DATA PRIVACY ACT CPALE Syllabus 1. Discuss definitions 2. Discuss the scope of application 3. Describe the data privacy principles 4. Illustrate processing of personal data 5. Identify the security measures for protection of personal data 6. Determine the rights of data subject 7. Apply data breach notification 8. Discus outsourcing and subcontracting agreements 9. Determine registration and compliance requirements 1 DATA PRIVACY ACT CPALE Syllabus Introduction to the Data Privacy National Privacy Commission Structure of the Data Privacy Act 1. Discuss definitions 2. Discuss the scope of application 3. Describe the data privacy principles 4. Illustrate processing of personal data 5. Identify the security measures for protection of personal data 6. Determine the rights of data subject 7. Apply data breach notification 8. Discus outsourcing and subcontracting agreements 9. Determine registration and compliance requirements 2 Introduction to Data Privacy 3 4 Loss of Trust Loss of Selfdetermin ation Discrimination Harassment Damaged Reputation Loss of Autonomy Lost of Money Stigmatization 5 1. 2. 3. Protects the privacy of individuals while ensuring free flow of information to promote innovation and growth; Regulates the collection, recording, organization, storage, updating or modification, retrieval, consultation, use, consolidation, blocking, erasure or destruction of personal data; and Ensures that the Philippines complies with international standards set for data protection through National Privacy Commission (NPC). 6 ▪ More than 900,000 (3%) clients of Philippine-based pawnshop Cebuana Lhuillier were affected by a data breach at the beginning of 2019. ▪ On March 27, 2016, hackers under the banner "Anonymous Philippines" hacked into the website of the COMELEC and defaced it. 55 million registered voters are at risk due to the data breach according to security firm, Trend Micro potentially surpassing the Office of Personnel Management data breach which affected 20 million people. ▪ Online lenders barred from harvesting borrowers’ phone and social-media contact list, says Privacy Commission. ▪ In April 2019, it was revealed that two datasets from Facebook apps had been exposed to the public internet. The information related to more than 530 million Facebook users and included phone numbers, account names, and Facebook IDs. 7 In 2019, the number of phishing cybercrime incidents in the Philippines was highest for those within the National Capital region, amounting to approximately 58.2 thousand victims. “While the law provides protection to your personal information, as a data subject, you still need to be vigilant at all times”. 8 Personal data breach refers to a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to, personal data transmitted, stored, or otherwise processed. Types of Data Breach – Confidentiality, Integrity and Availability. Processing – Transmitted, Stored, or otherwise processed. Risk or Exposure 1. Accidental or unlawful destruction and loss 2. Alteration of personal data 3. Unauthorized disclosure of, or access Availability breach Integrity breach Confidentiality breach 9 An availability breach resulting from loss, accidental or unlawful destruction of personal data; An integrity breach resulting from alteration of personal data; and/or A confidentiality breach resulting from the unauthorized disclosure of or access to personal data. National Privacy Commission 10 11 ▪ An independent body mandated to administer and implement the act, and to monitor and ensure compliance of the country with international standards set for personal data protection. ▪ Coordinate with other government agencies and the private sector on efforts to formulate and implement plans and policies to strengthen the protection of personal information in the country. 12 a. b. c. d. e. f. g. Rule Making Advisory Public Education Compliance and Monitoring Complaints and Investigations Enforcements Other Functions – Administrative Issuances 1) Discuss the Definitions 14 ▪ ▪ ▪ ▪ ▪ ▪ ▪ ▪ ▪ ▪ ▪ ▪ ▪ Consent of the Data Subject Data Subject Data Processing System Filing System Information and Communication System Processing Personal Breach Personal Data Personal Information Personal Information controller Personal Information processor Privileged Information Sensitive Personal Information 15 Data subject refers to an individual whose personal information is processed. (Sec. 3 (c), R.A. 10173) 16 Refers to a person or organization who controls the collection, holding, processing or use of personal information, including a person or organization who instructs another person or organization to collect, hold, process, use, transfer or disclose personal information on his or her behalf. The term excludes: (1) A person or organization who performs such functions as instructed by another person or organization; and (2) An individual who collects, holds, processes or uses personal information in connection with the individual’s personal, family or household affairs. (Sec. 3 (h), R.A. 10173) 17 ▪ ▪ ▪ ▪ ▪ ▪ ▪ ▪ NBI GSIS SSS DFA PSA BIR PRC LTO Are the above exclusive? 18 Refers to any natural or juridical person qualified to act as such under this Act to whom a personal information controller may outsource the processing of personal data pertaining to a data subject. (Sec. 3 (i), R.A. 10173) Example: Executive Search, BPO, Health Service Provider, Cloud Computing Service 19 The Data Privacy Act is a law that seeks to protect all forms of information, be it private, personal, or sensitive. It is meant to cover both natural and juridical persons involved in the processing of personal information. 20 1. 2. 3. Personal Information Sensitive Personal Information Privileged Information 21 “Personal information” refers to any information, whether recorded in a material form or not, from which the identity of an individual is apparent or can be reasonably and directly ascertained by the entity holding the information, or when put together with other information would directly and certainly identify an individual; Marites Dela Cruz ▪ ▪ ▪ ▪ ▪ ▪ ▪ ▪ Full name Gender Birthdate Mobile No. Address Birthplace Bank Account number Parents’ name 22 Sensitive personal information refers to personal information: 1. About an individual’s race, ethnic origin, marital status, age, color, and religious, philosophical or political affiliations; 2. About an individual’s health, education, genetic or sexual life of a person, or to any proceeding for any offense committed or alleged to have been committed by such person, the disposal of such proceedings, or the sentence of any court in such proceedings; 23 3. Issued by government agencies peculiar to an individual which includes, but not limited to, social security numbers, previous or cm-rent health records, licenses or its denials, suspension or revocation, and tax returns; and 4. Specifically established by an executive order or an act of Congress to be kept classified 24 Personal Sensitive Full name Marital Status Gender Race, Color, Age, Ethnic Origin Birthdate Health, Education, Genetic or Sexual Life Mobile No. Criminal Proceeding Information Address Religious, Philosophical or Political Affiliations Birthplace Government Issued Personal information, Tax returns Bank Account Number Parents’ name 25 Any and all forms of data which constitute privileged communication under the Rules of Court and laws. ▪ ▪ ▪ ▪ ▪ ▪ ▪ Attorney-Client Priest-Penitent Husband and Wife Physician-Patient Bank Deposits (RA 1405) Trade or Industrial Secret Statement in judicial proceedings 26 Information and Communication System – refers to a system for generating, sending, receiving, storing or otherwise processing electronic data messages or electronic documents and includes the computer system or other similar device by which data is recorded, transmitted or stored and any procedure related to the recording, transmission or storage of electronic data, electronic message, or electronic document. (Sec. 3 (f), DPA) Filing System – refers to any set of information relating to natural or juridical persons to the extent that, although the information is not proceed by equipment operating automatically in response to instructions given for the purpose, the set is structured, either by reference to individuals or by reference to criteria relating to individuals, in such a way that specific information relating to a particular person is readily accessible. 27 “Data Processing Systems” refers to the structure and procedure by which personal data is collected and further processed in an information and communications system or relevant filing system, including the purpose and intended output of the processing (IRR, Rule 1, Sec. 3 (e)). 2. Discuss the Scope of Application 28 29 SEC. 4. Scope. This Act applies to the processing of all types of personal information and to any natural and juridical person involved in personal information processing including those PIC and PIPs who, although not found or established in the Philippines, use equipment that are located in the Philippines, or those who maintain an office, branch or agency in the Philippines subject to the immediately succeeding paragraph: Provided, That the requirements of Section 5 are complied with. 30 SEC. 6. Extraterritorial Application. – This Act applies to an act done or practice engaged in and outside of the Philippines by an entity if: (a) The act, practice or processing relates to personal information about a Philippine citizen or a resident; (b) The entity has a link with the Philippines, and the entity is processing personal information in the Philippines or even if the processing is outside the Philippines as long as it is about Philippine citizens or residents such as, but not limited to, the following: (1) A contract is entered in the Philippines; (2) A juridical entity unincorporated in the Philippines but has central management and control in the country; and (3) An entity that has a branch, agency, office or subsidiary in the Philippines and the parent or affiliate of the Philippine entity has access to personal information; and (c) The entity has other links in the Philippines such as, but not limited to: (1) The entity carries on business in the Philippines; and (2) The personal information was collected or held by an entity in the Philippines. 