Module 9 LOCAL ICT POLICIES
Module 9 LOCAL ICT POLICIES
SPSaS 2102
Learning Module
Page 149
Foundation of Information Security
SPSaS 2102
Learning Module
Philippine Cybersecurity
(Retrieved from DICT)
https://dict.gov.ph/cybersecurity/
(Note: You may Ctrl+Click on the colored hyperlink to view the webpage resources)
4) Awareness Campaign/Education/Events
5) International Cooperation
Page 150
Foundation of Information Security
SPSaS 2102
Learning Module
x ASEAN- Japan
6) Contact Information
Page 151
Foundation of Information Security
SPSaS 2102
Learning Module
Data Security
(Data retrieved from NPC- National Privacy Commission)
https://www.privacy.gov.ph/implementing-privacy-and-data-protection-
measures/data-security/
Having all the latest software security tools does not mean that your system is safe from
any attacks. Continuous improvement in security of information and data processing
systems is a fundamental management responsibility. All applications and processing
systems that deal with personal and sensitive information should include some form of
authorization which is also known as access control policy. As systems grow in size and
complexity, access control is a special concern for systems and applications that are
distributed across multiple computers.
Access Control Policy sets requirements of credentials and identification that specify
how access to computers, systems, or applications is managed and who may access the
information in most circumstances. Authentication, authorization, audit, and access
approval are the common aspects of access control policy.
Page 152
Foundation of Information Security
SPSaS 2102
Learning Module
What does the commission say about implementing access control policy?
In a time when data privacy and security matters, personal information controller and
personal information processors are obliged to implement strong, reasonable, and
appropriate organizational, physical, and technical security measures for the protection of
the personal information that they process. These include access control policies to off-
site and online access to personal and sensitive information. Accessing these kinds of
information due to negligence or intentional breach will result to fines and imprisonment.
A data center is a facility housing electronic equipment used for data processing, data
storage, and communications networking. It is a centralized repository, which may be
physical or virtual, may be analog or digital, used for the storage, management, and
dissemination of data including personal data.
The National Privacy Commission imposes personal information controllers and personal
information processors should implement reasonable and appropriate organizational,
physical, and technical security measures for the protection of personal data,
especially in this critical infrastructure in Information and Communications Technology.
What are the recommended best practices for data center security?
1. Include security and compliance objectives as part of the data center design
and ensure the security team is involved from day one. Security controls
should be developed for each modular component of the data center—servers,
storage, data and network—united by a common policy environment.
2. Ensure that approach taken will not limit availability and scalability of
resources.
3. Develop and enforce policies that are context, identity and application-aware
for least complexity, and the most flexibility and scalability. Ensure that they
can be applied consistently across physical, virtual and cloud environments. This,
along with replacing physical with secure trust zones, will provide seamless and
secure user access to applications at all times, regardless of the device used to
connect to resources in the data center.
4. Choose security technologies that are virtualization-aware or enabled, with
security working at the network level rather than the server. Network security
Page 153
Foundation of Information Security
SPSaS 2102
Learning Module
should be integrated at the hypervisor level to discover existing and new virtual
machines and to follow those devices as they are moved or scaled up so that
policy can be dynamically applied and enforced.
5. Monitor everything continuously at the network level to be able to look at all
assets (physical and virtual) that reside on the local area network (even
those that are offline) and all inter-connections between them. This monitoring
should be done on a continuous basis and should be capable of tracking dynamic
network fabrics. Monitor for missing patches, application, or configuration changes
that can introduce vulnerabilities which can be exploited.
6. Look for integrated families of products with centralized management that
are integrated with or aware of the network infrastructure, or common
monitoring capabilities for unified management of risk, policy controls, and
network security. This will also give detailed reports across all controls that
provide the audit trail necessary for risk management, governance, and
compliance objectives. Integrated families of products need not necessarily be
procured from just one vendor. Look for those that leverage the needed capabilities
of a strong ecosystem of partnerships to provide a consolidated solution across all
data center assets.
7. Consider future as well as current needs and objectives at the design stage
such as whether access to public cloud environments is required.
8. Define policies and profiles that can be segmented and monitored in multi-
tenant environments. Consider security technologies that provide secure gateway
connections to public cloud resources.
