DP Ra10173 Dpa2012
DP Ra10173 Dpa2012
Prepared by
Julie Estares February 12, 2024
Data Privacy Act of 2012
Overview
The Data Privacy Act of 2012 is a law in the Philippines that aims to protect the personal
information of individuals while ensuring the free flow of information for innovation and
growth. It recognizes the importance of privacy in the digital age and sets guidelines for how
organizations should handle personal data responsibly.
Under the law, personal data refers to any information that can identify an individual, such
as their name, address, contact details, or government-issued ID numbers. Sensitive
personal information, on the other hand, includes more private details like race, ethnicity,
religious beliefs, health records, and financial information.
The law requires organizations, known as data controllers, to implement security measures
to protect personal data from unauthorized access, disclosure, alteration, or destruction.
They must also obtain consent from individuals before collecting, processing, or using their
personal information.
To ensure compliance with the law, organizations are required to appoint a Data Privacy
Officer (DPO) responsible for implementing and enforcing data protection policies. The DPO
serves as a point of contact for individuals to raise privacy concerns and oversees the
organization's data processing activities.
The law also grants individuals certain rights over their personal data, including the right to
access, correct, or delete their information. Individuals have the right to know how their data
is being used and to request its removal if it's no longer necessary or if they withdraw their
consent.
In addition to the Data Privacy Act itself, there are implementing rules and regulations (IRR)
that provide detailed guidelines on how organizations should comply with the law. The IRR
covers various aspects of data protection, including data security measures, data breach
notification requirements, and the registration of data processing systems.
Overall, the Data Privacy Act and its IRR aim to strike a balance between protecting
individuals' privacy rights and promoting the responsible use of personal data for legitimate
purposes. By complying with these regulations, organizations can build trust with their
customers and stakeholders while fostering innovation and growth in the digital economy.
Definition of Terms
a. Act: Refers to Republic Act No. 10173, also known as the Data Privacy Act of 2012. It's a
law that aims to protect the personal information of individuals.
c. Consent of the data subject: Means that individuals freely agree to the collection and
processing of their personal information. Consent can be given in writing, electronically, or
verbally, and can also be given by a representative authorized by the individual.
e. Data processing systems: Refers to the structure and procedures used to collect and
process personal data in computer systems or filing systems. It includes how data is
collected, stored, and used.
h. Filing system: Any organized set of information related to individuals that allows specific
information about a person to be easily accessed.
j. Personal data: All types of information that can identify an individual, such as names,
addresses, or contact details.
k. Personal data breach: Occurs when personal data is accidentally or unlawfully accessed,
altered, disclosed, or lost.
p. Profiling: Involves using personal data to analyze or predict aspects of a person's life,
such as their behavior or interests.
q. Privileged information: Data that is protected under the Rules of Court and other laws,
such as attorney-client communications.
r. Public authority: Any government entity with law enforcement or regulatory authority.
s. Security incident: An event that affects data protection or compromises the availability,
integrity, and confidentiality of personal data.
Special Cases:
There are certain situations where the DPA and its Rules don't fully apply. These include:
Transparency: Data subjects must be informed about how their personal data will be used
in clear and easy-to-understand language.
Legitimate Purpose: Personal data should only be processed for lawful and specified
purposes.
Proportionality: The collection and processing of personal data should be relevant,
necessary, and not excessive for the intended purpose.
Collection must have a declared, specified, and legitimate purpose, with consent obtained
when required.
Processing must be fair, lawful, and transparent, respecting the rights of data subjects and
ensuring data accuracy.
Personal data should not be retained longer than necessary and must be disposed of
securely.
Further processing should have adequate safeguards and be done for historical,
statistical, or scientific purposes.
Data sharing is allowed when authorized by law or with the consent of the data subject.
Data sharing agreements must establish safeguards for privacy and security and provide
information to data subjects about the purpose and recipients of the shared data.
Research involving shared data must have safeguards in place, and decisions affecting
data subjects must respect their rights.
Government agencies sharing data must comply with the Act and ensure adequate
safeguards are in place.
These principles aim to balance the need for data processing with protecting the privacy
and rights of individuals.
Data Privacy Act of 2012
Processing of
Personal Information
Criteria for Lawful Processing of Personal Information:
Surveillance or recording of communications must comply with the Data Privacy Act,
including transparency, proportionality, and legitimate purpose principles.
Amendments to the Human Security Act ensure that surveillance respects data
privacy laws.
Data Privacy Act of 2012
Security Measures for the
Protection of Personal Data
Data Privacy and Security:
Organizations handling personal data must put in place reasonable and suitable
security measures to protect it.
Anyone with access to personal data must only process it as instructed or required by
law.
On-site and online access to sensitive personal information is only allowed for
government employees who have received security clearance from the head of the
agency that collected the data.
Access to sensitive information online is tightly regulated and subject to conditions
such as implementing security measures and limiting access to necessary data.
Off-site access to sensitive information must be approved by the agency head, with
limits on the number of records accessed and encryption of data for security.
Security requirements must be in place before approving any requests for off-site or
online access to sensitive information.
2. Right to Object:
The data subject can object to their data being processed, especially for marketing or automated
decision-making.
They can refuse consent or object to changes in how their data is used.
3. Right to Access:
The data subject can request access to their personal data, including where it came from, who
has seen it, and why it was used.
They can also find out if automated processes were used to make decisions about them.
4. Right to Rectification:
The data subject can correct any inaccuracies in their personal data held by the controller.
6. Right to Damages:
The data subject can claim compensation for any harm caused by inaccurate, incomplete, or
unauthorized use of their personal data.
7. Transmissibility of Rights:
The rights of the data subject can be invoked by their heirs or assigns after their death or if they
are unable to exercise them.
9. Limitation on Rights:
Some rights may not apply if the data is used for scientific research or investigations, but
limitations should be minimal and necessary.
Data Privacy Act of 2012
Data Breach Notification
1. Notification Timeline:
The personal information controller must notify the Commission and affected data
subjects within 72 hours upon learning of a data breach.
3. Contents of Notification:
The notification should describe the breach, the personal data involved, actions taken
to address it, contact details of the controller's representatives for further
information, and any assistance offered to affected data subjects.
4. Delay of Notification:
Notification can be delayed to assess the breach's scope, prevent further disclosures,
or restore system integrity.
The Commission may consider factors like compliance efforts and good faith in data
acquisition when deciding if notification can be delayed.
In some cases, the Commission may exempt or postpone notification if it's not in the
public interest or if it hinders a criminal investigation.
5. Breach Report:
The controller must submit a report to the Commission detailing the breach, including
a designated representative's contact information.
All security incidents and data breaches, even those not requiring notification, must
be documented.
Reports should include incident details, effects, and remedial actions taken, and
summaries should be provided annually to the Commission.
6. Notification Procedure:
The notification process must follow the guidelines set by the Act, these Rules, and
Commission issuances.
Data Privacy Act of 2012
Outsourcing and Subcontracting Agreements
Subcontracting Personal Data Processing:
A personal information controller can hire another party (personal information
processor) to handle personal data processing, but they must ensure proper
safeguards are in place.
These safeguards must ensure the confidentiality, integrity, and availability of the
personal data, prevent unauthorized use, and comply with relevant laws and
regulations.
Personal information controllers are responsible for all personal data they
control, even if it's given to others for processing.
They must follow the rules of the Act and other regulations, ensuring data
protection through contracts or other means.
They must assign individuals responsible for following these rules, and their
identities must be shared with data subjects upon request.
Anyone involved in processing personal data who breaks the rules will face
penalties, regardless of whether they're a person, organization, or entity.
If a data subject suffers harm due to a violation, they can file a complaint and
may receive compensation based on civil law.
If there's evidence of criminal activity, the Commission may recommend
prosecution. Responsible individuals within organizations may also be held
accountable if they participated in or allowed the wrongdoing.
Data Privacy Act of 2012
Penalties
Unauthorized Processing of Personal Information and Sensitive Personal Information:
Malicious Disclosure:
If someone discloses false information about personal or sensitive personal information with
malice:
1.5 to 5 years imprisonment and a fine of Php 500,000 to Php 1,000,000.
Unauthorized Disclosure:
Extent of Liability:
Responsible officers may be held accountable, and corporations may face suspension or
revocation of rights.
Large-Scale Offenses:
Penalties increase if at least 100 persons are affected.
Data Privacy Act of 2012
Penalties
Offenses Committed by Public Officers:
Public officers face disqualification from office.
Restitution:
The Commission may award indemnity to aggrieved parties based on civil law provisions.