Securiti leads GigaOm's DSPM Vendor Evaluation with top ratings across technical capabilities & business value.

View

Philippines Data Privacy Act’s Application to AI Systems Processing Personal Data

Published January 26, 2025
Author

Salma Khan

Data Privacy Analyst at Securiti

CIPP/Asia

Listen to the content

1. Introduction

The governance of AI systems is becoming increasingly critical, particularly when these systems process personal data. To address this, the National Privacy Commission (NPC) of the Philippines issued Advisory Guidelines on the Application of the Data Privacy Act (DPA), its Implementing Rules and Regulations (IRR), and NPC Issuances to AI Systems Processing Personal Data (‘Advisory Guidelines’)  on December 19, 2024.

The Advisory Guidelines clarify how Personal Information Controllers (PICs) and Personal Information Processors (PIPs) can responsibly develop, test, train, and deploy AI technologies while adhering to the principles of data protection enshrined in the DPA. It emphasizes adhering to general data privacy principles, including accountability, transparency, and fairness, respecting data subject rights, identifying lawful bases for processing, and implementing security measures to protect personal data. This blog provides a comprehensive overview of the obligations outlined in the Advisory Guidelines.

2. Compliance with Data Privacy Principles

The Advisory Guidelines highlight the importance of adhering to the following key data privacy principles:

Transparency

PICs must provide clear and accessible information to data subjects about the processing of their personal data during the development or deployment of AI systems. This includes:

  • Explaining the purpose, nature, and scope of the processing.
  • Describing the factors, inputs, and outputs of the AI system, associated risks, and its impact on data subjects.
  • Detailing available dispute resolution mechanisms.

All disclosures must be presented straightforwardly and concretely, using clear, understandable language to the intended audience while retaining necessary technical terminology.

Accountability

PICs bear responsibility for the processing of personal data by AI systems and the resulting outcomes. This accountability extends to the development, deployment, training, and testing of such systems, even when processing is outsourced to PIPs.

To demonstrate compliance, the:

  • PICs (and their PIPs, when applicable) must implement and document effective policies and procedures ensuring compliance with the DPA, its IRR, and related issuances.
  • Documentation should include policies specifically addressing AI systems that process personal data.

Additionally, the PICs must establish governance mechanisms to ensure ethical and responsible AI processing, including:

  • Conducting Privacy Impact Assessments (PIAs),
  • Adopting privacy-by-design and privacy-by-default principles,
  • Implementing industry-standard security measures,
  • Continuously monitoring AI operations,
  • Establishing AI ethics boards,
  • Regularly retraining and updating AI systems, and
  • Providing mechanisms for human intervention in automated decisions and reviewing AI outputs.

PICs must regularly evaluate the effectiveness and proper implementation of governance mechanisms to ensure compliance and adapt to emerging risks.

Moreover, when AI systems perform automated decision-making with significant risks to data subjects' rights and freedoms, PICs must:

  • Enable meaningful human intervention by qualified individuals, and
  • Allow data subjects to question and contest decisions that impact their rights significantly.

Fairness

PICs are required to ensure personal data processing is free from manipulation or undue oppression. To do so, they must:

  • Implement mechanisms to detect, monitor, and limit biases in AI systems, including systemic, human, and statistical biases, and
  • Avoid deceptive practices such as AI washing, where the role of AI is overstated to the detriment of data subjects.

Accuracy

The PICs must maintain the accuracy and currency of personal data to uphold fairness in AI system outputs. To maintain accuracy, it recommends the adoption of measures to verify and update personal data used in AI systems regularly.

Data Minimization

The PICs must ensure that they exclude personal data that does not contribute meaningfully to developing, training, or deploying AI systems.

3. Lawful Basis for Processing

To process personal data for AI development and deployment, the Advisory Guidelines require the PICs to identify and establish the most appropriate lawful basis for processing under Sections 12 and 13 of the DPA. Publicly available personal data remains subject to DPA protections. PICs must determine a lawful basis for processing such data and ensure compliance with privacy principles.

4. Data Subject Rights

AI systems that process personal data can significantly impact the exercise of data subject rights. Therefore Advisory Guidelines mandate the PICs to implement mechanisms, such as Privacy-Enhancing Technologies (PETs), to safeguard these rights. Key obligations include:

Providing the Right to Object, Rectification, and Erasure/Blocking

  • PICs must provide effective mechanisms or alternative measures to facilitate these rights.
  • PICs must inform data subjects about the scope and consequences of exercising their rights.
  • If a request is infeasible, PICs must explain why and strive to achieve the intended effect of the requested right through alternative measures.

Continuous Accessibility of Rights

  • PICs must ensure that data subjects can exercise their rights at all stages of the AI system lifecycle—before, during, and after its development or deployment.

Incorporation into Datasets

  • The inclusion of personal data in datasets does not inherently make the exercise of data subject rights unreasonable. In such circumstances, failing to provide meaningful mechanisms for exercising data subject rights undermines claims that such requests are impractical.

5. Interpretation Principle

The Advisory Guidelines clarify that any ambiguities in interpreting the provisions of this Advisory should favor the protection of data subjects' rights and interests.

How Securiti Can Help

Securiti is the pioneer of the Data + AI Command Center, a centralized platform that enables the safe use of data and GenAI. It provides unified data intelligence, controls and orchestration across hybrid multicloud environments. Large global enterprises rely on Securiti's Data Command Center for data security, privacy, governance, and compliance.

Securiti Gencore AI enables organizations to safely connect to hundreds of data systems while preserving data controls and governance as data flows into modern GenAI systems. It is powered by a unique knowledge graph that maintains granular contextual insights about data and AI systems.

Gencore AI provides robust controls throughout the AI system to align with corporate policies and entitlements, safeguard against malicious attacks and protect sensitive data. This enables organizations to comply with the Philipines Data Privacy Act (DPA).

Request a demo to learn more.

Join Our Newsletter

Get all the latest information, law updates and more delivered to your inbox


Share


More Stories that May Interest You

Videos

View More

Mitigating OWASP Top 10 for LLM Applications 2025

Generative AI (GenAI) has transformed how enterprises operate, scale, and grow. There’s an AI application for every purpose, from increasing employee productivity to streamlining...

View More

DSPM vs. CSPM – What’s the Difference?

While the cloud has offered the world immense growth opportunities, it has also introduced unprecedented challenges and risks. Solutions like Cloud Security Posture Management...

View More

Top 6 DSPM Use Cases

With the advent of Generative AI (GenAI), data has become more dynamic. New data is generated faster than ever, transmitted to various systems, applications,...

View More

Colorado Privacy Act (CPA)

What is the Colorado Privacy Act? The CPA is a comprehensive privacy law signed on July 7, 2021. It established new standards for personal...

View More

Securiti for Copilot in SaaS

Accelerate Copilot Adoption Securely & Confidently Organizations are eager to adopt Microsoft 365 Copilot for increased productivity and efficiency. However, security concerns like data...

View More

Top 10 Considerations for Safely Using Unstructured Data with GenAI

A staggering 90% of an organization's data is unstructured. This data is rapidly being used to fuel GenAI applications like chatbots and AI search....

View More

Gencore AI: Building Safe, Enterprise-grade AI Systems in Minutes

As enterprises adopt generative AI, data and AI teams face numerous hurdles: securely connecting unstructured and structured data sources, maintaining proper controls and governance,...

View More

Navigating CPRA: Key Insights for Businesses

What is CPRA? The California Privacy Rights Act (CPRA) is California's state legislation aimed at protecting residents' digital privacy. It became effective on January...

View More

Navigating the Shift: Transitioning to PCI DSS v4.0

What is PCI DSS? PCI DSS (Payment Card Industry Data Security Standard) is a set of security standards to ensure safe processing, storage, and...

View More

Securing Data+AI : Playbook for Trust, Risk, and Security Management (TRiSM)

AI's growing security risks have 48% of global CISOs alarmed. Join this keynote to learn about a practical playbook for enabling AI Trust, Risk,...

Spotlight Talks

Spotlight 13:38

Accelerating Miracles — How Sanofi is Embedding AI to Significantly Reduce Drug Development Timelines

Sanofi Thumbnail
Watch Now View
Spotlight 10:35

There’s Been a Material Shift in the Data Center of Gravity

Watch Now View
Spotlight 14:21

AI Governance Is Much More than Technology Risk Mitigation

AI Governance Is Much More than Technology Risk Mitigation
Watch Now View
Spotlight 12:!3

You Can’t Build Pipelines, Warehouses, or AI Platforms Without Business Knowledge

Watch Now View
Spotlight 47:42

Cybersecurity – Where Leaders are Buying, Building, and Partnering

Rehan Jalil
Watch Now View
Spotlight 27:29

Building Safe AI with Databricks and Gencore

Rehan Jalil
Watch Now View
Spotlight 46:02

Building Safe Enterprise AI: A Practical Roadmap

Watch Now View
Spotlight 13:32

Ensuring Solid Governance Is Like Squeezing Jello

Watch Now View
Spotlight 40:46

Securing Embedded AI: Accelerate SaaS AI Copilot Adoption Safely

Watch Now View
Spotlight 10:05

Unstructured Data: Analytics Goldmine or a Governance Minefield?

Viral Kamdar
Watch Now View

Latest

AI System Observability: Go Beyond Model Governance View More

AI System Observability: Go Beyond Model Governance

Across industries, AI systems are no longer just tools acting on human prompts. The AI landscape is evolving rapidly, and AI systems are gaining...

View More

Securiti Accelerates Secure Agentic AI Deployments with NVIDIA Enterprise AI Factory

Still adapting to  the initial Gen AI boom, the IT industry is now undergoing another profound evolution- the rise of Agentic AI. AI has...

Enterprise Data Security View More

What is Enterprise Data Security?

Get comprehensive insights into enterprise data security, what it is, its importance, key components, and how Securiti helps ensure the utmost enterprise data security.

Cloud Security Posture Management View More

What is Cloud Security Posture Management (CSPM)?

Learn the importance of CSPM for modern enterprises, the core capabilities to consider, and clears several misconceptions related to it.

Mastering Cookie Consent: Global Compliance & Customer Trust View More

Mastering Cookie Consent: Global Compliance & Customer Trust

Discover how to master cookie consent with strategies for global compliance and building customer trust while aligning with key data privacy regulations.

Why Data Access Is Your Weakest Link—And How DSPM Fixes It View More

Why Data Access Is Your Weakest Link—And How DSPM Fixes It

Learn how DSPM provides unified Data+AI Access governance, offering contextual data intelligence, automated controls, safe AI+data access, and consistent least-privilege enforcement.

The European Health Data Space Regulation View More

The European Health Data Space Regulation: A Legislative Timeline and Implementation Roadmap

Download the infographic on the European Health Data Space Regulation, which features a clear timeline and roadmap highlighting key legislative milestones, implementation phases, and...

Comparison of RoPA Field Requirements Across Jurisdictions View More

Comparison of RoPA Field Requirements Across Jurisdictions

Download the infographic to compare Records of Processing Activities (RoPA) field requirements across jurisdictions. Learn its importance, penalties, and how to navigate RoPA.

Gencore AI and Amazon Bedrock View More

Building Enterprise-Grade AI with Gencore AI and Amazon Bedrock

Learn how to build secure enterprise AI copilots with Amazon Bedrock models, protect AI interactions with LLM Firewalls, and apply OWASP Top 10 LLM...

DSPM Vendor Due Diligence View More

DSPM Vendor Due Diligence

DSPM’s Buyer Guide ebook is designed to help CISOs and their teams ask the right questions and consider the right capabilities when looking for...

What's
New