SlideShare a Scribd company logo
Prepared by:
Montero, Vanessa M.
WORD SEARCH
Fully titled, “An Act Protecting Individual Personal Information
in Information and Communications Systems in the
Government and the Private Sector, Creating for this Purpose
a National Privacy Commission, and for Other Purposes” the
DPA aims to protect the fundamental human right of privacy,
of communication while ensuring the free flow of information
to promote innovation and growth.
Republic Act 10173 – Data Privacy Act of 2012
CHAPTER I – GENERAL PROVISIONS
SECTION 1. Short Title.
SECTION 2. Declaration of Policy.
SECTION 3. Definition of Terms.
SECTION 4. Scope.
SECTION 5. Protection Afforded to Journalists and Their Sources.
SECTION 6. Extraterritorial Application.
CHAPTER II – THE NATIONAL PRIVACY COMMISSION
SECTION 7. Functions of the National Privacy Commission.
SECTION 8. Confidentiality.
SECTION 9. Organizational Structure of the Commission.
SECTION 10. The Secretariat.
CHAPTER III – PROCESSING OF PERSONAL INFORMATION
SECTION 11. General Data Privacy Principles.
SECTION 12. Criteria for Lawful Processing of Personal Information.
SECTION 13. Sensitive Personal Information and Privileged Information.
SECTION 14. Subcontract of Personal Information.
SECTION 15. Extension of Privileged Communication.
CHAPTER IV – RIGHTS OF THE DATA SUBJECT
SECTION 16. Rights of the Data Subject.
SECTION 17. Transmissibility of Rights of the Data Subjects.
SECTION 18. Right to Data Portability.
SECTION 19. Non-Applicability.
CHAPTER V – SECURITY OF PERSONAL INFORMATION
SECTION 20. Security of Personal Information.
CHAPTER VI – ACCOUNTABILITY FOR TRANSFER OF PERSONAL INFORMATION
SECTION 21. Principle of Accountability.
CHAPTER VII – SECURITY OF SENSITIVE PERSONAL INFORMATION IN GOVERNMENT
SECTION 22. Responsibility of Heads of Agencies.
SECTION 23. Requirements Relating to Access by Agency Personnel to Sensitive Personal Information.
SECTION 24. Applicability to Government Contractors.
CHAPTER VIII – PENALTIES
SECTION 25. Unauthorized Processing of Personal Information and
Sensitive Personal Information.
SECTION 26. Accessing Personal Information and Sensitive Personal
Information Due to Negligence.
SECTION 27. Improper Disposal of Personal Information and Sensitive
Personal Information.
SECTION 28. Processing of Personal Information and Sensitive
Personal Information for Unauthorized Purposes.
SECTION 29. Unauthorized Access or Intentional Breach.
SECTION 30. Concealment of Security Breaches Involving Sensitive
Personal Information.
SECTION 31. Malicious Disclosure.
SECTION 32. Unauthorized Disclosure.
SECTION 33. Combination or Series of Acts.
SECTION 34. Extent of Liability.
SECTION 35. Large-Scale.
SECTION 36. Offense Committed by Public Officer.
SECTION 37. Restitution.
CHAPTER IX – MISCELLANEOUS PROVISIONS
SECTION 38. Interpretation.
SECTION 39. Implementing Rules and Regulations (IRR).
SECTION 40. Reports and Information.
SECTION 41. Appropriations Clause.
SECTION 42. Transitory Provision.
SECTION 43. Separability Clause.
SECTION 44. Repealing Clause.
SECTION 45. Effectivity Clause.
National Privacy Commission NPC
independent body mandated to implement the DPA
Personal information controller PIC
a natural or juridical person, or any other body who controls
the processing of personal data
Personal information processor PIP
a natural or juridical person, or any other body to whom a PIC
may outsource or instruct the processing of personal data
PI refers to any information from which the identity of an individual
is apparent or can be reasonably and directly ascertained, or when put
together with other information would directly and certainly identify an
individual
CRITERIA FOR LAWFUL PROCESSING OF PI
• Consent
• Contract with the individual
• Vital interests/Life & health
• Legal obligation
• National emergency / public order & safety, as prescribed by law
• Constitutional or statutory mandate of a public authority
• Legitimate interests of the PIC or third parties
• Race • Ethnic origin
• Marital status • Age
• Color • Religious, philosophical or political affiliations
• Health, education, genetic or sexual life
• Proceeding for any offense committed or alleged to have been committed by an
individual
• Government-issued IDs
• Those established by an executive order or an act of Congress to be kept classified
CRITERIA FOR LAWFUL PROCESSING OF SPI
• Consent • Existing laws & regulations
• Life & health • Processing by non-stock, non-profit orgs
• Medical treatment • Lawful rights & interests in court proceedings/legal claims
STATEMENT OF PRIVACY COMMISSIONER JOHN HENRY NAGA
ON SELFIE VERIFICATION IN SIM CARD REGISTRATION
December 29, 2022 | 4:40 PM GMT+0800 Last Edit: December 29, 2022
In performing their responsibilities under the Subscriber Identity Module (SIM) Card
Registration Act, Public Telecommunications Entities (PTEs) are reminded of their obligation
to process our citizens’ personal data in accordance with the Data Privacy Act of 2012.
Thus, as an additional layer of protection against fraud and identity theft, the processing
involved in selfie verification should pass the general data privacy principles of transparency,
legitimate purpose, proportionality, and all other data privacy safeguards in the law.
Ensuring the privacy of our registrants is paramount to instilling trust in the full
implementation of the SIM Card Registration Act. This will be bolstered if PTEs can
guarantee that all the data in their possession are protected against misuse, unauthorized
processing, data breaches, and all other security incidents.
ATTY. JOHN HENRY D. NAGA
Privacy Commissioner
Malicious third parties may infiltrate data and documents
that you and your employees create, access, store, or share
across your organization. When third parties gain access to your
private information, you’re at risk of data loss, reputational
damage, and regulatory fines.
#1 Insufficient Data Privacy Plans
#2 Data Trading
#3 Location Tracking
#4 Dangers of Additional Devices
#5 Insufficient Standard Operating Procedures
#6 Data Hoarding
Data privacy issues can be addressed with various solutions, some of which we’ve already briefly explored.
These include:
Bolster data privacy plans – To protect your digital assets thoroughly, review your current procedures
and software, identify coverage gaps, and build a system that can scale as you create more data.
Monitor data trading – Prevent data trading by reducing the likelihood of third-party data access—
consider software-based solutions and internal procedures.
Disable location tracking – Disable location services on devices company-wide to prevent data leaks and
competitor access.
Reduce devices – Limit the number of devices that can access your data and restrict employee access to
company assets via personal devices.
Create sufficient SOPs – Determine the vulnerabilities in your internal procedures, create new SOPs, and
train your employees to follow them.
Avoid data hoarding – Perform regular purges of outdated digital documents, opting for hard copies in
secure storage when necessary.
Student privacy is not the most discussed topic on education boards and forums. Parents and students
themselves are taking action to protect their data and encourage all school communities to take this matter
more seriously.
While students are using school computers and networks for educational purposes, it can often leave their
data exposed to security risks. The educational system must include rules and regulations for proper
student data management. Avoiding personal data exploitation is essential in all school grades.
Digital devices and similar tools can enhance students’ experience during their educational journey.
However, the use of smart devices in classrooms and on school premises can have negative consequences.
While most teachers are concerned about students being distracted by phones and laptops, few think about
data privacy. Students are exposed to common security risks each time they log into school computers or
use the school’s public WiFi.
Principles for the Protection of Student Privacy
There are five crucial principles to improve student privacy protections in schools and allow parents to
control their children’s data. These principles include the following:
Transparency – According to this principle, parents must be notified if their child’s data is leaked or
exposed to any person or organization outside the school system. Each student data disclosure should be
properly labeled and announced.
No Commercial Uses – This principle ensures that the student’s data cannot be sold in any way or used
for marketing purposes. The students must not receive any advertising or targeted ads based on the data
revealed to the educational facility.
Security Protection – Educational facilities must implement security protocols to ensure full encryption
of all personal data as the minimum measure. These protection protocols must prioritize students’
personal data and passwords.
Parental Rights – The students’ parents must be allowed to see the school’s data collected from their
child. They also must have the right to delete it at any time or opt-out of further data collection.
Enforcement – Lastly, there should be laws that specify fines for schools and educational facilities that
fail to protect student’s data.
DATA-PRIVACY-ACT.pptx

More Related Content

What's hot

Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9
Ariel Martin Beliera
 
Lesson 1 - Technical Controls
Lesson 1 - Technical ControlsLesson 1 - Technical Controls
Lesson 1 - Technical Controls
MLG College of Learning, Inc
 
Data Classification Presentation
Data Classification PresentationData Classification Presentation
Data Classification PresentationDerroylo
 
General Data Protection Regulations (GDPR): Do you understand it and are you ...
General Data Protection Regulations (GDPR): Do you understand it and are you ...General Data Protection Regulations (GDPR): Do you understand it and are you ...
General Data Protection Regulations (GDPR): Do you understand it and are you ...
Cvent
 
18 Tips for Data Classification - Data Sheet by Secure Islands
18 Tips for Data Classification - Data Sheet by Secure Islands18 Tips for Data Classification - Data Sheet by Secure Islands
18 Tips for Data Classification - Data Sheet by Secure Islands
Secure Islands - Data Security Policy
 
Project plan for ISO 27001
Project plan for ISO 27001Project plan for ISO 27001
Project plan for ISO 27001
technakama
 
Data Protection: An Approach to Privacy
Data Protection: An Approach to PrivacyData Protection: An Approach to Privacy
Data Protection: An Approach to Privacy
Symptai Consulting Limited
 
GDPR: Training Materials by Qualsys
GDPR: Training Materials  by QualsysGDPR: Training Materials  by Qualsys
GDPR: Training Materials by Qualsys
Qualsys Ltd
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
Reza Kopaee
 
Implikasi UU PDP terhadap Tata Kelola Data Sektor Kesehatan - Rangkuman UU Pe...
Implikasi UU PDP terhadap Tata Kelola Data Sektor Kesehatan - Rangkuman UU Pe...Implikasi UU PDP terhadap Tata Kelola Data Sektor Kesehatan - Rangkuman UU Pe...
Implikasi UU PDP terhadap Tata Kelola Data Sektor Kesehatan - Rangkuman UU Pe...
Eryk Budi Pratama
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
dj1arry
 
Enabling Data Governance - Data Trust, Data Ethics, Data Quality
Enabling Data Governance - Data Trust, Data Ethics, Data QualityEnabling Data Governance - Data Trust, Data Ethics, Data Quality
Enabling Data Governance - Data Trust, Data Ethics, Data Quality
Eryk Budi Pratama
 
Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)
Iftikhar Ali Iqbal
 
GDPR and ISO 27001 - how to be compliant
GDPR and ISO 27001 - how to be compliantGDPR and ISO 27001 - how to be compliant
GDPR and ISO 27001 - how to be compliant
Ilesh Dattani
 
Iso 27001
Iso 27001Iso 27001
Iso 27001
Adam Miller
 
Top 10 Best Practices for Implementing Data Classification
Top 10 Best Practices for Implementing Data ClassificationTop 10 Best Practices for Implementing Data Classification
Top 10 Best Practices for Implementing Data Classification
Watchful Software
 
Lesson 3
Lesson 3Lesson 3
Presentation on GDPR
Presentation on GDPRPresentation on GDPR
Presentation on GDPR
DipanjanDey12
 
Data Processing - data privacy and sensitive data
Data Processing - data privacy and sensitive dataData Processing - data privacy and sensitive data
Data Processing - data privacy and sensitive data
OpenAIRE
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Edureka!
 

What's hot (20)

Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9
 
Lesson 1 - Technical Controls
Lesson 1 - Technical ControlsLesson 1 - Technical Controls
Lesson 1 - Technical Controls
 
Data Classification Presentation
Data Classification PresentationData Classification Presentation
Data Classification Presentation
 
General Data Protection Regulations (GDPR): Do you understand it and are you ...
General Data Protection Regulations (GDPR): Do you understand it and are you ...General Data Protection Regulations (GDPR): Do you understand it and are you ...
General Data Protection Regulations (GDPR): Do you understand it and are you ...
 
18 Tips for Data Classification - Data Sheet by Secure Islands
18 Tips for Data Classification - Data Sheet by Secure Islands18 Tips for Data Classification - Data Sheet by Secure Islands
18 Tips for Data Classification - Data Sheet by Secure Islands
 
Project plan for ISO 27001
Project plan for ISO 27001Project plan for ISO 27001
Project plan for ISO 27001
 
Data Protection: An Approach to Privacy
Data Protection: An Approach to PrivacyData Protection: An Approach to Privacy
Data Protection: An Approach to Privacy
 
GDPR: Training Materials by Qualsys
GDPR: Training Materials  by QualsysGDPR: Training Materials  by Qualsys
GDPR: Training Materials by Qualsys
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
 
