0% found this document useful (0 votes)
34 views

Data Privacy (2)

Uploaded by

kayebright120
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
34 views

Data Privacy (2)

Uploaded by

kayebright120
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 35

Data Privacy Act of the Philippines (Republic Act No.

10173)

I. What is the Data Privacy Act (RA 10173)?

A. Overview
 Enactment and Purpose:
o Historical Context:
 The Data Privacy Act (DPA) was enacted on August 15, 2012, and came into effect on
September 8, 2012.
 It was established to address the growing concerns over privacy in the digital age.
o Main Objectives:
 Protect Individual Privacy:
 Safeguard the fundamental human right of privacy.
 Ensure personal data is secure and protected from misuse.
 Promote Free Flow of Information:
 Balance privacy protection with the need for information exchange to drive innovation
and economic growth.
 Align with International Standards:
 Harmonize Philippine laws with global data protection regulations, such as the EU's
General Data Protection Regulation (GDPR).
 Scope of the Law:
o Who is Covered:
 Applies to all individuals and organizations that process personal data, whether in the
government or private sector.
 Includes data controllers and data processors operating within the Philippines.

o What is Covered:
 All forms of personal information in both electronic and physical formats.
 Processing activities such as collection, recording, organization, storage, updating, retrieval,
consultation, use, consolidation, blocking, erasure, or destruction of data.

B. Importance for the Youth


 Digital Engagement:
o Active Online Presence:
 Youth are among the most prolific users of the internet, social media, and mobile applications.
 Regular activities include posting on social media, online shopping, and participating in online
forums.
o Data Generation:
 Every online interaction generates personal data that can be collected and analyzed.
 Risks and Vulnerabilities:
o Privacy Risks:
 Identity Theft:
 Personal information can be stolen and used for fraudulent activities.
 Cyberbullying and Harassment:
 Personal data can be exploited to harass or bully individuals online.
 Unauthorized Data Sharing:
 Information may be shared without consent, leading to unwanted exposure.
o Lack of Awareness:
 Many youths are unaware of how their data is used or the implications of sharing personal
information online.

 Empowerment Through Knowledge:


o Exercising Your Rights:
 Knowing the law enables you to assert your rights regarding your personal data.
o Informed Decision-Making:
 Helps you make conscious choices about what information to share and with whom.
o Advocacy and Peer Influence:
 You can educate peers about data privacy, fostering a culture of respect and protection for
personal information.
II. Key Concepts and Definitions
A. Personal Data
 Definition:
o Personal data refers to any information, whether recorded in a material form or not, from which the
identity of an individual is apparent or can be reasonably and directly ascertained by the entity
holding the information.
 Examples:
o Direct Identifiers:
 Full name
 Home address
 Email address
 Phone numbers
 Government-issued IDs (e.g., passport, driver's license)
o Indirect Identifiers:
 Date and place of birth
 Gender
 Educational background
 Employment details
 Financial information
B. Sensitive Personal Information
 Definition:
o Sensitive personal information is a subset of personal data that requires higher levels of protection
due to its sensitive nature.
 Categories Include:
o Race, Ethnic Origin, Marital Status, Age, Color, and Religious, Philosophical, or Political
Affiliations
o Health Information:
 Medical history
 Health conditions
 Treatments and medications
o Genetic or Sexual Life:
 Genetic data
 Sexual orientation
 Sexual practices
o Legal Proceedings:
 Information about offenses committed or alleged to have been committed
 Dispositions of such proceedings
o Government-Issued Identifiers:
 Social Security System (SSS) numbers
 Government Service Insurance System (GSIS) numbers
 Unified Multi-Purpose ID (UMID)
 Tax Identification Number (TIN)
 PhilHealth number
 Significance:
o Unauthorized disclosure or misuse can lead to discrimination, identity theft, or other forms of harm.

C. Data Subject
 Definition:
o The data subject is the individual whose personal or sensitive personal information is processed.
 Role and Rights:
o Central to the Data Privacy Act, data subjects are granted specific rights to control the processing of
their personal data.
 Examples:
o You, as an individual user of social media platforms, online services, or any entity that collects
personal data.
D. Data Controller and Data Processor
 Data Controller:
o Definition:
 An organization or person who determines the purposes and means of processing personal
data.
o Responsibilities:
 Ensuring compliance with data protection principles.
 Implementing appropriate security measures.
 Obtaining valid consent from data subjects.
o Examples:
 A company collecting customer data for marketing purposes.
 An educational institution maintaining student records.
 Data Processor:
o Definition:
 An organization or person who processes personal data on behalf of the data controller.
o Responsibilities:
 Processing data only under the instructions of the data controller.
 Implementing security measures to protect data.
o Examples:
 A cloud service provider storing data for a company.
 A third-party payroll service managing employee salary information.

