SlideShare uma empresa Scribd logo
1 de 41
Baixar para ler offline
The Data Privacy Act of 2012, its
Compliance and implementation
in the Philippines
15 May–16 May · Harbour Plaza North Point, Hong Kong .
Dr. Rolando R. Lansigan, CEH, CHFI, SySA+
(Former Chief- Compliance and Monitoring Division)
National Privacy Commission
GDPR Coalition Ambassador
Do not COLLECT
if you cannot
PROTECT
What is the Data Privacy Act of 2012?
• SECTION 1. Short Title. – This Act shall be known as
the “Data Privacy Act of 2012”.
• Republic Act 10173, the Data Privacy Act of 2012
AN ACT PROTECTING INDIVIDUAL PERSONAL INFORMATION IN INFORMATION AND
COMMUNICATIONS SYSTEMS IN THE GOVERNMENT AND THE PRIVATE SECTOR, CREATING FOR THIS
PURPOSE A NATIONAL PRIVACY COMMISSION, AND FOR OTHER PURPOSES
• The National Privacy Commission (NPC) is a body that is mandated to
administer and implement this law. The functions of the NPC include:
– rule-making,
– advisory,
– public education,
– compliance and monitoring,
– investigations and complaints,
– and enforcement.
The DPA applies to the processing of all types
of personal information and to any natural
and juridical person, in the country and even
abroad, subject to certain qualifications.
Sec. 4, DPA
SCOPE OF THE DPA
Sections 1-6.
Definitions and General
Provisions
Sections 7-10. National
Privacy Commission
Structure of RA 10173,
the Data Privacy Act
Section 22-24.
Provisions Specific to
Government
Section 25-37.
Penalties
Sections 11-21. Rights
of Data Subjects, and
Obligations of Personal
Information Controllers
and Processors
Philippines’ DPA vs GDPR
Categories Categories Categories
Purpose Preventing Harm Principle
Integrity and Confidentiality
Material Scope Lawfulness, Fairness and
Transparency
Accountability
Territorial Scope Purpose Limitation Access and Correction
Personal Data Data Minimization Data Portability
Sensitive Personal Data Accuracy Transfer of Personal Data to
Another Person or country
Data Controller Storage Limitation Breach Definition *
Data Processors Notice and Choice Breach Notification *
Publicly Available Information Breach Mitigation
The National Privacy Commission is an independent body mandated to
administer and implement the Data Privacy Act, and to monitor and ensure
compliance of the country with international standards set for personal data
protection.
Timeline of DPA Law and other issuances
passed to Organization’s Compliance
2012
March
2016
August
2016
Sept. 9,
2016
Sept. 9,
2017
Data
Privacy
Act (DPA)
Passed
into law
National
Privacy
Commission
(NPC) was
formed
Implementin
g rules and
Regulations
(IRRs) was
published
IRR came
into effect
Deadline:
DPO
Registration
12
months
Registration Requirements: All personal data processing systems (DPS) operating in the
Philippines that involve Personal Data concerning at least 1,000 individuals/personal
records must be registered with NPC
March
8, 2018
Deadline:
(ANNUAL)
Registration of
DPS
June 30,
2018
Deadline:
(ANNUAL)
Security
Incident
Reports
EXAMPLES OF POTENTIAL BREACHES AND SECURITY INCIDENTS
INVOLVING PERSONAL INFORMATION
• Potential Breaches
1. Bank – Consent form
2. Hospital and School Records – Storage
and Disposal Policy
3. Student transferred - Without Consent
4. Clinical record of a student to disclose with
her parents - Consent
5. List of top students/passers - Consent
6. Cedula in Malls – Disposal Policy/Improper
Disposal
7. Security issues in buildings – logbook
8. Use of re-cycled papers – Disposal Policy /
Access due to negligence
9. Hard drives sold online –Disposal Policy
10. Use of CCTV – Privacy Issues
11. Use of USB/CD/Personal laptop –
Encryption issue
• Access Control and Security Policy
12. Personal Records stolen from home of an employee -
Security
13. Viewing of Student Records in Public – Physical Security
14. Raffle stubs – Privacy Notice / Storage and Disposal Policy
15. Universities and Colleges websites with weak
authentication
16. Photocopiers re-sold without wiping the hard drives
17. Password hacked/revealed -
18. Accidentally sent an email attachment – Unauthorized
Disclosure
• Other Violations / Data Privacy Act
Principles
19. No Data Sharing Agreement (DSA)
20. No Privacy Notice
21. No Sub-contracting Agreement
22. No Breach Drill
23. Profiling of customers of malls – Targeted Marketing
24. Unjustifiable collection of personal data of a school –
Principle of Proportionality
DPA
Section
Punishable Act For Personal
Information
For Sensitive Personal
Information
Fine (Pesos)
JAIL TERM
25 Unauthorized processing 1-3 years 3-6 years 500 k – 4 million
26 Access due to negligence 1-3 years 3-6 years 500 k – 4 million
27 Improper disposal 6 months – 2 years 3-6 years 100 k – 1 million
28 Unauthorized purposes 18 months – 5 years 2-7 years 500 k – 2 million
29 Intentional breach 1-3 years 500 k – 2 million
30 Concealment of breach 18 months – 5 years 500 k – 1 million
31 Malicious disclosure 18 month – 5 years 500 k – 1 million
32 Unauthorized disclosure 1-3 years 3-5 years 500 k – 2 million
33 Combination of acts 1-3 years 1 million – 5 million
Potential Penalties listed in the Data Privacy Act
NPC’s FIVE PILLARS OF COMPLIANCE
DPO
PIA
PMP
PDP
BRP
THE FIVE PILLARS OF COMPLIANCE
• Commit to Comply: Appoint a Data Protection
Officer (DPO)
• Know your Risk: Conduct a Privacy Impact
Assessment (PIA)
• Be Accountable: Create your Privacy
Management Program and Privacy Manual (PMP)
• Demonstrate your Compliance: Implement your
Privacy and Data Protection Measure (PDP)
• Be Prepared for Breach: Regularly Exercise your
Breach Reporting Procedure (BRP)
Designating a DPO is the first essential
step. You cannot register with the NPC
unless you have a DPO.
All PICs and PIPs should designate a Data
Protection Officer
• The personal information controller shall designate an
individual or individuals who are accountable for the
organization’s compliance with this Act. The identity of
the individual(s) so designated shall be made known to
any data subject upon request. (Sec. 21[b])
• xxx The personal information processor shall comply
with all the requirements of this Act and other applicable
laws. (Sec. 14)
PILLAR 2: KNOW YOUR RISKS
“The determination of the appropriate level of security under this
section must take into account the nature of the personal
information to be protected, the risks represented by the
processing, the size of the organization and complexity of its
operations, current data privacy best practices and the cost of
security implementation”
- Section 20.C of DPA of 2012
Technical
Organisational –
other measures
1
2
ORGANIZATIONAL
PHYSICAL
TECHNICAL
IMPLEMENT SECURITY MEASURES
“The PIC shall promptly notify the Commission and affected data
subjects when sensitive personal information or other information that
may, under the circumstances, be used to enable identity fraud are
reasonably believed to have been acquired by an unauthorized
person, and the PIC or the Commission believes that that such
unauthorized acquisition is likely to give rise to a real risk of serious
harm to any affected data subject.”
Section 20.f
“Concealment of Security Breaches Involving Sensitive Personal
Information. –– The penalty of imprisonment of one (1) year and six (6)
months to five (5) years and a fine of not less than Five hundred
thousand pesos (Php500,000.00) but not more than One million pesos
(Php1,000,000.00) shall be imposed on persons who, after having
knowledge of a security breach and of the obligation to notify the
Commission pursuant to Section 20(f), intentionally or by omission
conceals the fact of such security breach.
Section 30
The 72-hour deadline
IRR Section 38 (a) Data Breach Notification. The Commission and
affected data subjects shall be notified by the PIC within seventy-two
(72) hours upon knowledge of, or when there is reasonable belief by
the PIC or PIP that, a personal data breach requiring notification has
occurred.
From https://privacy.gov.ph/memorandum-circulars/
Keep in touch
END OF PRESENTATION

