Day 4 - Data Privacy Protection
Day 4 - Data Privacy Protection
Ransomware
Malware
Phishing
Denial of Service
BREACH MANAGEMENT
1. Creation of a data breach response team, with members that have clearly defined responsibilities, to ensure
timely action in the event of a security incident or personal data breach;
2. Implementation of organizational, physical and technical security measures and personal data privacy
policies intended to prevent or minimize the occurrence of a personal data breach and assure the timely
discovery of a security incident;
3. Implementation of an incident response procedure intended to contain a security incident or personal data
breach and restore integrity to the information and communications system;
4. Mitigation of possible harm and negative consequences to a data subject in the event of a personal data
breach; and
5. Compliance with the Act, its IRR, and all related issuances by the Commission pertaining to personal data
breach notification.
Sample Security Incident Management Policy
● https://upd.edu.ph/wp-content/uploads/2019/04/Data-Privacy-Security-Incid
ent-Management-Policy.pdf
Data Breach Response Team
one (1) member with the authority to make immediate decisions regarding critical action, if necessary. The team may include the
Data Protection Officer. The team shall be responsible for the following:
A. Implementation of the security incident management policy of the personal information controller or personal information
processor;
B. Management of security incidents and personal data breaches; and
C. Compliance by the personal information controller or personal information processor with the relevant provisions of the Act,
its IRR, and all related issuances by the Commission on personal data breach management.
The team must be ready to assess and evaluate a security incident, restore integrity to the information and communications
system, mitigate and remedy any resulting damage, and comply with reporting requirements. The functions of the Data Breach
Response Team may be outsourced. Such outsourcing shall not reduce the requirements found in the Act, the IRR or related
issuance. The Data Protection Officer shall remain accountable for compliance with applicable laws and regulations. In cases
where the Data Protection Officer is not part of the Data Breach Response Team, the Data Breach Response Team shall submit a
written report addressed to the Data Protection Officer detailing the actions taken in compliance with these Rules.
Data Breach Response Team Composition
Team leader — The Circular basically describes this team member as someone who has authority
to make “immediate decisions regarding critical action, if necessary.” He or she, coordinates all
activities of the team, and keeps the team focused on damage minimization and quick recovery.
Chief investigator — This member is responsible for collecting and analyzing evidence,
determining root cause, and implementing system and service recovery.
Communications head — In charge of messaging and communications with all audiences, the
Communications head prepares the working draft of NPC and data subject notifications, if
needed. He or she should also ensure content coordination for the drafting of the full breach
report.
Data Breach Response Team Composition
Team documenter — This member documents all actions and decisions the data
breach response team for legal and other purposes.
Timeline coordinator — Monitoring the status and progress of the data breach
response, the timeline coordinator generates and updates a reliable timetable the
team can use to structure and coordinate their deliverables, including reportorial
requirements.
GUIDELINES FOR THE PREVENTION OF PERSONAL DATA BREACH
A security incident management policy shall include measures intended to prevent or minimize the occurrence of a personal
data breach. Such safeguards may include:
A. Conduct of a privacy impact assessment to identify attendant risks in the processing of personal data. It shall take into
account the size and sensitivity of the personal data being processed, and impact and likely harm of a personal data breach;
B. Data governance policy that ensures adherence to the principles of transparency, legitimate purpose, and proportionality;
C. Implementation of appropriate security measures that protect the availability, integrity and confidentiality of personal data
being processed;
D. Regular monitoring for security breaches and vulnerability scanning of computer networks;
E. Capacity building of personnel to ensure knowledge of data breach management principles, and internal procedures for
responding to security incidents;
F. Procedure for the regular review of policies and procedures, including the testing, assessment, and evaluation of the
effectiveness of the security measures.
GUIDELINES FOR THE PREVENTION OF PERSONAL DATA BREACH
The personal information controller or personal information processor shall implement policies and procedures for guidance of its
data breach response team and other personnel in the event of a security incident. These may include:
A. A procedure for the timely discovery of security incidents, including the identification of person or persons responsible for
regular monitoring and evaluation of security incidents;
B. Clear reporting lines in the event of a possible personal data breach, including the identification of a person responsible for
setting in motion the incident response procedure, and who shall be immediately contacted in the event of a possible or
confirmed personal data breach;
C. Conduct of a preliminary assessment for purpose of:
a. Assessing, as far as practicable, the nature and scope of the personal data breach and the immediate damage
b. Determining the need for notification of law enforcement or external expertise; and
c. Implementing immediate measures necessary to secure any evidence, contain the security incident and restore integrity to the information and
communications system;
D. Evaluation of the security incident or personal data breach as to its nature, extent and cause, the adequacy of safeguards in
place, immediate and long-term damage, impact of the breach, and its potential harm and negative consequences to affected
data subjects;
GUIDELINES FOR INCIDENT RESPONSE
POLICY AND PROCEDURE
E. Procedures for contacting law enforcement in case the security incident or personal data
breach involves possible commission of criminal acts;
F. Conduct of investigations that will evaluate fully the security incident or personal data breach;
G. Procedures for notifying the Commission and data subjects when the breach is subject to
notification requirements, in the case of personal information controllers, and procedures for
notifying personal information controllers in accordance with a contract or agreement, in the
case of personal information processors; and
H. Policies and procedures for mitigating the possible harm and negative consequences to a data
subject in the event of a personal data breach. The personal information controller must be
ready to provide assistance to data subjects whose personal data may have been
compromised.
GUIDELINES FOR INCIDENT RESPONSE
POLICY AND PROCEDURE
Documentation
All actions taken by a personal information controller or personal information processor shall be
properly documented. Reports should include:
A. Description of the personal data breach, its root cause and circumstances regarding its discovery;
B. Actions and decisions of the incident response team;
C. Outcome of the breach management, and difficulties encountered; and
D. Compliance with notification requirements and assistance provided to affected data subjects.
E. A procedure for post-breach review must be established for the purpose of improving the personal
data breach management policies and procedures of the personal information controller or
personal information processor.
GUIDELINES FOR INCIDENT RESPONSE
POLICY AND PROCEDURE
Regular Review
Notification shall be required upon knowledge of or when there is reasonable belief by the personal information
controller or personal information processor that a personal data breach requiring notification has occurred, under
the following conditions:
The personal data involves sensitive personal information or any other information that may be used to enable
identity fraud.For this purpose, “other information” shall include, but not be limited to: data about the financial or
economic situation of the data subject; usernames, passwords and other login data; biometric data; copies of
identification documents, licenses or unique identifiers like Philhealth, SSS, GSIS, TIN number; or other similar
information, which may be made the basis of decisions concerning the data subject, including the grant of rights or
benefits.
There is reason to believe that the information may have been acquired by an unauthorized person; and
The personal information controller or the Commission believes that the unauthorized acquisition is likely to give rise
to a real risk of serious harm to any affected data subject.
PROCEDURE FOR PERSONAL DATA BREACH
NOTIFICATION AND OTHER REQUIREMENTS
A claim that the data involved in a breach is public information will not
automatically exempt a personal information controller from the notification
requirements. When the level of availability or publicity of the personal data is
altered by a personal data breach, it shall be considered as a personal data
breach requiring notification, subject to the preceding paragraphs.
PROCEDURE FOR PERSONAL DATA BREACH
NOTIFICATION AND OTHER REQUIREMENTS
Discovery of Vulnerability
The personal information controller shall notify the Commission of a personal data breach subject to the following procedures:
A. When Notification Should be Done. The Commission shall be notified within seventy-two (72) hours upon knowledge of or the
reasonable belief by the personal information controller or personal information processor that a personal data breach has occurred.
B. Delay in Notification. Notification may only be delayed to the extent necessary to determine the scope of the breach, to prevent
further disclosures, or to restore reasonable integrity to the information and communications system. The personal information
controller need not be absolutely certain of the scope of the breach prior to notification. Its inability to immediately secure or restore
integrity to the information and communications system shall not be a ground for any delay in notification, if such delay would be
prejudicial to the rights of the data subjects. Delay in notification shall not be excused if it is used to perpetuate fraud or to conceal
the personal data breach.
C. When delay is prohibited. There shall be no delay in the notification if the breach involves at least one hundred (100) data subjects, or
the disclosure of sensitive personal information will harm or adversely affect the data subject. In both instances, the Commission
shall be notified within the 72-hour period based on available information. The full report of the personal data breach must be
submitted within five (5) days, unless the personal information controller is granted additional time by the Commission to comply.
Content of Notification
Notification shall be in the form of a report, whether written or electronic, containing the
required contents of notification: Provided, that the report shall also include the name and
contact details of the data protection officer and a designated representative of the
personal information controller: Provided further, that, where applicable, the manner of
notification of the data subjects shall also be included in the report. Where notification is
transmitted by electronic mail, the personal information controller shall ensure the secure
transmission thereof. Upon receipt of the notification, the Commission shall send a
confirmation to the personal information controller. A report is not deemed filed without
such confirmation. Where the notification is through a written report, the received copy
retained by the personal information controller shall constitute proof of such confirmation.
Notification of Data Subjects
The personal information controller shall notify the data subjects affected by a personal data breach, subject to the following
procedures:
When should notification be done. The data subjects shall be notified within seventy-two (72) hours upon knowledge of or reasonable
belief by the personal information controller or personal information processor that a personal data breach has occurred. The
notification may be made on the basis of available information within the 72-hour period if the personal data breach is likely to give rise
to a real risk to the rights and freedoms of data subjects. It shall be undertaken in a manner that would allow data subjects to take the
necessary precautions or other measures to protect themselves against the possible effects of the breach. It may be supplemented
with additional information at a later stage on the basis of further investigation.
Exemption or Postponement of Notification. If it is not reasonably possible to notify the data subjects within the prescribed period, the
personal information controller shall request the Commission for an exemption from the notification requirement, or the postponement
of the notification. A personal information controller may be exempted from the notification requirement where the Commission
determines that such notification would not be in the public interest or in the interest of the affected data subjects. The Commission
may authorize the postponement of notification where it may hinder the progress of a criminal investigation related to a serious breach,
taking into account circumstances provided in Section 13 of this Circular, and other risks posed by the personal data breach.
Notification of Data Subjects
Content of Notification. The notification shall include, but not be limited to:
The following additional factors shall be considered in determining whether the Commission may
exempt a personal information controller from notification:
1. Security measures that have been implemented and applied to the personal data at the time the
personal data breach was reasonably believed to have occurred, including measures that would
prevent use of the personal data by any person not authorized to access it;
2. Subsequent measures that have been taken by the personal information controller or personal
information processor to ensure that the risk of harm or negative consequence to the data
subjects will not materialize;
3. Age or legal capacity of affected data subjects: Provided, that in the case of minors or other
individuals without legal capacity, notification may be done through their legal representatives.
Failure to Notify
In case the personal information controller fails to notify the Commission or data
subjects, or there is unreasonable delay to the notification, the Commission shall
determine if such failure or delay is justified. Failure to notify shall be presumed if
the Commission does not receive notification from the personal information
controller within five (5) days from knowledge of or upon a reasonable belief that
a personal data breach occurred.
Privacy by Design
The 7 Foundational Principles
We can all be certain of one thing — the default rules! Privacy by Design seeks to
deliver the maximum degree of privacy by ensuring that personal data are
automatically protected in any given IT system or business practice. If an
individual does nothing, their privacy still remains intact. No action is required on
the part of the individual to protect their privacy — it is built into the system, by
default.
Privacy Embedded into Design
Privacy by Design is embedded into the design and architecture of IT systems and
business practices. It is not bolted on as an add-on, after the fact. The result is
that privacy becomes an essential component of the core functionality being
delivered. Privacy is integral to the system, without diminishing functionality.
Full Functionality — Positive-Sum, not Zero-Sum
Privacy by Design, having been embedded into the system prior to the first
element of information being collected, extends securely throughout the entire
lifecycle of the data involved — strong security measures are essential to privacy,
from start to finish. This ensures that all data are securely retained, and then
securely destroyed at the end of the process, in a timely fashion. Thus, Privacy by
Design ensures cradle to grave, secure lifecycle management of information, end-
to-end.
Visibility and Transparency — Keep it Open
Privacy by Design seeks to assure all stakeholders that whatever the business
practice or technology involved, it is in fact, operating according to the stated
promises and objectives, subject to independent verification. Its component parts
and operations remain visible and transparent, to users and providers alike.
Remember, trust but verify.
Respect for User Privacy — Keep it User-Centric
Above all, Privacy by Design requires architects and operators to keep the
interests of the individual uppermost by offering such measures as strong privacy
defaults, appropriate notice, and empowering user-friendly options. Keep it user-
centric.
Data Privacy Awareness Training Program
Training Content
BOTPA
Do not collect what you cannot protect