You are on page 1of 15

MODULE 4: DPA OF 2012 the compliance of personal information controllers

R.A. 10173 DATA PRIVACY ACT OF 2012 with its obligations under the law, the Commission
August 5, 2012
requires the following:
1. What is The Data Privacy Act of the
Philippines? a) Registration of personal data processing
systems operating in the country that
R.A. No. 10173 is an act protecting individual involves accessing or requiring sensitive
personal information in information and personal information of at least one
communications systems in the government and thousand (1,000) individuals, including the
the private sector, creating for this purpose a personal data processing system of
national privacy commission, and for other contractors, and their personnel, entering
purposes into contracts with government agencies;
b) Notification of automated processing
The Data Privacy Act (DPA), or Republic Act No.
operations where the processing becomes
10173 was passed by the Philippines Congress in
the sole basis of making decisions that
2012 and finally implemented five years later in
would significantly affect the data subject;
2016. RA 10173 assures the “free flow of
c) Annual report of the summary of
information to promote innovation and
documented security incidents and
growth”(Republic Act. No. 10173, Ch. 1, Sec. 2)
personal data breaches;
while protecting the users’ fundamental rights to
d) Compliance with other requirements that
privacy.
may be provided in other issuances of the
RA 10173, or the Data Privacy Act, protects Commission.
individuals from unauthorized processing of
3. What does DPA mean for data
personal information that is (1) private, not publicly
collectors/companies?
available; and (2) identifiable, where the identity of
the individual is apparent either through direct The Act applies to any process of personal data by
attribution or when put together with other anyone in government or private sectors.
available information.
All personal data must have legitimate reasons for
**What does the act assure?
collection as well as should be clear to both parties
- It assures the “free flow of information to giving and receiving information. With that being
promote innovation and growth” while protecting said, all collection must be done with the
the users’ fundamental rights to privacy. This law customers’ proper consent.
was passed in 2012, and finally implemented 5
years later in 2016. All personal information used must also be relevant
solely used for its intended and state purposes.
2. How is it implemented? Companies must protect customer information
from collection to proper disposal, avoiding access
RA 10173 protects and maintains the right of
from unauthorized parties.
customers to confidentiality by setting a legal list of
rules for companies to regulate the collection, Sec. 4. This Act applies to the processing of all types
handling, and disposal of all personal information. of personal information and to any natural and
juridical person involved in personal information
Companies are legally responsible for keeping their
processing including those personal information
customers’ data protected from third parties or any
controllers and processors who, although not found
form of misuse, internally or externally.
or established in the Philippines, use equipment
**The act is necessary and important percussion in that are located in the Philippines, or those who
a world economy that is swiftly going digital. In this maintain an office, branch or agency in the
law, companies must be held accountable not only Philippines subject to the immediately succeeding
for what they do with customer data, but how they paragraph: Provided, That the requirements of
protect that data from third parties. Section 5 are complied with.

Section 46. Enforcement of the Data Privacy Act. **The law applies to what process? Is it limited to
Pursuant to the mandate of the Commission to private sectors?
administer and implement the Act, and to ensure
- No. It applies to private and public sectors, 6. Who needs to register?
anyone in government and private sectors.
Companies with at least 250 employees or access
4. What are the steps to take to comply with to the personal and identifiable information of at
DPA? least 1,000 people are required to register with the
National Privacy Commission and comply with the
Companies essentially must ensure that their data Data Privacy Act of 2012. Some of these companies
collection methods are flawless as well as are already on their way to compliance — but
consistently share the entire process with data many more are unaware that they are even
subjects, including a breach of security, should affected by the law.
there be any.
Rule XI. Registration and Compliance
**It is incumbent upon corporations and Requirements
companies in the event of breach of security they Section 46. Enforcement of the Data Privacy Act.
have to inform the data subject so that they will be Pursuant to the mandate of the Commission to
informed properly and not to be a victim of administer and implement the Act, and to ensure
phishing. the compliance of personal information controllers
with its obligations under the law, the Commission
To do this, companies should appoint a Data requires the following:
Protection Officer (DPO) and create privacy
knowledge programs and privacy and data policies a) Registration of personal data processing
to regulate the handling of information, as well as systems operating in the country that
routine assessments to ensure quality data involves accessing or requiring sensitive
protection. personal information of at least one
thousand (1,000) individuals, including the
In addition, companies must also have a proper personal data processing system of
procedure for breach notification to its customers. contractors, and their personnel, entering
into contracts with government agencies;
5. What does DPA entail? b) Notification of automated processing
operations where the processing becomes
First, all personal information must be collected for
the sole basis of making decisions that
reasons that are specified, legitimate, and
would significantly affect the data subject;
reasonable. In other words, customers must opt in
c) Annual report of the summary of
for their data to be used for specific reasons that
documented security incidents and
are transparent and legal.
personal data breaches;
Second, personal information must be handled d) Compliance with other requirements that
properly. Information must be kept accurate and may be provided in other issuances of the
relevant, used only for the stated purposes, and Commission.
retained only for as long as reasonably needed. Section 47. Registration of Personal Data
Customers must be active in ensuring that other, Processing Systems.
