Professional Documents
Culture Documents
What Is Republic Act No. 10173 or Data Privacy Act of 2012?
What Is Republic Act No. 10173 or Data Privacy Act of 2012?
research data gathered. It deals with the correlation of the research data with the
building and development of the country. In the information age, he who holds
information is concededly vital to the growth of any nation, and key to the
success of any business. With the power that follows information, it is in the
interest of the State to govern the parameters by which such power will be held,
while at the same time ensuring the free flow of information to promote
From the perspective of citizens and individuals, the State also protects
and information, it becomes the duty of the State to guard against transgressions
37
Republic Act No. 10173, otherwise known as the Data Privacy Act of
walks of business, from the banking and finance sector, to labor and human
say that the Data Privacy Act of 2012 finds no application to individuals and
citizens in the Philippines comprise the whole, which the Data Privacy Act of
Data Privacy Act of 2012 protects all forms of information that are
It is important to note however, that by its very title, the law only protects
available or accessible before its enactment continues to the public. The value
that the Data Privacy Act of 2012 adds to the present state of Philippine law is
specific, the passage of this law has, to a great extent, upgraded the value of
data and its protection in the Philippines. To this end, the law specifies and
38
provides stringent parameters for their access, and imposes grave sanctions,
As a matter of fact, the Data Privacy Act of 2012 upgraded the pecuniary
liability for a violation of its provisions. Never before has there been pecuniary
confidential information is not met with penal sanction, the Data Privacy Act
until its enactment that a large-scale violation of data privacy was defined. It may
be important to state that law imposes the maximum penal sanction where the
involved.1
2. What are the factors affecting the enactment of the National Identification
1Atty. Norieva D. de Vega, A. K. (2016). Data Privacy in the Philippines. Retrieved November 20,
2017, from Nicolas & De Vega Law Offices: http://ndvlaw.com/data-privacy-in-the-philippines/
39
sense of urgency to the demand for legislation. Furthermore, new developments
dossiers on any person without the need for a single central computer system.
New technologies developed by the defense industry are spreading into law
than at any time in recent history.2 Uniformly, populations throughout the world
number of nations to pass laws which specifically protect the privacy of their
citizens. Human rights groups are concerned that much of this technology is
Civil libertarians and human rights activists reject the idea of a national ID
card based on three reasons: functionality creep, the potential for misuse due to
identity fraud, and the privacy issue. The common denominator that runs
2 Simon Davies "Re-engineering the right to privacy : how privacy has been transformed from a
right to a commodity", in Agre and Rotenberg (ed) "Technology and Privacy : the new landscape",
MIT Press, 1997 p.143.
40
through these arguments is the extent through which the government would hold
sword because it can suffer from functionality creep which means it can serve
purposes other than its original intent. Thus, even if the original rationale for an
the Rwanda genocide in 1995 was facilitated by the use of ID cards. Newspaper
state the purpose of its implementation, critics believe that this is not a
implemented is not static, hence the potential for abuse is very great.
implications. Critics argue that the potential for abuse and invasion of privacy is
even greater with the use of biometrics since it is vulnerable to identity fraud. The
research claims that facial recognition and iris scanning can sometimes be
41
defeated by presenting a picture of someone elses face or iris 3 Activists on the
other hand, are more concerned with information security such as unauthorized
identity document 4
machines enhances data security and enables citizens to have control of the
data they wish to reveal. In addition, they claim that identity fraud and disclosure
can be prevented by investing in technology that will ensure the integrity of the
system and minimize the potential for misuse. They also argue that laws can be
enacted that can establish the rules on access, data storage and disclosure
Aside from the issue of misuse, ID system opponents believe that the idea
right to privacy. They say that a government intruding in the affairs of citizens is
dangerous and has dire consequences for social order. Moreover, the extent of
3 Congressional Research Service (CRS) Report for Congress. Biometric Identifiers and Border
Security: 9/11 Commission Recommendations and Related Issues by Daniel Morgan and
William Krouse, Resources, Science and Industry Division and Domestic Social Policy Division.
