Implementing Rules and Regulations of Republic Act No. 10173, Known As The "Data Privacy Act of 2012"
Implementing Rules and Regulations of Republic Act No. 10173, Known As The "Data Privacy Act of 2012"
Implementing Rules and Regulations of Republic Act No. 10173, Known As The "Data Privacy Act of 2012"
Section 1. Title. These rules and regulations shall be known as the “Implementing
Rules and Regulations of the Data Privacy Act of 2012”, or the “Rules”.
Section 2. Policy. These Rules further enforce the Data Privacy Act and adopt
generally accepted international principles and standards for personal data protection.
They safeguard the fundamental human right of every individual to privacy while
ensuring free flow of information for innovation, growth, and national development.
These Rules also recognize the vital role of information and communications technology
in nation-building and enforce the State’s inherent obligation to ensure that personal
data in information and communications systems in the government and in the private
sector are secured and protected.
Section 3. Definitions. Whenever used in these Rules, the following terms shall have
the respective meanings hereafter set forth: “Act” refers to Republic Act No. 10173,
also known as the Data Privacy Act of 2012; cralawlawlibrary
“Consent of the data subject” refers to any freely given, specific, informed indication of
will, whereby the data subject agrees to the collection and processing of his or her
personal, sensitive personal, or privileged information. Consent shall be evidenced by
written, electronic or recorded means. It may also be given on behalf of a data subject
by a lawful representative or an agent specifically authorized by the data subject to do
so;cralawlawlibrary
“Data processing systems” refers to the structure and procedure by which personal
data is collected and further processed in an information and communications system
or relevant filing system, including the purpose and intended output of the processing; cralawlawlibrary
“Data sharing” is the disclosure or transfer to a third party of personal data under the
custody of a personal information controller or personal information processor. In the
case of the latter, such disclosure or transfer must have been upon the instructions of
the personal information controller concerned. The term excludes outsourcing, or the
disclosure or transfer of personal data by a personal information controller to a
personal information processor; cralawlawlibrary
“Filing system” refers to any set of information relating to natural or juridical persons to
the extent that, although the information is not processed by equipment operating
automatically in response to instructions given for that purpose, the set is structured,
either by reference to individuals or by reference to criteria relating to individuals, in
such a way that specific information relating to a particular individual is readily
accessible; cralawlawlibrary
A natural or juridical person, or any other body, who performs such functions as
instructed by another person or organization; or
A natural person who processes personal data in connection with his or her personal,
family, or household affairs; cralawlawlibrary
There is control if the natural or juridical person or any other body decides on what
information is collected, or the purpose or extent of its processing; cralawlawlibrary
“Personal information processor” refers to any natural or juridical person or any other
body to whom a personal information controller may outsource or instruct the
processing of personal data pertaining to a data subject; cralawlawlibrary
“Processing” refers to any operation or any set of operations performed upon personal
data including, but not limited to, the collection, recording, organization, storage,
updating or modification, retrieval, consultation, use, consolidation, blocking, erasure
or destruction of data. Processing may be performed through automated means, or
manual processing, if the personal data are contained or are intended to be contained
in a filing system; cralawlawlibrary
“Profiling” refers to any form of automated processing of personal data consisting of the
use of personal data to evaluate certain personal aspects relating to a natural person,
in particular to analyze or predict aspects concerning that natural person's performance
at work, economic situation, health, personal preferences, interests, reliability,
behavior, location or movements; cralawlawlibrary
“Privileged information” refers to any and all forms of data, which, under the Rules of
Court and other pertinent laws constitute privileged communication; cralawlawlibrary
“Public authority” refers to any government entity created by the Constitution or law,
and vested with law enforcement or regulatory authority and functions; cralawlawlibrary
“Security incident” is an event or occurrence that affects or tends to affect data
protection, or may compromise the availability, integrity and confidentiality of personal
data. It includes incidents that would result to a personal data breach, if not for
safeguards that have been put in place; cralawlawlibrary
About an individual’s race, ethnic origin, marital status, age, color, and religious,
philosophical or political affiliations; cralawlawlibrary
Section 4. Scope. The Act and these Rules apply to the processing of personal data
by any natural and juridical person in the government or private sector. They apply to
an act done or practice engaged in and outside of the Philippines if: The natural or
juridical person involved in the processing of personal data is found or established in
the Philippines; cralawlawlibrary
The act, practice or processing relates to personal data about a Philippine citizen or
Philippine resident; cralawlawlibrary
The act, practice or processing of personal data is done or engaged in by an entity with
links to the Philippines, with due consideration to international law and comity, such as,
but not limited to, the following: Use of equipment located in the country, or maintains
an office, branch or agency in the Philippines for processing of personal data; A
contract is entered in the Philippines; A juridical entity unincorporated in the Philippines
but has central management and control in the country; An entity that has a branch,
agency, office or subsidiary in the Philippines and the parent or affiliate of the Philippine
entity has access to personal data; An entity that carries on business in the Philippines;
An entity that collects or holds personal data in the Philippines. Section 5. Special
Cases. The Act and these Rules shall not apply to the following specified information,
only to the minimum extent of collection, access, use, disclosure or other processing
necessary to the purpose, function, or activity concerned: Information processed for
purpose of allowing public access to information that fall within matters of public
concern, pertaining to: ChanRoblesVirtualawlibrary
Personal information that will be processed for research purpose, intended for a public
benefit, subject to the requirements of applicable laws, regulations, or ethical
standards; cralawlawlibrary
Information necessary for banks, other financial institutions under the jurisdiction of
the independent, central monetary authority or Bangko Sentral ng Pilipinas, and other
bodies authorized by law, to the extent necessary to comply with Republic Act No. 9510
(CISA), Republic Act No. 9160, as amended, otherwise known as the Anti-Money
Laundering Act, and other applicable laws; cralawlawlibrary
The burden of proving that the Act and these Rules are not applicable to a particular
information falls on those involved in the processing of personal data or the party
claiming the non-applicability.
