Securiti launches Gencore AI, a holistic solution to build Safe Enterprise AI with proprietary data - easily

View

Philippines Data Privacy Act’s Application to AI Systems Processing Personal Data

Author

Salma Khan

Data Privacy Analyst

CIPP/Asia

Listen to the content

1. Introduction

The governance of AI systems is becoming increasingly critical, particularly when these systems process personal data. To address this, the National Privacy Commission (NPC) of the Philippines issued Advisory Guidelines on the Application of the Data Privacy Act (DPA), its Implementing Rules and Regulations (IRR), and NPC Issuances to AI Systems Processing Personal Data (‘Advisory Guidelines’)  on December 19, 2024.

The Advisory Guidelines clarify how Personal Information Controllers (PICs) and Personal Information Processors (PIPs) can responsibly develop, test, train, and deploy AI technologies while adhering to the principles of data protection enshrined in the DPA. It emphasizes adhering to general data privacy principles, including accountability, transparency, and fairness, respecting data subject rights, identifying lawful bases for processing, and implementing security measures to protect personal data. This blog provides a comprehensive overview of the obligations outlined in the Advisory Guidelines.

2. Compliance with Data Privacy Principles

The Advisory Guidelines highlight the importance of adhering to the following key data privacy principles:

Transparency

PICs must provide clear and accessible information to data subjects about the processing of their personal data during the development or deployment of AI systems. This includes:

  • Explaining the purpose, nature, and scope of the processing.
  • Describing the factors, inputs, and outputs of the AI system, associated risks, and its impact on data subjects.
  • Detailing available dispute resolution mechanisms.

All disclosures must be presented straightforwardly and concretely, using clear, understandable language to the intended audience while retaining necessary technical terminology.

Accountability

PICs bear responsibility for the processing of personal data by AI systems and the resulting outcomes. This accountability extends to the development, deployment, training, and testing of such systems, even when processing is outsourced to PIPs.

To demonstrate compliance, the:

  • PICs (and their PIPs, when applicable) must implement and document effective policies and procedures ensuring compliance with the DPA, its IRR, and related issuances.
  • Documentation should include policies specifically addressing AI systems that process personal data.

Additionally, the PICs must establish governance mechanisms to ensure ethical and responsible AI processing, including:

  • Conducting Privacy Impact Assessments (PIAs),
  • Adopting privacy-by-design and privacy-by-default principles,
  • Implementing industry-standard security measures,
  • Continuously monitoring AI operations,
  • Establishing AI ethics boards,
  • Regularly retraining and updating AI systems, and
  • Providing mechanisms for human intervention in automated decisions and reviewing AI outputs.

PICs must regularly evaluate the effectiveness and proper implementation of governance mechanisms to ensure compliance and adapt to emerging risks.

Moreover, when AI systems perform automated decision-making with significant risks to data subjects' rights and freedoms, PICs must:

  • Enable meaningful human intervention by qualified individuals, and
  • Allow data subjects to question and contest decisions that impact their rights significantly.

Fairness

PICs are required to ensure personal data processing is free from manipulation or undue oppression. To do so, they must:

  • Implement mechanisms to detect, monitor, and limit biases in AI systems, including systemic, human, and statistical biases, and
  • Avoid deceptive practices such as AI washing, where the role of AI is overstated to the detriment of data subjects.

Accuracy

The PICs must maintain the accuracy and currency of personal data to uphold fairness in AI system outputs. To maintain accuracy, it recommends the adoption of measures to verify and update personal data used in AI systems regularly.

Data Minimization

The PICs must ensure that they exclude personal data that does not contribute meaningfully to developing, training, or deploying AI systems.

3. Lawful Basis for Processing

To process personal data for AI development and deployment, the Advisory Guidelines require the PICs to identify and establish the most appropriate lawful basis for processing under Sections 12 and 13 of the DPA. Publicly available personal data remains subject to DPA protections. PICs must determine a lawful basis for processing such data and ensure compliance with privacy principles.

