DPA Summary
DPA Summary
DPA Summary
BACKGROUND
This summary report serves to cascade the relevant topics, as discussed in the DPO
Briefing at the National Privacy Commission Office at PICC Complex, to the partners, associates
and other staff of the law office. The following report contain notes by Vincent Joshua D. Bohol
(VJB) during the DPO Briefing and citations from the NPC website at www.privacy.gov.ph. The
powerpoint presentations and other related materials shall follow as soon as I received the same
from the Commission.
For more reference of the Data Privacy Act and it’s Implementing Rules and Regulation
and related issuances of the National Privacy Commission please feel free to read the Data
Privacy Compendium and Data Privacy Toolkit provided by the NPC for the Law Office of
Morales & Justiniano Law.
As a brief introduction, Republic Act No. 10173 or the Data Privacy Act (DPA) aims to
protect personal data in information and communications systems both in the government and
the private sector. The DPA intends to increase the benefits of data collection and decrease or
eliminate the risk of data breach. It ensures that entities or organizations processing personal data
establish policies, and implement measures and procedures that guarantee the safety and security
of personal data under their control or custody, thereby upholding an individual’s data privacy
rights.
A. Definition of Terms
a. Data subject refers to an individual whose personal information is processed.
f. Privileged information refers to any and all forms of data which under the
Rules of Court and other pertinent laws constitute privileged communication.
A DSA is a contract, joint issuance or similar document that contains the terms and
conditions of a data sharing arrangement between 2 or more parties.
All parties to a DSA are considered PIC. Accordingly, it is different from an outsourcing
or subcontracting agreement.
Unless a law says otherwise, the consent of a data subject must always be obtained before
his or her personal data is shared.
Data Sharing must always adhere to the data privacy principles laid down in the DPA, it’s
IRR, and all issuances of the NPC
Prior approval of the NPC is not required for the execution of DSAs. However, the NPC
may review a DSA at any time.
PIC and PIP are required to appoint or designate a DPO. The DPO will be accountable
for ensuring compliance by the PIC or PIP with the Data Privacy Act, it’s IRR and
related issuances of the NPC.
The DPO must be a full time or organic employee of the PIC or PIP. Where the
employment of the DPO is based on a contract, the term of the contract should be at least
2 years to ensure stability
The DPO should be knowledgeable on relevant privacy or data protection policies and
practices, and the processing operations of the PIC or PIP.
The provisions of NPC Advisory 17-01 (pages 156-166 of the DPA Compendium) dated
March 14, 2017 may serve as a guide in the designation of the DPO.
The designation, postal address, dedicated telephone number, and e-mail address of the
DPO should be included in the:
a. Website
b. Privacy policy
c. Privacy notice
d. Privacy manual
The name or names of the DPO need not be published. However, it should be made
available upon request by the data subject and or the NPC.
Every organization or entity needs to appoint a DPO but not every organization or
entity needs to register their DPO. DPOs require registration with NPC when the PIC
or PIP shall register its data processing system under any of the following conditions:
A. the PIC or PIP employs at least two hundred fifty (250) employees;
C. the processing is likely to pose a risk to the rights and freedoms of data subjects.
Processing operations that pose a risk to data subjects include those that involve:
1.) information that would likely affect national security, public safety, public order, or
public health;
3.) vulnerable data subjects like minors, the mentally ill, asylum seekers, the elderly,
patients, those involving criminal offenses, or in any other case where an imbalance
exists in the relationship between a data subject and a PIC or PIP;
5.) profiling;
a. monitor the PIC’s or PIP’s compliance with the DPA, its IRR, issuances by the NPC
and other applicable laws and policies. You may:
1. collect information to identify the processing operations, activities, measures,
projects, programs, or systems of the PIC or PIP, and maintain a record
thereof;
2. analyze and check the compliance of processing activities, including the
issuance of security clearances to and compliance by third-party service
providers;
3. inform, advise, and issue recommendations to the PIC or PIP;
4. ascertain renewal of accreditations or certifications necessary to maintain the
required standards in personal data processing; and
5. advice the PIP or PIP as regards the necessity of executing a Data Sharing
Agreement with third parties, and ensure its compliance with the law;
b. ensure the conduct of Privacy Impact Assessments relative to activities, measures,
projects, programs, or systems of the PIC or PIP;
c. advise the PIC or PIP regarding complaints and/or the exercise by data subjects of
their rights (e.g., requests for information, clarifications, rectification or deletion of
personal data);
d. ensure proper data breach and security incident management by the PIC or PIP,
including the latter’s preparation and submission to the NPC of reports and other
documentation concerning security incidents or data breaches within the prescribed
period;
e. inform and cultivate awareness on privacy and data protection within your
organization, including all relevant laws, rules and regulations and issuances of the
NPC;
f. advocate for the development, review and/or revision of policies, guidelines, projects
and/or programs of the PIC or PIP relating to privacy and data protection, by adopting
a privacy by design approach;
g. serve as the contact person of the PIC or PIP vis-à-vis data subjects, the NPC and
other authorities in all matters concerning data privacy or security issues or concerns
and the PIC or PIP;
h. cooperate, coordinate and seek advice of the NPC regarding matters concerning data
privacy and security; and
i. perform other duties and tasks that may be assigned by the PIC or PIP that will
further the interest of data privacy and security and uphold the rights of the data
subjects.
1. The right to be informed means that the data subject has the right to know
when his or her personal data shall be, are being, or have been processed. Collection and
processing of data without the data subject’s knowledge and explicit consent is made
unlawful, and entities in possession of personal data is obligated to inform the data
subject of any breaches or compromises in their data.
2. The right to access involves being able to compel any entity possessing any
personal data to provide the data subject with a description of such data in its possession,
as well as the purposes for which they are to be or are being processed. Furthermore,
other details regarding the processing of their information may be obtained, such as the
period for which the information will be stored, and the recipients to whom the
information may be disclosed. This must be complied with in an easy-to-access format,
accompanied by a description in plain language.
3. The right to object requires that the consent of the data subject be secured in
the collecting and processing of his or her data. It grants the data subject the choice of
refusing to consent, as well as the choice to withdraw consent, as regards collection and
processing. As earlier stated, any activity involving a data subject’s personal data without
his or her consent is deemed illegal.
4. The right to erasure or blocking allows the data subject to suspend,
withdraw or order the blocking, removal, destruction of his or her personal information
from the personal information controller’s filing system upon discovery and substantial
proof that the personal information are incomplete, outdated, false, unlawfully obtained,
used for unauthorized purposes or are no longer necessary for the purposes for which
they were collected. This is akin to the recognized right to be forgotten.
5. The right to rectify, allows the data subject to dispute any inaccuracy or
error in the personal information processed, and to have the personal information
controller correct it immediately. In line with this, the personal information controller
must ensure that the new and the retracted information will be accessible, and that third
parties who received the erroneous data will be informed, upon the request of the data
subject.
6. The right to data portability enables the data subject to obtain and
electronically move, copy, or transfer personal data for further use. This also carries out
another policy behind the law–ensuring the free flow of personal information.
7. The right to file a complaint with the National Privacy Commission affords a
remedy to any data subject who “[feels] that [his or her] personal information has been
misused, maliciously disclosed, or improperly disposed,” or in case of any violation of
his or her data privacy rights.
8. The right to damages entitles the aggrieved data subject to be indemnified for
any damages sustained due to inaccurate, incomplete, outdated, false, unlawfully
obtained or unauthorized use of his or her personal information.
E. Penalties
The Philippines is the only jurisdiction in the international plane that imposes imprisonment
in case of violation of data privacy rights. Other jurisdictions impose fines but in much
exorbitant amounts as compared to ours.
Legitimate Purpose, on the other hand, states that personal information must be collected
for specified and legitimate purposes determined and declared before, or as soon as
reasonably practicable after collection.
PIC and PIP are required to appoint or designate a DPO. The DPO will be accountable
for ensuring compliance by the PIC or PIP with the Data Privacy Act, it’s IRR and
related issuances of the NPC.
A PIA is a process undertaken and used by a government agency to evaluate and manage
the impact of its program, process and/or measure on data privacy.
The measures laid out in your privacy and data protection policies should not remain
theoretical. They must be continuously assessed, reviewed, and revised as necessary,
while training must be regularly conducted
PIA is a process used to evaluate and manage the impact of a program, process, system
and/or measure on data privacy.
The process takes into account the nature of the personal data to be protected and
evaluates the risks to privacy and security represented by the processing of personal data.
The PIA guides the PIC or PIP through the process of understanding the personal data
flow in the organization, identifying and assessing various privacy risks, and proposing
measures to address these risks. Proposed measures should consider the size of the
organization, complexity of its operations, current data privacy best practices and the cost
of security implementation.
The ultimate goal of a PIA is personal data protection, to increase the benefits and
decrease the harms of processing personal information.
3. Identification and assessment of the risks to the rights and freedoms of data subjects
associated with the personal data processing, and any proposed measures to address the
risks.
Benefits of PIA
- Good governance
- Compliance with the law
- Cost effective
- Mitigate privacy risks
- Privacy strategy and awareness
Note: The PIC must identify the uses personal data and determine the need for consent of
the data subject.
The DPO must ensure the conduct of a PIA as part of his duties under the DPA.
The Privacy Risk Rating is a tool used to determine whether the impact of privacy
measures will probably cause risk/s on data breach. If the information is sensitive the
impact will be more harmful. Security measures will limit risks and, thus, minimizes our
data risk probability ratio.
