13 Handout 1
13 Handout 1
reference to criteria relating to individuals, in such a way that specific information relating to a
particular person is readily accessible.
3. Information and Communications System – This refers to a system for generating, sending,
receiving, storing, or processing electronic data messages or electronic documents and includes the
computer system or other similar device by or which data is recorded, transmitted, or stored and
any procedure related to the recording, transmission or storage of electronic data, electronic
message, or electronic document.
4. Personal information – This refers to any information whether recorded in a material form or not,
from which the identity of an individual is apparent or can be reasonably and directly ascertained by
the entity holding the information, or when put together with other information would directly and
certainly identify an individual.
5. Personal information controller – This refers to a person or organization who controls the
collection, holding, processing or use of personal information, including a person or organization
who instructs another person or organization to collect, hold, process, use, transfer, or disclose
personal information on his/her behalf. The term excludes:
a. A person or organization who performs such functions as instructed by another person or
organization; and
b. An individual who collects, holds, processes, or uses personal information in connection with the
individual’s personal, family, or household affairs.
HAYAHAY 6. Personal information processor – It refers to any natural or juridical person qualified to act as such
under the DPA to whom a personal information controller may outsource the processing of personal
data pertaining to a data subject.
7. Processing – It refers to any operation or any set of operations performed upon personal
information including, but not limited to, the collection, recording, organization, storage, updating or
modification, retrieval, consultation, use, consolidation, blocking, erasure or destruction of data.
8. Privileged information – It refers to all forms of data which under the Rules of Court and other
pertinent laws constitute privileged communication.
9. Sensitive personal information refers to personal information:
a. About an individual’s race, ethnic origin, marital status, age, color, and religious, philosophical or
political affiliations;
b. About an individual’s health, education, genetic or sexual life of a person, or to any proceeding
for any offense committed or alleged to have been committed by such person, the disposal of
such proceedings, or the sentence of any court in such proceedings;
c. Issued by government agencies peculiar to an individual which includes, but not limited to, social
security numbers, previous or current health records, licenses or its denials, suspension or
revocation, and tax returns; and
d. Specifically established by an executive order or an act of Congress to be kept classified.
Note: Processing of sensitive personal information and privileged information are generally
prohibited.
6. The processing is necessary for the purposes of the legitimate interests pursued by the personal
information controller or by a third party or parties to whom the data is disclosed, except where such
interests are overridden by fundamental rights and freedoms of the data subject which require
protection under the Philippine Constitution.
5. The employees, agents, or representatives of a personal information controller who are involved in the
processing of personal information shall operate and hold personal information under strict
confidentiality if the personal information are not intended for public disclosure. This obligation shall
continue even after leaving the public service, transfer to another position or upon termination of
employment or contractual relations.
6. The personal information controller shall promptly notify the Commission and affected data subjects
when sensitive personal information or other information that may, under the circumstances, be used to
enable identity fraud are reasonably believed to have been acquired by an unauthorized person, and the
personal information controller or the Commission believes that such unauthorized acquisition is likely
to give rise to a real risk of serious harm to any affected data subject. The notification shall at least
describe the nature of the breach, the sensitive personal information possibly involved, and the
measures taken by the entity to address the breach. Notification may be delayed only to the extent
necessary to determine the scope of the breach, to prevent further disclosures, or to restore reasonable
integrity to the information and communications system.
a. In evaluating if notification is unwarranted, the Commission may take into account compliance by
the personal information controller with this section and existence of good faith in the acquisition of
personal information.
b. The Commission may exempt a personal information controller from notification where, in its
reasonable judgment, such notification would not be in the public interest or in the interests of the
affected data subjects.
The Commission may authorize postponement of notification where it may hinder the progress of a
criminal investigation related to a serious breach.