In all cases, the determination of any exemption shall be liberally interpreted in favor of
the rights and interests of the data subject. Section 7. Protection Afforded to
Journalists and their Sources. Publishers, editors, or duly accredited reporters of
any newspaper, magazine or periodical of general circulation shall not be compelled to
reveal the source of any news report or information appearing in said publication if it
was related in any confidence to such publisher, editor, or reporter.
Publishers, editors, or duly accredited reporters who are likewise personal information
controllers or personal information processors within the meaning of the law are still
bound to follow the Data Privacy Act and related issuances with regard to the
processing of personal data, upholding rights of their data subjects and maintaining
compliance with other provisions that are not incompatible with the protection provided
by Republic Act No. 53.
Rule III. National Privacy Commission
Section 9. Functions. The National Privacy Commission shall have the following
functions: Rule Making. The Commission shall develop, promulgate, review or amend
rules and regulations for the effective implementation of the Act. This
includes: Recommending organizational, physical and technical security measures for
personal data protection, encryption, and access to sensitive personal information
maintained by government agencies, considering the most appropriate standard
recognized by the information and communications technology industry, as may be
necessary; cralawlawlibrary
Specifying electronic format and technical standards, modalities and procedures for
data portability, as may be necessary; cralawlawlibrary
Issuing guidelines for organizational, physical, and technical security measures for
personal data protection, taking into account the nature of the personal data to be
protected, the risks presented by the processing, the size of the organization and
complexity of its operations, current data privacy best practices, cost of security
implementation, and the most appropriate standard recognized by the information and
communications technology industry, as may be necessary; cralawlawlibrary
Ensuring proper and effective coordination with data privacy regulators in other
countries and private accountability agents; cralawlawlibrary
Publishing a compilation of agency system of records and notices, including index and
other finding aids; cralawlawlibrary
Coordinating with other government agencies and the private sector on efforts to
formulate and implement plans and policies to strengthen the protection of personal
data in the country;
Compliance and Monitoring. The Commission shall perform compliance and monitoring
functions to ensure effective implementation of the Act, these Rules, and other
issuances. This includes: ChanRoblesVirtualawlibrary
Negotiating and contracting with other data privacy authorities of other countries for
cross-border application and implementation of respective privacy laws; cralawlawlibrary
Managing the registration of personal data processing systems in the country, including
the personal data processing system of contractors and their employees entering into
contracts with government agencies that involves accessing or requiring sensitive
personal information of at least one thousand (1,000) individuals.
Complaints and Investigations. The Commission shall adjudicate on complaints and
investigations on matters affecting personal data: Provided, that In resolving any
complaint or investigation, except where amicable settlement is reached by the parties,
the Commission shall act as a collegial body. This includes: ChanRoblesVirtualawlibrary
Receiving complaints and instituting investigations regarding violations of the Act, these
Rules, and other issuances of the Commission, including violations of the rights of data
subjects and other matters affecting personal data; cralawlawlibrary
Awarding indemnity on matters affecting any personal data, or rights of data subjects; cralawlawlibrary
Issuing cease and desist orders, or imposing a temporary or permanent ban on the
processing of personal data, upon finding that the processing will be detrimental to
national security or public interest, or if it is necessary to preserve and protect the
rights of data subjects;cralawlawlibrary
Imposing administrative fines for violations of the Act, these Rules, and other issuances
of the Commission.