unauthorized parties do not have access to their The personal information controller or personal
customers’ information. information processor that employs fewer than two
hundred fifty (250) persons shall not be required to
Third, personal information must be discarded in a
register unless the processing it carries out is likely
way that does not make it visible and accessible to
to pose a risk to the rights and freedoms of data
unauthorized third parties.
subjects, the processing is not occasional, or the
Unauthorized processing, negligent handling, or processing includes sensitive personal information
improper disposal of personal information is of at least one thousand (1,000) individuals.
punishable with up to six (6) years in prison or up to a. The contents of registration shall include:
five million pesos (PHP 5,000,000) depending on
the nature and degree of the violation. 1. The name and address of the personal
information controller or personal
information processor, and of its
representative, if any, including their
contact details;
2. The purpose or purposes of the The State recognizes the vital role of information
processing, and whether processing is being and communications technology in nation-building
done under an outsourcing or and its inherent obligation to ensure that personal
subcontracting agreement; information in information and communications
systems in the government and in the private
3. A description of the category or
sector are secured and protected.
categories of data subjects, and of the data
or categories of data relating to them; Section 2. Policy. These Rules further enforce the
4. The recipients or categories of recipients Data Privacy Act and adopt generally accepted
to whom the data might be disclosed; international principles and standards for personal
data protection. They safeguard the fundamental
5. Proposed transfers of personal data human right of every individual to privacy while
outside the Philippines; ensuring free flow of information for innovation,
6. A general description of privacy and growth, and national development. These Rules
security measures for data protection; also recognize the vital role of information and
communications technology in nation-building and
7. Brief description of the data processing enforce the State’s inherent obligation to ensure
system; that personal data in information and
8. Copy of all policies relating to data communications systems in the government and in
governance, data privacy, and information the private sector are secured and protected.
security;
9. What is the right to privacy?
9. Attestation to all certifications attained
that are related to information and The right to privacy encompasses the right to
communications processing; and protect a person's intimacy, identity, name, gender,
honor, dignity, appearance, feelings, and sexual
10. Name and contact details of the orientation. The right to privacy may be limited in
compliance or data protection officer, which the interests of others, under specific conditions,
shall immediately be updated in case of provided that the interference is not arbitrary or
changes. unlawful.
b. The procedure for registration shall be in **The right privacy is the right to be let alone
accordance with these Rules and other (Leave Me Alone). It is the most comprehensive of
issuances of the Commission. rights and the right most valued by civilized men.
7. How to remain in compliance of the DPA? The right to privacy and communication is in the
bill of rights, and is one of the fundamental rights
The National Privacy Commission, which was protected and enshrined in the constitution.
created to enforce RA 10173, will check whether
Privacy is a fundamental human right, enshrined in
companies are compliant based on a company
numerous international human rights
having 5 elements:
instruments.1 It is central to the protection of
1. Appointing a Data Protection Office human dignity and forms the basis of any
2. Conducting a privacy impact assessment democratic society. It also supports and reinforces
3. Creating a privacy knowledge management other rights, such as freedom of expression,
program information, and association.
4. Implementing a privacy and data protection Activities that restrict the right to privacy, such as
policy surveillance and censorship, can only be justified
5. Exercising a breach reporting procedure when they are prescribed by law, necessary to
achieve a legitimate aim, and proportionate to the
8. What is the state policy concerning
aim pursued.
information and communications systems?
As innovations in information technology have
SEC. 2. Declaration of Policy. – It is the policy of the enabled previously unimagined forms of collecting,
State to protect the fundamental human right of storing and sharing personal data, the right to
privacy, of communication while ensuring free flow privacy has evolved to encapsulate State
of information to promote innovation and growth. obligations related to the protection of personal
data. A number of international instruments Information and Communications System refers to
enshrine data protection principles, and many a system for generating, sending, receiving, storing
domestic legislatures have incorporated such or otherwise processing electronic data messages
principles into national law. or electronic documents and includes the computer
system or other similar device by or which data is
Article III Sections 1 and 2 of the 1987 constitution
recorded, transmitted or stored and any procedure
also recognizes every person’s right to physical
related to the recording, transmission or storage of
privacy, this states the government’s limited ability
electronic data, electronic message, or electronic
to search and/or deprive one’s person, place, and
document.
things of any unwarranted intrusion to one’s
private affairs for any reason unless legally allowed g. Personal information
to do so.
Personal information refers to any information
10. Define the following terms:
whether recorded in a material form or not, from
a. Commission which the identity of an individual is apparent or
can be reasonably and directly ascertained by the
Commission shall refer to the National Privacy entity holding the information, or when put
Commission created by virtue of this Act. together with other information would directly and
certainly identify an individual.
b. Consent of the data subject
h. Personal information controller
Consent of the data subject refers to any freely
given, specific, informed indication of will, whereby Personal information controller refers to a person
the data subject agrees to the collection and or organization who controls the collection,
processing of personal information about and/or holding, processing or use of personal information,
relating to him or her. Consent shall be evidenced including a person or organization who instructs
by written, electronic or recorded means. It may another person or organization to collect, hold,
also be given on behalf of the data subject by an process, use, transfer or disclose personal
agent specifically authorized by the data subject to information on his or her behalf. The term excludes:
do so.