Where appropriate, personal information controllers and personal information processors shall adopt and
establish technical security measures such as the following:
Encryption of personal data during storage and while in transit, authentication process, and
other technical security measures that control and limit access;
The ability to ensure and maintain the confidentiality, integrity, availability, and resilience of
their processing systems and services (e.g., using strong passwords);
When it comes to sharing data, a security policy with respect to the processing of personal data;
A process for regularly testing, assessing, and evaluating the effectiveness of security measures
for system maintenance;
Backups, which is the ability to restore the availability and access to personal data on time in the
event of a physical or technical incident; and
When it comes to access control, there must be safeguards to protect their computer network
against accidental, unlawful or unauthorized usage, any interference which will affect data
integrity or hinder the functioning or availability of the system, and unauthorized access through
an electronic network.
MORALES
When it comes to organizational security measures:
Secure office storage – Design of office space and work stations, including the physical
arrangement of furniture and equipment, shall provide privacy to anyone processing personal
data, taking into consideration the environment and accessibility to the public.
For removable devices, identifying marks can be placed and for hardcopy information, ‘locked
print’ feature can be enabled to ensure privacy when printing confidential documents on the
machine over a shared network. When using this, the document cannot be printed without
entering a password on the computer.
Building access control – Policies and procedures shall be implemented to monitor and limit
access to and activities in the room, workstation or facility, including guidelines that specify the
proper use of and access to electronic media. There can also be closed-circuit television (CCTV)
to secure the premises.
Secure disposal – Any natural or juridical person or other body involved in the processing of
personal data shall implement policies and procedures regarding the transfer, removal, disposal,
and reuse of electronic media, to ensure appropriate protection of personal data.
Remote working – Policies and procedures that prevent the mechanical destruction of files and
equipment shall be established. Hardcopies and devices must be secured when in transit.
Policies, procedures, guidance, and training must be clearly communicated, readily accessible,
and understood to eliminate ambiguities.
Personnel in charge of human resource management shall be responsible for selecting and
supervising its employees, agents, or representatives, particularly those who will have access to
personal data. The said employees, agents, or representatives shall operate and hold personal
data under strict confidentiality if the personal data are not intended for public disclosure.
Procurement – The personal information controller, through appropriate contractual
agreements, shall ensure that its personal information processors, where applicable, shall also
implement the security measures required by the Act and these Rules. It shall only engage those
personal information processors that provide sufficient guarantees to implement appropriate
security measures.
Other security measures include:
Shredding all confidential waste;
Using strong passwords;
Installing a firewall and virus checker on your computers;
Encrypting any personal information held electronically;
Disabling any ‘auto-complete’ settings;
Keeping devices under lock and key when not in use;
Holding telephone calls in private areas;
Not leaving papers and devices lying around;
Checking the security of storage systems;
Using anti-climb paint on exterior walls and drains;
Using CCTV cameras to monitor your office space; and
Installing an alarm system.
Right to object – The data subject shall have the right to object to the processing of his/her personal
data, including processing for direct marketing, automated processing, or profiling. The data subject
shall also be notified and allowed to withhold consent to the processing in case of changes or any
amendment to the information supplied or declared to the data subject.
Right to erasure or blocking – The data subject shall have the right to suspend, withdraw, or order
the blocking, removal, or destruction of his/her personal data from the personal information
controller’s filing system.
Right to damages – The data subject has the right to claim compensation if he/she suffered damages
due to inaccurate, incomplete, outdated, false, unlawfully obtained, or unauthorized use of personal
data, considering any violation of his/her rights and freedoms as data subject.
Right to file a complaint - If the data subject feels his/her personal information has been misused,
maliciously disclosed, or improperly disposed, or that any of his/her data privacy rights have been
violated, he/she have a right to file a complaint with the NPC.
NOROMOR T. Right to rectification – The data subject has the right to dispute the inaccuracy or error in the
personal data and have the personal information controller correct it immediately and accordingly,
unless the request is vexatious or otherwise unreasonable. If the personal data has been corrected,
the personal information controller shall ensure the accessibility of both the new and the retracted
information and the simultaneous receipt of the new and the retracted information by the intended
recipients thereof.