Page 154
Foundation of Information Security
SPSaS 2102
Learning Module
3. Encryption of all transmitted records and files containing personal information that
will travel across public networks, and encryption of all data containing personal
information to be transmitted wirelessly;
4. Reasonable monitoring of systems, for unauthorized use of or access to personal
information;
5. Encryption of all personal information stored on laptops or other portable devices;
6. For files containing personal information on a system that is connected to the
Internet, there must be reasonably up-to-date firewall protection and operating
system security patches, reasonably designed to maintain the integrity of the
personal information;
7. Reasonably up-to-date versions of system security agent software which must
include malware protection and reasonably up-to-date patches and virus
definitions, or a version of such software that can still be supported with up-to-date
patches and virus definitions, and is set to receive the most current security
updates on a regular basis;
8. Education and training of employees on the proper use of the computer security
system and the importance of personal information security.
What is encryption?
“Any technology used to store, transport, or access sensitive personal information for
purposes of off-site access approved shall be secured by the use of the most secure
encryption standard recognized by the Commission.”
Data at rest, in transit, and in use should all be treated equally in terms of preserving its
privacy and managing its security.
Emails
Page 155
Foundation of Information Security
SPSaS 2102
Learning Module
Most corporations, organizations, agencies, and firms use emails to communicate, send
files, and exchange data. This way of communication has been the standard of electronic
messaging for many years. It has also been one of the major cases of privacy breaches
throughout those years. These kinds of incidents exposed the privacy of several
individuals so they should be managed, guarded, and most importantly, prevented.
Organizations that transfer personal data via email should either make sure that the data
is encrypted or use a secure email facility that facilitates the encryption.
Portable Media
Attack on privacy can happen anytime, anywhere, any place and sometimes even with
portable storage devices. It can infiltrate an organization’s system and expose all of its
confidential and sensitive information. Devices such as USB flash drives and internal or
external disk that store, collect or transfer personal data must be encrypted, especially the
data in it. Organizations that use laptops to process personal data must use a full disk
encryption.
Links (URL)
Agencies and organizations that utilize online access to process personal data should
employ an identity authentication method that uses a secured encrypted link.
“Organizational, physical, and technical security measures for personal data protection,
encryption, and access to sensitive personal information maintained by government
agencies, considering the most appropriate standard recognized by the information and
communications technology industry.”
“Advanced Encryption Standard with a key size of 256 bits (AES-256) as the most
appropriate encryption standard. Passwords or passphrases used to access personal
data should be of sufficient strength to deter password attacks. A password policy should
be issued and enforced through a system management tool.”
Every person that owns or licenses personal information shall develop, implement, and
maintain a comprehensive information security program that is written in one or more
readily accessible parts and contains organizational, technical, and physical security that
are appropriate to:
1. the size, scope and type of operations of the agency obligated to secure the
personal data under such comprehensive information of the DPA;
2. the amount of resources available to such person;
Page 156
Foundation of Information Security
SPSaS 2102
Learning Module
Without limiting the generality of the foregoing, every comprehensive information security
program shall include, but shall not be limited to:
Page 157
Foundation of Information Security
SPSaS 2102
Learning Module
Data sharing is the disclosure or transfer to a third party of personal data under the
custody of a personal information controller or personal information processor. When
processing of personal information is outsourced (Personal Information Processor), such
disclosure or transfer must have been upon the instructions of the personal information
controller concerned. The term excludes outsourcing, or the disclosure or transfer of
personal data by a personal information controller to a personal information processor.
Personal Information Controllers (PIC) are those who decide what types of data are
collected and how they are processed (i.e. Ayala Land). On the other hand, Personal
Information Processors (PIP) are those who process data as instructed by the
controllers (i.e. HR Mall).
For transfers abroad, a personal information controller shall be responsible for any
personal data under its custody, including information that have been outsourced or
transferred to a personal information processor or a third party for processing, whether
domestically or internationally, subject to cross-border arrangement and cooperation.
Processing of personal data collected from a party other than the data subject shall be
allowed under any of the following conditions:
x Authorized by law
x Consent for Data Sharing
x Covered by a data sharing agreement for commercial purposes
x Provided the following to data subjects before sharing:
1. Identity of PIC and PIP
2. Purpose of data sharing
3. Categories of personal data
4. Intended recipients of personal data
5. Broadcasted the rights of data subjects
6. Other information about the nature and extent of data sharing and manner
of processing
7. Sharing between government agencies for the purpose of a public function
or provision of a public service should be covered by a data sharing
agreement.
