Philippines Data Privacy Act
The Trust Challenge

Key Obligations & Consequences

Pointer

Organizations that process personal information under the DPA are required to adhere to the principles of transparency, legitimate purpose and proportionality. The PIC is obliged to comply with the DPA, its IRRs and any guidelines issued by the NPC.

Pointer

Organizations are required to collect the consent of data subjects prior to the processing of personal information.

Pointer

The PIC must implement reasonable and appropriate organizational, physical and technical measures for the protection of personal information against any accidental, natural or unlawful destruction, alteration and disclosure, as well as against any other unlawful processing.

Pointer

The PIC is also required to ensure that third parties processing personal information on their behalf should also implement security measures.

Pointer

The PIC is responsible for personal information under its control or custody, including information that has been transferred to a third party for processing, whether domestically or internationally, subject to cross-border arrangement and cooperation.

Pointer

The DPA necessitates that organizations should have a personal information privacy program in place to implement and review procedures for the collection of personal data and consent, fulfilling data subject requests, data access management, and data retention policies.

The Trust Challenge

Key Challenges in brief:

  • Personal data collected (“Data Inventory”).
  • Retention period for the personal data (“Data Minimization”).
  • Rights and methods in accessing the personal data (“Data Subject Rights”).

This is permissible under the DPA in a limited number of circumstances. Therefore, the data flow (outgoing personal and sensitive data) ought to be monitored appropriately.

This ought to be notified within 72 hours of becoming aware of any personal data breach, this can be possible only if a “data inventory” for personal and sensitive data is maintained by a data controller.

Data subjects have a series of rights conferred upon them by the PDPA, for instance right to know, right to data portability, right to be forgotten, individual data subjects raise various requests pertaining to their individual data subject rights.

Win-Win Situation

Solutions

Ardent Privacy’s Solutions relating to the above mentioned challenges:

Our AI-based, patented solution, TurtleShield PI (Privacy Intelligence) discovers all personal and sensitive data in structured and unstructured data systems across on-premises and multi-cloud environments. TurtleShield DI (Data Inventory) enables organizations to inventory & map their entire “Data footprint”, enabling them to protect what matters the most.

Often there are silos within entities or business and IT teams and it is challenging to get a full picture of data going outside organization and which is coming into organization, especially when data is shared with third parties, vendors, business partners and much more. Our TurtleShield PI (Privacy Intelligence) creates a data map based on your “data sharing”, to facilitate you to take action on it.

TurtleShield DM (Data Minimization) helps businesses minimize excess data and adhere to data minimization principle. This is data hygiene control and we are approaching it from a risk reduction and compliance perspective. We scan large data sets to scan for excess data using Machine Learning and find out excess data including personal data. This can eliminate operational inefficiencies and save cost by removing the unwanted data and legal cost of having it with respect to regulatory compliance.

With TurtleShield RTBF (Right to Be Forgotten) provides the businesses the capabilities to comply with mandatory deletion of personal data by providing the capabilities to delete the data on request along with the validation of the deletion.

Search capability in large datasets to fulfill data subject requests in totality and at rapid space. Assumption that data only exists in databases and nowhere else is often not reality as customer data exists in many sources. Using Machine learning and AI we crawl across data sources and predict where PII can exist.

The Trust Challenge

Key Obligations & Consequences

Pointer

Oman's PDPL requires that companies uphold the principle of “purpose limitation”.

  • Fairness/transparency
  • Purpose Limitation
  • Data Minimisation
  • Accuracy
  • Storage Limitation
  • Security
  • Accountability
Pointer

The regulation requires the organization to incorporate reasonable practices to fulfill the administrative, technical, and physical security.

Pointer

The DPA defines seven basic data subject rights: the right to be informed about how your data is used, to access personal data, to correct data, to have data deleted, to stop or restrict data processing, to data portability, and to object to how your data is processed.

Pointer

Users also have additional rights and protections under the DPA when their data is processed through automated decision-making or profiling algorithms.

Pointer

The DPA requires preparation of Incident Reporting & Breach Management Workflow.

Pointer

DPA requires the appointment of a Data Protection Officer for certain organizations, as well as maintaining a detailed record of processing activities.

The Trust Challenge

Key Challenges in brief:

The following are the issues created by oman's PDPL laws that the majority of organizations face:

Pointer

Under the PDPA, the data controller has to maintain the following key records, amongst others.

  • Personal data collected (“Data Inventory”).
  • Retention period for the personal data (“Data Minimization”).
  • Rights and methods in accessing the personal data (“Data Subject Rights”).
Pointer

Cross border data transfer Requirements: Under Article 23, any organization can transfer data collected within Oman outside the country if it follows the directives issued by the Ministry of Communications. However, such transfers are prohibited if there is a chance that the transfer of such data may cause harm to a data subject under this law.

Pointer

Data Breach Requirements: Per Article 19, the data controller is obligated, in the event of a breach of personal data, which leads to its destruction, alteration, disclosure, access, or unlawful processing, to inform the Ministry and the owner of personal data about the breach.

Pointer

Fulfillment of Data Subject rights: Data subjects have a series of rights conferred upon them by the oman's PDPL, for instance right to know, right to data portability, right to be forgotten, individual data subjects raise various requests pertaining to their individual data subject rights. PDPL for.

Win-Win Situation

Solutions

Ardent Privacy’s Solutions relating to the above mentioned challenges:

Pointer

Data discovery, inventory and mapping: Our AI-based, patented solution, TurtleShield PI (Privacy Intelligence) discovers all personal and sensitive data in structured and unstructured data systems across on-premises and multi-cloud environments.
TurtleShield DI (Data Inventory) enables organizations to inventory & map their entire “Data footprint”, enabling them to protect what matters the most.

Pointer

Third party “Privacy Intelligence” (monitors third party sharing): Often there are silos within entities or business and IT teams and it is challenging to get a full picture of data going outside organization and which is coming into organization, especially when data is shared with third parties, vendors, business partners and much more. Our TurtleShield PI (Privacy Intelligence) creates a data map based on your “data sharing”, to facilitate you to take action on it.

Pointer

“Data Minimization”: TurtleShield DM (Data Minimization) helps businesses minimize excess data and adhere to data minimization legal requirements. This is data hygiene control and we are approaching it from a risk reduction and compliance perspective. We scan large data sets for excess data using Machine Learning, removing unnecessary and irrelevant personal data. Removing this data reduces costs by eliminating operational inefficiencies and ensuring compliance with regulatory mandates.

Pointer

“Right to be Forgotten (RTBF)” with Assured Deletion: With TurtleShield RTBF, businesses can easily comply with the CTDPA 's right to deletion by giving them the ability to delete data on request with recorded validation of the deletion.

Pointer

Enable Data subject rights with cost savings and compliance in totality: The assumption that data only exists in databases and nowhere else is often not reality, as customer data exists in many sources. Using Machine Learning and AI we predict where PII can exist, giving the ability to quickly fulfill data subject requests across the totality of large datasets, improving the speed and completeness of CTDPA request compliance.

Featured News & Blogs

Be the first to catch our latest updates,
happenings and more.

Follow us