personal computers and gaming consoles to handhelds, smartphones, and tablets.Continue reading “How to Protect your Online Game Account from Hackers.”

Protecting your credit card information.

As our generation advances, so do our means of meeting our basic needs. One is how we purchase items, whether it be from a store or online. The majority of consumers pay with credit cards or electronic funds transfers. Credit card companies enforce the Payment Card Industry Data Security Standard (PCI DSS) to ensure retailersContinue reading “Protecting your credit card information.”


The usage of closed-circuit television (CCTV) nowadays became even more prevalent in the world of technology. Installing CCTVs aids in identifying future anomalies, provides people with the feeling of safety, and gives a long-term cost-effective solution to privacy and security concerns. CCTVs are tools which support safety and security of personal information controllers (PICs) andContinue reading “CCTV AND DATA PRIVACY”

School Children and Online Classes

School season is already starting. With the ‘new normal’ in place, there would be no physical classes, only online classes. That being said, there is a need for children to create their own accounts in whatever platform the school and teacher uses to facilitate learning. There is all the more reason to teach online privacyContinue reading “School Children and Online Classes”

Top 5 Facebook Privacy Tips and Tricks

Social media are websites and applications that enable users to create posts, share content, and even participate in social networking. It facilitates the sharing of content quickly, effectively, and in-real time. One of the most well-known social media platforms that we have is Facebook. Facebook builds technologies that give people the power to connect withContinue reading “Top 5 Facebook Privacy Tips and Tricks”

Understanding App Permissions

Permissions are the activities that the app can perform on your phone or device. These include access to your calendar, camera, contacts, microphone, phone, and even your location. The permissions asked by apps vary depending on the purpose where the data collected are to be used.  The following are some common app permissions as describedContinue reading “Understanding App Permissions”

True End-to-End Encryption

With the current situation of accounts being hacked and other poser accounts popping up, I decided to change my password for the better. As I was changing my password to further secure my many many, truly, may accounts. I’ve come across one platform I used which offers true end-to-end encryption (E2EE). First, what is E2EE?Continue reading “True End-to-End Encryption”

Data Protection v. Data Privacy

Understanding the term itself is the first step in order to be able to fully grasp its concept and how it is applied. Data Protection and Data Privacy, being synonymous to each other, are always most likely to be interchanged. However, no matter how interconnected these both are, the two have different meanings and applicationsContinue reading “Data Protection v. Data Privacy”

Tips for DPOs when Discussing Data Privacy

One of the functions of a Data Protection Officer (DPO) is to inform and cultivate awareness on privacy and data protection within the organization of the Personal Information Controller (PIC) or Personal Information Processor (PIP), including all relevant laws, rules and regulations and issuances of the National Privacy Commission (NPC).  Such task is not asContinue reading “Tips for DPOs when Discussing Data Privacy”

Creating a “Private Set-Up”

Nowadays, majority of people have access to the internet. The window to the world wide web, physically is our gadgets (be it our mobile devices, laptops or computers). But digitally, in order to access information in the internet, you most likely need a browser. Have you ever given a thought about the browser you use?Continue reading “Creating a “Private Set-Up””

Privacy and Personalization

In this day and age, in order to get the best out of the integration and connectivity of our laptop and mobile gadgets like cellphone and tablets, we opt to use one account to be used on all our gadgets. This facilitates easy access to our data stored in these accounts. An example of thisContinue reading “Privacy and Personalization”

Nothing to do During Community Quarantine?

So, you’ve already stocked up on food and supplies, made sure that everything is in order for the home quarantine period, and have no important pressing matters to attend to. What else can you do aside from aimlessly surfing the web? For those looking to pass the time during this home quarantine period, here areContinue reading “Nothing to do During Community Quarantine?”

5 Privacy Tips while Working from Home

In the Philippines, Republic Act No. 11165 was enacted by Congress to institutionalize telecommuting as an alternative work arrangement for employees in the private sector. “Telecommuting” refers to a work from an alternative workplace with the use of telecommunications and/or computer technologies. Said work arrangement may be offered by an employer in the private sectorContinue reading “5 Privacy Tips while Working from Home”