E. Processing
 Definition:
o Any operation or set of operations performed upon personal data, including but not limited to
collection, recording, organization, storage, updating, retrieval, consultation, use, consolidation,
blocking, erasure, or destruction of data.
 Examples of Processing Activities:
o Collection:
 Gathering personal data through forms, surveys, or online registrations.
o Storage:
 Keeping data in databases, cloud storage, or physical files.
o Use:
 Utilizing data for specific purposes like marketing, research, or service provision.
o Disclosure:
 Sharing data with third parties, whether by transmission, dissemination, or making it available
in any other form.
o Destruction:
 Deleting or discarding data in a secure manner when no longer needed.

F. Consent
 Definition:
o Any freely given, specific, informed indication of will, whereby the data subject agrees to the
collection and processing of personal data about and/or relating to them.

 Elements of Valid Consent:


o Freely Given:
 Consent must be given voluntarily, without coercion or undue influence.
o Specific:
 Consent should relate to a specific purpose; blanket consents are not acceptable.
o Informed:
 The data subject must be provided with clear and understandable information about the
processing activities.
 Withdrawal of Consent:
o Data subjects have the right to withdraw consent at any time.
o Withdrawal must be as easy as giving consent.
G. The Principle of Transparency
 Definition:
o Organizations must be open and clear about how they process personal data.
 Requirements:
o Privacy Notices and Policies:
 Must provide accessible and understandable information on data processing activities.
o Communication:
 Use clear and plain language, especially when addressing minors.
 Importance:
o Builds trust between data subjects and organizations.
o Enables data subjects to make informed decisions
III. Your Rights Under the Data Privacy Act

A. Right to Be Informed
 Explanation:
o You have the right to be informed whether personal data pertaining to you shall be, are being, or
have been processed.
 What It Means:
o Organizations must provide you with clear and accessible information about how your personal data
will be collected, used, stored, and shared.
 Required Information Includes:
o Purpose of Processing:
 Why your data is being collected and how it will be used.
o Scope and Method of Processing:
 The nature and extent of data processing activities.
o Data Sharing:
 Whether your data will be shared with third parties and for what purposes.
o Identity of the Data Controller:
 Who is collecting and processing your data, including contact details.
 Practical Applications:
o Privacy Notices and Policies:
 Websites, apps, and services should provide easily accessible privacy policies.
o Consent Forms:
 Before collecting your data, organizations must inform you and obtain your consent.
B. Right to Access
 Explanation:
o You have the right to reasonable access to your personal data upon request.
 What It Includes:
o Confirmation of Data Processing:
 Whether an organization holds personal data about you.
o Data Content:
 Access to the actual data they have collected.
o Sources of Data:
 Where and how your data was obtained.
o Processing Logic:
 How automated decisions are made using your data.
 How to Exercise:
o Requesting Access:
 Submit a formal request to the organization's Data Protection Officer or customer service.
o Response Time:
 Organizations are required to respond within a reasonable period, typically within 30 days.
 Practical Example:
o Asking a social media platform for a copy of all your posts, messages, and profile information they
have stored.
C. Right to Object
 Explanation:
o You can refuse or withdraw consent to the processing of your personal data.
 When to Use:
o Direct Marketing:
 If you do not want your data used for marketing purposes.
o Profiling:
 If you object to automated processing that analyzes or predicts aspects concerning you.
o Unlawful Processing:
 If data is processed without a legal basis.
 How to Exercise:
o Opt-Out Mechanisms:
 Use provided options to unsubscribe or opt-out.
o Direct Communication:
 Notify the organization in writing of your objection.
 Practical Example:
o Unsubscribing from promotional emails or messages from a retailer.
D. Right to Erasure or Blocking
 Explanation:
o Also known as the "Right to be Forgotten," you can request the deletion or blocking of your personal
data from an organization's records.
 Applicable Circumstances:
o Withdrawal of Consent:
 If you withdraw consent, and there is no other legal ground for processing.
o Unlawful Processing:
 If data has been unlawfully processed.
o Obsolete Data:
 If data is no longer necessary for the purposes it was collected.
 How to Exercise:
o Submitting a Request:
 Contact the organization's Data Protection Officer with your request.
o Providing Reasons:
 Clearly state why you are requesting erasure or blocking.
 Practical Example:
o Asking a former employer to delete your personal records if they are no longer necessary.
E. Right to Damages
 Explanation:
o You are entitled to be indemnified for any damages sustained due to inaccurate, incomplete,
outdated, false, unlawfully obtained, or unauthorized use of personal data.

 Types of Damages:
o Actual Damages:
 Monetary compensation for proven financial loss.
o Moral Damages:
 Compensation for psychological impact, anxiety, or emotional distress.
 How to Exercise:
o Legal Action:
 File a complaint with the National Privacy Commission (NPC) or pursue legal proceedings in
court.
o Evidence Gathering:
 Collect documentation and proof of the harm suffered.
 Practical Example:
o Seeking compensation after a data breach leads to identity theft and financial loss.
F. Right to Rectification
 Explanation:
o You have the right to correct any inaccuracies or errors in your personal data.
 How to Exercise:
o Request Correction:
 Contact the organization and specify the inaccurate data and the corrections needed.
o Verification:
 The organization may require proof to verify the accuracy of the new information.
 Practical Example:
o Updating your contact information or correcting a misspelled name in an organization's records.
G. Right to Data Portability
 Explanation:
o You have the right to obtain and reuse your personal data across different services.
 What It Entails:
o Data Transfer:
 Receive your data in a structured, commonly used, and machine-readable format.
o Direct Transfer:
 Request that your data be transmitted directly from one organization to another, where
technically feasible.
 How to Exercise:
o Submit a Request:
 Contact the organization and ask for your data in a portable format.
 Practical Example:
o Downloading your playlists and preferences from one music streaming service to import into another.
H. Right to File a Complaint
 Explanation:
o If you believe your data privacy rights have been violated, you can file a complaint with the NPC.
 How to Exercise:
o Gather Evidence:
 Collect all relevant information and documentation about the violation.
o Submit Complaint:
 File the complaint through the NPC's official channels, such as their website or office.
 Practical Example:
o Reporting an organization that continues to send you marketing messages despite unsubscribing.
V. Real-Life Examples
A. Example 1: Social Media Data Sharing without Consent

 Scenario:
o A popular social media platform collects extensive personal data from its users, including their
interests, browsing habits, and connections. Without obtaining explicit consent, the platform shares
this data with third-party advertisers and data brokers.

 Impact on Individuals:
o Privacy Invasion:
 Users begin to receive targeted advertisements based on private conversations and activities
they believed were confidential.
o Unwanted Solicitations:
 Increase in spam messages, unsolicited marketing calls, and emails.
o Psychological Effects:
 Feeling of being constantly monitored or watched, leading to discomfort and distrust.

 Legal Implications:
o Violation of the Right to Be Informed:
 Failure to provide clear information about data sharing practices.
o Breach of Consent Requirements:
 Sharing data without explicit consent violates the Data Privacy Act's consent provisions.
o Potential Penalties:
 The organization could face fines, sanctions, and be required to change its practices.
 Preventive Measures:
o For Users:
 Regularly review and adjust privacy settings on social media platforms.
 Read and understand privacy policies before using services.
o For Organizations:
 Implement transparent data practices and obtain explicit consent for data sharing.
B. Example 2: Data Breach at an Educational Institution

 Scenario:
o A university stores student records, including personal information and academic data, on an
unsecured server. Hackers exploit this vulnerability, accessing and leaking the data online.

 Impact on Individuals:
o Identity Theft Risks:
 Personal information like addresses, birthdates, and identification numbers can be used
fraudulently.
o Emotional Distress:
 Students may feel violated and anxious about the misuse of their information.
o Academic and Career Consequences:
 Exposure of academic records could affect future employment or educational opportunities.

 Legal Implications:
o Failure to Implement Security Measures:
 The institution did not employ appropriate technical safeguards.
o Breach Notification Obligations:
 The university must inform the affected individuals and the NPC promptly.
o Potential Sanctions:
 The institution could face administrative fines and be required to improve security practices.
 Preventive Measures:
o For Institutions:
 Invest in robust cybersecurity measures.
 Conduct regular security audits and staff training.
o For Students:
 Monitor personal accounts for suspicious activities.
 Change passwords and consider credit monitoring services if personal financial information
was involved.
C. Example 3: Unauthorized Use of Personal Photos

 Scenario:
o An individual discovers that their personal photos, originally shared privately with a friend, have been
uploaded to a public website without their consent.

 Impact on Individual:
o Privacy Violation:
 Loss of control over personal images.
o Reputational Damage:
 Potential harm to personal and professional relationships.
o Emotional Harm:
 Feelings of betrayal, embarrassment, and distress.

 Legal Implications:
o Violation of Right to Object and Erasure:
 The individual can demand the removal of the photos.
o Possible Criminal Charges:
 If the images are of a sensitive nature, the uploader may face legal action under anti-voyeurism
or cybercrime laws.
o Data Privacy Complaint:
 The individual can file a complaint with the NPC for unauthorized processing of personal data.
 Preventive Measures:
o For Individuals:
 Be cautious when sharing personal images, even with trusted individuals.
o For the Offender:
 Understand and respect others' privacy rights.
 Obtain consent before sharing someone else's personal data or images.
D. Example 4: Phishing Scam Targeting Youth

 Scenario:
o Students receive emails that appear to be from their school's administration, requesting login
credentials to update security settings. The emails are actually from scammers attempting to steal
personal information.

 Impact on Individuals:
o Account Compromise:
 Unauthorized access to email, school portals, and personal files.
o Data Theft:
 Personal information may be extracted and misused.
o Financial Risks:
 If banking or payment information is accessible, it could lead to financial loss.

 Legal Implications:
o Cybercrime:
 Phishing is illegal under the Cybercrime Prevention Act.
o Data Breach Responsibilities:
 If the school's systems are compromised due to weak security, they may have obligations
under the Data Privacy Act.
 Preventive Measures:
o For Individuals:
 Verify the sender's email address and be cautious with unsolicited requests.
 Enable two-factor authentication where possible.
o For Schools:
 Educate students and staff about phishing risks.
 Implement email filtering and security protocols.
E. Example 5: Mobile App Misusing Permissions

 Scenario:
o A popular gaming app requests access to users' contacts, messages, and location data, which are
not necessary for its functionality. The app sells this data to advertisers.

 Impact on Individuals:
o Privacy Invasion:
 Unnecessary access to sensitive personal information.
o Unsolicited Communications:
 Increase in spam calls or messages.
o Location Tracking Risks:
 Potential safety risks if real-time location data is misused.

 Legal Implications:
o Violation of Data Minimization Principle:
 Collecting more data than necessary for the app's function.
o Consent Issues:
 Users may not have been properly informed or may have felt compelled to consent.
o Possible Sanctions:
 The app developers could face penalties and be required to change their data collection
practices.
 Preventive Measures:
o For Users:
 Review app permissions before installation.
 Use privacy settings to restrict access to sensitive data.
o For Developers:
 Adhere to the principle of proportionality.
 Clearly communicate why each permission is necessary.
VI. Protecting Your Personal Data

A. Online Privacy Settings

 Explanation:
o Adjusting your online privacy settings is a fundamental step in controlling who has access to your
personal information.

 Action Steps:
o Review Privacy Settings Regularly:
 Periodically check the privacy settings on all your social media accounts, apps, and online
services.
 Platforms often update their settings or policies, which may affect your privacy.
o Limit Profile Visibility:
 Set your profiles to private so only approved friends or followers can see your information.
 Restrict what information is visible publicly, such as your email address, phone number, or
birthday.
o Control Post Audience:
 Use features that allow you to choose who can see each post or piece of content you share.
 Consider creating friend lists or groups to manage who sees what.
o Disable Location Sharing:
 Turn off location services for apps that don't require it.
 Avoid tagging your location in posts or photos unless necessary.
 Tips:
o Understand Default Settings:
 Be aware that default settings may not prioritize your privacy.
o Be Cautious with Third-Party Apps:
 Limit the permissions granted to apps, especially those that request access to your contacts,
messages, or other sensitive data.

B. Strong Passwords and Authentication

 Explanation:
o Strong passwords and additional authentication methods protect your accounts from unauthorized
access.
o
 Action Steps:
o Create Complex Passwords:
 Use a mix of uppercase and lowercase letters, numbers, and special characters.
 Avoid using easily guessable information like birthdays or common words.
o Unique Passwords for Each Account:
 Do not reuse passwords across multiple sites or services.
 This prevents a breach on one platform from compromising your other accounts.
o Use a Password Manager:
 Consider using reputable password manager software to generate and store complex
passwords securely.
o Enable Two-Factor Authentication (2FA):
 Activate 2FA on all accounts that offer it.
 This adds an extra layer of security by requiring a second verification step, such as a code sent
to your phone.

 Tips:
o Change Passwords Regularly:
 Update your passwords periodically, especially if you suspect any account compromise.
o Protect Your Password Manager:
 Ensure your master password is exceptionally strong and secure.

C. Be Cautious with Personal Information

 Explanation:
o Think carefully before sharing personal details online or with others.

 Action Steps:
o Limit Personal Data Sharing:
 Avoid posting sensitive information such as your full address, phone number, or financial
details on social media or public forums.
 Be wary of sharing personal stories or images that could be misused.
o Assess Information Requests:
 Question why certain information is being requested by apps, websites, or individuals.
 Provide only the minimum necessary data.
o Adjust Sharing Preferences:
 Use settings that allow you to control what personal data apps can access.
 Deny permissions that are not essential for the app's functionality.

 Tips:
o Beware of Oversharing:
 Even innocuous details can be pieced together to infringe on your privacy.
o Consider the Future Impact:
 Remember that content shared online can be difficult to remove and may have long-term
implications.

D. Recognize and Avoid Phishing Attempts

 Explanation:
o Phishing is a method used by cybercriminals to trick individuals into revealing personal information.

 Action Steps:
o Verify Sender Information:
 Check email addresses and sender details for authenticity.
 Be cautious with emails that have generic greetings like "Dear Customer."
o Do Not Click Suspicious Links:
 Hover over links to see the actual URL before clicking.
 Avoid downloading attachments from unknown or untrusted sources.
o Question Urgent Requests:
 Be skeptical of messages urging immediate action or threatening consequences.
 Legitimate organizations typically do not request sensitive information via email or text.
o Use Official Channels:
 If in doubt, contact the organization directly using official contact information from their website.

 Tips:
o Educate Yourself on Common Scams:
 Stay informed about the latest phishing techniques.
o Report Suspicious Activities:
 Inform your email provider or the relevant organization about phishing attempts.

F. Secure Your Devices

 Explanation:
o Protecting your devices helps safeguard the personal data stored on them.

 Action Steps:
o Install Antivirus and Anti-Malware Software:
 Use reputable security software to detect and remove threats.
o Keep Software Updated:
 Regularly update your operating system and applications to patch security vulnerabilities.
o Use Secure Networks:
 Avoid using public Wi-Fi for sensitive transactions.
 Consider using a Virtual Private Network (VPN) for an extra layer of security.
o Lock Your Devices:
 Use PINs, passwords, or biometric locks on smartphones, tablets, and computers.

 Tips:
o Backup Important Data:
 Regularly back up your data to a secure location.
o Be Cautious with Bluetooth and NFC:
 Turn off Bluetooth and Near Field Communication when not in use to prevent unauthorized
access.

G. Be Mindful of Social Engineering

 Explanation:
o Social engineering involves manipulating people into divulging confidential information.

 Action Steps:
o Question Unusual Requests:
 Be wary of unsolicited requests for help or information, even from people you know.
o Verify Identities:
 If someone claims to be from an organization, verify their identity through official channels
before providing information.
o Limit Sharing on Social Media:
 Avoid sharing information that could be used to answer security questions (e.g., mother's
maiden name, pet names).

 Tips:
o Stay Skeptical:
 Trust but verify when it comes to online interactions.
o Educate Yourself:
 Learn about common social engineering tactics to recognize and avoid them.

H. Regularly Monitor Your Accounts

 Explanation:
o Keeping an eye on your accounts can help you detect unauthorized activities early.

 Action Steps:
o Check Account Statements:
 Review bank and credit card statements for unfamiliar transactions.
o Review Account Activity:
 Periodically check login activity and device access on your online accounts.
o Set Up Alerts:
 Enable notifications for account logins, transactions, or changes to personal information.

 Tips:
o Act Quickly on Suspicious Activity:
 If you notice anything unusual, change your passwords and inform the relevant institution.

I. Educate Yourself and Others

 Explanation:
o Staying informed empowers you to protect your personal data effectively.

 Action Steps:
o Stay Updated:
 Follow reputable sources for the latest news on data privacy and security threats.
o Attend Workshops and Seminars:
 Participate in events focused on cybersecurity and data protection.
o Share Knowledge:
 Educate friends and family about data privacy best practices.
 Tips:
o Promote a Culture of Privacy:
 Encourage others to be mindful of their digital footprints.
o Advocate for Privacy Rights:
 Support policies and initiatives that strengthen data protection.

You might also like