Creating A Privacy Manual
Creating A Privacy Manual
In Partial Fulfillment
of the Requirements for the Course in
Information Assurance and Security
BSIT _____
March 2024
Pamantasan ng Lungsod ng Valenzuela
Tongco St. Maysan, Valenzuela City
College of Engineering and Information Technology
Background
Republic Act No. 10173, also known as the Data Privacy Act of 2012 (DPA), aims to protect
personal data in information and communications systems both in the government and the
private sector.
It ensures that entities or organizations processing personal data establish policies, and
implement measures and procedures that guarantee the safety and security of personal data
under their control or custody, thereby upholding an individual’s data privacy rights. A
personal information controller or personal information processor is instructed to implement
reasonable and appropriate measures to protect personal data against natural dangers such as
accidental loss or destruction, and human dangers such as unlawful access, fraudulent misuse,
unlawful destruction, alteration and contamination.
To inform its personnel of such measures, each personal information controller or personal
information processor is expected to produce a Privacy Manual. The Manual serves as a
guide or handbook for ensuring the compliance of an organization or entity with the DPA, its
Implementing Rules and Regulations (IRR), and other relevant issuances of the National
Privacy Commission (NPC). It also encapsulates the privacy and data protection protocols
that need to be observed and carried out within the organization for specific circumstances
(e.g., from collection to destruction), directed toward the fulfillment and realization of the
rights of data subject.
Introduction
This section lays down the basis of the Manual. Hence, it should provide an overview of the
DPA, its IRR and other policies that relate to data protection and which are relevant issuances
to the industry or sector of the organization, as well as the transactions it regularly carries out.
In brief, it should discuss how the organization complies with the data privacy principles, and
upholds the rights of the data subjects, both of which are laid out in the DPA.
It is important that this portion impresses upon the user or reader why it is necessary for the
organization to have a Privacy Manual.
Example:
This Privacy Manual is hereby adopted in compliance with Republic Act No. 10173
or the Data Privacy Act of 2012 (DPA), its Implementing Rules and Regulations, and
other relevant policies, including issuances of the National Privacy Commission. This
organization respects and values your data privacy rights, and makes sure that all
personal data collected from you, our clients and customers, are processed in
adherence to the general principles of transparency, legitimate purpose, and
proportionality.
Pamantasan ng Lungsod ng Valenzuela
Tongco St. Maysan, Valenzuela City
College of Engineering and Information Technology
This Manual shall inform you of our data protection and security measures, and may
serve as your guide in exercising your rights under the DPA.
Definition of Terms
Terms used in the Manual must be defined for consistency and uniformity in usage. This
portion will make sure of that, and allow users of the Manual to understand the words,
statements, and concepts used in the document.
Examples:
This section defines the coverage of the Manual. Given that the document is essentially an
internal issuance and is meant for the use and application of the organization’s staff or
personnel, that fact should be emphasized here.
Note that it would be useful to develop a separate Privacy Manual meant for external use or
for persons who deal with the organization. Certain information may be omitted from that
version, particularly those that relate to internal policies or processes that are relevant only to
personnel of the organization.
Examples:
This section lays out the various data life cycles (or processing systems) in existence within
the organization—from the collection of personal data, to their actual use, storage or
retention, and destruction.
Example:
o This company collects the basic contact information of clients and customers,
including their full name, address, email address, contact number, together
with the products that they would like to purchase. The sales representative
attending to customers will collect such information through accomplished
order forms.
B. Use
Example:
Example:
o This company will ensure that personal data under its custody are protected
against any accidental or unlawful destruction, alteration and disclosure as
well as against any other unlawful processing. The company will implement
appropriate security measures in storing collected personal information,
depending on the nature of the information. All information gathered shall not
be retained for a period longer than one (1) year. After one (1) year, all hard
and soft copies of personal information shall be disposed and destroyed,
through secured means.
D. Access (e.g. personnel authorized to access personal data, purpose of access, mode of
access, request for amendment of personal data, etc.)
Example:
o Due to the sensitive and confidential nature of the personal data under the
custody of the company, only the client and the authorized representative of
the company shall be allowed to access such personal data, for any purpose,
except for those contrary to law, public policy, public order or morals.
Pamantasan ng Lungsod ng Valenzuela
Tongco St. Maysan, Valenzuela City
College of Engineering and Information Technology
E. Disclosure and Sharing (e.g. individuals to whom personal data is shared, disclosure
of policy and processes, outsourcing and subcontracting, etc.)
