Raw PDF
Raw PDF
Raw PDF
TRAINER’S NOTE: The topic overview below is meant for the trainer. Do not
read this to the participants.
1 day
The Briefing on Data Privacy Act was designed to provide awareness and training to all
BIR officials and employees about protection on the privacy of individual while ensuring
of information to promote innovation and growth, regulates the collection, recording,
organization, storage, updating or modification, retrieval, consultation, use, consolidation,
blocking, erasure or destruction of personal data and ensures that the Philippines
complies with the international standards set for data protection through National Privacy
Commission (NPC).
REFERENCES:
DISCUSS the objectives of the briefing. At the end of this briefing, participants are
expected to:
DISCUSS
SECTION 2: Policy
It is the policy of the state to protect the fundamental human right of privacy, of
communication while ensuring free flow of information to promote innovation and growth.
It recognizes the vital role of information and communications technology in nation-
building and its inherent obligation to ensure that personal information in information and
communications systems in the government and in the private sector are secured and
protected.
SECTION 4: Scope
The Act and these Rules apply to the processing of personal data by any natural and
juridical person in the government or private sector. They apply to an act done or practice
engaged in and outside of the Philippine if:
1. The natural or juridical person involved in the processing of personal data is found
or established in the Philippines;
2. The act, practice or processing related to personal data about a Philippine citizen
or Philippine resident;
3. The processing of personal data is being done in the Philippines; or
The Act and these Rules shall not apply to the following specified information, only to the
minimum extent of collection, access, use, disclosure or other processing necessary to
the purpose, function, or activity concerned:
1. Information processed for purpose of allowing public access to information that fall
within matters of public concern, pertaining to:
The title, office address, and office telephone number of the individual;
3. Personal information that will be processed for research purpose, intended for a
public benefit, subject to the requirements of applicable laws, regulations, or ethical
standards;
5. Information necessary for banks, other financial institutions under the jurisdiction
of the independent, central monetary authority or Bangko Sentral ng Pilipinas, and
other bodies authorized by law, to the extent necessary to comply with Republic
Act No. 9510 (CISA), Republic Act No. 9160, as amended, otherwise known as
the Anti-Money Laundering Act, and other applicable laws; and
Provided, that the non-applicability of the Act or these Rules do not extend to
personal information controllers or personal information processors, who remain
subject to the requirements of implementing security measures for personal data
protection: Provided further, that the processing of the information provided in the
preceding paragraphs shall be exempted from the requirements of the Act only to
the minimum extent necessary to achieve the specific purpose, function, or activity.
Section 6. Protection afforded to Data Subjects.
b. The burden of proving that the Act and these Rules are not applicable to a
particular information falls on those involved in the processing of personal data
or the party claiming the non-applicability.
Revenue Special Order No. 395-2017 dated May 15, 2017 was signed by CIR Caesar
R. Dulay – creation of a DATA PRIVACY COMMITTEE in the bureau reconstituting RSO
281-2017:
DPO COP should actively coordinate and consult with the supervising DPO, and should
take instructions from the same.
e. Advice the PIP or PIP as regards the necessity of executing a Data Sharing
Agreement with third parties, and ensure its compliance with the law.
3. Advise the PIC or PIP regarding complaints and/or the exercise by data subjects
of their rights (e.g., requests for information, clarifications, rectification or deletion
of personal data);
4. Ensure proper data breach and security incident management by the PIC or PIP,
including the latter’s preparation and submission to the NPC of reports and other
documentation concerning security incidents or data breaches within the
prescribed period;
5. Inform and cultivate awareness on privacy and data protection within your
organization, including all relevant laws, rules and regulations and issuances of
the NPC;
7. Serve as the contact person of the PIC or PIP vis-à-vis data subjects, the NPC and
other authorities in all matters concerning data privacy or security issues or
concerns and the PIC or PIP;
8. Cooperate, coordinate and seek advice of the NPC regarding matters concerning
data privacy and security; and
9. Perform other duties and tasks that may be assigned by the PIC or PIP that will
further the interest of data privacy and security and uphold the rights of the data
subjects.
Note: Except for items (1) to (3), a COP shall perform all other functions of a DPO. Where
appropriate, he or she shall also assist the supervising DPO in the performance of the
latter’s functions.
Any information whether recorded in a material form or not, from which the identity of an
individual is apparent or can be reasonably and directly ascertained by the entity holding
the information, or when put together with other information would directly and certainly
identify an individual.
1. Individual’s race, ethnic origin, marital status, age, color and religious,
philosophical or political affiliations;
Data Subject are people whose personal information are collected, stored and processed.
Right to be informed
Right to object
Right to access
Right to correct/rectify
Right to block/remove
Right to be INFORMED
The right to be informed whether his or her personal data shall be, are being, or have
been processed, including the existence of automated decision-making and profiling.
Right to OBJECT
The right to object to the processing of one’s personal data, including processing for direct
marketing, automated processing or profiling. Includes the right to be notified and given
an opportunity to withhold consent to the processing in case of changes or any
amendment to the information supplied or declared.
Exceptions:
Personal data is needed pursuant to a subpoena;
The processing are for obvious purposes;
Necessary for or related to a contract or service to which the data subject is a party;
or
Necessary or desirable in an employer-employee relationship; or
The information is being processed as a result of a legal obligation.
Right to ACCESS
Right to RECTIFICATION
The right to dispute the inaccuracy or error in the personal data and have the Personnel
Information Controller (PIC) correct it immediately includes:
NOTE: The recipients previously given the personal data shall he informed of its
inaccuracy and its rectification upon reasonable request of the data subject.
The right to suspend, withdraw or order the blocking, removal or destruction of his or her
personal information from the personal information controller’s filing system. May be
exercised upon discovery and substantial proof of any of the following:
Processing is unlawful; or
Right to DAMAGES
The right to be indemnified for any damages sustained due to such inaccurate,
incomplete, outdated, false, unlawfully obtained or unauthorized use of personal data.
The right to obtain from the PIC a copy of data undergoing processing in an electronic
or structured format, which is commonly used and allows further use by the data
subject.
Primarily takes into account the right of data subject to have control over his or her
personal data being processed based on consent or contract for commercial purpose,
or through automated means.
If your rights as a data subject have been violated and or a breach was committed
against you rights, you have the right to file a complaint.
Transmissibility of Rights
The lawful heirs and assigns of the data subject may invoke the rights of the data
subject at any given time after his or her death, or when he or she is incapacitated or
incapable of exercising his or her rights.
Note: The heirs and assigns of the data subject may invoke his or her rights after his
or her death, or when he or she is incapacitated.
Limitation on Rights
The provisions on transmissibility of rights and the right to portability are not
applicable:
• If the personal data are used only for the needs of scientific and statistical research
and, on the basis of such, no activities are carried out and no decisions are taken
regarding the data subject.
• If the processing is for the purpose of investigations relative to any criminal,
administrative or tax liabilities of a data subject.
The limitations on rights shall only be to the minimum extent necessary to achieve
the purpose of the research or investigation.
It is an independent body created under Republic Act No. 10173 or the Data Privacy
Act of 2012, mandated to administer and implement the provisions of the Act, and to
monitor and ensure compliance of the country with international standards set for
data protection. It is attached to the Philippines' Department of Information and
Communications Technology (DICT) for purposes of policy coordination, but remains
independent in the performance of its functions. The Commission safeguards the
fundamental human right of every individual to privacy, particularly information
privacy while ensuring free flow of information for innovation, growth, and national
development.
3. Create privacy and data protection policies, taking into account the privacy impact
assessments, as well as Sections 25 to 29 of the IRR;
5. Register its data processing systems with the Commission in cases where
processing involves personal data of at least one thousand (1,000) individuals,
taking into account Sections 46 to 49 of the IRR; and
6. Cooperate with the Commission when the agency’s privacy and data protection
policies are subjected to review and assessment, in terms of their compliance with
the requirements of the Act, its IRR, and all issuances by the Commission.
A government agency engaged in the processing of personal data shall ensure that
its conduct of a privacy impact assessment is proportionate or consistent with the size
and sensitivity of the personal data being processed, and the risk of harm from the
unauthorized processing of that data. The Privacy Impact Assessment shall include
the following:
The risks identified in the privacy impact assessment must be addressed by a control
framework, which is a comprehensive enumeration of the measures intended to address
the risks, including organizational, physical and technical measures to maintain the
availability, integrity and confidentiality of personal data and to protect the personal data
against natural dangers such as accidental loss or destruction, and human dangers such
as unlawful access, fraudulent misuse, unlawful destruction, alteration and
contamination.
The contents of a control framework shall take into account, among others, the following:
2. Risks represented by the processing, the size of the organization and complexity
of its operations;
Personal data being processed by a government agency shall be stored in a data center,
which may or may not be owned and controlled by such agency: Provided, that the agency
must be able to demonstrate to the Commission how its control framework for data
protection, and/or, where applicable, that of its service provider, shall ensure compliance
with the Act: Provided further, that where a service provider is engaged, the Commission
may require the agency to submit its contract with its service provider for review.
All personal data that are digitally processed must be encrypted, whether at rest or in
transit. For this purpose, the Commission recommends Advanced Encryption Standard
with a key size of 256 bits (AES-256) as the most appropriate encryption standard.
Passwords or passphrases used to access personal data should be of sufficient strength
to deter password attacks. A password policy should be issued and enforced through a
system management tool.
Access to all data centers owned and controlled by a government agency shall be
restricted to agency personnel that have the appropriate security clearance. This should
be enforced by an access control system that records when, where, and by whom the
data centers are accessed. Access records and procedures shall be reviewed by agency
management regularly.
When a government agency engages a service provider for the purpose of storing
personal data under the agency’s control or custody, the service provider shall function
as a personal information processor and comply with all the requirements of the Act, its
IRR and all applicable issuances by the Commission.
The Commission recommends ISO/IEC 27018 as the most appropriate certification for
the service or function provided by a service provider under this Rule.
The requirements of this Rule shall also apply to personal data that a government agency
has stored for archival purposes.
A government agency shall strictly regulate access to personal data under its control or
custody. It shall grant access to agency personnel, through the issuance of a security
clearance by the head of agency, only when the performance of official functions or the
provision of a public service directly depends on such access or cannot otherwise be
performed without such access.
A copy of each security clearance must be filed with the agency’s Data Protection Officer.
Each government agency shall have an up-to-date Acceptable Use Policy regarding the
use by agency personnel of information and communications technology. The policy shall
be explained to all agency personnel who shall use such technology in relation to their
functions. Each user shall agree to such policy and, for this purpose, sign the appropriate
agreement or document, before being allowed access to and used of the technology.
Agency personnel who access personal data online shall authenticate their identity via a
secure encrypted link and must use multi-factor authentication. Their access rights must
be defined and controlled by a system management tool.
A government agency shall adopt and utilize technologies that prevent personal data
accessible online to authorized agency personnel from being copied to a local machine.
The agency shall also provide for the automatic deletion of temporary files that may be
stored on a local machine by its operating system. Where possible, agency personnel
shall not be allowed to save files to a local machine. They shall be directed to only save
files to their allocated network drive.
Drives and USB ports on local machines may also be disabled as a security measure. A
government agency may also consider prohibiting the use of cameras in areas where
personal data is displayed or processed.
A government agency shall ensure that only known devices, properly configured to the
agency’s security standards, are authorized to access personal data. The agency shall
also put in place solutions, which only allow authorized media to be used on its computer
equipment.
A government agency shall adopt and use technologies that allow the remote
disconnection of a mobile device owned by the agency, or the deletion of personal data
contained therein, in event such mobile device is lost. A notification system for such loss
must also be established.
If personal data is stored in paper files or any physical media, the government agency
shall maintain a log, from which it can be ascertained which file was accessed, including
when, where, and by whom. Such log shall also indicate whether copies of the file were
made. Agency management shall regularly review the log records, including all
applicable procedures.
Access by other parties to personal data under the control or custody of a government
agency shall be governed by data sharing agreements that will be covered by a separate
issuance of the Commission.
A government agency that transfers personal data by email must either ensure that the
data is encrypted, or use a secure email facility that facilitates the encryption of the data,
including any attachments. Passwords should be sent on a separate email. It is also
recommended that agencies utilize systems that scan outgoing emails and attachments
for keywords that would indicate the presence of personal data and, if appropriate,
prevent its transmission.
A government agency shall implement access controls to prevent agency personnel from
printing or copying personal data to personal productivity software like word processors
and spreadsheets that do not have any security or access controls in place.
A government agency that uses portable media, such as disks or USB drives, to store or
transfer personal data must ensure that the data is encrypted. Agencies that use laptops
to store personal data must utilize full disk encryption.
Where possible, the manual transfer of personal data, such as through the use of
removable physical media like compact discs, shall not be allowed: Provided, that if such
mode of transfer is unavoidable or necessary, authentication technology, such as one-
time PINs, shall be implemented.
Facsimile technology shall not be used for transmitting documents containing personal
data.
A government agency must be aware of its legal obligations as set out in Republic Act
No. 9470, also known as the National Archives of the Philippines Act of 2007. Personal
data records, as well as incoming and outgoing emails, of enduring value may be archived
pursuant to such Act.
A. Disposal of files that contain personal data, whether such files are stored on paper,
film, optical or magnetic media;
A government agency may engage a service provider to carry out the disposal of personal
data under its control or custody: Provided, that the service provider shall contractually
agree to the agency’s data protection procedures and ensure that the confidentiality of all
personal data is protected.
Miscellaneous Provisions
The appropriate guidelines for managing data breaches will be the subject of a separate
issuance by the Commission.
Data Sharing
The disclosure or transfer to a third party of personal data under the control or custody
of a Personal Information Controller (PIC) or Personal Information Processor (PIP).
General Principle
DATA SHARING shall adhere to the data privacy principles laid down in the DPA, IRR
and all issuances of the NPC.
GENERAL RULE: When a personal information controller obtains the consent of the
data subject prior to collection and processing.
EXCEPTION: Consent is not required for the processing of personal data, as provided
by law.
A contract, joint issuance, or similar document that contains the terms and conditions of
a data sharing arrangement between 2 or more parties.
Contents of a DSA
A DSA may be reviewed by the National Privacy Commission (NPC), on its own initiative
or based on a complaint.
Prior approval by the NPC is not necessary for the execution of DSAs.
Unless otherwise provided by law, the consent of the data subject is always
necessary to engage in data sharing.
Although prior approval of the NPC is not necessary for the execution of a DSA,
the latter may be reviewed by the NPC at any time.
Violations of these Rules, shall, upon notice and hearing, be subject to compliance and
enforcement orders, cease and desist orders, temporary or permanent ban on the
processing of personal data, or payment of fines, in accordance with a schedule to be
published by the Commission.
Failure to comply with the provisions of this Circular may be a ground for administrative
and disciplinary sanctions against any erring public officer or employee in accordance
with existing laws or regulations.
The commencement of any action under this Circular is independent and without
prejudice to the filing of any action with the regular courts or other quasi-judicial bodies.
It was stated in the Information that the accused, “being a customer care professional” of
a multinational BPO company in the Philippines “unlawfully, willfully and feloniously
accessed and processed without authority” the account of one of said company’s
American client account “by enrolling it to express cash and issuing a temporary PIN for
the said account, for the unauthorized purpose of withdrawing $500 from the said
account,” which was in violation of Section 28 of Republic Act (R.A.) No. 10173 otherwise
known as the “Data Privacy Act of 2012”.
According to the dispositive portion of the Judgment, the accused was sentenced to suffer
imprisonment for one (1) year and six (6) months as minimum and five (5) years as
maximum, and a fine of Five Hundred Thousand Pesos (PhP 500,000.00) pursuant to
Sec. 28 of the R.A. 10173.
The voter database in the Precinct Finder application contained each voter’s complete
name, date of birth, gender, civil status, address, precinct number, birthplace, disability,
voter identification number, voter registration record number, reason for
deletion/deactivation, registration date, and update time.
The voter database in the Post Finder application contained each voter’s verified name,
date of birth, gender, civil status, post of registration, passport information, with number
and expiry date, taxpayer identification number, e-mail address, mailing address,
spouse’s name, the complete names of the voter’s mother and father, the voter’s
addresses in the Philippines and abroad, post or country of registration, old registration
information, Philippine representative’s complete name, citizenship, registration assistor,
profession, sector, height and weight, identifying marks, biometrics description, voting
history, mode of voting, and other textual reference information for the voter registration
system.
February 20, 2017 - NPC starts probe into COMELEC’s 2nd large scale data breach;
issues compliance order
• At around midnight of January 11, 2017, unidentified persons reportedly stole the
desktop computer of the COMELEC’s OEO in Wao, Lanao Del Sur.
• Seventeen days later, on January 28, 2017, COMELEC Executive Director Jose
M. Tolentino notified the NPC of the data breach.
• The data breach exposed information in the NLRV and the Voter Search
application, as well as the detailed voter registration records of registered voters
of Wao, Lanao del Sur.
• While the COMELEC claims the data in the database is encrypted, the COMELEC
admitted that “If the robber will be able to gain access to the VRS, and to decrypt
the VRS and the NLRV data, the personal data might be used by unscrupulous
persons for purposes other than those legitimately intended.”
• The stolen computer contains data from the Voter Registration System (VRS) and
Voter Search applications, as well as the National List of Registered Voters
(NLRV). The stolen data also contains biometric records of registered voters in
Wao, Lanao del Sur.
• “This breach illustrates that there are many ways to lose personal data. That is
why data protection is not only an IT security issue involving firewalls. It’s a
governance matter that covers organizational and physical measures to protect
data,” Liboro added. “In this case, failure to secure the very computer containing
personal data can be just as disastrous. If the COMELEC won’t address the
problem systemically, this will happen again and again.”
The compliance check will evaluate the existing governance, organizational, physical and
technical measures in place and seek to address any gaps especially in the bank’s breach
management protocol, with the view of preventing or mitigating similar incidents in the
future.
The BPI incident was reported to have been caused by human error resulting in previously
posted transactions to be reposted. The discovery of the error prompted to the Bank to
suspend access to thousands of accounts. The BPI incident involved a breach in security
affecting the availability and integrity of information that relates to individuals, considered
a personal data breach under NPC’s memorandum circular on personal data breach
management (NPC MC 16-03).
Commissioner Liboro explains further, “First, the BPI incident impacted information which
is considered personal under the Data Privacy Act. This includes the processing of data,
which is capable of uniquely identifying data subjects, such as the account information of
BPI and BPI Family Bank customers contained in BPI’s systems. Second, the nature of
the incident impacted both the availability and integrity of personal information
considering that the incident resulted in the posting of erroneous account information and
the prevention of its access to account holders. Under the law, impacts to availability and
integrity of personal information may constitute a breach where loss and/or alteration to
personal information occurs, whether accidentally or unlawfully.”
Commissioner Liboro underscored the importance of data protection in the Internet age.
“With many services being on-line, a simple data processing error can affect thousands
of data subjects as well as have national impact, we can’t help to reiterate the importance
of good housekeeping for data processing systems and having breach management
protocols in place compliance with data protection and privacy regulations reduces
breach incidents and puts data subjects out of harm’s way.”
The Data Privacy Act of 2012 cannot be used by government officials as protection
against the Freedom of Information Executive Order issued by President Duterte.
“A government official who abuses his position or takes undue advantage of his functions
for personal benefit will not be able to use the Data Privacy Act to restrict access of the
people to information.”
Impact on Victims:
Application Forms
Questionnaires
Survey Forms
Interviews
Mailing List
Registration Forms
Social Media
Raffle Tickets
The personal information controller and personal information processor shall take steps
to ensure that any natural person acting under their authority and who has access to
personal data, does not process them except upon their instructions, or as required by
law.
The security measures shall aim to maintain the availability, integrity, and confidentiality
of personal data and are intended for the protection of personal data against any
accidental or unlawful destruction, alteration, and disclosure, as well as against any other
unlawful processing. These measures shall be implemented to protect personal data
against natural dangers such as accidental loss or destruction, and human dangers such
as unlawful access, fraudulent misuse, unlawful destruction, alteration and
contamination.
“Authorization is given to the “right people” to access the information and Access
Control is preventing the “wrong people” from accessing that information.”
SHOW the slide “How can we protect the personal information and sensitive personal
information entrusted to us?
Security Measures
These are the three key principles which should be guaranteed in any kind of secure
system. It is a model designed to guide policies for information security within the
organization.
e) Policies and procedures that prevent the mechanical destruction of files and
equipment shall be established. The room and workstation used in the
processing of personal data shall, as far as practicable, be secured against
natural disasters, power disturbances, external access, and other similar
threats.
Loss of PCs
Office submerged in floodwaters
Fire in office
Physical Security
Section 28. Guidelines for Technical Security Measures. Where appropriate, personal
information controllers and personal information processors shall adopt and establish the
following technical security measures:
c) The ability to ensure and maintain the confidentiality, integrity, availability, and
resilience of their processing systems and services;
d) Regular monitoring for security breaches, and a process both for identifying and
accessing reasonably foreseeable vulnerabilities in their computer networks, and
for taking preventive, corrective, and mitigating action against security incidents
that can lead to a personal data breach;
e) The ability to restore the availability and access to personal data in a timely manner
in the event of a physical or technical incident;
To ensure compliance with RA 10173, revenuers are duty-bound and mandated to follow:
According to Section 270 of the National Internal Revenue Code of 1997, as amended by
RA 10021 – Unlawful Divulgence of Trade Secrets except as provided in Section 71 of
the Tax Code and Section 26 of Republic Act. No. 6388, any officer or employee of the
Bureau of Internal Revenue who divulges to any person or makes known in any other
manner than may be provided by law information regarding the business, income or
estate of any taxpayer, the secrets, operation, style or work, or apparatus of any
manufacturer or producer, or confidential information regarding the business of any
taxpayer, knowledge of which was acquired by him in the discharge of his official duties,
shall upon conviction for each act or omission, be punished by a fine of not less than Fifty
thousand pesos (P50,000.00) but not more than One hundred thousand pesos
(P100,000.00), or suffer imprisonment of not less than two (2) years but not more than
five (5) years, or both.
Any officer or employee of the Bureau of Internal Revenue who divulges or makes known
in any other manner to any person other than the requesting foreign tax authority
information obtained from banks and financial institutions pursuant to Section 6(F),
knowledge or information acquired by him in the discharge of his official duties, shall,
upon conviction, be punished by a fine of not less than Fifty thousand pesos (P50, 000.00)
but not more than One hundred thousand pesos (P100, 000.00), or suffer imprisonment
of not less than two (2) years but not more than five (5) years, or both.
RMO No. 50-2004 – Policies & Guidelines on the BIR’s Information & Technology
Security Infrastructure
This is being issued to define the principles, roles and responsibilities to which all BIR
employees and third parties must adhere to when handling owned by, entrusted to and/or
shared with the BIR, communicate the accepted requirements to maintain the
confidentiality, integrity and availability of information assets, maintain awareness of the
need of information security and the need to be an integral part of the day-to-day
operations of BIR.
Various guidelines in compliance with RA 10173 are being reviewed for release
to BIR Users:
Password and Login Control Guidelines
Email Security Guidelines
Internet Security Guidelines
Application System Security Guidelines
Secure Application Development Guidelines
Network Security Guidelines
Various Baseline Security Standards and Procedures were also prepared and for
review:
Information Security Incident Management Procedures
The following teams were created at the National Office in order for the bureau to comply
with the Data Privacy Accountability and Compliance Framework to attain the Five
Pillars/Commandments of the National Privacy Commission, in line with the created Data
Privacy Committee under RSO 395-2017.
• Third Parties
• Manage HR
• Projects
• Manage Legal
The team has already completed the conduct of PIA on the initially identified five
(5) critical systems:
Integrated Tax System (ITS)
Electronic Tax Information System (eTIS)
Electronic Filing and Payment System (eFPS)
eBIRForms
eRegistration
• Maintain contracts and agreements with third-parties and affiliates consistent with
the data privacy policy, legal requirements, and operational risk tolerance.
• Review of Memoranda of Agreement with other agencies with reference to the
Data Privacy Act and other Circulars.
• Formulate procedure to address instances of non-compliance with contracts and
agreements.
• Maintain contracts and agreements with third-parties and affiliates consistent with
the data privacy policy, legal requirements, and operational risk tolerance.
Manage HR Team
• Provide ongoing training and awareness to promote compliance with the data
privacy policy.
Projects Team
• The Project Team will guide the Project/Process Owner in the
conceptualization/development of a project (i.e. during the
planning/design/FSR/TSR/Security requirements/etc.) in reference to DPA.
•
• During the data gathering stage, the team will identify/map out/analyze if there are
data privacy issues (or otherwise) and recommend procedures and processes to
address said issues.
The Team will provide guidance and assistance on the legal aspect in compliance with
DPA.
Given the volume of taxpayer transactions, data and information BIR handles on a regular
basis, we are mandated to comply with the Data Privacy Act of 2012 – RA 10173