IAS Study Guide Module 3
IAS Study Guide Module 3
0 10-July-2020
3
STUDY GUIDE FOR MODULE NO. ___
As a future information security professional, you must understand the scope of an organization’s legal
and ethical responsibilities. The information security professional plays an important role in an organization’s
approach to managing liability for privacy and security risks. In the modern litigious societies of the world,
sometimes laws are enforced in civil courts, where large damages can be awarded to plaintiffs who bring suits
against organizations. Sometimes these damages are punitive—assessed as a deterrent. To minimize liability
and reduce risks from electronic and physical threats, and to reduce all losses from legal action, information
security practitioners must thoroughly understand the current legal environment, stay current with laws and
regulations, and watch for new and emerging issues. By educating the management and employees of an
organization on their legal and ethical obligations and the proper use of information technology and information
security, security professionals can help keep an organization focused on its primary objectives.
In the first part of this chapter, you learn about the legislation and regulations that affect the management
of information in an organization. In the second part, you learn about the ethical issues related to information
security, and about several professional organizations with established codes of ethics. Use this chapter as
both a reference to the legal aspects of information security and as an aide in planning your professional career.
1. Use this chapter as a guide for future reference on laws, regulations, and professional organizations
2. Differentiate between laws and ethics
3. Identify major national laws that relate to the practice of information security
4. Understand the role of culture as it applies to ethics in information security
Terminologies:
• Cultural mores: fixed morals or customs of a group of people, form basis of ethics
• Ethics: Rules that define socially acceptable behavior, not necessarily criminal, not enforced (via
authority/courts)
• Laws: Rules that mandate or prohibit behavior, enforced by governing authority (courts)
– Laws carry sanctions of governing authority, ethics do not
• Policy: “Organizational laws”
– Expectations that define acceptable workplace behavior
– General and broad, not aimed at specific technologies or procedures
– To be enforceable, policy must be distributed, readily available, easily understood, and
acknowledged by employees.
• Standards, guidelines, best practices: define what must be done to comply with policy, how to do so.
• Jurisdiction: a court’s right to hear a case if a wrong was committed in its territory or against its citizens
• Long-arm jurisdiction: court’s ability to “reach far” and apply law (another state, country)
• Case law: documentation about application of law in various cases
• Liability: legal obligation beyond what’s required by law, increased if you fail to take due care.
• Due care: has been taken when employees know what is/isn’t acceptable, what the consequences are.
• Due diligence: sustained efforts to protect others.
Types of Law
In practice, you can be sued for almost anything; no “absolute” protection against litigation.
Information security practices can:
The Cybercrime Prevention Act of 2012 (CPA) defines the following as cybercrimes:
offences against the confidentiality, integrity and availability of computer data and systems (illegal access, illegal
interception, data interference, system interference, misuse of devices and cybersquatting);
Content-related offences (cybersex, child pornography, unsolicited commercial communications and libel).
The CPA appointed the National Bureau of Investigation (NBI) and Philippine National Police (PNP) as
enforcement authorities, and regulates their access to computer data, creating the Cybercrime Investigation
and Coordinating Center (CICC) as an inter-agency body for policy coordination and enforcement of the national
cybersecurity plan, and an Office of Cybercrime within the Department of Justice (DOJ-OC) for international
mutual assistance and extradition.
The Supreme Court’s Rule on Cybercrime Warrants (AM No. 17-11-03-SC) governs the application and grant
of court warrants and related orders involving the preservation, disclosure, interception, search, seizure or
examination, as well as the custody and destruction of computer data, as provided under the CPA.
The Electronic Commerce Act of 2000 (ECA) provides for the legal recognition of electronic documents,
messages and signatures for commerce, transactions in government and evidence in legal proceedings. The
ECA penalizes hacking and piracy of protected material, electronic signature or copyrighted works, limits the
liability of service providers that merely provide access, and prohibits persons who obtain access to any
electronic key, document or information from sharing them. The ECA also expressly allows parties to choose
their type or level of electronic data security and suitable technological methods, subject to the Department of
Trade and Industry guidelines.
The Access Devices Regulation Act of 1998 (ADRA) penalizes various acts of access device fraud such as
using counterfeit access devices. An access device is any card, plate, code, account number, electronic serial
number, personal identification number or other telecommunications service, equipment or instrumental
identifier, or other means of account access that can be used to obtain money, goods, services or any other
thing of value, or to initiate a transfer of funds. Banks, financing companies and other financial institutions issuing
access devices must submit annual reports of access device frauds to the Credit Card Association of the
Philippines, which forwards the reports to the NBI.