Right to data portability – Where his/her personal data is processed by electronic means and in a
structured and commonly used format, the data subject shall have the right to obtain from the
personal information controller a copy of such data in an electronic or structured format that is
commonly used and allows for further use by the data subject.
The head of each government agency or instrumentality shall be responsible for complying with the security
requirements mentioned herein while the Commission shall monitor the compliance and may recommend
the necessary action in order to satisfy the minimum standards (Section 22).
Penalties
1. Unauthorized Processing of Personal Information and Sensitive Personal Information (Section 25)
This shall be imposed on persons who process personal information without the consent of the data
subject, or without being authorized under the DPA or any existing law.
a. The unauthorized processing of personal information shall be penalized by:
i. Imprisonment ranging from one (1) year to three (3) years; and
ii. A fine of not less than Php500,000 but not more than P2,000,000.
b. The unauthorized processing of personal sensitive information shall be penalized by:
i. Imprisonment ranging from three (3) years to six (6) years; and
ii. A fine of not less than P500,000 but not more than P4,000,000.
2. Accessing Personal Information and Sensitive Personal Information Due to Negligence (Section 26)
This shall be imposed on persons who, due to negligence, provided access to personal information
without being authorized under the DPA or any existing law.
a. Accessing personal information due to negligence shall be penalized by:
i. Imprisonment ranging from one (1) year to three (3) years; and
ii. A fine of not less than P500,000 but not more than P2,000,000.
b. Accessing sensitive personal information due to negligence shall be penalized by:
i. Imprisonment ranging from three (3) years to six (6) years; and
ii. A fine of not less than P500,000 but not more than P4,000,000.
3. Improper Disposal of Personal Information and Sensitive Personal Information (Section 27)
This shall be imposed on persons who knowingly or negligently dispose, discard, or abandon the
personal information of an individual in an area accessible to the public or has otherwise placed the
personal information of an individual in its container for trash collection.
a. The improper disposal of personal information shall be penalized by:
i. Imprisonment ranging from six (6) months to two (2) years; and
ii. A fine of not less than P100,000 but not more than P500,000.
b. The improper disposal of sensitive personal information shall be penalized by:
i. Imprisonment ranging from one (1) year to three (3) years; and
ii. A fine of not less than P100,000 but not more than P1,000,000.
4. Processing of Personal Information and Sensitive Personal Information for Unauthorized Purposes
(Section 28)
This shall be imposed on persons processing sensitive personal information for purposes not authorized
by the data subject, or otherwise authorized under the DPA or under existing laws.
a. The processing of personal information for unauthorized purposes shall be penalized by:
i. Imprisonment ranging from one (1) year and six (6) months to five (5) years; and
ii. A fine of not less than P500,000 but not more than P1,000,000.
b. The processing of sensitive personal information for unauthorized purposes shall be penalized by
imprisonment ranging from two (2) years to seven (7) years and a fine of not less than P500,000 but
not more than P2,000,000.
References
Congress of the Philippines. (n.d.). Republic Act 10173: Data Privacy Act of 2012. Retrieved March 8, 2019, from National Privacy Commission:
https://www.privacy.gov.ph/data-privacy-act
Lansigan, D. R. (n.d.). Primer on the Data Privacy Act (DPA) of 2012. Retrieved March 8, 2019, from Association of College and University Registrars &
Liaison Officers (ACURLO): http://acurlo.uphsl.edu.ph/wp-content/uploads/2016/06/DATA-PRIVACY-ACT-OF-2012-1.pptx
National Privacy Commission. (n.d.). Implementing Rules and Regulations of the Data Privacy Act of 2012. Retrieved March 8, 2019, from National
Privacy Commssion: https://www.privacy.gov.ph/implementing-rules-and-regulations-of-republic-act-no-10173-known-as-the-data-
privacy-act-of-2012