Mais conteúdo relacionado

Mais procurados

Data protection act
Data protection act Data protection act
Data protection act
Iqbal Bocus
 
Special laws on children 8353, 9262, 9231, 7877, 7610, 920
Special laws on children   8353, 9262, 9231, 7877, 7610, 920Special laws on children   8353, 9262, 9231, 7877, 7610, 920
Special laws on children 8353, 9262, 9231, 7877, 7610, 920
Omar Jacalne
 
History of agrarian reform
History of agrarian reformHistory of agrarian reform
History of agrarian reform
F Mad
 
The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012
Jim Ayson
 

Mais procurados (20)

Data Privacy Act of 2012.pptx
Data Privacy Act of 2012.pptxData Privacy Act of 2012.pptx
Data Privacy Act of 2012.pptx
 
CEU DPA
CEU DPACEU DPA
CEU DPA
 
RA 9344-PRESENTATION.ppt.pptx
RA 9344-PRESENTATION.ppt.pptxRA 9344-PRESENTATION.ppt.pptx
RA 9344-PRESENTATION.ppt.pptx
 
Data Privacy Act of 2012 implication to cooperatives
Data Privacy Act of 2012 implication to cooperativesData Privacy Act of 2012 implication to cooperatives
Data Privacy Act of 2012 implication to cooperatives
 
Data protection act
Data protection act Data protection act
Data protection act
 
Summary Bill or RIGHTS Article 3 Section 1-22
Summary Bill or RIGHTS Article 3 Section 1-22Summary Bill or RIGHTS Article 3 Section 1-22
Summary Bill or RIGHTS Article 3 Section 1-22
 
Special laws on children 8353, 9262, 9231, 7877, 7610, 920
Special laws on children   8353, 9262, 9231, 7877, 7610, 920Special laws on children   8353, 9262, 9231, 7877, 7610, 920
Special laws on children 8353, 9262, 9231, 7877, 7610, 920
 
Rizal in 19th Century - World Events
Rizal in 19th Century - World EventsRizal in 19th Century - World Events
Rizal in 19th Century - World Events
 
Republic Act 10175: Cybercrime Prevention Act of 2012
Republic Act 10175: Cybercrime Prevention Act of 2012Republic Act 10175: Cybercrime Prevention Act of 2012
Republic Act 10175: Cybercrime Prevention Act of 2012
 
History of agrarian reform
History of agrarian reformHistory of agrarian reform
History of agrarian reform
 
Practice Application- Nursing Informatics
Practice Application- Nursing InformaticsPractice Application- Nursing Informatics
Practice Application- Nursing Informatics
 
The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012
 
PNP P.A.T.R.O.L. Plan 2030 and anti-drug campaign
PNP P.A.T.R.O.L. Plan 2030 and anti-drug campaignPNP P.A.T.R.O.L. Plan 2030 and anti-drug campaign
PNP P.A.T.R.O.L. Plan 2030 and anti-drug campaign
 
Kinds of Taxes Under Existing Philippine Laws
Kinds of Taxes Under Existing Philippine LawsKinds of Taxes Under Existing Philippine Laws
Kinds of Taxes Under Existing Philippine Laws
 
Pnp patrol plan_2030-guidebook
Pnp patrol plan_2030-guidebookPnp patrol plan_2030-guidebook
Pnp patrol plan_2030-guidebook
 
Anti-voyeurism in the Philippines presentation
Anti-voyeurism in the Philippines presentationAnti-voyeurism in the Philippines presentation
Anti-voyeurism in the Philippines presentation
 
RA 6713 or Code of Conduct and Ethical Standards for Public Officials and Emp...
RA 6713 or Code of Conduct and Ethical Standards for Public Officials and Emp...RA 6713 or Code of Conduct and Ethical Standards for Public Officials and Emp...
RA 6713 or Code of Conduct and Ethical Standards for Public Officials and Emp...
 
