Deep Dive Into Data Privacy 09172024
Deep Dive Into Data Privacy 09172024
Information Security
Reinier J. Estrella
Project Officer II, eHealth Systems Division
Knowledge Management and Information Technology Service doh.gov.p
h
OBJECTIVES:
Fundamentals & Risk Identification Awareness &
Compliance: & Management: Culture
• Understand information • Learn privacy risk • Promote data privacy
security, cybersecurity assessment and security awareness and
and data privacy incident management compliance.
principles and concepts. • Foster a culture of
• Familiarize with security and privacy
relevant regulations and within the organization
compliance
requirements.
70 900,000 735
Million customers and employees clients GB of files
Bawat
Komunidad
Bawat
Health
Worker at
Institusyon
Republic of the Philippines
Department of Health 20
/doh.gov.ph
21
Leverage digital health and technology for efficient and
accessible health service delivery.
STRATEGIC INTERVENTIONS
Increase efficiency and productivity in service
01 delivery by harnessing digital health
technologies
Department of Health
Republic of the Philippines
/doh.gov.ph
211 202 41
Reports Reports Reports
Republic of the Philippines
Department of Health
/doh.gov.ph
Top 3 General Causes of
Data Breach
MALICIOUS HUMAN ERROR MALICIOUS
ATTACK ATTACK +
Hacking (Cloud, Database, HUMAN ERROR
Accidental Email, Loss of Email Account, Misuse of Resources,
Documents, Loss of Infrastructure, Man-in-the- Phishing, Smishing, Social
Equipment. Misdelivered middle, SQL injection, Server, Engineering, Unauthorized
Documents, Misuse of Website, Ransomware, Trojan Access, Hacking, Stolen
Resources, Negligence, Horse, Virus), Phishing, Devices, Negligence, Insider
Undertrained Staff, Others. Smishing, Social Threat, Undertrained Staff,
Engineering, Theft, Others. Others.
2022:
- Most targeted assets/endpoints are Websites, web servers, applications
Recent Cyber systems and databases
Reported multiple malicious websites redirections (Status: Closed and
Threat Reports
-
- Actions and progress updates are all reported until the incident have
been mitigated
2023: (DOH Central Office Only)
Mandatory Breach Notification to the NPC and CICC: 2
Other security incidents: 464
- -> Others/Malware false positive: 375
- -> Others/Malware true positive: 85
Recent Cyber -
-
-> Others/Phishing: 1
-> Hacking: 2
Threat Reports - -> Social Media Hacking: 1
The Law was enacted to Facilitate domestic and An act defining the crime of It protects the victims who
protect the interests of international transactions child pornography, are made to believe that
consumers through the through the utilization of prescribing penalties they are performing sexual
promotion of public health electronic mediums and therefor and for other acts in private.
and safety measures, and technology to recognize the purposes
the prevention of deceptive authenticity and reliability
and unfair acts of of electronic documents.
unscrupulous businessmen.
LEGISLATIONS
R.A. 10173 R.A. 10175 R.A. 9208 / 10364 R.A. 10515
Data Privacy Act of 2012 Cybercrime Prevention Act Anti-Trafficking in Persons Anti-Cable Television and
of 2012 Act of 2003 Cable Internet Tapping Act
of 2013
Aims to protect personal An Act defining cybercrime, Institutes policies to Aims to protect the Cable
data in information and providing for the eliminate trafficking in Televisions and Cable
communications systems prevention, investigation, persons especially women internet Industries from
both in the government and suppression and the and children. It establishes cable pilferage
the private sector imposition of penalties the necessary institutional
therefor and for other mechanisms to protect and
purposes. support trafficked persons
and provides penalties for
violations.
LEGISLATIONS
R.A. 10627 R.A. 10667 R.A. 10844 R.A. 10929
Anti-bullying Act of 2013 Philippines Competitions DICT Act of 2015 The Free Internet Access in
Act of 2015 Public Places Act of 2017
Seeks to address hostile An Act promoting and An Act creating the This law establishes a
environment at school that protecting competitive Department of Information program that will provide
disrupts the education markets. and Communications free access to internet
process which, in turn, is Technology (DICT), defining service in public places
not conducive to the total its powers, authority, throughout the Philippines
development of a child at functions and mandates.
school.
LEGISLATIONS
R.A. 11313 R.A. 8484 / 11449 R.A. 9372 / 11479 R.A. 4200
Safe Spaces Act of 2018 Access Devices Regulations Anti-Terrorism Act of 2020 Anti-Wire Tapping Law of
Act of 1998 1965
PERSONAL Age
Genetic or
Sexual Life
INFORMATION
Education
DATA SECURITY Health
DATA PRIVACY
Gov’t Issued Color Criminal
Number Record
SENSITIVE
Race/ Ethnic
Origin PERSONAL License
INFORMATION Tax
Returns
Marital
Health Status
Record Political
Affiliation
Religious
Belief Personal
Identification
Number
THE KEY PLAYERS
DATA PERSONAL INFORMATION PERSONAL INFORMATION
SUBJECT CONTROLLER PROCESSOR
• An individual whose • Person or organization • Any individual or legal
personal information is who controls the entity subcontracted
processed processing and use of by the personal
personal information information controller to
process personal data.
THE PLAYING GROUNDS
IMPLEMENTS AND ADMINISTERS RA 10173 National Privacy Commission
ANY INDIVIDUAL WHOSE PERSONAL Data Subjects Data Subjects Data Subjects Data Subjects Data Subjects Data Subjects Data Subjects Data Subjects
INFORMATION IS PROCESSED
DATA
PRIVACY ACT
It is the policy of the state to Freedom of the Press
Objective
Examples
Definition
the protection of confidentiality is to controls, user
sensitive information maintain the privacy and authentication, and
from unauthorized secrecy of sensitive secure data
access, disclosure, or data. This includes transmission are
exposure. It ensures that personal information, measures commonly
data is only accessible to trade secrets, financial employed to preserve
individuals or entities records, and any data confidentiality.
with the proper that, if disclosed, could
authorization or need-to- lead to harm, breaches
know. of privacy, or legal
consequences.
INTEGRITY
Integrity relates to the The main objective of Hash functions, digital
Objective
Examples
Definition
accuracy and integrity is to prevent signatures, and version
trustworthiness of data unauthorized or control systems are used
and systems. It ensures unintentional alterations to verify the integrity of
that data remains to data. It ensures that data and detect any
unchanged and data remains reliable unauthorized
uncorrupted during and trustworthy for modifications.
storage, processing, or decision-making and
transmission. business processes.
AVAILABILITY
Availability refers to the The primary goal of Redundancy, backup
Objective
Examples
Definition
accessibility and uptime availability is to systems, disaster
of data, systems, and minimize downtime and recovery plans, and load
services when needed by ensure that systems and balancing are strategies
authorized users. It data are readily to enhance availability
ensures that resources accessible, particularly and maintain continuous
are consistently in the face of operations.
accessible and unexpected events such
operational. as hardware failures,
natural disasters, or
cyberattacks.
MODULE 2c:
INFORMATION SECURITY
& DATA PRIVACY
PRINCIPLES
THE DATA
PRIVACY
PRINCIPLES
DATA PRIVACY PRINCIPLES
LEGITIMATE DATA
TRANSPARENCY PROPORTIONALITY FAIRNESS ACCOUNTABILITY ACCURACY
PURPOSE MINIMIZATION
EXCEPTIONS TO THE DPA
COURT PUBLIC
LEGAL
PROCEEDING/ SAFETY &
OBLIGATION
LEGAL CLAIMS ORDER
MEDICAL
LAW & TREATMENT /
CONSENT CONTRACT
REGULATION TO PROTECT
LIFE
DATA PRIVACY PRINCIPLES
SENSITIVE PERSONAL INFORMATION LEGITIMATE PURPOSE
& PRIVILEGED INFORMATION
Consent is given by data subject, or by the parties to the exchange of privileged
information, prior to the processing of the sensitive personal information or privileged
CONSENT information, which shall be undertaken pursuant to a declared, specified, and legitimate
purpose;
The processing is necessary to protect the life and health of the data subject or another
LIFE & person, and the data subject is not legally or physically able to express his or her consent
HEALTH prior to the processing;
DATA PRIVACY PRINCIPLES
LEGITIMATE PURPOSE
DATA SHARING PRINCIPLES
Transfer of personal data to another personal information controller (PIC) or
personal information processor (PIP) shall adhere to the data privacy principles
stated in section V.
DISPOSAL
OTHER TERMS
DATA PRIVACY PRINCIPLES Nature of the
TRANSPARENCY personal data
Rights as a data
subject & how Purpose of
these can be collection
Data subjects exercised
should be
informed of the
Identity of Extent of the
following: Personal processing of his
Information or her personal
Controller data
RIGHTS AS
A DATA Right to Data
Portability
Rights of a
Data Right to
Access
SUBJECT
Subject
Right to Right to
Damages Rectification
Right to
Erasure or
Blocking
DATA PRIVACY PRINCIPLES
PROPORTIONALITY
The processing of information
shall be adequate, relevant,
suitable, necessary, and not
excessive in relation to a
declared and specified purpose.
Personal data shall be processed
only if the purpose of the
processing could not reasonably
be fulfilled by other means.
DATA PRIVACY PRINCIPLES
PROPORTIONALITY
https://bit.ly/DPAW1
Workshop 1:
Personal Data Processing Systems
Instructions:
• List down all known data processing systems (manual/digital) and categorize
classification of data (Personal Information / Sensitive Personal Information /
Privilege Information)
• Identify if the Data Processing Systems are being processed as a PIP or a PIC.
Workshop 1:
Personal Data Processing Systems
Name of Data Description Basis for List of Information being Type of
Processing Processing Processed Information
System (PI/SPI/PrI)
EWEBPAIS / MAIS Official program RA 11463; Patient’s Full Name, PI
application for the AO No. 2023- 0016; Birthdate, SPI
management of the DM 2012-0032; Contact information, PI
DOH indigency DM 2022-0440 Address, PI
funds. PhilHealth Number, SPI
Monthly Income, PI
Income Classification, PI
Diagnosis SPI
Deep Dive into Data Privacy and
Information Security
Reinier J. Estrella
Project Officer II, eHealth Systems Division
Knowledge Management and Information Technology Service doh.gov.p
h
MODULE 3:
COMPLIANCE FRAMEWORK
5 PILLARS OF COMPLIANCE TO THE DPA
Write your
Implement Regularly
Privacy
Privacy and Exercise your
Designate a DPO Conduct a PIA Management
Protection Breach Reporting
Plan and Privacy
Measures Process
Manual
MODULE 3a:
THE DATA PROTECTION
OFFICER
ENSURES COMPLIANCE
ADVOCATES PBD
DUTIES AND
5. Inform and cultivate awareness on privacy and
RESPONSIBILITIES OF data protection within the organization.
THE DPO
6. Advocate and adopting a PRIVACY BY
DESIGN approach.
7. Serve as the link between the PIC/PIP and the NPC.
CULTIVATE PRIVACY
The COP shall perform all other functions of a DPO AWARENESS
except items 1 to 3. Where appropriate, he or she
shall also assist the supervising DPO in the ADVOCATES PBD
performance of the latter’s functions.
COORDINATE WITH NPC
OPTIONS FOR SELECTING A
DATA PRIVACY OFFICER
HIRE OR OUTSOURCE OR
DESIGNATE
APPOINT SUBCONTRACT
A DPO must be independent in the performance of
his or her functions, and should be accorded a
INDEPENDENCE, significant degree of autonomy by the PIC or PIP.
AUTONOMY & In his or her capacity as DPO, an individual may
CONFLICT OF perform (or be assigned to perform) other tasks or
INTEREST assume other functions that do not give rise to any
conflict of interest.
Protection
/doh.gov.ph
Officers to the
NPCRS
DOH Department Memorandum
2023-0243
• Department Personnel Order, Hospital Order,
Office Order, or any similar document,
designating or appointing the Data
Requirements for Protection Officer of the Personal
Registration of Information Controller (PIC).
Personal Data • Official/dedicated email and contact
Processing information. The DPOs email must be
System/s and Data maintained at all times to ensure that the
Protection Officers NPC is able to communicate with the DOH
Unit. The NPCRS will also send a One-Time
Pin (OTP) to this email every time the DOH
Unit logs-in. Please note that the email shall
be a unique and official email address
specific to the DPO of the DOH Unit, and not
with the person who is the DPO.
Republic of the Philippines
Department of Health
/doh.gov.ph
• Brief description per Personal Data Processing
System should contain the following:
• name of the system;
• basis and for the processing of information;
Requirements for • purpose of the processing;
Unauthorized/Illegitimate Access/
Processing
Malware Storage Confidentiality, Integrity, Availability
Breach
MODULE 3c:
PRIVACY MANAGEMENT PLAN
Legal Compliance
PRIVACY
Risk Mitigation MANAGEMENT
PROGRAM
Reputation Management
PHYSICAL
CONTROL FRAMEWORK
TECHNICAL
The determination of the appropriate Nature of the personal data to be
level of security must consider the protected;
following:
Risks represented by the
processing;
PHYSICAL
CONTROL FRAMEWORK
TECHNICAL
TECHNICAL
BREACH
SECURITY MEASURES
Organizational
Physical
Technical
PERSONAL
DATA BREACHDATA
Confidentiality
Confidentiality
Integrity
Integrity
Availability
Availability
• A SECURITY INCIDENT is any event or
occurrence that affects or tends to affect data
protection, or may compromise the availability,
integrity, and confidentiality of personal data. It
includes incidents that would result in a
personal data breach, if not for safeguards that
have been put in place.
DATA BREACH
• A DATA BREACH is a kind of security incident.
Confidentiality
Integrity
Availability
IF THE BREACH…
Would likely affect national security, public safety,
public order, or public health
Confidentiality
Integrity NOTIFY YOUR DPO AND NPC
Availability STRAIGHTAWAY!
IF THE BREACH…
Involves sensitive personal information or any
information that may be used to enable identity fraud
Confidentiality
Integrity NOTIFY YOUR DPO AND NPC
Availability STRAIGHTAWAY!
IF THE BREACH…
Involves sensitive personal information or any
information that may be used to enable identity fraud
Confidentiality
Integrity NOTIFY YOUR DPO AND NPC
Availability STRAIGHTAWAY!
DATA BREACH
A data breach is a type of cybersecurity incident in which information or part of
an information system) is accessed without the right authorization, typically with
malicious intent, leading to the potential misuse of that information. It also
includes ‘human error’ that often happens during configuration and deployment
of certain services and systems, and may result in unintentional exposure of
data.
DATA BREACH
• Person A was • Person A tried • Person A succeeded • Person A broke in, a • Reached home, run
observed standing vigorously o open in breaking in after neighbor raised the to bed, money
at the door and the door, used a smashing the door. alert by calling the stolen, MacBook Pro
surveying the house, sharp object to try The alarm didn’t owner. Door and untouched (phew)
windows, etc. to break a couple of deter Person A who window broken. rare watch gone!
windows and tried carried on through Neighbor sees thief Thief even drank a
smashing a brick the house. The running away with glass of water
through the door… police arrived “stuff”. forgetting to switch
but ran away because of the ✔Possible off the tap on their
because the alarm silent alarm and ✔Probable way out. Raise
sounded. captured Person A. ✔Confirmed official police
Nothing was taken report. Investigation
or damaged. starts
Never call it a BREACH until you
have a very high degree of
certainty. Make it a collective
decision based on evidence.
5 PILLARS OF COMPLIANCE TO THE DPA
https://bit.ly/DPA_W2
Bit.ly/DPAMaterials2024
https://bit.ly/DPA_W3
IMPACTS TO THE IMPACTS TO THE
DATA SUBJECTS PIC/PIP
IMPACTS TO THE IMPACTS TO THE
DATA SUBJECTS PIC/PIP
• Invasion of Privacy • Reputational Damage
• Reputational Damage • Operational Disruption
• Stress and Anxiety • Legal and Regulatory
• Identity Fraud Consequence
• Targeted Scams • Financial Loss
• Loss of Trust
• Impact on Relationships
• Insecurity
WORKSHOP 4
Security Incident Management
Guide Questions:
1. What immediate actions should the PIC/PIP take upon discovering the incident?
2. How can the PIC/PIP initiate an internal investigation to determine the extent of the breach?
3. Should affected data subjects (patients), including high-profile individuals, be informed of the
incident? If so, how should they be notified?
4. What steps can be taken to mitigate potential harm, identity theft, or reputational damage to
both the patients and the healthcare facility?
5. What legal and regulatory consequences might the PIC/PIP (healthcare facility/CVCHD) face as a
result of this incident, especially considering the involvement of high-profile individuals?
6. How can the PIC/PIP respond to investigations or penalties from regulatory authorities like the
National Privacy Commission (NPC)?
7. How should the healthcare facility respond to this incident in terms of improving its security
practices, staff training, and overall data privacy policies?
8. What specific measures can be implemented to prevent similar incidents in the future and
safeguard the security and confidentiality of health and health-related information?
Deep Dive into Data Privacy and
Information Security
Reinier J. Estrella
Project Officer II, eHealth Systems Division
Knowledge Management and Information Technology Service doh.gov.p
h
MODULE 4:
CONDUCT OF PIA
THE PIA SHOULD IDENTIFY:
PRIVACY IMPACT Legitimate Purpose
of Processing
ASSESSMENT
Risks and Effects of
A PIA is a tool for identifying and Processing
assessing privacy risks
throughout the development life
cycle of a program or system. Current Protection
Measures
May be
Stakeholder
outsourced /
involvement
subcontracted
Collection
Who should
participate in Disposal
Persons Use
And, if applicable:
Internal stakeholders (Legal,
Compliance, HR, Facilities)
DPO/Data Protection Office/Team Sharing Storage
Privacy Advocates
• Head of
Organization
• Process Owner
Assign/ • Data Subject
Assign the Designate
the
• Legal Officer
• ICT Officer
Roles following
roles:
• DPO
• Civil Society
• HR
• National Privacy
Commission
Proposal of
Controls/Remediation
Measures
1. System Description
a) Overview/Description
b) Basis for Processing
PIA c)
d)
ICT Standards Use
Software Development Tools Used
Contents e)
f)
System Data Process
ICT Requirements
2. Scope of the PIA
a) User Access Levels
3. Threshold Analysis
4. Personal Data Flows
a) Personal Data Inventory
b) Personal Data Life Cycle and Process Flow
Republic of the Philippines
Department of Health
/doh.gov.ph
5. Privacy Impact Analysis
PIA a)
b)
Data Privacy Principles
Description of Procedures and Controls for
Privacy as the Default Setting PbD is embedded into the design and
architecture of IT systems and
Privacy Embedded into Design business practices. It is not bolted on
as an add-on, after the fact. The result
Full Functionality – Positive
Sum, not Zero Sum is that privacy becomes an essential
component of the core functionality
End-to-End Security – Full
Lifecycle Protection
being delivered. Privacy is integral to
the system, without diminishing
Visibility and Transparency – functionality.
Keep it Open
Privacy as the Default Setting PbD seeks to assure all stakeholders that
whatever the business practice or
Privacy Embedded into Design technology involved, it is in fact
operating according to the stated
Full Functionality – Positive
Sum, not Zero Sum
promises and objectives, subject to
independent verification. Its component
End-to-End Security – Full
Lifecycle Protection
parts and operations remain visible and
transparent, to users and providers
Visibility and Transparency – alike. Remember, trust but verify.
Keep it Open
Privacy Practice
Policy Regulatory Data Training & Technology Privacy
Impact Security
Development Compliance Minimization Education Integration Advocacy
Assessment Standards
30 Ways to Love Yourself Online
doh.gov.p
h
WORKSHOP 4
Security Incident Management
Workshop 5:
Next Steps and Ways Forward
Instructions:
• Make sure to assign a group secretary and a reporter.
• Make a simple privacy management plan for your facility. The plan should include
activities that promotes a culture of privacy. Your group may consider any of the
following areas (Policy Development, Regulatory Compliance, Privacy Impact
Assessment, Data Minimization, Security Standards, Training & Education,
Technology Integration, Privacy Advocacy)
Action Plan
LEVEL OF
ACTIVITIES TIMELINE UNIT RESPONSIBLE
PRIORITY
Conduct a thorough assessment of data types,
High 2 weeks Data Privacy Officer
flows, and risks
Assess compliance with data privacy laws and Data Privacy Officer,
High 1 week
regulations legal counsel