Author: Disini & Disini Law Office

[vc_row css_animation="" row_type="row" use_row_as_full_screen_section="no" type="grid" angled_section="no" text_align="left" background_image_as_pattern="without_pattern"][vc_column][vc_column_text]Over the past few years, consumers have gained more control of their financial lives. This is largely due to the rise of FinTech companies. These companies provide financial services through the use of technology. They offer a wide...

[vc_row css_animation="" row_type="row" use_row_as_full_screen_section="no" type="grid" angled_section="no" text_align="left" background_image_as_pattern="without_pattern"][vc_column][vc_column_text]The term "cyberspace" was coined by a science fiction writer[1] to describe the boundless electronic system of interlinked networks of computers that provide access to information and interactive communication.[2] Today, cyberspace and the internet refers basically to the...

[vc_row css_animation="" row_type="row" use_row_as_full_screen_section="no" type="grid" angled_section="no" text_align="left" background_image_as_pattern="without_pattern"][vc_column][vc_column_text]The Data Privacy Act of 2012 was passed to extend protection to people and their data in this modern age. It provides a regime for regulating the processing and storage of particularly personal and sensitive information, given the...

[vc_row css_animation="" row_type="row" use_row_as_full_screen_section="no" type="grid" angled_section="no" text_align="left" background_image_as_pattern="without_pattern"][vc_column][vc_column_text]The extent to which an organization is subject to obligations under the Data Privacy Act (hereinafter “DPA”) depends on whether or not they are a personal information controller or processor. Generally speaking, a party that handles personal personal...

[vc_row css_animation="" row_type="row" use_row_as_full_screen_section="no" type="grid" angled_section="no" text_align="left" background_image_as_pattern="without_pattern"][vc_column][vc_column_text]In many, if not all, organizations, a new project or policy is normally preceded by a series of studies and consultations before actual implementation. These studies are conducted for the purpose of determining the project or policy’s feasibility,...

[vc_row css_animation="" row_type="row" use_row_as_full_screen_section="no" type="grid" angled_section="no" text_align="left" background_image_as_pattern="without_pattern"][vc_column][vc_column_text]Three days before Christmas, Bea Policarpio posted an appeal for help on Facebook. In it she mentioned that her sister, 17-year-old Ica Policarpio, had been missing since December 21 and was last seen at a coffee shop somewhere...

[vc_row css_animation="" row_type="row" use_row_as_full_screen_section="no" type="grid" angled_section="no" text_align="left" background_image_as_pattern="without_pattern"][vc_column][vc_column_text] The Data Privacy Act of 2012 (hereinafter the “Act”) lays out stringent guidelines designed to safeguard the privacy of both natural and juridical persons. However, the law also admits of certain exceptions, one of which pertains to information...

[vc_row css_animation="" row_type="row" use_row_as_full_screen_section="no" type="grid" angled_section="no" text_align="left" background_image_as_pattern="without_pattern"][vc_column][vc_column_text] The tension between privacy and security has been the subject of countless debates.1 While unfettered privacy may be prone to abuse impairing the state’s capacity to police unlawful activity, an uncontrolled government would result in tyranny.2 This article...