Data Security
Data Security
Data Security
Having all the latest software security tools does not mean that your system is safe from any
attacks. Continuous improvement in security of information and data processing systems is a
fundamental management responsibility. All applications and processing systems that deal with
personal and sensitive information should include some form of authorization which is also
known as access control policy. As systems grow in size and complexity, access control is a
special concern for systems and applications that are distributed across multiple computers.
Access Control Policy sets requirements of credentials and identification that specify how
access to computers, systems, or applications is managed and who may access the information in
most circumstances. Authentication, authorization, audit, and access approval are the common
aspects of access control policy.
Back To Top
Back To Top
In a time when data privacy and security matters, personal information controller and personal
information processors are obliged to implement strong, reasonable, and appropriate
organizational, physical, and technical security measures for the protection of the personal
information that they process. These include access control policies to off-site and online access
to personal and sensitive information. Accessing these kinds of information due to negligence or
intentional breach will result to fines and imprisonment.
Back To Top
A data center is a facility housing electronic equipment used for data processing, data storage,
and communications networking. It is a centralized repository, which may be physical or virtual,
may be analog or digital, used for the storage, management, and dissemination of data including
personal data.
The National Privacy Commission imposes personal information controllers and personal
information processors should implement reasonable and appropriate organizational, physical,
and technical security measures for the protection of personal data, especially in this critical
infrastructure in Information and Communications Technology.
Back To Top
1. Include security and compliance objectives as part of the data center design and
ensure the security team is involved from day one. Security controls should be
developed for each modular component of the data center—servers, storage, data and
network—united by a common policy environment.
2. Ensure that approach taken will not limit availability and scalability of resources.
3. Develop and enforce policies that are context, identity and application-aware for
least complexity, and the most flexibility and scalability. Ensure that they can be
applied consistently across physical, virtual and cloud environments. This, along with
replacing physical with secure trust zones, will provide seamless and secure user access
to applications at all times, regardless of the device used to connect to resources in the
data center.
4. Choose security technologies that are virtualization-aware or enabled, with security
working at the network level rather than the server. Network security should be
integrated at the hypervisor level to discover existing and new virtual machines and to
follow those devices as they are moved or scaled up so that policy can be dynamically
applied and enforced.
5. Monitor everything continuously at the network level to be able to look at all assets
(physical and virtual) that reside on the local area network (even those that are
offline) and all inter-connections between them. This monitoring should be done on a
continuous basis and should be capable of tracking dynamic network fabrics. Monitor for
missing patches, application, or configuration changes that can introduce vulnerabilities
which can be exploited.
6. Look for integrated families of products with centralized management that are
integrated with or aware of the network infrastructure, or common monitoring
capabilities for unified management of risk, policy controls, and network
security. This will also give detailed reports across all controls that provide the audit trail
necessary for risk management, governance, and compliance objectives. Integrated
families of products need not necessarily be procured from just one vendor. Look for
those that leverage the needed capabilities of a strong ecosystem of partnerships to
provide a consolidated solution across all data center assets.
7. Consider future as well as current needs and objectives at the design stage such as
whether access to public cloud environments is required.
8. Define policies and profiles that can be segmented and monitored in multi-tenant
environments. Consider security technologies that provide secure gateway connections
to public cloud resources.
Back To Top
Back To Top
What is encryption?
Back To Top
“Any technology used to store, transport, or access sensitive personal information for purposes
of off-site access approved shall be secured by the use of the most secure encryption standard
recognized by the Commission.”
Data at rest, in transit, and in use should all be treated equally in terms of preserving its privacy
and managing its security.
Back To Top
Emails
Most corporations, organizations, agencies, and firms use emails to communicate, send files, and
exchange data. This way of communication has been the standard of electronic messaging for
many years. It has also been one of the major cases of privacy breaches throughout those years.
These kinds of incidents exposed the privacy of several individuals so they should be managed,
guarded, and most importantly, prevented. Organizations that transfer personal data via email
should either make sure that the data is encrypted or use a secure email facility that facilitates the
encryption.
Portable Media
Attack on privacy can happen anytime, anywhere, any place and sometimes even with portable
storage devices. It can infiltrate an organization’s system and expose all of its confidential and
sensitive information. Devices such as USB flash drives and internal or external disk that store,
collect or transfer personal data must be encrypted, especially the data in it. Organizations that
use laptops to process personal data must use a full disk encryption.
Links (URL)
Agencies and organizations that utilize online access to process personal data should employ an
identity authentication method that uses a secured encrypted link.
Back To Top
“Organizational, physical, and technical security measures for personal data protection,
encryption, and access to sensitive personal information maintained by government agencies,
considering the most appropriate standard recognized by the information and communications
technology industry.”
“Advanced Encryption Standard with a key size of 256 bits (AES-256) as the most appropriate
encryption standard. Passwords or passphrases used to access personal data should be of
sufficient strength to deter password attacks. A password policy should be issued and enforced
through a system management tool.”
Back To Top
Every person that owns or licenses personal information shall develop, implement, and maintain
a comprehensive information security program that is written in one or more readily accessible
parts and contains organizational, technical, and physical security that are appropriate to:
1. the size, scope and type of operations of the agency obligated to secure the personal data
under such comprehensive information of the DPA;
2. the amount of resources available to such person;
3. the amount of stored data; and
4. the need for security and confidentiality of both client and employee information. The
safeguards contained in such program must be consistent with the safeguards for
protection of personal information and information of a similar character set forth in the
Data Privacy Act of 2012 by which the person who owns or licenses such information
may be regulated.
Without limiting the generality of the foregoing, every comprehensive information security
program shall include, but shall not be limited to:
Back To Top
Personal Information Controllers (PIC) are those who decide what types of data are collected
and how they are processed (i.e. Ayala Land). On the other hand, Personal Information
Processors (PIP) are those who process data as instructed by the controllers (i.e. HR Mall).
For transfers abroad, a personal information controller shall be responsible for any personal data
under its custody, including information that have been outsourced or transferred to a personal
information processor or a third party for processing, whether domestically or internationally,
subject to cross-border arrangement and cooperation.
Back To Top
Processing of personal data collected from a party other than the data subject shall be allowed
under any of the following conditions:
Authorized by law
Consent for Data Sharing
Covered by a data sharing agreement for commercial purposes
Provided the following to data subjects before sharing:
1. Identity of PIC and PIP
2. Purpose of data sharing
3. Categories of personal data
4. Intended recipients of personal data
5. Broadcasted the rights of data subjects
6. Other information about the nature and extent of data sharing and manner of
processing
7. Sharing between government agencies for the purpose of a public function or
provision of a public service should be covered by a data sharing agreement.
Back To Top
Back To Top