the data privacy act of 2012pawd.org.ph/wp-content/uploads/2018/08/f1-data-privacy...refers to a...

47
Cleo R. Martinez The Data Privacy Act of 2012

Upload: others

Post on 15-Mar-2020

4 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: The Data Privacy Act of 2012pawd.org.ph/wp-content/uploads/2018/08/F1-Data-Privacy...refers to a breach of security leading to the accidental or unlawful destruction, loss, alteration,

Cleo R. Martinez

The Data Privacy Act of 2012

Page 2: The Data Privacy Act of 2012pawd.org.ph/wp-content/uploads/2018/08/F1-Data-Privacy...refers to a breach of security leading to the accidental or unlawful destruction, loss, alteration,

Cleo R. Martinez

Page 3: The Data Privacy Act of 2012pawd.org.ph/wp-content/uploads/2018/08/F1-Data-Privacy...refers to a breach of security leading to the accidental or unlawful destruction, loss, alteration,

WHICH IS MORE

VALUABLE?

Data Money

Page 4: The Data Privacy Act of 2012pawd.org.ph/wp-content/uploads/2018/08/F1-Data-Privacy...refers to a breach of security leading to the accidental or unlawful destruction, loss, alteration,
Page 5: The Data Privacy Act of 2012pawd.org.ph/wp-content/uploads/2018/08/F1-Data-Privacy...refers to a breach of security leading to the accidental or unlawful destruction, loss, alteration,

Examples of Breaches/

Potential Breach

1. COMELeak

2. Consent form in fine print

3. Unsecured storage of documents

4. Log-in procedure in a building

5. Unjustifiable collection of

personal data in a school

6. Re-Use of documents

7. Raffle

Page 6: The Data Privacy Act of 2012pawd.org.ph/wp-content/uploads/2018/08/F1-Data-Privacy...refers to a breach of security leading to the accidental or unlawful destruction, loss, alteration,

ROOT CAUSES OF BREACH

47%

29%

24%

Maliciousor criminalattack

SystemGlitch

Human Error

Ponemon Institute LLC, 2015 Cost of Data

Breach Study: Global Analysis, May 2015,

p. 10.

Page 7: The Data Privacy Act of 2012pawd.org.ph/wp-content/uploads/2018/08/F1-Data-Privacy...refers to a breach of security leading to the accidental or unlawful destruction, loss, alteration,
Page 8: The Data Privacy Act of 2012pawd.org.ph/wp-content/uploads/2018/08/F1-Data-Privacy...refers to a breach of security leading to the accidental or unlawful destruction, loss, alteration,

KEY CONCEPTS

Page 9: The Data Privacy Act of 2012pawd.org.ph/wp-content/uploads/2018/08/F1-Data-Privacy...refers to a breach of security leading to the accidental or unlawful destruction, loss, alteration,

DATA SUBJECT

An individual whose PERSONAL

INFORMATION, SENSITIVE PERSONAL

INFORMATION, or PRIVILEGED

INFORMATION is being processed

Page 10: The Data Privacy Act of 2012pawd.org.ph/wp-content/uploads/2018/08/F1-Data-Privacy...refers to a breach of security leading to the accidental or unlawful destruction, loss, alteration,

PERSONAL INFORMATION CONTROLLER

Not the employee

Not the Data Protection Officer

Not the Chief Information Officer

Refers to a natural or juridical

person, or any other body who

controls the processing of

personal data, or instructs another

to process personal data on its

behalf.

PIC

Page 11: The Data Privacy Act of 2012pawd.org.ph/wp-content/uploads/2018/08/F1-Data-Privacy...refers to a breach of security leading to the accidental or unlawful destruction, loss, alteration,

PERSONAL INFORMATION PROCESSOR

Personal information processor should

not make use of personal data for its

own purpose.

Refers to any natural or juridical

person or any other body to whom

a personal information controller

may outsource or instruct the

processing of personal data

pertaining to a

data subject.

PIP

Page 12: The Data Privacy Act of 2012pawd.org.ph/wp-content/uploads/2018/08/F1-Data-Privacy...refers to a breach of security leading to the accidental or unlawful destruction, loss, alteration,
Page 13: The Data Privacy Act of 2012pawd.org.ph/wp-content/uploads/2018/08/F1-Data-Privacy...refers to a breach of security leading to the accidental or unlawful destruction, loss, alteration,

PROCESSING

Any operation of any set of operations performed

upon personal data including, but not limited to, the

collection, recording, organization, storage, updating or

modification, retrieval, consultation, use, consolidation,

blocking, erasure or destruction

of data.

Page 14: The Data Privacy Act of 2012pawd.org.ph/wp-content/uploads/2018/08/F1-Data-Privacy...refers to a breach of security leading to the accidental or unlawful destruction, loss, alteration,

refers to a breach of security leading to the accidental or

unlawful destruction, loss, alteration, unauthorized

disclosure of, or access to, personal data transmitted,

stored, or otherwise processed.

Types of Data Breaches:

1. An availability breach resulting from loss, accidental

or unlawful destruction of personal data;

2. An integrity breach resulting from alteration of

personal data; and/or

3. A confidentiality breach resulting from the

unauthorized disclosure of or access to personal data.

DATA BREACH

Page 15: The Data Privacy Act of 2012pawd.org.ph/wp-content/uploads/2018/08/F1-Data-Privacy...refers to a breach of security leading to the accidental or unlawful destruction, loss, alteration,

CLASSIFICATION OF PERSONAL DATA

Any information from which the

identity of an individual is apparent

Any information that can be put

together with other information to

reasonably and directly identify an

individual

PERSONAL INFORMATION

Page 16: The Data Privacy Act of 2012pawd.org.ph/wp-content/uploads/2018/08/F1-Data-Privacy...refers to a breach of security leading to the accidental or unlawful destruction, loss, alteration,

• Individual’s race, ethnic origin,

marital status, age, color and

religious, philosophical, political

affiliations

• Individual’s health, education,

genetic or sexual life, or to any

proceeding for any offense

committed or alleged to have been

committed by the individual

• Government-issued personal

numbers such as SSS, GSIS,

PhilHealth, Pag-IBIG, LTO and

previous or current health records, and

tax returns

SENSITIVE PERSONAL INFORMATION

Page 17: The Data Privacy Act of 2012pawd.org.ph/wp-content/uploads/2018/08/F1-Data-Privacy...refers to a breach of security leading to the accidental or unlawful destruction, loss, alteration,

ARE THESE PERSONAL INFORMATION?

A. Man born on Nov. 30, 1863

B. Philippine Hero born on Nov. 30,

1863

C. Andres de Castro Bonifacio

D.

Page 18: The Data Privacy Act of 2012pawd.org.ph/wp-content/uploads/2018/08/F1-Data-Privacy...refers to a breach of security leading to the accidental or unlawful destruction, loss, alteration,
Page 19: The Data Privacy Act of 2012pawd.org.ph/wp-content/uploads/2018/08/F1-Data-Privacy...refers to a breach of security leading to the accidental or unlawful destruction, loss, alteration,

STRUCTURE OF RA 10173

Page 20: The Data Privacy Act of 2012pawd.org.ph/wp-content/uploads/2018/08/F1-Data-Privacy...refers to a breach of security leading to the accidental or unlawful destruction, loss, alteration,

An act protecting

individual personal information in information

and communications systems in the government

and the private sector, creating for this purpose a

National Privacy Commission,

and for other purposes

Data Privacy Act of 2012

Page 21: The Data Privacy Act of 2012pawd.org.ph/wp-content/uploads/2018/08/F1-Data-Privacy...refers to a breach of security leading to the accidental or unlawful destruction, loss, alteration,

An act protecting

individual personal information in information

and communications systems in the government

and the private sector, creating for this purpose a

National Privacy Commission,

and for other purposes

FULL TITLE

Whereis privacy inall of these?