Other functions. The Commission shall exercise such other functions as may be
necessary to fulfill its mandate under the Act. Section 10. Administrative
Issuances. The Commission shall publish or issue official directives and administrative
issuances, orders, and circulars, which include: Rules of procedure in the exercise of its
quasi-judicial functions, subject to the suppletory application of the Rules of Court; cralawlawlibrary
Schedule of administrative fines and penalties for violations of the Act, these Rules, and
issuances or Orders of the Commission, including the applicable fees for its
administrative services and filing fees;cralawlawlibrary
The Commission shall be headed by a Privacy Commissioner, who shall act as Chairman
of the Commission. The Privacy Commissioner must be at least thirty-five (35) years of
age and of good moral character, unquestionable integrity and known probity, and a
recognized expert in the field of information technology and data privacy. The Privacy
Commissioner shall enjoy the benefits, privileges, and emoluments equivalent to the
rank of Secretary.
The Privacy Commissioner shall be assisted by two (2) Deputy Privacy Commissioners.
One shall be responsible for Data Processing Systems, while the other shall be
responsible for Policies and Planning. The Deputy Privacy Commissioners must be
recognized experts in the field of information and communications technology and data
privacy. They shall enjoy the benefits, privileges, and emoluments equivalent to the
rank of Undersecretary.
Section 17. General Data Privacy Principles. The processing of personal data shall
be allowed, subject to compliance with the requirements of the Act and other laws
allowing disclosure of information to the public, and adherence to the principles of
transparency, legitimate purpose, and proportionality.
The data subject must be provided specific information regarding the purpose and
extent of processing, including, where applicable, the automated processing of his or
her personal data for profiling, or processing for direct marketing, and data sharing.
Only personal data that is necessary and compatible with declared, specified, and
legitimate purpose shall be collected.
Personal data shall be processed fairly and lawfully. Processing shall uphold the rights
of the data subject, including the right to refuse, withdraw consent, or object. It shall
likewise be transparent, and allow the data subject sufficient information to know the
nature and extent of processing.
Information provided to a data subject must always be in clear and plain language to
ensure that they are easy to understand and access.
Processed personal data should be adequate, relevant, and limited to what is necessary
in relation to the purposes for which they are processed.
(a) for the fulfillment of the declared, specified, and legitimate purpose, or when the
processing relevant to the purpose has been terminated; (b) for the establishment,
exercise or defense of legal claims; or (c) for legitimate business purposes, which must
be consistent with standards followed by the applicable industry or approved by
appropriate government agency.
Retention of personal data shall be allowed in cases provided by law.
Personal data shall be disposed or discarded in a secure manner that would prevent
further processing, unauthorized access, or disclosure to any other party or the public,
or prejudice the interests of the data subjects.
Any authorized further processing shall have adequate safeguards. Personal data
originally collected for a declared, specified, or legitimate purpose may be processed
further for historical, statistical, or scientific purposes, and, in cases laid down in law,
may be stored for longer periods, subject to implementation of the appropriate
organizational, physical, and technical security measures required by the Act in order to
safeguard the rights and freedoms of the data subject.
Personal data which is aggregated or kept in a form which does not permit
identification of data subjects may be kept longer than necessary for the declared,
specified, and legitimate purpose.
Data Sharing shall be allowed in the private sector if the data subject consents to data
sharing, and the following conditions are complied with: ChanRoblesVirtualawlibrary
Consent for data sharing shall be required even when the data is to be shared with an
affiliate or mother company, or similar relationships; cralawlawlibrary
Data sharing for commercial purposes, including direct marketing, shall be covered by a
data sharing agreement. (a) The data sharing agreement shall establish adequate
safeguards for data privacy and security, and uphold rights of data subjects. (b) The
data sharing agreement shall be subject to review by the Commission, on its own
initiative or upon complaint of data subject;
The data subject shall be provided with the following information prior to collection or
before data is shared: (a) Identity of the personal information controllers or personal
information processors that will be given access to the personal data; (b) Purpose of
data sharing; (c) Categories of personal data concerned; (d) Intended recipients or
categories of recipients of the personal data; (e) Existence of the rights of data
subjects, including the right to access and correction, and the right to object; (f) Other
information that would sufficiently notify the data subject of the nature and extent of
data sharing and the manner of processing.
Further processing of shared data shall adhere to the data privacy principles laid down
in the Act, these Rules, and other issuances of the Commission.
Data collected from parties other than the data subject for purpose of research shall be
allowed when the personal data is publicly available, or has the consent of the data
subject for purpose of research: Provided, that adequate safeguards are in place, and
no decision directly affecting the data subject shall be made on the basis of the data
collected or processed. The rights of the data subject shall be upheld without
compromising research integrity.
Data sharing between government agencies for the purpose of a public function or
provision of a public service shall be covered a data sharing agreement.
Any or all government agencies party to the agreement shall comply with the Act, these
Rules, and all other issuances of the Commission, including putting in place adequate
safeguards for data privacy and security.
The data sharing agreement shall be subject to review of the Commission, on its own
initiative or upon complaint of data subject.