3. Describe the Data Privacy Principle 31 32 a. General Data Privacy Principles (DPA, Sec. 11) Transparency •Data Subject is Informed of •Nature, specific and legitimate purpose, extent of data processing risks, safeguards, identity of PI Controller •Rights and how exercised and •Information and communication easy to access and understand Legitimacy • • • • Consent Required Prior to collection and processing Processing compatible with declared purpose Purpose not contrary to law, morals, public policy PI is accurate, relevant, up to date; rectify or restrict processing if inaccurate Proportionality • • • • Processing is Fair and lawful; adequate, relevant, suitable, necessary Not excessive in relation to specified purpose PI processed only if purpose cannot be fulfilled by other means 33 ▪ Privacy Notice ▪ Privacy Policy ▪ Consent 34 ▪ Consent – the data subject agrees to the collection and processing of personal information - Freely given - Specific - Informed indication of will ▪ Evidenced by written, electronic or recorded means: - Signature - Opt-in box/clicking an icon - Sending a confirmation email - Oral confirmation 35 ▪ Collection: for declared, specified, and legitimate purpose ▪ Consent: Prior to collection, time-bound in relation to purpose ▪ Purpose and extent of collection: Is there automated processing for profiling or data sharing? ▪ Processing: fair, lawful, ensure data quality ▪ Personal Data not retained longer than necessary ▪ Authorized further processing: with adequate safeguards ▪ Only personal data that is necessary compatible with declared, specified, and legitimate purpose shall be collected Profiling – using personal data (through automated processing) to evaluate certain personal aspects, i.e., analyze or predicts aspects concerning the individual’s work performance, economic situation, health, personal preferences, interests, reliability, behavior, location or movements. 4. Illustrate Processing of Personal Data 36 37 Refers to any operation or any set of operations performed upon personal information including, but not limited to, the collection, recording, organization, storage, updating or modification, retrieval, consultation, use, consolidation, blocking, erasure or destruction of data. (Sec. 3 (j), R.A. 10173) 38 1. 2. 3. 4. 5. Creation and Collection Storage and Transmission Usage and Distribution Retention Disposal and Destruction 39 “Data Processing Systems” refers to the structure and procedure by which personal data is collected and further processed in an information and communications system or relevant filing system, including the purpose and intended output of the processing (IRR, Rule 1, Sec. 3 (e)). 40 a. b. c. d. General Principles Sensitive and Privileged Information Subcontracting Privileged Communication 41 a. General Principles The processing of personal data shall be allowed subject to adherence to the principles of transparency, legitimate purpose, and proportionality. (TLP) (Section 18, R.A. 10173) 42 The processing of personal information shall be permitted only if not otherwise prohibited by law, and when at least one of the following conditions exists: a. The data subject has given his or her consent; b. The processing of personal information is necessary and is related to the fulfillment of a contract with the data subject or in order to take steps at the request of the data subject prior to entering into a contract; c. The processing is necessary for compliance with a legal obligation to which the personal information controller is subject; 43 d. The processing is necessary to protect vitally important interests of the data subject, including life and health; e. The processing is necessary in order to respond to national emergency, to comply with the requirements of public order and safety, or to fulfill functions of public authority which necessarily includes the processing of personal data for the fulfillment of its mandate; or f. The processing is necessary for the purposes of the legitimate interests pursued by the personal information controller or by a third party or parties to whom the data is disclosed, except where such interests are overridden by fundamental rights and freedoms of the data subject which require protection under the Philippine Constitution. 44 b. Sensitive and Privileged Information The processing of SPI and PI shall be prohibited, except in the following cases: a. The data subject has given his or her consent, specific to the purpose prior to the processing, or in the case of privileged information, all parties to the exchange have given their consent prior to processing; b. The processing of the same is provided for by existing laws and regulations: Provided, That such regulatory enactments guarantee the protection of the sensitive personal information and the privileged information: Provided, further, That the consent of the data subjects are not required by law or regulation permitting the processing of the sensitive personal information or the privileged information; 45 b. Sensitive and Privileged Information c. The processing is necessary to protect the life and health of the data subject or another person, and the data subject is not legally or physically able to express his or her consent prior to the processing; d. The processing is necessary to achieve the lawful and noncommercial objectives of public organizations and their associations: Provided, That such processing is only confined and related to the bona fide members of these organizations or their associations: Provided, further, That the sensitive personal information are not transferred to third parties: Provided, finally, That consent of the data subject was obtained prior to processing; 46 b. Sensitive and Privileged Information e. The processing is necessary for purposes of medical treatment, is carried out by a medical practitioner or a medical treatment institution, and an adequate level of protection of personal information is ensured; or f. The processing concerns such personal information as is necessary for the protection of lawful rights and interests of natural or legal persons in court proceedings, or the establishment, exercise or defense of legal claims, or when provided to government or public authority. (Section 13, R.A. 10173) 47 ▪ No. Consent is just one criterion for lawful processing of both personal and sensitive personal information. ▪ Consent will not always be the most appropriate basis for processing personal data. ▪ PICs should choose the lawful basis the most closely reflects the true nature of the relationship with the individual and the purpose of the processing. 48 Personal Information (Ex. Name, Address, Phone Number, E-mail address) Sensitive Personal Information (Ex. Heald, Education, Govt. Issued Nos.) Consent of the Data Subject Consent of the Data Subject Necessary to the fulfillment of a contract Public organizations and their associations limited to members with consent Legal Obligations (Reporting Requirements) Laws and regulations, with safeguards Protect vitally important interests of the data subject, including life and health Protect life and health of any person, where data subject physically or legally unable to consent National emergency, to comply with the Protection of lawful rights and interests of requirements of public order and safety, or to fulfill natural or legal persons in court functions of public authority proceedings, legal claims, provided to government authority Legitimate Interest Medical Treatment Purpose 49 Personal Information Sensitive Personal Information Consent Consent Law and Regulations Law and Regulations Protect Life Protect Life Contract Medical Treatment Legal Obligation Court Proceedings, Legal Claims Public Order and Safety Legitimate Interest 50 ▪ ▪ ▪ ▪ ▪ SEC AMLC Insurance Commission BIR Credit Information Commission 51 d. Privileged Communication Rule: - Personal information controllers cannot be compelled to disclose data in their possession, subject to existing laws and regulations. - Any evidence gathered on privileged information is inadmissible as evidence. (Section 15, R.A. 10173) ▪ ▪ ▪ ▪ ▪ ▪ ▪ Attorney-Client Priest-Penitent Husband and Wife Physician-Patient Ban Deposits (RA 1405) Trade or Industrial Secret Statement in judicial proceedings 52 1. The PIC should collect personal information for specified and legitimate purposes determined and declared before, or a soon as reasonably practicable after collection 2. The PIC should collect and process personal information adequately and not excessively 3. The PIC should process personal information fairly and lawfully, and in accordance with the rights of a data subject 4. The PIC should retain personal information only for as long as necessary for the fulfillment of the purposes for which the data was obtained. The information should be kept in a form which permits identification of data subjects for no longer than is necessary. 5. The PIC should process accurate, relevant and up to date personal information. 6. The PIC must implement reasonable and appropriate organizational, physical and technical measures intended for the protection of personal information. 53 1. The PIC must implement reasonable and appropriate TOP measures intended for the protection of personal information against any accidental or unlawful destruction, alteration and disclosure, as well as against any other unlawful processing. 2. The PIC shall implement reasonable and appropriate measures to protect personal information against natural dangers such as accidental loss or destruction, and human dangers such as unlawful access, fraudulent misuse, unlawful destruction, alteration and contamination. 3. The determination of the appropriate level of security under this section must take into account the nature of the personal information to be protected, the risks represented by the processing. 4. The PIC must further ensure that third parties processing personal information on its behalf shall implement the security measures required. 54 5. The employees, agents or representatives of a PIC who are involved in the processing of personal information shall operate and hold personal information under strict confidentiality if the personal information are not intended for public disclosure. 