You are on page 1of 6

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/327281053

Data Privacy Act of 2012: A Case Study Approach to Philippine Government


Agencies Compliance

Article  in  Journal of Computational and Theoretical Nanoscience · October 2018


DOI: 10.1166/asl.2018.12404

CITATIONS READS

12 35,919

3 authors:

Bernie Fabito Michelle Renee Domingo Ching


National University (NU Lipa), Philippines De La Salle University
33 PUBLICATIONS   211 CITATIONS    10 PUBLICATIONS   26 CITATIONS   

SEE PROFILE SEE PROFILE

Nelson J Celis
De La Salle University
5 PUBLICATIONS   35 CITATIONS   

SEE PROFILE

Some of the authors of this publication are also working on these related projects:

HealthSource: A Web based public health awareness with heat map on common illnesses using social media stream View project

All content following this page was uploaded by Bernie Fabito on 17 March 2019.

The user has requested enhancement of the downloaded file.


Copyright © XXXX American Scientific Publishers Advanced Science Letters
All rights reserved Vol. XXXXXXXXX
Printed in the United States of America

https://www.ingentaconnect.com/contentone/asp/asl/2018/00000024/00000010/art00007

Data Privacy Act of 2012: A Case Study Approach


to Philippine Government Agencies Compliance
Michelle Renee D. Ching1, Bernie S. Fabito1,2, Nelson J. Celis1
1
College of Computer Studies, De La Salle University, 2401 Taft Avenue, Manila 1004, Philippines
2College of Computer Studies, National University – Manila, 551 MF Jhocson St., Sampaloc, Manila 1008, Philippines

The Philippine Data Privacy Act (DPA) of 2012 was enacted to protect the personal information of its citizens from being
disclosed without its consent. The National Privacy Commission (NPC) was established in 2015 to promote, regulate, and
monitor data privacy compliance of both Government and Private Institutions. This study sought to explore and explain how
and why do the Philippine Government agencies comply with the DPA 2012. Additionally, it also tried to determine and
understand the determinants of compliance as perceived by the government agencies. The Commission on Higher Education
(CHED) and the Commission on Elections (COMELEC) were the focus of the interviews conducted by the researchers. The
NPC was also included in the study to determine the status of the government’s compliance with the law. The study was a
form of a qualitative case study following the context of Yin’s (2014) study of research designs and methods. The case study
is the recommended approach as the main question starts with how and why. As a result of the study, it was found out that
there are three factors that somehow influence government agencies from hampering their compliance to the DPA 2012.
These are (1) lack of awareness, (2) budget, and (3) time constraints. With regards to the determinants of compliance, (1)
deterrence, and (2) legitimacy were the concluded causal factors on why they will comply with the DPA 2012. For future
works, it is recommended that a follow-up study be conducted after the compliance deadline.

Keywords: e-Governance; Security; Data Privacy; Personal Information; Data Privacy Compliance

1. INTRODUCTION an eye-opener for government agencies. This personal


data breach could have been prevented if COMELEC had
Data privacy can be defined in the literature as the an Information Security Management System (ISMS)4 in
desire of an individual to control or influence information place and complied with the DPA 2012. Though this law
about one’s self1,2. In the Philippines, the National does not only apply to COMELEC alone, but to all
Privacy Commission (NPC) has defined data privacy as government agencies and private sectors that have at least
the right of an individual not to disclose his or her 250 employees and/or at least 1,000 personal data5.
information and to live free from surveillance. Protecting However, even if the law has been signed on August 15,
personal information comes from one’s free will and is 2012, it has not been a priority for the government
recognized by all democratic society3. Therefore, it is agencies. Hence, with the COMELEC incident, the NPC
imperative that the government provide measures that had been very active in making sure that both private and
protect the interest of its people when it comes to their public organizations comply with the law until September
personal data. Hence, the creation of the Republic Act No. 9, 2017, giving all those who are affected with one-year
10173, or commonly known as the Data Privacy Act preparation for compliance.
(DPA) of 2012. Consequently, this research study aims to uncover the
Unfortunately, the COMELeak, which is the infamous challenges and its best practices that the different
personal data breach that happened under the government agencies are facing in terms of compliance
Commission on Elections (COMELEC) last March 20 to with the DPA 2012.
27, 2016 in the country, where 76,678,750 personal 2. REVIEW OF EXISTING STUDIES
information of Filipino voters were leaked 4, has become Governance, Risk, and Compliance
1
According to literature, there is no standard integrated The National Privacy Commission
definition for Governance, Risk, and Compliance (GRC)6,7. Because of the DPA 2012, the National Privacy
In lieu with this, there is a need to develop one. Racz, Commission (NPC) was established to oversee and enforce
Weippl, and Seufert (2014) developed a single-phrase it. In general, it aims to protect individual’s personal
definition for GRC, which is ‘an integrated, holistic information and uphold the right to privacy by regulating the
approach to organization-wide governance, risk, and processing of personal information14. Furthermore, the
compliance ensuring that an organization acts ethically commission is headed by a privacy commissioner and
correct and in accordance with its risk appetite, internal chairman, and two deputy privacy commissioners14. Having
policies, and external regulations through the alignment of this law mandates all government agencies and private
strategy, processes, technology, and people, thereby organizations that have 250 or more employees and/or 1,000
improving efficiency and effectiveness’6. or more personal data, which is similar with the General
Protecting information collected, processed, and stored Data Protection Regulation (GDPR) of Europe15, where this
by organizations, both private and public, specifically law was patterned as well.
personal information, can be done through GRC because of 3. RESEARCH QUESTIONS AND OBJECTIVES OF
its holistic approach encompassing business processes, the THE STUDY
technologies used for processing data and/or information, The objective of this research study is to uncover the
and the people within the organization. challenges and its best practices that the different
Information Security Management System government agencies are facing regarding compliance with
There are many security compliance regulatory the DPA 2012. Thus, the main research question is how and
organizations that can be tapped by any yorganizations who why will the Philippine government agencies comply with
want to implement an information security, such as ISO the DPA 2012? To be able to answer this, the following are
27001 and COBIT 5. ISO 27001 ‘provides requirements for the specific research questions:
establishing, implementing, maintaining, and continually 1. What are the data processes that deal with personal
improving an information security management system’8. data?
Moreover, COBIT 5, according to Suer and McMonagle 2. What are the management information systems in
(2017), is a set of guidance that is used for protecting and place that deal with personal data?
governing data and/or information, it also suggests that 3. How do the determinants of compliance by Sutinen
compliance should be included in the external laws and and Kuperan (1999) affect government agencies to
regulations, management of business risk, and internal comply with the DPA 2012? and
enterprise policies, and the key element of risk, which are 4. How does the compliance of the government
information, processing infrastructure, and applications, agencies with the e-Commerce Act of 2000 impact
should be taken into account9. its compliance with the DPA 2012?
Those security compliance regulatory organizations can 4. SCOPE OF THE STUDY
be employed to an organization to ensure that information The government agencies included in this research
security is in place and will be efficient and effective. study were the NPC, CHED, and COMELEC. The resource
Republic Act No. 8792 of the Philippines person for NPC was Dr. Rolando Lansigan, the Compliance
The Republic Act No. 8792 of the Philippines or the and Monitoring Division Chief; for CHED, it was Dr. Maria
e-Commerce Act of 2000 is a law that aims to facilitate Terisita Semana, the Chief Information Officer; and for
domestic and international dealings, transactions, COMELEC, it was Atty. Pamela Joy T. Herrera, Attorney
under the Information Technology Department.
arrangements, agreements, contracts, and exchanges and
5. METHODOLOGY
storage of information with the use of electronic, optical,
The study was conducted through qualitative methods
and technology to recognize the authenticity and
employing case studies. qualitative case studies allowed the
reliability of the electronic documents and to promote the
researchers to explain the connections between the
universal use of the government with electronic
phenomenon and the context in which it exists. Additionally,
transactions10,11.
several literatures have provided well-established theories
This law plays a vital role in compliance with the
that have been born out of qualitative case study16. Its merits
DPA 2012 because it is related to data processing and if
in the literature have allowed several researchers to employ
an organization has various data processing, protecting
qualitative case approach in their studies. a qualitative case
the information is necessary.
study as explained by Yin (2014) is an empirical inquiry that
Republic Act No. 10173 of the Philippines
tries to investigate certain phenomenon using multiple
The Republic Act No. 10173 of the Philippines or the
sources of evidence17. It starts with planning and followed
Data Privacy Act of 2012 is a law that aims to protect
by design. Here, it describes the characteristics of the case
individual’s personal information in information and
study; next would be preparation for the collection of data
communications systems in both the government and private
and presentation of the findings and analysis at the end;
sectors that was approved on August 15, 2012, which is
followed by collect, which describes how the data is
composed of nine chapters and 45 sections12. Moreover, its
acquired, will it be through observations, surveys, interviews,
Implementing Rules and Regulations (IRR) was
documents, and/or archival records; and analyze, which is
promulgated on August 24, 201613.
the technique, framework, or concept to be employed for legitimacy are expected to comply regardless of its own
analyzing the collected data17. dictates20.
Overall, Fig.3 describes the operational framework in
which the research study was analyzed.

Fig. 3. Operational Framework


Fig. 1. Case Study Model 6. FINDINGS
For the study to be considered in the context of a case Commission on Higher Education (CHED)
study, the question provided in the main problem should From the interview conducted with Dr. Semana, it was
start with how or why17. As shown in Fig.1., the planning found out that not all of their business processes are
phase of the model refers to the exploratory approach. automated (not fully compliant with RA 8792). For this very
Additionally, the specific research questions tackled with a reason, they are in the process of developing their
what form, this study is also an exploratory17. Furthermore, information system and updating their portal. Hence,
the design phase followed a multiple holistic case study requiring a need to re-engineer their business processes.
because there were three government agencies examined. With the requirement of complying with the DPA 2012, the
The method for acquiring data were through interviews and commission is trying to fast track the development of the
documents collected from the target government agencies. needed information system through employing IT
To analyze the collated data, the determinants of compliance consultants. Through there were already previous plans and
by Sutinen and Kuperan (1999) was used. attempts to upgrade their information system prior to the
The case studies, in general, can either proposed a new requirement of complying the DPA 2012, the law has made
theory or validate existing theories in which the latter was the agency to speed up the development and upgrade of their
used for this research study. As mentioned, the determinants information system.
of compliance proposed by Sutinen and Kuperan (1999) as Consequently, it seems that the absence of their
shown in Fig.2, were studied to determine whether they information system and portal, which is a core requirement
affect the government agencies’ compliance with DPA 2012. for the RA 8792, may have also hampered their compliance.
Aside from deterrence, which is perceived as the most Aside from the time constraint that somehow impedes
common type of factor for regulatory compliance, the the agency’s compliance, they are also suffering from
authors provided other compelling causal factors affecting meager funds. This is because they have already submitted
the compliance behavior. their 2017 budget two years prior the NPC conducted a
workshop or seminar last December 2016. For this reason,
the agency failed to allot the needed fund to comply with the
DPA 2012. The budget constraint issue holds true not just for
CHED but also to other remaining government agencies.
This was confirmed by Atty. Herrera of the COMELEC.
Furthermore, when asked if the agency would be able to
comply in time with the given deadline, Dr. Semana
answered that they are doing their very best to exhaust all
Fig. 2. Determinants of Compliance18 means to comply with the law, regardless of accompanying
As a result of the study, the determinants were challenges that it brings. Additionally, the corresponding
narrowed down to two based on the interviews conducted. punishment associated with its failure to comply is too much
These determinants were (1) deterrence, and (2) legitimacy. for the Data Protection Officer (DPO) and the agency to bear.
The other determinants of compliance were neglected as Commission on Elections (COMELEC)
they did not serve as causal factors for the government Based on the study conducted by Bonsol, Carillo,
agencies compliance with the DPA 2012 (e.g., social Ching M., Ching K, Duran, and Tatel (2011), the top three
influence). information systems that are prioritized for development
As defined, deterrence is a strategy that enforces were the (1) Automated Election System; (2) Voter
punishment surpassing any economic gain from failing to Education and Awareness System; and (3) Case
comply with the required rules to promote industry Management System among others. All these information
compliance19. Furthermore, another factor that compels systems process personal data.
