0% found this document useful (0 votes)
104 views26 pages

Compliance Framework: Privacy Commission

The document outlines the 5 pillars of compliance under the NPC Data Privacy Accountability and Compliance Framework. Pillar I discusses governance and choosing a Data Protection Officer. Pillar II covers risk assessment including registering with the NPC and keeping records of processing activities. Pillar III discusses organizational measures like privacy management programs and manuals. The remaining pillars cover day to day obligations, data security, third parties, breaches and privacy incidents, managing human resources, continuity, and emerging technologies and standards.

Uploaded by

Rollie Ang
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
104 views26 pages

Compliance Framework: Privacy Commission

The document outlines the 5 pillars of compliance under the NPC Data Privacy Accountability and Compliance Framework. Pillar I discusses governance and choosing a Data Protection Officer. Pillar II covers risk assessment including registering with the NPC and keeping records of processing activities. Pillar III discusses organizational measures like privacy management programs and manuals. The remaining pillars cover day to day obligations, data security, third parties, breaches and privacy incidents, managing human resources, continuity, and emerging technologies and standards.

Uploaded by

Rollie Ang
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 26

2

N
M I SS I 0
O
M
COMPLIANCE CO
Y
C
V A
R I
FRAMEWORK
T I O N A L P

NA
HE
F T
O
Y Krishna Aira A. Tana
RT
E
P Compliance and Monitoring Division
R O
P
2
N
Obligations of a Personal Information
M I SS I 0
O

Controller or ProcessorCOM
C Y
V A
UPHOLD THE I
RRIGHTS OF DATA
P
R SUBJECTS
O N A L
T I
NA
E
ADHERE TO DATA PRIVACY
P O F T H
PRINCIPLES
T Y
E R
P RO P
S IMPLEMENT SECURITY
MEASURES
2
N
M I SS I 0
O

O M
Y C
A C
R IV
L P
N A
T I O
NA
HE
F T
Y O
RT
PE
RO
P
5 PILLARS OF COMPLIANCE
THE NPC DATA PRIVACY ACCOUNTABILITY
AND COMPLIANCE FRAMEWORK

O N
S I
M IS
II. RISK
O M
C
I. GOVERNANCE III. ORGANIZATION IV. DAY TO DAY V. DATA SECURITY
ASSESSMENT

A. Choose a DPO B. Register E. Privacy Management


C Y
G. Privacy Notice Q. Organizational

A
Program H-O. Data Subject R. Physical

V
C. Records of

I
F. Privacy Manual Rights S. Technical
processing activities
D. Conduct PIA
P R P. Data Life Cycle „ Data Center
„ Encryption

A L „ Access Control Policy

O N
T I
NA
HE
T
VII. THIRD PARTIES X. PRIVACY
VI. BREACHES VIII. MANAGE HR IX. CONTINUITY

F
ECOSYSTEM

Y
T. Data Breach OU. Third Parties;
V. Trainings and
X. Continuing Y. New technologies
T
Management; „ Legal Basis for
Assessment and
and standards
R Certifications
„ Security Policy Development
Disclosure

PE
„ Data Breach
Response Team
„ Data Sharing W. Security
„ Regular PIA
„ Review Contracts
Z. New legal
requirements
O
Agreements Clearance „ Internal Assessments

R
„ Incident Response
„ Cross Border

P
Procedure „ Review PMP
Transfer Agreement „ Accreditations
„ Document
„ Breach Notification
2
I. GOVERNANCE SIO0N
I S
M M
C O
C Y
V A
R I
L P
N A
T I O
NA
HE
F T
O Y
T
https://litmosheroes.com/wp-

E R content/uploads/2018/03/GDPR-Quiz-Question-6.jpg

O P
R
P A. Choose a Data Protection Officer
(DPO)
II. RISK ASSESSMENT 2
N
M I SS I 0
O

O M
Y C
A C
R IV
L P
N A
T I O
NA
HE
F T
O
Y Register
RTB.
PE C. Records of processing activities
RO
P D. Conduct PIA (Privacy Impact
Assessment)
II. RISK ASSESSMENT 2
N
B. Register
M I SS I 0
O

O M
(NPC Circular 17-01)
Y C
A C
What to register?
R IV
L P
A
Registration of your Data Processing
N Systems
T IO
Who should register? NA
HE
A.the PIC F T
or PIP employs at least two hundred fifty
Y
(250) O
employees;
R T
B.the processing includes sensitive personal
PEinformation of at least one thousand (1,000)
R O
P individuals; and
C.the processing is likely to pose a risk to the rights and
freedoms of data subjects.
II. RISK ASSESSMENT 2
N
B. Records of processing activities
M I SS I 0
O

O M
Y C
A C
R IV
L P
N A
T I O
NA
HE
F T
Y O
RT
PE
RO
P
II. RISK ASSESSMENT 2
N
B. Conduct PIA (Privacy Impact Assessment) ISS 0
I O
M M
CO
CY
V A
R I
L P
N A
T I O
NA
HE
F T
Y O
RT
PE
RO
P
2
III. ORGANIZATION N
M I SS I 0
O

