COUNTDOWN TO DATA PRIVACY III

September 9, 2017 marked the first anniversary of the Implementing Rules and Regulations (“IRR”) of the Data Privacy Act of 2012 (“DPA”). It marks the end of the period originally given to organizations—both public and private—to comply with the provisions of the DPA by conducting their own gap analyses or impact assessments and crafting the roadmap by which to structure their own compliance processes.

But how clear is this roadmap?
One year after the promulgation of the IRR, in negotiating the road to full compliance, organizations have been faced with multifaceted issues relating to Data Privacy, from securing the consent of the data subject all the way to the question of minimum compliance. A full resolution of these issues calls for a keen and nuanced understanding of the Data Privacy Act.

The Disini & Disini Law Office organized this symposium with the hope of providing a nuanced reading of the Data Privacy Act. By resolving these issues surrounding the law, organizations can now move forward with their own compliance process, without the fear of making a faux pas that would prove costly in the future.

As the compliance period draws to a close, it is imperative that the road to compliance be made as smooth as possible.

Regardless of breadth, organizations would require all the assistance if they hope to fully align with the demands of the Data Privacy Act.

The “Hot Topics” portion of the symposium is a Q&A session devoted to answering queries of the participants according to the most pressing issues of the Data Privacy Act. The questions will be fielded by the Disini Law Privacy Core Team of the Disini & Disini Law Office. 

As the agency primarily charged with implementing the Data Privacy Act, the NPC stands at the forefront of ensuring compliance on the part of organizations.
Before even going to the issue of minimum vs. full compliance, it is necessary to look into how an organization is expected to jumpstart its compliance process. This session shall put into focus what compliance with the Data Privacy Act entails, as well as the highlights of the compliance process.
Some members of the information security community hold the mistaken belief that information security circumscribes compliance with the Data Privacy Act. In other words, they believe that, once an organization meets the prescribed Information Security standards, there is concomitant compliance with the Data Privacy Act. Considering that Information Security is but a small yet critical component of data privacy, this session shall clarify the position of information security within the sphere of data privacy, as well as the specifics of fully complying with the security requirements of the Data Privacy Act.
In the event of a data breach, the Data Privacy Act requires that data subjects and the National Privacy Commission be notified of such data breach. What conditions would trigger data breach notification? In this session, insights on the data breach notification requirement of the Act, and how a data subject may lodge a formal complaint should this requirement be violated, will be discussed.
Under the Data Privacy Act, organizations are mandated to implement breach management systems and procedures to maintain the confidentiality, integrity, and accessibility of personal information in the event of a data breach. This session, designed to teach organizations the best practices for data breach management, shall have participants run through a whole gamut of breach scenarios, giving them insights on the best course of action to take in the event of a data breach.
The Data Privacy Act of 2012 is a penal statute—imposing criminal liability upon persons who violate its provisions. Given the ease by which one could possibly be found liable under the Data Privacy Act, there exists a real danger that the law shall be deployed to further an objective that is disparate from the data privacy considerations. This session shall explore the risks of failing to comply with the Data Privacy Act based on the idiosyncrasies of various organizations.
There are currently two competing privacy regimes, specifically Directive 95/46/EC, adhered to by the European Union, and the APEC Information Privacy Framework Standards, adhered to by APEC and the United States. Considering the significant disparity between the two regimes, it is necessary to determine where our own Data Privacy Act is situated, as well as to identify issues that come naturally with the transfer of personal information across borders.
Consent is undoubtedly the touchstone of data privacy. By securing the data subject’s consent, an organization can, theoretically, use it without running afoul of the Data Privacy Act. However, that is a perilously simplistic reading of the requirement for consent. This session hopes to shed light on the multifarious requirements in obtaining consent, as well as the most efficient means of securing such consent without straying from that which is provided under the Data Privacy Act.
REGULAR
8,000.00
REGISTER
EARLY BIRD
8,000.00
REGISTER
5+1
40,000.00
REGISTER
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse non posuere dolor, ut fermentum enim. Nullam quis molestie purus. Nam leo turpis, scelerisque in convallis ac, accumsan a lacus. Sed laoreet arcu in odio auctor commodo. Quisque et mi lacinia, porttitor mauris sit amet, pretium lorem. Orci varius natoque penatibus et magnis dis parturient montes, nascetur ridiculus mus. Vestibulum hendrerit suscipit magna et aliquam. Morbi consectetur tincidunt odio, pulvinar tempus risus. Integer ac risus justo. Duis varius vel lorem sit amet finibus.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse non posuere dolor, ut fermentum enim. Nullam quis molestie purus. Nam leo turpis, scelerisque in convallis ac, accumsan a lacus. Sed laoreet arcu in odio auctor commodo. Quisque et mi lacinia, porttitor mauris sit amet, pretium lorem. Orci varius natoque penatibus et magnis dis parturient montes, nascetur ridiculus mus. Vestibulum hendrerit suscipit magna et aliquam. Morbi consectetur tincidunt odio, pulvinar tempus risus. Integer ac risus justo. Duis varius vel lorem sit amet finibus.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse non posuere dolor, ut fermentum enim. Nullam quis molestie purus. Nam leo turpis, scelerisque in convallis ac, accumsan a lacus. Sed laoreet arcu in odio auctor commodo. Quisque et mi lacinia, porttitor mauris sit amet, pretium lorem. Orci varius natoque penatibus et magnis dis parturient montes, nascetur ridiculus mus. Vestibulum hendrerit suscipit magna et aliquam. Morbi consectetur tincidunt odio, pulvinar tempus risus. Integer ac risus justo. Duis varius vel lorem sit amet finibus.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse non posuere dolor, ut fermentum enim. Nullam quis molestie purus. Nam leo turpis, scelerisque in convallis ac, accumsan a lacus. Sed laoreet arcu in odio auctor commodo. Quisque et mi lacinia, porttitor mauris sit amet, pretium lorem. Orci varius natoque penatibus et magnis dis parturient montes, nascetur ridiculus mus. Vestibulum hendrerit suscipit magna et aliquam. Morbi consectetur tincidunt odio, pulvinar tempus risus. Integer ac risus justo. Duis varius vel lorem sit amet finibus.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse non posuere dolor, ut fermentum enim. Nullam quis molestie purus. Nam leo turpis, scelerisque in convallis ac, accumsan a lacus. Sed laoreet arcu in odio auctor commodo. Quisque et mi lacinia, porttitor mauris sit amet, pretium lorem. Orci varius natoque penatibus et magnis dis parturient montes, nascetur ridiculus mus. Vestibulum hendrerit suscipit magna et aliquam. Morbi consectetur tincidunt odio, pulvinar tempus risus. Integer ac risus justo. Duis varius vel lorem sit amet finibus.
Event Details
Sponsors
Cart
%d bloggers like this: