Rationale of The Study: Used This Term To Catch The Attention of The P&G's Senior Management Team
Rationale of The Study: Used This Term To Catch The Attention of The P&G's Senior Management Team
INTRODUCTION
Internet of Things is one of the fastest growing technologies today. The term
“Internet of things” was first used by Kevin Ashton when he presented his presentation to the
Procter & Gamble in 1999 and used this term to catch the attention of the P&G’s senior
management team. Although the term Internet of Things was first stated in 1999, the concept of
connected devices has been around since 1970s.
Today, Internet of Things is very rampant around the world. Millions of people
worldwide are now using lots of smart devices. Since devices today are growing fast, we can use
these to help us live a comfortable life. The purpose of this study is for us to provide a personal
security to the people who are in emergency crisis or who are feeling unsafe on a certain place.
Security is a big factor for many people to help them be safe wherever they are. Who
needs to waste time calling everybody when you’re in emergency crisis? It’s all in our device,
with the added specs that can help you be more secure whenever and wherever you are. Of
course, there are always some instances where you are having second thoughts of calling the
emergency staff(Public and Private Hospitals, Bureau of Fire Protection, NGO’s, Police Stations)
but this device can let you connect with your immediate family or relatives to help you get the
help you need.
This study shows how can a simple necklace provide security and can be a huge help to a
large and growing number of techie people, the procedures will be examined and broke down
with a specific end goal to distinguish the problem and to discover the solution. These issues are
the bases for proposing our thought or our product.
Objectives of the Study
General Objective:
The general objective of this study is to analyze, design and develop an IoT application
emergency assistance can be as simple as clicking the button.
Specific Objectives:
Smart necklace – the actual IoT necklace device that have the following objectives:
1. Turn on-off phone’s GPS location;
2. Detect any objects that may be a threat to the users’ security;
3. Trigger distress message asking for help during emergency situations;
4. Trigger alarm siren signifies that the user is in danger; and
5. Connects to phone via Bluetooth for more navigation options and functions.
Mobile Seculace App – a pair of software application of the smart necklace that will
have the following objectives:
The study focuses to develop working IoT application that will have the following:
The seculace smart necklace has an embedded program that have a micro-object
sensor and alarm siren that could be used as stated in the objectives of the study. It could only
works when activated manually through the button installed or remotely by its pair software
application.
Limitations
Utmost care has been taken with regard to the collection of data that we needed.
However, the study is subjected to the following limitations:
The proposed device is equipped with an object-barrier sensor that can sense any object
with its limited range that may include a living and non-living objects. Once the sensors detects
any object it will now send a signal to the phone and notifies the user. The sensors only aim is to
notify the seculacer of any possible intruders or danger, however the device itself can’t access any
detected object to be dangerous/hazardous. In our informal and partial research, object sensors
have only limited range area of 5 feet in diameter.
Most of the system functions and features are served in the seculace app. Seculacers can
send an ERM to their immediate relatives through the two common messaging platforms: SMS
and Email. ERM’s that sends through SMS may apply corresponding fees. Email messaging may
be free of charge but requires a valid email address and internet connection. 911 distress
call/messaging is available as a last and urgent choice of getting help. However, this may also
come with terms and conditions set by the responder organizations.
The emergency help tab features may not work offline like the email services and
seculacer to seculacer connections, however the system have alternative ways to transmit your
distress calling through SMS platform and direct call to contacts and or to the 911. SMS and
email messages are only sent to the immediate relatives declared by the seculacer.
The seculacers have the privacy rights that the seculace management respects and
secured. All the personal data including location history are secured and protected by the terms
and conditons seculacer and the management. All of these are supported by the law stated in the
legal bases section. 911, on its hands, serves also the right to view these confidential data during
emergency cases that envolves the seculacer this is to assure the genuinity of the user.
Significance of the Study
The purpose of this study is to provide an IoT application for the users to have a security
and an immediate ask for help when their life is in danger. Making the users to gain an easy
access to any emergency response unit. This application will serve as a useful tool that will
benefit the users.
Seculacers: Senior citizens, pregnant women, persons with disabilities (PWD) and normal
people who wishes to be secured or monitored.
Responders: The system will deliver the ERM from the victims containing personal information
and location of the victims that would leave to faster response to emergency occurancies.
Researchers/Proponents: We, the researchers will be able to obtain new knowledge and
experience in analyzing, designing and developing a system or application. Moreover, this will
give us a glimpse of how it is to work in the IT industry.
Future Researchers: This proposed system will serve as a reference for those researchers who
will conduct a similar study and also serves as their guide if they want to innovate our designed
system.
Flow of the Study
Related Literature
Input Related Studies
Customer Validation
Objectives of the study
Lean Stack Canvass
Agile with Scrum Task Board
Implementation
Process
OUTPUT
SECULACE:
Definition of Terms
Administrator – a person who is responsible for the upkeep, configuration and reliable operation
of computer system, also in charged with page contents, reports and statistics management.
Application – is a program designed to perform a specific function directly for the user.
Email – messages distributed by electronics means from one computer user to one more
recipients via a network.
Intruders – a person who goes into a place where they are not supposed to be.
IoT (Internet of things) - can sometimes be called as the Internet of Everything because it
enables all the internet-enabled devices to send, collect and play with the data they obtained from
their environment through the use of sensors, processors, communication equipments and even
actuators.
Intruders – a person who goes into a place where they are not supposed to be.
GPS (Global Positioning System) – is a space-based satellite navigation system that provides
location and time information in all weather conditions.
PWD (Person with Disabilities) – someone who has a physical or mental impairment that has a
substantial and long-term adverse effect on his/her ability to carry out normal day-to-day
activities
Seculace – it is an IoT device that has an alarm button to send distress message to the authorities
and iimmediate relatives.
Seculacers – they are the one who will use the seculace security necklace.
SMS (Short Message Service) – is a text messaging service component of most telephone,
internet, and mobile-device systems.
Scrum Task Board Workflow – uses the scrum paradigm for managing tasks. It presents a
snapshot of the current sprint backlog allowing everyone to see which tasks remain to be started,
which are progress and which are done.
Victim– a person harmed, injured, or killed as a result of a crime, accident, or other event or
action.
Chapter II
REVIEW OF RELATED LITERATURE AND STUDIES
Related Literature
Security is a tradeoff, a balancing act between attacker and defender. Unfortunately, that
balance is never static. Changes in technology affect both sides. Society uses new technologies to
decrease what I call the scope of defection — what attackers can get away with — and attackers
use new technologies to increase it. What’s interesting is the difference between how the two
groups incorporate new technologies. (Bruce Schneier, December 2013)
Physical security is the protection of life and property and includes things as diverse as
people, hardware, programs and even the data that occurs from an event that causes loss or
damage. Access control and video surveillance were built to perform very specific security
functions: keep an eye on the good people and don’t let the bad people in. At first, these
solutions were not connected to other systems and were purpose built and self-contained. CCTV
systems had cameras linked through coax cable with proprietary communications to a video
controller that sat it its own closet somewhere. Users had credentials like badges, tokens or fobs
that connected straight to the identity and access management tool system. Equipment was
monitored and serviced by facilities teams or outside contractors. Not the IT department. (Kathy
Vogler, n.d.)
We are now entering a third stage where all physical security products will eventually sit
on one common network that joins up all the sensors and devices in a building. We are calling
this the Building Internet of Things (BIoT). (Memoori, April 24, 2017)
Online security concerns are real, even if I think some people worry too much about
some of them, but physical security is overlooked far too often. Please don’t make it easier for
thieves to steal your hardware than it is for them to steal data you send over the public Internet.
(Robin "Roblimo" Miller, April 13, 2017)
When everyday social situations and cultural phenomena come to be associated with a
threat to security, security becomes a value which competes with other values – particularly the
right to privacy and human rights. In this comparison, security appears as an obvious choice over
the loss of some aspects of other values and is seen as a reasonable and worthwhile sacrifice
because of what security promises to deliver. When the value of security is elevated to the top of
the collective priorities, it becomes a meta-frame, a reference point in relation to which other
aspects of social life are articulated and organized. With the tendency to treat a variety of social
issues as security threats and the public’s growing acceptance of surveillance as an inevitable
form of social control, the security meta-frame rises to the level of a dominant organizing
principle in such a way that it shapes the parameters and the conditions of daily living. (Willem
De Lint & Vida Bajc, November 26, 2010 )
But, as new tools and techniques come to the fore in order to gain value from all this data,
we must recognise that our adversaries are engaged in this same race against time. As a result, the
odds against security professionals are rising in proportion to the amazing opportunity we have
before us. (Art Coviello, April 23, 2013)
Physical security has come a long way since the advent of the lock and key. But for all of
its changes, the greatest aspect of the evolution of physical security is how it has begun to mesh
with our digital world.
But with evolution comes a fresh set of risks and vulnerabilities, only some of which
we've learned to ameliorate. In order to make physical security work for us, we need to fully
understand the new technologies that we're incorporating into it. "We've made big advancements,
but we've been adopting them without learning them, so we've exposed ourselves in a way that
we haven't before in physical security," says Nickerson. "Risk is understanding what you're
doing, not how. If you know what you're using and you use it well, then there's no risk." (Grant
Hatchimonji, January 21, 2014)
Physical security is the protection of life and property and includes things as diverse as
people, hardware, programs and even the data that occurs from an event that causes loss or
damage. Access control and video surveillance were built to perform very specific security
functions: keep an eye on the good people and don’t let the bad people in. At first, these
solutions were not connected to other systems and were purpose built and self-contained. CCTV
systems had cameras linked through coax cable with proprietary communications to a video
controller that sat it its own closet somewhere. Users had credentials like badges, tokens or fobs
that connected straight to the identity and access management tool system. Equipment was
monitored and serviced by facilities teams or outside contractors. Not the IT department.