6. The PIC shall promptly notify the NPC and affected data subjects when sensitive personal information or other information that may, under the circumstances, be used to enable identify fraud are reasonably believed to have been acquired by an unauthorized person, and the personal information controller or the NPC believes that such unauthorized acquisition is likely to give rise to a real risk of serious harm to any affected data subject. 5. Identify the Security Measures for Protection of Personal Data 62 56 ORGANIZATIONAL Rule VI, S.26 Physical Rule VI, S. 27 Technical Rule VI, S. 28 • Designate compliance officers; designate a Data Protection Officer • Implement Data Protection Polices; supervise employees; contracts with PIPs ensure PIPs implement security measures • Maintain records of processing activities; data retention schedule • Limiting access to room, work station or facility • Office design and lay-out provides privacy to processing staff • Security against natural disaster, power disturbances, external access • Security policy for processing personal data • Safeguards to protect computer network against accidental, unauthorized, unlawful use, ability to restore access to data • Data encryption during storage, authentication process for access Subject to NPC Compliance Checks: Document Submission, On-Site Visit 6. Determine the Rights of the Subject 64 58 The rights of a data subject are as follows: CODE DAIF ✓ Right to Correct/Rectification ✓ Right to Object ✓ Right to Damages sustained due to such inaccurate, incomplete, outdated, false, unlawfully obtained or unauthorized use of personal information ✓ Right to Erasure or blocking of his or her personal information from the personal information controller’s filing system 59 The rights of a data subject are as follows: CODE DAIF ✓ Right to data portability (Sec. 18, R.A. 10173) ✓ Right to reasonable access to his or her personal information that were processed ✓ Right to be Informed of whether personal information ✓ Right to be furnished the information before the entry of his or her personal information into the processing system of the personal information controller. Section 16, R.A. 10173) 7. Apply Data Breach Notification 67 61 Section 38. Data Breach Notification. a. The Commission and affected data subjects shall be notified by the personal information controller within seventy-two (72) hours upon knowledge of, or when there is reasonable belief by the personal information controller or personal information processor that, a personal data breach requiring notification has occurred. b. Notification of personal data breach shall be required when sensitive personal information or any other information that may, under the circumstances, be used to enable identity fraud are reasonably believed to have been acquired by an unauthorized person, and the personal information controller or the Commission believes that such unauthorized acquisition is likely to give rise to a real risk of serious harm to any affected data subject. 62 Section 39. Contents of Notification. The notification shall at least describe the nature of the breach, the personal data possibly involved, and the measures taken by the entity to address the breach. The notification shall also include measures taken to reduce the harm or negative consequences of the breach, the representatives of the personal information controller, including their contact details, from whom the data subject can obtain additional information about the breach, and any assistance to be provided to the affected data subjects. 63 PIC’s Responsibilities in case of data Breach (IRR, Rule IX, Sec. 41 Document all security incidents and personal data breaches through written reports, including those not covered by the notification requirements. In the case of personal data breaches, include in the report the facts surrounding an incident, the effects of such incident, and the remedial actions taken by the personal information controller. 64 Security Incident Any event or occurrence that affects or tends to affect data protection, or may compromise the availability, integrity, and confidentiality of personal data. It includes incidents that may result in a personal data breach, if not for safeguards that have been put in place. 8. Discuss Outsourcing and Subcontracting Agreements 65 66 Subcontracting PIP Data Sharing PIC PIC shall be responsible for ensuring that proper safeguards are in place to ▪ Ensure the confidentiality of the personal information processed; ▪ Prevent its use for unauthorized purposes; and ▪ Generally; comply with the requirements of the DPA and other laws for processing of personal information. PIC 67 Section 43. Subcontract of Personal Data. A personal information controller may subcontract or outsource the processing of personal data: Provided, that the PIC shall use contractual or other reasonable means to ensure that proper safeguards are in place, to ensure the CIA of the personal data processed, prevent its use for unauthorized purposes, and generally, comply with the requirements of the Act, these Rules, other applicable laws for processing of personal data, and other issuances of the Commission. 68 Section 44. Agreements for Outsourcing. Processing by a PIP shall be governed by a contract or other legal act that binds the personal information processor to the personal information controller. a. The contract or legal act shall set out the subject-matter and duration of the processing, the nature and purpose of the processing, the type of personal data and categories of data subjects, the obligations and rights of the personal information controller, and the geographic location of the processing under the subcontracting agreement. 69 b. The contract or other legal act shall stipulate, in particular, that the personal information processor shall: 1. Process the personal data only upon the documented instructions of the personal information controller, including transfers of personal data to another country or an international organization, unless such transfer is authorized by law; 2. Ensure that an obligation of confidentiality is imposed on persons authorized to process the personal data; 3. Implement appropriate security measures and comply with the Act, these Rules, and other issuances of the Commission; 70 4. Not engage another processor without prior instruction from the personal information controller: Provided, that any such arrangement shall ensure that the same obligations for data protection under the contract or legal act are implemented, taking into account the nature of the processing; 5. Assist the personal information controller, by appropriate technical and organizational measures and to the extent possible, fulfill the obligation to respond to requests by data subjects relative to the exercise of their rights; 6. Assist the personal information controller in ensuring compliance with the Act, these Rules, other relevant laws, and other issuances of the Commission, taking into account the nature of processing and the information available to the personal information processor; 71 7. At the choice of the personal information controller, delete or return all personal data to the personal information controller after the end of the provision of services relating to the processing: Provided, that this includes deleting existing copies unless storage is authorized by the Act or another law; 8. Make available to the personal information controller all information necessary to demonstrate compliance with the obligations laid down in the Act, and allow for and contribute to audits, including inspections, conducted by the personal information controller or another auditor mandated by the latter; 9. Immediately inform the personal information controller if, in its opinion, an instruction infringes the Act, these Rules, or any other issuance of the Commission. 72 Section 45. Duty of personal information processor. The personal information processor shall comply with the requirements of the Act, these Rules, other applicable laws, and other issuances of the Commission, in addition to obligations provided in a contract, or other legal act with a personal information controller. 73 Other relevant principles or directives in the IRR: 1. A PIC is responsible for any personal data under its control or custody, including those outsourced or transferred to a PIP. (IRR S50) 2. Using appropriate contractual agreements, a PIC should ensure that its PIPs also implement the security measures required under the law. In fact, it must only deal with PIPs that provide sufficient guarantees to implement such measures, and ensure the protection of the rights of data subjects. (IRR, S26 (f); also: IRR S50(a). 3. When registering its data processing system, a PIC must ensure that its registration information indicates the recipients or categories of recipients (including personal information processors) of the data involved (IRR. S47(a)(4)), and, where applicable, whether the processing is being carried out pursuant to an outsourcing or sub-contracting agreement (IRR, S47(a)((2)). 4. An outsourcing contract, subcontracting agreement, or any similar document, including its implementation, is subject to the review of the Commission. (IRR S49(c)). 9. Determine Registration and Compliance Requirements 74 75 Rule XI Section 46 IRR page 39 76 When should you comply? IRR Section 67. Period for Compliance. Any natural or juridical person or other body involved in the processing of personal data shall comply with the personal data processing principles and standards of personal data privacy and security already laid out in the Act. Personal information controllers and Personal Information processors shall register with the Commission their data processing systems or automated processing operations, subject to notification, within one (1) year after the effectivity of these Rules. 77 Circular 16-01 – Period for Compliance SECTION 36. Transitory Period. Government agencies shall be given a period of one (1) year transitory period from the effectivity of these Rules to comply with the requirements provided herein. 