Implikasi UU PDP terhadap Tata Kelola Data Sektor Kesehatan - Rangkuman UU Pe...
Implikasi UU PDP terhadap Tata Kelola Data Sektor Kesehatan - Rangkuman UU Pe...Implikasi UU PDP terhadap Tata Kelola Data Sektor Kesehatan - Rangkuman UU Pe...
Implikasi UU PDP terhadap Tata Kelola Data Sektor Kesehatan - Rangkuman UU Pe...
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
 
Enabling Data Governance - Data Trust, Data Ethics, Data Quality
Enabling Data Governance - Data Trust, Data Ethics, Data QualityEnabling Data Governance - Data Trust, Data Ethics, Data Quality
Enabling Data Governance - Data Trust, Data Ethics, Data Quality
 
Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)
 
GDPR and ISO 27001 - how to be compliant
GDPR and ISO 27001 - how to be compliantGDPR and ISO 27001 - how to be compliant
GDPR and ISO 27001 - how to be compliant
 
Iso 27001
Iso 27001Iso 27001
Iso 27001
 
Top 10 Best Practices for Implementing Data Classification
Top 10 Best Practices for Implementing Data ClassificationTop 10 Best Practices for Implementing Data Classification
Top 10 Best Practices for Implementing Data Classification
 
Lesson 3
Lesson 3Lesson 3
Lesson 3
 
Presentation on GDPR
Presentation on GDPRPresentation on GDPR
Presentation on GDPR
 
Data Processing - data privacy and sensitive data
Data Processing - data privacy and sensitive dataData Processing - data privacy and sensitive data
Data Processing - data privacy and sensitive data
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
 

Similar to DATA-PRIVACY-ACT.pptx

OVERVIEW OF NIGERIA DATA PROTECTION ACT 2014
OVERVIEW OF NIGERIA DATA PROTECTION ACT 2014OVERVIEW OF NIGERIA DATA PROTECTION ACT 2014
OVERVIEW OF NIGERIA DATA PROTECTION ACT 2014
UsmanMAmeer
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
Tushar Rajput
 
Data privacy Legislation in India
Data privacy Legislation in IndiaData privacy Legislation in India
Data privacy Legislation in India
LATHA H C
 
Data Privacy Protection Competrency Guide by a Data Subject
Data Privacy Protection Competrency Guide by a Data SubjectData Privacy Protection Competrency Guide by a Data Subject
Data Privacy Protection Competrency Guide by a Data Subject
John Macasio
 
Final projet
Final  projetFinal  projet
Final projet
serge-parfait Goma
 
OVERVIEW OF DATA PROTECTION AND PRIVACY.pptx
OVERVIEW OF DATA PROTECTION AND PRIVACY.pptxOVERVIEW OF DATA PROTECTION AND PRIVACY.pptx
OVERVIEW OF DATA PROTECTION AND PRIVACY.pptx
UsmanMAmeer
 
New opportunities and business risks with evolving privacy regulations
New opportunities and business risks with evolving privacy regulationsNew opportunities and business risks with evolving privacy regulations
New opportunities and business risks with evolving privacy regulations
Ulf Mattsson
 
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Priyanka Aash
 
GDPR for Dummies
GDPR for DummiesGDPR for Dummies
GDPR for Dummies
Caroline Boscher
 
My presentation- Ala about privacy and GDPR
My presentation- Ala about privacy and GDPRMy presentation- Ala about privacy and GDPR
My presentation- Ala about privacy and GDPR
zayadeen2003
 
2018 01-25 Introduction to PCI and HIPAA Compliance
2018 01-25 Introduction to PCI and HIPAA Compliance 2018 01-25 Introduction to PCI and HIPAA Compliance
2018 01-25 Introduction to PCI and HIPAA Compliance
Raffa Learning Community
 
Mobileprivacyazahir
MobileprivacyazahirMobileprivacyazahir
Mobileprivacyazahir
Azahir Hifzalla
 
GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready? GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready?
SecurityScorecard
 
CSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentCSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local Government
Donald E. Hester
 
6102015 1 McGraw-Hill-Ryerson ©2015 The McGraw-Hill .docx
6102015 1 McGraw-Hill-Ryerson ©2015 The McGraw-Hill .docx6102015 1 McGraw-Hill-Ryerson ©2015 The McGraw-Hill .docx
6102015 1 McGraw-Hill-Ryerson ©2015 The McGraw-Hill .docx
evonnehoggarth79783
 
Data protection act
Data protection act Data protection act
Data protection act Iqbal Bocus
 
Data protection & security breakfast briefing master slides 28 june-final
Data protection & security breakfast briefing   master slides 28 june-finalData protection & security breakfast briefing   master slides 28 june-final
Data protection & security breakfast briefing master slides 28 june-final
Dr. Donald Macfarlane
 
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalData Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalDr. Donald Macfarlane
 
GDPR & digital strategy
GDPR & digital strategyGDPR & digital strategy
GDPR & digital strategy
Prof. Jacques Folon (Ph.D)
 
Privacy experience in Plone and other open source CMS
Privacy experience in Plone and other open source CMSPrivacy experience in Plone and other open source CMS
Privacy experience in Plone and other open source CMS
Interaktiv
 

Similar to DATA-PRIVACY-ACT.pptx (20)

OVERVIEW OF NIGERIA DATA PROTECTION ACT 2014
OVERVIEW OF NIGERIA DATA PROTECTION ACT 2014OVERVIEW OF NIGERIA DATA PROTECTION ACT 2014
OVERVIEW OF NIGERIA DATA PROTECTION ACT 2014
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 
Data privacy Legislation in India
Data privacy Legislation in IndiaData privacy Legislation in India
Data privacy Legislation in India
 
Data Privacy Protection Competrency Guide by a Data Subject
Data Privacy Protection Competrency Guide by a Data SubjectData Privacy Protection Competrency Guide by a Data Subject
Data Privacy Protection Competrency Guide by a Data Subject
 
Final projet
Final  projetFinal  projet
Final projet
 
OVERVIEW OF DATA PROTECTION AND PRIVACY.pptx
OVERVIEW OF DATA PROTECTION AND PRIVACY.pptxOVERVIEW OF DATA PROTECTION AND PRIVACY.pptx
OVERVIEW OF DATA PROTECTION AND PRIVACY.pptx
 
New opportunities and business risks with evolving privacy regulations
New opportunities and business risks with evolving privacy regulationsNew opportunities and business risks with evolving privacy regulations
New opportunities and business risks with evolving privacy regulations
 
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
 
GDPR for Dummies
GDPR for DummiesGDPR for Dummies
GDPR for Dummies
 
My presentation- Ala about privacy and GDPR
My presentation- Ala about privacy and GDPRMy presentation- Ala about privacy and GDPR
My presentation- Ala about privacy and GDPR
 
2018 01-25 Introduction to PCI and HIPAA Compliance
2018 01-25 Introduction to PCI and HIPAA Compliance 2018 01-25 Introduction to PCI and HIPAA Compliance
2018 01-25 Introduction to PCI and HIPAA Compliance
 
Mobileprivacyazahir
MobileprivacyazahirMobileprivacyazahir
Mobileprivacyazahir
 
GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready? GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready?
 
CSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentCSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local Government
 
6102015 1 McGraw-Hill-Ryerson ©2015 The McGraw-Hill .docx
6102015 1 McGraw-Hill-Ryerson ©2015 The McGraw-Hill .docx6102015 1 McGraw-Hill-Ryerson ©2015 The McGraw-Hill .docx
6102015 1 McGraw-Hill-Ryerson ©2015 The McGraw-Hill .docx
 
Data protection act
Data protection act Data protection act
Data protection act
 
Data protection & security breakfast briefing master slides 28 june-final
Data protection & security breakfast briefing   master slides 28 june-finalData protection & security breakfast briefing   master slides 28 june-final
Data protection & security breakfast briefing master slides 28 june-final
 
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalData Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
 
GDPR & digital strategy
GDPR & digital strategyGDPR & digital strategy
GDPR & digital strategy
 
Privacy experience in Plone and other open source CMS
Privacy experience in Plone and other open source CMSPrivacy experience in Plone and other open source CMS
Privacy experience in Plone and other open source CMS
 

Recently uploaded

Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)
Wendy Couture
 
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdfDaftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
akbarrasyid3
 
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptxHighlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
anjalidixit21
 
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
9ib5wiwt
 
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdfXYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
bhavenpr
 
The Reserve Bank of India Act, 1934.pptx
The Reserve Bank of India Act, 1934.pptxThe Reserve Bank of India Act, 1934.pptx
The Reserve Bank of India Act, 1934.pptx
nehatalele22st
 
Military Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
Military Commissions details LtCol Thomas Jasper as Detailed Defense CounselMilitary Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
Military Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
Thomas (Tom) Jasper
 
Abdul Hakim Shabazz Deposition Hearing in Federal Court
Abdul Hakim Shabazz Deposition Hearing in Federal CourtAbdul Hakim Shabazz Deposition Hearing in Federal Court
Abdul Hakim Shabazz Deposition Hearing in Federal Court
Gabe Whitley
 
new victimology of indonesian law. Pptx.
new victimology of indonesian law. Pptx.new victimology of indonesian law. Pptx.
new victimology of indonesian law. Pptx.
niputusriwidiasih
 
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
9ib5wiwt
 
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptxNATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
anvithaav
 
The Main Procedures for Obtaining Cypriot Citizenship
The Main Procedures for Obtaining Cypriot CitizenshipThe Main Procedures for Obtaining Cypriot Citizenship
The Main Procedures for Obtaining Cypriot Citizenship
BridgeWest.eu
 
ALL EYES ON RAFAH BUT WHY Explain more.pdf
ALL EYES ON RAFAH BUT WHY Explain more.pdfALL EYES ON RAFAH BUT WHY Explain more.pdf
ALL EYES ON RAFAH BUT WHY Explain more.pdf
46adnanshahzad
 
Secure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark TodaySecure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark Today
Trademark Quick
 
WINDING UP of COMPANY, Modes of Dissolution
WINDING UP of COMPANY, Modes of DissolutionWINDING UP of COMPANY, Modes of Dissolution
WINDING UP of COMPANY, Modes of Dissolution
KHURRAMWALI
 
Debt Mapping Camp bebas riba to know how much our debt
Debt Mapping Camp bebas riba to know how much our debtDebt Mapping Camp bebas riba to know how much our debt
Debt Mapping Camp bebas riba to know how much our debt
ssuser0576e4
 
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
Dr. Oliver Massmann
 
Notes-on-Prescription-Obligations-and-Contracts.doc
Notes-on-Prescription-Obligations-and-Contracts.docNotes-on-Prescription-Obligations-and-Contracts.doc
Notes-on-Prescription-Obligations-and-Contracts.doc
BRELGOSIMAT
 
Agrarian Reform Policies in the Philippines: a quiz
Agrarian Reform Policies in the Philippines: a quizAgrarian Reform Policies in the Philippines: a quiz
Agrarian Reform Policies in the Philippines: a quiz
gaelcabigunda
 
VAWA - Violence Against Women Act Presentation
VAWA - Violence Against Women Act PresentationVAWA - Violence Against Women Act Presentation
VAWA - Violence Against Women Act Presentation
FernandoSimesBlanco1
 

Recently uploaded (20)

Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)
 
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdfDaftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
 
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptxHighlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
 
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
 
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdfXYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
 
The Reserve Bank of India Act, 1934.pptx
The Reserve Bank of India Act, 1934.pptxThe Reserve Bank of India Act, 1934.pptx
The Reserve Bank of India Act, 1934.pptx
 
Military Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
Military Commissions details LtCol Thomas Jasper as Detailed Defense CounselMilitary Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
Military Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
 
Abdul Hakim Shabazz Deposition Hearing in Federal Court
Abdul Hakim Shabazz Deposition Hearing in Federal CourtAbdul Hakim Shabazz Deposition Hearing in Federal Court
Abdul Hakim Shabazz Deposition Hearing in Federal Court
 
new victimology of indonesian law. Pptx.
new victimology of indonesian law. Pptx.new victimology of indonesian law. Pptx.
new victimology of indonesian law. Pptx.
 
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
 
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptxNATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
 
The Main Procedures for Obtaining Cypriot Citizenship
The Main Procedures for Obtaining Cypriot CitizenshipThe Main Procedures for Obtaining Cypriot Citizenship
The Main Procedures for Obtaining Cypriot Citizenship
 
ALL EYES ON RAFAH BUT WHY Explain more.pdf
ALL EYES ON RAFAH BUT WHY Explain more.pdfALL EYES ON RAFAH BUT WHY Explain more.pdf
ALL EYES ON RAFAH BUT WHY Explain more.pdf
 
Secure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark TodaySecure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark Today
 
WINDING UP of COMPANY, Modes of Dissolution
WINDING UP of COMPANY, Modes of DissolutionWINDING UP of COMPANY, Modes of Dissolution
WINDING UP of COMPANY, Modes of Dissolution
 
Debt Mapping Camp bebas riba to know how much our debt
Debt Mapping Camp bebas riba to know how much our debtDebt Mapping Camp bebas riba to know how much our debt
Debt Mapping Camp bebas riba to know how much our debt
 
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
 
Notes-on-Prescription-Obligations-and-Contracts.doc
Notes-on-Prescription-Obligations-and-Contracts.docNotes-on-Prescription-Obligations-and-Contracts.doc
Notes-on-Prescription-Obligations-and-Contracts.doc
 
Agrarian Reform Policies in the Philippines: a quiz
Agrarian Reform Policies in the Philippines: a quizAgrarian Reform Policies in the Philippines: a quiz
Agrarian Reform Policies in the Philippines: a quiz
 
VAWA - Violence Against Women Act Presentation
VAWA - Violence Against Women Act PresentationVAWA - Violence Against Women Act Presentation
VAWA - Violence Against Women Act Presentation
 

DATA-PRIVACY-ACT.pptx

  • 3. Fully titled, “An Act Protecting Individual Personal Information in Information and Communications Systems in the Government and the Private Sector, Creating for this Purpose a National Privacy Commission, and for Other Purposes” the DPA aims to protect the fundamental human right of privacy, of communication while ensuring the free flow of information to promote innovation and growth. Republic Act 10173 – Data Privacy Act of 2012
  • 4. CHAPTER I – GENERAL PROVISIONS SECTION 1. Short Title. SECTION 2. Declaration of Policy. SECTION 3. Definition of Terms. SECTION 4. Scope. SECTION 5. Protection Afforded to Journalists and Their Sources. SECTION 6. Extraterritorial Application. CHAPTER II – THE NATIONAL PRIVACY COMMISSION SECTION 7. Functions of the National Privacy Commission. SECTION 8. Confidentiality. SECTION 9. Organizational Structure of the Commission. SECTION 10. The Secretariat.
  • 5. CHAPTER III – PROCESSING OF PERSONAL INFORMATION SECTION 11. General Data Privacy Principles. SECTION 12. Criteria for Lawful Processing of Personal Information. SECTION 13. Sensitive Personal Information and Privileged Information. SECTION 14. Subcontract of Personal Information. SECTION 15. Extension of Privileged Communication. CHAPTER IV – RIGHTS OF THE DATA SUBJECT SECTION 16. Rights of the Data Subject. SECTION 17. Transmissibility of Rights of the Data Subjects. SECTION 18. Right to Data Portability. SECTION 19. Non-Applicability. CHAPTER V – SECURITY OF PERSONAL INFORMATION SECTION 20. Security of Personal Information. CHAPTER VI – ACCOUNTABILITY FOR TRANSFER OF PERSONAL INFORMATION SECTION 21. Principle of Accountability. CHAPTER VII – SECURITY OF SENSITIVE PERSONAL INFORMATION IN GOVERNMENT SECTION 22. Responsibility of Heads of Agencies. SECTION 23. Requirements Relating to Access by Agency Personnel to Sensitive Personal Information. SECTION 24. Applicability to Government Contractors.
  • 6. CHAPTER VIII – PENALTIES SECTION 25. Unauthorized Processing of Personal Information and Sensitive Personal Information. SECTION 26. Accessing Personal Information and Sensitive Personal Information Due to Negligence. SECTION 27. Improper Disposal of Personal Information and Sensitive Personal Information. SECTION 28. Processing of Personal Information and Sensitive Personal Information for Unauthorized Purposes. SECTION 29. Unauthorized Access or Intentional Breach. SECTION 30. Concealment of Security Breaches Involving Sensitive Personal Information. SECTION 31. Malicious Disclosure. SECTION 32. Unauthorized Disclosure. SECTION 33. Combination or Series of Acts. SECTION 34. Extent of Liability. SECTION 35. Large-Scale. SECTION 36. Offense Committed by Public Officer. SECTION 37. Restitution.
  • 7. CHAPTER IX – MISCELLANEOUS PROVISIONS SECTION 38. Interpretation. SECTION 39. Implementing Rules and Regulations (IRR). SECTION 40. Reports and Information. SECTION 41. Appropriations Clause. SECTION 42. Transitory Provision. SECTION 43. Separability Clause. SECTION 44. Repealing Clause. SECTION 45. Effectivity Clause.
  • 8.
  • 9. National Privacy Commission NPC independent body mandated to implement the DPA Personal information controller PIC a natural or juridical person, or any other body who controls the processing of personal data Personal information processor PIP a natural or juridical person, or any other body to whom a PIC may outsource or instruct the processing of personal data
  • 10. PI refers to any information from which the identity of an individual is apparent or can be reasonably and directly ascertained, or when put together with other information would directly and certainly identify an individual CRITERIA FOR LAWFUL PROCESSING OF PI • Consent • Contract with the individual • Vital interests/Life & health • Legal obligation • National emergency / public order & safety, as prescribed by law • Constitutional or statutory mandate of a public authority • Legitimate interests of the PIC or third parties
  • 11. • Race • Ethnic origin • Marital status • Age • Color • Religious, philosophical or political affiliations • Health, education, genetic or sexual life • Proceeding for any offense committed or alleged to have been committed by an individual • Government-issued IDs • Those established by an executive order or an act of Congress to be kept classified CRITERIA FOR LAWFUL PROCESSING OF SPI • Consent • Existing laws & regulations • Life & health • Processing by non-stock, non-profit orgs • Medical treatment • Lawful rights & interests in court proceedings/legal claims
  • 12.
  • 13.
  • 14.
  • 15. STATEMENT OF PRIVACY COMMISSIONER JOHN HENRY NAGA ON SELFIE VERIFICATION IN SIM CARD REGISTRATION December 29, 2022 | 4:40 PM GMT+0800 Last Edit: December 29, 2022 In performing their responsibilities under the Subscriber Identity Module (SIM) Card Registration Act, Public Telecommunications Entities (PTEs) are reminded of their obligation to process our citizens’ personal data in accordance with the Data Privacy Act of 2012. Thus, as an additional layer of protection against fraud and identity theft, the processing involved in selfie verification should pass the general data privacy principles of transparency, legitimate purpose, proportionality, and all other data privacy safeguards in the law. Ensuring the privacy of our registrants is paramount to instilling trust in the full implementation of the SIM Card Registration Act. This will be bolstered if PTEs can guarantee that all the data in their possession are protected against misuse, unauthorized processing, data breaches, and all other security incidents. ATTY. JOHN HENRY D. NAGA Privacy Commissioner
  • 16. Malicious third parties may infiltrate data and documents that you and your employees create, access, store, or share across your organization. When third parties gain access to your private information, you’re at risk of data loss, reputational damage, and regulatory fines. #1 Insufficient Data Privacy Plans #2 Data Trading #3 Location Tracking #4 Dangers of Additional Devices #5 Insufficient Standard Operating Procedures #6 Data Hoarding
  • 17. Data privacy issues can be addressed with various solutions, some of which we’ve already briefly explored. These include: Bolster data privacy plans – To protect your digital assets thoroughly, review your current procedures and software, identify coverage gaps, and build a system that can scale as you create more data. Monitor data trading – Prevent data trading by reducing the likelihood of third-party data access— consider software-based solutions and internal procedures. Disable location tracking – Disable location services on devices company-wide to prevent data leaks and competitor access. Reduce devices – Limit the number of devices that can access your data and restrict employee access to company assets via personal devices. Create sufficient SOPs – Determine the vulnerabilities in your internal procedures, create new SOPs, and train your employees to follow them. Avoid data hoarding – Perform regular purges of outdated digital documents, opting for hard copies in secure storage when necessary.
  • 18. Student privacy is not the most discussed topic on education boards and forums. Parents and students themselves are taking action to protect their data and encourage all school communities to take this matter more seriously. While students are using school computers and networks for educational purposes, it can often leave their data exposed to security risks. The educational system must include rules and regulations for proper student data management. Avoiding personal data exploitation is essential in all school grades. Digital devices and similar tools can enhance students’ experience during their educational journey. However, the use of smart devices in classrooms and on school premises can have negative consequences. While most teachers are concerned about students being distracted by phones and laptops, few think about data privacy. Students are exposed to common security risks each time they log into school computers or use the school’s public WiFi.
  • 19. Principles for the Protection of Student Privacy There are five crucial principles to improve student privacy protections in schools and allow parents to control their children’s data. These principles include the following: Transparency – According to this principle, parents must be notified if their child’s data is leaked or exposed to any person or organization outside the school system. Each student data disclosure should be properly labeled and announced. No Commercial Uses – This principle ensures that the student’s data cannot be sold in any way or used for marketing purposes. The students must not receive any advertising or targeted ads based on the data revealed to the educational facility. Security Protection – Educational facilities must implement security protocols to ensure full encryption of all personal data as the minimum measure. These protection protocols must prioritize students’ personal data and passwords. Parental Rights – The students’ parents must be allowed to see the school’s data collected from their child. They also must have the right to delete it at any time or opt-out of further data collection. Enforcement – Lastly, there should be laws that specify fines for schools and educational facilities that fail to protect student’s data.