Example:
o All employees and personnel of the company shall maintain the confidentiality
and secrecy of all personal data that come to their knowledge and possession,
even after resignation, termination of contract, or other contractual relations.
Personal data under the custody of the company shall be disclosed only
pursuant to a lawful purpose, and to authorized recipients of such data.
Security Measures
Every personal information controller and personal information processor must also
consider the human aspect of data protection. The provisions under this section shall
include the following:
Example:
The designated Data Protection Officer is Mr. Juan Dela Cruz, who is
concurrently serving as the Executive Director of the organization.
2. Functions of the DPO, COP and/or any other responsible personnel with
similar functions
Example:
Example:
Example:
Example:
6. Duty of Confidentiality
Example:
Pamantasan ng Lungsod ng Valenzuela
Tongco St. Maysan, Valenzuela City
College of Engineering and Information Technology
Example:
This portion shall feature the procedures intended to monitor and limit access to the
facility containing the personal data, including the activities therein. It shall provide
for the actual design of the facility, the physical arrangement of equipment and
furniture, the permissible modes of transfer, and the schedule and means of retention
and disposal of data, among others. To ensure that mechanical destruction, tampering
and alteration of personal data under the custody of the organization are protected
from man-made disasters, power disturbances, external access, and other similar
threats, provisions like the following must be included in the Manual:
Example:
2. Storage type and location (e.g. filing cabinets, electronic storage system,
personal data room/separate room or part of an existing room)
Example:
Example:
Only authorized personnel shall be allowed inside the data room. For
this purpose, they shall each be given a duplicate of the key to the
room. Other personnel may be granted access to the room upon filing
of an access request form with the Data Protection Officer and the
latter’s approval thereof.
Example:
All personnel authorized to enter and access the data room or facility
must fill out and register with the online registration platform of the
organization, and a logbook placed at the entrance of the room. They
shall indicate the date, time, duration and purpose of each access.
Example:
Example:
Example:
Pamantasan ng Lungsod ng Valenzuela
Tongco St. Maysan, Valenzuela City
College of Engineering and Information Technology
Transfers of personal data via electronic mail shall use a secure email
facility with encryption of the data, including any or all attachments.
Facsimile technology shall not be used for transmitting documents
containing personal data.
Example:
The organization shall retain the personal data of a client for one (1)
year from the data of purchase. Upon expiration of such period, all
physical and electronic copies of the personal data shall be destroyed
and disposed of using secure technology.
Example:
Example:
Example:
Example:
Each personnel with access to personal data shall verify his or her
identity using a secure encrypted link and multi-level authentication.
Every personal information controller or personal information processor must develop and
implement policies and procedures for the management of a personal data breach, including
security incidents. This section must adequately describe or outline such policies and
procedures, including the following:
Example:
Example:
Pamantasan ng Lungsod ng Valenzuela
Tongco St. Maysan, Valenzuela City
College of Engineering and Information Technology
Example:
o The organization shall always maintain a backup file for all personal data
under its custody. In the event of a security incident or data breach, it shall
always compare the backup with the affected file to determine the presence of
any inconsistencies or alterations resulting from the incident or breach.
4. Notification protocol
Example:
o The Head of the Data Breach Response Team shall inform the management of
the need to notify the NPC and the data subjects affected by the incident or
breach within the period prescribed by law. Management may decide to
delegate the actual notification to the head of the Data Breach Response Team.
Example:
Every data subject has the right to reasonable access to his or her personal data being
processed by the personal information controller or personal information processor. Other
available rights include: (1) right to dispute the inaccuracy or error in the personal data; (2)
Pamantasan ng Lungsod ng Valenzuela
Tongco St. Maysan, Valenzuela City
College of Engineering and Information Technology
Example:
Data subjects may inquire or request for information regarding any matter relating to
the processing of their personal data under the custody of the organization, including
the data privacy and security policies implemented to ensure the protection of their
personal data. They may write to the organization at [email protected] and
briefly discuss the inquiry, together with their contact details for reference.
Effectivity
This section indicates the period of effectivity of the Manual, as well as any other document
that the organization may issue, and which has the effect of amending the provisions of the
Manual.
Example:
The provisions of this Manual are effective this __ day of _______, 2024, until
revoked or amended by this company, through a Board Resolution.
Annexes
This section indicates the period of effectivity of the Manual, as well as any other document
that the organization may issue, and which has the effect of amending the provisions of the
Manual.
Example:
1. Consent Form
2. Inquiry Summary Form
Pamantasan ng Lungsod ng Valenzuela
Tongco St. Maysan, Valenzuela City
College of Engineering and Information Technology