78 How should you comply? R.A. 10173, Data Privacy Act of 2012 SEC. 20 (a) The personal information controller must implement reasonable and appropriate organizational, physical and technical measures intended for the protection of personal information against any accidental or unlawful destruction, alteration and disclosure, as well as against any other unlawful processing. Sec. 21 (b) The personal information controller shall designate an individual or individuals who are accountable for the organization’s compliance with this Act. 79 Selection Considerations Minimum requirements – knowledge of privacy principles and practices – empowered to be a change agent Options – full-time or part-time (1 or 2) – supported by a team or a committee – full-blown task force or data protection office One size doesn’t fit all – low risk – medium risk – high risk 80 What’s your risk level? 81 What happens if we fail to comply? Sec. 22. The head of each government agency or instrumentality shall be responsible for complying with the security requirements mentioned herein… Sec. 34. Extent of Liability. If the offender is a corporation, partnership or any juridical person, the penalty shall be imposed upon the responsible officers, as the case may be, who participated in, or by their gross negligence, allowed the commission of the crime. Punishable Act Jail Term Fine (Pesos) Unauthorized processing 1y to 3y ꟷ 3y to 6y 500k to 4m Access due to negligence 1y to 3y ꟷ 3y to 6y 500k to 4m Improper disposal 6m to 2y ꟷ 3y to 6y 100k to 1m Unauthorized purposes 18m to 5y ꟷ 2y to 7y 500k to 2m 82 Intentional breach 1y to 3y 500k to 2m Concealing breach 18m to 5y 500k to 1m Malicious disclosure 18m to 5y 500k to 1m Unauthorized disclosure Combination of acts 1y to 3y ꟷ 3y to 5y 3y to 6y 500k to 2m 1m to 5m Compliance Checklist Designate accountable person (DPO) Conduct privacy impact assessment Rollout privacy & data protection policy Establish a breach management framework Initiate a privacy management program 83 84 1. 2. 3. 4. 5. Appoint your Data Protection Officer Conduct your Privacy Impact Assessment Create your Data Privacy Manual Implement Data Privacy and Security Measures Be ready in case of Data Breach 85 IP LAW LAW CPALE Syllabus 1. Discuss Patents 2. Discuss Trademark, Service Marks, and Trade Names 3. Discuss Copyright 1 Intellectual Property LAW (R.A. 8293) 2 3 ❑ Creations of the mind, such as: ▪ Inventions; ▪ Literary and artistic works ▪ Designs; and ▪ Symbols, names, images and designs used in commerce ❑ Legal rights which result from intellectual activities of an individual or organization in the industrial, scientific, literacy and artistic fields. 4 Article 14, Section 13, 1987 Constitution “The State shall protect and secure the exclusive rights of scientists, investors, artists, and other gifted citizens to their intellectual property and creations, particularly when beneficial to the people, for such period as may be provided by law’. 5 ❑ It is property therefore: a) Exclusive rights to do or prohibit b) May be assigned or licensed to others c) May be infringed ❑ Intangible Asset vs Object 6 Patents Utility Model Industrial Design Layout Design Copyright Trademarks Trade name Geographic Indications Trade Secret 7 ❑ R.A. 8293 – June 6, 1997 ❑ As amended by: a) RA 9502 (Patent Law Amendment) 8 A patent is a grant given by the government to investors/applicants/designers giving the exclusive right to use the invention, utility model and industrial design in the Philippines for a limited term in exchange for the disclosure. 9 ▪ ▪ ▪ ▪ ▪ Grant Territoriality Limited Rights Disclosure Conditional 10 ▪ Any technical solution of a problem in any field of human activity which is new, involves an inventive step and is industrially applicable shall be Patentable. ▪ It may be, or may relate to, a product, or process, or an improvement of any of the foregoing. (Sec. 21, IPC) 11 ▪ ▪ ▪ A product, such as a machine, a device, an article of manufacture, a composition of matter (food, medicine, disinfectant, ect), a microorganism; A process, such as a method of use, a method of manufacturing, a nonbiological process, a microbiological process; computer related inventions; An improvement of the any of the foregoing 12 1. 2. 3. Novelty – an invention shall not be considered new if it forms part of a prior art. (Sec. 23 IPC) Inventive Step – if, having regard to prior art, it is not obvious to a person skilled in the art at the time of the fling date or priority date of the application claiming the invention. (Sec. 26 IPC) Industrial Applicability – An invention that can be produced and used in any industry. This means an invention is not merely theoretical, but also has a practical purpose. 13 a. b. Everything which has been made available to the public anywhere in the world, before the filing date or the priority date of the application claiming the invention; and The whole contents of an earlier published Philippine application or application with earlier priority date of a different inventor. 14 The ultimate goal of a patent system is to bring new designs and technologies into the public through disclosure; hence ideas, once disclosed to the public without protection of a valid patent, are subject to appropriation without significant restrain (Pearl & Dean vs. Shoemart Inc., G.R. No. 148222, August 15, 2003) 15 General Rule: When a work has already been made available to the public, it shall be nonpatentable for absence of novelty. Exception: Doctrine of Non-Prejudicial Disclosure The disclosure of information contained in the application during the twelve (12) months preceding the filing date or the priority date of the application shall not prejudice the applicant on the ground of lack of novelty if such disclosure was made by: 16 1) The inventor; 2) A patent officer and the information was contained a) In another application filed by the inventor and should not have been disclosed by the office, or b) In an application filed, without the knowledge or consent of the inventor, by a third party who obtained the information directly or indirectly from the inventor; or 3) A third party who obtained the information directly or indirectly from the inventor Section 25, IPC 17 1. Methods for treatment of the human or animal body or animal body by surgery or therapy and diagnostic methods practiced on the human or animal body. 2. Aesthetic creations 3. Plant varieties or animal breeds or essentially biological process for the production of plants or animals. This provision shall not apply to microorganisms and non-biological and microbiological processes. 4. Schemes, rules and methods of performing mental acts, playing games or doing business, and programs for computers 5. Anything which is contrary to public order or morality 6. IN the case of drugs and medicines, mere discovery of a new form or new property of a known substance which does not result in the enhancement of the efficacy of that substance or the new use for a known substance, or the mere use of a known process unless such known process results in a new product that employs at least one new reactant. 7. Discoveries, scientific theories and mathematical methods. Registration of Patent 18 19 1. 2. 3. 4. 5. 6. 7. 8. 9. Filing of the application Accordance of the filing date Formality examination Classification and Search Publication of application Substantive examination Grant of Patent Publication upon grant Issuance of certificate 20 The patent application shall be in Filipino or English and shall contain the following: a) A request for the grant of a patent; b) A description of the invention; c) Drawings necessary for the understanding of the invention; d) One or more claims; and e) An abstract. Section 32 Ownership of a Patent 21 22 1. Inventor, his heirs, or assigns (IPC, Sec. 28) 2. Joint invention – Jointly by the inventors (IPC, Sec. 28) 3. Two or more persons invented separately and independently of each other – To the person who filed an application 4. Two or more applications are filed – the applicant who has the earlies filing date or, the earliest priority date. First to file rule (IPC, Sec. 29) 23 1. If two (2) or more persons have made the invention separately and independently of each other, the right to the patent shall belong to the person who filed an application for such invention, or 2. Where two or more applications are filed for the same invention, to the applicant which has the earliest filing date. (IPC, Sec. 29) 24 1. Pursuant to a commission: The person who commissions the work shall own the patent, unless otherwise provided in the contract. 2. Pursuant to employment: In case the employee made the invention in the course of his employment contract, the patent shall belong to: 25 a. b. The employee, if the inventive activity is not a part of his regular duties even if the employee uses the time, facilities and materials of the employers; The employer, if the inventive activity is the result of the performance of his regularly-assigned duties, unless there is an agreement to the contrary (IPC, Sec. 30) 26 Priority Date An application for patent filed by any person who has previously applied for the same invention in another country which by treaty, convention, or law affords similar privileges to Filipino citizens, shall be considered as filed as of the date of filing the foreign application (IPC, Sec. 31) Filing Date is accorded only when all the requirements provided under Section 40 are present. Priority Date comes into play when there is an application for patent for the same invention that was filed in another country. 27 1. 2. 3. The local application expressly claims priority; It is filed within 12 months from the date the earliest foreign application was filed; and A certified copy of the foreign application together with an English translation is filed within 6 months from the date of filing in the Philippines (Sec. 31, IPC) Rights Conferred by Patent 28 29 1. In case of Product – Right to restrain, prohibit and prevent any unauthorized person or entity from making, using, offering for sale, selling or importing the product. 