Lesson 4 Data Protection
Lesson 4 Data Protection
➢ Data Privacy Act of 2012 (Philippines) – Establishes regulations for data collection, processing,
and security in the Philippines. The implementing agency for this law is the National Privacy
Commission (NPC).
➢ Health Insurance Portability and Accountability Act (HIPAA) – A U.S. law that protects sensitive
patient health information. The regulating agency for HIPAA is the U.S. Department of Health
and Human Services (HHS).
➢ The California Consumer Privacy Act (CCPA) is a data privacy law that protects the personal
information of California residents. It gives consumers more control over how businesses collect,
store, and share their data. It is regulated by the California Attorney General.
4. Data Portability – Users should have access to their data and be able to transfer it easily.
5. Accountability and Transparency – Organizations must be accountable for how they manage
personal data and inform users about their data practices.
1. Accountability
It refers to the obligation of organizations to be responsible for and demonstrate
compliance with data protection laws and principles.
2. Transparency
It means that organizations must be clear and open with individuals about how their
personal data is being collected, used, stored, and shared.
• Asymmetric encryption is a type of encryption that uses two keys: public key which is used for
encryption (can be shared openly), private key which is used for decryption (kept secret by the
owner). The two keys are mathematically linked but cannot be easily derived from one another.
This makes asymmetric encryption highly secure for communication and authentication.
• End-to-End Encryption (E2EE) – Ensures that only the communicating users can read the
messages.
• Homomorphic Encryption – Allows computations to be performed on encrypted data without
decrypting it.
• Digital Signatures – Authenticate the sender and ensure message integrity. It is a cryptographic
technique used to verify the authenticity, integrity, and non-repudiation of digital messages or
documents. It acts as an electronic equivalent of a handwritten signature or stamped seal but is
much more secure.
• Error-Detection Codes – Identifies and corrects errors in data transmission. It is used in digital
communication systems to detect errors that may occur during data transmission or storage.
These codes introduce redundancy to the original data, allowing the system to check for the
integrity of the received or stored data.
• Recovery Point Objective (RPO) – The maximum tolerable data loss in case of failure. It is a key
metric used in disaster recovery and business continuity planning. It defines the maximum
acceptable amount of data loss an organization can tolerate in the event of a system disruption
or failure. In other words, RPO represents the point in time to which data must be restored after
a disaster or interruption to ensure minimal impact on business operations.
• Business Continuity Planning (BCP) – Ensures operations can continue during a disaster.
It is a critical element of Disaster Recovery Planning (DRP). While both BCP and DRP focus on
minimizing the impact of disruptions and ensuring the organization can resume normal
operations, BCP takes a broader, more comprehensive approach, addressing how the business
will continue to function during and after a disaster, while DRP focuses more specifically on
recovering IT systems and data.
References;
OpenAI. (2025). ChatGPT (Mar 14 version) [Large language model]. https://chat.openai.com/chat
Perplexity AI. (2025). How to reference an AI assistant. Perplexity AI https://www.perplexity.ai/.