The Data Privacy Act of 2012, its
Compliance and implementation
in the Philippines
15 Mayโ€“16 May ยท Harbour Plaza North Point, Hong Kong .
Dr. Rolando R. Lansigan, CEH, CHFI, SySA+
(Former Chief- Compliance and Monitoring Division)
National Privacy Commission
GDPR Coalition Ambassador
Dr. Rolando Rivera Lansigan - The Privacy Act of 2012, its compliance and implementation in the Philippines
Dr. Rolando Rivera Lansigan - The Privacy Act of 2012, its compliance and implementation in the Philippines
Dr. Rolando Rivera Lansigan - The Privacy Act of 2012, its compliance and implementation in the Philippines
Dr. Rolando Rivera Lansigan - The Privacy Act of 2012, its compliance and implementation in the Philippines
Dr. Rolando Rivera Lansigan - The Privacy Act of 2012, its compliance and implementation in the Philippines
Dr. Rolando Rivera Lansigan - The Privacy Act of 2012, its compliance and implementation in the Philippines
Dr. Rolando Rivera Lansigan - The Privacy Act of 2012, its compliance and implementation in the Philippines
Dr. Rolando Rivera Lansigan - The Privacy Act of 2012, its compliance and implementation in the Philippines
Dr. Rolando Rivera Lansigan - The Privacy Act of 2012, its compliance and implementation in the Philippines
Dr. Rolando Rivera Lansigan - The Privacy Act of 2012, its compliance and implementation in the Philippines
Do not COLLECT
if you cannot
PROTECT
Dr. Rolando Rivera Lansigan - The Privacy Act of 2012, its compliance and implementation in the Philippines
What is the Data Privacy Act of 2012?
โ€ข SECTION 1. Short Title. โ€“ This Act shall be known as
the โ€œData Privacy Act of 2012โ€.
โ€ข Republic Act 10173, the Data Privacy Act of 2012
AN ACT PROTECTING INDIVIDUAL PERSONAL INFORMATION IN INFORMATION AND
COMMUNICATIONS SYSTEMS IN THE GOVERNMENT AND THE PRIVATE SECTOR, CREATING FOR THIS
PURPOSE A NATIONAL PRIVACY COMMISSION, AND FOR OTHER PURPOSES
โ€ข The National Privacy Commission (NPC) is a body that is mandated to
administer and implement this law. The functions of the NPC include:
โ€“ rule-making,
โ€“ advisory,
โ€“ public education,
โ€“ compliance and monitoring,
โ€“ investigations and complaints,
โ€“ and enforcement.
The DPA applies to the processing of all types
of personal information and to any natural
and juridical person, in the country and even
abroad, subject to certain qualifications.
Sec. 4, DPA
SCOPE OF THE DPA
Sections 1-6.
Definitions and General
Provisions
Sections 7-10. National
Privacy Commission
Structure of RA 10173,
the Data Privacy Act
Section 22-24.
Provisions Specific to
Government
Section 25-37.
Penalties
Sections 11-21. Rights
of Data Subjects, and
Obligations of Personal
Information Controllers
and Processors
Philippinesโ€™ DPA vs GDPR
Categories Categories Categories
Purpose Preventing Harm Principle
Integrity and Confidentiality
Material Scope Lawfulness, Fairness and
Transparency
Accountability
Territorial Scope Purpose Limitation Access and Correction
Personal Data Data Minimization Data Portability
Sensitive Personal Data Accuracy Transfer of Personal Data to
Another Person or country
Data Controller Storage Limitation Breach Definition *
Data Processors Notice and Choice Breach Notification *
Publicly Available Information Breach Mitigation
The National Privacy Commission is an independent body mandated to
administer and implement the Data Privacy Act, and to monitor and ensure
compliance of the country with international standards set for personal data
protection.
