Data Privacy Act of 2012
Data Privacy Act of 2012
CHAPTER I
General Provisions
SECTION 1. Short Title. — This Act shall be known as the "Data Privacy Act
of 2012".
SECTION 2. Declaration of Policy. — It is the policy of the State to protect
the fundamental human right of privacy of communication while ensuring free flow of
information to promote innovation and growth. The State recognizes the vital role of
information and communications technology in nation-building and its inherent
obligation to ensure that personal information in information and communications
systems in the government and in the private sector are secured and protected. TSCIEa
(b) Consent of the data subject refers to any freely given, specific,
informed indication of will, whereby the data subject agrees to the
collection and processing of personal information about and/or
relating to him or her. Consent shall be evidenced by written,
electronic or recorded means. It may also be given on behalf of the
data subject by an agent specifically authorized by the data subject to
do so.
(k) Privileged information refers to any and all forms of data which under
the Rules of Court and other pertinent laws constitute privileged
communication.
(c) The determination of the appropriate level of security under this section
CD Technologies Asia, Inc. 2025 cdasiaonline.com
must take into account the nature of the personal information to be protected, the risks
represented by the processing, the size of the organization and complexity of its
operations, current data privacy best practices and the cost of security implementation.
Subject to guidelines as the Commission may issue from time to time, the measures
implemented must include:
(1) Safeguards to protect its computer network against accidental,
unlawful or unauthorized usage or interference with or hindering of
their functioning or availability;
(2) A security policy with respect to the processing of personal
information;
(3) A process for identifying and accessing reasonably foreseeable
vulnerabilities in its computer networks, and for taking preventive,
corrective and mitigating action against security incidents that can
lead to a security breach; and
(4) Regular monitoring for security breaches and a process for taking
preventive, corrective and mitigating action against security incidents
that can lead to a security breach.
(d) The personal information controller must further ensure that third parties
processing personal information on its behalf shall implement the security measures
required by this provision.
(e) The employees, agents or representatives of a personal information
controller who are involved in the processing of personal information shall operate and
hold personal information under strict confidentiality if the personal information are not
intended for public disclosure. This obligation shall continue even after leaving the
public service, transfer to another position or upon termination of employment or
contractual relations.
(f) The personal information controller shall promptly notify the Commission
and affected data subjects when sensitive personal information or other information that
may, under the circumstances, be used to enable identity fraud are reasonably believed
to have been acquired by an unauthorized person, and the personal information
controller or the Commission believes that such unauthorized acquisition is likely to give
rise to a real risk of serious harm to any affected data subject. The notification shall at
least describe the nature of the breach, the sensitive personal information possibly
involved, and the measures taken by the entity to address the breach. Notification may
be delayed only to the extent necessary to determine the scope of the breach, to
prevent further disclosures, or to restore reasonable integrity to the information and
communications system.
(1) In evaluating if notification is unwarranted, the Commission may take
into account compliance by the personal information controller with
this section and existence of good faith in the acquisition of personal
information.
(2) The Commission may exempt a personal information controller from
notification where, in its reasonable judgment, such notification would
not be in the public interest or in the interests of the affected data
subjects.
CD Technologies Asia, Inc. 2025 cdasiaonline.com
(3) The Commission may authorize postponement of notification where it
may hinder the progress of a criminal investigation related to a serious
breach.
CHAPTER VI
Accountability for Transfer of Personal Information
SECTION 21. Principle of Accountability. — Each personal information
controller is responsible for personal information under its control or custody, including
information that have been transferred to a third party for processing, whether
domestically or internationally, subject to cross-border arrangement and cooperation.
(a) The personal information controller is accountable for complying with
the requirements of this Act and shall use contractual or other
reasonable means to provide a comparable level of protection while
the information are being processed by a third party.
(b) The personal information controller shall designate an individual or
individuals who are accountable for the organization's compliance with
this Act. The identity of the individual(s) so designated shall be made
known to any data subject upon request.
CHAPTER VII
Security of Sensitive Personal Information in Government
SECTION 22. Responsibility of Heads of Agencies. — All sensitive personal
information maintained by the government, its agencies and instrumentalities shall be
secured, as far as practicable, with the use of the most appropriate standard
recognized by the information and communications technology industry, and as
recommended by the Commission. The head of each government agency or
instrumentality shall be responsible for complying with the security requirements
mentioned herein while the Commission shall monitor the compliance and may
recommend the necessary action in order to satisfy the minimum standards.
SECTION 23. Requirements Relating to Access by Agency Personnel to
Sensitive Personal Information. — (a) On-site and Online Access — Except as may
be allowed through guidelines to be issued by the Commission, no employee of the
government shall have access to sensitive personal information on government
property or through online facilities unless the employee has received a security
clearance from the head of the source agency.
(b) Off-site Access — Unless otherwise provided in guidelines to be issued
by the Commission, sensitive personal information maintained by an agency may not
be transported or accessed from a location off government property unless a request
for such transportation or access is submitted and approved by the head of the agency
in accordance with the following guidelines:
(1) Deadline for Approval or Disapproval — In the case of any request
submitted to the head of an agency, such head of the agency shall
approve or disapprove the request within two (2) business days after
the date of submission of the request. In case there is no action by
the head of the agency, then such request is considered disapproved;
(2) Limitation to One thousand (1,000) Records — If a request is
CD Technologies Asia, Inc. 2025 cdasiaonline.com
approved, the head of the agency shall limit the access to not more
than one thousand (1,000) records at a time; and
(3) Encryption — Any technology used to store, transport or access
sensitive personal information for purposes of off-site access
approved under this subsection shall be secured by the use of the
most secure encryption standard recognized by the Commission.
The requirements of this subsection shall be implemented not later than six (6)
months after the date of the enactment of this Act.
SECTION 24. Applicability to Government Contractors. — In entering into
any contract that may involve accessing or requiring sensitive personal information from
one thousand (1,000) or more individuals, an agency shall require a contractor and its
employees to register their personal information processing system with the
Commission in accordance with this Act and to comply with the other provisions of this
Act including the immediately preceding section, in the same manner as agencies and
government employees comply with such requirements.
CHAPTER VIII
Penalties
SECTION 25. Unauthorized Processing of Personal Information and
Sensitive Personal Information. — (a) The unauthorized processing of personal
information shall be penalized by imprisonment ranging from one (1) year to three (3)
years and a fine of not less than Five hundred thousand pesos (Php500,000.00) but not
more than Two million pesos (Php2,000,000.00) shall be imposed on persons who
process personal information without the consent of the data subject, or without being
authorized under this Act or any existing law. AaITCH