Chn 5
Chn  5Chn  5
Chn 5
 
Cybercrime law
Cybercrime lawCybercrime law
Cybercrime law
 
Data Privacy - Rights of the Data Subject
Data Privacy - Rights of the Data SubjectData Privacy - Rights of the Data Subject
Data Privacy - Rights of the Data Subject
 

Semelhante a Dr. Rolando Rivera Lansigan - The Privacy Act of 2012, its compliance and implementation in the Philippines

New opportunities and business risks with evolving privacy regulations
New opportunities and business risks with evolving privacy regulationsNew opportunities and business risks with evolving privacy regulations
New opportunities and business risks with evolving privacy regulations
Ulf Mattsson
 
ISACA Journal Data Protection Act (UK) and GAPP Alignment
ISACA Journal Data Protection Act (UK) and GAPP AlignmentISACA Journal Data Protection Act (UK) and GAPP Alignment
ISACA Journal Data Protection Act (UK) and GAPP Alignment
Mohammed J. Khan
 
Legal And Regulatory Dp Challenges For The Financial Services Sector
Legal And Regulatory Dp Challenges For The Financial Services SectorLegal And Regulatory Dp Challenges For The Financial Services Sector
Legal And Regulatory Dp Challenges For The Financial Services Sector
MSpadea
 

Semelhante a Dr. Rolando Rivera Lansigan - The Privacy Act of 2012, its compliance and implementation in the Philippines (20)

All_you_need_to Know_About_the_Data_Privacy_Act.pdf
All_you_need_to Know_About_the_Data_Privacy_Act.pdfAll_you_need_to Know_About_the_Data_Privacy_Act.pdf
All_you_need_to Know_About_the_Data_Privacy_Act.pdf
 
DATA-PRIVACY-ACT.pptx
DATA-PRIVACY-ACT.pptxDATA-PRIVACY-ACT.pptx
DATA-PRIVACY-ACT.pptx
 
New opportunities and business risks with evolving privacy regulations
New opportunities and business risks with evolving privacy regulationsNew opportunities and business risks with evolving privacy regulations
New opportunities and business risks with evolving privacy regulations
 
OVERVIEW OF DATA PROTECTION AND PRIVACY.pptx
OVERVIEW OF DATA PROTECTION AND PRIVACY.pptxOVERVIEW OF DATA PROTECTION AND PRIVACY.pptx
OVERVIEW OF DATA PROTECTION AND PRIVACY.pptx
 
Data Security Law and Management.pdf
Data Security Law and Management.pdfData Security Law and Management.pdf
Data Security Law and Management.pdf
 
GDPR - Fail to Prepare, Prepare to Fail!
GDPR - Fail to Prepare, Prepare to Fail!GDPR - Fail to Prepare, Prepare to Fail!
GDPR - Fail to Prepare, Prepare to Fail!
 
Data Privacy Act.pdf
Data Privacy Act.pdfData Privacy Act.pdf
Data Privacy Act.pdf
 
2014-04-16 Protection of Personal Information Act Readiness Workshop
2014-04-16 Protection of Personal Information Act Readiness Workshop2014-04-16 Protection of Personal Information Act Readiness Workshop
2014-04-16 Protection of Personal Information Act Readiness Workshop
 
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
 
GDPR: Data Breach Notification and Communications
GDPR: Data Breach Notification and CommunicationsGDPR: Data Breach Notification and Communications
GDPR: Data Breach Notification and Communications
 
Data Privacy Protection Competrency Guide by a Data Subject
Data Privacy Protection Competrency Guide by a Data SubjectData Privacy Protection Competrency Guide by a Data Subject
Data Privacy Protection Competrency Guide by a Data Subject
 
How GDPR will change Personal Data Control and Affect Everyone
How GDPR will change Personal Data Control and Affect EveryoneHow GDPR will change Personal Data Control and Affect Everyone
How GDPR will change Personal Data Control and Affect Everyone
 
ISACA Journal Data Protection Act (UK) and GAPP Alignment
ISACA Journal Data Protection Act (UK) and GAPP AlignmentISACA Journal Data Protection Act (UK) and GAPP Alignment
ISACA Journal Data Protection Act (UK) and GAPP Alignment
 
GDPR: The Regulator's Perspective, Peter Brown, ICO
GDPR: The Regulator's Perspective, Peter Brown, ICOGDPR: The Regulator's Perspective, Peter Brown, ICO
GDPR: The Regulator's Perspective, Peter Brown, ICO
 
Legal And Regulatory Dp Challenges For The Financial Services Sector
Legal And Regulatory Dp Challenges For The Financial Services SectorLegal And Regulatory Dp Challenges For The Financial Services Sector
Legal And Regulatory Dp Challenges For The Financial Services Sector
 
EU Data Protection Legislation, Peter Ridley (HPE)
EU Data Protection Legislation, Peter Ridley (HPE)EU Data Protection Legislation, Peter Ridley (HPE)
EU Data Protection Legislation, Peter Ridley (HPE)
 
Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...
 
