Day 1 - Data Protection Training
Day 1 - Data Protection Training
Google Classroom
https://classroom.google.com
ophjtc2
DATA PRIVACY IS ABOUT
3 CONTROL, NOT
SECRECY 4 RIGHT TO BE LEFT
ALONE
Who stores data about you?
- Government Agencies
- Private Companies
Which is more valuable?
DATA MONEY
“Data is more valuable
than money. If
someone takes your
money, that's all they
have. If you let
someone take your
data, they may
eventually take your
money too!“
Data Privacy Act of 2012
Scope | Section 4
THE LAW APPLIES
To the processing of all types of personal information and sensitive personal information
To both natural and juridical persons, so long as they involved in personal information
processing
To entities not found in the Philippines, so long as they use equipment that are located in the
Philippines, or maintain an office, brancH or agency in the Philippines with EXEMPTIONS:
1. Personal Information
Controller
2. Personal Information
Processor
3. Data Protection Officer
collection
Personal Information Controller (Rule 1)
● A natural or juridical person, or any other body who controls the processing of
personal data, or instructs another to process personal data on its behalf.
There is control if the natural or juridical person or any other body decides on
what information is collected, or the purpose or extent of its processing.
● Implements reasonable and appropriate organizational, physical, and
technical security measures for the protection of personal data. The personal
information controller takes steps to ensure that any natural person acting
under their authority and who has access to personal data, does not process
them except upon their instructions, or as required by law.
Personal Information Controller (Business Owner) (Rule XII)
1. Responsible for any personal data under its control or custody, including information that have
been outsourced or transferred to a personal information processor or a third party for
processing, whether domestically or internationally, subject to cross-border arrangement and
cooperation.
2. Accountable for complying with the requirements of the Data Privacy Act of 2012, it’s
implementing rules and regulation, and other issuances of the National Privacy Commission. It
shall use contractual or other reasonable means to provide a comparable level of protection to
the personal data while it is being processed by a personal information processor or third
party.
3. Required to designate an individual or individuals who are accountable for its compliance with
the R.A. 10173. The identity of the individual or individuals so designated shall be made known
to a data subject upon request.
Personal Information Controller (Head of Agency) (NPC Circular 16-01 )
● Mandatory Registration
○ A. the PIC or PIP employs at least two hundred fifty (250) employees;
○ B. the processing includes sensitive personal information of at least one thousand (1,000)
individuals;
○ C. the processing is likely to pose a risk to the rights and freedoms of data subjects.
○ D. the processing is not occasional
● Voluntary Registration
○ An application for registration by a PIC or PIP whose data processing system does not
operate under any of the conditions set out in the next preceding Section shall be accepted as
a voluntary registration.
A. A procedure for the collection of personal data, including procedures for obtaining
consent, when applicable
B. Procedures that limit the processing of data, to ensure that it is only to the extent
necessary for the declared, specified, and legitimate purpose
C. Policies for access management, system monitoring, and protocols to follow during
security incidents or technical problems
D. Policies and procedures for data subjects to exercise their rights under the Act
E. Data retention schedule, including timeline or conditions for erasure or disposal of
records.
Personal Information Processor in your Agency
Data Protection Officer
The key result areas of an independent Data Protection Officer are the following:
4. Ensure the conduct of Privacy Impact Assessment on the process, system and
technology of personal data processing of the Personal Information Controller or
Processor
5. Ensure proper data breach and security incident management of the Personal
Information Processor and Controller. Make sure that the communication and
documentation requirements of the National Privacy Commission are responded by
the Personal Information Controller or Processor
6. Inform and cultivate awareness on privacy and data protection within the
organization. Ensure the conduct of enterprise or agency wide capacity building or
training program, and regular personnel training on data privacy and security
management
Data Protection Officer (Compliance Oversight) (NPC Advisory 2017-1)
Personal Information Controller (PIC) - Controls the processing of personal data, or instructs
another to process personal data on its behalf.