The law upholds the right to privacy by protecting

individual personal information.

The National Privacy Commission

protects individual personal information by regulating the processing of

personal information

Page 22: The Data Privacy Act of 2012pawd.org.ph/wp-content/uploads/2018/08/F1-Data-Privacy...refers to a breach of security leading to the accidental or unlawful destruction, loss, alteration,

POLICY

SEC. 2. Protect the fundamental human right

of privacy of

communication while ensuring free flow of

information to promote

innovation and growth;

role of information and

communications technology to ensure that personal

information under the

custody of the

government and private

sector are secured.

Page 23: The Data Privacy Act of 2012pawd.org.ph/wp-content/uploads/2018/08/F1-Data-Privacy...refers to a breach of security leading to the accidental or unlawful destruction, loss, alteration,

SCOPE

SEC. 4. Applies to the

processing of all types of

personal information, in the

country and even abroad,

subject to certain qualifications.

SEC. 15. Personal information

controllers may invoke the

principle of privileged

communication over privileged

information that they lawfully

control or process.

Page 24: The Data Privacy Act of 2012pawd.org.ph/wp-content/uploads/2018/08/F1-Data-Privacy...refers to a breach of security leading to the accidental or unlawful destruction, loss, alteration,

RIGHTS OF THE DATA SUBJECT:

1. Right to INFORMATION

2. Right to OBJECT

3. Right to ACCESS

4. Right to CORRECT

5. Right to ERASE

6. Right to DAMAGES

7. Right to DATA PORTABILITY

8. Right to FILE A COMPLAINT

Page 25: The Data Privacy Act of 2012pawd.org.ph/wp-content/uploads/2018/08/F1-Data-Privacy...refers to a breach of security leading to the accidental or unlawful destruction, loss, alteration,
Page 26: The Data Privacy Act of 2012pawd.org.ph/wp-content/uploads/2018/08/F1-Data-Privacy...refers to a breach of security leading to the accidental or unlawful destruction, loss, alteration,

I. CREATE AND COLLECT

Punishable Act Imprisonment Fine (PHP)

Unauthorized Purposes18 months to 5 years — 2

years to 7 years500 thousand to 2 million

Unauthorized Processing

of Personal

Information/Records

1 year to 3 years — 3

years to 6 years500 thousand to 4 million

Page 27: The Data Privacy Act of 2012pawd.org.ph/wp-content/uploads/2018/08/F1-Data-Privacy...refers to a breach of security leading to the accidental or unlawful destruction, loss, alteration,

Punishable Act Imprisonment Fine (PHP)

Accessing of Personal

Information and Sensitive

Personal Information due to

Negligence

1 year to 3 years — 3 years

to 6 years500 thousand to 4 million

Intentional Breach 1 year to 3 years 500 thousand to 2 million

Malicious Disclosure 18 months to 5 years 500 thousand to 1 million

Unauthorized Disclosure1 year to 3 years — 3 years

to 5 years500 thousand to 2 million

II. STORE AND TRANSMIT

Page 28: The Data Privacy Act of 2012pawd.org.ph/wp-content/uploads/2018/08/F1-Data-Privacy...refers to a breach of security leading to the accidental or unlawful destruction, loss, alteration,

Punishable Act Imprisonment Fine (PHP)

Unauthorized Processing of

Personal Information and Sensitive

Personal Information

1 year to 3 years — 3 years to 6

years500 thousand to 4 million

Unauthorized Purposes18 months to 5 years — 2 years to 7

years500 thousand to 2 million

Intentional Breach 1 year to 3 years 500 thousand to 2 million

Concealing Breach 18 months to 5 years 500 thousand to 1 million

Malicious Disclosure 18 months to 5 years 500 thousand to 1 million

Unauthorized Disclosure1 year to 3 years — 3 years to 5

years500 thousand to 2 million

III. USE AND DISTRIBUTE

Page 29: The Data Privacy Act of 2012pawd.org.ph/wp-content/uploads/2018/08/F1-Data-Privacy...refers to a breach of security leading to the accidental or unlawful destruction, loss, alteration,

Punishable Act Imprisonment Fine (PHP)

Access due to

Negligence of Records

1 year to 3 years — 3

years to 6 years500 thousand to 4 million

Malicious Disclosure 18 months to 5 years 500 thousand to 1 million

Unauthorized Disclosure1 year to 3 years — 3

years to 5 years500 thousand to 1 million

IV. RETAIN

Page 30: The Data Privacy Act of 2012pawd.org.ph/wp-content/uploads/2018/08/F1-Data-Privacy...refers to a breach of security leading to the accidental or unlawful destruction, loss, alteration,

V. DISPOSE AND DESTROY

Punishable Act Imprisonment Fine (PHP)

Improper Disposal of Records6 months 2 years — 1 year to

3 years100 thousand to 1 million

Access due to Negligence1 year to 3 years — 3 years to

6 years500 thousand to 4 million

Concealing Breach 18 months to 5 years 500 thousand to 1 million

Page 31: The Data Privacy Act of 2012pawd.org.ph/wp-content/uploads/2018/08/F1-Data-Privacy...refers to a breach of security leading to the accidental or unlawful destruction, loss, alteration,

OBLIGATIONS OF A PERSONAL INFORMATION CONTROLLER

The PIC should collect

personal information for

specified and legitimate

purposes determined

and declared before, or

as soon as reasonably

practicable after

collection

The PIC should process

personal information

fairly and lawfully, and in

accordance with the

rights of a data subject.

The PIC should process

accurate, relevant and

up to date personal

information.

The PIC should collect and

process personal information

adequately and not

excessively.

The PIC should retain

personal information only for

as long as necessary for the

fulfillment of the purposes for

which the data was obtained.

The information should be

kept in a form which permits

identification of data subjects

for no longer than is

necessary.

The PIC must

implement reasonable and

appropriate organizational,

physical and technical

measures intended for the

protection of personal

information.

Page 32: The Data Privacy Act of 2012pawd.org.ph/wp-content/uploads/2018/08/F1-Data-Privacy...refers to a breach of security leading to the accidental or unlawful destruction, loss, alteration,

DATA PRIVACY PRINCIPLES

TRANSPARENCY

LEGITIMATE PURPOSE

PROPORTIONALITY

Page 33: The Data Privacy Act of 2012pawd.org.ph/wp-content/uploads/2018/08/F1-Data-Privacy...refers to a breach of security leading to the accidental or unlawful destruction, loss, alteration,

TRANSPARENCY

Principle of Transparency

A data subject must be aware of the nature, purpose, and extent of the

processing of his or her personal data, including the risks and safeguards

involved, the identity of personal information controller, his or her rights as a

data subject, and how these can be exercised. Any information and

communication relating to the processing of personal data should be easy

to access and understand, using clear and plain language.

Page 34: The Data Privacy Act of 2012pawd.org.ph/wp-content/uploads/2018/08/F1-Data-Privacy...refers to a breach of security leading to the accidental or unlawful destruction, loss, alteration,

CONSENT

PRIVACY NOTICE

PRIVACY POLICY

How TransparencyIs demonstrated:

Page 35: The Data Privacy Act of 2012pawd.org.ph/wp-content/uploads/2018/08/F1-Data-Privacy...refers to a breach of security leading to the accidental or unlawful destruction, loss, alteration,

refers to any freely given, specific,

informed indication of will, whereby the data

subject agrees to the collection and processing of personal information about and/or relating to him or her. Consent

shall be evidenced by written, electronic

or recorded means. It may also be given on behalf of the

data subject by an agent specifically authorized by the data

subject to do so.

Consent of

the data subject

Page 36: The Data Privacy Act of 2012pawd.org.ph/wp-content/uploads/2018/08/F1-Data-Privacy...refers to a breach of security leading to the accidental or unlawful destruction, loss, alteration,

IF IT’S NOT CLEAR

IT’S NOT CONSENT

IMPORTANT REMINDER

Page 37: The Data Privacy Act of 2012pawd.org.ph/wp-content/uploads/2018/08/F1-Data-Privacy...refers to a breach of security leading to the accidental or unlawful destruction, loss, alteration,

S o m e t i m e s , c o n s e n t i s N O T n e c e s s a r y …

Personal Information

(not Sensitive)

Contractual or Legal Obligation

To protect life, health, vitally important interests

Legitimate interests

National Emergency, public order, public safety

Page 38: The Data Privacy Act of 2012pawd.org.ph/wp-content/uploads/2018/08/F1-Data-Privacy...refers to a breach of security leading to the accidental or unlawful destruction, loss, alteration,

S o m e t i m e s , c o n s e n t i s N O T n e c e s s a r y …

Sensitive Personal

Information

Law/

Regulation

Provided to government under legal

mandate

Protection of rights in court

To protect life and health

Page 39: The Data Privacy Act of 2012pawd.org.ph/wp-content/uploads/2018/08/F1-Data-Privacy...refers to a breach of security leading to the accidental or unlawful destruction, loss, alteration,

LEGITIMATE PURPOSE

Principle of Legitimate Purpose

The processing of information shall be

compatible with a declared and specified

purpose, which must not be contrary to law,

morals, or public policy.

Page 40: The Data Privacy Act of 2012pawd.org.ph/wp-content/uploads/2018/08/F1-Data-Privacy...refers to a breach of security leading to the accidental or unlawful destruction, loss, alteration,

PROPORTIONALITY

Principle of Proportionality

The processing of information shall be adequate,

relevant, suitable, necessary, and not excessive in

relation to a declared and specified purpose. Personal

data shall be processed only if the purpose of the

processing could not reasonably be fulfilled by other

means.

Page 41: The Data Privacy Act of 2012pawd.org.ph/wp-content/uploads/2018/08/F1-Data-Privacy...refers to a breach of security leading to the accidental or unlawful destruction, loss, alteration,

“PROPORTIONALITY"

Page 42: The Data Privacy Act of 2012pawd.org.ph/wp-content/uploads/2018/08/F1-Data-Privacy...refers to a breach of security leading to the accidental or unlawful destruction, loss, alteration,
Page 43: The Data Privacy Act of 2012pawd.org.ph/wp-content/uploads/2018/08/F1-Data-Privacy...refers to a breach of security leading to the accidental or unlawful destruction, loss, alteration,
Page 44: The Data Privacy Act of 2012pawd.org.ph/wp-content/uploads/2018/08/F1-Data-Privacy...refers to a breach of security leading to the accidental or unlawful destruction, loss, alteration,

1. Can we feel a culture of Privacy?

2. Do you have a sensible data privacy

program?

3. Is it based on risk assessment?

4. Do you train your staff in data privacy and

protection?

5. Are you prepared for breach?

What do we look for when the NPC

comes knocking at your door?

Page 45: The Data Privacy Act of 2012pawd.org.ph/wp-content/uploads/2018/08/F1-Data-Privacy...refers to a breach of security leading to the accidental or unlawful destruction, loss, alteration,

When will you hear from the NPC?

1. When the NPC sends advisories and

circulars

2. When the NPC conducts audit and

compliance checks

3. When you notify the NPC about a

personal data breach

Page 46: The Data Privacy Act of 2012pawd.org.ph/wp-content/uploads/2018/08/F1-Data-Privacy...refers to a breach of security leading to the accidental or unlawful destruction, loss, alteration,

The Data Privacy Golden Rule

If you Can’t Protect It…

DONT Collect It.

Page 47: The Data Privacy Act of 2012pawd.org.ph/wp-content/uploads/2018/08/F1-Data-Privacy...refers to a breach of security leading to the accidental or unlawful destruction, loss, alteration,

PRIVACY.GOV.PH

facebook.com/privacy.gov.ph

twitter.com/privacyph

[email protected]