OVERVIEW OF NIGERIA DATA PROTECTION ACT 2014
OVERVIEW OF NIGERIA DATA PROTECTION ACT 2014OVERVIEW OF NIGERIA DATA PROTECTION ACT 2014
OVERVIEW OF NIGERIA DATA PROTECTION ACT 2014
 
Employee Monitoring and Privacy.pdf
Employee Monitoring and Privacy.pdfEmployee Monitoring and Privacy.pdf
Employee Monitoring and Privacy.pdf
 
POPI Seminar FINAL
POPI Seminar FINALPOPI Seminar FINAL
POPI Seminar FINAL
 

Mais de REVULN

Yono REKSOPRODJO, Fahmy YUSUF - Information Warfare in Cyberspace: The Sprea...
Yono REKSOPRODJO,  Fahmy YUSUF - Information Warfare in Cyberspace: The Sprea...Yono REKSOPRODJO,  Fahmy YUSUF - Information Warfare in Cyberspace: The Sprea...
Yono REKSOPRODJO, Fahmy YUSUF - Information Warfare in Cyberspace: The Sprea...
REVULN
 
Mei NELSON - Hacking and Trolling: The Changing Face of Hacktivism in the Dis...
Mei NELSON - Hacking and Trolling: The Changing Face of Hacktivism in the Dis...Mei NELSON - Hacking and Trolling: The Changing Face of Hacktivism in the Dis...
Mei NELSON - Hacking and Trolling: The Changing Face of Hacktivism in the Dis...
REVULN
 

Mais de REVULN (12)

Yono REKSOPRODJO, Fahmy YUSUF - Information Warfare in Cyberspace: The Sprea...
Yono REKSOPRODJO,  Fahmy YUSUF - Information Warfare in Cyberspace: The Sprea...Yono REKSOPRODJO,  Fahmy YUSUF - Information Warfare in Cyberspace: The Sprea...
Yono REKSOPRODJO, Fahmy YUSUF - Information Warfare in Cyberspace: The Sprea...
 
Mei NELSON - Hacking and Trolling: The Changing Face of Hacktivism in the Dis...
Mei NELSON - Hacking and Trolling: The Changing Face of Hacktivism in the Dis...Mei NELSON - Hacking and Trolling: The Changing Face of Hacktivism in the Dis...
Mei NELSON - Hacking and Trolling: The Changing Face of Hacktivism in the Dis...
 
Isao MATSUNAMI - Digital security in japanese journalism
Isao MATSUNAMI - Digital security in japanese journalismIsao MATSUNAMI - Digital security in japanese journalism
Isao MATSUNAMI - Digital security in japanese journalism
 
Chung-Jui LAI - Polarization of Political Opinion by News Media
Chung-Jui LAI - Polarization of Political Opinion by News MediaChung-Jui LAI - Polarization of Political Opinion by News Media
Chung-Jui LAI - Polarization of Political Opinion by News Media
 
Stewart MACKENZIE - The edge of the Internet is becoming the center
Stewart MACKENZIE - The edge of the Internet is becoming the centerStewart MACKENZIE - The edge of the Internet is becoming the center
Stewart MACKENZIE - The edge of the Internet is becoming the center
 
Masayuki HATTA - Debunking toxic "Matome sites" in Japan
Masayuki HATTA - Debunking toxic "Matome sites" in JapanMasayuki HATTA - Debunking toxic "Matome sites" in Japan
Masayuki HATTA - Debunking toxic "Matome sites" in Japan
 
Sebastien BOURDEAUDUCQ, Stewart MACKENZIE - A talk about nothing (How to crea...
Sebastien BOURDEAUDUCQ, Stewart MACKENZIE - A talk about nothing (How to crea...Sebastien BOURDEAUDUCQ, Stewart MACKENZIE - A talk about nothing (How to crea...
Sebastien BOURDEAUDUCQ, Stewart MACKENZIE - A talk about nothing (How to crea...
 
