RFBT-15 (E-Commerce, Data Privacy & Ease of Doing Business)
RFBT-15 (E-Commerce, Data Privacy & Ease of Doing Business)
Sphere of Application: The Act shall apply to any kind of electronic document used in the context of commercial and non-
commercial activities to include domestic and international dealings, transactions, arrangements, agreements contracts and
exchanges and storage of information.
Definition of Terms: For the purposes of the Act, the following terms are defined, as follows:
"Computer" refers to any device or apparatus singly or interconnected which, by electronic, electro-mechanical, optical
and/or magnetic impulse, or other means with the same function, can receive, record, transmit, store, process, correlate,
analyze, projects, retrieve, and/or produce information, data, text, graphics, figures, voice, video, symbols or other modes of
expression or perform any one or more of these functions.
"Information and Communications System" refers to a system for generating, sending, receiving, storing, or otherwise
processing electronic documents and includes the computer system or other similar device by or in which data is recorded
or stored and any procedures related to the recording or storage of electronic document.
"Originator" refers to a person by whom, or on whose behalf, the electronic document purports to have been created,
generated and/or sent. The term does not include a person acting as an intermediary with respect to that electronic
document.
"Addressee" refers to a person who is intended by the originator to receive the electronic data message or electronic
document, but does not include a person acting as an intermediary with respect to that electronic data message or electronic
data document.
"Intermediary" refers to a person who in behalf of another person and with respect to a particular electronic document
sends, receives and/or stores, provides other services in respect of that electronic data message or electronic document.
"Electronic data message" refers to information generated, sent, received or stored by electronic, optical or similar
means.
“Electronic signature" refers to any distinctive mark, characteristic and/or sound in electronic from, representing the
identity of a person and attached to or logically associated with the electronic data message or electronic document or any
methodology or procedures employed or adopted by a person and executed or adopted by such person with the intention of
authenticating or approving an electronic data message or electronic document.
"Electronic key" refers to a secret code which secures and defends sensitive information that crossover public channels
into a form decipherable only with a matching electronic key.
"Electronic document" refers to information or the representation of information, data, figures, symbols or other modes of
written expression, described or however represented, by which a right is established or an obligation extinguished, or
by which a fact may be prove and affirmed, which is receive, recorded, transmitted, stored, processed, retrieved or
produced electronically.
Legal Recognition of Electronic Data Messages: Information shall not be denied validity or enforceability solely on
the ground that it is in the form of electronic data message purporting to give rise to such legal effect, or that it is merely
incorporated by reference in that electronic data message.
For evidentiary purposes, an electronic document shall be the functional equivalent of a written document under existing
laws.
The Act does not modify any statutory any statutory rule relating to admissibility of electronic data massages or
electronic documents, except the rules relating to authentication and best evidence.
Legal Recognition of Electronic Signatures: An electronic signature on the electronic document shall be equivalent to the
signature of a person on a WRITTEN DOCUMENT if:
a. the signature is an electronic signature and
b. proved by showing that a prescribed procedure, not alterable by the parties interested in the electronic document,
existed under which-
i. A method is used to identify the party sought to be bound and to indicate said party's access to the electronic
document necessary for his consent or approval through the electronic signature;
ii. Said method is reliable and appropriate for the purpose for which the electronic document was generated or
communicated, in the light of all circumstances, including any relevant agreement;
iii. It is necessary for the party sought to be bound, in order to proceed further with the transaction to have
executed or provided the electronic signature; and
iv. The other party is authorized and enable to verify the electronic signature and to make the decision to
proceed with the transaction authenticated by the same.
Presumption Relating to Electronic Signatures: In any proceedings involving an electronic signature, it shall be presumed
that,
a. The electronic signature is the signature of the person to whom it correlates; and
b. The electronic signature was affixed by that person with the intention of signing or approving the electronic
document unless
i. the person relying on the electronically designed electronic document knows or has notice of defects in or
unreliability of the signature or
ii. reliance on the electronic signature is not reasonable under the circumstances.
Original Documents:
1. Where the law requires information to be presented or retained in its ORIGINAL FORM, that requirement is met by
an electronic data message or electronic document if:
a. the integrity of the information from the time when it was first generated in its final form, as an electronic
document is shown by evidence aliunde or otherwise; and
b. where otherwise it is required that information be presented, that the information is capable of being displayed to
the person to whom it is to be presented.
2. Paragraph (1) applies whether the requirement therein is in the form of an obligation or whether the law simply
provides consequences for the information not being presented or retained in its original form.
3. For the purpose of subparagraph (a) of paragraph (1):
a. the criteria for assessing integrity shall be whether the information has remained complete and unaltered,
apart from the addition of any endorsement and any change which arises in the normal course of communication,
storage and display ; and
b. the standard of reliability required shall be assessed in the light of purpose for which the information was
generated and in the light of all the relevant circumstances.
Authentication of Electronic Data Messages and Electronic Documents: Until the Supreme Court by appropriate rules
shall have so provided, electronic documents, electronic data messages and electronic signatures, shall be authenticated by
demonstrating, substantiating and validating a claimed identity of a user, device, or another entity is an information or
communication system, among other ways, as follows;
a. The electronic signatures shall be authenticated by proof that a letter, character, number or other symbol in electronic
form representing the persons named in and attached to or logically associated with an electronic data message,
electronic document, or that the appropriate methodology or security procedures, when applicable, were employed
or adopted by such person, with the intention of authenticating or approving in an electronic data message or electronic
document;
b. The electronic data message or electronic document shall be authenticated by proof that an appropriate security
procedure, when applicable was adopted and employed for the purpose of:
i. verifying the originator of an electronic data message or electronic document, or
ii. detecting error or alteration in the communication, content or storage of an electronic document or electronic
data message from a specific point, which, using algorithms or codes, identifying words or numbers, encryptions,
answers back or acknowledgement procedures, or similar security devices.
Burden of Proof: The person seeking to introduce an electronic data message or electronic document in any legal proceeding
has the burden of proving its authenticity by evidence capable of supporting a finding that the electronic data message or
electronic document is what the person claims it on be.
Integrity of the Information and Communication System: In the absence of evidence to the contrary, the integrity
of the information and communication system in which an electronic data message or electronic document is recorded or stored
may be established in any legal proceeding –
a. By evidence that:
i. at all material times the information and communication system or other similar device was operating in a
manner that did not affect the integrity of the electronic data message or electronic document, and
ii. there are no other reasonable grounds to doubt the integrity of the information and communication system,
b. By showing that the electronic data message or electronic document was recorded or stored by a party to the
proceedings who is adverse in interest to the party using it; or
c. By showing that the electronic data message or electronic document was recorded or stored in the usual and
ordinary course of business by a person who is not a party to the proceedings and who did not act under the control of
the party using the record.
Admissibility and Evidential Weight of Electronic Data Message or electronic document: In any legal proceedings,
nothing in the application of the rules on evidence shall deny the admissibility of an electronic data message or
electronic document in evidence –
a. On the sole ground that it is in electronic form; or
b. On the ground that it is not in the standard written form, and the electronic data message or electronic document
meeting, and complying with the requirements under Legal Recognition of Electronic Data Messages and Electronic
Documents mentioned above, shall be the best evidence of the agreement and transaction contained therein.
In assessing the evidential weight of an electronic data message or electronic document, the following shall be given due regard:
a. the reliability of the manner in which it was generated, stored or communicated,
b. the reliability of the manner in which its originator was identified, and
c. other relevant factors.
Retention of Electronic Data Message or Electronic Document: Notwithstanding any provision of law, rule or regulation
to the contrary –
a. The requirement in any provision of law that certain documents be retained in their original form is satisfied by
retaining them in the form of an electronic data message or electronic document which –
i. Remains accessible so as to be usable for subsequent reference;
ii. Is retained in the format in which it was generated, sent or received, or in a format which can be demonstrated to
accurately represent the electronic data message or electronic document generated, sent or received;
iii. Enables the identification of its originator and addressee, as well as the determination of the date and the
time it was sent or received.
b. The requirement referred to in paragraph (a) is satisfied by using the services of a third party, provided that the
conditions set fourth in subparagraphs (1), (2) and (3) of paragraph (a) are met.
Proof by Affidavit: The matters referred on admissibility and on the presumption of integrity, may be presumed to have
been established by an affidavit given to the best of the deponent's knowledge subject to the rights of parties in interest
as defined in the cross-examination provided below.
Cross – Examination:
1. A deponent of an affidavit referred to above that has been introduced in evidence may be cross-examined as of right
by a party to the proceedings who is adverse in interest to the party who has introduced the affidavit or has caused the
affidavit to be introduced.
2. Any party to the proceedings has the right to cross-examine a person who is not a party to the proceedings and who
did not act under the control of the party using the record proving that the electronic data message or electronic
document was recorded or stored in the usual and ordinary course of business.
Recognition by Parties of Electronic Data Message or Electronic document: As between the originator and the
addressee of an electronic data message or electronic document, a declaration of will or other statement shall not be denied
legal effect, validity or enforceability solely on the ground that it is in the form of an electronic data message or electronic
document.
Except
a. To the extent that it duplicates another electronic data message or electronic document and
b. The addressee knew or should have known, had it exercised reasonable care or used any agreed procedure, that
the electronic data message or electronic document was a duplicate.
Error on Electronic Data Message or Electronic Document: The addressee is entitled to regard the electronic data
message or electronic document received as that which the originator intended to send, and to act on that assumption,
unless the addressee knew or should have known, had the addressee exercised reasonable care or used the appropriate
procedure –
a. That the transmission resulted in any error therein or in the electronic data message or electronic document enters
the designated information system, or
b. That electronic data message or electronic document is sent to an information system which is not so designated
by the addressee for the purposes.
Exceptions:
1. If the parties agree to it
2. Originator requested in the EDM/ED
Instances when the originator can regard non-receipt since there was no acknowledgment:
1. When the originator stated the effect or significance of acknowledgment or the ED is CONDITIONAL upon receipt
2. No statement as to effect/significance – originator gave notice stating that no acknowledgement has been received and
specifying a reasonable time by which acknowledgement is to be received, and no acknowledgement is received within
such reasonable time.
Time of Dispatch of Electronic Data Messages or Electronic Documents: General Rule: the dispatch of an electronic
data message or electronic document occurs when it enters an information system outside the control of the originator
or of the person who sent the electronic data message or electronic document on behalf of the originator.