(1) A person or organization who performs
c. Data subject such functions as instructed by another
person or organization; and
Data subject refers to an individual whose personal (2) An individual who collects, holds,
information is processed. processes or uses personal information in
connection with the individual’s personal,
d. Direct marketing
family or household affairs.
Direct marketing refers to communication by
i. Personal information processor
whatever means of any advertising or marketing
material which is directed to particular individuals. Personal information processor refers to any
natural or juridical person qualified to act as such
e. Filing system
under this Act to whom a personal information
Filing system refers to any act of information controller may outsource the processing of
relating to natural or juridical persons to the extent personal data pertaining to a data subject.
that, although the information is not processed by
j. Processing
equipment operating automatically in response to
instructions given for that purpose, the set is Processing refers to any operation or any set of
structured, either by reference to individuals or by operations performed upon personal information
reference to criteria relating to individuals, in such including, but not limited to, the collection,
a way that specific information relating to a recording, organization, storage, updating or
particular person is readily accessible. modification, retrieval, consultation, use,
consolidation, blocking, erasure or destruction of
f. Information and Communications
data.
system
k. Privileged information
Privileged information refers to any and all forms of b. Advisory - The Commission shall be the
data which under the Rules of Court and other advisory body on matters affecting
pertinent laws constitute privileged protection of personal data.
communication. c. Public education - The Commission shall
undertake necessary or appropriate
efforts to inform and educate the public
of data privacy, data protection, and
l. Sensitive information processor
fair information rights and
Sensitive personal information refers to personal responsibilities.
information: d. Compliance and monitoring - The
Commission shall perform compliance
1) About an individual’s race, ethnic origin, and monitoring functions to ensure
marital status, age, color, and religious, effective implementation of the Act,
philosophical or political affiliations; these Rules, and other issuances.
2) About an individual’s health, education, e. Complaints and investigations - The
genetic or sexual life of a person, or to any Commission shall adjudicate on
proceeding for any offense committed or complaints and investigations on
alleged to have been committed by such matters affecting personal data:
person, the disposal of such proceedings, or Provided, that in resolving any
the sentence of any court in such complaint or investigation, except
proceedings; where amicable settlement is reached
3) Issued by government agencies peculiar to by the parties, the Commission shall act
an individual which includes, but not limited as a collegial body.
to, social security numbers, previous or f. Enforcement - The Commission shall
current health records, licenses or its perform all acts as may be necessary to
denials, suspension or revocation, and tax effectively implement the Act, these
returns; and Rules, and its other issuances, and to
4) Specifically established by an executive enforce its Orders, Resolutions or
order or an act of Congress to be kept Decisions, including the imposition of
classified. administrative sanctions, fines, or
penalties.
11. Which government agency is in-charge of g. Other functions - The Commission shall
the administration and implementation of exercise such other functions as may be
the DPA? necessary to fulfill its mandate under
the Act.
Section 8. Mandate. The National Privacy
Commission is an independent body mandated to 12. What is the scope and application of DPA?
administer and implement the Act, and to monitor
and ensure compliance of the country with The Data Privacy Act is broadly applicable to
international standards set for personal data individuals and legal entities that process personal
protection. information, with some exceptions. The law has
extraterritorial application, applying not only to
SEC. 7. Functions of the National Privacy businesses with offices in the Philippines, but when
Commission. – To administer and implement the equipment based in the Philippines is used for
provisions of this Act, and to monitor and ensure processing. The act further applies to the
compliance of the country with international processing of the personal information of
standards set for data protection, there is hereby Philippines citizens regardless of where they reside.
created an independent body to be known as the
National Privacy Commission, winch shall have the One exception in the act provides that the law does
following functions: not apply to the processing of personal information
in the Philippines that was lawfully collected from
a. Rule Making - The Commission shall residents of foreign jurisdictions — an exception
develop, promulgate, review or amend helpful for Philippines companies that offer cloud
rules and regulations for the effective services.
implementation of the Act.
Section 4. Scope. The Act and these Rules apply to (4) The name of the individual on a document
the processing of personal data by any natural and prepared by the individual in the course of
juridical person in the government or private employment with the government;
sector. They apply to an act done or practice
engaged in and outside of the Philippines if: (b) Information about an individual who is or was
performing service under contract for a
a. The natural or juridical person involved in government institution that relates to the services
the processing of personal data is found or performed, including the terms of the contract, and
established in the Philippines; the name of the individual given in the course of
b. The act, practice or processing relates to the performance of those services;
personal data about a Philippine citizen or
Philippine resident; (c) Information relating to any discretionary benefit
c. The processing of personal data is being of a financial nature such as the granting of a
done in the Philippines; or license or permit given by the government to an
d. The act, practice or processing of personal individual, including the name of the individual and
data is done or engaged in by an entity with the exact nature of the benefit;
links to the Philippines, with due
(d) Personal information processed for journalistic,
consideration to international law and
artistic, literary or research purposes;
comity, such as, but not limited to, the
following: (e) Information necessary in order to carry out the
1) Use of equipment located in the functions of public authority which includes the
country, or maintains an office, branch processing of personal data for the performance by
or agency in the Philippines for the independent, central monetary authority and
processing of personal data; law enforcement and regulatory agencies of their
2) A contract is entered in the Philippines; constitutionally and statutorily mandated
3) A juridical entity unincorporated in the functions. Nothing in this Act shall be construed as
Philippines but has central management to have amended or repealed Republic Act No.