Rachel BLUNDY - Overview of AFP Fact Check
Rachel BLUNDY - Overview of AFP Fact CheckRachel BLUNDY - Overview of AFP Fact Check
Rachel BLUNDY - Overview of AFP Fact Check
 
Dominic WAI - When would using a computer be a crime?
Dominic WAI - When would using a computer be a crime?Dominic WAI - When would using a computer be a crime?
Dominic WAI - When would using a computer be a crime?
 
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...
 
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
 
Manabu Niseki, Hirokazu Kodera - Catch Phish If You Can: A Case Study of Phis...
Manabu Niseki, Hirokazu Kodera - Catch Phish If You Can: A Case Study of Phis...Manabu Niseki, Hirokazu Kodera - Catch Phish If You Can: A Case Study of Phis...
Manabu Niseki, Hirokazu Kodera - Catch Phish If You Can: A Case Study of Phis...
 

Último

一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
bd2c5966a56d
 
一比一原版埃克塞特大学毕业证如何办理
一比一原版埃克塞特大学毕业证如何办理一比一原版埃克塞特大学毕业证如何办理
一比一原版埃克塞特大学毕业证如何办理
Airst S
 
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
e9733fc35af6
 
Contract law. Indemnity
Contract law.                     IndemnityContract law.                     Indemnity
Contract law. Indemnity
mahikaanand16
 
Code_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.pptCode_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.ppt
JosephCanama
 
一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理
Airst S
 
一比一原版悉尼科技大学毕业证如何办理
一比一原版悉尼科技大学毕业证如何办理一比一原版悉尼科技大学毕业证如何办理
一比一原版悉尼科技大学毕业证如何办理
e9733fc35af6
 
一比一原版(USC毕业证书)南加州大学毕业证学位证书
一比一原版(USC毕业证书)南加州大学毕业证学位证书一比一原版(USC毕业证书)南加州大学毕业证学位证书
一比一原版(USC毕业证书)南加州大学毕业证学位证书
irst
 
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
Airst S
 
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
A AA
 
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
ss
 
一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理
Airst S
 

Último (20)

一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
 
一比一原版埃克塞特大学毕业证如何办理
一比一原版埃克塞特大学毕业证如何办理一比一原版埃克塞特大学毕业证如何办理
一比一原版埃克塞特大学毕业证如何办理
 
Cyber Laws : National and International Perspective.
Cyber Laws : National and International Perspective.Cyber Laws : National and International Perspective.
Cyber Laws : National and International Perspective.
 
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
 
Contract law. Indemnity
Contract law.                     IndemnityContract law.                     Indemnity
Contract law. Indemnity
 
Shubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptxShubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptx
 
Code_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.pptCode_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.ppt
 
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptxAnalysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
 
一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理
 
Hely-Hutchinson v. Brayhead Ltd .pdf
Hely-Hutchinson v. Brayhead Ltd         .pdfHely-Hutchinson v. Brayhead Ltd         .pdf
Hely-Hutchinson v. Brayhead Ltd .pdf
 
一比一原版悉尼科技大学毕业证如何办理
一比一原版悉尼科技大学毕业证如何办理一比一原版悉尼科技大学毕业证如何办理
一比一原版悉尼科技大学毕业证如何办理
 
一比一原版(USC毕业证书)南加州大学毕业证学位证书
一比一原版(USC毕业证书)南加州大学毕业证学位证书一比一原版(USC毕业证书)南加州大学毕业证学位证书
一比一原版(USC毕业证书)南加州大学毕业证学位证书
 
The Main Steps on Starting a Business in Spain
The Main Steps on Starting a Business in SpainThe Main Steps on Starting a Business in Spain
The Main Steps on Starting a Business in Spain
 
Elective Course on Forensic Science in Law
Elective Course on Forensic Science  in LawElective Course on Forensic Science  in Law
Elective Course on Forensic Science in Law
 
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
 
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
 
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
 
一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理
 
CAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction FailsCAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction Fails
 
ARTICLE 370 PDF about the indian constitution.
ARTICLE 370 PDF about the  indian constitution.ARTICLE 370 PDF about the  indian constitution.
ARTICLE 370 PDF about the indian constitution.
 

Dr. Rolando Rivera Lansigan - The Privacy Act of 2012, its compliance and implementation in the Philippines

  • 1. The Data Privacy Act of 2012, its Compliance and implementation in the Philippines 15 May–16 May · Harbour Plaza North Point, Hong Kong . Dr. Rolando R. Lansigan, CEH, CHFI, SySA+ (Former Chief- Compliance and Monitoring Division) National Privacy Commission GDPR Coalition Ambassador
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12. Do not COLLECT if you cannot PROTECT
  • 13.
  • 14. What is the Data Privacy Act of 2012? • SECTION 1. Short Title. – This Act shall be known as the “Data Privacy Act of 2012”. • Republic Act 10173, the Data Privacy Act of 2012 AN ACT PROTECTING INDIVIDUAL PERSONAL INFORMATION IN INFORMATION AND COMMUNICATIONS SYSTEMS IN THE GOVERNMENT AND THE PRIVATE SECTOR, CREATING FOR THIS PURPOSE A NATIONAL PRIVACY COMMISSION, AND FOR OTHER PURPOSES • The National Privacy Commission (NPC) is a body that is mandated to administer and implement this law. The functions of the NPC include: – rule-making, – advisory, – public education, – compliance and monitoring, – investigations and complaints, – and enforcement.
  • 15. The DPA applies to the processing of all types of personal information and to any natural and juridical person, in the country and even abroad, subject to certain qualifications. Sec. 4, DPA SCOPE OF THE DPA
  • 16. Sections 1-6. Definitions and General Provisions Sections 7-10. National Privacy Commission Structure of RA 10173, the Data Privacy Act Section 22-24. Provisions Specific to Government Section 25-37. Penalties Sections 11-21. Rights of Data Subjects, and Obligations of Personal Information Controllers and Processors
  • 17. Philippines’ DPA vs GDPR Categories Categories Categories Purpose Preventing Harm Principle Integrity and Confidentiality Material Scope Lawfulness, Fairness and Transparency Accountability Territorial Scope Purpose Limitation Access and Correction Personal Data Data Minimization Data Portability Sensitive Personal Data Accuracy Transfer of Personal Data to Another Person or country Data Controller Storage Limitation Breach Definition * Data Processors Notice and Choice Breach Notification * Publicly Available Information Breach Mitigation
  • 18. The National Privacy Commission is an independent body mandated to administer and implement the Data Privacy Act, and to monitor and ensure compliance of the country with international standards set for personal data protection.
  • 19.
  • 20. Timeline of DPA Law and other issuances passed to Organization’s Compliance 2012 March 2016 August 2016 Sept. 9, 2016 Sept. 9, 2017 Data Privacy Act (DPA) Passed into law National Privacy Commission (NPC) was formed Implementin g rules and Regulations (IRRs) was published IRR came into effect Deadline: DPO Registration 12 months Registration Requirements: All personal data processing systems (DPS) operating in the Philippines that involve Personal Data concerning at least 1,000 individuals/personal records must be registered with NPC March 8, 2018 Deadline: (ANNUAL) Registration of DPS June 30, 2018 Deadline: (ANNUAL) Security Incident Reports
  • 21.
  • 22. EXAMPLES OF POTENTIAL BREACHES AND SECURITY INCIDENTS INVOLVING PERSONAL INFORMATION • Potential Breaches 1. Bank – Consent form 2. Hospital and School Records – Storage and Disposal Policy 3. Student transferred - Without Consent 4. Clinical record of a student to disclose with her parents - Consent 5. List of top students/passers - Consent 6. Cedula in Malls – Disposal Policy/Improper Disposal 7. Security issues in buildings – logbook 8. Use of re-cycled papers – Disposal Policy / Access due to negligence 9. Hard drives sold online –Disposal Policy 10. Use of CCTV – Privacy Issues 11. Use of USB/CD/Personal laptop – Encryption issue • Access Control and Security Policy 12. Personal Records stolen from home of an employee - Security 13. Viewing of Student Records in Public – Physical Security 14. Raffle stubs – Privacy Notice / Storage and Disposal Policy 15. Universities and Colleges websites with weak authentication 16. Photocopiers re-sold without wiping the hard drives 17. Password hacked/revealed - 18. Accidentally sent an email attachment – Unauthorized Disclosure • Other Violations / Data Privacy Act Principles 19. No Data Sharing Agreement (DSA) 20. No Privacy Notice 21. No Sub-contracting Agreement 22. No Breach Drill 23. Profiling of customers of malls – Targeted Marketing 24. Unjustifiable collection of personal data of a school – Principle of Proportionality
