M3L3: Data Privacy Act of 2012

0.0(0)
studied byStudied by 14 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/36

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

37 Terms

1
New cards

Republic Act 10173

Data Privacy Act of 2012

2
New cards

SECTION 1. Short Title.

“Data Privacy Act of 2012” or Republic Act 10173

An Act protecting individual personal information in information and communications systems in the government and the private sector, creating for this purpose a national privacy commission, and for other purposes

3
New cards

SECTION 2. Declaration of Policy.

“Data Privacy Act of 2012” or Republic Act 10173

It is the policy of the State to protect the fundamental human right of privacy, of communication while ensuring free flow of information to promote innovation and growth. The State recognizes the vital role of information and communications technology in nation-building and its inherent obligation to ensure that personal information in information and communications systems in the government and in the private sector are secured and protected.

4
New cards

SECTION 4. Scope of DPA

“Data Privacy Act of 2012” or Republic Act 10173

The DPA applies to the processing of all types of personal information and to any natural and juridical person, in the country and even abroad, subject to certain qualifications.

5
New cards

The National Privacy Commission

A commission created by this act which is mandated to administer and implement this law

6
New cards

SECTION 7. Functions of the National Privacy Commission

The National Privacy Commission

  • To administer and implement the provisions of this Act,

  • To monitor and ensure compliance of the country with international standards set for data protection

  • Rule-making, advisory, public education, investigations and complaints, and enforcement

7
New cards

Data Subjects

(Data Privacy Act: Key Roles) Refers to an individual whose, sensitive, personal, or privileged information is processed personal

8
New cards

Personal Information Controller (PIC)

(Data Privacy Act: Key Roles) Controls the processing of personal data, or instructs another to process personal data on its behalf.

9
New cards

Personal Information Processor (PIP)

(Data Privacy Act: Key Roles) Organization or individual whom a personal information controller may outsource or instruct the processing of personal data pertaining to a data subject

10
New cards

Data Protection Officer (DPO)

(Data Privacy Act: Key Roles) Responsible for the overall management of compliance to DPA

11
New cards

National Privacy Commission

(Data Privacy Act: Key Roles) Independent body mandated to administer and implement the DPA of 2012, and to monitor and ensure compliance of the country with international standards set for personal data protection

12
New cards
  1. Right to be informed

  2. Right to object

  3. Right to access

  4. Right to data portability

  5. Right to correct (rectification)

  6. Right to file a complaint

  7. Right to damages

  8. Right to erasure or blocking

  9. Transmissibility of Rights

Rights of the Data Subject (9)

13
New cards

Right to erasure or blocking

(Rights of the Data Subject) "The data subject shall have the right to suspend, withdraw or order the blocking, removal or destruction of his or her personal data from the personal information controller’s filing system." (DPA of 2012, IRR Sec. 34)

14
New cards

Transmissibility of Rights

(Rights of the Data Subject) "The lawful heirs and assigns of the data subject may invoke the rights of the data subject to which he or she is an heir or an assignee, at any time after the death of the data subject, or when the data subject is incapacitated or incapable of exercising the rights" (DPA of 2012, IRR Sec. 35)

15
New cards
<p>(view image)</p>

(view image)

Classification of Personally Identifiable Information (view image)

<p>Classification of Personally Identifiable Information (view image)</p>
16
New cards
17
New cards
18
New cards
19
New cards
<p>(view image)</p>

(view image)

Potential Breaches and Security Incidents Involving Personal Information (view image)

<p>Potential Breaches and Security Incidents Involving Personal Information (view image)</p>
20
New cards
<p>(view image)</p>

(view image)

Access Control and Security Policy (view image)

<p>Access Control and Security Policy (view image)</p>
21
New cards

Pillar 1: Appointment of Data Protection Officer (DPO)

(NPC’s Pillars of Compliance) Mandated by the NPC through the implementation of the Republic Act No. 10173 (Data Privacy Act of 2012)

22
New cards

Pillar 1: Appointment of Data Protection Officer (DPO)

(NPC’s Pillars of Compliance) A Data Protection Officer (DPO) is required to be appointed by the organization to ensure the protection of your personal data collection and processing.

23
New cards

Pillar 1: Appointment of Data Protection Officer (DPO)

(NPC’s Pillars of Compliance) A DPO is beneficial to your company due to the fact that all companies in the Philippines are now being mandated to comply with the said law.

24
New cards

Pillar 2: Conduct A Privacy Impact Assessment (PIA)

(NPC’s Pillars of Compliance) A Privacy Impact Assessment or PIA is a process used to assess and manage privacy impacts in planned or existing systems technology, programs, processes or activities.

25
New cards

Pillar 2: Conduct A Privacy Impact Assessment (PIA)

(NPC’s Pillars of Compliance) It is a tool for identifying and assessing privacy risks throughout the development life cycle of a program or system.

26
New cards

Pillar 2: Conduct A Privacy Impact Assessment (PIA)

(NPC’s Pillars of Compliance) A PIA states what personally identifiable information (PII) is collected and explains how that information is maintained, how it will be protected and how it will be shared.

27
New cards

Pillar 3: Write your Privacy Management Program and Privacy Manual

(NPC’s Pillars of Compliance) A PMP is a holistic approach to privacy and data security protection, important for all agencies, companies or other organization involved in processing of personal data.

28
New cards

Pillar 3: Write your Privacy Management Program and Privacy Manual

(NPC’s Pillars of Compliance) The PMP will reduce the risks of privacy breaches its impact to the organization. Effective implementation of the PMP will help you in identifying the root cause of the problems in relation to data privacy.

29
New cards

Pillar 4: Implement your Privacy Data Protection Measure

(NPC’s Pillars of Compliance) Implement your Privacy Data Protection (PDP) measures

30
New cards

Pillar 4: Implement your Privacy Data Protection Measure

(NPC’s Pillars of Compliance) Implementing data privacy governance to carry out identified security measures.

31
New cards

Pillar 5: Regularly Exercise your Breach Reporting Procedure

(NPC’s Pillars of Compliance) The Commission and affected data subjects shall be notified by the PIC within seventy-two (72) hours upon knowledge of, or when there is reasonable belief by the personal information controllers (PIC) or personal information processors (PIP) that, a personal data breach requiring notification has occurred.

32
New cards

Pillar 5: Regularly Exercise your Breach Reporting Procedure

(NPC’s Pillars of Compliance) There should be training and simulations, not just with the technical team but also with the data process owners.

33
New cards

Availability Breach

(NPC’s Pillars of Compliance: Types of Breach) Due to loss, accidental or unlawful destruction of personal data

34
New cards

Confidentiality Breach

(NPC’s Pillars of Compliance: Types of Breach) Due to the unauthorized disclosure of, or access to, personal data

35
New cards

Integrity Breach

(NPC’s Pillars of Compliance: Types of Breach) Due to alteration of personal data

36
New cards

Unlawful Processing/Violation of Privacy

(NPC’s Pillars of Compliance: Types of Breach) Unauthorized processing, processing for unauthorized purposes, violation of privacy rights

37
New cards
<p>(view image)</p>

(view image)

Nurses Guidelines to Avoid Data Breach (view image)

<p>Nurses Guidelines to Avoid Data Breach (view image)</p>