The tables and formulas can be seen in the NPC Toolkit, under the Chapter Privacy
Impact Assessment, for your convenience. The following is a sample illustration of a
Risk Rating Formula:
Rating Types
1 Negligible
2 to 4 Low Risk
6 to 9 Medium Risk
10 to 16 High Risk
Residual Risks should also be included in the PIA. It means risk remaining after risk
treatment.
A PMP serves to align everyone in the organization in the same direction, to facilitate
compliance with the DPA and issuances of the NPC, and to help your organization in
mitigating the impact of a data breach.
When the PMP is part of the organization structure, it will help create an internal culture
protective of data privacy rights of an individuals.
1. Organizational Commitment
Buy-in from the Top – since policies require top management support, the management
of an organization or entity must:
2. Program Controls
A Program Control is a very important protocol! – When the NPC implements their audit,
they will look in to the organizations Program Controls.
NOTE: We need to translate our PMP into a Privacy Manual. Lawyers, designated DPO
and other staff in charge of personal data processing should be on top of the drafting of
our firm’s Privacy Manual.
NOTES:
The NPC requires not only paper compliance but also operational compliance
In accordance with Sec. 16 (b) of the DPA: “The data subject is entitled
to: xxxx Be furnished the information indicated hereunder before the entry of his
or her personal information into the processing system of the personal
information controller, or at the next practical opportunity:
(4) The recipients or classes of recipients to whom they are or may be disclosed;
(5) Methods utilized for automated access, if the same is allowed by the data
subject, and the extent to which such access is authorized;
(6) The identity and contact details of the personal information controller or its
representative;
(7) The period for which the information will be stored; and
(8) The existence of their rights, i.e., to access, correction, as well as the right to
lodge a complaint before the Commission.
If a data subject wants to file a complaint or exercise his right to data privacy, the
PIC/PIP must have a privacy notice containing the contact details of the DPO.
Always apprise the data subjects rights under the DPA and other related laws or
NPC issuances.
Data Security
o There is no need for expensive data protection as the law only requires
reasonable and appropriate security measures.
Third Parties
o Data Sharing Agreement (DSA) - a contract, joint issuance or similar
document that contains the terms and conditions of a data sharing
arrangement between 2 or more parties.
Must be between a PIC and another PIC
If its between a PIC and a PIP, it is not a DSA but an Outsourcing
Agreement.
o DSA Requisites:
Consent of the Data Subject
Established adequate safeguards for data privacy and security, and
upholding of the rights of data subjects
Provide data subjects with required information prior to collection
or before data is shared
Adherence to Data Privacy Principles (Transparency, Legitimate
Purpose and Proportionality)
Data subjects must have means to access DSA.
o Outsourcing Agreement (OA)
Section 43, Rule X of the IRR-DPA states that:
An OA must only be between a PIC and a PIP. The two parties will
have a Principal-Agent Relationship. Accordingly, the provisions of
the Civil Code under Agency will apply to the parties of an OA.
When a PIC outsourced a mail courier, and the processing of mail or
other matter contains personal information, sensitive personal
information or privileged personal information, the latter is
considered a PIP. In such a case the consent of a data subject is not
required for the processing of the personal data.
NOTES:
There are cases when a breach transpires in spite of compliance with the NPA.
“The personal information controller shall promptly notify the Commission and affected data
subjects when sensitive personal information or other information that may, under the circumstances,
be used to enable identity fraud are reasonably believed to have been acquired by an unauthorized
person, and the personal information controller or the Commission believes that such unauthorized
acquisition is likely to give rise to a real risk of serious harm to any affected data subject. The
notification shall at least describe the nature of the breach, the sensitive personal information
possibly involved, and the measures taken by the entity to address the breach. Notification may be
delayed only to the extent necessary to determine the scope of the breach, to prevent further
disclosures, or to restore reasonable integrity to the information and communications system.
(1) In evaluating if notification is unwarranted, the Commission may take into account compliance
by the personal information controller with this section and existence of good faith in the
acquisition of personal information.
(2) The Commission may exempt a personal information controller from notification where, in its
reasonable judgment, such notification would not be in the public interest or in the interests of the
affected data subjects.
(3) The Commission may authorize postponement of notification where it may hinder the progress
of a criminal investigation related to a serious breach.”
o When to Notfiy?
o Who to Notify?
Partial report may filed in the first instance but the full report must
be submitted within 5 days.
o See DPA Toolkit for the Contents of an NPC Breach Notification
o In the event that there is no data breach or security incidents within the
year (including attempts for breach), the PIC may file a report manifesting
the absence of such breach. (not mandatory)
o Annual Reports will be on March 31, 2019 for data breach or security
incidents that transpired in the preceding year (2018).
o Public notification of breach will not satisfy the requirements of the DPA.
-NOTHING FOLLOWS-