4. Data Subject Rights

AI systems that process personal data can significantly impact the exercise of data subject rights. Therefore Advisory Guidelines mandate the PICs to implement mechanisms, such as Privacy-Enhancing Technologies (PETs), to safeguard these rights. Key obligations include:

Providing the Right to Object, Rectification, and Erasure/Blocking

  • PICs must provide effective mechanisms or alternative measures to facilitate these rights.
  • PICs must inform data subjects about the scope and consequences of exercising their rights.
  • If a request is infeasible, PICs must explain why and strive to achieve the intended effect of the requested right through alternative measures.

Continuous Accessibility of Rights

  • PICs must ensure that data subjects can exercise their rights at all stages of the AI system lifecycle—before, during, and after its development or deployment.

Incorporation into Datasets

  • The inclusion of personal data in datasets does not inherently make the exercise of data subject rights unreasonable. In such circumstances, failing to provide meaningful mechanisms for exercising data subject rights undermines claims that such requests are impractical.

5. Interpretation Principle

The Advisory Guidelines clarify that any ambiguities in interpreting the provisions of this Advisory should favor the protection of data subjects' rights and interests.

How Securiti Can Help

Securiti is the pioneer of the Data + AI Command Center, a centralized platform that enables the safe use of data and GenAI. It provides unified data intelligence, controls and orchestration across hybrid multicloud environments. Large global enterprises rely on Securiti's Data Command Center for data security, privacy, governance, and compliance.

Securiti Gencore AI enables organizations to safely connect to hundreds of data systems while preserving data controls and governance as data flows into modern GenAI systems. It is powered by a unique knowledge graph that maintains granular contextual insights about data and AI systems.

Gencore AI provides robust controls throughout the AI system to align with corporate policies and entitlements, safeguard against malicious attacks and protect sensitive data. This enables organizations to comply with the Philipines Data Privacy Act (DPA).

Request a demo to learn more.

Join Our Newsletter

Get all the latest information, law updates and more delivered to your inbox


Share


More Stories that May Interest You

Videos

View More

Mitigation OWASP Top 10 for LLM Applications 2025

Generative AI (GenAI) has transformed how enterprises operate, scale, and grow. There’s an AI application for every purpose, from increasing employee productivity to streamlining...

View More

DSPM vs. CSPM – What’s the Difference?

While the cloud has offered the world immense growth opportunities, it has also introduced unprecedented challenges and risks. Solutions like Cloud Security Posture Management...

View More

Top 6 DSPM Use Cases

With the advent of Generative AI (GenAI), data has become more dynamic. New data is generated faster than ever, transmitted to various systems, applications,...

View More

Colorado Privacy Act (CPA)

What is the Colorado Privacy Act? The CPA is a comprehensive privacy law signed on July 7, 2021. It established new standards for personal...

View More

Securiti for Copilot in SaaS

Accelerate Copilot Adoption Securely & Confidently Organizations are eager to adopt Microsoft 365 Copilot for increased productivity and efficiency. However, security concerns like data...

View More

Top 10 Considerations for Safely Using Unstructured Data with GenAI

A staggering 90% of an organization's data is unstructured. This data is rapidly being used to fuel GenAI applications like chatbots and AI search....

View More

Gencore AI: Building Safe, Enterprise-grade AI Systems in Minutes

As enterprises adopt generative AI, data and AI teams face numerous hurdles: securely connecting unstructured and structured data sources, maintaining proper controls and governance,...

View More

Navigating CPRA: Key Insights for Businesses

What is CPRA? The California Privacy Rights Act (CPRA) is California's state legislation aimed at protecting residents' digital privacy. It became effective on January...

View More

Navigating the Shift: Transitioning to PCI DSS v4.0

What is PCI DSS? PCI DSS (Payment Card Industry Data Security Standard) is a set of security standards to ensure safe processing, storage, and...