and control in the country; 1405, otherwise known as the Secrecy of Bank
4) An entity that has a branch, agency, Deposits Act; Republic Act No. 6426, otherwise
office or subsidiary in the Philippines known as the Foreign Currency Deposit Act; and
and the parent or affiliate of the Republic Act No. 9510, otherwise known as the
Philippine entity has access to personal Credit Information System Act (CISA);
data;
5) An entity that carries on business in the (f) Information necessary for banks and other
Philippines; financial institutions under the jurisdiction of the
6) An entity that collects or holds personal independent, central monetary authority or Bangko
data in the Philippines. Sentral ng Pilipinas to comply with Republic Act No.
9510, and Republic Act No. 9160, as amended,
13. What is excluded from the provisions of the otherwise known as the Anti-Money Laundering
DPA? Act and other applicable laws; and

This Act does not apply to the following: (g) Personal information originally collected from
residents of foreign jurisdictions in accordance with
(a) Information about any individual who is or was the laws of those foreign jurisdictions, including
an officer or employee of a government institution any applicable data privacy laws, which is being
that relates to the position or functions of the processed in the Philippines.
individual, including:
One exception in the act provides that the law does
(1) The fact that the individual is or was an officer not apply to the processing of personal information
or employee of the government institution; in the Philippines that was lawfully collected from
(2) The title, business address and office telephone residents of foreign jurisdictions — an exception
number of the individual; helpful for Philippines companies that offer cloud
(3) The classification, salary range and services.
responsibilities of the position held by the
individual; and
Section 5. Special Cases. The Act and these Rules applicable laws, regulations, or ethical
shall not apply to the following specified standards;
information, only to the minimum extent of d. Information necessary in order to carry out
collection, access, use, disclosure or other the functions of public authority, in
processing necessary to the purpose, function, or accordance with a constitutionally or
activity concerned: statutorily mandated function pertaining to
law enforcement or regulatory function,
a. Information processed for purpose of including the performance of the functions
allowing public access to information that of the independent, central monetary
fall within matters of public concern, authority, subject to restrictions provided by
pertaining to: law. Nothing in this Act shall be construed
1) Information about any individual who is as having amended or repealed Republic
or was an officer or employee of Act No. 1405, otherwise known as the
government that relates to his or her Secrecy of Bank Deposits Act; Republic Act
position or functions, including: No. 6426, otherwise known as the Foreign
a) The fact that the individual is or was Currency Deposit Act; and Republic Act No.
an officer or employee of the 9510, otherwise known as the Credit
government; Information System Act (CISA);
b) The title, office address, and office e. Information necessary for banks, other
telephone number of the individual; financial institutions under the jurisdiction
c) The classification, salary range, and of the independent, central monetary
responsibilities of the position held authority or Bangko Sentral ng Pilipinas,
by the individual; and and other bodies authorized by law, to the
d) The name of the individual on a extent necessary to comply with Republic
document he or she prepared in the Act No. 9510 (CISA), Republic Act No. 9160,
course of his or her employment as amended, otherwise known as the Anti-
with the government; Money Laundering Act, and other
2) Information about an individual who is applicable laws;
or was performing a service under f. Personal information originally collected
contract for a government institution, from residents of foreign jurisdictions in
but only in so far as it relates to such accordance with the laws of those foreign
service, including the the name of the jurisdictions, including any applicable data
individual and the terms of his or her privacy laws, which is being processed in
contract; the Philippines. The burden of proving the
3) Information relating to a benefit of a law of the foreign jurisdiction falls on the
financial nature conferred on an person or body seeking exemption. In the
individual upon the discretion of the absence of proof, the applicable law shall
government, such as the granting of a be presumed to be the Act and these Rules:
license or permit, including the name of
the individual and the exact nature of Provided, that the non-applicability of the Act or
the benefit: Provided, that they do not these Rules do not extend to personal information
include benefits given in the course of controllers or personal information processors, who
an ordinary transaction or as a matter remain subject to the requirements of
of right; implementing security measures for personal data
b. Personal information processed for protection: Provided further, that the processing of
journalistic, artistic or literary purpose, in the information provided in the preceding
order to uphold freedom of speech, of paragraphs shall be exempted from the
expression, or of the press, subject to requirements of the Act only to the minimum
requirements of other applicable law or extent necessary to achieve the specific purpose,
regulations; function, or activity.
c. Personal information that will be processed
for research purpose, intended for a public 14. Processing of personal information
benefit, subject to the requirements of
Section 18. Principles of Transparency, Legitimate
Purpose and Proportionality. The processing of
personal data shall be allowed subject to be rectified, supplemented, destroyed or
adherence to the principles of transparency, their further processing restricted;
legitimate purpose, and proportionality. d) Adequate and not excessive in relation to
the purposes for which they are collected
a. Transparency. The data subject must be and processed;
aware of the nature, purpose, and extent of e) Retained only for as long as necessary for
the processing of his or her personal data, the fulfillment of the purposes for which the
including the risks and safeguards involved, data was obtained or for the establishment,
the identity of personal information exercise or defense of legal claims, or for
controller, his or her rights as a data legitimate business purposes, or as provided
subject, and how these can be exercised. by law; and
Any information and communication f) Kept in a form which permits identification
relating to the processing of personal data of data subjects for no longer than is
should be easy to access and understand, necessary for the purposes for which the
using clear and plain language. data were collected and processed:
Provided, That personal information
b. Legitimate purpose. The processing of
collected for other purposes may lie
information shall be compatible with a
processed for historical, statistical or
declared and specified purpose which must
scientific purposes, and in cases laid down
not be contrary to law, morals, or public
in law may be stored for longer periods:
policy.
