It’s the Year of the Fire Horse, and Chinese astrologers predict it will challenge the resilience and stability of businesses. In the same way lifestyle articlesIt’s the Year of the Fire Horse, and Chinese astrologers predict it will challenge the resilience and stability of businesses. In the same way lifestyle articles

Stop (fire) horsing around with data privacy compliance!

2026/02/27 00:02
4 min read

It’s the Year of the Fire Horse, and Chinese astrologers predict it will challenge the resilience and stability of businesses.

In the same way lifestyle articles had advised us to clean our doors and hallways to give the Fire Horse a clear path, the Lunar New Year’s start is as good a time as any for businesses to also “clean house” by checking on compliance — from ensuring timely submission of your 2025 general information sheet to renewing various LGU permits.

A somewhat overlooked area of compliance is data privacy, something people knew little about when the Data Privacy Act (DPA) was passed in 2012. There’s a lot more awareness now, thanks to the efforts of the National Privacy Commission (NPC), although one problem seems to persist — people aren’t quite clear about what this law really covers.

I don’t know how many times I’ve heard people talk about data privacy as something you can threaten your maritess neighbors/officemates with. Yes, that kind of sharing can involve the right to privacy but you generally need to look to the Constitution, the Civil Code, or the Revised Penal Code, not the DPA, for relief.

The DPA is meant to regulate persons who collect and process personal data in the course of government and private transactions, employment, and the pursuit of business or enterprise. The statute is looking at a world where data subjects — us, individuals — give or have to give their personal information to another person so the latter can provide some service or perform an obligation. The law seeks to balance the interests of the data subject (grounded in the right to privacy) and the interests of the party that is legitimately collecting and using the data.

Taking off from the NPC’s Five Pillars of Compliance, here are some practical Lunar New Year “resolutions”:

1. Data protection officer – your DPO (you have one, right?) should keep abreast of NPC issuances and advisories, posted on the NPC website.

2. Privacy impact assessment (PIA) – your DPO’s files should have a PIA report by now. PIA is a risk assessment exercise, generally covering any type of personal data processing your business undertakes. Processing is pretty much anything, from your receptionist signing in visitors, to you storing the resumés of rejected job applicants. The key is to identify personal data flows — from intake to every transfer to retention. Then, determine risks and mitigants, implement, assess. All of that goes into an internal report.

3. Privacy management program – this is your set of internal protocols, like a manual or privacy policy, guiding your organization on when and how to handle personal data.

4. Data protection measures – the DPA requires installing adequate physical, technical and organizational security measures, but except for certain organizational measures such as the appointment of a DPO, the DPA doesn’t specify what these measures should be. It will depend on the processing undertaken and related risks, among others. Conducting the PIA helps determine and justify security measures.

5. Breach reporting – what’s needed: a data security breach management policy (what to do in case of a breach) and a response team that must include the DPO. A DPO should know what triggers the mandatory 72-hour notice to the NPC and data subjects, and the requirement to file the annual security incident report (ASIR) with the NPC. An ASIR is meant to cover incidents that, if not for the security measures installed by a controller, would have been data security breaches. (ASIRs are due March 31st of every year.)

The pillars don’t mention NPC registration but a business definitely should check whether or not it should accomplish it. The triggers:

1. Employment of 250+ people;

2. Processing of sensitive information (e.g., age, government IDs) of 1,000+ individuals;

3. Using automated processing; and

4. A general category referring to processing of personal data that poses risks to the rights and freedoms of individuals.

There’s much more to unpack in respect of privacy compliance. Before policymakers add more compliance requirements (keep an eye on cybersecurity), it’s best to make sure this horse has been reined in and saddled. Happy Lunar New Year!

The views expressed herein are the author’s own and do not necessarily reflect the opinion of her office as well as FINEX.

Rose Marie M. King-Dominguez is a senior partner of SyCip Salazar Hernandez & Gatmaitan and the head of the firm’s Special Projects Department. She is a FINEX member.

Market Opportunity
LETSTOP Logo
LETSTOP Price(STOP)
$0.01615
$0.01615$0.01615
-2.76%
USD
LETSTOP (STOP) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact [email protected] for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.
Tags:

You May Also Like

Vitalik Buterin Maps Quantum Upgrade to Ethereum to Replace Core Cryptography

Vitalik Buterin Maps Quantum Upgrade to Ethereum to Replace Core Cryptography

The post Vitalik Buterin Maps Quantum Upgrade to Ethereum to Replace Core Cryptography appeared on BitcoinEthereumNews.com. In brief Buterin pointed out four Ethereum
Share
BitcoinEthereumNews2026/02/27 07:44
Power Protocol Surges 96%: On-Chain Data Reveals Why POWER Entered Top 115

Power Protocol Surges 96%: On-Chain Data Reveals Why POWER Entered Top 115

Power Protocol's native token has posted a stunning 96% gain in 24 hours, propelling it to rank #115 with a $381.6 million market cap. Our analysis of on-chain
Share
Blockchainmagazine2026/02/27 07:07
Best Crypto to Buy as Saylor & Crypto Execs Meet in US Treasury Council

Best Crypto to Buy as Saylor & Crypto Execs Meet in US Treasury Council

The post Best Crypto to Buy as Saylor & Crypto Execs Meet in US Treasury Council appeared on BitcoinEthereumNews.com. Michael Saylor and a group of crypto executives met in Washington, D.C. yesterday to push for the Strategic Bitcoin Reserve Bill (the BITCOIN Act), which would see the U.S. acquire up to 1M $BTC over five years. With Bitcoin being positioned yet again as a cornerstone of national monetary policy, many investors are turning their eyes to projects that lean into this narrative – altcoins, meme coins, and presales that could ride on the same wave. Read on for three of the best crypto projects that seem especially well‐suited to benefit from this macro shift:  Bitcoin Hyper, Best Wallet Token, and Remittix. These projects stand out for having a strong use case and high adoption potential, especially given the push for a U.S. Bitcoin reserve.   Why the Bitcoin Reserve Bill Matters for Crypto Markets The strategic Bitcoin Reserve Bill could mark a turning point for the U.S. approach to digital assets. The proposal would see America build a long-term Bitcoin reserve by acquiring up to one million $BTC over five years. To make this happen, lawmakers are exploring creative funding methods such as revaluing old gold certificates. The plan also leans on confiscated Bitcoin already held by the government, worth an estimated $15–20B. This isn’t just a headline for policy wonks. It signals that Bitcoin is moving from the margins into the core of financial strategy. Industry figures like Michael Saylor, Senator Cynthia Lummis, and Marathon Digital’s Fred Thiel are all backing the bill. They see Bitcoin not just as an investment, but as a hedge against systemic risks. For the wider crypto market, this opens the door for projects tied to Bitcoin and the infrastructure that supports it. 1. Bitcoin Hyper ($HYPER) – Turning Bitcoin Into More Than Just Digital Gold The U.S. may soon treat Bitcoin as…
Share
BitcoinEthereumNews2025/09/18 00:27