2. In case of Process – Right to restrain prohibit and prevent any unauthorized person or entity from manufacturing, dealing in, using, offering for sale, selling or importing any product obtained directly or indirectly from such process. (IPC, Sec 71) 3. Right to assign the patent, to transfer by succession, and to conclude licensing contracts (IPC, Sec. 71.2) The rights conferred by a patent application take effect after publication in Official gazette. (IPC, Sec. 46) Remedies and Cancellation 30 31 Any interested party may petition to cancel any patent or any claim or parts of a claim any of the following grounds: 1. Invention is not new or patentable; 2. Patent does not disclose the invention in a manner sufficiently clear and complete for it to be carried out by any person skilled in the art; 3. The patent is contrary to public order or morality (IPC, Sec. 61.1) 4. The patent is found invalid in an action for infringement (IPC, Sec. 82) or 5. The patent includes matters outside the scope of the disclosure contained in the application (IPC, Sec. 21, Regulations on Inter Partes Proceeding, Sec. 1 32 Remedies of persons with a right to a patent If a person other than the applicant is declared by final court order or decision as having the right to a patent, he may within 3 months after such decision has become final: 1. Prosecute the application as his own 2. File a new patent application 3. Request the application to be refused; or 4. Seek cancellation of the patent (IPC, Sec. 67.1) Time to file action within one (1) year form the date of publication. 33 If a person, who was deprived of the patent without his consent or through fraud is declared by final court order or decision to be the true and actual inventor, the court shall order his substitution as patentee, or at the option of the true inventor, cancel the patent, and award actual damages in his favor if warranted by the circumstances (IPC, Sec. 68). Limitations of Patent Rights 34 35 The owner of a patent has no right to prevent third parties from making, using, offering for sale, selling or importing a patented product in the following circumstances: a. Using patented product after it has been put on the market in the Philippines by the owner of the product, or with his express consent. a.1 In case of drugs or medicines, the said limitation applies after a drug or medicine has been introduced in the Philippines or anywhere else in the world by the patent owner, or by any party authorized to use the invention. This allows parallel importation for dugs and medicines. a.2 The right to import the drugs and medicines shall be available to any government agency or any private third party (IPC, Sec. 72.1 as amended by R.A No. 9502) 36 b. Where the act is done privately and on a non-commercial scale of for a noncommercial purpose (IPC, Sec. 72.2) c. Exclusively for experimental use of the invention for scientific purposes or educational purposes. (IPC, Sec. 72.3) d. In the case of drugs and medicines, where the act includes testing, using, making or selling the invention including any data related thereto, solely for purposes reasonably related to the development and submission of information an issuance of approvals by government regulatory agencies required under any law of the Philippines or of another country that regulates the manufacture, construction, use or sale of any product. 37 Prior User Person other than the applicant, who in good faith, started using the invention in the Philippines, or undertaken serious preparations to use the same, before the filing date or priority date of the application shall have the right to continue the use thereof, but his right shall only be transferred or assigned further with his enterprise or business. (IPC, Sec. 73). 38 A government agency or third person authorized by the Government may exploit the invention eve without agreement of the patent owner where: a. The public interest, in particular, national security, nutrition, health or the development of other sectors, as determined by the appropriate agency of the government, so requires; b. A judicial or administrative body has determined that the manner of exploitation, by the owner of the patent or his licensee, is anti-competitive; c. In the case of drugs and medicines, there is a national emergency or other circumstances of extreme urgency requiring the use of the invention; d. In the case of drugs and medicines, there is a public non-commercial use of the patent by the patentee, without satisfactory reason; or e. In the case of drugs and medicines, the demand for the patented article in the Philippines is not being met to an adequate extent and on reasonable terms, as determined by the Secretary of Department of Health. 39 As known as the doctrine of first sale, it provides that the patent holder has control of the first sale of his invention. He has the opportunity to receive the full consideration for his invention from his sale. Hence, he exhausts his rights in the future control of his invention. Patent Infringement 40 41 The making, using, offering for sale, selling, or importing a patented product or a product obtained directly or indirectly from a patented process, or the use of a patented process without the authorization of the patentee constitutes patent infringement. (Sec. 76) 42 1. 2. Literal Infringement Doctrine of Equivalents 43 In using literal infringement, resort must be had, in the first instance, to the words of the claim. If accused matter clearly falls within the claim, infringement is made out and that is the end of it. 44 An , dep occur when a device appropriates a prior invention by incorporating its innovative concept ands despite some modification and change, performs substantially the same function in substantially the same way to achieve substantially the same result. (Godines v. CA, G.R. No. 97343, September 13, 1993) 45 Remedies of the Owners of the Patent against Infringers 1. Civil action for Infringement 2. Criminal action for infringement 3. Administrative remedy 4. Destruction of infringing material-upon court order 46 Remedies of the Owners of the Patent against Infringers 1. Civil action for Infringement – the owner may bring a civil action with the appropriate Regional Trial Court to recover from infringer the damages sustained by the former, plus attorney’s fees and other litigation expense, and to secure an injunction for the protection of his rights (IPC, Sec. 76.2). If the damages are inadequate or cannot be reasonably ascertained with reasonable certainty, the court may award by way of damages a sum equivalent to reasonable royalty. (IPC, Sec. 76.3) 47 Remedies of the Owners of the Patent against Infringers 2. Criminal action for infringement – if the infringement is repeated; The criminal action prescribes in three (3) years from the commission of the crime. 3. Administrative remedy – Where the amount of damages claimed is not less than P200,000, the patentee may choose to file an administrative action against the infringer with the Bureau of Legal Affairs (BLA). 4. Destruction of Infringing material – upon court order 48 Defenses in Action for Infringement 1. Invalidity of the patent (Sec. 81, IPC); 2. Any of the grounds for cancellation of patents; a. That what is claimed as the invention is not new or patentable b. That the patent does not disclose the invention in a manner sufficiently clear and complete for it to be carried out by any person skilled in the art; or c. That the patent is contrary to public order or morality (Sec. 61, IPC) 3. Prescription Trademark 49 50 Trademark Any visible sign capable of distinguishing the goods (trademark)or services (service mark) of an enterprise and shall include a stamped or marked container of goods. (Sec. 121.1) 51 1. 2. 3. To indicate the origin or ownership of the article to which they are attached; To guarantee that those articles come up to a certain standard of quality; To advertise the articles, they symbolized. 52 Today, the trademark is not merely a symbol of origin and goodwill; it is often the most effective agent for the actual creation and protection of goodwill. It imprints upon the public mind an anonymous and impersonal guaranty of satisfaction, creating a desire for further satisfaction. In other words, the mark actually sells the goods. The mark has become the “silent salesman,” the conduit through which direct contact between the trademark owner and the consumer is assured. It has invaded popular culture in ways never anticipated that it has become a more convincing selling point than even the quality of the article to which it refers. 53 1. It is visible sign (not sounds or scents) 2. Capable of distinguishing one’s goods and services from another. 54 ▪ ▪ ▪ ▪ ▪ ▪ ▪ ▪ ▪ Words Letters Numerals Figures/Pictures Shapes Colors Logos Three dimensional objects Combinations 55 ▪ ▪ Sounds Smell 56 Any visible sign capable of distinguishing the goods (trademark) or services (service mark) of an enterprise and shall include a stamped or marked container of goods. (Sec. 121.1) visible sign distinctive 57 58 Trademarks are divided into five different categories, which are ranked by distinctiveness. (FAS-DG) 1. Fanciful Trademarks 2. Arbitrary Trademarks 3. Suggestive Trademarks 4. Descriptive Trademarks 5. Generic Trademarks 59 Fanciful Trademarks Fanciful trademarks are made-up words Kodak, Exxon, which are invented to be used as a Polariod trademark name. Arbitrary Trademarks Arbitrary trademarks are words that have a real, common meaning but they are completely unrelated to the product or service Suggestive Trademarks Suggestive trademarks are named after Netflix, Microsoft, a characteristic of the product or service Descriptive Trademarks Descriptive trademarks are a description of the product or service Generic Trademarks Generic trademarks cannot be Band-Aid, Aspirin protected as they are simply a generic description of the productor or service. Apple, Dove, Shell Sharp, British Airways, BestBuy 60 61 A person may NOT: 1. Use a name if the word is generic (Lyceum of the Philippines vs. C.A. G.R. No. 101897, March 5, 1993) 2. Use any name indicating a geographical locations (Ang Si Heng vs. Wellington Department Store, supra) 62 Trademark Trade Name Identifies or distinguishes the goods or services Identifies or distinguishes the business or enterprise. Registration is required. Registration is not required. 63 ▪ Trademarks vs. Service Marks (Globe, Smart, BPO, Auditing Firm) ▪ Collective Marks ▪ Well-known marks 64 Mark or trade-name used by the members of a cooperative, an association or other collective group or organization. 65 ▪ Article 6 which governs the protection of well-known trademarks, is a self-executing provision and does not require legislative enactment to give it effect in the member country. ▪ It may be applied directly by the tribunals and officials of each member country by the mere publication or proclamation of the Convention, after the ratification according to the public law of each state and the order for its execution. ▪ The essential requirement under this Article is that the trademark to be protected must be “well-known” in the country where protection is sought. The power to determine whether a trademark is well-known lies in the “competent authority of the country of registration or use.” This competent authority would be either the registering authority if it has the power to decide this, or the courts of the country in question if the issue comes before a court. 66 ▪ Immoral, deceptive, or scandalous matters or falsely suggest a connection with persons, institutions, beliefs, or national symbols. ▪ Matter which may disparage or falsely suggest a connection with persons, etc. ▪ Contrary to public order or morality 67 ▪ Flags/coat of arms of nations or other insignia of the Philippines or any of its political subdivisions, or of any foreign nation ▪ Names, portraits or signature of living persons (Exception: with consent) ▪ Names, portraits or signature of a deceased President of the Philippines (Exception: with written consent of his/her living widow) 68 ▪ Identical with a registered mark belonging to a different proprietor or a mark with an earlier filing or priority date, in respect of: a) The same goods or services, or b) Closely related goods or services, or c) If it nearly resembles such a mark as to be likely to deceive or cause confusion; Note: First-to-File Rule 69 ▪ Misleading marks (Sec.123.1 g) ▪ Generic terms (signs or of indications that have become customary or usual to designate the goods or services in everyday language or in bona fide and established trade practice (Sec. 123.1 h and i) ▪ Descriptive terms (signs or indications that may serve in trade to designate the kind, quality, quantity, intended ▪ Purpose, value, geographical origin, time or production of the goods or rendering of the services, or other characteristics of the goods or services (Sec. 123.1 j ▪ Color alone; ▪ Shapes dictated by technical factors 70 ▪ Identical with an internationally well-known mark, whether or not it is registered here, used for identical or similar goods or services; ▪ Identical with an internationally well-known mark which is registered in the Philippines with respect to non-similar goods or services. Provided, that the interests of the owner of the registered mark are likely to be damaged by such use; 71 ▪ Identical with an internationally well-known mark, whether or not it is registered here, used for identical or similar goods or services; ▪ Identical with an internationally well-known mark which is registered in the Philippines with respect to non-similar goods or services. Provided, that the interests of the owner of the registered mark are likely to be damaged by such use; 72 ▪ Identical with an internationally well-known mark, whether or not it is registered here, used for identical or similar goods or services; Case: Fredco Manufacturing Corporation v. President and Felloes of Harvard College 73 Sec. 123. A mark cannot be registered if it….. (e) is identical with, or confusingly similar to, or constitutes a translation of a mark which is considered by the competent authority of the Philippines to be well-known internationally and in the Philippines, whether or not it is registered here, as being already the mark of a person other than the applicant for registration and used for identical or similar goods or services. Provided, That in determining whether a mark is well-known, account shall be taken of the knowledge of the relevant sector of the public, rather than of the public at large, including knowledge in the Philippines which has been obtained as a result of the promotion of the mark 74 f) Is identical with, or confusingly similar to, or constitutes a translation of a mark considered well-known in accordance with the preceding paragraph, which is registered in the Philippines with respect to goods or services which are not similar to those with respect to which registration is applied for. Provided That use of the mark in relation to those goods or services would indicate a connection between those goods or services, and the owner of the registered mark. Provided further, That the interests of the owner of the registered mark are likely to be damaged by such use, (Sec. 123) 75 Rule 18, A.M. No. 10-3-10 SC Sec. 2. Well-known mark. – In determining whether a mark is well-known, account shall be taken of the knowledge of the relevant sector of the public, rather than of the public at large, including knowledge in the Philippines which has been obtained as a result of the promotion of the mark. 76 Criteria – any combination a. The duration, extent and geographical area of any use of the mark; b. The market share, in the Philippines and in other countries; c. The degree of the inherent or acquired distinction of the mark; d. The quality-image or reputation acquired by the mark; e. The extent to which the mark has been registered in the world; f. The exclusivity of registration attained by the mark in world. 77 g. The extent to which the mark has been used in the world; h. The exclusivity of use attained by the mark in the world i. The commercial value attributed to the mark in the world; ii. The record of successful protection of the rights in the mark; iii. The outcome of litigations dealing with the issue of whether the mark is a well-known mark; and iv. The outcome of litigations dealing with the issue of whether the mark is a well-known mark; and v. The presence or absence of identical or similar marks validly registered for or used on identical or similar goods or services and owned by persons other than the person claiming that his mark is a well-known mark. 78 There is no question… that “Harvard” is a well-known name and mark not only in the United States but also internationally, including the Philippines. The mark “Harvard” is rated as one of the most famous marks in the world. It has been registered in at least 50 countries. It has been used and promoted extensively in numerous publications worldwide. It has established a considerable goodwill worldwide since the founding of Harvard University more than 350 years ago. 79 123.2 As regards signs or devices mentioned in paragraphs (j), (k), and (l), nothing shall prevent the registration of any such sign or device which has become distinctive in relation to the goods for which registration is requested as a result of the use that have been made of it in commerce in the Philippines. The Office may accept as prima facie evidence that the mark has become distinctive, as used in connection with the applicant’s goods or services in commerce, proof of substantially exclusive and continuous use thereof by the applicant in commerce in the Philippines for five (5) years before the date on which the claim of distinctiveness is made. 80 Under Section 123.2 of the IP Code, specific requirements have to be met in order to conclude that a geographically-descriptive mark has acquired secondary meaning, to wit: a) The secondary meaning must have arisen as a result of substantial commercial use of a mark in the Philippines; b) Such use must result in the distinctiveness of the mark insofar as the goods or the products are concerned; and c) Proof of substantially exclusive and continuous commercial use in the Philippines for (5) years before the date on which the claim of distinctiveness is made. Unless secondary meaning has been established, a geographically-descriptive mark, due to its general public domain classification, is perceptibly disqualified from trademark registration. 81 ▪ Visible Sign ▪ Distinctive (Inherent or Acquired) ▪ Not listed in Sec. 123 on non-registrable marks 82 ▪ The rights in a mark shall be acquired through registration but the right to register a trademark should be based on ownership. ▪ Notwithstanding the provisions of Section 155 hereof, a registered mark shall have no effect against any person who, in good faith, before the filing date or the priority date, was using the mark for the purposes of his business or enterprise. ▪ An exclusive distributor does not acquire any proprietary interest in the principal’s trademark and cannot register it in his own name unless it is has been validly assigned to him. 83 Any word, name, symbol, emblem, device, figure, sign, phrase, or any combination thereof except those enumerated under Section 123, IPC. 84 ▪ Acquired through a valid registration ▪ Prior use is not a requirement but there must be actual use after application ▪ Declaration of Actual Use and proof of use – within three (3) years from filing of the application. – one (1) year from the fifth anniversary of the date of registration of the mark 85 ▪ The rights in a mark shall be acquired through registration with the IPO. (IPC, Sec. 122). The filing date of application is the operative act to acquire trademark rights. ▪ Prior use is no longer a condition precedent for registration of trademark, service mark or trade name. ▪ 159.1. Notwithstanding the provisions of Section 155 hereof, a registered mark shall have no effect against any person who, in good faith, before the filing date or the priority date, was using the mark for the purposes of his business or enterprise. 86 ▪ Shangrila Case ▪ Actual was use was not declared. 87 ▪ 10 year, subject to indefinite renewals of 10 years each. ▪ The registrant is required to file a declaration of actual use and evidence to that effect, or show valid reasons based on the existence of obstacles to such use, within one (1) year from the fifth anniversary of the date of the registration of the mark. Otherwise, the mark shall be removed from the Register by the IPO. (IPC, Secs. 145 and 146) 88 ▪ Right to exclusive use of the mark in connection with the one’s own goods or services resulting in likelihood of confusion. ▪ Right to prevent others from use of an identical mark for the same, similar or related goods or services. (Sec. 147) Territoriality Principle: Trademark registration abroad shall not be valid and binding here in the Philippines. Exception: Well-known marks, bad faith. 89 Unauthorized use of a registered trademark, or of a colorable imitation of the same, for similar or related goods in which such use is likely to cause confusion or mistake, or to deceive. Section 155, IPC. 90 Elements: 1. Ownership of a trademark through registration 2. That the trademark is reproduced, counterfeited, copied, or colourable imitated by another 3. No consent by the trademark owner or assignee 4. Use in connection with the sale, offering for sale or advertising of any such goods, business or services or those related thereto 5. Likelihood of confusion 91 Such a close or ingenious imitation as to be calculated to deceive ordinary purchasers, or such resemblance of the infringing mark to the original as to deceive an ordinary purchaser giving such attention as a purchaser usually gives, and to cause him to purchase the one supposing it to be the other 92 Counterfeiting Imitation Colorable 93 Types of confusion ▪ Confusion of goods – As to the goods themselves ▪ Confusion of business – As to the source or origin of such goods Wherein the goods of the parties are different but the defendant’s product can reasonably be assumed to originate from the plaintiff thereby deceiving the public into believing that there is some connection between the plaintiff and defendant, which in fact, does not exist. 94 Problem: ▪ Dermaline, Inc. filed an application for registration of the trademark “Dermaline.” ▪ Myra Pharmaceuticals, Inc. opposed the application claiming that the trademark sought to be registered so resembles its trademark “DERMALIN” and will likely cause confusion to the purchasing public. ▪ Dermaline argues that its products and for skin health and beauty while those of Myra’s are medicinal goods against skin disorders. Should the application for registration be allowed? 95 Dominancy Test – focuses on the prevalent features of the competing marks. The question is whether the use of the marks is likely to cause confusion or deceive purchasers. Holistic Test or Totality Test – determined on the basis of visual, aural, connotative comparisons and overall impressions engendered by the marks in controversy as they are encountered in the marketplace. 96 Dominancy Test – focuses on the prevalent features of the competing marks. 97 Holistic Test – marks compared on their entirety. 98 99 Idem Sonans Rule – aural effects of the words and letters contained in the marks are also considered in determining the issue of confusion similarity. Examples: ▪ “Dermaline” vs “Dermalin” ▪ “Nanny” vs. “Nan” (Nestle S.A. vs. Dy Jr.) 100 General Appearance 101 Trademark Infringement Tradename Infringement Unfair Competition Legal Basis 155 165 168 Registration a requirement Yes No No Acts Prohibited Unauthorized use/reproduction/co unterfeiting/copying of a trademark or colorable imitation thereof. Unauthorized use/reproduction/co unterfeiting/copying of a tradename Passing of one’s good giving them the general appearance of the goods of another Is fraud an element No No No Electronic Commerce Act CPALE Syllabus 1. Discuss the principles 2. Describe the application 3. Discuss the definition of terms 4. Apply the legal recognition and communication of electronic data messages and electronic documents 5. Discuss the electronic commerce in carriage of goods 6. Explain the electronic transactions in government ❑ Business-to-Business (B2B) ❑ Business-to-Consumer (B2C) ❑ Consumer to Consumer (C2C) ❑ Consumer to Business (C2B) 1. Discuss the Principles Functional Equivalence Technology Neutral Media Neutral Non-Discrimination For evidentiary purposes, an electronic document shall be the functional equivalent of a written document under existing laws. (S7) 4 ECA does not favor any particular type of technology. ECA does not discriminate between paper document and electronic document, hand written signature electronic signature. 2. Discuss the Application Applies to any kind of electronic data message and electronic document used in the context of commercial and non-commercial activities to include domestic and international dealings and transactions, arrangements, agreements, contracts and exchanges and storage of information. 3. Discuss the Definition of Terms 4. Apply the legal recognition and communication of electronic data messages and electronic documents ❑ Electronic Data Message ❑ Electronic Document ❑ Electronic Signature Definition of eDoc Legal Recognition “Refers to information generated, sent, received OR stored by electronic, optical or similar means”. “Information shall not be denied legal effect, validity or enforceability solely on the grounds that it is in form of a data message.” a. Those falling under the Statute of Frauds (Art. 1403(2); b. Negotiable Instrument; c. Donations of personal property with valued in excess of 5,000 pesos (Art. 748); d. Contract of antichresis where the amount of the principal and interest must be in writing (Art. 2134); e. Stipulation to pay interest on loans (Art. 1956); f. Power of attorney to sell and or any interest therein (Art. 1874); Assignment of copyright in whole or in part during the lifetime of the author (Section 180.2. IPC); g. Marriage Settlements (Art. 77, FC); h. Stipulations limiting a common carrier’s liability to less than extraordinary diligence (Art. 1744) Authentication of Electronic Data Messages and Electronic Documents. Section 11. - Until the Supreme Court by appropriate rules shall have so provided, electronic documents, electronic data messages and electronic signatures, shall be authenticated by demonstrating, substantiating and validating a claimed identity of a user, device, or another entity is an information or communication system, among other ways, as follows; Authentication of Electronic Data Messages and Electronic Documents. (a) The electronic signature shall be authenticated by proof than a letter , character, number or other symbol in electronic form representing the persons named in and attached to or logically associated with an electronic data message, electronic document, or that the appropriate methodology or security procedures, when applicable, were employed or adopted by such person, with the intention of authenticating or approving in an electronic data message or electronic document; Authentication of Electronic Data Messages and Electronic Documents. (b) The electronic data message or electronic document shall be authenticated by proof that an appropriate security procedure, when applicable was adopted and employed for the purpose of verifying the originator of an electronic data message and/or electronic document, or detecting error or alteration in the communication, content or storage of an electronic document or electronic data message from a specific point, which, using algorithm or codes, identifying words or numbers, encryptions, answers back or acknowledgement procedures, or similar security devices. DIFFERENT KINDS OF CONTRACT According to Perfection 1. Consensual – contracts which are perfected by the mere meeting of the minds of the parties (Art. 1305) eg. Sale, Lease 2. Real Contracts – are those which require for their perfection both the consent of the parties and the delivery of the object by one party to the other. e.g. creation of real rights over immovable property must be written, deposit and pledge 3. Solemn contracts – are contracts which must appear in writing. 2. Perfection Solemn Forms of Contract COC + F Validity Enforceability Donation of personal property whose value exceeds 5,000 (Art. 748) Unauthorized contracts Donation of real property (Art. 749) Contracts not to be performed w/in 1 year Partnership where immovables are contributed (Art. 1773) A special promise to answer for the debt, default, or miscarriage of another Sale of piece of land or any interest therein through an agent (Art. 1874) Agreement in consideration of marriage Both parties are incapacitated Sale of personal property for 500 pesos or more Antichresis (Art. 2134) Chattel Mortgage (Art. 2140) Lease of real property for more than 1 year A representation as to the credit of a third person Agreements regarding payment of interests in contracts of loans (Art. 2314) Void Convenience Acts and contracts which have for their object the creation, transmission, modification or extinguishment of real rights over immovable property; The cession, repudiation or renunciation of hereditary rights or of those of the conjugal partnership of gains; The power to administer property, or any other power which has for its object an act appearing or which should appear in a public document, or should prejudice a third person; The cession of actions or rights proceeding from an act appearing in a public document. All other contracts where the amount involved > 500 must appear in writing, even a private one. But sales of goods, chattels or things in action are governed by articles 1403, No. 2 &1405. (Art. 1358) Sale of real property (Art. 1358) Unenforceable Valid 44 Definition of eSignature Legal Recognition “Any distinctive mark, Limited Recognition characteristic and/or sound in electronic form, representing the identity of a person and attached to or logically associated with the electronic data message or any methodology or procedures employed or adopted by a person and executed or adopted by such person with the intention of authenticating or approving an electronic document.” An eSignature on the ED is equivalent to the signature of a person on a written document if that signature is proved by showing that a prescribed procedure, not alterable by the parties interested in the electronic document, existed under which – (a) A method is used to identify the party sought to be bound and to indicate said party's access to the electronic document necessary for his consent or approval through the electronic signature; (b) Said method is reliable and appropriate for the purpose for which the electronic document was generated or communicated, in the light of all circumstances, including any relevant agreement; (c) It is necessary for the party sought to be bound, in or order to proceed further with the transaction, to have executed or provided the electronic signature; and (d) The other party is authorized and enabled to verify the electronic signature and to make the decision to proceed with the transaction authenticated by the same. Salient Features Summary and Public Key Infrastructure ❑Mandates all gov’t. agencies to use and accept electronic transactions within 2 years from the effectivity of the Act; and ❑Penalizes hacking or cracking (minimum fine of P100,000.00 and a maximum commensurate to the damage incurred and mandatory imprisonment of six months to three years). E-commerce is a MATTER of TRUST. How to build trust in ECA? Third Party – Vouching for Integrity/Authenticity Direct Trust Certificate Authority Direct Trust YES if the following security controls are present: ▪ Authentication ▪ Access Control ▪ Confidentiality ▪ Integrity ▪ Non-repudiation 1. Identity or authenticity of the person (one will not know the real identity or person whom one is transacting with in the internet 2. Data integrity (data may become corrupted or be unauthorized or duplicated or lost when it is held 3. Denial of Service “….. a system for establishing the identity of people who hold cryptographic keys.” “A system that establishes and maintains trustworthy e-business environments through the generation and distribution of keys and certificates.” ▪ Digital signature is a secure form of electronic signature ▪ An electronic signature is not necessarily a digital signature ▪ It is foreseeable that persons relaying on a digital signature will also rely on a valid certificate containing the public key by which the digital signature can be verified. a) Public/Private Key pair b) Certificate authority c) Digital certificate ▪ It is used in encrypting and decrypting a message ▪ It is a numerical value used by an algorithm to alter information or vice versa. 3. Discuss the definition of terms ❑Process of conducting business over the Internet by electronic document/data message rather than paper-based methods. ❑Refers to information generated, sent, received or stored by electronic, optical or similar means. ❑Refers to information or the representation of information, data, figures, symbols or other modes of written expression, described or however represented, by which a right is established or an obligation extinguished, or by which a fact may be prove and affirmed, which is receive, recorded, transmitted, stored, processed, retrieved or produced electronically. (PERTS) ❑Refers to any distinctive mark, characteristic and/or sound in electronic form, representing the identity of a person and attached to or logically associated with the electronic data message or electronic document or any methodology or procedures employed or adopted by a person and executed or adopted by such person with the intention of authenticating or approving an electronic data message or electronic document. 5. Discuss the Electronic Commerce in Carriage of Goods A B/L is a legal document issued by a carrier to a shipper that details the type, quantity, and destination of the goods being carried. A bill of lading also serves as a shipment receipt when the carrier delivers the goods at a predetermined destination. Functions of B/L 1. Receipt for goods 2. Contract of Carriage 3. Doc of Title to Goods Parties 1. Carrier 2. Shipper 3. Consignee 4. Master (Captain) 5. Shipping Agent a) i. furnishing the marks, number, quantity or weight of goods; ii. stating or declaring the nature or value of goods; iii. Issuing a receipt of goods; iv. confirming that goods have been loaded. b) i. notifying a person of terms and conditions of contract; ii. Giving instructions to a carrier c) i. claiming delivery of goods; ii. authorizing release of goods; iii. Giving notice of loss of, or damage to goods; d) giving any other notice or statement in connection with the performance of the contract; e) undertaking to deliver goods to a named person or a person authorized to claim delivery f) granting, acquiring, renouncing, surrendering, transferring or negotiating rights in goods; and g) Acquiring or transferring rights and obligations under the contract Transport Document means a document which provide pieces of evidence as to a contract of carriage and the taking over or loading of goods, by a carrier, made out in the form of a bill of lading or consignment note or any other document used in trade. A transport document is a kind of document used to convey information about cargo that is being transported. Kinds of transport documents include: Air Waybill, a transport document used for air freight. Bill of Lading, a transport document for sea freight. Can electronic messages and/or electronic documents be used in lieu of a paper document? Yes. Under Sec. 26 Par. 1 of RA 8792. (1)Where the law requires that any action referred to contract of carriage of goods be carried out in writing or by using a paper document, that requirement is met if the action is carried out by using one or more data messages or electronic documents. (2) Paragraph (1) applies whether the requirement there in is in the form of an obligation or whether the law simply provides consequences for failing either to carry out the action in writing or to use a paper document. In section 26 of ECA in carriage of goods, what would be the basis in order to effect the requirement required by law if the right is to be granted or an obligation is to be acquired by one person and no other person? (3) If a right is to be granted to, or an obligation is to be acquired by, one person and no person, and if the law requires that, in order to effect this, the right or obligation must be conveyed to that person by the transfer, or use of, a paper document, that requirement is met if the right or obligation is conveyed by using one or more electronic data messages or electronic documents unique; What is the required standard of reliability in Sec. 26 Par. 3 of ECA in carriage of goods? (4) For the purposes of paragraph (3), the standard of reliability required shall be assessed in the light of the purpose for which the right or obligation was conveyed and in the light of all the circumstances, including any relevant agreement. What will happen if the electronic transaction turns to paper documentation? Section 26 Paragraph 5 of RA 8792. (5) Where one or more data messages are used to effect any action in subparagraphs (f) and (g) of Section 25, no paper document used to effect any such action is valid unless the use of electronic data message or electronic document has been terminated and replaced by the used of paper documents. A paper document issued in these circumstances shall contain a statement of such termination. The replacement of the electronic data messages or electronic documents by paper documents shall not affect the rights or obligation of the parties involved. What will happen if a rule of law is compulsorily applicable to a contract of carriage of goods which is in, or is evidenced by, a paper document? Section 26 Paragraph 6 of RA 8792. (6) If a rule of laws is compulsorily applicable to a contract of carriage of goods which is in, or is evidenced by, a paper document, that rule shall not be inapplicable to such a contract of carriage of goods which is evidenced by one or more electronic data messages or electronic documents by reason of the fact that the contract is evidenced by such electronic data messages or electronic documents instead of by a paper document. 6. Explain the electronic transactions in government ❑ Business-to-Business (B2B) ❑ Business-to-Consumer (B2C) ❑ Consumer to Consumer (C2C) ❑ Consumer to Business (C2B) ❑ Government to its Citizens’ (G2C) Can the government require or accept the creation, filing and retention of such documents in the form of electronic data messages or electronic document from its citizens? Yes, under paragraph a Section 27. Example: 1. Publication of job opportunity on the CSC website. Here, the applicant submits electronic documentary requirements and electronic damages. 2. Philgeps Sec. 27, Par. 1, RA 8792 “…all departments, bureaus, offices and agencies of the government, as well as all government-owned and -controlled corporations,… shall – (a) accept the creation, filing or retention of such documents in the form of electronic data messages or electronic documents; Can an EDM and ED in government transactions such as the issuance of permits, licenses or its approval? Yes under Section 27 Paragraph b of RA 8792. Sec. 27, Par. 1, RA 8792 “…all departments, bureaus, offices and agencies of the government, as well as all government-owned and -controlled corporations,… shall – (b) issue permits, licenses, or approval in the form of electronic data messages or electronic documents; Can the government require and/or accept payments, and issue receipts acknowledging such payments using EDM and ED? Yes under Section 27 Paragraph c of RA 8792. ▪ ▪ ▪ ▪ ▪ ▪ Bank over the counter Bayad center ECPay Online Bank 7Eleven Gcash Sec. 27, Par. 1, RA 8792 “…all departments, bureaus, offices and agencies of the government, as well as all government-owned and -controlled corporations,… shall – (c) require and/or accept payments, and issue receipts acknowledging such payments, through systems using electronic data messages or electronic documents; Are the government agencies required to transact or perform their function using EDM and ED? Yes under Section 27 Paragraph d of RA 8792. Sec. 27, Par. 1, RA 8792 “…all departments, bureaus, offices and agencies of the government, as well as all government-owned and -controlled corporations,… shall – (d) transact the government business and/or perform governmental functions using electronic data messages or electronic documents,…” What are the appropriate rules, regulations, or guidelines in the use of EDM, ED and ES? a. b. The manner and format in which such EDM, or ED shall be filed, created, retained or issued. Where and when such EDM or ED have to be signed, the use of an ES, the type of ES required. What are the appropriate rules, regulations, or guidelines in the use of EDM, ED and ES? c. The format of an EDM or ED and the manner the ES shall be affixed to the EDM or ED. d. The control processes and procedures as appropriate to ensure adequate Integrity, Security and Confidentiality of EDM or ED or records of payment. What are the appropriate rules, regulations, or guidelines in the use of EDM, ED and ES? d. Other attributes required to EDM or ED or payments; and e. The full or limited use of the documents and papers for compliance with the government requirements. Can an electronic signature be used in government documentary transactions? Section 27 Paragraph d (2 & 3) of RA 8792. Thank You !