A breach of the independent physical security solution could be carried out with little or
no technical knowledge by the attacker. And, natural disasters and accidents are an inevitable
part of our daily lives. But the Internet of Things and interconnectivity is having a big impact on
the physical security industry. This brings two questions to mind; how do you connect physical
security devices to the Internet and ensure they are protected from hackers and how can you use
your current surveillance, access control and intrusion detection devices that are already in
place? Older, out of support systems such as Windows XP may be a critical part of a physical
security system that is now moving to the larger picture of the Internet of Things. (Kathy Vogler,
n.d.)
With the physical security industry, IoT is a bit more nuanced. Our core business is
making and keeping people, places and things safe, so as we develop products with IoT
capabilities, we have to exercise caution and maintain the high standards that currently exist in
our industry today. The integrity of the security products we provide to the market cannot and
should not be compromised in the name of IoT. As more data is moved and shared between
devices and clients, security integrity becomes more important than ever.( Per Björkdahl, October
31, 2016)
The physical security space is changing, with emerging threats, new criminal techniques,
terrorism and hostile activism just of few of the drivers of change.
The implications are profound. The world of physical security systems is being invaded
by multiple new and emerging technologies. Arguably, the technology currently showing the
greatest potential implications have a wireless Internet connection to pass their status (data) via
digital communications to other components, devices or systems. Given the growing capabilities
of these emerging IoT devices, they are likely to transform electronic security systems that
protect physical assets. Corporate security staff that operate, manage and monitor the electronic
security systems used in the facilities they are assigned, in most cases, have not been trained on
how to use the security systems equipment. (Kevin Coleman, May 11, 2017).
Related Studies
Safelet – is the bracelet that has two buttons on the side that users can press to send a message to
contact within a Guardian Network. If the situation is one of high danger, friends and family
members who see the alert can automatically call an emergency number like 911 from within the
app. The smart bracelet also syncs with the user’s mobile phone to start recording audio.
Figure 1: SAFELET WEB PAGE INTERFACE
Figure 2: SAFELET MOBILE APP INTERFACE
Roar (Anthena) - to create a simple way for women to get help. Roughly the size of a half
dollar coin, Athena activates a loud alarm when users press a button. The device then sends an
alert with the location of the user to contacts who can help. The device can be attached to a purse
or even worn as a necklace (a recessed button avoids any accidental alarms). Users can also set
the device to silent mode so that Athena still sends information to contacts without making a
sound
React Sidekick - puts peace of mind at your fingertips and is a quick way to reach a wide
network when it matters most. With just the click of a button, your custom contact list is notified
of your location. Safety app to alert your network using text/sms, Email, Facebook, Twitter and
911. Sidekick will bypass your phone’s screen lock to send an alert even if your phone is out of
reach.
Figure 5: REACT SIDEKICK WEB PAGE INTERFACE
Figure 6: REACT
SIDEKICK MOBILE
APP INTERFACE
InvisaWear – is a smart
jewelry that can be worn
around the neck and is
embedded with a double-
click function that sends
an SOS message to loved
ones and police while
sharing your GPS
location. The gold or
silver-plated charms have
a cell battery (good for a
year) and circuit board that is activated with pressure detection. It saves five emergency contacts
and connects with your smartphone via Bluetooth.
Figure 7: INVISAWEAR WEB PAGE INTERFACE
Figure 8: INVISAWEAR MOBILE APP INTERFACE
V.ALRT – is a small personal emergency button that comes with a black rubber wristband and
neck pendant. Pressing the button sends alert text messages and GPS signals to a customized list
of contacts. Users can also enable a fall detection function, which automatically signals for help if
the wearer does not respond within 60 seconds.
Competitors Analysis
Table 1
COMPETITORS ANALYSIS
Comparative Matrix
Table 2
COMPARATIVE MATRIX
Have an alarm
device that can be ✔ ✔ ✔ ✔ ✔
triggered by the
button or the phone
Object-barrier sensor
Connects to phone
via bluetooth
Auto send distress
message to nearby
seculacer
Direct connection to
the local 911 ✔
responders
Sends ERM to the
seculacers’
immediate relatives
✔ ✔
through email and
message
Legal Basis
Aside from the technological facet of developing a technology, we are also taking
consideration the ethical and legal aspects in developing Seculace. As provided in Chapter II Sec.
8 of R.A No. 10173, The Commission shall ensure at all times the confidentiality of any personal
information that comes to its knowledge and possession. Beneath depicts the subtle factors of
Republic Act No. 10173.
REPUBLIC ACT NO. 10173
CHAPTER I
GENERAL PROVISIONS
SECTION 1. Short Title. – This Act shall be known as the “Data Privacy Act of 2012”.
SEC. 2. Declaration of Policy. – It is the policy of the State to protect the fundamental human
right of privacy, of communication while ensuring free flow of information to promote
innovation and growth. The State recognizes the vital role of information and communications
technology in nation-building and its inherent obligation to ensure that personal information in
information and communications systems in the government and in the private sector are secured
and protected.
SEC. 3. Definition of Terms. – Whenever used in this Act, the following terms shall have the
respective meanings hereafter set forth:
(a) Commission shall refer to the National Privacy Commission created by virtue of this Act.