The Data Privacy Act of 2012 (DPA) regulates the collection and processing of personal information in the
Philippines and of Filipinos, including sensitive personal information in government; creates the National Privacy
Commission (NPC) as a regulatory authority; requires personal information controllers to implement reasonable
and appropriate measures to protect personal information and notify the NPC and affected data subjects of
breaches; and penalizes unauthorized processing, access due to negligence, improper disposal, processing for
unauthorized purposes, unauthorized access or intentional breach, concealment of security breaches and
malicious or unauthorized disclosure in connection with personal information.
Data Privacy Act of 2012 also ensured the creation of the National Privacy Commission. The Commission is
tasked to “administer and implement the provisions of this Act, and to monitor and ensure compliance of the
country with international standards set for data protection.”
According to RA 10173, a personal information controller refers to “a person or organization who controls the
collection, holding, processing or use of personal information, including a person or organization who instructs
another person or organization to collect, hold, process, use, transfer or disclose personal information on his or
her behalf.”
Therefore, a personal information controller must be aware that the employee, of whom the organization has
data of, is subject to the following protections:
• The right to know about the existence of their right as enumerated below. (Sec. 16(b))
• The right to be informed of the collection and processing of data relating to the employee. (Sec. 16(a)
and Sec 16(c))
• The right to be furnished of a copy of the data of the employee which is processed by the employer.
(Sec. 16(b))
• The right to data portability (the right to have their data forwarded and transferred) to subsequent
employers to the extent lawfully allowed. (Sec. 18)
• The right to correct, amend or remove inaccurate data from the employee’s record. (Sec. 16(d) and
Sec. 16(e))
• The right to know how long and for what purposes an employee’s data is to be maintained. (Sec. 16(b))
• What and how the personal information is processed and stored in the human resource system (HRIS).
(Sec. 16(b) and Sec. 16(c))
• The right to have appropriate physical, technical and administrative safeguards in relation to the system
where data is being stored pertaining to the employee by the employer. (Sec. 20)
• Who are other 3rd parties, outside the organization that such information pertaining to the employee is
shared with including why and how is such information shared. (Sec. 16(c))
• The right to file a complaint with the National Privacy Commission and order the removal, blocking or
destruction of data against the organization for misuse, mishandling and unauthorized disclosure of
data. (Sec 16(b))
• The right to damages for inaccurate, incomplete, outdated, false, unlawfully obtained or unauthorized
use of employee data by the employer. (Sec. 16(f))
• If the employer is collecting data of more than 250 individuals, they need to have their processing
system registered with the National Privacy Commission. (NPC Circular 17-01)
Republic Act 8942, otherwise known as the Intellectual Property Code of the Philippines, is a governing law that
adhered to the Paris Convention for the Protection of Industrial Property Rights, the Berne Convention for the
Protection of Literary and Artistic Works, the Patent Cooperation Treaty, the TRIPS Agreement and the WIPO
Copyright Treaty, among others.
Therefore, RA 8942 ensures the protection of intellectual property such as copyright, trademark, patent, utility
model, and industrial design. All registration of application for such rights are filed with the Philippine Intellectual
Property Office (IPO) except copyright. Copyright applications are deposited with the IPO pursuant to an
agreement with the Philippine National Library.
These are common terms that are identified with intellectual property rights:
• Utility Model. It is an intellectual property right to protection inventions. It is very similar to patent, but
usually has a shorter term, shorter grant lag and less stringent patentability requirements. Utility models
can be described as second class patents.
• Industrial Design. It is an intellectual property right that protects the visual design of objects that are
not purely utilitarian. An industrial design consists of the creation of a shape, configuration or
composition of pattern or color, or combination of pattern and color in three-dimensional form containing
aesthetic value. It can be a two- or three- dimensional pattern used to produce a product, industrial
commodity or handicraft.
• Copyright. It is at type of intellectual property that gives its owner the exclusive right to make copies of
a creative work, usually for a limited time. The creative work may be in a literary, artistic, educational,
or musical form. Copyright is intended to protect the original expression of an idea in the form of a
creative work, but not the idea itself.