View More

Securing Data+AI : Playbook for Trust, Risk, and Security Management (TRiSM)

AI's growing security risks have 48% of global CISOs alarmed. Join this keynote to learn about a practical playbook for enabling AI Trust, Risk,...

Spotlight Talks

Spotlight 46:02

Building Safe Enterprise AI: A Practical Roadmap

Watch Now View
Spotlight 13:32

Ensuring Solid Governance Is Like Squeezing Jello

Watch Now View
Spotlight 40:46

Securing Embedded AI: Accelerate SaaS AI Copilot Adoption Safely

Watch Now View
Spotlight 10:05

Unstructured Data: Analytics Goldmine or a Governance Minefield?

Viral Kamdar
Watch Now View
Spotlight 21:30

Companies Cannot Grow If CISOs Don’t Allow Experimentation

Watch Now View
Spotlight 2:48

Unlocking Gen AI For Enterprise With Rehan Jalil

Rehan Jalil
Watch Now View
Spotlight 13:35

The Better Organized We’re from the Beginning, the Easier it is to Use Data

Watch Now View
Spotlight 13:11

Securing GenAI: From SaaS Copilots to Enterprise Applications

Rehan Jalil
Watch Now View
Spotlight 47:02

Navigating Emerging Technologies: AI for Security/Security for AI

Rehan Jalil
Watch Now View
Spotlight 59:55

Building Safe
Enterprise AI

Watch Now View

Latest

Automating EU AI Act Compliance View More

Automating EU AI Act Compliance: A 5-Step Playbook for GRC Teams

Artificial intelligence is revolutionizing industries, driving innovation in healthcare, finance, and beyond. But with great power comes great responsibility—especially when AI decisions impact health,...

Gencore AI Customers Can Now Securely Use DeepSeek R1 View More

Gencore AI Customers Can Now Securely Use DeepSeek R1

Enterprises are under immense pressure to use Generative AI to deliver innovative solutions, extract insights from massive volumes, and stay ahead of the competition....

Navigating Data Regulations in India’s Telecom Sector View More

Navigating Data Regulations in India’s Telecom Sector: Security, Privacy, Governance & AI

Gain insights into the key data regulations in India’s telecom sector and how they impact your business. Learn how Securiti helps ensure swift compliance...

Best Practices for Microsoft 365 Copilot View More

Data Governance Best Practices for Microsoft 365 Copilot

Learn key governance best practices for Microsoft 365 Copilot to ensure security, compliance, and effective implementation for optimal business performance.

5-Step AI Compliance Automation Playbook View More

EU AI Act: 5-Step AI Compliance Automation Playbook

Download the whitepaper to learn about the EU AI Act & its implication on high-risk AI systems, 5-step framework for AI compliance automation and...

A 6-Step Automation Guide View More

Say Goodbye to ROT Data: A 6-Step Automation Guide

Eliminate redundant obsolete and trivial (ROT) data with a strategic 6-step automation guide. Download the whitepaper today to discover how to streamline data management...

Texas Data Privacy and Security Act (TDPSA) View More

Navigating the Texas Data Privacy and Security Act (TDPSA): Key Details

Download the infographic to learn key details about Texas’ Data Privacy and Security Act (TDPSA) and simplify your compliance journey with Securiti.

Oregon’s Consumer Privacy Act (OCPA) View More

Navigating Oregon’s Consumer Privacy Act (OCPA): Key Details

Download the infographic to learn key details about Oregon’s Consumer Privacy Act (OCPA) and simplify your compliance journey with Securiti.

Gencore AI and Amazon Bedrock View More

Building Enterprise-Grade AI with Gencore AI and Amazon Bedrock

Learn how to build secure enterprise AI copilots with Amazon Bedrock models, protect AI interactions with LLM Firewalls, and apply OWASP Top 10 LLM...

DSPM Vendor Due Diligence View More

DSPM Vendor Due Diligence

DSPM’s Buyer Guide ebook is designed to help CISOs and their teams ask the right questions and consider the right capabilities when looking for...

What's
New