RFBT.3408 Ipl Eca Dpa PDF
RFBT.3408 Ipl Eca Dpa PDF
Since 1977
RFBT.3408 VILLEGAS/APRADO/MAGUMUN
IPL (RA 8293), ECA (RA 8792), DPA (RA 10173) MAY 2023
First-to-File Rule – patent shall belong to the person Derivative Works – alteration of literary and
who filed an application for such invention. artistic works
Remedies for Patent Infringement Doctrine of Fair Use1 – fair use of copyright for
criticism, comment, news reporting, teaching
a. Action for damages including multiple copies for classroom use,
b. Injunction scholarship, research, and similar purposes is NOT
c. Disposal or Destruction by court’s order of the an infringement of copyright.
infringing goods
1
Permitted Reproduction: • one (1) back-up copy or adaptation of a computer
• private reproduction in a single copy made by a natural program by the lawful owner thereof.
person exclusively for research and private study;
• reprograhic reproduction by libraries;
b. Utility model
Rights related to copyright (Neighboring rights): c. Industrial design
d. Copyright
• Rights of performers
e. Lay-out design
• Rights of phonogram producers
• Rights of broadcasting organizations
8. The term of protection for Utility Model is –
a. 5 years from the date of filing of the application
F. Remedies in Case of Infringement b. 7 years from the date of filing of the application
c. 10 years from the date of the filing of the
1. Injunction application
2. Damages and Indemnity d. 20 years from the date of the filing of the
3. Impounding, confiscation and Destruction application
e. 50 years from the date of the filing of the
application
IPL MC QUESTIONS
9. The term of protection for a lay-out design of an
1. The Intellectual Property Office has the following integrated circuit is –
functions, except: a. 5 years
a. Examine applications: patents, utility models, b. 7 years
industrial designs, marks, geographic indications, c. 10 years
integrated circuits d. 20 years
b. Register technology transfer arrangements & settle e. 50 years
disputes involving payments
c. Promote use of patent information 10. The term of protection for trademark is –
d. Publish undisclosed information relevant to the a. 5 years
industry b. 7 years
e. Adjudicate proceedings affecting IPRs c. 10 years
d. 20 years
2. The term of patent is – e. 50 years
a. 5 years from the date of filing of the application
b. 7 years from the date of filing of the application 11. The following are two criteria for trademark, except:
c. 10 years from the date of the filing of the a. novelty
application b. Distinctive
d. 20 years from the date of the filing of the c. Not deceptive
application d. Answer not given
e. 50 years from the date of the filing of the
application 12. – A mark distinguishing the goods or services of
members of the association which is the proprietor of
3. The following are the three criteria to be patentable, the mark from those of other undertakings.
except: a. Collective mark
a. Novelty b. Certification mark
b. Inventive step c. Service mark
c. Territoriality d. Trademark
d. Industrially applicable e. Logo
4. It is the criterion in patent that it is not obvious to a 13. It is the legal protection extended to the owner of the
person skilled in the art at the time of the filing date or rights in an original work.
priority date of the application claiming the invention. a. Patent
a. Novelty b. Copyright
b. Inventive step c. Trademark
c. Territoriality d. Service mark
d. Industrially applicable e. Geographical Indication
5. The following are not patentable, except: 14. The term of protection of copyright is –
a. technical solution to a problem a. 5 years
b. discovery of a new plant b. 7 years
c. machines that defy laws of nature c. 10 years
d. scientific theories, mathematical methods d. 20 years
e. schemes, rules of methods, playing games e. 50 years
6. The following are criteria for the Utility model, except: 15. Alteration of the literary & artistic works, works that are
a. New derived from other existing sources.
b. Industrially applicable a. Economic Right
c. Inventive step b. Moral Right
d. Territoriality c. IP right
e. Both c and d d. Derivative Right
e. Right of Exclusion
7. It is any composition of lines or colors or any three-
dimensional form, whether or not associated with lines 16. The right to make any alterations, object to any
or colors, provided, that such composition or form gives distortion, restrain the use of his name
a special appearance to and can serve as pattern for an a. Economic Right
industrial product or handicraft. b. Moral Right
a. Prior art c. IP right
d. Derivative Right
e. Right of Exclusion 26. A patent is any technical solution of a problem in any
field of human activity which is:
17. The following are the Related Rights in Copyright, a. industrially applicable.
except: b. involves an inventive step
a. Rights of performers c. new
b. Rights of phonogram producers d. all of the above
c. Rights of broadcasting organizations
d. Rights of authorship 27. Thomas invented a device which, through the use of
noise, can recharge a cellphone battery. He applied for and
18. Infringement of a patent prescribes in __ years from the was granted a patent on his device, effective within the
date of the commission of the crime. Philippines. As it turns out, a year before the grant of
a. 2 years Thomas’ patent, Neil, also an inventor, invented a similar
b. 3 years device which he used in his cellphone business in Manila.
c. 4 years But Thomas files an injunctive suit against Neil to stop him
d. 5 years from using the device on the ground of patent infringement.
e. 10 years Will the suit prosper?
a. No, since the correct remedy for Thomas is a civil
19. No damages can be recovered for acts of infringement action for damages.
of a patent committed more than __ years before the b. No, since Neil is a prior user in good faith.
institution of the action for infringement. c. Yes, since Thomas is the first to register his device
a. 2 years for patent registration.
b. 3 years d. Yes, since Neil unwittingly used Thomas’ patented
c. 4 years invention.
d. 5 years
e. 10 years 28. Under this doctrine, infringement of patent occurs when
a device appropriates a prior invention by incorporating its
20. Act of selling the goods that have been clothed with a innovative concept and albeit with some modifications and
general appearance of the goods of another which is change performs the same function in substantially the
likely to deceive the ordinary purchaser exercising same way to achieve the same result.
ordinary care a. Doctrine of Prior Patent
a. Infringement b. Doctrine of Similarity
b. Piracy c. Doctrine of Equivalents
c. Estafa d. Doctrine of Substantiality
d. Unfair Competition
e. Illegal exaction 29. “Eagleson Refillers, Co.,” a firm that sells water to the
public, opposes the trade name application of “Eagleson
21. Statutory fair uses and criticisms, comment, news Laundry, Co.,” on the ground that such trade name tends to
reporting, teaching, scholarship, research, deceive trade circles or confuse the public with respect to
decompilation fall under what right in Copyright – the water firm’s registered trade name. Will the opposition
a. Economic Right prosper?
b. Derivative Right a. Yes, since such use is likely to deceive or confuse
c. Moral Right the public.
d. Fair use b. Yes, since both companies use water in conducting
e. Fair play their business.
c. No, since the companies are not engaged in the
22. The following are Economic Rights, except; same line of business.
a. reproduction d. No, since the root word “Eagle” is a generic name
b. transformation not subject to registration.
c. first public distribution
d. public performance 30. The “test of dominancy” in the Law on Trademarks, is
e. make any alterations a way to determine whether there exists an infringement
of a trademark by:
23. The following are derivative works, except: a. Determining if the use of the mark has been
a. translations of works into different languages dominant in the market.
b. Adaptation of works b. Focusing on the similarity of the prevalent features
c. Arrangement of music of the competing marks which might create confusion.
d. Abridgement of a novel c. Looking at the mark whether they are similar in
e. Right of transformation size, form or color.
d. Looking at the mark whether there is one specific
24. This intellectual property is protected from the moment feature that is dominant.
of its creation.
a. Trademark 31. Under the Intellectual Property Code, lectures, sermons,
b. Service mark addresses or dissertations prepared for oral delivery,
c. Patent whether or not reduced in writing or other material forms,
d. Copyright are regarded as:
e. Geographical Indication a. Non-original works.
b. Derivative works
25. The oldest law in Copyright Law. c. Original works.
a. Berne Convention d. Not subject to protection.
b. Rome Convention
c. TRIPS Agreement 32. Alden came up with a new way of presenting a telephone
d. WIPO Copyright Treaty directory in a mobile phone, which he dubbed as the
“digiTel” and which uses lesser time for locating names and recognize the authenticity and reliability of electronic
telephone numbers. May Alden have his “digiTel” documents related to such activities and to promote the
copyrighted in his name? universal use of electronic transaction in the government
a. No, because it is a mere system or method. and general public. (Sec. 3, RA 8792)
b. Yes, because it is an original creation.
c. Yes, because it entailed the application of 2. Application
Alden’s intellect.
d. No, because it did not entail any application of The law shall apply to any kind of data message and
Alden’s intellect. electronic document used in the context of commercial and
non-commercial activities to include domestic and
33. Zion, a junior accountant in XYZ Auditing Firm, wrote a international dealings, transactions, arrangements,
newspaper publisher a letter disputing a columnist’s claim agreements contracts and exchanges and storage of
about an incident in the accountant’s family. Zion used the information.
auditing firm’s letterhead and its computer in preparing the
letter. T also requested the firm’s messenger to deliver the 3. Definition of Terms
letter to the publisher. Who owns the copyright to the letter?
a. Zion, since he is the original creator of the "Electronic Data Message" refers to information generated,
contents of the letter. sent, received or stored by electronic, optical or similar
b. Both Zion and the publisher, one wrote the means.
letter to the other who has possession of it.
c. The auditing firm since it was an employee and "Information and Communications System" refers to a
he wrote it on the firm’s letterhead. system intended for and capable of generating, sending,
d. The publisher to whom the letter was sent. receiving, storing, or otherwise processing electronic data
messages or electronic documents and includes the
34. Luigi’s painting of Madonna and Child was used by her computer system or other similar device by or in which data
mother to print some personalized gift wrapper. As part of is recorded or stored and any procedures related to the
her mother’s efforts to raise funds for a charity, the mother recording or storage of electronic data message or
of Luigi sold the wrapper to friends. Dimitri, an electronic document.
entrepreneur, liked the painting in the wrapper and made
many copies and sold the same through National Bookstore. "Electronic Signature" refers to any distinctive mark,
Which statement is most accurate? characteristic and/or sound in electronic form, representing
a. Dimitri can use the painting for his use the identity of a person and attached to or logically
because this is not a copyrightable material. associated with the electronic data message or electronic
b. Luigi can sue Dimitri for infringement because document or any methodology or procedures employed or
artistic works are protected from the moment adopted by a person and executed or adopted by such
of creation. person with the intention of authenticating or approving an
c. Works of art need to be copyrighted also to get electronic data message or electronic document.
protection under the law.
d. Dimitri can use the drawing even though not "Electronic Document" refers to information or the
copyrighted because it is already a public representation of information, data, figures, symbols or
property having been published already. other modes of written expression, described or however
represented, by which a right is established or an obligation
35. Copyright shall last during the lifetime of the author and extinguished, or by which a fact may be prove and affirmed,
___ years after his death. which is receive, recorded, transmitted, stored, processed,
a. 10 years retrieved or produced electronically. (Section 5, RA 8792)
b. 50 years Note: the term "electronic document" may be used
c. 20 years interchangeably with "electronic data message". (A.M. No.
d. 100 years 01-7-01-SC)
37. Term of protection of Utility model "Digital signature" refers to an electronic signature
a. 5 years consisting of a transformation of an electronic document or
b. 7 years an electronic data message using an asymmetric or public
c. 10 years cryptosystem such that a person having the initial
d. 20 years untransformed electronic document and the signer's public
key can accurately determine:
1. Principles
ii. whether the initial electronic document had been
The law aims to facilitate domestic and international altered after the transformation was made.
dealings, transactions, arrangements agreements,
contracts and exchanges and storage of information 4. Legal Recognition And Communication Of
through the utilization of electronic, optical and similar Electronic Data Message And Electronic
medium, mode, instrumentality and technology to Documents
Legal Recognition of Electronic Data Messages or The electronic transactions made through networking
Documents among banks, or linkages thereof with other entities or
networks, and vice versa, shall be deemed consummated
In cases of documents and signatures in electric form, the upon the actual dispensing of cash, or the debit of one
information shall not be denied legal effect, validity or account, and the corresponding credit to another, whether
enforceability solely on the grounds that it is in the data such transaction is initiated by the depositor, or by an
message purporting to give rise to such legal effect, or that authorized collecting party. The obligation of one bank,
it is merely referred to in that electronic data message (Sec. entity, or person similarly situated to another arising
6, RA 8792). For evidentiary purposes, an electronic therefrom shall be considered absolute, and shall not be
document shall be the functional equivalent of a written subjected to the process of preference of credits (Sec. 16
document under existing laws (Sec. 7 of RA 8792). (2) of RA 8792).
On the other hand, as to electronic signature placed on the
electronic document, it shall be equivalent to the signature 5. Electronic Commerce in Carriage of Goods
of a person on a written document if that signature is proved
by showing that a prescribed procedure, not alterable by the
parties interested in the electronic document, existed under This applies to any action in connection with, or in
which: pursuance of, a contract of carriage of goods, including but
not limited to:
a. (i) Furnishing the marks, number, quantity or
a. A method is used to identify the party sought to be weight of goods; (ii) stating or declaring the nature
bound and to indicate said party’s access to the or value of goods; (iii) issuing a receipt for goods;
electronic document necessary for his consent or (iv) confirming that goods have been loaded;
approval through the electronic signature; b. (i) Notifying a person of terms and conditions of the
b. Said method is reliable and appropriate for the purpose
contract; (ii) giving instructions to a carrier;
for which the electronic document was generated or
c. (i) Claiming delivery of goods; (ii) authorizing
communicated, in the light of all circumstances,
including any relevant agreement; release of goods; (iii) giving notice of loss of, or
c. It is necessary for the party sought to be bound, in or damage to goods;
order to proceed further with the transaction, to have d. Giving any other notice or statement in connection
executed or provided the electronic signature; and with the performance of the contract;
d. The other party is authorized and enabled to verify the e. Undertaking to deliver goods to a named person or
electronic signature and to make the decision to a person authorized to claim delivery;
proceed with the transaction authenticated by the f. Granting, acquiring, renouncing, surrendering,
same. (Sec. 7 of RA 8792) transferring or negotiating rights in goods; and
g. Acquiring or transferring rights and obligations
In furtherance of the support in favor of the recognition under the contract (Sec. 25, RA 8792).
of electronic signature, it shall be presumed that electronic
signature is the signature of the person to whom it Transport of Goods
correlates and it was affixed by that person with the
intention of signing or approving the electronic document In the transport of the goods to the buyer or recipient, RA
unless the person relying on the electronically signed 8792 provides:
electronic document knows or has noticed of defects in or
unreliability of the signature or reliance on the electronic 1. Where the law requires that any action referred to
signature is not reasonable under the circumstances (Sec. contract of carriage of goods be carried out in writing or
8 of RA 8792). by using a paper document, that requirement is met if
the action is carried out by using one or more data
Communication of Electronic Data Messages or messages or electronic documents.
Documents 2. The preceding paragraph applies whether the
requirement therein is in the form of an obligation or
Under the Civil Code of the Philippines, all contracts have whether the law simply provides consequences for
three (3) essential elements, these are, consent of the failing either to carry out the action in writing or to use
contracting parties, the object which is the subject matter a paper document.
of the contract and cause of the obligation which is 3. If a right is to be granted to, or an obligation is to be
established (Article 1318 of the Civil Code). Consent is acquired by, one person and no person, and if the law
manifested by the meeting of the offer and the acceptance requires that, in order to effect this, the right or
upon the thing and the cause which are to constitute the obligation must be conveyed to that person by the
contract (1319 of the Civil Code). Under RA 8792, except transfer, or use of, a paper document, that requirement
when otherwise agreed by the parties, an offer and its is met if the right or obligation is conveyed by using one
acceptance and such other elements for the formation of or more electronic data messages or electronic
contracts may be expressed, demonstrated, and proved by documents unique;
means of electronic data messages or electronic documents. 4. For the purposes of paragraph (3), the standard of
No contract shall be denied validity or enforceability on the reliability required shall be assessed in the light of the
sole ground that it is in the form of an electronic data purpose for which the right or obligation was conveyed
message or electronic document, or that any or all of the and in the light of all the circumstances, including any
elements required under existing laws for the formation of relevant agreement.
contracts is expressed, demonstrated and proved by means 5. Where one or more data messages are used to effect
of electronic data messages or electronic documents (Sec. any action in undertaking to deliver goods to a named
16 (1) of RA 8792). person or a person authorized to claim delivery or in
granting, acquiring, renouncing, surrendering,
Consummation of the Transaction Through Electronic transferring or negotiating rights in goods, no paper
Messages or Documents document used to effect any such action is valid unless
the use of electronic data message or electronic
document has been terminated and replaced by the
used of paper documents. A paper document issued in 6) the full or limited use of the documents and
these circumstances shall contain a statement of such papers for compliance with the government
termination. The replacement of the electronic data requirements: Provided, that this Act shall be itself
messages or electronic documents by paper documents mandate any department of the government, organ
shall not affect the rights or obligation of the parties of state or statutory corporation to accept or issue
involved. any document in the form of electronic data
6. If a rule of laws is compulsorily applicable to a contract messages or electronic documents upon the
of carriage of goods which is in, or is evidenced by, a adoption, promulgation and publication of the
paper document, that rule shall not be inapplicable to appropriate rules, regulations or guidelines. (Sec.
such a contract of carriage of goods which is evidenced 27, RA 8792)
by one or more electronic data messages or electronic
documents by reason of the fact that the contract is
evidenced by such electronic data messages or E-COMMERCE ACT MC QUESTIONS
electronic documents instead of by a paper document. (RA 8792)
a. Legal recognition of electronic documents Sensitive Personal Information- The term “sensitive
b. Use in transactions involving carriage of goods personal information” refers to personal information:
c. Admissibility as evidence
d. Permanent insurance fund 1. About an individual’s race, ethnic origin, marital
e. Electronic transactions in government status, age, color, and religious, philosophical or
political affiliations;
7. This refers to information generated, sent, received or 2. About an individual’s health, education, genetic or
stored by electronic, optical or similar means. sexual life of a person, or to any proceeding for any
a. Electronic document offense committed or alleged to have been
b. Electronic signature committed by such person, the disposal of such
c. Electronic data message proceedings, or the sentence of any court in such
d. Electronic contract proceedings;
3. Issued by government agencies peculiar to an
8. Electronic transactions made through networking among individual which includes, but not limited to, social
banks is deemed consummated upon: security numbers, previous or current health
a. receipt of the email confirmation about the records, licenses or its denials, suspension or
transaction. revocation, and tax returns; and
b. sending the confirmation code to the bank. 4. Specifically established by an executive order or an
c. the actual dispensing of cash or the debit of act of Congress to be kept classified.
one account and the corresponding credit to
another. Privileged information refers to any and all forms of data
d. placing of electronic signature in the electronic which under the Rides of Court and other pertinent laws
document. constitute privileged communication.
9. I. Another term for hacking is cracking. Personal information controller refers to a person or
II. The introduction of computer viruses is also organization who controls the collection, holding, processing
categorize as hacking. or use of personal information, including a person or
organization who instructs another person or organization
a. Both statements are correct. to collect, hold, process, use, transfer or disclose personal
b. Both statements are incorrect. information on his or her behalf. The term excludes:
c. Statement I is correct while statement II is
incorrect.
(1) A person or organization who performs such functions
d. Statement I is incorrect while statement II is
as instructed by another person or organization; and
correct.
10. It is the unauthorized copying, reproduction, alteration (2) An individual who collects, holds, processes or uses
and importation of protected material. personal information in connection with the individual’s
a. Photocopying personal, family or household affairs.
b. Cracking
c. Piracy Personal information processor refers to any natural or
d. Hacking juridical person qualified to act as such under this Act to
whom a personal information controller may outsource the
11. The following are the illegal activities under E- processing of personal data pertaining to a data subject.
Commerce Act except:
a. Hacking Processing refers to any operation or any set of operations
b. Photocopying performed upon personal information including, but not
c. Piracy limited to, the collection, recording, organization, storage,
d. Violation of Consumer Act updating or modification, retrieval, consultation, use,
consolidation, blocking, erasure or destruction of data.
2. SCOPE OF APPLICATION
Data Privacy Act (RA 10173)
Who is covered by DPA
1. DEFINITION
Natural or personal person, government or private.
Data Subject- Section 3(c) of the DPA defines a data
subject as “an individual whose personal information is When DPA will not apply?
processed.” The IRR of the DPA is more specific when it
declares that the term refers to “an individual whose
(a) Information about any individual who is or was an officer
personal, sensitive personal, or privileged information is
or employee of a government institution that relates to the
processed.”
position or functions of the individual, including:
Personal Information- The term “personal information”
(1) The fact that the individual is or was an officer
refers to any information whether recorded in a material
or employee of the government institution;
form or not, from which the identity of an individual is
(2) The title, business address and office telephone
apparent or can be reasonably and directly ascertained by number of the individual;
the entity holding the information, or when put together
(3) The classification, salary range and
with other information would directly and certainly identify responsibilities of the position held by the
an individual.
individual; and
(4) The name of the individual on a document Information must be collected for specified and legitimate
prepared by the individual in the course of purposes determined and declared, and later processed in
employment with the government; a way compatible with such declared, specified and
legitimate purposes only.