(b) Consent of the data subject refers to any freely given, specific, informed indication of will,
whereby the data subject agrees to the collection and processing of personal information about
and/or relating to him or her. Consent shall be evidenced by written, electronic or recorded
means. It may also be given on behalf of the data subject by an agent specifically authorized by
the data subject to do so.
(e) Filing system refers to any act of information relating to natural or juridical persons to the
extent that, although the information is not processed by equipment operating automatically in
response to instructions given for that purpose, the set is structured, either by reference to
individuals or by reference to criteria relating to individuals, in such a way that specific
information relating to a particular person is readily accessible.
(1) A person or organization who performs such functions as instructed by another person or
organization; and
(2) An individual who collects, holds, processes or uses personal information in connection with
the individual’s personal, family or household affairs.
(k) Privileged information refers to any and all forms of data which under the Rules of Court and
other pertinent laws constitute privileged communication.
(1) About an individual’s race, ethnic origin, marital status, age, color, and religious,
philosophical or political affiliations;
(2) About an individual’s health, education, genetic or sexual life of a person, or to any
proceeding for any offense committed or alleged to have been committed by such person, the
disposal of such proceedings, or the sentence of any court in such proceedings;
(3) Issued by government agencies peculiar to an individual which includes, but not limited to,
social security numbers, previous or cm-rent health records, licenses or its denials, suspension or
revocation, and tax returns; and
SEC. 4. Scope. – This Act applies to the processing of all types of personal information and to
any natural and juridical person involved in personal information processing including those
personal information controllers and processors who, although not found or established in the
Philippines, use equipment that are located in the Philippines, or those who maintain an office,
branch or agency in the Philippines subject to the immediately succeeding
paragraph: Provided, That the requirements of Section 5 are complied with.
This Act does not apply to the following:
(a) Information about any individual who is or was an officer or employee of a government
institution that relates to the position or functions of the individual, including:
(1) The fact that the individual is or was an officer or employee of the government institution;
(2) The title, business address and office telephone number of the individual;
(3) The classification, salary range and responsibilities of the position held by the individual; and
(4) The name of the individual on a document prepared by the individual in the course of
employment with the government;
(b) Information about an individual who is or was performing service under contract for a
government institution that relates to the services performed, including the terms of the contract,
and the name of the individual given in the course of the performance of those services;
(c) Information relating to any discretionary benefit of a financial nature such as the granting of a
license or permit given by the government to an individual, including the name of the individual
and the exact nature of the benefit;
(d) Personal information processed for journalistic, artistic, literary or research purposes;
(e) Information necessary in order to carry out the functions of public authority which includes
the processing of personal data for the performance by the independent, central monetary
authority and law enforcement and regulatory agencies of their constitutionally and statutorily
mandated functions. Nothing in this Act shall be construed as to have amended or repealed
Republic Act No. 1405, otherwise known as the Secrecy of Bank Deposits Act; Republic Act No.
6426, otherwise known as the Foreign Currency Deposit Act; and Republic Act No. 9510,
otherwise known as the Credit Information System Act (CISA);
(f) Information necessary for banks and other financial institutions under the jurisdiction of the
independent, central monetary authority or Bangko Sentral ng Pilipinas to comply with Republic
Act No. 9510, and Republic Act No. 9160, as amended, otherwise known as the Anti-Money
Laundering Act and other applicable laws; and
(g) Personal information originally collected from residents of foreign jurisdictions in accordance
with the laws of those foreign jurisdictions, including any applicable data privacy laws, which is
being processed in the Philippines.
SEC. 5. Protection Afforded to Journalists and Their Sources. – Nothing in this Act shall be
construed as to have amended or repealed the provisions of Republic Act No. 53, which affords
the publishers, editors or duly accredited reporters of any newspaper, magazine or periodical of
general circulation protection from being compelled to reveal the source of any news report or
information appearing in said publication which was related in any confidence to such publisher,
editor, or reporter.
SEC. 6. Extraterritorial Application. – This Act applies to an act done or practice engaged in and
outside of the Philippines by an entity if:
(a) The act, practice or processing relates to personal information about a Philippine citizen or a
resident;
(b) The entity has a link with the Philippines, and the entity is processing personal information in
the Philippines or even if the processing is outside the Philippines as long as it is about Philippine
citizens or residents such as, but not limited to, the following:
(2) A juridical entity unincorporated in the Philippines but has central management and control in
the country; and
(3) An entity that has a branch, agency, office or subsidiary in the Philippines and the parent or
affiliate of the Philippine entity has access to personal information; and
(c) The entity has other links in the Philippines such as, but not limited to:
(2) The personal information was collected or held by an entity in the Philippines.
CHAPTER II
THE NATIONAL PRIVACY COMMISSION
SEC. 7. Functions of the National Privacy Commission. – To administer and implement the
provisions of this Act, and to monitor and ensure compliance of the country with international
standards set for data protection, there is hereby created an independent body to be known as the
National Privacy Commission, winch shall have the following functions:
(a) Ensure compliance of personal information controllers with the provisions of this Act;
(c) Issue cease and desist orders, impose a temporary or permanent ban on the processing of
personal information, upon finding that the processing will be detrimental to national security and
public interest;
(d) Compel or petition any entity, government agency or instrumentality to abide by its orders or
take action on a matter affecting data privacy;
(e) Monitor the compliance of other government agencies or instrumentalities on their security
and technical measures and recommend the necessary action in order to meet minimum standards
for protection of personal information pursuant to this Act;
(f) Coordinate with other government agencies and the private sector on efforts to formulate and
implement plans and policies to strengthen the protection of personal information in the country;
(g) Publish on a regular basis a guide to all laws relating to data protection;
(h) Publish a compilation of agency system of records and notices, including index and other
finding aids;
(i) Recommend to the Department of Justice (DOJ) the prosecution and imposition of penalties
specified in Sections 25 to 29 of this Act;
(j) Review, approve, reject or require modification of privacy codes voluntarily adhered to by
personal information controllers: Provided, That the privacy codes shall adhere to the underlying
data privacy principles embodied in this Act: Provided, further, That such privacy codes may
include private dispute resolution mechanisms for complaints against any participating personal
information controller. For this purpose, the Commission shall consult with relevant regulatory
agencies in the formulation and administration of privacy codes applying the standards set out in
this Act, with respect to the persons, entities, business activities and business sectors that said
regulatory bodies are authorized to principally regulate pursuant to the law: Provided,
finally. That the Commission may review such privacy codes and require changes thereto for
purposes of complying with this Act;
(k) Provide assistance on matters relating to privacy or data protection at the request of a national
or local agency, a private entity or any person;
(l) Comment on the implication on data privacy of proposed national or local statutes, regulations
or procedures, issue advisory opinions and interpret the provisions of this Act and other data
privacy laws;
(n) Ensure proper and effective coordination with data privacy regulators in other countries and
private accountability agents, participate in international and regional initiatives for data privacy
protection;
(o) Negotiate and contract with other data privacy authorities of other countries for cross-border
application and implementation of respective privacy laws;
(p) Assist Philippine companies doing business abroad to respond to foreign privacy or data
protection laws and regulations; and
(q) Generally perform such acts as may be necessary to facilitate cross-border enforcement of
data privacy protection.
SEC. 8. Confidentiality. – The Commission shall ensure at all times the confidentiality of any
personal information that comes to its knowledge and possession.
SEC. 9. Organizational Structure of the Commission. – The Commission shall be attached to the
Department of Information and Communications Technology (DICT) and shall be headed by a
Privacy Commissioner, who shall also act as Chairman of the Commission. The Privacy
Commissioner shall be assisted by two (2) Deputy Privacy Commissioners, one to be responsible
for Data Processing Systems and one to be responsible for Policies and Planning. The Privacy
Commissioner and the two (2) Deputy Privacy Commissioners shall be appointed by the
President of the Philippines for a term of three (3) years, and may be reappointed for another term
of three (3) years. Vacancies in the Commission shall be filled in the same manner in which the
original appointment was made.
The Privacy Commissioner must be at least thirty-five (35) years of age and of good moral
character, unquestionable integrity and known probity, and a recognized expert in the field of
information technology and data privacy. The Privacy Commissioner shall enjoy the benefits,
privileges and emoluments equivalent to the rank of Secretary.
The Deputy Privacy Commissioners must be recognized experts in the field of information and
communications technology and data privacy. They shall enjoy the benefits, privileges and
emoluments equivalent to the rank of Undersecretary.
The Privacy Commissioner, the Deputy Commissioners, or any person acting on their behalf or
under their direction, shall not be civilly liable for acts done in good faith in the performance of
their duties. However, he or she shall be liable for willful or negligent acts done by him or her
which are contrary to law, morals, public policy and good customs even if he or she acted under
orders or instructions of superiors: Provided, That in case a lawsuit is filed against such official
on the subject of the performance of his or her duties, where such performance is lawful, he or
she shall be reimbursed by the Commission for reasonable costs of litigation.
CHAPTER III
PROCESSING OF PERSONAL INFORMATION
SEC. 11. General Data Privacy Principles. – The processing of personal information shall be
allowed, subject to compliance with the requirements of this Act and other laws allowing
disclosure of information to the public and adherence to the principles of transparency, legitimate
purpose and proportionality.
(c) Accurate, relevant and, where necessary for purposes for which it is to be used the processing
of personal information, kept up to date; inaccurate or incomplete data must be rectified,
supplemented, destroyed or their further processing restricted;
(d) Adequate and not excessive in relation to the purposes for which they are collected and
processed;
(e) Retained only for as long as necessary for the fulfillment of the purposes for which the data
was obtained or for the establishment, exercise or defense of legal claims, or for legitimate
business purposes, or as provided by law; and
(f) Kept in a form which permits identification of data subjects for no longer than is necessary for
the purposes for which the data were collected and processed: Provided, That personal
information collected for other purposes may lie processed for historical, statistical or scientific
purposes, and in cases laid down in law may be stored for longer periods: Provided, further,That
adequate safeguards are guaranteed by said laws authorizing their processing.
SEC. 12. Criteria for Lawful Processing of Personal Information. – The processing of personal
information shall be permitted only if not otherwise prohibited by law, and when at least one of
the following conditions exists:
(b) The processing of personal information is necessary and is related to the fulfillment of a
contract with the data subject or in order to take steps at the request of the data subject prior to
entering into a contract;
(c) The processing is necessary for compliance with a legal obligation to which the personal
information controller is subject;
(d) The processing is necessary to protect vitally important interests of the data subject, including
life and health;
(e) The processing is necessary in order to respond to national emergency, to comply with the
requirements of public order and safety, or to fulfill functions of public authority which
necessarily includes the processing of personal data for the fulfillment of its mandate; or
(f) The processing is necessary for the purposes of the legitimate interests pursued by the personal
information controller or by a third party or parties to whom the data is disclosed, except where
such interests are overridden by fundamental rights and freedoms of the data subject which
require protection under the Philippine Constitution.
(a) The data subject has given his or her consent, specific to the purpose prior to the processing,
or in the case of privileged information, all parties to the exchange have given their consent prior
to processing;
(b) The processing of the same is provided for by existing laws and regulations: Provided, That
such regulatory enactments guarantee the protection of the sensitive personal information and the
privileged information: Provided, further, That the consent of the data subjects are not required
by law or regulation permitting the processing of the sensitive personal information or the
privileged information;
(c) The processing is necessary to protect the life and health of the data subject or another person,
and the data subject is not legally or physically able to express his or her consent prior to the
processing;
(d) The processing is necessary to achieve the lawful and noncommercial objectives of public
organizations and their associations: Provided, That such processing is only confined and related
to the bona fide members of these organizations or their associations: Provided, further, That the
sensitive personal information are not transferred to third parties: Provided, finally,That consent
of the data subject was obtained prior to processing;
(e) The processing is necessary for purposes of medical treatment, is carried out by a medical
practitioner or a medical treatment institution, and an adequate level of protection of personal
information is ensured; or
(f) The processing concerns such personal information as is necessary for the protection of lawful
rights and interests of natural or legal persons in court proceedings, or the establishment, exercise
or defense of legal claims, or when provided to government or public authority.
CHAPTER IV
RIGHTS OF THE DATA SUBJECT
SEC. 16. Rights of the Data Subject. – The data subject is entitled to:
(a) Be informed whether personal information pertaining to him or her shall be, are being or have
been processed;
(b) Be furnished the information indicated hereunder before the entry of his or her personal
information into the processing system of the personal information controller, or at the next
practical opportunity:
(4) The recipients or classes of recipients to whom they are or may be disclosed;
(5) Methods utilized for automated access, if the same is allowed by the data subject, and the
extent to which such access is authorized;
(6) The identity and contact details of the personal information controller or its representative;
(7) The period for which the information will be stored; and
(8) The existence of their rights, i.e., to access, correction, as well as the right to lodge a
complaint before the Commission.
Any information supplied or declaration made to the data subject on these matters shall not be
amended without prior notification of data subject: Provided, That the notification under
subsection (b) shall not apply should the personal information be needed pursuant to
a subpoena or when the collection and processing are for obvious purposes, including when it is
necessary for the performance of or in relation to a contract or service or when necessary or
desirable in the context of an employer-employee relationship, between the collector and the data
subject, or when the information is being collected and processed as a result of legal obligation;
(6) Information on automated processes where the data will or likely to be made as the sole basis
for any decision significantly affecting or will affect the data subject;
(7) Date when his or her personal information concerning the data subject were last accessed and
modified; and
(8) The designation, or name or identity and address of the personal information controller;
(d) Dispute the inaccuracy or error in the personal information and have the personal information
controller correct it immediately and accordingly, unless the request is vexatious or otherwise
unreasonable. If the personal information have been corrected, the personal information controller
shall ensure the accessibility of both the new and the retracted information and the simultaneous
receipt of the new and the retracted information by recipients thereof: Provided, That the third
parties who have previously received such processed personal information shall he informed of
its inaccuracy and its rectification upon reasonable request of the data subject;
(e) Suspend, withdraw or order the blocking, removal or destruction of his or her personal
information from the personal information controller’s filing system upon discovery and
substantial proof that the personal information are incomplete, outdated, false, unlawfully
obtained, used for unauthorized purposes or are no longer necessary for the purposes for which
they were collected. In this case, the personal information controller may notify third parties who
have previously received such processed personal information; and
(f) Be indemnified for any damages sustained due to such inaccurate, incomplete, outdated, false,
unlawfully obtained or unauthorized use of personal information.
SEC. 17. Transmissibility of Rights of the Data Subject. – The lawful heirs and assigns of the data
subject may invoke the rights of the data subject for, which he or she is an heir or assignee at any
time after the death of the data subject or when the data subject is incapacitated or incapable of
exercising the rights as enumerated in the immediately preceding section.
SEC. 18. Right to Data Portability. – The data subject shall have the right, where personal
information is processed by electronic means and in a structured and commonly used format, to
obtain from the personal information controller a copy of data undergoing processing in an
electronic or structured format, which is commonly used and allows for further use by the data
subject. The Commission may specify the electronic format referred to above, as well as the
technical standards, modalities and procedures for their transfer.
