Function of Data Processing System Owner as Personal Information Controller (PIC)
Function of Data Processing System Owner as Personal Information Controller (PIC)
Л
Republic of the Philippines
1.^ ^ лгап ■ZT^
E3
NATIONAL POLICE COMMISSION ,
NATIONAL HEADQUARTERS, PHILIPPINE NATIONAL POLICE '
DIRECTORATE FOR INFORMATION AND COMMUNICATIONS TECHNOLOGY MANAGEMENT
Camp BGen Rafael T. Crame, Quezon City
D1CTM{D)-240717-0193
MEMORANDUM
1. Reference: NPC Advisory No. 2017-01 dated March 14, 2017 entitled,
“Designation of Data Protection Officers”
2. This pertains to the NPC Circular No. 2017-01 states that;
3. Relative to this, the National Privacy Commission (NPC) Circular No. 2017-
01 clearly defines the roles and responsibilities of the Personal Information Controller
(PIC), aiding the organization to comply with regulations to properly manage the
personal information.
4. Thus, it is crucial for the owner of each Data Processing System (DPS)
within the PNP to assume the role of PIC for their respective system that controls and
manages the processing of Personal Identifiable Information (PII). Hence, it is
incumbent upon the Director/Chief of each PNP office/unit to fulfill the function of PIC.
5. Further, be reminded that Data Processing involved not only automated but
also the manual processes. Hence, compliance with the following memorandum
circulars and Standard Operation Procedure (SOP) must be fully followed;
130 9001:2015
A
TUVRhelnland
Msnagemeni
System
7. For information.
О A BAZAR
ior General-li'
Distribution:
IG, IAS
Cmdr, APCs
D-Staff
P-Staff
D. NSUs
RD, PROS
Copy furnished:
Command Group
SPA toSILG
150 9001:2015
Management
System
«
TÙVRheInland
:bRTIPIEt) WMWTitv.CO>n
Ю S0000I6069
BACOMC PILIPINAS
FOR : CPNP
TADCA 8 2023
TDCO CPNP A рас ■Í) AS30539
T..4et \UU^ I
TCDS^ fl ? 2023 A530539
FROM : TDICTM
DATE
● NOV 2 2 2022
1. References;
a. Republic Act 10173 “Data Privacy Act of 2012;
OCPNP
iiDœ 23 P528796 VALERIANQ^DE LEON
Police Mai0r Generali.
u IftTiFtKO-
if WWWrifVrftITl
ID 90000160^3
Л
Republic of the Philippines
NATIONAL POLICE COMMISSION
NATIONAL HEADQUARTERS, PHILIPPINE NATIONAL POLICE
OFFICE OF THE CHIEF, PNP
Camp BGen Rafael T Crame, Quezon City
FEB 2 2 2023
DICTM(D)-221121-01
MEMORANDUM CIRCULAR
NO.:?0?3-0 12
GUIDELINES AND PROCEDURES IN THE CONDUCT
OF PRIVACY IMPACT ASSESSMENT
1. REFERENCES:
a. 1987 Philippine Constitution;
b. Republic Act (RA) No. 10173 entitled. “An Act Protecting Individual
Personal Information in Information Communications Systems in the
Government and the Private Sector, creating for this Purpose a National
Privacy Commission, and for other Purposes" also known as the “Data
Privacy Act of 2012”;
c. implementing Rules and Regulations (IRR) of the Data Privacy Act of
2012;
d. RA No, 10175 also known as “Cybercrime Prevention Act of 2012";
e. Executive Order (EO) No. 2, s. 2016 entitled, “Operationalizing in the
Executive Branch the People’s Constitutional Right to Information and
the State Policies to Full Public Disclosure and Transparency in the
Public Ser\'ice and Providing Guidelines Therefor”;
f. National Privacy Commission (NPC) Circular No.», 2016-01 entitled,
"Security of Persona! Data in Government Agencies
g- NPC Circular No. 2016-02 entitled. “Data Sharing Agreements Involving
Government Agencies";
h. NPC Circular No. 2016-03 entitled, "Personal Data Breach
Management”;
I NPC Advisory No. 2017-02 entitled, “Access to Personal Data Sheet of
Government Personnel";
j- NPC Advisory No. 2017-03 entitled. “Guidelines on Privacy Impact
Assessments”;
k. PNP People’s Freedom of Information (FOI) Manual PNPM-DPL-DS-5-
1-18;
I. DPRM Letter Order No. 680 dated March 11, 2019 entitled, “Designation
of Data Protection Officer (DPO) and Compliance to Privacy Officers”;
and]
m. PNP Memorandum Circular (MC) 2021-179 dated November 19, 2021
entitled. “Privacy Management Program Guidelines and Procedures in
Compliance with Data Privacy Act 2012.”