government agencies to comply with the law is legitimacy. Between CHED and COMELEC, it seemed that the
Legitimacy is defined as the recognition and acceptance to a latter is highly more compliant with the DPA 2012. Based on
governing body. An organization who recognizes one’s the interview with Atty. Herrera, the agency is ahead of the
3
compliance as opposed to other government agencies. The 2012.
agency has already appointed their DPO, conducted their Dr. Lansigan also shared that following pillars that
Privacy Impact Assessment (PIA), which is a core must be met for government agencies to be considered fully
requirement for the DPA 2012 compliance, submitted the compliant. These are (1) Appointment of DPO; (2) Conduct
Breach Management Plan (BMP), which stemmed out from of Privacy Impact Assessment; (3) creation of the Privacy
their Privacy Management Program (PMP), and has started Management Program; (4) creation of the Data Protection
developing their information security policies. Measures; and (5) creation of Breach Management Program.
Atty. Herrera, however, shared that the vast number of Out of the five pillars, the second to the fifth pillars are those
offices starting from the regional field offices down to the that are difficult to achieve. Some government organizations
municipality level is somehow challenging as they should would outsource it, while others chose to do it within their
make sure that all offices all over the country are able to organizations.
comply with the law. The logistics and operations in the With respect to the determinants of compliance, he
physical aspect of the IRR would require high amount of shared that (1) legitimacy; (2) deterrence; and (3) reputation
financial resources that could keep all data in all regional, are the reasons why they need to comply. Since it is what the
provincial, and municipality levels safe and secured. law dictates, it is expected that the government agencies
Furthermore, just like CHED, this was not also included in should follow. However, when compared with the
the budge of COMELEC. government agencies’ compliance with the e-Commerce law,
When asked about the agency’s determinants of they are more worried with the DPA 2012 due to the
compliance, Atty. Herrera answered deterrence as the accompanying repercussions. Deterrence, in this case,
number one factor followed by legitimacy. Though the law seemed to be the most compelling reason why they need to
existed since 2012, no one acted on it. It was only after 2015 comply.
when the agency started to act on their compliance. Since Furthermore, according to Dr. Lansigan, they think that
the repercussion for non-compliance is high, the agency the deadline provided for the compliance was fair, given that
must comply. This also holds true for CHED. the law was in existent since 2012 and there is only one-year
On the latter part of the interview, it was found out that compliant period whenever a law mandates the government
due to their ongoing case with the NPC regarding agencies to comply.
COMELeak, the agency is able to fast track their Additionally, the agency provides various assistance to
compliance. This only means that though NPC, as the government agencies who are having difficulties in
represented by Dr. Lansigan, mentioned that no government complying with the DPA 2012. They also provided a
agency has yet complied with DPA 2012, it seemed that Toolkit21 to guide both private and public sectors affected by
COMELEC is readier with their compliance vis-à-vis with the law.
CHED and other government agencies readiness to DPA 7. CONCLUSION
2012 compliance. This research study has provided useful insights on the
National Privacy Commission (NPC) government agencies’ compliance with the DPA 2012.
The side of the NPC was also considered for interview Based on the interviews conducted with COMELEC, CHED,
in relation to the status of the government agencies’ DPA and NPC, it can be concluded that three factors that
2012 compliance. According to Dr. Lansigan, no somehow influence government agencies from hampering
government agencies have fully complied yet. However, their compliance. These are (1) lack of awareness; (2)