Provided, further, That adequate
c. Proportionality. The processing of safeguards are guaranteed by said laws
information shall be adequate, relevant, authorizing their processing.
suitable, necessary, and not excessive in
The personal information controller must ensure
relation to a declared and specified
implementation of personal information processing
purpose. Personal data shall be processed
principles set out herein.
only if the purpose of the processing could
not reasonably be fulfilled by other means. b. Mandatory personal information breach
notification
a. The general data privacy principles in
relation to personal information Security incident” is an event or occurrence that
gathering affects or tends to affect data protection, or may
compromise the availability, integrity and
SEC. 11. General Data Privacy Principles. – The
confidentiality of personal data. It includes
processing of personal information shall be
incidents that would result to a personal data
allowed, subject to compliance with the
breach, if not for safeguards that have been put in
requirements of this Act and other laws allowing
place;
disclosure of information to the public and
adherence to the principles of transparency, A “personal data breach,” on the other hand, is a
legitimate purpose and proportionality. subset of a security breach that actually leads to
“accidental or unlawful destruction, loss,
Personal information must, be:
alteration, unauthorized disclosure of, or access to,
a) Collected for specified and legitimate personal data transmitted, stored, or otherwise
purposes determined and declared before, processed.
or as soon as reasonably practicable after
Section 38. Data Breach Notification.
collection, and later processed in a way
compatible with such declared, specified a. The Commission and affected data
and legitimate purposes only; subjects shall be notified by the personal
b) Processed fairly and lawfully; information controller within seventy-two
c) Accurate, relevant and, where necessary for (72) hours upon knowledge of, or when
purposes for which it is to be used the there is reasonable belief by the personal
processing of personal information, kept up information controller or personal
to date; inaccurate or incomplete data must information processor that, a personal data
breach requiring notification has occurred.
b. Notification of personal data breach shall hinder the progress of a criminal
be required when sensitive personal investigation related to a serious breach.
information or any other information that
may, under the circumstances, be used to Section 41. Breach Report.
enable identity fraud are reasonably
a. The personal information controller shall
believed to have been acquired by an
notify the Commission by submitting a
unauthorized person, and the personal
report, whether written or electronic,
information controller or the Commission
containing the required contents of
believes that such unauthorized acquisition
notification. The report shall also include
is likely to give rise to a real risk of serious
the name of a designated representative of
harm to any affected data subject.
the personal information controller, and his
c. Depending on the nature of the incident, or her contact details.
or if there is delay or failure to notify, the
b. All security incidents and personal data
Commission may investigate the
breaches shall be documented through
circumstances surrounding the personal
written reports, including those not covered
data breach. Investigations may include on-
by the notification requirements. In the case
site examination of systems and
of personal data breaches, a report shall
procedures.
include the facts surrounding an incident,
Section 39. Contents of Notification. The the effects of such incident, and the
notification shall at least describe the nature of the remedial actions taken by the personal
breach, the personal data possibly involved, and information controller. In other security
the measures taken by the entity to address the incidents not involving personal data, a
breach. The notification shall also include measures report containing aggregated data shall
taken to reduce the harm or negative constitute sufficient documentation. These
consequences of the breach, the representatives of reports shall be made available when
the personal information controller, including their requested by the Commission. A general
contact details, from whom the data subject can summary of the reports shall be submitted
obtain additional information about the breach, to the Commission annually.
and any assistance to be provided to the affected
Section 42. Procedure for Notification. The
data subjects.
Procedure for breach notification shall be in
Section 40. Delay of Notification. Notification may accordance with the Act, these Rules, and any
be delayed only to the extent necessary to other issuance of the Commission.
determine the scope of the breach, to prevent
c. Define Security incident
further disclosures, or to restore reasonable
integrity to the information and communications “Security incident” is an event or occurrence that
system. affects or tends to affect data protection, or may
compromise the availability, integrity and
a. In evaluating if notification is
confidentiality of personal data. It includes
unwarranted, the Commission may take
incidents that would result to a personal data
into account compliance by the personal
breach, if not for safeguards that have been put in
information controller with this section and
place;
existence of good faith in the acquisition of
personal data. d. Define Personal data breach
b. The Commission may exempt a personal “Personal data breach” refers to a breach of
information controller from notification security leading to the accidental or unlawful
where, in its reasonable judgment, such destruction, loss, alteration, unauthorized
notification would not be in the public disclosure of, or access to, personal data
interest, or in the interest of the affected transmitted, stored, or otherwise processed.
data subjects.
e. Requirement to notify
c. The Commission may authorize
postponement of notification where it may
The law further provides that not all “personal data consequences of the breach, the representatives of
breaches” require notification., which provides the personal information controller, including their
several bases for not notifying data subjects or the contact details, from whom the data subject can
data protection authority. Section 38 of the IRRs obtain additional information about the breach,
provides the requirements of breach notification: and any assistance to be provided to the affected
data subjects.
 The breached information must be sensitive
personal information, or information that 15. Criteria for Lawful Processing of Personal
could be used for identity fraud, and Information.
 There is a reasonable belief that
unauthorized acquisition has occurred, and Section 21. Criteria for Lawful Processing of
 The risk to the data subject is real, and Personal Information. Processing of personal
 The potential harm is serious. information is allowed, unless prohibited by law.
For processing to be lawful, any of the following
The law provides that the Commission may conditions must be complied with:
determine that notification to data subjects is
unwarranted after taking into account the entity’s a. The data subject must have given his or her
compliance with the Privacy Act, and whether the consent prior to the collection, or as soon as
acquisition was in good faith. practicable and reasonable;
b. The processing involves the personal
f. Notification timeline and recipient information of a data subject who is a party
to a contractual agreement, in order to
The law places a concurrent obligation to notify the
fulfill obligations under the contract or to
National Privacy Commission as well as affected
take steps at the request of the data subject
data subjects within 72 hours of knowledge of, or
prior to entering the said agreement;
reasonable belief by the data controller of, a
c. The processing is necessary for compliance
personal data breach that requires notification.
with a legal obligation to which the
It is unclear at present whether the commission personal information controller is subject;
would allow a delay in notification of data subjects d. The processing is necessary to protect
to allow the commission to determine whether a vitally important interests of the data
notification is unwarranted. By the law, this would subject, including his or her life and health;
appear to be a gamble. e. The processing of personal information is
necessary to respond to national emergency
g. Notification contents or to comply with the requirements of
public order and safety, as prescribed by
The contents of the notification must at least: law;
f. The processing of personal information is
 Describe the nature of the breach; necessary for the fulfillment of the
 The personal data possibly involved; constitutional or statutory mandate of a
 The measures taken by the entity to address public authority; or
the breach; g. The processing is necessary to pursue the
 The measures take to reduce the harm or legitimate interests of the personal
negative consequence of the breach; information controller, or by a third party or
 The representatives of the personal parties to whom the data is disclosed,
information controller, including their except where such interests are overridden
contact details; by fundamental rights and freedoms of the
 Any assistance to be provided to the data subject, which require protection
affected data subjects. under the Philippine Constitution.

Rule IX. Sec. 39. Contents of Notification. The **Summary of Conditions


notification shall at least describe the nature of the
breach, the personal data possibly involved, and 1. Consent
the measures taken by the entity to address the 2. Fulfillment of a contract
breach. The notification shall also include measures 3. Compliance with legal obligation
taken to reduce the harm or negative
4. Protection of important interests of data and interests of natural or legal persons in
subject court proceedings, or the establishment,
5. Response to national emergency exercise, or defense of legal claims, or when
6. Fulfillment of the constitutional or statutory provided to government or public authority
mandate pursuant to a constitutional or statutory
7. Legitimate interests mandate.

16. The rule regarding processing of sensitive **General Data Privacy Principles
personal information and privileged
- It should adhere to the principles of transparency,
information.
legitimate purpose, and proportionality.
Section 22. Sensitive Personal Information and
**Summary of the exceptions:
Privileged Information. The processing of sensitive
personal and privileged information is prohibited, 1. Consent of the data subject
except in any of the following cases: 2. Pursuant to the law that does not require
consent
a. Consent is given by data subject, or by the
3. Necessity to protect life and health of a
parties to the exchange of privileged
person
information, prior to the processing of the
4. Necessity to achieve lawful and
sensitive personal information or privileged
noncommercial objectives of public
information, which shall be undertaken
organizations and their associations
pursuant to a declared, specified, and
5. Necessity for medical treatment
legitimate purpose;
6. Necessity to protect the lawful rights of
b. The processing of the sensitive personal
data subject in court proceedings, legal
information or privileged information is
proceedings, or regulation.
provided for by existing laws and
regulations: Provided, that said laws and
17. Is subcontracting of personal information
regulations do not require the consent of
allowed?
the data subject for the processing, and
guarantee the protection of personal data; Yes.
c. The processing is necessary to protect the
life and health of the data subject or Section 43. Subcontract of Personal Data. A
another person, and the data subject is not personal information controller may subcontract or
legally or physically able to express his or outsource the processing of personal data:
her consent prior to the processing; Provided, that the personal information controller
d. The processing is necessary to achieve the shall use contractual or other reasonable means to
lawful and noncommercial objectives of ensure that proper safeguards are in place, to
public organizations and their associations ensure the confidentiality, integrity and availability
provided that: of the personal data processed, prevent its use for
1) Processing is confined and related to the unauthorized purposes, and generally, comply with
bona fide members of these the requirements of the Act, these Rules, other
organizations or their associations; applicable laws for processing of personal data,
2) The sensitive personal information are and other issuances of the Commission.
