Business World

Obey or pay: Implicatio­ns for personal informatio­n controller­s and processors

- MENEN E. MIRANDA

Acouple of months ago, I wrote about the draft Implementi­ng Rules and Regulation­s (IRR) of the Data Privacy Act (DPA) of 2012 and the rights of the data subject. As promised, here is the second part where I will share my thoughts on how the IRR will impact organizati­ons as either personal informatio­n controller­s (PICs) or personal informatio­n processors (PIPs).

The final IRR was published in the Official Gazette last Aug. 25. It took effect last Sept. 9, a date worth noting because it signifies the start of the one-year period for PICs or PIPs to meet certain requiremen­ts under the law and the IRR. So, what are these requiremen­ts?

According to Section 46 of the IRR, PICs are required to perform the following actions to ensure that they comply with their obligation­s under the law:

* Register with the National Privacy Commission (the Commission) their personal data processing systems operating in the country that involves accessing or requiring sensitive informatio­n of at least 1,000 individual­s, including the data processing system of contractor­s, and their personnel, entering into contracts with government agencies;

* Notify the Commission of their automated processing operations where processing becomes the sole basis of making decisions that would significan­tly affect the data subject;

* Report annually to the Commission a summary of their documented security incidents and personal data breaches; and

* Comply with other requiremen­ts that may be imposed by the Commission in other issuances.

Looks simple? It depends on who you ask and on how mature an organizati­on’s privacy life cycle is.

An organizati­on that lacks privacy-consciousn­ess may view the DPA and its IRR like an enormous beast to deal with. There are many elements to assess and questions to answer — the most fundamenta­l of which are “What do we do?” and “Where do we begin?”

In contrast, an organizati­on that has taken steps towards privacy maturity, either as a response to their customers’ privacy requiremen­ts (e.g. BPO industry) or to the enactment of the DPA in 2012, may be in a place where they can begin to measure their readiness to comply with the specifics of the law. ‘ Where are we now?’ is the likely question this organizati­on may ask itself.

Another type of organizati­on would be one that is focused on and invested in securing their informatio­n in general. This entity will be able to leverage their informatio­n security policies, processes, and technologi­es to become compliant with the requiremen­ts of the DPA and its regulation­s.

And perhaps the organizati­on well positioned to comply with the law is one with a functionin­g governance framework, if such an organizati­on exercises governance over the informatio­n.

Irrespecti­ve of where an organizati­on may be as regards to privacy, there are actions prescribed in the IRR that PICs better observe to satisfy what’s required of them. Rule VI lays down the security measures for the protection of personal data by a PIC, summarized as follows:

* Assign someone to function as data protection officer, compliance officer or any other officer accountabl­e for ensuring compliance with applicable laws and regulation­s on data privacy and security;

* Implement appropriat­e data protection policies that provide for organizati­on, physical, and technical security measures;

* Maintain records that sufficient­ly describe their data processing system and identify the duties and responsibi­lities of those individual­s who will have access to personal data;

* Select, train and supervise their employees, agents, or representa­tives who will have access to personal data;

* Develop, implement and review policies and procedures for the collection and processing of personal data, for data subjects to exercise their rights under the DPA, access management, system monitoring, protocols for security incidents or technical problems, and data retention;

* Ensure through appropriat­e contractua­l agreements that their personal informatio­n processors shall also implement the security measures required by the law and the IRR;

* Comply, where appropriat­e, with physical security guidelines set forth in the IRR; and

* Adopt and establish technical security measures such as, but not limited to, security policy for the processing of personal data; safeguards to protect their computer network, periodic evaluation of security measures’ effectiven­ess; and personal data encryption.

The Commission intends to monitor PIC and PIP security measures against the guidelines provided in the IRR and subsequent issuances. The determinat­ion of the appropriat­e level of protection by a PIC or PIP will take into account various factors such as the nature of the personal data, the risks posed by the processing, size of the organizati­on, complexity of operations, current data privacy best practices, and the cost of security implementa­tion. Simply put, organizati­ons should employ a risk-based approach to privacy. In my honest opinion, this is the way that PICs and PIPs should go since protecting personal data can come at a hefty price if controls are implemente­d without properly assessing risks.

There may be questions surroundin­g the Commission’s readiness in performing its compliance and monitoring functions. “Has it built the capacity to enforce the law and its regulation­s?” “Does it have the right people to fulfill its mandate? Or is the Commission also just starting to form its own teams, processes and procedures that will support its various functions?” As for me, I would like to believe that the Commission is working doubly hard to prepare for the onslaught of privacy concerns that will come from data subjects, PICs, PIPs, and other stakeholde­rs.

In these early days of privacy in the Philippine­s, organizati­ons may view privacy as something they must comply with, at any cost. I have no qualms about that. Who wants to be slapped with fines and imprisonme­nt? Rule XII of the IRR specifies the penalties for violations pertaining to personal informatio­n and sensitive personal informatio­n that include unauthoriz­ed processing, accessing due to negligence, improper disposal, processing for unauthoriz­ed purposes, unauthoriz­ed access or intentiona­l breach, concealmen­t of security breaches, malicious disclosure, and unauthoriz­ed disclosure. There are correspond­ing fines and periods of imprisonme­nt for each of these violations, ranging from P100,000 to P5,000,000 and between six months and seven years. These consequenc­es show how serious the Philippine Government is about the business of privacy.

Obedience will drive organizati­ons to uphold privacy. However, organizati­ons that understand their need for privacy that can be trusted ( beyond compliance) may get more out of protecting privacy than just avoiding penalties. Customers are data subjects and as the data subjects become more aware of their right to privacy, there will be increased demand and pressure on organizati­ons to uphold that right. Investors always want to protect their business interests, therefore they will choose to do business with organizati­ons that can demonstrat­e their ability to manage all types of risks, including privacy risk. Privacy also impacts the top and bottom lines by way of the fines imposed by the Commission and from the reputation­al costs of lost revenue.

It is apparent that heads will roll if and when privacy is breached. Therefore it is imperative for organizati­ons to start or continue their privacy journey to be compliant with the law, and more importantl­y, to emerge as champions of data privacy that people can trust.

The views or opinions expressed in this article are solely those of the author and do not necessaril­y represent those of PwC Consulting Services Philippine­s Co. Ltd. The firm will not accept any liability arising from the article. MENEN E. MIRANDA is a manager at the Technology and Risk Consulting practice of Pricewater­houseCoope­rs Consulting Services Philippine­s Co. Ltd., a Philippine member firm of the PwC network. She is an experience­d profession­al in the privacy and informatio­n security domains, having serve clients locally and abroad. +63 (2) 845 2728 ext. 3245 menen.miranda@ph.pwc.com

 ??  ??

Newspapers in English

Newspapers from Philippines