{"id":6150,"date":"2018-05-09T05:45:00","date_gmt":"2018-05-08T21:45:00","guid":{"rendered":"https:\/\/pnl-law.com\/blog\/?p=6150"},"modified":"2020-05-10T03:35:56","modified_gmt":"2020-05-09T19:35:56","slug":"preliminary-matters-rule-i-data-privacy-act","status":"publish","type":"post","link":"https:\/\/pnl-law.com\/blog\/preliminary-matters-rule-i-data-privacy-act\/","title":{"rendered":"Preliminary Matters (Rule I): Data Privacy Act"},"content":{"rendered":"\n<h5 class=\"has-text-align-center wp-block-heading\">[<a href=\"https:\/\/pnl-law.com\/blog\/table-of-contents-data-privacy-act-irr\/\">Table of Contents<\/a>] [<a href=\"https:\/\/pnl-law.com\/blog\/glossary-data-privacy-internet-technology-and-cybercrimes\/\">Glossary<\/a>]<\/h5>\n\n\n\n<h2 class=\"has-text-align-center wp-block-heading\">Implementing Rules and Regulations of Republic Act No. 10173, known as the \u201cData Privacy Act of 2012\u201d&nbsp;<\/h2>\n\n\n\n<p>Pursuant to the mandate of the National Privacy Commission to administer and implement the provisions of the Data Privacy Act of 2012, and to monitor and ensure compliance of the country with international standards set for data protection, the following rules and regulations are hereby promulgated to effectively implement the provisions of the Act:&nbsp;<\/p>\n\n\n\n<!--more-->\n\n\n\n<h3 class=\"has-text-align-center wp-block-heading\">Rule I. Preliminary Provisions&nbsp;<\/h3>\n\n\n\n<p><strong>Section 1.&nbsp;Title<\/strong>.&nbsp;These rules and regulations shall be known as the \u201cImplementing Rules and Regulations of the Data Privacy Act of 2012\u201d, or the \u201cRules\u201d.&nbsp;<\/p>\n\n\n\n<p><strong>Section 2.&nbsp;Policy<\/strong>. These Rules further enforce the Data Privacy Act and adopt generally accepted international principles and standards for personal data protection. They safeguard the fundamental human right of every individual to privacy while ensuring free flow of information for innovation, growth, and national development. These Rules also recognize the vital role of information and communications technology in nation-building and enforce the State\u2019s inherent obligation to ensure that personal data in information and communications systems in the government and in the private sector are secured and protected.&nbsp;<\/p>\n\n\n\n<p><strong>Section 3.&nbsp;Definitions<\/strong>.&nbsp;Whenever used in these Rules, the following terms shall have the respective meanings hereafter set forth:&nbsp;<\/p>\n\n\n\n<p>a. \u201cAct\u201d refers to Republic Act No. 10173, also known as the Data Privacy Act of 2012;&nbsp;<\/p>\n\n\n\n<p>b. \u201cCommission\u201d refers to the National Privacy Commission;&nbsp;<\/p>\n\n\n\n<p>c. \u201cConsent of the data subject\u201d refers to any freely given, specific, informed indication of will, whereby the data subject agrees to the collection and processing of his or her personal, sensitive personal, or privileged information. Consent shall be evidenced by written, electronic or recorded means. It may also be given on behalf of a data subject by a lawful representative or an agent specifically authorized by the data subject to do so;&nbsp;<\/p>\n\n\n\n<p>d. \u201cData subject\u201d refers to an individual whose personal, sensitive personal, or privileged information is processed;&nbsp;<\/p>\n\n\n\n<p>e. \u201cData processing systems\u201d refers to the structure and procedure by which personal data is collected and further processed in an information and communications system or relevant filing system, including the purpose and intended output of the processing;&nbsp;<\/p>\n\n\n\n<p>f. \u201cData sharing\u201d is the disclosure or transfer to a third party of personal data under the custody of a personal information controller or personal information processor. In the case of the latter, such disclosure or transfer must have been upon the instructions of the personal information controller concerned. The term excludes outsourcing, or the disclosure or transfer of personal data by a personal information controller to a personal information processor;&nbsp;<\/p>\n\n\n\n<p>g. \u201cDirect marketing\u201d refers to communication by whatever means of any advertising or marketing material which is directed to particular individuals;&nbsp;<\/p>\n\n\n\n<p>h. \u201cFiling system\u201d refers to any set of information relating to natural or juridical persons to the extent that, although the information is not processed by equipment operating automatically in response to instructions given for that purpose, the set is structured, either by reference to individuals or by reference to criteria relating to individuals, in such a way that specific information relating to a particular individual is readily accessible;&nbsp;<\/p>\n\n\n\n<p>i. \u201cInformation and communications system\u201d refers to a system for generating, sending, receiving, storing, or otherwise processing electronic data messages or electronic documents, and includes the computer system or other similar device by which data is recorded, transmitted, or stored, and any procedure related to the recording, transmission, or storage of electronic data, electronic message, or electronic document;&nbsp;<\/p>\n\n\n\n<p>j. \u201cPersonal data\u201d refers to all types of personal information;&nbsp;<\/p>\n\n\n\n<p>k. \u201cPersonal data breach\u201d refers to a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to, personal data transmitted, stored, or otherwise processed;&nbsp;<\/p>\n\n\n\n<p>l. \u201cPersonal information\u201d refers to any information, whether recorded in a material form or not, from which the identity of an individual is apparent or can be reasonably and directly ascertained by the entity holding the information, or when put together with other information would directly and certainly identify an individual;&nbsp;<\/p>\n\n\n\n<p>m. \u201cPersonal information controller\u201d refers to a natural or juridical person, or any other body who controls the processing of personal data, or instructs another to process personal data on its behalf. The term excludes:&nbsp;<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>A natural or juridical person, or any other body, who performs such functions as instructed by another person or organization; or&nbsp;<\/li><li>A natural person who processes personal data in connection with his or her personal, family, or household affairs;&nbsp;<\/li><\/ol>\n\n\n\n<p>There is control if the natural or juridical person or any other body decides on what information is collected, or the purpose or extent of its processing;&nbsp;<\/p>\n\n\n\n<p>n. \u201cPersonal information processor\u201d refers to any natural or juridical person or any other body to whom a personal information controller may outsource or instruct the processing of personal data pertaining to a data subject;&nbsp;<\/p>\n\n\n\n<p>o. \u201cProcessing\u201d refers to any operation or any set of operations performed upon personal data including, but not limited to, the collection, recording, organization, storage, updating or modification, retrieval, consultation, use, consolidation, blocking, erasure or destruction of data. Processing may be performed through automated means, or manual processing, if the personal data are contained or are intended to be contained in a filing system;&nbsp;<\/p>\n\n\n\n<p>p. \u201cProfiling\u201d refers to any form of automated processing of personal data consisting of the use of personal data to evaluate certain personal aspects relating to a natural person, in particular to analyze or predict aspects concerning that natural person&#8217;s performance at work, economic situation, health, personal preferences, interests, reliability, behavior, location or movements;&nbsp;<\/p>\n\n\n\n<p>q. \u201cPrivileged information\u201d refers to any and all forms of data, which, under the Rules of Court and other pertinent laws constitute privileged communication;&nbsp;<\/p>\n\n\n\n<p>r. \u201cPublic authority\u201d refers to any government entity created by the Constitution or law, and vested with law enforcement or regulatory authority and functions;&nbsp;<\/p>\n\n\n\n<p>s. \u201cSecurity incident\u201d is an event or occurrence that affects or tends to affect data protection, or may compromise the availability, integrity and confidentiality of personal data. It includes incidents that would result to a personal data breach, if not for safeguards that have been put in place;&nbsp;<\/p>\n\n\n\n<p>t. Sensitive personal information refers to personal information:&nbsp;<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>About an individual\u2019s race, ethnic origin, marital status, age, color, and religious, philosophical or political affiliations;&nbsp;<\/li><li>About an individual\u2019s health, education, genetic or sexual life of a person, or to any proceeding for any offense committed or alleged to have been committed by such individual, the disposal of such proceedings, or the sentence of any court in such proceedings;&nbsp;<\/li><li>Issued by government agencies peculiar to an individual which includes, but is not limited to, social security numbers, previous or current health records, licenses or its denials, suspension or revocation, and tax returns; and&nbsp;<\/li><li>Specifically established by an executive order or an act of Congress to be kept classified.&nbsp;<\/li><\/ol>\n","protected":false},"excerpt":{"rendered":"<p>[Table of Contents] [Glossary] Implementing Rules and Regulations of Republic Act No. 10173, known as the \u201cData Privacy Act of 2012\u201d&nbsp; Pursuant to the mandate of the National Privacy Commission to administer and implement the provisions of the Data Privacy Act of 2012, and to monitor and ensure compliance of the country with international standards [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[148],"tags":[1466,1464,1465],"class_list":["post-6150","post","type-post","status-publish","format-standard","hentry","category-internet-law","tag-data-privacy","tag-data-privacy-act","tag-data-privacy-act-of-2012"],"_links":{"self":[{"href":"https:\/\/pnl-law.com\/blog\/wp-json\/wp\/v2\/posts\/6150","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pnl-law.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pnl-law.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pnl-law.com\/blog\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/pnl-law.com\/blog\/wp-json\/wp\/v2\/comments?post=6150"}],"version-history":[{"count":2,"href":"https:\/\/pnl-law.com\/blog\/wp-json\/wp\/v2\/posts\/6150\/revisions"}],"predecessor-version":[{"id":6228,"href":"https:\/\/pnl-law.com\/blog\/wp-json\/wp\/v2\/posts\/6150\/revisions\/6228"}],"wp:attachment":[{"href":"https:\/\/pnl-law.com\/blog\/wp-json\/wp\/v2\/media?parent=6150"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pnl-law.com\/blog\/wp-json\/wp\/v2\/categories?post=6150"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/pnl-law.com\/blog\/wp-json\/wp\/v2\/tags?post=6150"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}