not transferred to third parties; and
3) Consent of the data subject was 18. Extension of Privileged communication over
obtained prior to processing; privileged information
e. The processing is necessary for the purpose
Section 23. Extension of Privileged
of medical treatment: Provided, that it is
Communication. Personal information controllers
carried out by a medical practitioner or a
may invoke the principle of privileged
medical treatment institution, and an
communication over privileged information that
adequate level of protection of personal
they lawfully control or process. Subject to existing
data is ensured; or
laws and regulations, any evidence gathered from
f. The processing concerns sensitive personal
privileged information is inadmissible.
information or privileged information
necessary for the protection of lawful rights
When the Commission inquires upon c. Basis of processing, when processing
communication claimed to be privileged, the is not based on the consent of the
personal information controller concerned shall data subject;
prove the nature of the communication in an d. Scope and method of the personal
executive session. Should the communication be data processing;
determined as privileged, it shall be excluded from e. The recipients or classes of
evidence, and the contents thereof shall not form recipients to whom the personal
part of the records of the case: Provided, that data are or may be disclosed;
where the privileged communication itself is the f. Methods utilized for automated
subject of a breach, or a privacy concern or access, if the same is allowed by the
investigation, it may be disclosed to the data subject, and the extent to
Commission but only to the extent necessary for which such access is authorized,
the purpose of investigation, without including the including meaningful information
contents thereof in the records. about the logic involved, as well as
the significance and the envisaged
consequences of such processing for
the data subject;
19. Rights of Data subject
g. The identity and contact details of
The data subject or the individual sharing his/her the personal data controller or its
personal information has to be fully informed of representative;
several factors of the data collecting process. This h. The period for which the information
list includes, but isn’t limited to: will be stored; and
(1) the reason for use i. The existence of their rights as data
(2) methods for access subjects, including the right to
(3) the identity and contact details of the access, correction, and object to the
personal information controller processing, as well as the right to
4) how long the information will be stored lodge a complaint before the
for Commission.
(5) access to their rights.
**The personal data of a data subject is treated
Section 34. Rights of the Data Subject. The data almost literally in the same way as a personal
subject is entitled to the following rights: property. Therefore, it cannot be collected,
processed, and stored by any organization without
a. Right to be informed. the explicit consent. The information controllers
must therefore request the data subject to sign a
1. The data subject has a right to be consent form.
informed whether personal data pertaining
to him or her shall be, are being, or have **The right to be informed is the most basic right
been processed, including the existence of as it empowers the data subject to consider other
automated decision-making and profiling. actions to protect data privacy and their right to
protect their privacy and assert your other data
2. The data subject shall be notified and privacy rights.
furnished with information indicated
hereunder before the entry of his or her b. Right to object. The data subject shall have the
personal data into the processing system of right to object to the processing of his or her
the personal information controller, or at personal data, including processing for direct
the next practical opportunity: marketing, automated processing or profiling. The
data subject shall also be notified and given an
a. Description of the personal data to opportunity to withhold consent to the processing
be entered into the system; in case of changes or any amendment to the
b. Purposes for which they are being or information supplied or declared to the data
will be processed, including subject in the preceding paragraph.
processing for direct marketing,
profiling or historical, statistical or
scientific purpose;
When a data subject objects or withholds consent, informed of its inaccuracy and its rectification,
the personal information controller shall no longer upon reasonable request of the data subject.
process the personal data, unless:
e. Right to Erasure or Blocking. The data subject
1. The personal data is needed pursuant to shall have the right to suspend, withdraw or order
a subpoena; the blocking, removal or destruction of his or her
2. The collection and processing are for personal data from the personal information
obvious purposes, including, when it is controller’s filing system.
necessary for the performance of or in
relation to a contract or service to which the 1. This right may be exercised upon
data subject is a party, or when necessary discovery and substantial proof of any of
or desirable in the context of an employer- the following:
employee relationship between the
a. The personal data is incomplete,
collector and the data subject; or
outdated, false, or unlawfully
3. The information is being collected and
obtained;
processed as a result of a legal obligation.
b. The personal data is being used for
c. Right to Access. The data subject has the right to purpose not authorized by the data
reasonable access to, upon demand, the following: subject;
c. The personal data is no longer
1. Contents of his or her personal data that necessary for the purposes for which
were processed; they were collected;
2. Sources from which personal data were d. The data subject withdraws consent
obtained; or objects to the processing, and
3. Names and addresses of recipients of the there is no other legal ground or
personal data; overriding legitimate interest for the
4. Manner by which such data were processing;
processed; e. The personal data concerns private
5. Reasons for the disclosure of the personal information that is prejudicial to
data to recipients, if any; data subject, unless justified by
6. Information on automated processes freedom of speech, of expression, or
where the data will, or is likely to, be made of the press or otherwise authorized;
as the sole basis for any decision that f. The processing is unlawful;
significantly affects or will affect the data g. The personal information controller
subject; or personal information processor
7. Date when his or her personal data violated the rights of the data
concerning the data subject were last subject.
accessed and modified; and 2. The personal information controller may
8. The designation, name or identity, and notify third parties who have previously
address of the personal information received such processed personal
controller. information.

