You are on page 1of 3

Cybersecurity o Privacy means trust.

Trust means
Implementing the Data Privacy Act of 2012 business/relationship.
o Privacy is the key to a free economy of information &
Complying with the IRR on the Data Privacy Act innovation.
Commissioner Domingo Mapa, National Privacy Commission (NPC) o As a rule, the Data Privacy Act operates to protect only
personal information.1
 What is the actual value of data?  Some key sections of RA 10173:
o In the information age, people are increasingly coming o Secs. 11-21: Rights of Data Subjects, Obligations of
to the realisation that data has actual value. PIPs & PICs
o Cybercriminals, in particular (but not only) identity o Secs. 22-24: Specific Provisions on Government Data
thieves, can leverage the most obscure sources of data Subjects, Personal Information Processors (PIPs), and
to their ends—and to users’ disadvantage. Personal Information Collectors (PICs)
o Online businesses like Uber, AirBnB, and Facebook use o Secs. 25-37: Penal Clauses
personal information to run their entire business  Basic Rights of the Data Subject2
model. o Right to be informed that data is being collected
 “Data is the only sustainable competitive o Right to object to the collection of said data
advantage,” and in the digital economy, it is the o Right to access the information being collected
new oil. o Right to block, remove, or correct data
o In terms of social and political issues, data has also o Right to data portability
been used to problem solve things as complex as o Right to complain & be indemnified for violations of
elections to as mundane and seemingly unavoidable as the abovementioned rights
mosquito season.  Basic Cyber-Hygiene
 Clearly, data IS valuable, and it can be leveraged to our o Data Vigilance – Being aware and vigilant about the
advantage. However, it is important that that data is collected, data we put online.
used, and disposed of responsibly. Therefore, our goal with o Software Updating – Being up-to-date on software that
data should be to “ensure the free flow of information to protects and stores your data.
promote innovation & growth, while protecting the o Password Hygiene – Being conscious of the need to
fundamental human right to privacy.” change, protect, and store passwords properly.
 In line with this, Sec. 2 of RA 10173 sets the basic human right  Basic Legal Obligations3 of PIPs and PICs
to privacy as a fundamental cornerstone in data innovation o Appoint a Data Processing Officer/Data Privacy
and development. Compliance Officer

1 This is defined as information concerning a person’s civil personality, which 3This is a legal obligation for all PIPs and PICs; Under Sec. 7 of RA 10173,
may include things such as gender, religion, civil status, family relations, and the violation of the law may be punished by penalties of up to 6 years of
like. imprisonment, and up to PhP 5 million in fines.
2 Data Subject: Person about whom data is being collected.

F. J. Bautista
sum non mea
o Where collecting data, adhere to the standards of o Crimes such as Online Estafa, Online Libel, Online
Transparency, Legitimate Purpose, and Threat, and Identity Theft are the most common, while
Proportionality instances of Rape (with intimidation), Online
 Transparency – Ensure that there are no Gambling, and Cybersquatting have also been
surprises from any of the stakeholders recorded.
regarding the data collected
 Legitimate Purpose – Ensure that the data Best Practices for Complying with the Data Privacy Act
collected is that required by law, and is not Atty. John Paul Gaba, ACCRA Law
contrary to public morals
 Proportionality – Ensure that the data collected  Scope of Application
is only to the extent absolutely necessary, and o The Data Privacy Act applies to the personal data of
that the collection is commensurate to the natural persons.7
benefits of the same. o To clarify, the law does not specifically protect classes
o Maintain the Confidentiality, Integrity, and Availability of data, but the broader right to privacy.
of Data o In connection with this, the NPC is empowered by law
o Follow proper breach procedure4 to issue compliance orders, and cease & desist orders
o Register all data collection systems with the NPC5 to PIPs and PICs who compromise data.
 Accountability is more important than mere compliance.  The NPC can also request the DOJ to investigate
violations with criminal intent.
Cybercrime in Numbers  As a rule, the terms PIPs and PICs cover all data handling
P/Supt. Jay Guillermo, PNP Anti-Cybercrime Group Assistant Head levels; However comprehensive or minute, any collection or
processing of personal data is covered by the law.
 Under RA 10173, all crimes punishable under the Revised o PIPs and PICs have the legal obligation to maintain the
Penal Code, committed through means of electronic data or integrity, confidentiality and availability of the data
communication may fall into the category of cybercrime.6 they collect and process.
 The PNP-ACG has recorded almost 10,000 instances of  The Data Privacy Act covers the personal data of all Filipino
cybercrime since it was founded in 2012, and according to citizens, whether here or abroad, in addition to any personal
P/Supt. Guillermo, an estimated 2/3 of cybercrime cases go data collected or processed in the Philippines.
unreported, or are not categorized as cybercrime by local o The Act also covers both physical and digital
police precincts. processing

4 IRR 38-42 & 57, and Circular No. 16-03 require reporting of any breaches 7 By example, while the data of a corporation may be made public as it is not a
within 72 hours; Failure to do so is punishable by up to 8 months of natural person, such a corporation’s articles of incorporation cannot be made
imprisonment and up to PhP 1 million in fines public without consent, as the personal data of the corporation’s incorporators
5 RA 10173 sets the deadline for system registration to September of 2017. is present on the document.
6 RA 1175 has categorized smartphones as computers, and crimes committed by

and through the use of such devices may be classed as cybercrimes as well.

F. J. Bautista
sum non mea
 Types of Personal Information
o Sensitive Personal Information
 Generally, encompasses information
concerning personal circumstances and civil
capacity, including sex, race, religion, marital
status, employment history, and the like
 Collection and Processing is prohibited, save in
certain exceptional cases.
 The law imposes a higher standard of
protection on such information
o Regular Personal Information
 All other information not classed as sensitive

F. J. Bautista
sum non mea

You might also like