(b) Information about an individual who is or was The collection and processing of information must not be
performing service under contract for a government contrary law, morals, or public policy.
institution that relates to the services performed, including c. Principle of Proportionality
the terms of the contract, and the name of the individual
given in the course of the performance of those services; Personal Information to be collected and processed must be
Accurate, relevant and, where necessary for purposes for
(c) Information relating to any discretionary benefit of a which it is to be used the processing of personal
financial nature such as the granting of a license or permit information, kept up to date.
given by the government to an individual, including the Adequate and not excessive in relation to the purposes for
name of the individual and the exact nature of the benefit; which they are collected and processed.
regulations do not require the consent of the data compliance with applicable laws and regulations for
subject for the processing, and guarantee the the protection of data privacy and security.
protection of personal data; b. Data Protection Policies. Any natural or juridical
c. The processing is necessary to protect the life and person or other body involved in the processing of
health of the data subject or another person, and personal data shall implement appropriate data
the data subject is not legally or physically able to protection policies that provide for organization,
express his or her consent prior to the processing; physical, and technical security measures, and, for
d. The processing is necessary to achieve the lawful such purpose, take into account the nature, scope,
and noncommercial objectives of public context and purposes of the processing, as well as
organizations and their associations provided that: the risks posed to the rights and freedoms of data
subjects.
1. Processing is confined and related to the bona fide
members of these organizations or their 1. The policies shall implement data protection
associations; principles both at the time of the determination
2. The sensitive personal information are not of the means for processing and at the time of
transferred to third parties; and the processing itself
3. Consent of the data subject was obtained prior to 2. The policies shall implement appropriate
processing; security measures that, by default, ensure only
personal data which is necessary for the
e. The processing is necessary for the purpose of specified purpose of the processing are
medical treatment: Provided, that it is carried out processed. They shall determine the amount of
by a medical practitioner or a medical treatment personal data collected, including the extent of
institution, and an adequate level of protection of processing involved, the period of their storage,
personal data is ensured; or and their accessibility.
f. The processing concerns sensitive personal 3. The polices shall provide for documentation,
information or privileged information necessary for regular review, evaluation, and updating of the
the protection of lawful rights and interests of privacy and security policies and practices.
natural or legal persons in court proceedings, or the
establishment, exercise, or defense of legal claims, c. Records of Processing Activities. Any natural or
or when provided to government or public authority juridical person or other body involved in the
pursuant to a constitutional or statutory mandate. processing of personal data shall maintain records
that sufficiently describe its data processing
system, and identify the duties and responsibilities
5. SECURITY MEASURES FOR PROTECTION OF
of those individuals who will have access to personal
PERSONAL DATA
data. Records should include:
Data Privacy and Security
1. Information about the purpose of the
processing of personal data, including any
Personal information controllers and personal information
intended future processing or data sharing;
processors shall implement reasonable and appropriate
2. A description of all categories of data subjects,
organizational, physical, and technical security measures
personal data, and recipients of such personal
for the protection of personal data.
data that will be involved in the processing;
3. General information about the data flow within
The personal information controller and personal the organization, from the time of collection,
information processor shall take steps to ensure that any processing, and retention, including the time
natural person acting under their authority and who has limits for disposal or erasure of personal data;
access to personal data, does not process them except upon 4. A general description of the organizational,
their instructions, or as required by law. physical, and technical security measures in
place;
The security measures shall aim to maintain the availability, 5. The name and contact details of the personal
integrity, and confidentiality of personal data and are information controller and, where applicable,
intended for the protection of personal data against any the joint controller, the its representative, and
accidental or unlawful destruction, alteration, and the compliance officer or Data Protection
disclosure, as well as against any other unlawful processing. Officer, or any other individual or individuals
These measures shall be implemented to protect personal accountable for ensuring compliance with the
data against natural dangers such as accidental loss or applicable laws and regulations for the
destruction, and human dangers such as unlawful access, protection of data privacy and security.
fraudulent misuse, unlawful destruction, alteration and
contamination. d. Management of Human Resources. Any natural or
juridical person or other entity involved in the
Organizational Security Measures processing of personal data shall be responsible for
selecting and supervising its employees, agents, or
Where appropriate, personal information controllers and representatives, particularly those who will have
personal information processors shall comply with the access to personal data.
following guidelines for organizational security:
The said employees, agents, or representatives
a. Compliance Officers. Any natural or juridical person shall operate and hold personal data under strict
or other body involved in the processing of personal confidentiality if the personal data are not intended
data shall designate an individual or individuals who for public disclosure. This obligation shall continue
shall function as data protection officer, compliance even after leaving the public service, transferring to
officer or otherwise be accountable for ensuring another position, or upon terminating their
employment or contractual relations. There shall be
capacity building, orientation or training programs (1) Contents of his or her personal information that
for such employees, agents or representatives, were processed;
regarding privacy or security policies. (2) Sources from which personal information were
obtained;
e. Processing of Personal Data. Any natural or juridical (3) Names and addresses of recipients of the personal
person or other body involved in the processing of information;
personal data shall develop, implement and review: (4) Manner by which such data were processed;
(5) Reasons for the disclosure of the personal
information to recipients;
1. A procedure for the collection of personal data,
(6) Information on automated processes where the
including procedures for obtaining consent, when
data will or likely to be made as the sole basis for
applicable;
any decision significantly affecting or will affect the
2. Procedures that limit the processing of data, to
data subject;
ensure that it is only to the extent necessary for the
(7) Date when his or her personal information
declared, specified, and legitimate purpose;
concerning the data subject were last accessed and
3. Policies for access management, system
modified; and
monitoring, and protocols to follow during security
(8) The designation, or name or identity and address of
incidents or technical problems;
the personal information controller.
4. Policies and procedures for data subjects to exercise
their rights under the Act;
c. Right to Correct/Rectify
5. Data retention schedule, including timeline or
conditions for erasure or disposal of records.
Dispute the inaccuracy or error in the personal information
and have the personal information controller correct it
f. Contracts with Personal Information Processors.
immediately and accordingly, unless the request is
The personal information controller, through
vexatious or otherwise unreasonable. If the personal
appropriate contractual agreements, shall ensure
information have been corrected, the personal information
that its personal information processors, where
controller shall ensure the accessibility of both the new and
applicable, shall also implement the security
the retracted information and the simultaneous receipt of
measures required by the Act and these Rules. It
the new and the retracted information by recipients thereof:
shall only engage those personal information
Provided, That the third parties who have previously
processors that provide sufficient guarantees to
received such processed personal information shall he
implement appropriate security measures specified
informed of its inaccuracy and its rectification upon
in the Act and these Rules, and ensure the
reasonable request of the data subject.
protection of the rights of the data subject.
d. Right to Erasure/Blocking
6. Rights of Data Subject
If any of the violation under the DPA has been committed: be in the public interest, or in the interest of the
1. unlawful processing 2. malicious or unauthorized affected data subjects.
disclosure disclosure 3. improper disposal 4. processing for c. The Commission may authorize postponement of
unauthorized purpose 5. unauthorized access 6. intentional notification where it may hinder the progress of a
breach. criminal investigation related to a serious breach.
1. Process the personal data only upon the 1. The name and address of the personal information
documented instructions of the personal controller or personal information processor, and of
information controller, including transfers of its representative, if any, including their contact
personal data to another country or an details;
international organization, unless such transfer 2. The purpose or purposes of the processing, and
is authorized by law; whether processing is being done under an
2. Ensure that an obligation of confidentiality is outsourcing or subcontracting agreement;
imposed on persons authorized to process the 3. A description of the category or categories of data
personal data; subjects, and of the data or categories of data
3. Implement appropriate security measures and relating to them;
comply with the Act, these Rules, and other 4. The recipients or categories of recipients to whom
issuances of the Commission; the data might be disclosed;
4. Not engage another processor without prior 5. Proposed transfers of personal data outside the
instruction from the personal information Philippines;
controller: Provided, that any such arrangement 6. A general description of privacy and security
shall ensure that the same obligations for data measures for data protection;
protection under the contract or legal act are 7. Brief description of the data processing system;
implemented, taking into account the nature of 8. Copy of all policies relating to data governance, data
the processing; privacy, and information security;
5. Assist the personal information controller, by 9. Attestation to all certifications attained that are
appropriate technical and organizational related to information and communications
measures and to the extent possible, fulfill the processing; and
obligation to respond to requests by data 10. Name and contact details of the compliance or data
subjects relative to the exercise of their rights; protection officer, which shall immediately be