Page 158
Foundation of Information Security
SPSaS 2102
Learning Module
A data sharing agreement refers to a contract, joint issuance, or any similar document
that contains the terms and conditions of a data sharing arrangement between two or
more parties provided that only personal information controllers shall be made parties to a
data sharing agreement. Where a data sharing agreement involves the actual transfer of
personal data or a copy from one party to another, such transfer shall comply with the
security requirements imposed by the Philippine Data Privacy Act, its IRR, and all
applicable issuances of the National Privacy Commission.
Page 159
Foundation of Information Security
SPSaS 2102
Learning Module
Legal framework
Legislation
Summarize the main statutes and regulations that promote cybersecurity. Does
your jurisdiction have dedicated cybersecurity laws?
The Cybercrime Prevention Act of 2012 (CPA) defines the following as cybercrimes:
x offences against the confidentiality, integrity and availability of computer data and
systems (illegal access, illegal interception, data interference, system interference,
misuse of devices and cybersquatting);
x computer-related offences (computer-related forgery, computer-related fraud and
computer-related identity theft); and
x content-related offences (cybersex, child pornography, unsolicited commercial
communications and libel).
The CPA appointed the National Bureau of Investigation (NBI) and Philippine National
Police (PNP) as enforcement authorities, and regulates their access to computer data,
creating the Cybercrime Investigation and Coordinating Center (CICC) as an inter-agency
body for policy coordination and enforcement of the national cybersecurity plan, and an
Office of Cybercrime within the Department of Justice (DOJ-OC) for international mutual
assistance and extradition.
The Supreme Court’s Rule on Cybercrime Warrants (AM No. 17-11-03-SC) governs the
application and grant of court warrants and related orders involving the preservation,
disclosure, interception, search, seizure or examination, as well as the custody and
destruction of computer data, as provided under the CPA.
The Electronic Commerce Act of 2000 (ECA) provides for the legal recognition of
electronic documents, messages and signatures for commerce, transactions in
government and evidence in legal proceedings. The ECA penalises hacking and piracy of
protected material, electronic signature or copyrighted works, limits the liability of service
providers that merely provide access, and prohibits persons who obtain access to any
electronic key, document or information from sharing them. The ECA also expressly
allows parties to choose their type or level of electronic data security and suitable
technological methods, subject to the Department of Trade and Industry guidelines.
The Access Devices Regulation Act of 1998 (ADRA) penalises various acts of access
device fraud such as using counterfeit access devices. An access device is any card,
plate, code, account number, electronic serial number, personal identification number or
Page 160
Foundation of Information Security
SPSaS 2102
Learning Module
The specific obligation to keep informed of the adequacy of cybersecurity results from
general obligations. Under the DPA, the employees, agents or representatives of a
personal information controller who are involved in the processing of personal information
are required to operate and hold personal information under strict confidentiality if the
personal information is not intended for public disclosure, even after leaving the public
service, transfer to another position or upon termination of employment or contractual
relations. Also, diligence in preventing the commission of offences under the DPA are
required of responsible company officers. If they participated in, or by gross negligence,
allowed the commission of an offence, they may be penalised by a fine and imprisonment.
The CPA requires persons with leading positions in a corporation who act or decide on its
behalf to exercise sufficient supervision or control within the corporation to prevent
cybercrime offences. If they fail this duty, the corporation may suffer a fine and hold them
responsible under the corporation’s internal rules.
The Central Bank of the Philippines (BSP) Manual of Regulations for Banks requires
directors of BSP-supervised institutions (BSI) to understand the BSIs’ IT risks and ensure
that they are properly managed. BSIs include banks, non-banks with quasi-banking
functions, non-bank electronic money issuers and other non-bank institutions subject to
the BSP’s supervision.
How does your jurisdiction define cybersecurity and cybercrime?
The CPA defines ‘cybercrime’ as those offences listed in question 1, while it defines
‘cybersecurity’ as the collection of tools, policies, risk management approaches, actions,
training, best practices, assurance and technologies that can be used to protect the cyber
environment and organisation and user’s assets, where ‘cyber’ refers to a computer or a
computer network, the electronic medium in which online communication takes place.
‘Data privacy’ is a DPA term that refers to personal information only as data. Thus,
cybersecurity covers other kinds of data but data privacy covers environments other than
cyber.
There are no regulations specific to ‘information system security’ that may be compared
with cybercrime enforcement.
What are the minimum protective measures that organisations must implement to
protect data and information technology systems from cyberthreats?
The DPA requires personal information controllers and their processors to include in their
reasonable and appropriate organisational, physical and technical security measures
against accidental or unlawful processing and natural or human dangers:
Page 162
Foundation of Information Security
SPSaS 2102
Learning Module
Page 163
Foundation of Information Security
SPSaS 2102
Learning Module
DICT Memorandum Circular No. 5 (2017) prescribes policies and rules on CII protection
based on the National Cybersecurity Plan 2022 (NCP2022). Aside from requiring
compliance with international standards, the Circular requires each CII to have a
computer emergency response team (CERT), which shall report cybersecurity incidents
within 24 hours from detection to DICT as the National CERT, telecommunications
operators and ISPs to conduct cyber hygiene on their networks, CII websites to obtain a
DICT seal of cybersecurity, covered organisations to implement a disaster recovery plan
and business continuity plan, and DICT to conduct annual CII cyber drills. Also, DICT
Memorandum Circular No. 7-17 implements DICT’s Programme on CyberSecurity
Education and Awareness for CII.
Does your jurisdiction have any cybersecurity laws or regulations that specifically
restrict sharing of cyberthreat information?
The DICT CERT Manual for creating the CERT for each organisation provides a
communication procedure aimed at ensuring that sensitive or critical information is not
disclosed when communicating and coordinating with parties and groups outside the
National CERT. The procedure requires the written approval of management for
disclosure of information to the media and of the CyberSecurity Bureau for
communicating and sharing information with law enforcement agencies.
What are the principal cyberactivities that are criminalised by the law of your
jurisdiction?
Question 1 describes the CPA cybercrimes and offences under the DPA, ECA and ADRA
that may cover cyberactivities relevant to organisations as they may either be committed
by organisations or committed against organisations (as possible targets).
How has your jurisdiction addressed information security challenges associated
with cloud computing?
They are mainly addressed through a general cybersecurity framework, regulations
specific to the banking and government sectors, and participation in cybersecurity
initiatives as a member of the International Telecommunications Union.
The BSP requires the prior approval of a BSP-supervised financial institution’s (BSFI’s)
use of cloud services on the conduct of due dilgence on the cloud service provider (CSP),
the service’s compliance with data security, confidentiality and disaster recovery
requirements, and mandatory provisions in the service contract. The BSP’s 2017
Enhanced Guidelines on Information Security Management also requires BSFI
management to ‘fully understand the nature of the cloud technology in line with business
requirements and satisfy themselves as to the level of security and compliance to data
privacy and other relevant rules and regulations’, and to oversee the cloud service
provider’s ‘adherence to security, performance and uptime, and back-up and recovery
arrangements contained in the contract/agreement’.
Apart from implementing a cybersecurity awareness campaign, the DICT issued
Department Circular No. 2017-002 to regulate the security of government-contracted
cloud services with data migration through international security assurance controls and
Page 164
Foundation of Information Security
SPSaS 2102
Learning Module
industry-accepted encryption; baseline and optional security controls for CSPs to host
classes of government data; and logical security audit on data access and continuous
security monitoring to ensure data confidentiality, integrity and availability.
How do your jurisdiction’s cybersecurity laws affect foreign organisations doing
business in your jurisdiction? Are the regulatory obligations the same for foreign
organisations?
The regulatory obligations for domestic and foreign organisations doing business in the
Philippines are the same.
Also, the DPA applies extraterritorially on an organisation’s acts or practices outside of
the Philippines if:
Page 165
Foundation of Information Security
SPSaS 2102
Learning Module
BSP Circular No. 1019 (2018) prescribes technology and cyber-risk reporting and
notification requirements for BSFIs. The Circular provides procedures for reporting to the
BSP major cyber-related incidents, such as those involving significant data loss or
massive data breach, and disruptions of financial services and operations.
NPC Circular No. 16-03 provides guidelines for personal data breach management,
requiring organisations to implement a security incident management policy to ensure:
x the creation of a data breach response team, which will be responsible for
implementing the policy;
x implementation of organisational, physical and technical security measures, and of
policies to prevent or minimise personal data breaches and assure timely discovery
of the same;
x implementation of an incident response procedure;
x mitigation of negative consequences to data subjects; and
x compliance with all laws and regulations on data privacy.