Time of Receipt of Electronic Data Messages or Electronic Documents. – Unless otherwise agreed between the originator
and the addressee, the time of receipt of an electronic data message or electronic document is as follows:
a. Upon entry in the designated information system – if the parties has designated an information system for the purpose
of receiving electronic data messages or electronic documents
b. Upon retrieval by the addressee:
i. There is a designated information system, but the originator and the addressee are both participants in the
designated information system;
ii. The electronic message or electronic document enters an information system of the address that is not the designated
information system;
c. Upon entry in the information system of the addressee - The parties did not designate an information system.
These rules apply notwithstanding that the place where the information system is located may be different from the place where
the electronic data message or electronic document is deemed to be received.
Government Use of Electronic Data Messages, Electronic Documents and Electronic Signature: Notwithstanding any
law to the contrary, within two (2) years from the date of the effectivity of the Act, all departments, bureaus, offices and
agencies of the government, as well as all government-owned and –controlled corporations, that pursuant to law require or
accept the filing of documents, require that documents be created, or retained and/or submitted, issue permits, licenses or
certificates of registration or approval, or provide for the method and manner of payment or settlement of fees and other
obligations to the government, shall –
a. accept the creation, filing or retention of such documents in the form of electronic data messages or electronic documents;
b. issue permits, licenses, or approval in the form of electronic data messages or electronic documents;
c. require and/or accept payments, and issue receipt acknowledging such payments, through systems using electronic data
messages or electronic documents; or
d. transact the government business and/or perform governmental factions using electronic data messages or electronic
documents, and for the purpose, are authorized to adopt and promulgate, after appropriate public hearing and with due
publications in newspapers of general circulation, the appropriate rules, regulations, or guidelines, to, among others, specify
–
Applicability:
1. The processing of all types of personal information and
2. To any natural and juridical person involved in personal information processing including those personal
information controllers and processors who, although not found or established in the Philippines, use equipment that are
located in the Philippines, or those who maintain an office, branch or agency in the Philippines subject to the immediately
succeeding paragraph.
Does not apply to:
1. Information about any individual who is or was an officer or employee of a government institution that relates to the
position or functions of the individual, including:
a. The fact that the individual is or was an officer or employee of the government institution;
b. The title, business address and office telephone number of the individual;
c. The classification, salary range and responsibilities of the position held by the individual; and
d. The name of the individual on a document prepared by the individual in the course of employment with the government;
2. Information about an individual who is or was performing service under contract for a government institution that
relates to the services performed, including the terms of the contract, and the name of the individual given in the course
of the performance of those services;
3. Information relating to any discretionary benefit of a financial nature such as the granting of a license or permit given
by the government to an individual, including the name of the individual and the exact nature of the benefit;
4. Personal information processed for journalistic, artistic, literary or research purposes;
5. Information necessary in order to carry out the functions of public authority which includes the processing of personal
data for the performance by the independent, central monetary authority and law enforcement and regulatory agencies of
their constitutionally and statutorily mandated functions.
No amendments or repeal to the following laws:
a. Republic Act No. 1405, otherwise known as the Secrecy of Bank Deposits Act;
b. Republic Act No. 6426, otherwise known as the Foreign Currency Deposit Act; and
c. Republic Act No. 9510, otherwise known as the Credit Information System Act (CISA);
6. Information necessary for banks and other financial institutions under the jurisdiction of the independent, central
monetary authority or Bangko Sentral ng Pilipinas to comply with the CISA and Republic Act No. 9160, as amended,
otherwise known as the Anti-Money Laundering Act and other applicable laws; and
7. Personal information originally collected from residents of foreign jurisdictions in accordance with the laws of those
foreign jurisdictions, including any applicable data privacy laws, which is being processed in the Philippines.
The head of each government agency or instrumentality shall be responsible for complying with the security
requirements mentioned while the Commission shall monitor the compliance and may recommend the necessary action in
order to satisfy the minimum standards.
Applicability to Government Contractors: In entering into any contract that may involve accessing or requiring sensitive
personal information from one thousand (1,000) or more individuals, an agency shall require a contractor and its
employees to register their personal information processing system with the Commission in accordance with the Data
Privacy Act and to comply with the other provisions of said Act, in the same manner as agencies and government employees
comply with such requirements.
1. Unauthorized Processing: any person who process personal information without the consent of the data subject, or
without being authorized under the Data Privacy Act or any existing law. Penalties:
Imprisonment Fine
Personal Information 1 to 3 years P500,000 – P2,000,000
Sensitive Personal Information 3 to 6 years P500,000 – P4,000,000
2. Access – any person who, due to negligence, provided access to personal information without being authorized under the
Data Privacy Act or any existing law. Penalties:
Imprisonment Fine
Personal Information 1 to 3 years P500,000 – P2,000,000
Sensitive Personal Information 3 to 6 years P500,000 – P4,000,000
3. Improper Disposal – any person who knowingly or negligently dispose, discard or abandon the personal information of
an individual in an area accessible to the public or has otherwise placed the personal information of an individual in its
container for trash collection. Penalties:
Imprisonment Fine
Personal Information 6 mos. to 2 years P100,000 – P500,000
Sensitive Personal Information 1 to 3 years P100,000 – P1,000,000
4. Processing for Unauthorized Purposes - processing personal information for purposes not authorized by the data
subject, or otherwise authorized under this Act or under existing laws. Penalties:
Imprisonment Fine
Personal Information 1 year and 6 mos. to 5 years P500,000 – P1,000,000
Sensitive Personal Information 2 to 7 years P500,000 – P2,000,000
5. Unauthorized Access or Intentional Breach – any person who knowingly and unlawfully, or violating data confidentiality
and security data systems, breaks in any way into any system where personal and sensitive personal information is stored.