Dr. Rolando Rivera Lansigan - The Privacy Act of 2012, its compliance and implementation in the Philippines
Timeline of DPA Law and other issuances
passed to Organizationโ€™s Compliance
2012
March
2016
August
2016
Sept. 9,
2016
Sept. 9,
2017
Data
Privacy
Act (DPA)
Passed
into law
National
Privacy
Commission
(NPC) was
formed
Implementin
g rules and
Regulations
(IRRs) was
published
IRR came
into effect
Deadline:
DPO
Registration
12
months
Registration Requirements: All personal data processing systems (DPS) operating in the
Philippines that involve Personal Data concerning at least 1,000 individuals/personal
records must be registered with NPC
March
8, 2018
Deadline:
(ANNUAL)
Registration of
DPS
June 30,
2018
Deadline:
(ANNUAL)
Security
Incident
Reports
Dr. Rolando Rivera Lansigan - The Privacy Act of 2012, its compliance and implementation in the Philippines
EXAMPLES OF POTENTIAL BREACHES AND SECURITY INCIDENTS
INVOLVING PERSONAL INFORMATION
โ€ข Potential Breaches
1. Bank โ€“ Consent form
2. Hospital and School Records โ€“ Storage
and Disposal Policy
3. Student transferred - Without Consent
4. Clinical record of a student to disclose with
her parents - Consent
5. List of top students/passers - Consent
6. Cedula in Malls โ€“ Disposal Policy/Improper
Disposal
7. Security issues in buildings โ€“ logbook
8. Use of re-cycled papers โ€“ Disposal Policy /
Access due to negligence
9. Hard drives sold online โ€“Disposal Policy
10. Use of CCTV โ€“ Privacy Issues
11. Use of USB/CD/Personal laptop โ€“
Encryption issue
โ€ข Access Control and Security Policy
12. Personal Records stolen from home of an employee -
Security
13. Viewing of Student Records in Public โ€“ Physical Security
14. Raffle stubs โ€“ Privacy Notice / Storage and Disposal Policy
15. Universities and Colleges websites with weak
authentication
16. Photocopiers re-sold without wiping the hard drives
17. Password hacked/revealed -
18. Accidentally sent an email attachment โ€“ Unauthorized
Disclosure
โ€ข Other Violations / Data Privacy Act
Principles
19. No Data Sharing Agreement (DSA)
20. No Privacy Notice
21. No Sub-contracting Agreement
22. No Breach Drill
23. Profiling of customers of malls โ€“ Targeted Marketing
24. Unjustifiable collection of personal data of a school โ€“
Principle of Proportionality
DPA
Section
Punishable Act For Personal
Information
For Sensitive Personal
Information
Fine (Pesos)
JAIL TERM
25 Unauthorized processing 1-3 years 3-6 years 500 k โ€“ 4 million
26 Access due to negligence 1-3 years 3-6 years 500 k โ€“ 4 million
27 Improper disposal 6 months โ€“ 2 years 3-6 years 100 k โ€“ 1 million
28 Unauthorized purposes 18 months โ€“ 5 years 2-7 years 500 k โ€“ 2 million
29 Intentional breach 1-3 years 500 k โ€“ 2 million
30 Concealment of breach 18 months โ€“ 5 years 500 k โ€“ 1 million
31 Malicious disclosure 18 month โ€“ 5 years 500 k โ€“ 1 million
32 Unauthorized disclosure 1-3 years 3-5 years 500 k โ€“ 2 million
33 Combination of acts 1-3 years 1 million โ€“ 5 million
Potential Penalties listed in the Data Privacy Act
NPCโ€™s FIVE PILLARS OF COMPLIANCE
DPO
PIA
PMP
PDP
BRP
THE FIVE PILLARS OF COMPLIANCE
โ€ข Commit to Comply: Appoint a Data Protection
Officer (DPO)
โ€ข Know your Risk: Conduct a Privacy Impact
Assessment (PIA)
โ€ข Be Accountable: Create your Privacy
Management Program and Privacy Manual (PMP)
โ€ข Demonstrate your Compliance: Implement your
Privacy and Data Protection Measure (PDP)
โ€ข Be Prepared for Breach: Regularly Exercise your
Breach Reporting Procedure (BRP)
Dr. Rolando Rivera Lansigan - The Privacy Act of 2012, its compliance and implementation in the Philippines
Designating a DPO is the first essential
step. You cannot register with the NPC
unless you have a DPO.