d. Right to rectification. The data subject has the f. Right to damages. The data subject shall be
right to dispute the inaccuracy or error in the indemnified for any damages sustained due to such
personal data and have the personal information inaccurate, incomplete, outdated, false, unlawfully
controller correct it immediately and accordingly, obtained or unauthorized use of personal data,
unless the request is vexatious or otherwise taking into account any violation of his or her rights
unreasonable. If the personal data has been and freedoms as data subject.
corrected, the personal information controller shall
**Do you have the right to file a case under the
ensure the accessibility of both the new and the
NPC? Do you have the right to complain?
retracted information and the simultaneous receipt
of the new and the retracted information by the - On top of those rights enumerated in the law,
intended recipients thereof: Provided, That there’s also the right to file a complaint with the
recipients or third parties who have previously NPC. If you feel that your personal information ahs
received such processed personal data shall be been misused, maliciously disclosed, or improperly
disposed, or your right to privacy has been a. On-site and Online Access.
violated, then you can file a complaint with NPC.
1. No employee of the government shall
20. Transmissibility of Rights of the Data subject have access to sensitive personal
information on government property or
Section 35. Transmissibility of Rights of the Data through online facilities unless he or she the
Subject. The lawful heirs and assigns of the data employee has received a security clearance
subject may invoke the rights of the data subject to from the head of the source agency. The
which he or she is an heir or an assignee, at any source agency is the government agency
time after the death of the data subject, or when who originally collected the personal data.
the data subject is incapacitated or incapable of
2. A source agency shall strictly regulate
exercising the rights as enumerated in the
access to sensitive personal information
immediately preceding section.
under its custody or control, particularly
21. Right to data portability when it allows online access. An employee
of the government shall only be granted a
Section 36. Right to Data Portability. Where his or security clearance when the performance of
her personal data is processed by electronic means his or her official functions or the provision
and in a structured and commonly used format, the of a public service directly depends on and
data subject shall have the right to obtain from the cannot otherwise be performed unless
personal information controller a copy of such data access to the personal data is allowed.
in an electronic or structured format that is
3. Where allowed under the next preceding
commonly used and allows for further use by the
sections, online access to sensitive personal
data subject. The exercise of this right shall
information shall be subject to the following
primarily take into account the right of data subject
conditions:
to have control over his or her personal data being
processed based on consent or contract, for (a) An information technology
commercial purpose, or through automated means. governance framework has been
The Commission may specify the electronic format designed and implemented;
referred to above, as well as the technical
(b) Sufficient organizational,
standards, modalities, procedures and other rules
physical and technical security
for their transfer.
measures have been established;
22. Security of Sensitive personal information in (c) The agency is capable of
government protecting sensitive personal
information in accordance with data
Rule VII. Sec. 30. Responsibility of Heads of
privacy practices and standards
Agencies. All sensitive personal information
recognized by the information and
maintained by the government, its agencies, and
communication technology industry;
instrumentalities shall be secured, as far as
practicable, with the use of the most appropriate (d) The employee of the government
standard recognized by the information and is only given online access to
communications technology industry, subject to sensitive personal information
these Rules and other issuances of the Commission. necessary for the performance of
The head of each government agency or official functions or the provision of
instrumentality shall be responsible for complying a public service.
with the security requirements mentioned herein.
b. Off-site access.
The Commission shall monitor government agency
compliance and may recommend the necessary 1. Sensitive personal information
action in order to satisfy the minimum standards. maintained by an agency may not be
transported or accessed from a location off
**Therefore the Data Privacy Act covers not only
or outside of government property, whether
government but also private sectors.
by its agent or employee, unless the head of
Sec. 31. Requirements Relating to Access by Agency agency has ensured the implementation of
Personnel to Sensitive Personal Information. privacy policies and appropriate security
measures. A request for such transportation
or access shall be submitted to and preceding sections, similar to a government agency
approved by the head of agency. The and its employees.
request must include proper accountability
mechanisms in the processing of data.
2. The head of agency shall approve
requests for off-site access in accordance
with the following guidelines:
(a) Deadline for Approval or
Disapproval. The head of agency
shall approve or disapprove the
request within two (2) business days
after the date of submission of the
request. Where no action is taken by
the head of agency, the request is
considered disapproved;
(b) Limitation to One thousand
(1,000) Records. Where a request is
approved, the head of agency shall
limit the access to not more than
one thousand (1,000) records at a
time, subject to the next succeeding
paragraph.
(c) Encryption. Any technology used
to store, transport or access
sensitive personal information for
purposes of off-site access approved
under this subsection shall be
secured by the use of the most
secure encryption standard
recognized by the Commission.
Sec. 32. Implementation of Security Requirements.
Notwithstanding the effective date of these Rules,
the requirements in the preceding sections shall be
implemented before any off-site or online access
request is approved. Any data sharing agreement
between a source agency and another government
agency shall be subject to review of the
Commission on its own initiative or upon complaint
of data subject.
Sec. 33. Applicability to Government Contractors.
In entering into any contract with a private service
provider that may involve accessing or requiring
sensitive personal information from one thousand
(1,000) or more individuals, a government agency
shall require such service provider and its
employees to register their personal data
processing system with the Commission in
accordance with the Act and these Rules. The
service provider, as personal information processor,
shall comply with the other provisions of the Act
and these Rules, particularly the immediately

You might also like