2. RATIONALE:
The Philippine National Police (PNP) adheres to the policy of the State to
protect the fundamental human right of privacy of communication while ensuring the
free flow of information to promote innovation and growth. Sections 4,5, and 6 of NPC
Circular 2016-01 require government agencies to conduct a Privacy impact
Assessment (PIA) for each program, process, or measure within the agency that
involves personal data. At the same time. Section 6 of NPC Circular 2016-03
recommends the conduct of a PIA as part of any organization's security incident
management policy.
3. SITUATION:
On December 1, 2020, the Data Privacy Division (DPD) under the DICTM
was established to oversee all PNP compliances pertaining to data privacy and to
formulate policies and guidelines to protect all data in the PNP.
The PNP. with the mandate to serve and protect, and engaged in the
processing of personal data of its personnel and stakeholders, shall adhere to the
provisions of the DPA, its IRR, and other relevant issuances of the NPC.
4. PURPOSE:
This PNP MC sets forth the guidelines and procedures in the conduct of
PIA.
The objective of the PIA is to ensure that all PNP offices/units managing
automated or unautomated data processing, data recording, and all activities involving
personal data, shall adhere to and comply with the issuances of NPC to secure the
confidentiality, integrity, and availability of data, including the conduct of PIA.
5. DEFINITION OF TERMS:
m. Privileged Information - refers to any and all forms of data which, under
the Rules of Court and other pertinent laws, constitute privileged
communication;
6. GUIDELINES:
a. General Guidelines:
1) Planning a PIA
2) Preparatory Activities
The PIC or PIP must maintain a record of all its PIA reports. When a
report contains information that is privileged or confidential, the PIC or
PIP may prepare a PIA Summary that can be made available to data
subjects upon request. Other means of communicating the results of the
PIA to internal and external stakeholders should be considered, such as
publishing key findings or result summaries in the PIC or PIP website,
through newsletters, annual reports, and other similar materials.
b) Use - the personal data shall be used by the PNP for specific
purposes corresponding to the function of the ofRce/unit
concerned;
b. Responsibilities:
1) TDICTM
a) Supervise the overall implementation of this MC;
b) Monitor the activities and compliance of the PIC and the PIP;
d) Ensure submission of PIA Report every 1®* and 3^** Qtr of even/
calendar year; and
d) Grant the DPO and the CPO appropriate access to the persona!
data that is being processed;
e) Promptly consult with the DPO and the CPO if there’s any
possible personal data breach discovered during the conduct of
PIA; and
8. REPEALING CLAUSE:
All PNP policies, directives, and other issuances that are inconsistent with
the provisions of this MC are hereby deemed rescinded or modified accordingly.
10. EFFECTIVITY:
This MC shall take effect after 15 days from filing a copy thereof at the
University of the Philippines Law Center in consonance with Sections 3 and 4 of
Chapter 2, Book VII of EO No, 292, otherwise known as the “Revised Administrative
Code of 1987,” as amended.
ROD^FO S AZURIN, JR
Poliííe (ieneral
Chief. PNP
Distribution CPNPlí/«-2J S093206
Command Group
IG. IAS
Cmdr, APCs S093206
D-Staff
P-Staff
D, NSUs
RD, PROS
SPA to theSILG
I. Project/System Description
a. Description
This section should explain, what part or phase of the program the PIA covers
and, where necessary for clarity, what it does not cover.
The following questions are intended to help you decide whether a PIA is necessary.
Answering ‘yes' to any of these questions is an indication that a PIA would be a useful
exercise. You can expand on your answers as the project develops if you need to.
a. Will the project or system involve the collection of new information about
individuals?