Penalty shall be imprisonment of 1 year to 3 years and a fine of P500,000 to P2,000,000.
6. Concealment of Security Breaches Involving Sensitive Personal Information. – any person who, after having
knowledge of a security breach and of the obligation to notify the Commission, intentionally or by omission conceals the
fact of such security breach. The penalty shall be imprisonment of 1 year and 6 months to 5 years and a fine of P500,000
to P1,000,000.
7. Malicious Disclosure – Any personal information controller or personal information processor or any of its officials,
employees or agents, who, with malice or in bad faith, discloses unwarranted or false information relative to any personal
information or personal sensitive information obtained by him or her. The penalty shall be imprisonment of 1 year and 6
months to 5 years and a fine of P500,000 to P1,000,000.
8. Unauthorized Disclosure. – Any personal information controller or personal information processor or any of its officials,
employees or agents, who discloses to a third party personal or sensitive personal information, not covered by Malicious
Disclosure above, without the consent of the data subject. The penalties:
Imprisonment Fine
Personal Information 1 year to 3 years P500,000 – P1,000,000
Sensitive Personal Information 3 to 5 years P500,000 – P2,000,000
shall he subject to imprisonment ranging from one (1) year to three (3) years and a fine of not less than Five hundred
thousand pesos (Php500,000.00) but not more than One million pesos (Php1,000,000.00).
9. Combination or Series of Acts – Any combination or series of acts as defined in above shall make the person subject to
imprisonment 3 to 6 years and a fine of P1,000,000 to P5,000,000.
Extent of Liability:
1. Juridical Persons: If the offender is a corporation, partnership or any juridical person, the penalty shall be imposed upon
the responsible officers, as the case may be, who participated in, or by their gross negligence, allowed the commission
of the crime. If the offender is a juridical person, the court may suspend or revoke any of its rights under the Data Privacy
Act.
2. Alien: If the offender is an alien, he or she shall, in addition to the penalties above, be deported without further
proceedings after serving the penalties prescribed.
3. Large-Scale: The maximum penalty in the scale of penalties respectively provided shall be imposed when the personal
information of at least one hundred (100) persons is harmed, affected or involved as the result of the above-mentioned
actions.
4. Public Official or Employee: If the offender is a public official or employee and he or she is found guilty of Improper
Disposal of Personal Information and Sensitive Personal Information and Processing of Personal Information and Sensitive
Personal Information for Unauthorized Persons, he or she shall, in addition to the penalties prescribed, suffer perpetual
or temporary absolute disqualification from office, as the case may be.
5. Offense Committed by Public Officer: When the offender or the person responsible for the offense is a public officer as
defined in the Administrative Code of the Philippines in the exercise of his or her duties, an accessory penalty consisting
in the disqualification to occupy public office for a term double the term of criminal penalty imposed shall he
applied.
6. Restitution: Restitution for any aggrieved party shall be governed by the provisions of the New Civil Code.
NOTIFICATION OF THE COMMISSION: The personal information controller shall notify the Commission of a personal data
breach subject to the following procedures:
When Notification Should be Done: The Commission shall be notified within seventy-two (72) hours upon knowledge of
or the reasonable belief by the personal information controller or personal information processor that a personal data breach
has occurred.
Delay in Notification: Notification may only be delayed to the extent necessary to determine the scope of the breach, to
prevent further disclosures, or to restore reasonable integrity to the information and communications system. The personal
information controller need not be absolutely certain of the scope of the breach prior to notification. Its inability to immediately
secure or restore integrity to the information and communications system shall not be a ground for any delay in notification, if
such delay would be prejudicial to the rights of the data subjects. Delay in notification shall not be excused if it is used to
perpetuate fraud or to conceal the personal data breach.
When delay is prohibited: There shall be no delay in the notification if the breach involves at least one hundred (100) data
subjects, or the disclosure of sensitive personal information will harm or adversely affect the data subject. In both instances,
the Commission shall be notified within the 72-hour period based on available information. The full report of the personal data
breach must be submitted within five (5) days, unless the personal information controller is granted additional time by the
Commission to comply.
Content of Notification: The notification shall include, but not be limited to:
Procedure: The procedure for registration shall be in accordance with these Rules and other issuances of the Commission.
NOTIFICATION OF AUTOMATED PROCESSING OPERATIONS. The personal information controller carrying out any wholly
or partly automated processing operations or set of such operations intended to serve a single purpose or several related
purposes shall notify the Commission when the automated processing becomes the sole basis for making decisions about a data
subject, and when the decision would significantly affect the data subject.
a. The notification shall include the following information:
1. Purpose of processing;
2. Categories of personal data to undergo processing;
3. Category or categories of data subject;
4. Consent forms or manner of obtaining consent;
5. The recipients or categories of recipients to whom the data are to be disclosed;
6. The length of time the data are to be stored;
7. Methods and logic utilized for automated processing;
8. Decisions relating to the data subject that would be made on the basis of processed data or that would significantly
affect the rights and freedoms of data subject; and
9. Names and contact details of the compliance or data protection officer.
b. No decision with legal effects concerning a data subject shall be made solely on the basis of automated processing without
the consent of the data subject.
REVIEW BY THE COMMISSION: The following are subject to the review of the Commission, upon its own initiative or upon
the filing of a complaint by a data subject:
a. Compliance by a personal information controller or personal information processor with the Act, these Rules, and other
issuances of the Commission;
b. Compliance by a personal information controller or personal information processor with the requirement of establishing
adequate safeguards for data privacy and security;
c. Any data sharing agreement, outsourcing contract, and similar contracts involving the processing of personal data, and its
implementation;
d. Any off-site or online access to sensitive personal data in government allowed by a head of agency;
e. Processing of personal data for research purposes, public functions, or commercial activities;
f. Any reported violation of the rights and freedoms of data subjects;
g. Other matters necessary to ensure the effective implementation and administration of the Act, these Rules, and other
issuances of the Commission
DECLARATION OF POLICY: It is hereby declared the policy of the State to promote integrity, accountability, proper
management of public affairs and public property as well as to establish effective practices, aimed at efficient turnaround of the
delivery of government services and the prevention of graft and corruption in government. Towards this end, the State shall
maintain honesty and responsibility among its public officials and employees, and shall take appropriate measures to promote
transparency in each agency with regard to the manner of transacting with the public, which shall encompass a program for
the adoption of simplified requirements and procedures that will reduce red tape and expedite business and nonbusiness related
transactions in government.
DEFINITION OF TERMS:
Action refers to the written approval or disapproval made by a government office or agency on the application
or request submitted by an applicant or requesting party for processing;
Business One a single common site or location, or a single online website or portal designated for the Business Permit
Stop Shop and Licensing System (BPLS) of an LGU to receive and process applications, receive payments, and issue
(BOSS) approved licenses, clearances, permits, or authorizations;
Business- a set of regulatory requirements that a business entity must comply with to engage, operate or continue
related to operate a business, such as, but not limited to, collection or preparation of a number of documents,
transactions submission to national and local government authorities, approval of application submitted, and receipt
of a formal certificate or certificates, permits, licenses which include primary and secondary, clearances
and such similar authorization or documents which confer eligibility to operate or continue to operate as
a legitimate business
COVERAGE: all government offices and agencies including LGUs, GOCCs and other government instrumentalities, whether
located in the Philippines or abroad, that provide services covering business and nonbusiness related transactions.
Business-related transactions - a set of regulatory requirements that a business entity must comply with to engage, operate
or continue to operate a business.
REENGINEERING OF SYSTEMS AND PROCEDURES: All offices and agencies which provide government services are hereby
mandated to regularly undertake cost compliance analysis, time and motion studies, undergo evaluation and improvement of
their transaction systems and procedures and reengineer the same if deemed necessary to reduce bureaucratic red tape and
processing time.
The Anti-Red Tape Authority shall coordinate with all government offices covered under this Act in the review of existing laws,
executive issuances and local ordinances, and recommend the repeal of the same if deemed outdated, redundant, and adds
undue regulatory burden to the transacting public.
All proposed regulations of government agencies shall undergo regulatory impact assessment to establish if the proposed
regulation does not add undue regulatory burden and cost to these agencies and the applicants or requesting parties: Provided,
That when necessary, any proposed regulation may undergo pilot implementation to assess regulatory impact.
All LGUs and NGAs are directed to initiate review of existing policies and operations and commence with the reengineering of
their systems and procedures in compliance with the provisions of this Act, pending the approval of the implementing rules and
regulations (IRR) thereof.
CITIZEN’S CHARTER: All government agencies including departments, bureaus, offices, instrumentalities, or government-
owned and/or –controlled corporations, or LGUs shall set up their respective most current and updated service standards to be
known as the Citizen’s Charter in the form of information billboards which shall be posted at the main entrance of offices or at
the most conspicuous place, in their respective websites and in the form of published materials written either in English, Filipino,
or in the local dialect, that detail:
a. A comprehensive and uniform checklist of requirements for each type of application or request;
b. The procedure to obtain a particular service;
c. The person/s responsible for each step;
d. The maximum time to conclude the process;
e. The document/s to be presented by the applicant or requesting party, if necessary;
f. The amount of fees, if necessary; and
g. The procedure for filing complaints.
Complex Transactions - applications or requests submitted 7 working days from date of receipt
by applicants or requesting parties of a government office
which necessitate evaluation in the resolution of
complicated issues by an officer or employee of said
government office, such transactions to be determined by the
office concerned.
If the application or request for license, clearance, permit, the Sanggunian concerned shall be given a period of
certification or authorization shall require the approval of the forty-five (45) working days to act on the
local Sanggunian (Sangguniang Bayan, Sangguniang application or request, which can be extended for
Panlungsod, or the Sangguniang Panlalawigan as the case may another twenty (20) working days.
be)
If the local Sanggunian concerned has denied the
application or request, the reason for the denial, as
well as the remedial measures that maybe taken by
the applicant shall be cited by the concerned
Sanggunian
2. EXTENSTION: The maximum time prescribed above may be extended only once for the same number of days, which
shall be indicated in the Citizen's Charter. Prior to the lapse of the processing time, the office or agency concerned shall
notify the applicant or requesting party in writing of the reason for the extension and final date of release of the
government service/s requested. Such written notification shall be signed by the applicant or requesting party to serve as
proof of notice.