Claims of convention priority or priority dates are acknowledged and respected, provided that they are claimed
within twelve (12) months from the date of the earliest foreign application (for patents and utility models) or
within six (6) months from the date of the earliest foreign application (for trademarks and industrial designs).
The term of protection for trademark, patent, utility model, industrial design and patents are as follows:
• Trademark. Ten (10) years and may be renewed for periods of ten (10) years each.
• Patent. Twenty (20) years from filing date of the application.
• Utility Model. Seven (7) years from filing date of the application without renewal.
• Industrial Design. Five (5) years from filing date of the application and may be renewed for not more
than two (2) consecutive periods of five (5) years each.
• Patent under the Patent Cooperation Treaty (PCT). Twenty (20) years from the international filing
date of the application.
The National Privacy Commission presented a quick guide for the Data Privacy Act, it can be downloaded here:
https://www.privacy.gov.ph/wp-content/files/quickguide/DPA_QuickGuidefolder_insideonly.pdf.
Accordingly, RA 10173 or the Data Privacy Act of 2012’s full text can be seen here:
https://www.privacy.gov.ph/data-privacy-act/#16
▪ Deterrence: best method for preventing an illegal or unethical activity; e.g., laws, policies, technical
controls
▪ Laws and policies only deter if three conditions are present:
▪ Fear of penalty
▪ Probability of being caught
▪ Probability of penalty being administered
▪ ACM established in 1947 as “the world's first educational and scientific computing society”
▪ Code of ethics contains references to protecting information confidentiality, causing no harm, protecting
others’ privacy, and respecting others’ intellectual property
▪ Professional organization with a large membership dedicated to protection of information and systems
▪ SANS offers set of certifications called Global Information Assurance Certification (GIAC)
▪ Provides information and training to support computer, networking, and information security
professionals
▪ Though without a code of ethics, has argued for adoption of ethical behavior among information security
professionals
▪ Internet Society (ISOC): promotes development and implementation of education, standards, policy
and education to promote the Internet
▪ Computer Security Division (CSD): division of National Institute for Standards and Technology (NIST);
promotes industry best practices and is important reference for information security professionals
▪ CERT Coordination Center (CERT/CC): center of Internet security expertise operated by Carnegie
Mellon University
▪ Computer Professionals for Social Responsibility (CPSR): public organization for anyone concerned
with impact of computer technology on society
▪ Liability is legal obligation of an entity; includes legal obligation to make restitution for wrongs committed
▪ Organization increases liability if it refuses to take measures known as due care
▪ Due diligence requires that an organization make valid effort to protect others and continually maintain
that level of effort
▪ Laws: rules that mandate or prohibit certain behavior in society; drawn from ethics
▪ Ethics: define socially acceptable behaviors; based on cultural mores (fixed moral attitudes or customs
of a particular group)
▪ Types of law: civil, criminal, tort law, private, public
▪ CPA of 2012, RA 10173, RA 8942
▪ Many organizations have codes of conduct and/or codes of ethics
▪ Organization increases liability if it refuses to take measures known as due care
▪ Due diligence requires that organization make valid effort to protect others and continually maintain that
effort
LEARNING ACTIVITY 1
REFERENCES
Books
Andress, J. The Basics of Information Security: Understanding the fundamentals of InfoSec in Theory and
Practice. Elsevier Inc.
Online materials
https://www.privacy.gov.ph/data-privacy-act/#3
https://privacyph.net/2018/08/28/human-resource-data-and-the-data-privacy-act/
https://ndvlaw.com/intellectual-property-protection-in-the-
philippines/#:~:text=Intellectual%20Property%20Protection%20in%20the%20Philippines.%20The%20Philippi
nes,Agreement%20and%20the%20WIPO%20Copyright%20Treaty%2C%20among%20others.
https://www.lexology.com/library/detail.aspx?g=63436afb-fc7c-41aa-967c-cef82a8e4cff
https://en.wikipedia.org/wiki/Ten_Commandments_of_Computer_Ethics
https://en.wikipedia.org/wiki/Trademark
https://en.wikipedia.org/wiki/Patent
https://en.wikipedia.org/wiki/Utility_model#:~:text=A%20utility%20model%20is%20an%20intellectual%20prop
erty%20right,shorter%20grant%20lag%20and%20less%20stringent%20patentability%20requirements.
https://en.wikipedia.org/wiki/Copyright
https://www.privacy.gov.ph/wp-content/files/quickguide/DPA_QuickGuidefolder_insideonly.pdf