No Yes
No Yes
c. Are you using information about individuals for a purpose it is not currently
used for, or in a way it is not currently used?
No Yes
d. Will the initiative require you to contact individuals in ways which they may
find intrusive?
No Yes
No Yes
f. Does the initiative involve you using new technology which might be
perceived as being privacy intrusive (e.g. biometrics or facial recognition)?
No Yes
g. Will the initiative result in you making decisions or taking action against
individuals in ways which cah have a significant impact on them?
No Yes
No Yes
Stats 3Ü project stakehcldsrs, consultsd in conducting PIA Identify which pert they
were involved. {Describe how stakeholders were engaged in the PIA process)
Store
■mD-» -Siiif«-
I ;so Uve
t'linvllllU' I'mei-v
iniL-*.
^ in>tructii>n
Delete
DcUte Delete
C» Service ►
● Implementation Guidance:
As an input to the PIA, the organization should describe the information flow in as
detailed a manner as possible to help identify potential privacy risks. The assessor
should consider the impacts not only on Information privacy, privacy related
regulations, e.g. telecommunications acts. The whole personal information life
cycle should be considered.
Identify the persona! data involved and describe the data flow from collection to
disposal by answering the following questions below:
List all personal data (e.g. Personal Full Name, address, gender, phone number, etc.,)
and state which is/are the sensitive personal information (e.g. race, ethnicity, marital
status, health, genetic, government issued numbers).
All the information stated above will be in accordance to the next section.
Collection
If personal information is collected from some source other than the Individual?
Storage
Disclosure/Sharing
Specify ifthe personal information is being shared outside the organization: and
What are the reasons for disclosing the personal information.
Disposal/Destruction
Usage
1. How will the data being used or what is the purpose of its processing?
Retention
Each program, project or means for collecting personal Information should be tested
for consistency with the following Data Privacy Principles (as Identified in Rule IV,
Implementing Rules and Regulations of Republic Act No. 10173, known as the “Data
Privacy Act of 2012”). Respond accordingly with the questions by checking either the
“Yes” or “No"column and/or listing the what the questions may indicate.
Not
Transparency Yes No
applicable
1. Are data subjects aware of the nature, purpose, and extent
of the processing of his or her personal data?
■2. Are data subjects aware of the risks and safeguards
involved in the processing of his or her personal data?
3. Are data subjects aware of his or her rights as a data
subject and how these can be exercised?
1.5 *Staff are trained in the use of the tools and receive
periodic updates
1.6 ‘Reviews of audit trails are undertaken regularly
1.7 ‘Independent oversight
1.8 ‘Incidents are reviewed for lessons learnt and systems/
processes updated appropriately
1.9 ‘Others, please specify
Not
Data Security Yes No
applicable
1. Do you have appropriate and reasonable organizational,
physical and technical security measures in place?
Not
Cross-border Data Flows (optional) Yes No
applicable
1. The program will transfer personal data to an organization
or person outside of the Philippines
For the purpose of this section, a risk refers to the potential of an incident to result in
harm or danger to a data subject or organization. Risks are those that could lead to
the unauthorized collection, use, disclosure or access to personal data. It includes
risks that the confidentiality, integrity and availability of personal data will not be
maintained, or the risk that processing will violate rights of data subjects or privacy
principles (transparency, legitimacy and proportionality).
The first step in managing risks is to identify them, including threats and vulnerabilities,
and by evaluating its impact and probability.
Impact - severity of the injuries that might arise if the event does occur (can
be ranked from trivial injuries to major injuries); and
Probability
Not expected, but there is a slight possibility it may occur at
1 Unlikely
some time.
2 Possible Casual occurrence, it might happen at some time..
Frequent occurrence. There is a strong possibility that it
3 Likely
might occur. _
4 Almost Certain Very likely. It is expected to occur in most circumstances. i
Select the appropriate level or criteria of impact and probability to better assess the
risk. Kindly refer to the table below for the criteria.
Note: Try to itemize your risks by designating a reference number. This will
be used as a basis on the next sections (VII. Recommended Privacy
Solutions and VIII. Sign off and Action Plan). Also, base the risks on the
violation of privacy principles, rights of data subjects and confideniiality,
integrity and availability of personal data.
Threats/
Ref# Impact Probability Risk Rating
Vulnerabilities
1 2 3 4 1 2 3 4
1 2 3 4 1 2 3 4
1 2 3 4 1 2 3 4
1 2 3 4 1 2 3 4
Rating Types
1 Negligible
2 to 4 Low Risk _
6 to 9 Medium Risk
10-16 High Risk
4 4 8 12 \6 '
I
M 3 6 9 12
P
A
C 2 4 6 8
T
1 2 3 4
1 2 3 4
PROBABILITY
From the risks stated in the previous section, identify the recommended solution
or mitigation measures You r*on r'ito '»Olir ovictinn /'/^nfrrvle tr>
'●'●It WW
fho rieUe in tho M> Vlt4<i
same column.
DPD-2021-12-08-02 ‘) о ‘ '
hi I i ill 4
MEMORANDUM
FOR : CPNP APPRWf;.! / pit
1. References: . -
a. Republic Act No. 10173 entitled “An Act Protecting’Individual Personal
Information in information Communications Systems in the Government
and the Private Sector, creating for this Purpose a National Privacy
Commission, and for other Purposes” also known as the “Data Privacy Act
of 2012” (DPA): and
b. Implementing Rules and Regulations (IRR) of Data Priva.
2. Relative to the above references, please be informed that this Directorate has
consolidated all the comments and recommendations from the different Directorates for
the crafting of Memorandum Circular on “PRIVACY MANAGEMENT PROGRAM
GUIDELINES AND PROCEDURES IN COMPLIANCE TO DATA PRIVACY ACT 2012”.
ALEXANDER J^MPAGA
Polii (jor (Зепега! ● -
i-ï-‘
Ж OCPNP
Ш íiDocTi Р499062 ЧМ9 11,
orcos T06'j58i
Republic of the Philippines
NATIONAL POLICE COMMISSION
NATIONAL HEADQUARTERS,PHILIPPINE NATIONAL POLICE
OFFICE OF THE CHIEF, PNP
Camp BGen Rafael T Crame, Quezon City
NOV 1 Э 2021
MEMORANDUM. CIRCULAR
NO.; 2 0 2 1 ' 1 T Ч
PRIVACY MANAGEMENT PROGRAM
GUIDELINES AND PROCEDURES IN V^WIVtr LIANCE WITH
DATA PRIVACY ACT 2012
1. REFERENCES:
a. 1987 Philippine Constitution;
b. Republic Act (RA) No. 10173 entitled, “An Act Protecting Individual
Personal Information in Information Communications Systems in the
Government and the Private Sector, creating for this Purpose a National
Privacy Commission, and for other Purposes” also known as the “Data
Privacy Act of 2012”:
c. Implementing Rules and Regulations (IRR) of the Data Privacy Act of 2012;
d. RA No. 10175 also known as “Cybercrime .Prevention Act of 2012”;
e. Executive Order No. 2, s. 2016 entitled, “Operationalizing in the Executive
Branch the People’s Constitutional Right to Information and the State
Policies to Full Public Disclosure and Transparency in the Public Service
and Providing Guidelines Therefor”;
f. National Privacy Commission (NPC) Circular No. 2016-03 entitled,
“Personal Data Breach Managemenf ;
g. NPC Circular No. 2016-02 entitled, “Data Sharing Agreements Involving
Government Agencies":
h. NPC Circular No. 2016-01 entitled, “Security of Personal Data in
Government Agencies”:
i. NPC Advisory No. 2017-02 entitled, “Access to Personal Data Sheet of
Government Personnel”;
i. PNP People’s Freedom of Information (FOI) Manual PNPM-DPL-DS-5-1-
18;
k. Information Assurance Policy MG 2016-013; and
I. DPRM Letter Order No. 680 dated March 11, 2019 entitled, “Designation
of Data Protection Officer (DPO) and Compliance to Privacy Officers”.
2. RATIONALE:
The Philippine National Police (PNP) adheres to the policy of the State to
protect the fundamental human right of privacy of communication while ensuring free
flow of information to promote innovation and growth. Section 2 of RA No. 10173 also
known as the Data Privacy Act of 2012 provides that the State recognizes the vital role
of communication and information in nation-buiiding and its Inherent obligation to ensure
that personal data in the government’s information and communication systems are
secured and protected.