All PICs and PIPs should designate a Data
Protection Officer
โ€ข The personal information controller shall designate an
individual or individuals who are accountable for the
organizationโ€™s compliance with this Act. The identity of
the individual(s) so designated shall be made known to
any data subject upon request. (Sec. 21[b])
โ€ข xxx The personal information processor shall comply
with all the requirements of this Act and other applicable
laws. (Sec. 14)
Dr. Rolando Rivera Lansigan - The Privacy Act of 2012, its compliance and implementation in the Philippines
Dr. Rolando Rivera Lansigan - The Privacy Act of 2012, its compliance and implementation in the Philippines
PILLAR 2: KNOW YOUR RISKS
โ€œThe determination of the appropriate level of security under this
section must take into account the nature of the personal
information to be protected, the risks represented by the
processing, the size of the organization and complexity of its
operations, current data privacy best practices and the cost of
security implementationโ€
- Section 20.C of DPA of 2012
Dr. Rolando Rivera Lansigan - The Privacy Act of 2012, its compliance and implementation in the Philippines
Dr. Rolando Rivera Lansigan - The Privacy Act of 2012, its compliance and implementation in the Philippines
Technical
Organisational โ€“
other measures
1
2
ORGANIZATIONAL
PHYSICAL
TECHNICAL
IMPLEMENT SECURITY MEASURES
Dr. Rolando Rivera Lansigan - The Privacy Act of 2012, its compliance and implementation in the Philippines
Dr. Rolando Rivera Lansigan - The Privacy Act of 2012, its compliance and implementation in the Philippines
โ€œThe PIC shall promptly notify the Commission and affected data
subjects when sensitive personal information or other information that
may, under the circumstances, be used to enable identity fraud are
reasonably believed to have been acquired by an unauthorized
person, and the PIC or the Commission believes that that such
unauthorized acquisition is likely to give rise to a real risk of serious
harm to any affected data subject.โ€
Section 20.f
โ€œConcealment of Security Breaches Involving Sensitive Personal
Information. โ€“โ€“ The penalty of imprisonment of one (1) year and six (6)
months to five (5) years and a fine of not less than Five hundred
thousand pesos (Php500,000.00) but not more than One million pesos
(Php1,000,000.00) shall be imposed on persons who, after having
knowledge of a security breach and of the obligation to notify the
Commission pursuant to Section 20(f), intentionally or by omission
conceals the fact of such security breach.
Section 30
The 72-hour deadline
IRR Section 38 (a) Data Breach Notification. The Commission and
affected data subjects shall be notified by the PIC within seventy-two
(72) hours upon knowledge of, or when there is reasonable belief by
the PIC or PIP that, a personal data breach requiring notification has
occurred.
From https://privacy.gov.ph/memorandum-circulars/
Keep in touch
END OF PRESENTATION

More Related Content

PPTX
Data Privacy Protection Competrency Guide by a Data Subject
PPT
Data protection in_india
PPTX
Introduction to GDPR
PPTX
General Data Protection Regulation (GDPR)
PPTX
Nursing Informatics
PPTX
The Right To Be Forgotten in the Google Spain Case (case C-131/12): A Clear V...
PDF
Urgensi RUU Perlindungan Data Pribadi
PPTX
Presentation on GDPR
Data Privacy Protection Competrency Guide by a Data Subject
Data protection in_india
Introduction to GDPR
General Data Protection Regulation (GDPR)
Nursing Informatics
The Right To Be Forgotten in the Google Spain Case (case C-131/12): A Clear V...
Urgensi RUU Perlindungan Data Pribadi
Presentation on GDPR

What's hot (20)

PDF
Data Protection Predictions for 2023.pdf
PDF
Personal Data Protection in Indonesia
PPS
PPT
History of Nursing - Intro, Pre Christan Era
PPT
Data Privacy in India and data theft
PDF
Nursing Informatics
PPTX
How to handle data breach incidents under GDPR
PPTX
skillcast-gdpr-training-presentation-q320.pptx
PDF
General Data Protection Regulation (GDPR) and ISO 27001
DOC
Legal and ethical issues in nursing
PPTX
E-Governance
PDF
Gdpr presentation
PPTX
General Data Protection Regulation
PDF
Data Privacy - Rights of the Data Subject
PPTX
Introduction to Nursing Informatics
PDF
Melihat RUU Pelindungan Data Pribadi
PPTX
DIGITAL PERSONAL DATA PROTECTION ACT 2023-PPT-VPD.pptx
PDF
Clinical Decision Support System
PPTX
Privacy in India: Legal issues
Data Protection Predictions for 2023.pdf
Personal Data Protection in Indonesia
History of Nursing - Intro, Pre Christan Era
Data Privacy in India and data theft
Nursing Informatics
How to handle data breach incidents under GDPR
skillcast-gdpr-training-presentation-q320.pptx
General Data Protection Regulation (GDPR) and ISO 27001
Legal and ethical issues in nursing
E-Governance
Gdpr presentation
General Data Protection Regulation
Data Privacy - Rights of the Data Subject
Introduction to Nursing Informatics
Melihat RUU Pelindungan Data Pribadi
DIGITAL PERSONAL DATA PROTECTION ACT 2023-PPT-VPD.pptx
Clinical Decision Support System
Privacy in India: Legal issues
Ad

Similar to Dr. Rolando Rivera Lansigan - The Privacy Act of 2012, its compliance and implementation in the Philippines (20)

PDF
All_you_need_to Know_About_the_Data_Privacy_Act.pdf
PPTX
DATA-PRIVACY-ACT.pptx
PPT
Data Privacy Act of 2012 implication to cooperatives
PDF
Data Privacy Act of 2012 (R.A. 10173) Briefing 2017
PPTX
Data Privacy Act in the Philippines
PPTX
New opportunities and business risks with evolving privacy regulations
PPTX
OVERVIEW OF DATA PROTECTION AND PRIVACY.pptx
PDF
Data Security Law and Management.pdf
PPTX
GDPR - Fail to Prepare, Prepare to Fail!
PDF
DPIA step by step process approach and methodology
PDF
Data Privacy Act.pdf
PDF
2014-04-16 Protection of Personal Information Act Readiness Workshop
PDF
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
PPTX
GDPR: Data Breach Notification and Communications
PPTX
How GDPR will change Personal Data Control and Affect Everyone
PDF
ISACA Journal Data Protection Act (UK) and GAPP Alignment
PPTX
GDPR: The Regulator's Perspective, Peter Brown, ICO
PPT
Legal And Regulatory Dp Challenges For The Financial Services Sector
ย 
PPTX
EU Data Protection Legislation, Peter Ridley (HPE)
PDF
Crossing the streams: How security professionals can leverage the NZ Privacy ...
All_you_need_to Know_About_the_Data_Privacy_Act.pdf
DATA-PRIVACY-ACT.pptx
Data Privacy Act of 2012 implication to cooperatives
Data Privacy Act of 2012 (R.A. 10173) Briefing 2017
Data Privacy Act in the Philippines
New opportunities and business risks with evolving privacy regulations
OVERVIEW OF DATA PROTECTION AND PRIVACY.pptx
Data Security Law and Management.pdf
GDPR - Fail to Prepare, Prepare to Fail!
DPIA step by step process approach and methodology
Data Privacy Act.pdf
2014-04-16 Protection of Personal Information Act Readiness Workshop
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
GDPR: Data Breach Notification and Communications
How GDPR will change Personal Data Control and Affect Everyone
ISACA Journal Data Protection Act (UK) and GAPP Alignment
GDPR: The Regulator's Perspective, Peter Brown, ICO
Legal And Regulatory Dp Challenges For The Financial Services Sector
ย 
EU Data Protection Legislation, Peter Ridley (HPE)
Crossing the streams: How security professionals can leverage the NZ Privacy ...
Ad

More from REVULN (12)

PDF
Yono REKSOPRODJO, Fahmy YUSUF - Information Warfare in Cyberspace: The Sprea...
ย 
PDF
Mei NELSON - Hacking and Trolling: The Changing Face of Hacktivism in the Dis...
ย 
PDF
Isao MATSUNAMI - Digital security in japanese journalism
ย 
PDF
Chung-Jui LAI - Polarization of Political Opinion by News Media
ย 
PDF
Stewart MACKENZIE - The edge of the Internet is becoming the center
ย 
PDF
Masayuki HATTA - Debunking toxic "Matome sites" in Japan
ย 
PDF
Sebastien BOURDEAUDUCQ, Stewart MACKENZIE - A talk about nothing (How to crea...
ย 
PDF
Rachel BLUNDY - Overview of AFP Fact Check
ย 
PDF
Dominic WAI - When would using a computer be a crime?
ย 
PDF
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...
ย 
PDF
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
ย 
PDF
Manabu Niseki, Hirokazu Kodera - Catch Phish If You Can: A Case Study of Phis...
ย 
Yono REKSOPRODJO, Fahmy YUSUF - Information Warfare in Cyberspace: The Sprea...
ย 
Mei NELSON - Hacking and Trolling: The Changing Face of Hacktivism in the Dis...
ย 
Isao MATSUNAMI - Digital security in japanese journalism
ย 
Chung-Jui LAI - Polarization of Political Opinion by News Media
ย 
Stewart MACKENZIE - The edge of the Internet is becoming the center
ย 
Masayuki HATTA - Debunking toxic "Matome sites" in Japan
ย 
Sebastien BOURDEAUDUCQ, Stewart MACKENZIE - A talk about nothing (How to crea...
ย 
Rachel BLUNDY - Overview of AFP Fact Check
ย 
Dominic WAI - When would using a computer be a crime?
ย 
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...
ย 
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
ย 
Manabu Niseki, Hirokazu Kodera - Catch Phish If You Can: A Case Study of Phis...
ย 

Recently uploaded (20)

PDF
For-website-Sukumar-Baishya-FT-Order-7-2-2025.pdf
PPTX
Introduction_to_ICT_in_Legal_Education.pptx
PPT
Module โ€“ 4 Indirect Tax Regime - II.ppt
PPTX
Database Management Systems - akash dbms - abar tomake - nitei-hbe - na hle h...
PPTX
Basis Planning with Gifting and Irrevocable Trusts
PDF
Invalidation Case Study of Intragastric Device
PDF
UNIT- 14 & 15_Applied Ethics_ Combating Unethical Practices in Business.pdf
PDF
Insolvency and Bankruptcy Code (IBC) Overview and Company Management Insights...
PPTX
The doctrine of separation of power is known to us by Montesquieu as he gave ...
PDF
UNIT- 13_Applied Ethics_Unethical Practices in Business .pdf
PPTX
Republic-Act-No.8485.ANIMAL WELFARE ACT IN THE PHILIPINES
PPTX
Law-On-Obligations-Presentation-One-1.pptx
PPTX
INGLร‰S 4 - SESSIONES 3 Y 4 - SEMANA DEL 18 DE AGOSTO.pptx
PDF
UNIT- 12_Applied Ethics_Unethical Practices in Business.pdf
PDF
Choice of Law in Private International Law
PPTX
7.Challenging Public Elections. lecture notes
PPTX
LECTURE COPY_WEEK 1-2_Legal Issue or Claim.pptx
PPTX
Company Law Shares and Debentures, Members
PPTX
HR Compliance Law applicable in India under HR Comp.
ย 
PDF
INCORPORATION OF COMPANIES for company law
For-website-Sukumar-Baishya-FT-Order-7-2-2025.pdf
Introduction_to_ICT_in_Legal_Education.pptx
Module โ€“ 4 Indirect Tax Regime - II.ppt
Database Management Systems - akash dbms - abar tomake - nitei-hbe - na hle h...
Basis Planning with Gifting and Irrevocable Trusts
Invalidation Case Study of Intragastric Device
UNIT- 14 & 15_Applied Ethics_ Combating Unethical Practices in Business.pdf
Insolvency and Bankruptcy Code (IBC) Overview and Company Management Insights...
The doctrine of separation of power is known to us by Montesquieu as he gave ...
UNIT- 13_Applied Ethics_Unethical Practices in Business .pdf
Republic-Act-No.8485.ANIMAL WELFARE ACT IN THE PHILIPINES
Law-On-Obligations-Presentation-One-1.pptx
INGLร‰S 4 - SESSIONES 3 Y 4 - SEMANA DEL 18 DE AGOSTO.pptx
UNIT- 12_Applied Ethics_Unethical Practices in Business.pdf
Choice of Law in Private International Law
7.Challenging Public Elections. lecture notes
LECTURE COPY_WEEK 1-2_Legal Issue or Claim.pptx
Company Law Shares and Debentures, Members
HR Compliance Law applicable in India under HR Comp.
ย 
INCORPORATION OF COMPANIES for company law

Dr. Rolando Rivera Lansigan - The Privacy Act of 2012, its compliance and implementation in the Philippines

  • 1. The Data Privacy Act of 2012, its Compliance and implementation in the Philippines 15 Mayโ€“16 May ยท Harbour Plaza North Point, Hong Kong . Dr. Rolando R. Lansigan, CEH, CHFI, SySA+ (Former Chief- Compliance and Monitoring Division) National Privacy Commission GDPR Coalition Ambassador
  • 12. Do not COLLECT if you cannot PROTECT
  • 14. What is the Data Privacy Act of 2012? โ€ข SECTION 1. Short Title. โ€“ This Act shall be known as the โ€œData Privacy Act of 2012โ€. โ€ข Republic Act 10173, the Data Privacy Act of 2012 AN ACT PROTECTING INDIVIDUAL PERSONAL INFORMATION IN INFORMATION AND COMMUNICATIONS SYSTEMS IN THE GOVERNMENT AND THE PRIVATE SECTOR, CREATING FOR THIS PURPOSE A NATIONAL PRIVACY COMMISSION, AND FOR OTHER PURPOSES โ€ข The National Privacy Commission (NPC) is a body that is mandated to administer and implement this law. The functions of the NPC include: โ€“ rule-making, โ€“ advisory, โ€“ public education, โ€“ compliance and monitoring, โ€“ investigations and complaints, โ€“ and enforcement.
  • 15. The DPA applies to the processing of all types of personal information and to any natural and juridical person, in the country and even abroad, subject to certain qualifications. Sec. 4, DPA SCOPE OF THE DPA
  • 16. Sections 1-6. Definitions and General Provisions Sections 7-10. National Privacy Commission Structure of RA 10173, the Data Privacy Act Section 22-24. Provisions Specific to Government Section 25-37. Penalties Sections 11-21. Rights of Data Subjects, and Obligations of Personal Information Controllers and Processors
  • 17. Philippinesโ€™ DPA vs GDPR Categories Categories Categories Purpose Preventing Harm Principle Integrity and Confidentiality Material Scope Lawfulness, Fairness and Transparency Accountability Territorial Scope Purpose Limitation Access and Correction Personal Data Data Minimization Data Portability Sensitive Personal Data Accuracy Transfer of Personal Data to Another Person or country Data Controller Storage Limitation Breach Definition * Data Processors Notice and Choice Breach Notification * Publicly Available Information Breach Mitigation
  • 18. The National Privacy Commission is an independent body mandated to administer and implement the Data Privacy Act, and to monitor and ensure compliance of the country with international standards set for personal data protection.
  • 20. Timeline of DPA Law and other issuances passed to Organizationโ€™s Compliance 2012 March 2016 August 2016 Sept. 9, 2016 Sept. 9, 2017 Data Privacy Act (DPA) Passed into law National Privacy Commission (NPC) was formed Implementin g rules and Regulations (IRRs) was published IRR came into effect Deadline: DPO Registration 12 months Registration Requirements: All personal data processing systems (DPS) operating in the Philippines that involve Personal Data concerning at least 1,000 individuals/personal records must be registered with NPC March 8, 2018 Deadline: (ANNUAL) Registration of DPS June 30, 2018 Deadline: (ANNUAL) Security Incident Reports
  • 22. EXAMPLES OF POTENTIAL BREACHES AND SECURITY INCIDENTS INVOLVING PERSONAL INFORMATION โ€ข Potential Breaches 1. Bank โ€“ Consent form 2. Hospital and School Records โ€“ Storage and Disposal Policy 3. Student transferred - Without Consent 4. Clinical record of a student to disclose with her parents - Consent 5. List of top students/passers - Consent 6. Cedula in Malls โ€“ Disposal Policy/Improper Disposal 7. Security issues in buildings โ€“ logbook 8. Use of re-cycled papers โ€“ Disposal Policy / Access due to negligence 9. Hard drives sold online โ€“Disposal Policy 10. Use of CCTV โ€“ Privacy Issues 11. Use of USB/CD/Personal laptop โ€“ Encryption issue โ€ข Access Control and Security Policy 12. Personal Records stolen from home of an employee - Security 13. Viewing of Student Records in Public โ€“ Physical Security 14. Raffle stubs โ€“ Privacy Notice / Storage and Disposal Policy 15. Universities and Colleges websites with weak authentication 16. Photocopiers re-sold without wiping the hard drives 17. Password hacked/revealed - 18. Accidentally sent an email attachment โ€“ Unauthorized Disclosure โ€ข Other Violations / Data Privacy Act Principles 19. No Data Sharing Agreement (DSA) 20. No Privacy Notice 21. No Sub-contracting Agreement 22. No Breach Drill 23. Profiling of customers of malls โ€“ Targeted Marketing 24. Unjustifiable collection of personal data of a school โ€“ Principle of Proportionality
  • 23. DPA Section Punishable Act For Personal Information For Sensitive Personal Information Fine (Pesos) JAIL TERM 25 Unauthorized processing 1-3 years 3-6 years 500 k โ€“ 4 million 26 Access due to negligence 1-3 years 3-6 years 500 k โ€“ 4 million 27 Improper disposal 6 months โ€“ 2 years 3-6 years 100 k โ€“ 1 million 28 Unauthorized purposes 18 months โ€“ 5 years 2-7 years 500 k โ€“ 2 million 29 Intentional breach 1-3 years 500 k โ€“ 2 million 30 Concealment of breach 18 months โ€“ 5 years 500 k โ€“ 1 million 31 Malicious disclosure 18 month โ€“ 5 years 500 k โ€“ 1 million 32 Unauthorized disclosure 1-3 years 3-5 years 500 k โ€“ 2 million 33 Combination of acts 1-3 years 1 million โ€“ 5 million Potential Penalties listed in the Data Privacy Act
  • 24. NPCโ€™s FIVE PILLARS OF COMPLIANCE DPO PIA PMP PDP BRP
  • 25. THE FIVE PILLARS OF COMPLIANCE โ€ข Commit to Comply: Appoint a Data Protection Officer (DPO) โ€ข Know your Risk: Conduct a Privacy Impact Assessment (PIA) โ€ข Be Accountable: Create your Privacy Management Program and Privacy Manual (PMP) โ€ข Demonstrate your Compliance: Implement your Privacy and Data Protection Measure (PDP) โ€ข Be Prepared for Breach: Regularly Exercise your Breach Reporting Procedure (BRP)
  • 27. Designating a DPO is the first essential step. You cannot register with the NPC unless you have a DPO.
  • 28. All PICs and PIPs should designate a Data Protection Officer โ€ข The personal information controller shall designate an individual or individuals who are accountable for the organizationโ€™s compliance with this Act. The identity of the individual(s) so designated shall be made known to any data subject upon request. (Sec. 21[b]) โ€ข xxx The personal information processor shall comply with all the requirements of this Act and other applicable laws. (Sec. 14)
  • 31. PILLAR 2: KNOW YOUR RISKS โ€œThe determination of the appropriate level of security under this section must take into account the nature of the personal information to be protected, the risks represented by the processing, the size of the organization and complexity of its operations, current data privacy best practices and the cost of security implementationโ€ - Section 20.C of DPA of 2012
  • 38. โ€œThe PIC shall promptly notify the Commission and affected data subjects when sensitive personal information or other information that may, under the circumstances, be used to enable identity fraud are reasonably believed to have been acquired by an unauthorized person, and the PIC or the Commission believes that that such unauthorized acquisition is likely to give rise to a real risk of serious harm to any affected data subject.โ€ Section 20.f โ€œConcealment of Security Breaches Involving Sensitive Personal Information. โ€“โ€“ The penalty of imprisonment of one (1) year and six (6) months to five (5) years and a fine of not less than Five hundred thousand pesos (Php500,000.00) but not more than One million pesos (Php1,000,000.00) shall be imposed on persons who, after having knowledge of a security breach and of the obligation to notify the Commission pursuant to Section 20(f), intentionally or by omission conceals the fact of such security breach. Section 30
  • 39. The 72-hour deadline IRR Section 38 (a) Data Breach Notification. The Commission and affected data subjects shall be notified by the PIC within seventy-two (72) hours upon knowledge of, or when there is reasonable belief by the PIC or PIP that, a personal data breach requiring notification has occurred. From https://privacy.gov.ph/memorandum-circulars/