R.A. 10173 or The Data Privacy Act of 2012: Compliance & Application
R.A. 10173 or The Data Privacy Act of 2012: Compliance & Application
10173 or the
DATA PRIVACY ACT of 2012
R.A. 10173 or the(August 15, 2012)
DATA PRIVACY ACT of 2012
Implementing Rules and Regulations
(August 24, 2016)
You can visit your Google Account to find and manage activity information that’s saved in
your account.
https://www.google.com.ph/policies/privacy/#infocollect
Worldwide: More than 80 countries have data protection laws.
• Europe:
Right to data privacy is heavily regulated and actively
enforced.
The EU's data protection laws have long been regarded as a
gold standard.
Currently the General Data Protection Regulation (GDPR).
• United States:
Health Insurance Portability and Accountability Act (HIPAA)
Fair Credit Reporting Act (FCRA)
Electronic Communications Privacy Act (ECPA)
Various State Laws and Agency Regulations
• Sec. 2, R.A. 10173
Public
Rule Making Advisory
Education
PROCESSING:
• collecting
• recording
• organizing
• storing
• Individual’s race, ethnic
• updating • Covers both digital and
origin, marital status, age,
• Examples:
analog forms of data • lawyer-client,
• retrieving • Identity of individual is color and religious,
• doctor-patient;
philosophical or political
• using apparent OR can be
reasonably and directly affiliations • priest-confessor;
• spousal privilege
• consolidating ascertained when put • Health, education, genetic,
together with other or sexual life, or any legal
• erasing information proceeding
• Issued by government
agencies peculiar to an
individual, ex. licenses
Processing Covered –
Sec. 4, IRR DPA 2012
DATA PROTECTION
PERSONAL PERSONAL OFFICER
INFORMATION DATA SUBJECT INFORMATION
PROCESSOR Compliance Officer on
CONTROLLER
Protection
The person or
organization who Person appointed to
controls the Any natural or juridical implement and
collection, holding, person to whom a ensure compliance
The individual whose personal information
processing, or use of personal information with the DPA.
the personal controller may
is processed outsource the Bound by secrecy or
information. confidentiality
Responsible for DPA processing of personal
data concerning tasks
Implementation
performance
Data Privacy Principles –
Sec. 17, 18, and 19, IRR, DPA of 2012
Statement of Policy
The NPC is committed to protect and respect your personal data privacy. We are at the forefront of not only implementing but complying with
the Data Privacy Act of 2012.
We will provide individuals a Personal Information Collection Statement in an appropriate format and manner whenever we collect personal
data from them (i.e. in the manual form or web page that collects personal data, or in a notice posted at the reception area of NPC events where
participants’ personal data is collected through attendance sheets).
Personal Information
We collect the following personal information from you when you manually or electronically submit to us your complaints, inquiries or requests:
• Full name
• Home address
• Email address
• Employment Information
• Face/photo, fingerprints or handwriting
• Contact numbers
Use
The collected personal information is utilized solely for documentation and processing purposes within the NPC and is not shared with any
outside parties. They enable the NPC to properly address the complaints, forward them to appropriate internal units for action and response,
and provide clients or complainants with appropriate updates and advisories in a legitimate format and in an orderly and timely manner.
Website Analytics
The NPC uses WP Statistics, a third-party service to analyze the web traffic data for us. This service does not use cookies. Data generated is not
shared with any other party. Only non-identifiable web traffic data are analyzed, including . . .
Processing Principles and Data Rights
Sec.
34 (a) Right to be Informed |Data Subjects have the right to know everything pertaining to their data.
Sec.
34 (b)
Right to Object | Data Subjects have the right to say no to further processing of their data.
Sec.
34 (c)
Right to Reasonable Access |Data Subjects have the right to access to their personal data.
Sec.
34 (d)
Right to Rectification |Data Subjects have the right to dispute inaccuracies and to correction.
Sec.
34 (e)
Right to Erasure or Blocking | Specially in cases of unlawful processing.
Sec.
34 (f)
Right to Damages |Data Subjects have right to indemnified for any damages sustained.
Secs.
35 & 36 Right to Data Portability | Transmissibility of Rights.
Data Sharing. Allowed if –
Sec. 20, IRR DPA 2012
We will never share, rent, or sell your personal information to third parties outside of the Smart Communications, Inc.
except in special circumstances where you may have given your specific consent for, and as described in this policy.
In some instances, we may be required to disclose your personal information to our agents, subsidiaries, affiliates,
business partners and other third-party agencies and service providers as part of our regular business operations and for
the provision of our products and services. This means we might share your information with:
• Our service providers, contractors, and professional advisers who help us provide our products and services. This includes
partner companies, organizations, or agencies, and their sub-contractors. For example: our couriers for bill delivery and our
customer contact centers for our pre- and post-sales hotline operations;
• Our Subsidiaries and Affiliates with whom you have also signed-up with. We do so only for the improvement of each
other’s business and operations. For example: we share information about your credit standing to facilitate your service
applications with them, resulting in faster approvals;
• Other companies to whom you have also given consent for us to share your information with; and
• Law enforcement and government agencies, but only when required by laws and regulations and other lawful orders and
processes.
Our partners include, but are not limited to, the list provided under Subsidiaries, Affiliates and Partners.
SECURITY. REASONABLE & APPROPRIATE
Sec. 25, IRR DPA 2012
privacy notice;
privacy policy; and
privacy manual or privacy guide
Physical Security Measures. Sec. 27, IRR DPA 2012
• Design of office space and work stations secured against
natural disasters, power disturbances, external access, and
other similar threats.
• Policies and procedures to monitor and limit access.
• Define duties, responsibilities and schedules.
• Policies and procedures on transfer, removal, disposal, and
re-use of electronic media and on prevention of mechanical
destruction of files and equipment.
Technical Security Measures. Sec. 28, IRR DPA 2012
• Security policy for processing
• Safeguards to protect against accidental, unlawful or unauthorized
access
• Ability to maintain confidentiality, integrity, availability and
resilience of systems
• Regular monitoring and testing for security breaches and
effectivity of security measures.
• Ability to restore availability and access.
• Encryption during storage or while in transit, authentication process,
other technical security measures.
Security of Sensitive Personal Information (SPI) in Government
Secs. 30 – 33, IRR DPA 2012
The head of agency or instrumentality shall ensure that all SPI shall be secured with the use of the most
appropriate standard in the IT and Communications Technology industry.
Government employees shall have access to SPI only if with security clearance from the source agency.
Online Access by Government employees:
• An information technology governance framework has been designed and implemented;
• Sufficient organizational, physical and technical security measures have been established;
• The agency is capable of protecting sensitive personal information;
• Access necessary for the performance of official functions or the provision of a public service.
Off-site access by Government employees:
• SPI may not be transported or accessed from a location off or outside of government property unless the
implementation of privacy policies and appropriate security measures are ensured.
• Limitation to One thousand (1,000) Records at a time.
• Any technology used to store, transport or access shall be secured by the most secure encryption standard
(currently Advanced Encryption Standard with a key size of 256 bits (AES-256).
For private service provider that may involve accessing or requiring SPI from one thousand (1,000) or more
individuals, the service provider shall comply with the rules similar to a government agency and its employees.
DATA BREACH MANAGEMENT. NPC Circular 16-03
CONFIDENTIALITY - INTEGRITY – AVAILABILITY
• Implementation of organizational, physical and technical security
measures and personal data privacy policies.
• Implementation of an incident response procedure.
• Mitigation of possible harm and negative consequences.
• Compliance with personal data breach notification.
• Creation of Data breach response team which may be
outsourced. DPO may be a member.
Implement the security incident management policy;
Manage security incidents and personal data breaches;
Comply issuances by the Commission on personal data breach management.
The team must be ready to assess and evaluate a security incident, restore
integrity to the information and communications system, mitigate and
remedy any resulting damage, and comply with reporting requirements.
DATA BREACH. NPC Circular 16-03
SECURITY INCIDENT: Event or occurrence that affects or tends to affect data protection,
or may compromise the availability, integrity and confidentiality of personal data. It
includes incidents that would result to a personal data breach, if not for safeguards.
PERSONAL DATA BREACH: Breach of security leading to the accidental or unlawful
destruction, loss, alteration, unauthorized disclosure of, or access to, personal data
transmitted, stored, or otherwise processed. IF:
• involving sensitive personal or other information which may be used to
enable identity fraud;
• reasonably believed to have been acquired by an unauthorized person;
• likely to give rise to a real risk of serious harm to any affected data subject -
NOTIFY COMMISSION & AFFECTED DATA SUBJECTS W/IN 72 HOURS
Other data breaches/security incidents must be recorded in writing and made part of
annual report.
ACCOUNTABILITY.
Secs. 50, 51, and 61 IRR of DPA 2012; NPC Advisory 2017-01
Processing for Unauthorized Purposes Imprisonment: 1 year & 6 mos. – 5 years Imprisonment: 2 – 7 years
Sec. 52, IRR DPA of 2012 Fine: P500,000 – P1,000,000 Fine: P500,000 – P2,000,000
Unauthorized Access or Intentional Breach Imprisonment: 1 – 3 years
Sec. 52, IRR DPA of 2012 Fine: P500,000 – P2,000,000
Concealment of Security Breaches Imprisonment: 1 year and 6 months – 5 years
Sec. 52, IRR DPA of 2012 Fine: P500,000 – P1,000,000
Malicious Disclosure Imprisonment: 1 year and 6 months – 5 years
Sec. 52, IRR DPA of 2012 Fine: P500,000 – P1,000,000
Unauthorized Disclosure Imprisonment: 1 – 3 years
Sec. 52, IRR DPA of 2012 Fine: P500,000 – P1,000,000
THANK YOU
[email protected]
philippinelawlist.com