O M
Y C
A C
R IV
L P
N A
T I O
NA
HE
F T
OY
RT
PE E. Privacy Management Program
RO
P F. Privacy Manual
IV. DAY TO DAY 2
N
M I SS I 0
O
RIGHTS OF DATA M
C O
SUBJECTS Y
A C
R IV
qRightPto be Informed
A L
O N
qRight to Access
T I qRight to Object
NA qRight to Rectification
HE qRight to Erasure or Blocking
F T qRight to Damages
Y O qRight to Data Portability
RT qRight to File A Complaint
PE
RO
P
https://www.nks.kent.sch.uk/uploads/asset_image/2_1666.jpg
IV. DAY TO DAY 2
N
M I SS I 0
O

O M
Y C
A C
R IV
L P
N A
T I O
NA
HE
G. PrivacyF T
Notice
H - O. Data
Y O Subject Rights
T
P. PERData Life Cycle
R O
P
V. DATA SECURITY 2
N
M I SS I 0
O

O M
Y C
A C
R IV
L P
N A
T I O
N A
Q. Organizational HE
R. Physical F T
S. Technical
Y O
T
http://www.gordiandynamics.com/wp-content/uploads/2015/08/data-security-

R
animation.jpg
„Data Center
P E
„Encryption
R O
P „Access Control Policy
V. DATA SECURITY 2
N
M I SS I 0
O

O M
Y C
A C
IV
Involves implementing
R policies
and programs L P explicitly intended
N
to ingrain A the culture of privacy
I O
T an organization’s psyche,
into
A
E N
thus making it impervious to
T H hackers who resort to social
Q. F
O engineering ploys.
TY
Organizational
R
PE
RO
P
V. DATA SECURITY 2
N
M I SS I 0
O

O M
Y C
A C
R IV
Refers to the
L P practical protective
schemes N Asuch as provision for
T I
securityO guards, padlocks, lockers
N A
and secluded archives to
HE
F T physically protect paper records
O
R. Physical
Y
and databases against data
RT thieves who may resort to brute
PE force.
RO
P
V. DATA SECURITY 2
N
M I SS I 0
O

O M
Covers all Y C
proactive and
A C
defensive ITIV solutions an
organizationPR could employ in
A L
securing N its data assets against all
T
typesI O of breaches. This may
NA
include the use of robust firewall
HE
F T and encryption systems, rigorous
S. O data access protocols, as well as
T Y
Technical anti-virus and anti-spyware
RE
O P solutions.
P R
VI. BREACHES 2
N
M I SS I 0
O

O M
Y C
A C
R IV
L P
N A
T I O
A
T. Data Breach Management;
N
H
„Security PolicyE
F
„Data Breach
TResponse Team
O
Y Response Procedure
„Incident
T
E R
„Document
O P
P R „Breach Notification
VII. THIRD PARTIES 2
N
M I SS I 0
O

O M
Y C
A C
R IV
L P
N A
T I O
NA
HE
FT
O
U. Third Parties;
Y
„Legal
T
R Basis for Disclosure
PE
O Sharing Agreements
„Data
R
P„Cross Border Transfer
Agreement http://infoorel.ru/user_foto/news/01906e8be48ab7b9c
6903f1e751df0d7.jpeg
VII. THIRD PARTIES 2
N
Outsourcing Agreement
M I SS I 0
O

O M
• shall set out the subject-matter
C and
C Y
duration of the processing,
V A
R I
• the nature L P
and purpose of the
N
processing,
A
TOI
NA
• Ethe type of personal data and
H
T categories of data subjects,
Legal BasisOF
for T Y
E R • the obligations and rights of the
P
Disclosure
RO
P
personal information controller, and

• the geographic location of the


processing under the subcontracting
VII. THIRD PARTIES 2
N
Requisites:
M I SS I 0
O

O M
• consent of data subjects,C
C Y
V A
• establishment of R Iadequate safeguards
L
for data privacy
P and security, and
N A
upholding
I O of the rights of data
A T
subjects,
E N
T H
Data Sharing O F • provide data subjects with the
AgreementsT Y required information prior to
E R collection or before data is shared,
O P
R and
P
• adherence to the data privacy
principles.
VII. THIRD PARTIES 2
N
M I SS I 0
O

O M
Y C
A personal information
A C controller
shall be responsible
R IV for any personal
P
data underL its control or custody,
including N A
information that have been
T I O
outsourced
A or transferred to a
E N
personal information processor or a
H
T third party for processing, whether
Cross OF domestically or internationally,
BorderT Y
E R subject to cross-border arrangement
O P
Transfer and cooperation.
R
PAgreement
VIII. MANAGE HR
O N
S I
MIS
O M
Y C
A C
R IV
L P
N A
T I O
NA
HE
V. Trainings and
FTCertifications
O
TY Clearance
W. Security
R
PE
RO
P
20
IX. CONTINUITY
O N
S I
MIS
O M
Y C
A C
R IV
L P
N A
T I O
NA
HE
F T
X. Continuing Assessment and
Y O
Development
RT „Regular PIA (Private Impact
PE Assessment)
RO
P „Review Contracts
„Internal Assessments
20
„Review and update PMP and Privacy
X. PRIVACY ECOSYSTEM
O N
S I
MIS
O M
Y C
A C
R IV
L P
N A
T I O
NA
HE
F T
OY
RT
Y. New PE technologies and
R O
P
standards
Z. New legal requirements
20
20
O N
S I
MIS
O M
Y C
If you can't protect it, don't
IV
A C collect it.
The Data Privacy Golden Rule PR
A L
O N
T I
NA
HE
F T
Y O
RT
PE
R O
P
O N
S I
MIS
O M
Y C
A C
R IV
L P
N A
T I O
NA
HE
F T
Y O
RT
PE
RO
P
20

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy