Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Chapter 1
ahead of everything by getting data from people at large. Data mining have
been the practice of not only the Government offices who ask people a lot of
countries people are all too aware of how surveillance affects them. Not only
in London and New York but also in New Delhi, Shanghai and Rio de Janeiro
video cameras are a familiar sight in public places. Travelers through airports
everywhere are conscious that they not only have to negotiate twentieth-
century passport control but also newer devices such as body scanners and
biometric checks that have proliferated since 9/11. And if these have to do
regimes we may acquire some sense of the scope of this phenomenon but
will we understand it? Certainly, getting an idea of the magnitude and rapid
appreciated for what it is, and discovering just whose life chances and
All we know so far about how surveillance how it is done and who is behind
is all thanks to one man. Edward Snowden, a 31 year old US citizen, former
revealed provided a vital public window into the NSA and its international
2
intelligence partners secret mass surveillance programs and capabilities.
issue.
and its partners including the UK, Israeli and German spy agencies are
for counterterrorism purposes, the NSA and its partners carried out political
the collection of phone and email data from Brazils Ministry of Mines and
3 Retrieved from Devereaux, D., Greenwald, G., & Poitras, L. (2014, May 19). Data
Pirates of the Caribbean: The NSA Is Recording Every Cell Phone Call in the
Bahamas. The Intercept. https://firstlook.org/ theintercept/article/2014/05/19/data-
pirates-caribbean-nsarecording-every-cell-phone-call-bahamas
3
FACEBOOK AND THE PHILIPPINES EXPERIENCE
In the advent of Facebook the most popular social networking site (SNS). A
new form of surveillance is created. SNS are typical applications which are
known as Web 2.0 this are web based platforms that integrate different
people.(Fuchs 2009)
Web 2.0 surveillance is the most popular form of data surveillance in the
by its netizens on social media through mobile and landline networks and is
Sociologist all over the globe have seen this phenomenon as living in the
Surveillance Societies (Lyon, 1994) and that the era only found in the
novel of George Orwell the Big Brother phenomenon is now upon us.
Legal Background
In the Philippines the advent of Terrorism, the post 9/11, gives rise to a
4
Figure 1.1 NSA Surveillance
On 6 March 2007, the Human Security Act (HSA) was signed into law by
allows law enforcement agencies to listen to, intercept and record, with the
equipment or intercepting and tracking devices, or with the use of any other
suitable ways and means for that purpose, any communication, message,
5
of being terrorists.4 Five years later, the Cybercrime Prevention Act of 2012
(CPA 2012) was signed by current President Aquino. Section 12 of the law
2014, the Supreme Court struck down this section of the CPA 2012 and
month before CPA 2012 was put into law, Aquino signed the Data Privacy Act
of 2012 (DPA 2012). This law defined the rights of a data subject as well
there are no specific provisions on surveillance per se, the rights given to
data subjects and prohibited acts are added safeguards against any kind of
5 Ibid.
6
Such legislation only put forward a surveillance/privacy dichotomy without a
Having laid down such premise the researcher wants to argue that the Rule of
In this paper I would argue that Orwellian society exist because we limit our
In the end I wish to argue that the answer to the problem of dichotomy is by
How are the concept of privacy and surveillance seen in the Philippines in the
legal literature?
What are the specific provision of the Data Privacy Act which promotes legal
privacy?
What are the legal effects of the Humans security in the surveillance/privacy
dichotomy?
7
III. SIGNIFICANCE OF THE STUDY
In our times that all action involves the production and utilization of data. It
8
V. SCOPE AND LIMITATION OF THE STUDY
This paper would focus mainly on the existing literature on Human Security
Philippines by analyzing the provision of the Human Security act vis a vis the
The researcher also wish to interview the newly created Philippine Privacy
this paper.
In this paper the researcher wish to utilize the working definition of the
9
2. Data mining a practice of examining large databases in order to
processed.
6. Data Surveillance any act interfering, intercepting, and recording of
electronic document.
8. Personal information refers to any information whether recorded in a
10
direction that the state exercises over the day-to-day conduct of
individual lives.
Chapter 2
Review of Related Literature
Chapter 3
Methodology
social values and ethos. Most of the times, law also attempts to mold
11
and emerging legislative policies, laws, their social relevance and
efficacy6
Law does not operate in a vacuum. It has to reflect social values,
processes. Law also influences other parts of the social system. Law,
analytical.
Descriptive in a sense that it will describe the state of affairs as it
the researcher will use the description or the status quo of the
12
extent document particularly legal documents and cases in the
order. After such case study have been done and a thematic content
and the Foundation for Media Alternatives to see form the grass roots
13