ADM Privacy Blog

DATA BREACH REPORT: Student Portal Systems Unauthorized Access

In the last week, two universities experienced a hacking incident of their respective student portal systems. San Beda University’s Student portal was hacked, while University of the Philippines Cebu confirmed a breach of their Student Evaluation on Teaching, which is a separate system from their student portal. San Beda University What Happened? June 5- SanContinue reading “DATA BREACH REPORT: Student Portal Systems Unauthorized Access”

True End-to-End Encryption

With the current situation of accounts being hacked and other poser accounts popping up, I decided to change my password for the better. As I was changing my password to further secure my many many, truly, may accounts. I’ve come across one platform I used which offers true end-to-end encryption (E2EE). Okay back to myContinue reading “True End-to-End Encryption”

Mandatory Data Processing Activities during MECQ and GCQ

Since some of the establishments will be reopening under the MEQC and GCQ, processing of personal data will play a role in preventing further spread of Covid19.  Under the DTI and DOLE Interim Guidelines on Workplace Prevention and Control of Covid-19, there are measures that should be implemented in all workplaces consistent with the objectives ofContinue reading “Mandatory Data Processing Activities during MECQ and GCQ”

Tips for DPOs when Discussing Data Privacy

One of the functions of a Data Protection Officer (DPO) is to inform and cultivate awareness on privacy and data protection within the organization of the Personal Information Controller (PIC) or Personal Information Processor (PIP), including all relevant laws, rules and regulations and issuances of the National Privacy Commission (NPC).  Such task is not asContinue reading “Tips for DPOs when Discussing Data Privacy”

DATA PRIVACY: FIVE STEPS FOR CONTINUOUS COMPLIANCE PROGRAM by Rachel Granates

Data privacy greatly influenced the changing regulatory landscape of businesses around the globe. Companies, corporations and offices that are mandated to comply must be prepared for additional works, increase of administrative activities, audits and compliance checks.  According to the PriveSec report of TrustArc, these are achievable by observing a continuous compliance program which involves implementing policies,Continue reading “DATA PRIVACY: FIVE STEPS FOR CONTINUOUS COMPLIANCE PROGRAM by Rachel Granates”

Tips in Conducting your PIA by Asha Abdulraheem

Privacy Impact Assessment (PIA) is the second pillar of data privacy accountability and compliance. After registering your Data Protection Officer (DPO) with the National Privacy Commission (NPC), the next step is to know, evaluate, and manage the data privacy risks that are present in your operations. Here are some tips that can help you inContinue reading “Tips in Conducting your PIA by Asha Abdulraheem”

Loading…

Something went wrong. Please refresh the page and/or try again.


Follow ADM’s Blog

Get new content delivered directly to your inbox.

Create your website at WordPress.com
Get started
%d bloggers like this: