Professional Documents
Culture Documents
POI Data Privacy Protection ONLINE
POI Data Privacy Protection ONLINE
Rationale:
The declaration of Republic Act 10173 protects the fundamental human right of privacy of
communication while ensuring the free flow of information to promote innovation and
growth. The State recognizes the vital role of information and communications technology in
nation‐building and its inherent obligation to ensure that personal information in information
and communications systems in the government and in the private sector are secured and
protected.
Republic Act 10844, identifies the power and responsibilities of the Department of Information
and Communications Technology (DICT) and under its Section 2 has listed down the policy
of the state or government related to Data Privacy, namely:
1. To ensure the rights of individuals to privacy and confidentiality of their personal information;
2. To ensure the security of critical ICT infrastructures including information assets of the government,
individuals, and businesses; and
3. To provide oversight over agencies governing and regulating the ICT sector and ensure consumer
protection and welfare, data privacy and security, foster competition, and the growth of the ICT sector.
Under section 6, Consumer Protection and Industry Development, the Department shall
exercise the following powers and functions:
1. Ensure and protect the rights and welfare of consumers and business users to privacy, security, and
confidentiality in matters relating to ICT, in coordination with agencies concerned, the private sector,
and relevant international bodies.
Description:
The Data Privacy Protection training is an online learning to enable the person or entity, which
are mandated to be accountable and responsible in the implementation of R.A. 10173 – Data
Privacy Act of 2012, to understand, decide, and act on the rules and standards of data privacy
protection and personal information security.
The implementation rules and regulation of R.A. 10173, Data Privacy Act of 2012, in particular
Rule VI. Security Measures for the Protection of Personal Data has identified the protection
requirements that the Personal Information Controller and Processor are obligated to execute
in order to provide evidence that the privacy of the personal information will not be violated
in the information and communication system of government agencies and private
organizations.
The training on data privacy protection identifies and elaborates the knowledge, skills, and
attitudes that make the Personal Information Controller and Processor achieve the following
objectives of R.A. 10173 – implementing rules and regulations.
1. Mitigate data privacy violations
2. Organize data privacy governance and oversight
3. Apply the principles of privacy protection in the data processing system
The learning process involves the use of existing rules, regulations, and issuance related to
R.A. 10173 implementation, and the globally cited and accepted standards in order to establish
the underpinning knowledge to plan‐do‐check‐act the management of data privacy and
information security.
The online instruction provides the presentation and demonstration of how to understand and
act on the obligations of protecting the individual’s personal information in the information
and communication system of the government and private sector. The learning engagement
elicits, elaborates, analyzes, and documents the valid, verifiable, acceptable, and actionable
normative references of performance.
Methodology:
The course is composed of comprehensive lectures that will be conducted Online via Zoom
meetings.
Post‐evaluation forms will be given to the participants. These will serve as the basis for
evaluating: 1) a change in the level of knowledge of the participants; 2) the effectiveness of the
training; 3) the conduciveness of the platforms used, and 4) the efficiency of the instructor.
A Certificate of Participation will be issued to participants who have attended at least 80% of
the total duration of the seminar and submit the training workshop requirements.
A Certificate of Attendance will be given to those who have attended at least 80% of the total
training hours and failed to submit the training workshop requirements.
Target Participants:
Target participants for Digital Workforce Training are for Government Workforce only who
are obligated by the data privacy rules to be accountable and responsible for:
A. MANPOWER
● Course Resource Person
● Facilities Assistant / Technical Support
B. FACILITIES/ EQUIPMENT
● Laptops / Desktops with Browsers Mozilla Firefox, Microsoft Edge, or Google Chrome
● Stable Internet Connection
● Headphones
C. MATERIALS
● Visual Presentations
● Registration Materials ‐ Training Attendance Sheet
● Evaluation and Completion Materials including the following:
Evaluation Form
· Certificates (Attendance and Participation)
· Certificate of Appreciation for the Resource Person
Module Instructional
Topics or Module/s:
Number Materials
Expected Output:
Prepared by:
Digitally signed by
Sagaydoro Sheryl
Nacino
SHERYL N. SAGAYDORO
ILCDB, Project Development Officer II
Noted by:
Digitally signed by
Gazzingan Cirilo Jr
Nacino
Recommending Approval:
Digitally signed by
Gomez Magdalena
Dacuycuy
Approved by:
Digitally signed by
Jimenez Pinky
Tumaliuan