SEC. 19. Non-Applicability. – The immediately preceding sections are not applicable if the
processed personal information are used only for the needs of scientific and statistical research
and, on the basis of such, no activities are carried out and no decisions are taken regarding the
data subject: Provided, That the personal information shall be held under strict confidentiality
and shall be used only for the declared purpose. Likewise, the immediately preceding sections are
not applicable to processing of personal information gathered for the purpose of investigations in
relation to any criminal, administrative or tax liabilities of a data subject.
CHAPTER V
SECURITY OF PERSONAL INFORMATION
SEC. 20. Security of Personal Information. – (a) The personal information controller must
implement reasonable and appropriate organizational, physical and technical measures intended
for the protection of personal information against any accidental or unlawful destruction,
alteration and disclosure, as well as against any other unlawful processing.
(b) The personal information controller shall implement reasonable and appropriate measures to
protect personal information against natural dangers such as accidental loss or destruction, and
human dangers such as unlawful access, fraudulent misuse, unlawful destruction, alteration and
contamination.
(c) The determination of the appropriate level of security under this section must take into
account the nature of the personal information to be protected, the risks represented by the
processing, the size of the organization and complexity of its operations, current data privacy best
practices and the cost of security implementation. Subject to guidelines as the Commission may
issue from time to time, the measures implemented must include:
(1) Safeguards to protect its computer network against accidental, unlawful or unauthorized usage
or interference with or hindering of their functioning or availability;
(3) A process for identifying and accessing reasonably foreseeable vulnerabilities in its computer
networks, and for taking preventive, corrective and mitigating action against security incidents
that can lead to a security breach; and
(4) Regular monitoring for security breaches and a process for taking preventive, corrective and
mitigating action against security incidents that can lead to a security breach.
(d) The personal information controller must further ensure that third parties processing personal
information on its behalf shall implement the security measures required by this provision.
(e) The employees, agents or representatives of a personal information controller who are
involved in the processing of personal information shall operate and hold personal information
under strict confidentiality if the personal information are not intended for public disclosure. This
obligation shall continue even after leaving the public service, transfer to another position or upon
termination of employment or contractual relations.
(f) The personal information controller shall promptly notify the Commission and affected data
subjects when sensitive personal information or other information that may, under the
circumstances, be used to enable identity fraud are reasonably believed to have been acquired by
an unauthorized person, and the personal information controller or the Commission believes (bat
such unauthorized acquisition is likely to give rise to a real risk of serious harm to any affected
data subject. The notification shall at least describe the nature of the breach, the sensitive personal
information possibly involved, and the measures taken by the entity to address the breach.
Notification may be delayed only to the extent necessary to determine the scope of the breach, to
prevent further disclosures, or to restore reasonable integrity to the information and
communications system.
(1) In evaluating if notification is unwarranted, the Commission may take into account
compliance by the personal information controller with this section and existence of good faith in
the acquisition of personal information.
(2) The Commission may exempt a personal information controller from notification where, in its
reasonable judgment, such notification would not be in the public interest or in the interests of the
affected data subjects.
(3) The Commission may authorize postponement of notification where it may hinder the
progress of a criminal investigation related to a serious breach.
CHAPTER VI
ACCOUNTABILITY FOR TRANSFER OF PERSONAL INFORMATION
(a) The personal information controller is accountable for complying with the requirements of
this Act and shall use contractual or other reasonable means to provide a comparable level of
protection while the information are being processed by a third party.
(b) The personal information controller shall designate an individual or individuals who are
accountable for the organization’s compliance with this Act. The identity of the individual(s) so
designated shall be made known to any data subject upon request.
CHAPTER VII
SECURITY OF SENSITIVE PERSONAL
INFORMATION IN GOVERNMENT
(b) Off-site Access – Unless otherwise provided in guidelines to be issued by the Commission,
sensitive personal information maintained by an agency may not be transported or accessed from
a location off government property unless a request for such transportation or access is submitted
and approved by the head of the agency in accordance with the following guidelines:
(1) Deadline for Approval or Disapproval – In the case of any request submitted to the head of an
agency, such head of the agency shall approve or disapprove the request within two (2) business
days after the date of submission of the request. In case there is no action by the head of the
agency, then such request is considered disapproved;
(2) Limitation to One thousand (1,000) Records – If a request is approved, the head of the agency
shall limit the access to not more than one thousand (1,000) records at a time; and
(3) Encryption – Any technology used to store, transport or access sensitive personal information
for purposes of off-site access approved under this subsection shall be secured by the use of the
most secure encryption standard recognized by the Commission.
The requirements of this subsection shall be implemented not later than six (6) months after the
date of the enactment of this Act.
SEC. 24. Applicability to Government Contractors. – In entering into any contract that may
involve accessing or requiring sensitive personal information from one thousand (1,000) or more
individuals, an agency shall require a contractor and its employees to register their personal
information processing system with the Commission in accordance with this Act and to comply
with the other provisions of this Act including the immediately preceding section, in the same
manner as agencies and government employees comply with such requirements.