Information sharing
Describe practices and procedures for voluntary sharing of information about
cyberthreats in your jurisdiction. Are there any legal or policy incentives?
None as of yet. But the NCP2022 aims to use organisation reports to develop
cybersecurity measures and to promote the sharing of information between the
government and private sector.
How do the government and private sector cooperate to develop cybersecurity
standards and procedures?
The DICT is creating technical working groups to review existing and develop new
cybersecurity courses to integrate these courses into the curriculum of engineering,
computer science, information technology, law and criminology. The NCP2022 includes
establishing and creating programmes among CERTs, law enforcement, academia and
industries as one of the government’s key initiatives.
Insurance
Is insurance for cybersecurity breaches available in your jurisdiction and is such
insurance common?
Only a few insurance companies so far offer insurance for data security breaches,
network interruption and cyber extortion as well as fines resulting from breach of
administrative obligations relative to cybersecurity.
Enforcement
Regulation
Page 166
Foundation of Information Security
SPSaS 2102
Learning Module
Page 167
Foundation of Information Security
SPSaS 2102
Learning Module
month, equipping the government and programmes for local and international
cooperation.
Also, the Supreme Court has addressed the need for procedures for securing court
warrants specifically for investigating and prosecuting cybercrimes.
The issue of enforcement against cybercrimes committed by actors or on online platforms
outside Philippine territory is being addressed by forging closer international cooperation
with agency counterparts in other jurisdictions, as the country’s accession to the
Cybercrime Convention this year demonstrates.
Penalties
What penalties may be imposed for failure to comply with regulations aimed at
preventing cybersecurity breaches?
In general, the penalties consist of fines and imprisonment.
What penalties may be imposed for failure to comply with the rules on reporting
threats and breaches?
BSIs that fail to report breaches in information security, especially incidents involving the
use of electronic channels, may be penalised with fines, suspension of the BSI’s
privileges or access to the Central Bank’s credit facilities, as well as revocation of a quasi-
banking licence. Internet service providers and internet hosts that fail to promptly report
child pornography to police authorities may be penalised with fines and imprisonment. As
to breaches related to personal information, the NPC has yet to provide penalties specific
to the failure to report.
How can parties seek private redress for unauthorised cyberactivity or failure to
adequately protect systems and data?
The DPA entitles data subjects the right to be indemnified for any damage sustained
owing to inaccurate, incomplete, outdated, false, unlawfully obtained or unauthorised use
of personal information. Claims for indemnity may be filed with the NPC.
Parties may provide for redress in a contract and claim damages for breach of contract.
Philippine tort law allows claims for damages resulting from acts or omissions involving
negligence or those involving violations by private entities or individuals of the
constitutional rights of other private individuals. Claims may be filed in court or through
alternative dispute resolution mechanisms.
Threat detection and reporting
Policies and procedures
What policies or procedures must organisations have in place to protect data or
information technology systems from cyberthreats?
Page 168
Foundation of Information Security
SPSaS 2102
Learning Module
A CERT that will respond to cyberattacks is required of every bureau, office, agency and
instrumentality of the government.
For personal data protection, the NPC requires organisations to create a security incident
management policy, which shall include:
Page 169
Foundation of Information Security
SPSaS 2102
Learning Module
Reporting
Describe any rules requiring organisations to report threats or breaches to others
in the industry, to customers or to the general public.
Apart from the personal data breach notification to the data subject required by the NPC,
there are no rules for reporting threats or breaches to others in the industry, customers or
the public.
Update and trends
Update and trends
What are the principal challenges to developing cybersecurity regulations? How
can companies help shape a favorable regulatory environment? How do you
anticipate cybersecurity laws and policies will change over the next year in your
jurisdiction?
Since Philippine cybersecurity laws are relatively new, the lack of awareness on the need
for cybersecurity and the relevant laws and regulations remains the principal challenge for
authorities. The NCP2022 will continue to dictate the changes in policies and regulations
over the next few years as it progresses from capacity-building to corrective enforcement.
Collaboration with the government by private companies on rule-making and compliance,
to help deal with the constant cybersecurity threats to their operations and the potential
financial risks, should encourage a favorable regulatory environment.
Page 170
Foundation of Information Security
SPSaS 2102
Learning Module
01.
Page 171
Foundation of Information Security
SPSaS 2102
Learning Module
02.
Page 172