Rule V. Lawful Processing of Personal Data
The processing involves the personal information of a data subject who is a party to a
contractual agreement, in order to fulfill obligations under the contract or to take steps
at the request of the data subject prior to entering the said agreement; cralawlawlibrary
The processing is necessary for compliance with a legal obligation to which the personal
information controller is subject; cralawlawlibrary
The processing is necessary to protect vitally important interests of the data subject,
including his or her life and health; cralawlawlibrary
The sensitive personal information are not transferred to third parties; and
The personal information controller and personal information processor shall take steps
to ensure that any natural person acting under their authority and who has access to
personal data, does not process them except upon their instructions, or as required by
law.
The security measures shall aim to maintain the availability, integrity, and
confidentiality of personal data and are intended for the protection of personal data
against any accidental or unlawful destruction, alteration, and disclosure, as well as
against any other unlawful processing. These measures shall be implemented to protect
personal data against natural dangers such as accidental loss or destruction, and
human dangers such as unlawful access, fraudulent misuse, unlawful destruction,
alteration and contamination.
Data Protection Policies. Any natural or juridical person or other body involved in the
processing of personal data shall implement appropriate data protection policies that
provide for organization, physical, and technical security measures, and, for such
purpose, take into account the nature, scope, context and purposes of the processing,
as well as the risks posed to the rights and freedoms of data subjects. The policies shall
implement data protection principles both at the time of the determination of the
means for processing and at the time of the processing itself.
The policies shall implement appropriate security measures that, by default, ensure
only personal data which is necessary for the specified purpose of the processing are
processed. They shall determine the amount of personal data collected, including the
extent of processing involved, the period of their storage, and their accessibility.
The polices shall provide for documentation, regular review, evaluation, and updating of
the privacy and security policies and practices.
Records of Processing Activities. Any natural or juridical person or other body involved
in the processing of personal data shall maintain records that sufficiently describe its
data processing system, and identify the duties and responsibilities of those individuals
who will have access to personal data. Records should include: Information about the
purpose of the processing of personal data, including any intended future processing or
data sharing;cralawlawlibrary
A description of all categories of data subjects, personal data, and recipients of such
personal data that will be involved in the processing; cralawlawlibrary
General information about the data flow within the organization, from the time of
collection, processing, and retention, including the time limits for disposal or erasure of
personal data; cralawlawlibrary
The name and contact details of the personal information controller and, where
applicable, the joint controller, the its representative, and the compliance officer or
Data Protection Officer, or any other individual or individuals accountable for ensuring
compliance with the applicable laws and regulations for the protection of data privacy
and security.
Management of Human Resources. Any natural or juridical person or other entity
involved in the processing of personal data shall be responsible for selecting and
supervising its employees, agents, or representatives, particularly those who will have
access to personal data.
The said employees, agents, or representatives shall operate and hold personal data
under strict confidentiality if the personal data are not intended for public disclosure.
This obligation shall continue even after leaving the public service, transferring to
another position, or upon terminating their employment or contractual relations. There
shall be capacity building, orientation or training programs for such employees, agents
or representatives, regarding privacy or security policies.
Processing of Personal Data. Any natural or juridical person or other body involved in
the processing of personal data shall develop, implement and review: A procedure for
the collection of personal data, including procedures for obtaining consent, when
applicable; cralawlawlibrary
Procedures that limit the processing of data, to ensure that it is only to the extent
necessary for the declared, specified, and legitimate purpose; cralawlawlibrary
Policies for access management, system monitoring, and protocols to follow during
security incidents or technical problems; cralawlawlibrary
Policies and procedures for data subjects to exercise their rights under the Act; cralawlawlibrary
Design of office space and work stations, including the physical arrangement of
furniture and equipment, shall provide privacy to anyone processing personal data,
taking into consideration the environment and accessibility to the public; cralawlawlibrary
The duties, responsibilities and schedule of individuals involved in the processing of
personal data shall be clearly defined to ensure that only the individuals actually
performing official duties shall be in the room or work station, at any given time; cralawlawlibrary
Any natural or juridical person or other body involved in the processing of personal data
shall implement Policies and procedures regarding the transfer, removal, disposal, and
reuse of electronic media, to ensure appropriate protection of personal data; cralawlawlibrary
Policies and procedures that prevent the mechanical destruction of files and equipment
shall be established. The room and workstation used in the processing of personal data
shall, as far as practicable, be secured against natural disasters, power disturbances,
external access, and other similar threats. Section 28. Guidelines for Technical
Security Measures. Where appropriate, personal information controllers and personal
information processors shall adopt and establish the following technical security
measures: A security policy with respect to the processing of personal data; cralawlawlibrary
The ability to ensure and maintain the confidentiality, integrity, availability, and
resilience of their processing systems and services; cralawlawlibrary
Regular monitoring for security breaches, and a process both for identifying and
accessing reasonably foreseeable vulnerabilities in their computer networks, and for
taking preventive, corrective, and mitigating action against security incidents that can
lead to a personal data breach; cralawlawlibrary
The ability to restore the availability and access to personal data in a timely manner in
the event of a physical or technical incident; cralawlawlibrary
A process for regularly testing, assessing, and evaluating the effectiveness of security
measures; cralawlawlibrary
Encryption of personal data during storage and while in transit, authentication process,
and other technical security measures that control and limit access. Section
29. Appropriate Level of Security. The Commission shall monitor the compliance of
natural or juridical person or other body involved in the processing of personal data,
specifically their security measures, with the guidelines provided in these Rules and
subsequent issuances of the Commission. In determining the level of security
appropriate for a particular personal information controller or personal information
processor, the Commission shall take into account the nature of the personal data that
requires protection, the risks posed by the processing, the size of the organization and
complexity of its operations, current data privacy best practices, and the cost of
security implementation. The security measures provided herein shall be subject to
regular review and evaluation, and may be updated as necessary by the Commission in
separate issuances, taking into account the most appropriate standard recognized by
the information and communications technology industry and data privacy best
practices.
Rule VII. Security of Sensitive Personal Information in
Government
A source agency shall strictly regulate access to sensitive personal information under its
custody or control, particularly when it allows online access. An employee of the
government shall only be granted a security clearance when the performance of his or
her official functions or the provision of a public service directly depends on and cannot
otherwise be performed unless access to the personal data is allowed.
Where allowed under the next preceding sections, online access to sensitive personal
information shall be subject to the following conditions: (a) An information technology
governance framework has been designed and implemented; (b) Sufficient
organizational, physical and technical security measures have been established; (c) The
agency is capable of protecting sensitive personal information in accordance with data
privacy practices and standards recognized by the information and communication
technology industry; (d) The employee of the government is only given online access to
sensitive personal information necessary for the performance of official functions or the
provision of a public service.
Off-site access. Sensitive personal information maintained by an agency may not be
transported or accessed from a location off or outside of government property, whether
by its agent or employee, unless the head of agency has ensured the implementation of
privacy policies and appropriate security measures. A request for such transportation or
access shall be submitted to and approved by the head of agency. The request must
include proper accountability mechanisms in the processing of data.
The head of agency shall approve requests for off-site access in accordance with the
following guidelines: (a) Deadline for Approval or Disapproval. The head of agency shall
approve or disapprove the request within two (2) business days after the date of
submission of the request. Where no action is taken by the head of agency, the request
is considered disapproved; (b) Limitation to One thousand (1,000) Records. Where a
request is approved, the head of agency shall limit the access to not more than one
thousand (1,000) records at a time, subject to the next succeeding paragraph. (c)
Encryption. Any technology used to store, transport or access sensitive personal
information for purposes of off-site access approved under this subsection shall be
secured by the use of the most secure encryption standard recognized by the
Commission. Section 32. Implementation of Security
Requirements. Notwithstanding the effective date of these Rules, the requirements in
the preceding sections shall be implemented before any off-site or online access
request is approved. Any data sharing agreement between a source agency and
another government agency shall be subject to review of the Commission on its own
initiative or upon complaint of data subject.
Section 34. Rights of the Data Subject. The data subject is entitled to the following
rights: Right to be informed. The data subject has a right to be informed whether
personal data pertaining to him or her shall be, are being, or have been processed,
including the existence of automated decision-making and profiling.
The data subject shall be notified and furnished with information indicated hereunder
before the entry of his or her personal data into the processing system of the personal
information controller, or at the next practical opportunity:
ChanRoblesVirtualawlibrary
(a) Description of the personal data to be entered into the system; (b) Purposes for
which they are being or will be processed, including processing for direct marketing,
profiling or historical, statistical or scientific purpose; (c) Basis of processing, when
processing is not based on the consent of the data subject; (d) Scope and method of
the personal data processing; (e) The recipients or classes of recipients to whom the
personal data are or may be disclosed; (f) Methods utilized for automated access, if the
same is allowed by the data subject, and the extent to which such access is authorized,
including meaningful information about the logic involved, as well as the significance
and the envisaged consequences of such processing for the data subject; (g) The
identity and contact details of the personal data controller or its representative; (h)
The period for which the information will be stored; and (i) The existence of their rights
as data subjects, including the right to access, correction, and object to the processing,
as well as the right to lodge a complaint before the Commission. Right to object. The
data subject shall have the right to object to the processing of his or her personal data,
including processing for direct marketing, automated processing or profiling. The data
subject shall also be notified and given an opportunity to withhold consent to the
processing in case of changes or any amendment to the information supplied or
declared to the data subject in the preceding paragraph.
When a data subject objects or withholds consent, the personal information controller
shall no longer process the personal data, unless: The personal data is needed
pursuant to a subpoena; cralawlawlibrary
The collection and processing are for obvious purposes, including, when it is necessary
for the performance of or in relation to a contract or service to which the data subject is
a party, or when necessary or desirable in the context of an employer-employee
relationship between the collector and the data subject; or
Reasons for the disclosure of the personal data to recipients, if any; cralawlawlibrary
Information on automated processes where the data will, or is likely to, be made as the
sole basis for any decision that significantly affects or will affect the data subject; cralawlawlibrary
Date when his or her personal data concerning the data subject were last accessed and
modified; and
The designation, name or identity, and address of the personal information controller.
Right to rectification. The data subject has the right to dispute the inaccuracy or error
in the personal data and have the personal information controller correct it immediately
and accordingly, unless the request is vexatious or otherwise unreasonable. If the
personal data has been corrected, the personal information controller shall ensure the
accessibility of both the new and the retracted information and the simultaneous
receipt of the new and the retracted information by the intended recipients
thereof: Provided, That receipients or third parties who have previously received such
processed personal data shall be informed of its inaccuracy and its rectification, upon
reasonable request of the data subject.
Right to Erasure or Blocking. The data subject shall have the right to suspend, withdraw
or order the blocking, removal or destruction of his or her personal data from the
personal information controller’s filing system.
This right may be exercised upon discovery and substantial proof of any of the
following: (a) The personal data is incomplete, outdated, false, or unlawfully obtained;
(b) The personal data is being used for purpose not authorized by the data subject; (c)
The personal data is no longer necessary for the purposes for which they were
collected; (d) The data subject withdraws consent or objects to the processing, and
there is no other legal ground or overriding legitimate interest for the processing; (e)
The personal data concerns private information that is prejudicial to data subject,
unless justified by freedom of speech, of expression, or of the press or otherwise
authorized; (f) The processing is unlawful; (g) The personal information controller or
personal information processor violated the rights of the data subject.
The personal information controller may notify third parties who have previously
received such processed personal information.
Right to damages. The data subject shall be indemnified for any damages sustained
due to such inaccurate, incomplete, outdated, false, unlawfully obtained or
unauthorized use of personal data, taking into account any violation of his or her rights
and freedoms as data subject. Section 35. Transmissibility of Rights of the Data
Subject. The lawful heirs and assigns of the data subject may invoke the rights of the
data subject to which he or she is an heir or an assignee, at any time after the death of
the data subject, or when the data subject is incapacitated or incapable of exercising
the rights as enumerated in the immediately preceding section.
Section 36. Right to Data Portability. Where his or her personal data is processed
by electronic means and in a structured and commonly used format, the data subject
shall have the right to obtain from the personal information controller a copy of such
data in an electronic or structured format that is commonly used and allows for further
use by the data subject. The exercise of this right shall primarily take into account the
right of data subject to have control over his or her personal data being processed
based on consent or contract, for commercial purpose, or through automated means.
The Commission may specify the electronic format referred to above, as well as the
technical standards, modalities, procedures and other rules for their transfer.
Section 37. Limitation on Rights. The immediately preceding sections shall not be
applicable if the processed personal data are used only for the needs of scientific and
statistical research and, on the basis of such, no activities are carried out and no
decisions are taken regarding the data subject: Provided, that the personal data shall
be held under strict confidentiality and shall be used only for the declared purpose. The
said sections are also not applicable to the processing of personal data gathered for the
purpose of investigations in relation to any criminal, administrative or tax liabilities of a
data subject. Any limitations on the rights of the data subject shall only be to the
minimum extent necessary to achieve the purpose of said research or investigation.
Section 38. Data Breach Notification. The Commission and affected data subjects
shall be notified by the personal information controller within seventy-two (72) hours
upon knowledge of, or when there is reasonable belief by the personal information
controller or personal information processor that, a personal data breach requiring
notification has occurred.
Depending on the nature of the incident, or if there is delay or failure to notify, the
Commission may investigate the circumstances surrounding the personal data breach.
Investigations may include on-site examination of systems and procedures. Section
39. Contents of Notification. The notification shall at least describe the nature of the
breach, the personal data possibly involved, and the measures taken by the entity to
address the breach. The notification shall also include measures taken to reduce the
harm or negative consequences of the breach, the representatives of the personal
information controller, including their contact details, from whom the data subject can
obtain additional information about the breach, and any assistance to be provided to
the affected data subjects.
The Commission may exempt a personal information controller from notification where,
in its reasonable judgment, such notification would not be in the public interest, or in
the interest of the affected data subjects.
The Commission may authorize postponement of notification where it may hinder the
progress of a criminal investigation related to a serious breach.
Section 41. Breach Report. The personal information controller shall notify the
Commission by submitting a report, whether written or electronic, containing the
required contents of notification. The report shall also include the name of a
designated representative of the personal information controller, and his or her contact
details.
All security incidents and personal data breaches shall be documented through written
reports, including those not covered by the notification requirements. In the case of
personal data breaches, a report shall include the facts surrounding an incident, the
effects of such incident, and the remedial actions taken by the personal information
controller. In other security incidents not involving personal data, a report containing
aggregated data shall constitute sufficient documentation. These reports shall be made
available when requested by the Commission. A general summary of the reports shall
be submitted to the Commission annually. Section 42. Procedure for
Notification. The Procedure for breach notification shall be in accordance with the Act,
these Rules, and any other issuance of the Commission.
The contract or other legal act shall stipulate, in particular, that the personal
information processor shall: ChanRoblesVirtualawlibrary
Process the personal data only upon the documented instructions of the personal
information controller, including transfers of personal data to another country or an
international organization, unless such transfer is authorized by law; cralawlawlibrary
Implement appropriate security measures and comply with the Act, these Rules, and
other issuances of the Commission; cralawlawlibrary
Not engage another processor without prior instruction from the personal information
controller: Provided, that any such arrangement shall ensure that the same obligations
for data protection under the contract or legal act are implemented, taking into account
the nature of the processing; cralawlawlibrary
Assist the personal information controller in ensuring compliance with the Act, these
Rules, other relevant laws, and other issuances of the Commission, taking into account
the nature of processing and the information available to the personal information
processor; cralawlawlibrary
At the choice of the personal information controller, delete or return all personal data to
the personal information controller after the end of the provision of services relating to
the processing: Provided, that this includes deleting existing copies unless storage is
authorized by the Act or another law; cralawlawlibrary
Section 46. Enforcement of the Data Privacy Act. Pursuant to the mandate of the
Commission to administer and implement the Act, and to ensure the compliance of
personal information controllers with its obligations under the law, the Commission
requires the following: Registration of personal data processing systems operating in
the country that involves accessing or requiring sensitive personal information of at
least one thousand (1,000) individuals, including the personal data processing system
of contractors, and their personnel, entering into contracts with government agencies; cralawlawlibrary
Notification of automated processing operations where the processing becomes the sole
basis of making decisions that would significantly affect the data subject; cralawlawlibrary
Annual report of the summary of documented security incidents and personal data
breaches; cralawlawlibrary
Compliance with other requirements that may be provided in other issuances of the
Commission. Section 47. Registration of Personal Data Processing Systems. The
personal information controller or personal information processor that employs fewer
than two hundred fifty (250) persons shall not be required to register unless the
processing it carries out is likely to pose a risk to the rights and freedoms of data
subjects, the processing is not occasional, or the processing includes sensitive personal
information of at least one thousand (1,000) individuals. The contents of registration
shall include: ChanRoblesVirtualawlibrary
The name and address of the personal information controller or personal information
processor, and of its representative, if any, including their contact details; cralawlawlibrary
The purpose or purposes of the processing, and whether processing is being done
under an outsourcing or subcontracting agreement; cralawlawlibrary
The recipients or categories of recipients to whom the data might be disclosed; cralawlawlibrary
A general description of privacy and security measures for data protection; cralawlawlibrary
Name and contact details of the compliance or data protection officer, which shall
immediately be updated in case of changes.
The procedure for registration shall be in accordance with these Rules and other
issuances of the Commission. Section 48. Notification of Automated Processing
Operations. The personal information controller carrying out any wholly or partly
automated processing operations or set of such operations intended to serve a single
purpose or several related purposes shall notify the Commission when the automated
processing becomes the sole basis for making decisions about a data subject, and when
the decision would significantly affect the data subject. The notification shall include the
following information: Purpose of processing; cralawlawlibrary
The recipients or categories of recipients to whom the data are to be disclosed; cralawlawlibrary
Decisions relating to the data subject that would be made on the basis of processed
data or that would significantly affect the rights and freedoms of data subject; and
Any data sharing agreement, outsourcing contract, and similar contracts involving the
processing of personal data, and its implementation; cralawlawlibrary
Any reported violation of the rights and freedoms of data subjects; cralawlawlibrary
In cases where a data subject files a complaint for violation of his or her rights as data
subject, and for any injury suffered as a result of the processing of his or her personal
data, the Commission may award indemnity on the basis of the applicable provisions of
the New Civil Code.
In case of criminal acts and their corresponding personal penalties, the person who
committed the unlawful act or omission shall be recommended for prosecution by the
Commission based on substantial evidence. If the offender is a corporation,
partnership, or any juridical person, the responsible officers, as the case may be, who
participated in, or by their gross negligence, allowed the commission of the crime, shall
be recommended for prosecution by the Commission based on substantial evidence.
Rule XIII. Penalties
A penalty of imprisonment ranging from three (3) years to six (6) years and a fine of
not less than Five hundred thousand pesos (Php500,000.00) but not more than Four
million pesos (Php4,000,000.00) shall be imposed on persons who, due to negligence,
provided access to sensitive personal information without being authorized under the
Act or any existing law. Section 54. Improper Disposal of Personal Information
and Sensitive Personal Information. A penalty of imprisonment ranging from six
(6) months to two (2) years and a fine of not less than One hundred thousand pesos
(Php100,000.00) but not more than Five hundred thousand pesos (Php500,000.00)
shall be imposed on persons who knowingly or negligently dispose, discard, or abandon
the personal information of an individual in an area accessible to the public or has
otherwise placed the personal information of an individual in its container for trash
collection.
A penalty of imprisonment ranging from one (1) year to three (3) years and a fine of
not less than One hundred thousand pesos (Php100,000.00) but not more than One
million pesos (Php1,000,000.00) shall be imposed on persons who knowingly or
negligently dispose, discard or abandon the sensitive personal information of an
individual in an area accessible to the public or has otherwise placed the sensitive
personal information of an individual in its container for trash collection. Section
55. Processing of Personal Information and Sensitive Personal Information for
Unauthorized Purposes. A penalty of imprisonment ranging from one (1) year and
six (6) months to five (5) years and a fine of not less than Five hundred thousand
pesos (Php500,000.00) but not more than One million pesos (Php1,000,000.00) shall
be imposed on persons processing personal information for purposes not authorized by
the data subject, or otherwise authorized under the Act or under existing laws.
A penalty of imprisonment ranging from two (2) years to seven (7) years and a fine of
not less than Five hundred thousand pesos (Php500,000.00) but not more than Two
million pesos (Php2,000,000.00) shall be imposed on persons processing sensitive
personal information for purposes not authorized by the data subject, or otherwise
authorized under the Act or under existing laws. Section 56. Unauthorized Access
or Intentional Breach. A penalty of imprisonment ranging from one (1) year to three
(3) years and a fine of not less than Five hundred thousand pesos (Php500,000.00) but
not more than Two million pesos (Php2,000,000.00) shall be imposed on persons who
knowingly and unlawfully, or violating data confidentiality and security data systems,
breaks in any way into any system where personal and sensitive personal information
are stored.
Section 57. Concealment of Security Breaches Involving Sensitive Personal
Information. A penalty of imprisonment ranging from one (1) year and six (6) months
to five (5) years and a fine of not less than Five hundred thousand pesos
(Php500,000.00) but not more than One million pesos (Php1,000,000.00) shall be
imposed on persons who, after having knowledge of a security breach and of the
obligation to notify the Commission pursuant to Section 20(f) of the Act, intentionally
or by omission conceals the fact of such security breach.
If the offender is a public official or employee and he or she is found guilty of acts
penalized under Sections 54 and 55 of these Rules, he or she shall, in addition to the
penalties prescribed herein, suffer perpetual or temporary absolute disqualification from
office, as the case may be.
Section 62. Large-Scale. The maximum penalty in the corresponding scale of
penalties provided for the preceding offenses shall be imposed when the personal data
of at least one hundred (100) persons are harmed, affected, or involved, as the result
of any of the above-mentioned offenses.
Section 63. Offense Committed by Public Officer. When the offender or the person
responsible for the offense is a public officer, as defined in the Administrative Code of
1987, in the exercise of his or her duties, he or she shall likewise suffer an accessory
penalty consisting of disqualification to occupy public office for a term double the term
of the criminal penalty imposed.
Section 65. Fines and Penalties. Violations of the Act, these Rules, other issuances
and orders of the Commission, shall, upon notice and hearing, be subject to compliance
and enforcement orders, cease and desist orders, temporary or permanent ban on the
processing of personal data, or payment of fines, in accordance with a schedule to be
published by the Commission.
Section 66. Appeal. Appeal from final decisions of the Commission shall be made to
the proper courts in accordance with the Rules of Court, or as may be prescribed by
law.
Section 67. Period for Compliance. Any natural or juridical person or other body
involved in the processing of personal data shall comply with the personal data
processing principles and standards of personal data privacy and security already laid
out in the Act.
Personal information controllers and Personal Information processors shall register with
the Commission their data processing systems or automated processing operations,
subject to notification, within one (1) year after the effectivity of these Rules. Any
subsequent issuance of the Commission, including those that implement specific
standards for data portability, encryption, or other security measures shall provide the
period for its compliance.
For a period of one (1) year from the effectivity of these Rules, a personal information
controller or personal information processor may apply for an extension of the period
within which to comply with the issuances of the Commission. The Commission may
grant such request for good cause shown.
Section 68. Appropriations Clause. The Commission shall be provided with
appropriations for the performance of its functions which shall be included in the
General Appropriations Act.
Section 70. Separability Clause. If any provision or part hereof is held invalid or
unconstitutional, the remainder of these Rules or the provision not otherwise affected
shall remain valid and subsisting.
Section 72. Effectivity Clause. These Rules shall take effect fifteen (15) days after
its publication in the Official Gazette.
Approved: ChanRoblesVirtualawlibrary