February 7, 2005
4 Id.
42
of an ID system, on the other hand, contend that people who do not violate laws
have nothing to hide and should therefore have no reason to fear a government
valuable.
Physicians use age, sex, and racial data to make appropriate choices about
use information about age and credit of customers for transactions that are lawful
improper.
a general principle. In some cases, data not collected may have consequences
for discrimination goals. For example, a society might prohibit the collection of
43
impossible to determine after-the-fact if discrimination occurred anyway. Those
unfairly because the information used for classification is wrong. One privacy
standard gives individuals the right to inspect and seek correction of records. An
accurate record may prevent improper discrimination, though this is not always
the case. Having correct information furthers both privacy and discrimination
objectives.
beliefs, trade-union membership, and health or sex life.5 The Directive does not
make the purpose of the limitations explicitly clear, but limiting collection of data
that many people consider more private may further both pro-privacy and anti-
5 EU Data Protection Directive at Art. 8. Member States can establish other types of sensitive
information.
6 US Constitution, amend. 1, http://www.law.cornell.edu/constitution/billofrights#amendmenti.
44
A privacy or data protection regime will not be adequate to the task of
Privacy and data protection regimes focus primarily on the correctness of the
economically or even technically feasible for data subjects to assess and then
Crime Prevention
immigration, crime and tax fraud. Because of the technology and data-driven
supporters claim that the notion that citizens are being observed will enhance
public order and as such decrease opportunities for crime. 8 However, opponents
belie this claim. The London School of Economics study on the viability of the
proposed ID system in the United Kingdom points out that the police in
developed countries believe that the lack of identification procedures does not
7 Oscar Gandy, Engaging Rational Discrimination: Exploring Reasons for Placing Regulatory
Constraints on Decision Support Systems, 15 Ethics and Information Technology 12:2942, 39
(2010).
8 London School of Economics and Political Science. The Identity Project. An Assessment of the
UK Identity Cards Bill and Its Implications. Interim Report. London, March 2005.
45
remain as big obstacles for the resolution of crimes. Nonetheless, using crime
trends across Europe the LSE observed that there are fewer crimes in countries
without ID cards.
Numbers (TINs) as de facto national ID cards has been proposed to curb tax
evasion and fraud. 9 According to the proponents, this could be used as a base
for an integrated ID system. However, it has been argued that causes of tax
evasion are often deeply rooted in human and organizational issues that
assets.10 Hence, although it may expand the tax base in such a way that it will
cover the underground economy, the presence of an ID system will not entirely
solve the many persistent ills of the countrys tax system. In the same vein, it is
particular country, then it will not deter foreign nationals from committing
terroristic activities.
9 Baviera, J. and Mendoza, A, Jr. Expanding and Enhancing the Usage of the Tax Identification
Number (TIN). December 18, 2002
10 Privacy International Interim Report. Mistaken Identity; Exploring the Relationship Between
46
the information to open credit accounts, take over existing accounts, obtain
volume and cost in recent years. Losses in the United States are uncertain but
While the crime of identity theft is not limited to the United States, much of
the worlds identity theft activity affects Americans. There are many reasons,
US citizens, the reliance on Social Security Numbers for credit and identification
purposes, lack of effective privacy laws, and the wealth of the country. Identity
theft is an industry complete with the wholesale buying and selling of personal
identity theft from any place in the world. Today, poorer countries may not be
prime targets for identity thieves, especially those operating via the Internet.
However, this could change as cell phones, bank accounts, and Internetbased
possibility that identity thieves will look for ways to capture and exploit identifying
information.
may become the target of criminals who want to exploit identity information. It
could also become the target of other governments looking for dissidents,
11Jeffrey Stinson, How much do you make? It'd be no secret in Scandinavia, USA Today, June
18, 2008, http://usatoday30.usatoday.com/news/world/2008-06-18-salaries_N.htm.
47
expatriates, or others. Anyone seeking to destabilize a countrys activities that
rely on an identification system might target that system. The more any single
spawned a new generation of ID systems that are vastly different from its
persons as a means of identification. Developed and used only in the last fifteen
years, biometrics has been used for three purposes: for identity verification,
staggering cost, there are conditions that can affect its implementation.
also cannot be used by individuals who lack relevant body parts or which have
can also fail in two ways: a false positive and a false negative. False negative
12
Supra Note 41.
13
Supra Note 42
48
occurs when an ID system scanner yields a negative result in matching the
identity of the person and his biometrics when in fact there is a real match. Thus,
authorities purely rely on the scanners findings. False positive occurs when a
have the potential to strengthen national security and surveillance, they may also
14Malik, T. (2014). Technology in the Service of Development: The NADRA Story. Center for
Global Development. Retrieved 20 November 2017, from
<http://www.cgdev.org/publication/ft/technology-service-development-nadra-story>
49
(China, India, Philippines, and Sri Lanka), though evidence suggests a general
concern over the potential for abuse rather than concrete examples of privacy
violations. In China, for example, we find evidence of concern over the increased
ability for police to track citizens movements and monitor political and religious
dissidents, with fears that information linked to the ID program can be used to
example, strict clearance levels are required to access the UID database in India
and software has been put in place by NADRA in Pakistan that allows citizens to
see what organizations or individuals have accessed their data.16 While these
systems have the potential to address some concerns over citizen privacy and
information abuse, we do not find supporting evidence that these measures have
changed public perception on the security of information and privacy within their
respective countries.
benefiting from new scanning technology which can automatically match DNA
15 Chen, D. (2003). China Readies Super ID Card, a Worry to Some. The New York Times.
Retrieved from <http://www.nytimes.com/2003/08/19/world/china-readies-super-id-card-aworry-
to-some.html>.
16 Id.
50
samples against a large database in minutes. Police forces in several countries
such as the United States, Germany and Canada are creating national
databases of DNA. In the United Kingdom and the U.S., police have been
Cost Estimates
constraint faced by countries, especially those from the developing world such as
considering that the proposal covers only the labor force. Moreover, the estimate
covers only the cost of the ID and does not include the administrative costs such
system ranging from P20 million to P500 million. Even the cost of implementing
EO 420 is not clear. What it says is that the budget will be sourced from budgets
17Government of the Philippines, World Bank and Asian Development Bank.2003. Philippines:
Improving Government Performance: Discipline, Efficiency and Equity in Managing Public
Resources.
51
of participating agencies. Ensuring effective implementation and the integrity of
an ID system will require huge costs. The government should have a firm cost
estimate for this project if it is bent on making an ID system work. Based on other
In the United States alone, the cost estimate of their ID system is about $17.4
specifications.
The most common financial and capital challenges are associated with
National ID, Cote dIvoire, Malawi, Tanzania, and Uganda). The National
until it was allocated additional funding from the national budget 19, while the
deploy and pay the technical enrollment teams. 20 Beyond the initial costs
incurred, countries must be able to further bear the ongoing costs associated
18 French, Angela. Real ID: Big Brother Could Cost Big Money, Citizens Against Government
Watch (CAGW). October 17, 2005.
19 Chilunga, Z. (2015, June 23). Goodall adjust Malawi budget to K930bn: To meet Judiciary,
Education demands.
20 The Carter Center. (2013). Voter Identification Requirements and Public International Law: An
Examination of Africa and Latin America. The Carter Center. Retrieved from
<https://www.cartercenter.org/resources/pdfs/peace/democracy/des/voteridentificationrequiremen
ts.pdf>.
52
program saw great success with initial enrollment in part through partner financial
face challenges with the costs of training and building labor and technical
beyond operational delays and we find evidence that limited financial resources
features in their voter registration cards due to their cost, despite a consensus
such a system say a national identification card would cost billions of dollars to
21 Gelb, A., & Clark, J. (2013). Identification for Development: The Biometrics Revolution. CGD
Working Paper 315. Washington, DC: Center For Global Development. Retrieved from
<http://www.cgdev.org/content/publications/detail/1426862>.
22 University of Florida. (2015). Voter Identification and the Electoral Lists: Burkina Faso.
53
administer, and that a system able to reliably identify forged cards would be
creating counterfeit resistant Social Security cards would cost $4 billion. 23 The
ACLU says the cost of such a system has been estimated at as much as $9
billion. Simple smart cards cost $10-$35 a person.24 The costs of a national
system would include paying for card readers, staff and overhead, essentially,
costly. For example, the reader machines that the INS currently uses to scan
laser visas used by some Mexican immigrants cost $2,400 each.25 Foreign
tourists, workers and students enter this country more than thirty million times
every year, so the cost of issuing the cards and assembling the databases could
agencies would cost a great sum as well, given their current state of disconnect.
that a card might cost $8 per person and a commercial reader $50 (If a card were
23 Testimony of ACLU Legislative Counsel Katie Corrigan for the Subcommittee on Government
Efficiency, Financial Management and Intergovernmental Reform on the Establishment of a
National ID Card System, November 16, 2001
24 Lorraine Woellert, National Ids Wont Work, Business Week, November 5, 2000, p. 90.
25 Jonathan Peterson, High Tech, Low Effort at INS; Security: Critics Say the Agency Should
Have Improved Its ID Procedures Long Ago, Los Angeles Times, November 19, 2001, p. A1.
54
billion for the cards).26 This, supporters say, is a reasonable expense for greater
security. The cost of the effects of a terrorist attack must also be taken into
consideration when undertaking any analysis of the cost issue. The World Trade
Center attack cost New York City dearly; while still not entirely known, it is
certainly in the many billions of dollars. Cost estimates of systems used in other
countries vary widely, and are greatly affected by what they take into account.
smart card would cost between five and eight pounds ($5$11) each, but this
figure did not include such costs as administration and compliance. The Home
Secretary at that time estimated the cost would be double this amount.27
Administrative Efficiency
the government for one purpose should not be used for another purpose without
The most commonly used reason for having a national ID system is that it
reduces government red tape and makes the delivery of public services more
huge segment of the population such as voting and benefits availment. Studies
55
segment of the population. According to Demos, a public interest group in the
US, a state law requiring voter identification based on drivers license in Indiana,
possess motor vehicles or do not drive such as the disabled and the elderly. 28 It
is also difficult to see how an ID system can minimize fraud in voting and social
New Zealand, the country that is regarded as having one of the most efficient
specifies the need for protections against loss, unauthorized access, destruction,
use, modification, or disclosure. Concerns about identity theft suggest that record
keepers bear a significant burden of protecting their data subjects from being the
subject of criminal activity. Because security requirements vary over time and
Aside from budgetary issues, the legal and policy environment must be
56
Constitutions concept of privacy leans more on the citizens right to privacy in
ones abode than privacy of ones personal information. The only laws that can
affairs are the decades-old Bank Secrecy and Anti-Wiretapping laws. Hence,
should the government proceed with the planned ID system, Congress should
pass a Privacy Law similar to that in the United States and a Data Protection Act
such as in the United Kingdom to protect citizens rights over their personal
information.
The use of an identification system can, but need not, create detailed
database may keep a record each time it receives a request for identification.
Depending on how those records are maintained, the file for each individual
could reveal each time the individual obtained benefits from a government
any other activity that relied on verification of identity. The record would not only
show the activity possibly include a variety of details about the transaction,
such as amount withdrawn from an ATM but the time and location when the
activity occurred. The resulting centralized file would provide a detailed history of
57
each individuals activities, perhaps over an extended period. That type of
surveillance system.
limited concern most of the time because their activities are routine and
users may feel differently. For some, a compiled transaction history may become
Other Issues
agencies is low. This can be gleaned from a recent study by the National
agencies still use dial-up connections. Others still use outdated software.
study also showed that networking among government agencies is still not
58
prevalent.29 As such, it is unimaginable how a proposed ID system which
at this time.
perennial problem that can pose a big constraint to a planned ID system as this
welfare of indigenous people who often lack identification should also be looked
into.
Congress should not set us on a track that would undermine our privacy,
threaten equality, and challenge our very understanding of freedom. The ACLU
strongly believes that our country must be safe, but security measures must be
effective and need not come at the cost of our fundamental liberties. Congress
(ID) system bring back the case of, Ople vs. Torres, the Supreme Court struck
59
down Administrative Order 308 which seeks to implement the National
Ople vs. Torres (G.R. No. 127685, 23 July 1998, penned by Chief Justice
Reynaldo Puno)
REFERENCE SYSTEM
residents with the facility to conveniently transact business with basic service and
efficiently identify persons seeking basic services on social security and reduce,
60
NOW, THEREFORE, I, FIDEL V. RAMOS, President of the Republic of
the Philippines, by virtue of the powers vested in me by law, do hereby direct the
following:
among the key basic services and social security providers is hereby
established.
xxx
Secretariat shall coordinate with the different Social Security and Services
vested with the power to enact laws, while the President executes the laws. The
61
aspects of governmental operation in pursuance of his duties as administrative
should be for the sole purpose of implementing the law and carrying out the
legislative policy.
A.O. No. 308 establishes for the first time a National Computerized
Code of 1987. This administrative order redefines the parameters of some basic
rights of the citizenry vis-a-vis the State, as well as the line that separates the
administrative power of the President to make rules and the legislative power of
In striking down A.O. 308, the SC emphasized that the Court is not per se
against the use of computers to accumulate, store, process, retrieve and transmit
data to improve our bureaucracy. The SC also emphasized that the right to
privacy does not bar all incursions into the right to individual privacy. This right
merely requires that the law be narrowly focused and a compelling interest
justifies such intrusions. Intrusions into the right must be accompanied by proper
62
The right to privacy is a constitutional right, granted recognition
17 of the Bill of Rights. Zones of privacy are also recognized and protected in our
laws, including certain provisions of the Civil Code and the Revised Penal Code,
some compelling state interest and that it is narrowly drawn. The government
A.O. 308 is predicated on two considerations: (1) the need to provide our
citizens and foreigners with the facility to conveniently transact business with
instrumentalities and (2) the need to reduce, if not totally eradicate, fraudulent
issuance of A.O. 308, it is not arguable that the broadness, the vagueness, the
over breadth of A.O. 308, if implemented, will put our peoples right to privacy in
63
The heart of A.O. 308 lies in its Section 4 which provides for a Population
scanning and retinal scanning, as well as the method known as the artificial
nose and the thermogram. A.O. 308 does not state what specific biological
Moreover, A.O. 308 does not state whether encoding of data is limited to
claim that the adoption of the Identification Reference System will contribute to
the PRN will not be used solely for identification but for the generation of other
data with remote relation to the avowed purposes of A.O. 308. The computer
linkage gives other government agencies access to the information, but there are
no controls to guard against leakage of information. When the access code of the
fear of sanction or penalty, can make use of the data for whatever purpose, or
64
A.O. 308 falls short of assuring that personal information which will be
gathered about our people will only be processed for unequivocally specified
purposes. The lack of proper safeguards in this regard of A.O. 308 may interfere
with the individuals liberty of abode and travel by enabling authorities to track
pave the way for fishing expeditions by government authorities and evade the
right against unreasonable searches and seizures. The possibilities of abuse and
misuse of the PRN, biometrics and computer technology are accentuated when
we consider that the individual lacks control over what can be read or placed on
his ID, much less verify the correctness of the data encoded. They threaten the
30
Ople vs Torres, G.R. No. 127685 July 23, 1998
65