Page 1 of 15
3. SITUATION:
There are increasing incidents of personal data breaches that impact both
public and private entities, entailing significant economic losses and putting the data and
data subject at risk for identity theft and other crimes. Worldwide, over a billion records
of personal identifiable information have been stolen or unwittingly shared in recent
years.
In July 2019, Facebook settled with the Federal Trade Commission for a total
of $5bilIion resolving the investigation how the company mishandled its communications
with its users and losing control to protect their personal data. These eventually led to
the inadvertent exposure of its 87 million users' personal data to Cambridge Analytica, a
political analysis firm.
In the Philippines, in April 2016, the Commission on Elections (COMELEC)
encountered a data breach which resulted in the exposure of the 55 million voters’
personal data, though COMELEC denied this and stated that no sensitive information
was leaked, and the breach was only a website defacement.
The PNP, with the mandate to serve and protect, handles thousands of
personal data from private citizens as well as from its own personnel in its daily
transactions.
With the enactment of the Data Privacy Act(DPA), the PNP needs to ensure
that personal information and equipment are protected in accordance with the
aforementioned law.
4. PURPOSE:
Page 2 of 15
b. Compliance to Privacy Officers (СРО) - refer to those accountable for
ensuring compliance with applicable laws and regulations for the protection
of data privacy and security under the direct supervision of the Data
Protection Officer.
Pag© 3 of 15
insinjctions given for that purpose,the set is structured, either by reference
to individuals or by reference to criteria relating to individuals, In such a
way that specific information relating to a particular person is readily
accessible.
Page 4 of 15
г. Privacy Notice > is a statement made to a data subject that describes how
the organization coilects, uses, retains, and discloses personal
information.
s. Privileged information < refers to any and all forms of data which under
the Rules of Court and other pertinent laws constitute privileged
communication.
The Privacy Manual must contain the privacy policy of a PNP office/unit acting
as PIC or PIP, including the security measures and its procedure in breach reporting. In
processing personal information, it shall adhere to these Data Privacy Principles:
a. TRANSPARENCY ~ a data subject must be aware of the nature, purpose
and extent of the processing of the personal information controller, his or
her rights as a data subject, and how these can be exercised. Any
information and communication relating to the processing of personal
data should be easy to access and understand, using clear and plain
language.
Page 5 of 15
b. LEGITIMATE PURPOSE - the processing of information shall be
compatible with a declared and specified purpose, which must not be
contrary to law, morals or public policy.
b. Right to object;
c. Right to access:
d. Right to rectification;
Page 6 of 15
b. Use - the personal data shall be used by the PNP for specific purposes
corresponding to the function of the office/unit concerned.
e. Disclosure and Sharing - all PNP personnel shall strictly maintain the
confidentiality and secrecy of all personal data that come to their
knowledge and possession, even after resignation or retirement, or any
other termination of contractual relations. Classified information shall be
allowed only when the law warrants. Personal data shall only be
t rûHMoet r\iireii^n4 ^r\ о lo\Affiil гм
wiQwiwwwM wipv/i I iWiimCii iwvfK.ewwl kw \л imvVimi рМ1 and to
authorized recipients of such data.
9. PRIVACY MANUAL:
While PNP offices/units perform different functions and deal with privacy
concerns that may not be similar to one another, all offices/units must develop and
implement a Privacy Manual to identify and properly address data protection issues they
encounter in their day-to-day transactions. Thus, the Privacy Manual must contain the
following sections:
a. Introduction
This section sets down the basis of the Manual which includes an overview
of the DPA, its IRR and its policies on data protection relevant to the
transactions of the PNP offices/unIt. The manual should discuss how the
office/unit complies with the Data Privacy Principles and upholds the rights of
the Data Subjects. It is important that the user or reader understands why it
is necessary for the unit to have a Privacy Manual.
Page 7 of 15
b. Scope and Limitations
This section defines the coverage of the Manual. Given that the document
is essentially an internal issuance and is meant for the use and application of
the offices/unit’s staff or personnel, that fact should be emphasized here,
c. Processing of Personal Data
All PNP offices/units must specify and outline how they process personal
data in reference to the “data life cycle” -- from the collection of personal
data, to their actual use, storage or retention, and destruction as discussed
in the general guidelines. This section was previously discussed in the
GENERAL GUIDELINES.
d. Security Measures
Page 8 of 15
The СРО shall also form and designate the Data Privacy Team and
Breach Response Team per unit in support of his/her functions which
may include the Servicing Legal Officer (SLO), Information Technology
Police Officer (ITPO), Head Process Owner, and Human Resource
Personnel.
The CPO may grant security clearance to the PIC and PIPs who
have access to personal and sensitive personal information.
Page 9 of 15
emergency response readiness, accessibiiity to the public, security
against natural disasters, and any other relevant points.
Each concerned PNP office/unit shall conceptualize data privacy in
the context of the actual design of its office, physical arrangement of
equipment and furniture (computers, printers, desks, filing cabinets, etc),
permissible modes of transfer of data, schedule means of retention, and
disposal of data, among others.
3) Technical Security Measures
This involves the technological aspect of security in protecting the
network, encrypting persona! information in storage and in transit,
mitigating data transfer risks, implementing software system designs, and
having efficient access control policies.
DICTM, ACG, and ITMS to formulate standard technical security
measure in safeguarding the data to be adopted and implemented by all
offices/units.
Each PNP office/unit must develop and implement policies and procedures
for the management of a personal data breach, including security incidents. It
must adequately describe or outline such policies and procedures, as follows:
1) Create a Data Breach Response Team(DBRT)
A Data Breach Response Team (DBRT) comprising of at least five
authorized PNP personnel (Team Leader, Assistant Team Leader,
Investigator, and two members) shall be responsible for ensuring
immediate action in the events of security incident or personal data breach.
2) Formulate measures to prevent or minimize occurrence of breach
or security incidents
The PNP unit shall regularly conduct Privacy impact Assessment(PIA)
and periodic reviews of data policies.
3) Establish procedure for recovery and restoration of personal data
The PNP unit shall always maintain a backup file for all personal data
under its custody. In case of incident or breach, it shall always compare
the backup with the affected file to determine the presence of any
inconsistencies or possible alterations.
Page 10 of 15
4) Foiiow notification protocol
The Head of the DBRT shall inform within 24 hours the CPO of the
incident or breach. The CPO must notify the DPO within 48 hour^ upon
knowledge of, or when there is reasonable belief that a personal data
breach has occurred.
The DPO shall notify the Commission within 72 hours through e-mail
at [email protected] or through delivery of a hard copy to its
Office. A confirmation message will be received from the Commission upon
receipt of the notification from the DPO.
Notification to the affected data subjects may be done electronically
or in written form but must be done individually within 72 hours. The
notification must not involve a further, unnecessary disclosure of personal
data. If notilying the affected data subjects individually will involve
disproportionate effort, an authorization from the Commission to employ
alternative means is required.
5) Documentation and annual report of security incidents or
personal data breach
The DBRT shall prepare a detailed entry of every security incident and
personal data breach, and submit annual report signed by the CPO to the
TDICTM/DPO and the Commission. The terms “personal data breach” and
“security incident” have different meanings as defined in the Definition of
Terms.
The report must contain the number of security incidents and data
breaches encountered. It must also Include the classification of data
breaches according to their impact on the availability, integrity, or
confidentiality of personal data,
f. Privacy Notice and Consent Form
Page 11 of 15
10. ROLES AND RESPONSiBiLiTiES:
To ensure the proper implementation of this MC,the following are tasked with
roles and responsibilities:
a. The Director for ICT Management (TDiCTM) is designated as Data
Protection Officer vi^o shall supervise and monitor the compliance of the
PNP and shall likewise register with the Commission in line with the Data
Privacy Act of 2012 and other guidelines set forth by the latter.
2) Monitor the activities and compliance of the PIC and the PIP;
3) Analyze and check compliance with the DPA of all processing activities,
including the issuance of security clearances to third party service
providers:
7) Advice PIC and PIP regarding complaints and/or the exercise by the
data subjects of their right;
12)Servô as the contact person of the PIC and PÎP and the Data Subject;
14)Advise other units regarding the necessity of executing third party legal
documents:
b. The D-Staff, D-NSUs. PROS, DDs, PDs, CDs. and COPs shall:
1) Support the CPOs in the organizational, physical and technical needs
of their respective unit to ensure security protection of personal data;
3) Ensure the inclusion of Privacy Notice and Consent Form in all websites
and fill out forms, respectively, being managed by the offices/units
concerned;
7) Actively coordinate and consult with the DPO and should take
instruction from the same;
8) Prioritize activities and focus efforts on issues that present higher data
protection risk;
Page 13 of 15
d. The P!C snd PIP shsll perform the follovviny tssks!