3. ADJUSTMENT/SUSPENSION OF PERIOD TO PROCESS: In cases where the cause of delay is due to force majeure or
natural or man-made disasters, which result to damage or destruction of documents, and/or system failure of the
computerized or automatic processing, the prescribed processing times mandated in this Act shall be suspended and
appropriate adjustments shall be made.
1. If a government office or agency fails to approve or disapprove an original application or request for issuance of license,
clearance, permit, certification or authorization within the prescribed processing time, said application or request shall
be deemed approved: Provided, That all required documents have been submitted and all required fees and
charges have been paid.
2. The acknowledgement receipt together with the official receipt for payment of all required fees issued to the applicant
or requesting party shall be enough proof or has the same force and effect of a license, clearance, permit, certification
or authorization under this automatic approval mechanism.
3. If a government office or agency fails to act on an application or request for renewal of a license, clearance, permit,
certification or authorization subject for renewal within the prescribed processing time, said license, clearance, permit,
certification or authorization shall automatically be extended: Provided, That the Authority, in coordination with the Civil
Service Commission (CSC), Department of Trade and Industry (DTI) , Securities and Exchange Commission (SEC),
Department of the Interior and Local Government (DILG) and other agencies which shall formulate the IRR of this Act, shall
provide a listing of simple, complex, highly technical applications, and activities which pose danger to public
health, public safety, public morals or to public policy.
Any denial of application or request is deemed to have been made with the permission or clearance from the highest
authority having jurisdiction over the government office or agency concerned.
LIMITATION OF SIGNATORIES
The number of signatories in any document shall be limited to a maximum of three (3) signatures which shall represent
officers directly supervising the office or agency concerned: Provided, That in case the authorized signatory is on official
business or official leave, an alternate shall be designated as signatory.
All government agencies covered shall, when applicable, develop electronic versions of licenses, clearances, permits,
certifications or authorizations with the same level of authority as that of the signed hard copy, which may be printed by the
applicants or requesting parties in the convenience of their offices.
Heads of offices and agencies which render government services shall adopt appropriate working schedules to ensure that
all applicants or requesting parties who are within their premises prior to the end of official working hours are
attended to and served even during lunch break and after regular working hours.
The LGUs are mandated to implement the following revised guidelines in the issuance of business licenses, clearances, permits,
certifications or authorizations:
a. A single or unified business application form shall be used in processing new applications for business permits and
business renewals which consolidates all the information of the applicant or requesting party by various local government
departments, such as, but not limited to, the local taxes and clearances, building clearance, sanitary permit, zoning
clearance, and other specific LGU requirements, as the case may be, including the fire clearance from the Bureau of Fire
Protection (BFP).
The unified form shall be made available online using technology-neutral platforms such as, but not limited to, the central
business portal or the city/municipality's website and various channels for dissemination. Hard copies of the unified
forms shall likewise be made available at all times in designated areas of the concerned office and/or agency.
b. A one-stop business facilitation service, hereinafter referred to as the business one stop shop, (BOSS) for the
city/municipality's business permitting and licensing system to receive and process manual and/or electronic submission of
application for license, clearance, permit, certification or authorization shall be established within the
cities/municipalities’ Negosyo Center as provided for under Republic Act No. 10644, otherwise known as the "Go
Negosyo Act".
There shall be a queuing mechanism in the BOSS to better manage the flow of applications among the LGUs' departments
receiving and processing applications. LGUs shall implement colocation of the offices of the treasury, business permits
and licensing office, zoning office, including the BFP, and other relevant city/municipality offices, departments, among
others, engaged in starting a business, dealing with construction permits.
c. Cities/Municipalities are mandated to automate their business permitting and licensing system or set up an
electronic BOSS within a period of three (3) years upon the effectivity of this Act for a more efficient business
registration processes.
Cities/Municipalities with electronic BOSS shall develop electronic versions of licenses, clearances, permits, certifications
or authorizations with the same level of authority, which may be printed by businesses in the convenience of their
offices. The DICT shall make available to LGUs the software for the computerization of the business permit and licensing
system. The DICT, DTI, and DILG, shall provide technical assistance in the planning and implementation of a computerized
or software-enabled business permitting and licensing system.
d. To lessen the transaction requirements, other local clearances such as, but not limited to, sanitary permits,
environmental and agricultural clearances shall be issued together with the business permit.
e. Business permits shall be valid for a period of one (1) year. The city/municipality may have the option to renew
business permits within the first month of the year or on the anniversary date of the issuance of the business
permit.
f. Barangay clearances and permits related to doing business shall be applied, issued, and collected at the
city/municipality in accordance with the prescribed processing time of this Act: Provided, That the share in the
collections shall be remitted to the respective barangays. The pertinent provisions of Republic Act No. 7160, otherwise
known as "The Local Government Code of 1991", specifically Article IV, Section 152(c) is hereby amended accordingly.
VIOLATIONS AND PERSONS LIABLE: Any person who performs or cause the performance of the following acts shall be
liable:
a. Refusal to accept application or request with complete requirements being submitted by an applicant or requesting party
without due cause;
b. Imposition of additional requirements other than those listed in the Citizen’s Charter;
c. Imposition of additional costs not reflected in the Citizen’s Charter;
d. Failure to give the applicant or requesting party a written notice on the disapproval of an application or request;
e. Failure to render government services within the prescribed processing time on any application or request without due
cause;
f. Failure to attend to applicants or requesting parties who are within the premises of the office or agency concerned prior to
the end of official working hours and during lunch break;
g. Failure or refusal to issue official receipts; and
h. Fixing and/or collusion with fixers in consideration of economic and/or other gain or advantage."
Penalties and Liabilities: Any violations of the above will warrant the following penalties and liabilities.
a. First Offense: Administrative liability with 6 months suspension: Provided, however, That in the case of fixing and/or
collusion with fixers, the penalty below shall apply.
b. Second Offense: Administrative liability and criminal liability of dismissal from the service, perpetual disqualification from
holding public office and forfeiture of retirement benefits and imprisonment of 1 to 6 years with a fine of not less than
P500,000.00, but not more than P2,000,000.00.
Criminal liability shall also be incurred through the commission of bribery, extortion, or when the violation was done deliberately
and maliciously to solicit favor in cash or in kind. In such cases, the pertinent provisions of the Revised Penal Code and other
special laws shall apply.
E- COMMERCE ACT
1. The Electronic Commerce Act applies to any kind of data message and electronic document used in the context of __
activities to include __ dealings, transactions, arrangements, agreements, contracts, and exchanges and storage of
information.
A. Commercial and non-commercial; domestic and international
B. Only commercial; domestic and international
C. Only commercial; only domestic
D. Commercial and non-commercial; only domestic
2. It refers to information generated, sent, received, or stored by optical or similar means.
A. Electronic key
B. Electronic data message
C. Electronic signature
D. Electronic document
3. It refers to any distinctive mark, characteristic and/or sound in electronic form, representing the identity of a person
and attached to or logically associated with the electronic data message or electronic document
A. Electronic key
B. Electronic data message
C. Electronic signature
D. Electronic document
4. It refers to information or the representation of information, data, figures, symbols or other modes of written
expression, described or however represented, by which a right is established or an obligation extinguished, or by
which a fact may be prove and affirmed, which is receive, recorded, transmitted, stored, processed, retrieved or
produced electronically.
A. Electronic key
B. Electronic data message
C. Electronic signature
D. Electronic document
5. It refers to a secret code which secures and defends sensitive information that cross over public channels into a form
decipherable only with a matching electronic key.
A. Electronic key
B. Electronic data message
C. Electronic signature
D. Electronic document
6. First Statement: Information shall be denied legal effect, validity or enforceability solely on the grounds that it is in
the data message purporting to give rise to such legal effect, or that it is merely referred to in that electronic data
message.
Second Statement: For evidentiary purposes, an electronic document shall be the functional equivalent of a written
document under existing laws.
A. Only the first statement is true.
B. Only the second statement is true.
C. Both of the statements are true.
D. None of the statements is true.
7. In any proceedings involving an electronic signature, it shall be presumed that (a) The electronic signature is the
signature of the person to whom it correlates; and (b) The electronic signature was affixed by that person with the
intention of signing or approving the electronic document even if the person relying on the electronically signed
electronic document knows or has noticed of defects in or unreliability of the signature or reliance on the electronic
signature is not reasonable under the circumstances.
A. (a) only
B. (b) only
C. Both (a) and (b)
D. Neither (a) and (b)
8. Who has the burden of proving the authenticity of an electronic data message or electronic document in any legal
proceeding?
A. The person who sent the electronic data message
B. The person who signed the electronic document
C. The person denying the authenticity of said electronic data message or electronic document
D. The person seeking to introduce said electronic data message or electronic document
9. What may be presumed to have been established by an affidavit given to the best of the deponent’s knowledge?
A. Admissibility of electronic evidence only
B. Admissibility and presumption of integrity of electronic evidence
C. Presumption of integrity of electronic evidence only
D. None of the above
10. First Statement: As between the originator and the addressee of an electronic data message or electronic document,
a declaration of will or other statement shall not be denied legal effect, validity or enforceability solely on the ground
that it is in the form of an electronic data message.
Second Statement: An electronic data message or electronic document is that of the originator if it was sent by the
originator himself.
1. It refers to any information whether recorded in a material form or not, from which the identity of an individual is apparent
or can be reasonably and directly ascertained by the entity holding the information, or when put together with other
information would directly and certainly identify an individual.
A. Data subject
B. Personal information
C. Privileged information
D. Sensitive personal information
2. It refers to any and all forms of data which under the Rules of Court and other pertinent laws constitute privileged
communication.
A. Data subject
B. Personal information
C. Privileged information
D. Sensitive personal information
3. First Statement: DPA applies to the processing of all types of personal information and to any natural and juridical person
involved in personal information processing including those personal information controllers and processors who, although
not found or established in the Philippines, use equipment that are located in the Philippines, or those who maintain an
office, branch or agency in the Philippines, except when DPA is not applicable, subject to the requirements of extraterritorial
application.
Second Statement: The Data Privacy Act is applicable to Information about any individual who is or was an officer or
employee of a government institution that relates to the position or functions of the individual.
