Polytechnic University of The Philippines
Polytechnic University of The Philippines
ABSTRACT
Trisha B. Laderas
Year : 2019
The ‘right to privacy’ is a right we all expect. Republic Act 10173 also known
as Data Privacy Act of 2012” was signed into law by President Benigno S. Aquino
last August 15, 2012, an act protecting personal information in information and
communications systems in the Government and the private sector, creating for
this purpose a National Privacy Commission. This study made used of the
knowledge about Data Privacy Act. This study found statistically significant
differences among the groups regarding the level of awareness on Data Privacy
Act of 2012, data privacy rights, and the school compliance in the Data Privacy Act.
Based on the findings the researchers had come up that schools should be the one
P O LY T E C H N I C U N I V E R S I T Y O F T H E P H I L I P P I N E S 2
to educate the students about Data Privacy Act. The National Privacy Commission
Chapter 1
Introduction
significant role in nation-building and development of the country. In the digital age, one
who holds information holds power. From macro-economic standpoint, the free flow of
information is concededly vital to the growth of any nation, and key to the success of any
business. With the power that follows information, it is in the awareness of the public to
govern the restrictions by which such power will be held, while at the same time ensuring
the free flow of information to promote innovation and growth. From the perspective of
every citizens and individuals, the public also protects their fundamental human rights to
means to access personal data and information, it becomes the duty of the State to guard
information about one’s self. In the Philippines, the National Privacy Commission (NPC)
mandated to administer and implement the provisions of the Data Privacy Act of 2012 and
to monitor and ensure compliance of the country with international standards set for data
protection. The Commission safeguards the fundamental human right of every individual to
privacy, particularly Information privacy while ensuring free flow of information for
innovation, growth, and national development. Protecting personal information comes from
In 2012 the Philippines passed the Data Privacy Act 2012, comprehensive and strict
privacy legislation “to protect the fundamental human right of privacy, of communication
while ensuring free flow of information to promote innovation and growth.” (Republic Act.
No. 10173, Ch. 1, Sec. 2). Republic Act No. 10173, otherwise known, as the Data Privacy
Act is a law that seeks to protect all forms of information, be it private, personal, or
sensitive. The act meant to cover both natural and juridical persons involved in the
Privacy is a complex topic in higher education and the privacy implications for
autonomy and information privacy issues every day, from understanding the institutional
impact of the latest law that attempts to collect certain privacy rights to figuring out the role
help measure student success. Institutions that understand the degree of the varied data
privacy issues existing in the higher education environment will be well prepared to
address them.
The growing concern for greater data security in higher education is being
encourage by the equally fast-growing awareness in the public of the threat of identity theft
accompanied by the realization on the part of criminal elements that the local college or
university could be an easy target. This study aims to find out if the application of Data
Privacy Act of 2012 was implemented successfully. Specifically, this study aims to
Theoretical Framework
gathered several theories that greatly contributed to the study to better understand the
problem at hand.
Activity theory (AT) focuses on human interaction and the use of tools within a social
subject, object and tools as a mediator. According to Karanasios and Allen (2013), an
activity is anything small or big that we do, which is based on assumptions that tools
mediate between subject and object. Technology is seen as tools that facilitate social
action and interaction within context. The processing of information involves interaction
between the user and tools, such as technology. The theory explains the interaction that
takes place between human beings and social system, which include working environment
From an Activity Theory perspective, for an activity to take place there has to be a
(Wylie et al. 2000). There are policies and regulations that must be adhered to,
when handling information. The outcomes are expected to help prevent challenges that
Factors such as information and its value, the roles of society and its compliance to
information protection, government and its laws relating to information protection, and the
need for standardization of information usage and management within a community can
P O LY T E C H N I C U N I V E R S I T Y O F T H E P H I L I P P I N E S 6
framework
According to Herman Tavani, the restricted access theory of privacy sees privacy
given if one is able to limit and restrict others from access to personal information and
personal affairs. Restricted access theories conceive privacy as Trans subjective, it is seen
as an objective normative right or moral value that exists also if politics or human practices
choose to implement mechanisms that reveal private facts in public or allow the public
access to the private sphere of individuals. Privacy is considered as a moral structure that
is aimed at protecting all humans. Therefore, Mill conceives privacy as a circle around
individuals: There is a circle around every individual human being, which no government,
be it that of one, of a few, or of the many, ought to be permitted to overstep: there is a part
of the life of every person who has come to years of discretion, within which the
individuality of that person ought to reign uncontrolled either by any other individual or by
exists as right and ethical imperative relatively independently of single human actions.
Limited access refers to a moral structural sphere that protects individuals from privacy
intrusion and enables them to act in society. . Based on this action, a sphere of privacy of
individuals that is protected from access to others may be set up that enables individuals
to act in society, their private sphere, and the public based on privacy and data protection.
P O LY T E C H N I C U N I V E R S I T Y O F T H E P H I L I P P I N E S 7
The control theory of privacy sees privacy as control and self-determination over
information about oneself and over the access to one’s personal affairs. The most well-
known privacy theory of this kind was formulated by Alan Westin, who defined privacy as
the “claim of individuals, groups or institutions to determine for themselves when, how, and
to what extent information about them is communicated to others”. Control theories are
action, individuals may choose to withhold or reveal a lot of information about themselves.
Privacy in these theories is therefore variable, dynamic, and flexible, depending on the
behavior of individuals.
Conceptual Framework
This Figure 1. Research Paradigm shows the input, process, and output of the
awareness on Data Privacy Act of BSA students. The arrow illustrates the workflow of
Figure 3
Conceptual Framework
FEEDBACK
P O LY T E C H N I C U N I V E R S I T Y O F T H E P H I L I P P I N E S 9
The input includes profile of the respondents and the aspects of the Data Privacy
Act of BSA Students. The profile of the students consists name (optional), age, gender,
year level and section while aspects of Data Privacy Act consists of degree of Awareness
to the existence of Data Privacy Act of 2012, Data privacy Rights ,which includes the right
to be informed, the right to access, right to object, right to erasure or blocking, right to
damages, right to file a complaint with the National Privacy Commission ,right to rectify,
The Process indicates the assessment of the awareness on Data Privacy Act of
BSA Students and presentation, analysis and interpretation of Data gathered through
survey questionnaire.
The output shows the awareness on Data Privacy Act of BSA students assessed.
The purpose of this study was to determine the level of awareness of BSA students
1.2 Age
1.3 Gender
v. Right to damages
awareness of Data Privacy Act of BSA students when they are grouped according to
Hypothesis
awareness of Data Privacy Act of BSA students when they are grouped according to their
year level.
This study primarily focuses on the level of awareness of selected BSA students. As
such, it aims to determine whether Data Privacy Act of 2012 has succeeded in its goal to
monitor and ensure compliance of the country with international standards set for data
protection following to the rules and regulations of this act. The setting of the study is at
Campus, Sta. Mesa Manila. The target respondents are first year and second year
students taking up Bachelor of Science in Accountancy. The study does not cover all BSA
students in the PUP neither does it cover all the first year and second year students.
Given the limited resources of the researchers, the study does not claim to be a
definitive text in the assessment of the student’s Data Privacy Act awareness. The
information obtained from surveys are only personal assessments made by the
Students. This will give them information about the implementation of the
Parents. This study will help parents in ensuring whether those personal
Members of the Academe. This study will contribute to the members of the
academe on how they will raise awareness on Data Privacy Act among the
students.
Other Researchers. This study will be an effective tool and reference for the