1) Effectively communicate to its personnel, the designation of the DPO
or CPO and his/her functions;
4) Grant the DPO and CPO appropriate access to the personal data that
is being processed;
5) Promptly consult with the DPO and CPO in the event of personal data
breach or security incidents; and
6) Ensure that the DPO or CPO is involved in all relevant working groups
that deal with personal data processing activities conducted inside the
organization or with other organization.
c. Improper Disposal - six (6) months to two (2) years and one (1) year
to three (3) years imprisonment; and a fine ranging from Php100,000 to
Phpl,000,000;
Ail PNP policies, directives, and other issuances that are inconsistent with
the provisions of this MC are hereby deemed rescinded or modified accordingly.
13. EFFECTIVITY:
This MC shall take effect after 15 days from filing a copy thereof at the
University of the Philippines Law Center in consonance with Sections 3 and 4 of Chapter
2, Book VII of Executive Order No. 292, otherwise known as the “Revised Administrative
Code of 1987,” as amended.
DIONARDO В CARLOS
Police General
Chief. PNP
CPNPcf/s?» S087472
Distribution
IG, IAS S087472
Cmdr, APCs
D-Staff
P-Staff
D, NSUs
RD, PROS
Copy Furnished
Command Group
SPA to the SILG
Page 15 of 15
m
Republic of the Philippines
NATIONAL POLICE COMMISSION
NATIONAL HEADQUARTERS. PHILIPPINE NATIONAL POLICE
DIRECTORATE FOR INFORMATION AND COMMUNICATIONS TECHNOLOGY MANAGEMENT
Camp BGen Rafael T Crame, Quezon City
DICTM
0 7 1Ш
Standard Operating Procedure
Number 2023-01
1. REFERENCES:
a. Republic Act No. 10173 "Data Privacy Act of 2012 and its
Implementing Rules and Regulations”:
2. BACKGROUND:
3. PURPOSE:
4. SCOPE:
Page 1 of 9
Ref. No. DICTM (Db231030-0243
5. DEFINITION OF TERMS;
Page 2 of 9
Ref. No. OICTM (Ob23103(KrZ43
Page 3 of 9
Ref. Mo. DICTM (D)*23103(M)243
Page 5 of 9
Ref. No- OICTM (D}-23103CM)243
Page 6 of 9
Ref. No. DICTM (D)-23103(H)243
Page 7 of 9
Ref. No. OiCTM (D)-23103(K)243
6. SANCTIONS:
AU..«
Any personnel who shaii violate, inlentlonally or negligently on u It;
prescribed guidelines and procedures of this SOP ^all be held administratively
liable and shall be meted with appropriate sanction in accordance with
NAPOLCOM Memorandum Circular No. 2016-002 as the case may be.
Page 8 of9
Ref. No. DICTM (D)>2310304)243
7. REPEALING CLAUSE:
g. REVIEW:
10.EFFECTIVITY:
bernafoTmbanac
Police Major General
TDICTM
Disfribution:
IG. IAS
Cmdr, APCs
D-Staff
P-Staff
D. NSUs
RD. PROS
Copy furnished:
Command Group
SPAtoSILG
Page 9 of 9
11. PENAL PROVISIONS:
b. Access Due to Negligence - one(1) year to three (3) years and three
(3) years to six (6) years imprisonment, and a fine ranging from
Php500,000toPhp4.000.000;
c. Improper Disposal - six (6) months to two (2) years and one (1) year
to three (3) years imprisonment; and a fine ranging from Phpl 00,000 to
Php1.000,000;
Page 14 of 15
h Unauthorized Disclosure - one (1) year to three (3) years and three
(3) years to five (5) years irnprisonment, and a fine ranging from
PhpSOO.OOO to Php2,000,000; and