Everything You Should Know About 13th Month Pay in the Philippines
Find out how to compute 13th month pay in the Philippines, along with who’s eligible
With over a thousand companies using our ecosystem of HR solutions, here are some of the best stories.
Are you managing an organization and worried about potential data breaches and cyberattacks? Learn about data privacy and many more.
The pandemic has led to an alarming increase in cyber attacks, with remote work making networks more susceptible to security breaches as they tend to be less safe. Consequently, organizations must take decisive action and prioritize installing security measures that protect computer systems, networks, and data against potential risks or threats.
Companies must foster a robust cybersecurity and data privacy culture beyond investing in technology to ensure protection. Employees should be reminded regularly of their role in keeping the organization secure, as it is an integral part of a proactive defense against malicious threats.
To strengthen organizational data privacy and security, employees must also remain aware of potential threats, respect confidential information, and understand the repercussions of failing to uphold these standards.
On February 28, 2023, April E. Sumabat, Privacy and Compliance Professional, and Former National Privacy Commission Officer, and Christoper Paz, Cybercrime Division Chief of the National Bureau of Investigation (NBI), shared the importance of building a cybersecurity culture and employees’ roles in having a strong cyber defense.
During the first half of the webinar, Ms. April discussed different privacy laws around the world and highlighted RA 10173, also known as the Data Privacy Act of 2012.
She also emphasizes that an organization must comply with the relevant privacy laws and regulations to uphold the data subject’s rights.
To clearly understand the matter, Ms. April shares what Personal Data pertains to and the difference between Personal Information (PI) and Sensitive Personal Information (SPI).
Personal Information (PI) | Sensitive Personal Information (SPI) |
Name Address Place of work Telephone number Gender Location of an individual at a particular time Birthdate Birthplace Citizenship Country of citizenship Payroll and benefits Contact Information | Race Ethnic Origin Marital Status Age Color Religion Philosophy Political affiliations Health Education Genetics Sexual life Proceedings of any offense |
She also discussed the Data Privacy Principles, which are: Transparency, Legitimate Purpose, and Proportionality.
Ms. April then discussed the key differences between a PIC and a PIP.
A PIC can be an individual, a judicial entity, or any other organization that controls the processing of personal data or requests another to handle it for them. On the other hand, PIP refers to any individual, legal entity, or organization that a PIC entrusts with processing personal data related to the data subject.
The responsibilities of these two are: to adhere to data privacy principles, uphold the rights of the data subject, and implement security measures.
To give a more comprehensive understanding of people’s rights, Ms. April enumerated the Rights of Data Subjects and explained each one:
Ms. April delved into the Data Life Cycle to comply with the DTA and explained how valuable the 5 Pillars of Compliance are.
Although it may not be feasible to anticipate every risk and threat to data privacy, being prepared is essential for staying compliant with these regulations. Furthermore, having a basic understanding of the principles in place will aid businesses in becoming agile and proficient at upholding compliance.
She also differentiated Security Incidents and Data Breaches to give a better understanding of the two. And then provided requirements, reportorial requirements, and penalties regarding the DTA.
Lastly, she gave the Data Privacy Act for organizations to better understand how to comply with the DTA.
Mr. Christopher started the second half of the webinar by providing an overview of the NBI case reports over the past three years. He enumerated the top 3 cases: online fraud, cyber libel, and identity theft.
These crimes can severely affect organizations through financial losses, reputation damages, and legal repercussions.
Mr. Christopher emphasizes that companies must remain vigilant against cyberattacks and proactively protect data and organizations’ systems.
Throughout his 20 years of service in law enforcement, he also detailed the various cyber threats and difficulties he has encountered. To know more about this, watch the full webinar here.
Mr. Christopher highlighted essential practices to ensure that individuals and organizations stay protected in this digital world. Here is a list:
Mr. Christopher gave critical policies that companies should have: acceptable use policy, password policy, data protection policy, email security policy, incident response policy, remote access policy, bring your own device policy.
While it is true that human error can contribute to cybersecurity incidents, Mr. Christopher believes that employees can be your best ally in the fight against cyber threats.
Here are key roles employees play in an organization’s cybersecurity:
Lastly, Mr. Christopher emphasized that cybersecurity is a shared responsibility. While IT departments and security experts have a crucial role, every employee has a role to play in protecting the company and customers’ information. By fostering a culture of cybersecurity, employees can be encouraged to actively protect sensitive data.
With more organizations operating remotely or shifting to a hybrid workplace, learning how to protect systems from cyber threats is now essential for businesses.
The most effective way to mitigate these risks is to equip your employees and the organization with the proper knowledge and skills regarding cybersecurity to safeguard networks and private data.
Don’t miss out and learn how you can strengthen your organization’s cybersecurity. Click here to watch the full webinar.
Keep ahead of the latest HR trends by visiting our events page. If you’re searching for reliable posts like this, visit our blog page.
Find out how to compute 13th month pay in the Philippines, along with who’s eligible
Discover how AI chatbots and Sprout Inbound optimize lead generation by addressing sales pain points.
Learn how to manage employee records for DepEd 201 File compliance. Let Sprout help you
Discover how Sprout enhances efficiency, satisfaction, and compliance in the fast-paced Accommodation and Food Industry,
Established in 2015, Sprout Solutions is the largest and most trusted homegrown B2B SaaS company in the Philippines. Inspired by our North Star "To impact the life of every Filipino by improving business in the Philippines", we help companies and their employees succeed through AI-enhanced HR and Business solutions.
Rockwell Business Center Building North Tower 9th Floor Sheridan St, corner United St, Mandaluyong, 1550 Metro Manila
Already a sprout user? Email [email protected] or contact your CSM for inquiries.
Established in 2015, Sprout Solutions is the largest and most trusted homegrown B2B SaaS company in the Philippines. Inspired by our North Star "To impact the life of every Filipino by improving business in the Philippines", we help companies and their employees succeed through AI-enhanced HR and Business solutions.
Rockwell Business Center Building North Tower 9th Floor Sheridan St, corner United St, Mandaluyong, 1550 Metro Manila
Already a sprout user? Email [email protected] or contact your CSM for inquiries.
© 2024 SPROUT SOLUTIONS PHIL., INC. ALL RIGHTS RESERVED