  • 23. DPA Section Punishable Act For Personal Information For Sensitive Personal Information Fine (Pesos) JAIL TERM 25 Unauthorized processing 1-3 years 3-6 years 500 k – 4 million 26 Access due to negligence 1-3 years 3-6 years 500 k – 4 million 27 Improper disposal 6 months – 2 years 3-6 years 100 k – 1 million 28 Unauthorized purposes 18 months – 5 years 2-7 years 500 k – 2 million 29 Intentional breach 1-3 years 500 k – 2 million 30 Concealment of breach 18 months – 5 years 500 k – 1 million 31 Malicious disclosure 18 month – 5 years 500 k – 1 million 32 Unauthorized disclosure 1-3 years 3-5 years 500 k – 2 million 33 Combination of acts 1-3 years 1 million – 5 million Potential Penalties listed in the Data Privacy Act
  • 24. NPC’s FIVE PILLARS OF COMPLIANCE DPO PIA PMP PDP BRP
  • 25. THE FIVE PILLARS OF COMPLIANCE • Commit to Comply: Appoint a Data Protection Officer (DPO) • Know your Risk: Conduct a Privacy Impact Assessment (PIA) • Be Accountable: Create your Privacy Management Program and Privacy Manual (PMP) • Demonstrate your Compliance: Implement your Privacy and Data Protection Measure (PDP) • Be Prepared for Breach: Regularly Exercise your Breach Reporting Procedure (BRP)
  • 26.
  • 27. Designating a DPO is the first essential step. You cannot register with the NPC unless you have a DPO.
  • 28. All PICs and PIPs should designate a Data Protection Officer • The personal information controller shall designate an individual or individuals who are accountable for the organization’s compliance with this Act. The identity of the individual(s) so designated shall be made known to any data subject upon request. (Sec. 21[b]) • xxx The personal information processor shall comply with all the requirements of this Act and other applicable laws. (Sec. 14)
  • 29.
  • 30.
  • 31. PILLAR 2: KNOW YOUR RISKS “The determination of the appropriate level of security under this section must take into account the nature of the personal information to be protected, the risks represented by the processing, the size of the organization and complexity of its operations, current data privacy best practices and the cost of security implementation” - Section 20.C of DPA of 2012
  • 32.
  • 33.
  • 36.
  • 37.
  • 38. “The PIC shall promptly notify the Commission and affected data subjects when sensitive personal information or other information that may, under the circumstances, be used to enable identity fraud are reasonably believed to have been acquired by an unauthorized person, and the PIC or the Commission believes that that such unauthorized acquisition is likely to give rise to a real risk of serious harm to any affected data subject.” Section 20.f “Concealment of Security Breaches Involving Sensitive Personal Information. –– The penalty of imprisonment of one (1) year and six (6) months to five (5) years and a fine of not less than Five hundred thousand pesos (Php500,000.00) but not more than One million pesos (Php1,000,000.00) shall be imposed on persons who, after having knowledge of a security breach and of the obligation to notify the Commission pursuant to Section 20(f), intentionally or by omission conceals the fact of such security breach. Section 30
  • 39. The 72-hour deadline IRR Section 38 (a) Data Breach Notification. The Commission and affected data subjects shall be notified by the PIC within seventy-two (72) hours upon knowledge of, or when there is reasonable belief by the PIC or PIP that, a personal data breach requiring notification has occurred. From https://privacy.gov.ph/memorandum-circulars/