A. Only the first statement is true.
B. Only the second statement is true.
C. Both of the statements are true.
D. None of the statements is true.
4. Which information is/are not covered by the Data Privacy Act?
A. About an individual who is or was performing service under contract for a government institution that
relates to the services performed
B. Relating to any discretionary benefit of a financial nature such as the granting of a license or permit given
by the government to an individual
C. Processed for journalistic, artistic, literary or research purposes
D. All of the above
5. Which information is/are not covered by the Data Privacy Act?
A. Necessary in order to carry out the functions of public authority
B. Necessary for banks and other financial institutions under the jurisdiction of the independent, central
monetary authority or Bangko Sentral ng Pilipinas to comply with RA 9510, and RA 9160, as amended
C. Originally collected from residents of foreign jurisdictions in accordance with the laws of those foreign
jurisdictions,
D. All of the above
6. First Statement: The Data Privacy Act did not amend or repeal the provisions of RA 53, which affords the publishers,
editors or duly accredited reporters of any newspaper, magazine or periodical of general circulation protection from being
compelled to reveal the source of any news report or information appearing in said publication which was related in any
confidence to such publisher, editor, or reporter.
Second Statement: The Data Privacy Act applies to an act done or practice engaged within the Philippines by an entity
only and does not apply to those done and engaged outside of the Philippines.
A. Only the first statement is true.
B. Only the second statement is true.
C. Both of the statements are true.
D. None of the statements is true.
7. Which of the following is/are the functions of the National Privacy Commission?
A. Ensure compliance of personal information controllers with the DPA
B. Issue cease and desist orders, impose a temporary or permanent ban on the processing of personal
information, upon finding that the processing will be detrimental to national security and public interest
C. Compel or petition any entity, government agency or instrumentality to abide by its orders or take
action on a matter affecting data privacy
D. All of the above
8. First Statement: The National Privacy Commission shall ensure at all times the confidentiality of any personal information
that comes to its knowledge and possession.
Second Statement: The National Privacy Commission is attached to the Department of Information and Communications
Technology (DICT).
A. Only the first statement is true.
B. Only the second statement is true.
C. Both of the statements are true.
D. None of the statements is true.
1 B 11 B 21 A
2 C 12 C 22 C
3 A 13 B 23 D
4 D 14 B 24 C
5 D 15 D 25 B
6 A 16 A 26 C
7 D 17 D 27 A
8 C 18 B 28 B
9 B 19 C 29 D
10 A 20 C 30 D
1. Under the Ease of Doing Business Act, this has been defined as a set of regulatory requirements that a business entity
must comply with to engage or operate or continue to operate a business:
A. Business-related transaction
B. License
C. Non-business transactions
D. Complex transactions
2. After acceptance of the written applications, requests, and/or documents, who shall perform the preliminary assessment
of the application or request?
A. The receiving officer
B. The direct supervisor of the receiving officer
C. The head of the agency
D. The Anti-Red Tape Authority
3. A transaction which present only inconsequential issues for the resolution by an officer or employee of the concerned
government office is known as:
A. Simple transaction
B. Complex transaction
C. Highly-technical transaction
D. A transaction that will require the approval of a local sanggunian
4. For this type of transactions, the Ease of Doing Business Act allows a maximum of 20 working days to process. Which one
is an exception?
A. an application or request which requires the use of technical knowledge, specialized skill and/or training in the
process and/or evaluation thereof.
B. An application involving activities which pose danger to public health
C. A request involving activities which pose danger to public safety
D. Applications or requests submitted by applicants or requesting parties of a government office which necessitate
evaluation in the resolution of complicated issues by an officer or employee of said government office, such
transactions to be determined by the office concerned
5. An application which requires the use of technical knowledge, specialized skill and/or training in the process and/or
evaluation thereof.
A. Simple Transaction
B. Complex Transaction
C. Highly-Technical Transaction
D. None of the choices
6. If the approval of the local Sanggunian is required, the processing time of the application or request, the approval of the
Sanggunian concerned shall be given a period of ____________.
A. 20 calendar days
B. 45 calendar days
C. 20 working days
D. 45 working days
7. If a transaction is categorized as complex, it shall be processed not more than 7 working days from the date of receipt,
which is also the number of days indicated in the citizens’ charter. The maximum time for extension that may be granted
is:
A. 3 working days
B. 7 working days
C. 20 working days
D. 45 working days
8. If a government office fails to approve or disapprove an application within the prescribed processing time:
A. It shall be deemed approved
B. It shall be deemed denied
C. It shall be deemed approved only if all the required documents have been submitted and all required fees and
charges have been paid
D. It shall be deemed denied if all the required documents have not been submitted even if all required fees and
charges have been paid
9. The number of signatories in any document shall be limited to a maximum of ___ signatures which shall represent officers
directly supervising the office or agency concerned.
A. 1
B. 3
C. 5
D. 7
10. Mr. X went to a government agency and arrived at 4:58pm. He was 12 th in the number of persons who sill be submitting
an application for a government license. The agency closes at 5:00pm and it takes on average 20mins to process the
submission which means only 1 applicant will be processed before closing time. In this case,
A. Mr. X would have to go back the following day and will be considered 11th in the processing queue.
B. Mr. X would have to go back the following day and obtain a new queueing number.
C. Mr. X would not have to go back as his application is still required to be processed that same day.
D. Mr. X can be considered a priority.
1 A 6 D
2 A 7 B
3 A 8 C
4 D 9 B
5 C 10 C