CHAPTER VIII
PENALTIES
SEC. 27. Improper Disposal of Personal Information and Sensitive Personal Information. – (a)
The improper disposal of personal information shall be penalized by imprisonment ranging from
six (6) months to two (2) years and a fine of not less than One hundred thousand pesos
(Php100,000.00) but not more than Five hundred thousand pesos (Php500,000.00) shall be
imposed on persons who knowingly or negligently dispose, discard or abandon the personal
information of an individual in an area accessible to the public or has otherwise placed the
personal information of an individual in its container for trash collection.
b) The improper disposal of sensitive personal information shall be penalized by imprisonment
ranging from one (1) year to three (3) years and a fine of not less than One hundred thousand
pesos (Php100,000.00) but not more than One million pesos (Php1,000,000.00) shall be imposed
on persons who knowingly or negligently dispose, discard or abandon the personal information of
an individual in an area accessible to the public or has otherwise placed the personal information
of an individual in its container for trash collection.
The processing of sensitive personal information for unauthorized purposes shall be penalized by
imprisonment ranging from two (2) years to seven (7) years and a fine of not less than Five
hundred thousand pesos (Php500,000.00) but not more than Two million pesos
(Php2,000,000.00) shall be imposed on persons processing sensitive personal information for
purposes not authorized by the data subject, or otherwise authorized under this Act or under
existing laws.
SEC. 34. Extent of Liability. – If the offender is a corporation, partnership or any juridical person,
the penalty shall be imposed upon the responsible officers, as the case may be, who participated
in, or by their gross negligence, allowed the commission of the crime. If the offender is a juridical
person, the court may suspend or revoke any of its rights under this Act. If the offender is an
alien, he or she shall, in addition to the penalties herein prescribed, be deported without further
proceedings after serving the penalties prescribed. If the offender is a public official or employee
and lie or she is found guilty of acts penalized under Sections 27 and 28 of this Act, he or she
shall, in addition to the penalties prescribed herein, suffer perpetual or temporary absolute
disqualification from office, as the case may be.
SEC. 35. Large-Scale. – The maximum penalty in the scale of penalties respectively provided for
the preceding offenses shall be imposed when the personal information of at least one hundred
(100) persons is harmed, affected or involved as the result of the above mentioned actions.
SEC. 36. Offense Committed by Public Officer. – When the offender or the person responsible for
the offense is a public officer as defined in the Administrative Code of the Philippines in the
exercise of his or her duties, an accessory penalty consisting in the disqualification to occupy
public office for a term double the term of criminal penalty imposed shall he applied.
SEC. 37. Restitution. – Restitution for any aggrieved party shall be governed by the provisions of
the New Civil Code.
CHAPTER IX
MISCELLANEOUS PROVISIONS
SEC. 38. Interpretation. – Any doubt in the interpretation of any provision of this Act shall be
liberally interpreted in a manner mindful of the rights and interests of the individual about whom
personal information is processed.
SEC. 39. Implementing Rules and Regulations (IRR). – Within ninety (90) days from the
effectivity of this Act, the Commission shall promulgate the rules and regulations to effectively
implement the provisions of this Act.
SEC. 40. Reports and Information. – The Commission shall annually report to the President and
Congress on its activities in carrying out the provisions of this Act. The Commission shall
undertake whatever efforts it may determine to be necessary or appropriate to inform and educate
the public of data privacy, data protection and fair information rights and responsibilities.
SEC. 41. Appropriations Clause. – The Commission shall be provided with an initial
appropriation of Twenty million pesos (Php20,000,000.00) to be drawn from the national
government. Appropriations for the succeeding years shall be included in the General
Appropriations Act. It shall likewise receive Ten million pesos (Php10,000,000.00) per year for
five (5) years upon implementation of this Act drawn from the national government.
SEC. 42. Transitory Provision. – Existing industries, businesses and offices affected by the
implementation of this Act shall be given one (1) year transitory period from the effectivity of the
IRR or such other period as may be determined by the Commission, to comply with the
requirements of this Act.
In case that the DICT has not yet been created by the time the law takes full force and effect, the
National Privacy Commission shall be attached to the Office of the President.
SEC. 43. Separability Clause. – If any provision or part hereof is held invalid or unconstitutional,
the remainder of the law or the provision not otherwise affected shall remain valid and subsisting.
SEC. 44. Repealing Clause. – The provision of Section 7 of Republic Act No. 9372, otherwise
known as the “Human Security Act of 2007”, is hereby amended. Except as otherwise expressly
provided in this Act, all other laws, decrees, executive orders, proclamations and administrative
regulations or parts thereof inconsistent herewith are hereby repealed or modified accordingly.
SEC. 45. Effectivity Clause. – This Act shall take effect fifteen (15) days after its publication in at
least two (2) national newspapers of general circulation. Approved: August 15, 2012
CHAPTER 3
RESEARCH METHODOLOGY
Planning/Conception-Initiation Phase
Business Model Canvas