6. Assist the personal information controller in updated in case of changes.
ensuring compliance with the Act, these Rules,
other relevant laws, and other issuances of the b. The procedure for registration shall be in accordance with
Commission, taking into account the nature of these Rules and other issuances of the Commission.
processing and the information available to the
personal information processor;
DATA PRIVACY LAW MC QUESTIONS
7. At the choice of the personal information
(RA 10173)
controller, delete or return all personal data to
the personal information controller after the end
1. The right protected under the 1987 Constitution
of the provision of services relating to the
insofar as the Data Privacy Law is concerned is –
processing: Provided, that this includes deleting
a. Right against unreasonable searches and seizure
existing copies unless storage is authorized by
b. Right to travel
the Act or another law;
c. Right against involuntary servitude
8. Make available to the personal information
d. Right against ex post facto law
controller all information necessary to
e. Right to privacy
demonstrate compliance with the obligations
laid down in the Act, and allow for and
2. The consent of the data subject must be freely given,
contribute to audits, including inspections,
specific,____________indication of the will, whereby
conducted by the personal information
the data subject agrees to the collection and processing
controller or another auditor mandated by the
of personal information about and/or relating to him or
latter;
her.
9. Immediately inform the personal information
a. learned
controller if, in its opinion, an instruction
b. informed
infringes the Act, these Rules, or any other
c. careful
issuance of the Commission.
d. analyzed
e. thorough
Duty of personal information processor
3. It refers to a system for generating, sending, receiving,
The personal information processor shall comply with the storing or otherwise processing electronic data
requirements of the Act, these Rules, other applicable laws, messages or electronic documents and includes the
and other issuances of the Commission, in addition to computer system or other similar device by or which
obligations provided in a contract, or other legal act with a data is recorded, transmitted or stored and any
personal information controller. procedure related to the recording, transmission or
storage of electronic data, electronic message, or
9. REGISTRATION AND COMPLIANCE electronic document.
REQUIREMENTS a. Filing system
b. data processing system
c. Information and communication system
The personal information controller or personal information
d. processing
processor that employs fewer than two hundred fifty (250)
persons shall not be required to register unless the
4. It refers to any act of information relating to natural or
processing it carries out is likely to pose a risk to the rights
juridical persons to the extent that, although the
and freedoms of data subjects, the processing is not
information is not processed by equipment operating
occasional, or the processing includes sensitive personal
automatically in response to instructions given for that
information of at least one thousand (1,000) individuals.
purpose, the set is structured, either by reference to
individuals or by reference to criteria relating to
a. The contents of registration shall include:
individuals, in such a way that specific information
relating to a particular person is readily accessible.
11. Each personal information controller is responsible for 19. It is act of disclosing to a third party personal
personal information under its control or custody, information not covered by the immediately preceding
including information that have been transferred to a section without the consent of the data subject.
third party for processing, whether domestically or a. malicious disclosure
internationally, subject to cross-border arrangement b. personal disclosure
and cooperation. c. unauthorized disclosure
a. Principle of Subsidiary d. impeded disclosure
b. Principle of Confidentiality e. illegal disclosure
c. Principle of Accountability
20. The year the Data Privacy Law took effect offers you struggles but keep on fighting until you see
a. 2010 d. 2013 success.
b. 2011 e. 2014
c. 2012
End of RFBT.3408
21. It is the commission referred in the Data Privacy Act.
a. National Data Privacy Council
b. National Privacy Commission
c. National Information Privacy Commission
d. National Data Privacy Commission
23. The Data Privacy Act does not apply to the following
except:
a. Personal information processed for journalistic,
artistic, literary or research purposes
b. Information about any individual who is or was
an officer or employee of a government
institution that relates to the position or
functions of the individual.
c. Information necessary in order to carry out the
functions of public authority
d. Information processed by personal information
controllers