0% found this document useful (0 votes)
60 views2 pages

Big Data Assignment

The Data Privacy Act of 2012 was created to safeguard confidential information in public and private sector networks. The National Privacy Commission monitors compliance and addresses the use of sensitive personal information with individuals' consent required before handling personal data. Big data is a huge and expanding mass of data that traditional systems cannot effectively store or process due to its size and complexity. It is characterized by volume, variety, velocity, variability, value, veracity, and validity. Examples include healthcare records, government information, and customer data.

Uploaded by

Angel Merillo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
60 views2 pages

Big Data Assignment

The Data Privacy Act of 2012 was created to safeguard confidential information in public and private sector networks. The National Privacy Commission monitors compliance and addresses the use of sensitive personal information with individuals' consent required before handling personal data. Big data is a huge and expanding mass of data that traditional systems cannot effectively store or process due to its size and complexity. It is characterized by volume, variety, velocity, variability, value, veracity, and validity. Examples include healthcare records, government information, and customer data.

Uploaded by

Angel Merillo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Data Privacy Act of 2012

The Data Privacy Act of 2012 (DPA) was created to safeguard confidential info in both public
and private sector communications and data networks. Monitoring compliance is the duty of the
National Privacy Commission (NPC), which was established under the DPA. It addresses the
use of sensitive personal information as well as general confidential information, and its
fundamental tenet is that a data subject must directly consent before personal information
handling is permitted.

Big Data

Big Data is a mass of data that is enormous in amount and is always expanding tremendously.
No typical data management systems can effectively store or process this data because of its
magnitude and complexity. Big data is a type of data that is extremely large.

Characteristics of Big Data

● Volume - This refers to how huge the amount of data is. This can be measured through
Gigabytes, Zettabytes, and Yotabytes
● Variety - This refers to types of data and which source it is coming from.
● Velocity - .This refers to how fast data comes in.
● Variability - This refers to the lack of consistency of data, which greatly affects the proper
handling of data.
● Value - This refers to how important the data obtained for a certain business or
organization is.
● Veracity - This refers to the correctness of data.
● Validity - This refers to how relevant the data is and if it matches the initial purpose of
why it is being obtained.

Examples of Big Data

● Healthcare - medical Records


● Government entities - personal information, contributions made, and loans infomation
● Marketing - customer information and behavior

How much do I value my private information and what steps do I take to protect it?

I place a high emphasis on my privacy. I'm being as cautious as I can with what I share. I
always have a tendency to question the purpose of requests for too much information. I verify
the security of websites before entering them. I can tell a website is secure if its URL begins
with "https". To keep my computer's data secure, I also install some anti-virus software. In terms
of social media usage, I also prefer not to reveal too much. I'm in the habit of keeping my entire
name, address, phone number, and email private. Also, I avoid using any public wifi networks
because some hackers utilize them to access users' devices. Even when an email is from
someone I know, I do not readily click on links in emails. To find any discrepancies, I first verify
the sender's email address and each piece of material. I also make very secure passwords for
my government and social media accounts. It always has a mix of uppercase and lower case
letters, numbers, and special characters. In that way, it would be difficult for anybody who tried
to acquire access to guess or even memorize it.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy