Creating A Privacy Manual
Creating A Privacy Manual
PRIVACY MANUAL
https://privacy.gov.ph/creating-a-privacy-manual/
TABLE OF CONTENTS
Background .................................................................................................. 3
Introduction .................................................................................................. 4
Definition of Terms ...................................................................................... 5
Scope and Limitations ................................................................................. 6
Processing of Personal Data ...................................................................... 7
Security Measures ....................................................................................... 9
Breach and Security Incidents .................................................................. 16
Inquiries and Complaints .......................................................................... 18
Effectivity ................................................................................................... 19
Annexes...................................................................................................... 19
2
BACKGROUND
Republic Act No. 10173, also known as the Data Privacy Act of 2012
(DPA), aims to protect personal data in information and communications
systems both in the government and the private sector.
3
INTRODUCTION
This section lays down the basis of the Manual. Hence, it should provide
an overview of the DPA, its IRR and other policies that relate to data protection
and which are relevant issuances to the industry or sector of the organization,
as well as the transactions it regularly carries out.
In brief, it should discuss how the organization complies with the data
privacy principles, and upholds the rights of the data subjects, both of which
are laid out in the DPA.
It is important that this portion impresses upon the user or reader why it
is necessary for the organization to have a Privacy Manual.
Example:
This Manual shall inform you of our data protection and security
measures, and may serve as your guide in exercising your rights under
the DPA.
4
DEFINITION OF TERMS
Examples:
5
SCOPE AND LIMITATIONS
This section defines the coverage of the Manual. Given that the
document is essentially an internal issuance and is meant for the use and
application of the organization’s staff or personnel, that fact should be
emphasized here.
Examples:
6
PROCESSING OF PERSONAL DATA
This section lays out the various data life cycles (or processing systems) in
existence within the organization—from the collection of personal data, to their
actual use, storage or retention, and destruction.
Example:
B. Use
Example:
Example:
o This company will ensure that personal data under its custody are
protected against any accidental or unlawful destruction, alteration
and disclosure as well as against any other unlawful processing.
The company will implement appropriate security measures in
storing collected personal information, depending on the nature of
7
the information. All information gathered shall not be retained for a
period longer than one (1) year. After one (1) year, all hard and soft
copies of personal information shall be disposed and destroyed,
through secured means.
Example:
Example:
8
SECURITY MEASURES
Example:
Example:
9
3. Conduct of trainings or seminars to keep personnel, especially the
Data Protection Officer updated vis-à-vis developments in data
privacy and security
Example:
Example:
Example:
6. Duty of Confidentiality
10
Example:
Example:
This portion shall feature the procedures intended to monitor and limit
access to the facility containing the personal data, including the activities
therein. It shall provide for the actual design of the facility, the physical
arrangement of equipment and furniture, the permissible modes of
transfer, and the schedule and means of retention and disposal of data,
among others. To ensure that mechanical destruction, tampering and
alteration of personal data under the custody of the organization are
protected from man-made disasters, power disturbances, external
access, and other similar threats, provisions like the following must be
included in the Manual:
Example:
11
2. Storage type and location (e.g. filing cabinets, electronic storage
system, personal data room/separate room or part of an existing
room)
Example:
Example:
Example:
Example:
12
The computers are positioned with considerable spaces
between them to maintain privacy and protect the processing
of personal data.
Example:
Example:
Example:
13
C. Technical Security Measures
Example:
Example:
Example:
14
4. Encryption, authentication process, and other technical security
measures that control and limit access to personal data
Example:
15
BREACH AND SECURITY INCIDENTS
Example:
Example:
Example:
16
o The organization shall always maintain a backup file for all
personal data under its custody. In the event of a security incident
or data breach, it shall always compare the backup with the
affected file to determine the presence of any inconsistencies or
alterations resulting from the incident or breach.
4. Notification protocol
Example:
o The Head of the Data Breach Response Team shall inform the
management of the need to notify the NPC and the data subjects
affected by the incident or breach within the period prescribed by
law. Management may decide to delegate the actual notification to
the head of the Data Breach Response Team.
Example:
17
INQUIRIES AND COMPLAINTS
Every data subject has the right to reasonable access to his or her
personal data being processed by the personal information controller or
personal information processor. Other available rights include: (1) right to
dispute the inaccuracy or error in the personal data; (2) right to request the
suspension, withdrawal, blocking, removal or destruction of personal data; and
(3) right to complain and be indemnified for any damages sustained due to
inaccurate, incomplete, outdated, false, unlawfully obtained or unauthorized
use of personal data. Accordingly, there must be a procedure for inquiries and
complaints that will specify the means through which concerns, documents, or
forms submitted to the organization shall be received and acted upon. This
section shall feature such procedure.
Example:
18
EFFECTIVITY
Example:
The provisions of this Manual are effective this __ day of _______, 2018,
until revoked or amended by this company, through a Board Resolution.
ANNEXES
Example:
1. Consent Form
2. Inquiry Summary Form
3. Access Request Form
4. Privacy Notice
5. Request for Correction or Erasure
19