Data Protection Officer (DPO) - Responsible for the overall management of compliance to DPA
National Privacy Commission - Independent body mandated to administer and implement the
DPA of 2012, and to monitor and ensure compliance of the country with international standards
set for personal data protection
Examples of Breaches
1. COMELeak 14. Use of USB
2. Hospital – unsecure storage records 15. Personal laptop stolen
3. Student transferred by her parent without her 16. Lost a CD in transit
knowledge 17. An error in viewing of student records in the online
4. Clinical record of a student to disclose with her parents system
5. List of top students/passers 18. Use of re-cycled papers
6. Known Fastfood delivery – disclosing personal info of 19. Raffle stubs
clients 20. Universities and Colleges websites with weak
authentication
7. No Data sharing agreement (DSA) between and among
21. Personal Records stolen from home of an employee
Schools and Universities
22. Photocopiers re-sold without wiping the hard drives
8. Cedula in malls
23. Release of CCTV Footage
9. Security issues in buildings – logbook
24. Hard drives sold online
10.Profiling of customers from a mall
25. Password hacked/revealed
11.Unjustifiable collection of personal data of a school 26. Unencrypted Data
12.No Privacy Notice
Data Privacy Rights Violation
Unauthorized processing
Negligence in access
Improper disposal
Unauthorized purpose
Concealed breach
A government employee resigned from her agency with a period with premium
payments of 20.49 years. The employee’s birthdate indicated in her Government
Service Insurance System (GSIS) records is 30 June 1959. However, her National
Statistics Office (NSO) authenticated Certificate of Live Birth shows 30 June 1952
as her birthdate. Her birthdate will determine when she will start receiving her
monthly pension – in 2019 if based on the GSIS record, and in 2012 if based on
her birth certificate. She, thus, invoked her right to rectify her personal data under
the Data Privacy Act of 2012.
How to exercise your right to rectify
if the organization does not yet have a system or form for data rectification, you
must execute a written request to the organization, addressed to its Data
Protection Officer (DPO), and have it received. In the letter, mention that your
request is being made in exercise of your right to object under the Data Privacy
Act of 2012. Documents to support your request must be attached. The DPO must
act on your written request. In case you feel your request have not been addressed
satisfactorily, you may file a formal complaint before the NPC, attached therewith
your request letter to the DPO.
RIGHTS OF THE DATA SUBJECT
You may also exercise this right if you intend to get a usable copy of your personal
health records for the use of other doctors you may like to consult.
In banking, the right to data portability may be used to reduce the risks of being
locked-in with one single service provider, thereby expanding customers’ options
and improving customer experience.
RIGHTS OF THE DATA SUBJECT
Persons who are the subject of the data privacy violation or personal data breach may appoint a duly authorized
representative to prosecute the complaint on their behalf.
Those who are not personally affected by a data privacy violation or personal data breach may: (a) request for an
advisory opinion on data protection matters; or (b) inform the NPC of a data protection concern.
The NPC may monitor the subject organization or take such further action as may be necessary.
Those who wish to file a complaint must comply with the rule of exhaustion of remedies. This rule means that in filing the
complaint, a complainant must be able to show that there was an opportunity offered in good faith to have the
respondent comply with any legal obligations involving data protection and privacy.
How to file a complaint?
Formal complaints are made by filing a complaint-affidavit, together with copies of any evidence and
affidavits of any witnesses at any NPC office.
Complaints can also be made by electronic filing, by: (a) attaching these documents in a specific e-mail sent
to [email protected]; or (b) submitting a portable electronic data storage device to any NPC office.
Electronic documents must digitally signed in and in .PDF format (if practicable), on page sizes compliant
with the Efficient Use of Paper Rule. If submitted in this digital format, the NPC may charge fees for printing.
If submitting through a portable electronic data storage device, similar portable data storage devices
containing the same files must also be given to any opposing party so named. One portable data storage
device is equivalent to one copy.
If the portable data storage device is infected with malware, the documents will not be considered as having
been filed.
RIGHTS OF THE DATA SUBJECT
The NPC has no role in dealing with compensation claims. But you may request NPC to assess
if the organization mishandled your personal data and broke the DPA. You can give a copy of
the NPC’s letter to the court along with the evidence to prove your claim. This, however, does
not guarantee that the judge will fully agree with NPC’s view. You may also require someone
from the NPC to give expert evidence which will only be allowed if the judge orders it. The party
calling the witness will have to shoulder the corresponding cost.
Do not COLLECT if you
cannot PROTECT
Assignment 1
Personal Information vs Sensitive Personal Information