some agencies have already submitted partial documents for budget; and (3) time constraints.
compliance. As discussed by Dr. Lansigan, several government
When asked about possible reasons why it would be agencies are experiencing problems with regards to the
difficult for government agencies to comply, he shared the understanding the DPO’s accountability and its role is not
following reasons: (1) there is no DPO plantilla position yet fully absorbed by the designated DPO. This is true for
available for government agencies. The NPC, however, CHED as their appointed DPO is in doubt of the
together with the Department of Budget and Management responsibilities and accountabilities assigned to his
(DBM), is now working together to provide a plantilla designation. Budget constraints also hold an important factor
position to all government agencies. For the meantime, that pulls away from their compliance to the law. CHED and
several government agencies have already pointed their COMELEC have not included in their budget the needed
DPO in the form of designations; (2) a misconception about financial resources to work on their compliance since the
the DPO’s accountability to a breach. There’s a myth that budget for 2017 was approved two years back, which is
says when a breach is made, it is the DPO who will 2015. That was the time when the DPA 2012 was enacted
immediately suffer the consequences; (3) lack of awareness but no IRR has been established until 201613. Additionally, it
on the responsibility of a DPO. The role of a DPO is not yet was only in 2016 when the NPC has started doing tis
clear to the agencies; (4) lack of awareness to the DPA 2012; awareness campaign, it was only then where it became clear
and (5) the wait-and-see attitude, wherein they will comply for the government agencies about the requirements for the
what they can until the set deadline and then wait and see compliance and its accompanying punishments.
what punishments the NPC will impose to those government Furthermore, since the government agencies were only
agencies that were not able to fully comply with the DPA given a year to comply, it is limited. This was also
influenced by the absence of information systems and [7] Manuel Wiesche, Michael Schermann, and Helmut Krcmar. 2011.
portals that should have existed a long time ago in Exploring the Contribution of Information Technology to
Governance, Risk Management, and Compliance ( GRC ) Initiatives.
compliance with the e-Commerce Act of 2000. Eur. Conf. Inf. Syst. 49, 2011 (2011), Paper 4. Retrieved from
With regards to the determinants of compliance, http://aisel.aisnet.org/ecis2011/4
deterrence and legitimacy were concluded causal factors on [8] ISO/IEC 27001. 2013. Information Technology — Security
why government agencies comply with the DPA 2012. As Techniques — Information Security Management Systems —
Requirements. ISO/IEC 11, (2013), 1–24.
compared to the e-Commerce Act of 2000, they are more [9] Myles Suer and Les McMonagle. 2017. Extending COBIT 5 Data
compelled to comply with the DPA 2012. However, both are Security and Governance Guidance. COBIT Focus January (2017),
laws that need to be observed, the e-Commerce law does not 1–6.
have any associated repercussions for the failure of [10] Nelson J. Celis. 2005. Compliance with Philippine e-Commerce Act:
compliance. Though, the two government agencies are A Manifestation of Organizational Commitment in Automating
Processes.
trying to adhere to it but are not fully compliant10. Moreover, [11] 2000. Republic Act No .8792 of Philippines Electronic Commerce
in the case of the DPA 2012, they are more aggressive to Act of 2000. Philippines Senate and House of Representatives of the
comply due to the consequences solely indicated for the Republic of the Philippines.
non-compliance and the possible breach after it. [12] 2011. Republic Act No. 10173. Congress of the Philippines, Metro
Manila. Retrieved June 15, 2017 from http://www.dict.gov.ph/wp-
Another example that is similar with deterrence as a content/uploads/2014/10/20120815-RA-10173-BSA.pdf
determinant for compliance is the case of COMELEC with [13] 2012. Republic of the Philippines Implementing Rules and
NPC. The COMELEC was able to fast track their Regulations of Republic Act No. 10173. National Privacy
compliance due to their ongoing case. If it had not been for it, Commission.
the result might have been a different story. [14] About Us | National Privacy Commission. Retrieved August 20, 2017
from https://privacy.gov.ph/about-us/#visionmission
8. FUTURE WORK [15] 2016. Regulation of the European Parliament and of the Council. The
Since this research study was conducted during the European Parliament The European Council.
compliance period of the government agencies, it is DOI:https://doi.org/http://eur-
recommended to follow-up with the CHED and COMELEC lex.europa.eu/pri/en/oj/dat/2003/l_285/l_28520031101en00330037.p
df
after the compliance deadline to see if they are fully [16] Andrea Runfola, Andrea Perna, Enrico Baraldi, and Gian Luca
compliant of not. Gregori. 2017. The use of qualitative case studies in top business and
ACKNOWLEDGMENTS management journals: A quantitative analysis of recent patterns. Eur.
The authors would like to express their gratitude to Manag. J. 35, 1 (February 2017), 116–127.
their Case Study professor, Dr. Nelson J. Celis, for imparting DOI:https://doi.org/https://doi.org/10.1016/j.emj.2016.04.001
[17] Robert K. Yin. 2014. Case Study Research.
his knowledge on conducting a case study research, his [18] Jon G. Sutinen and K. Kuperan. 1999. A Socio‐Economic Theory of
expertise with the e-Commerce Act of 2000 and the Data Regulatory Compliance. Int. J. Soc. Econ. 26, 1/2/3 (1999), 174–193.
Privacy Act of 2012, and networks with various Philippine DOI:https://doi.org/10.1108/03068299910229569
government agencies. To the authors’ subject matter experts, [19] Paul R. Zimmerman. 2014. The deterrence of crime through private
security efforts: Theory and evidence. Int. Rev. Law Econ. 37, (2014),
Dr. Maria Terisita Semana of CHED, Atty. Pamela Joy T. 66–75. DOI:https://doi.org/10.1016/j.irle.2013.06.003
Herrera of COMELEC, and Dr. Rolando Lansigan and Mr. [20] Jee Young Chung. 2010. Examining Organizational Legitimacy: an
Cleo Martinez of the NPC. And last but not the least, to our Empirical Analysis of Organizational Legitimacy, Issue Legitimacy,
Heavenly Father for providing us wisdom, knowledge, and Legitimacy Gaps, and Factors Affecting the Legitimacy Regarding
strength in finishing this valuable research study. the Issue of Direct-To- Consumer Advertising in the Pharmaceutical
Industry. (2010), 152. Retrieved from
REFERENCES http://gateway.proquest.com/openurl?url_ver=Z39.88-
[1] France Bélanger and Robert E. Crossler. 2011. Privacy in the Digital 2004&res_dat=xri:pqdiss&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertat
Age: A Review of Information Privacy Research in Information ion&rft_dat=xri:pqdiss:3426011 (18. 3. 2014)
Systems. MIS Quarterly 35, 1017–1041. [21] 2017. National Privacy Commission Toolkit: A Guide for
DOI:https://doi.org/10.2307/41409971 Management and Data Protection Officers.
[2] Donald International Information Management Association.,
Shoshana Altschuller, and Eric Moscato. 2014. Communications of
the IIMA. International Information Management Association.
Retrieved August 20, 2017 from
http://scholarworks.lib.csusb.edu/ciima/vol13/iss4/7
[3] Anna Romanou. 2017. The necessity of the implementation of
Privacy by Design in sectors where data protection concerns arise.
Comput. Law Secur. Rev. (2017), 1–12.
DOI:https://doi.org/10.1016/j.clsr.2017.05.021
[4] Nelson J. Celis. 2017. “COMELeak”: Telltale Sign of Poor
Governance Part 1. The Manila Times Online. Retrieved from
http://www.manilatimes.net/comeleak-telltale-sign-poor-
governance/306281/
[5] 2011. Republic Act No. 10173. Congress of the Philippines, Metro
Manila.
[6] Nicolas Racz, Edgar Weippl, and Andreas Seufert. 2010. A Frame of
Reference for Research of Integrated Governance, Risk, and
Compliance (GRC). Commun. Multimed. Secur. (2010), 106–117.
DOI:https://doi.org/10.1007/978-3-642-13241-4_11
5

View publication stats

You might also like