Understanding Critical Security Controls By Center For Internet Security- Part 2

Unlock cybersecurity resilience with our guide on implementing CIS Critical Security Controls. Elevate your defenses now!

Understanding the Co-Relation between Data Privacy and Information Security

Dive into the synergy of data privacy and information security. Discover differences, stats, and real-world examples in our latest post!

5 Pillars of Data Privacy Compliance – Pillar 4: Implement Data Privacy and Security Measures

In this digital era, the law mandates government agencies, private institutions, and even individuals to protect and respect data privacy…

A Summary of RA No. 10173 or the Data Privacy Act of 2012

Photo Courtesy of Pixabay via Pexels Filipinos spend an average of 10 hours and 2 minutes each day online, the…

5 Pillars of Data Privacy Compliance (Blog Series) – Pillar 3: Write your Privacy Management Program and Privacy Manual

Privacy Management Program (PMP) A PMP is a holistic approach to privacy and data security protection, important for all agencies,…

5 Pillars of Data Privacy Compliance (Blog Series) – Pillar 2: Conduct a Privacy Impact Assessment

What is Privacy Impact Assessment? A Privacy Impact Assessment or PIA is a process used to assess and manage privacy…

5 Pillars of Data Privacy Compliance (Blog Series) – Pillar 1: Appointment of Data Protection Officer

Why Appoint a DPO? A Data Protection Officer (DPO), in pursuant to the mandate of the National Privacy Commission to…

Understanding Data Privacy Act of 2012

What is Data Privacy Act of 2012? Republic Act No. 10173 or Data Privacy Act of 2012 is an act…

Contact Us

Fields marked with an * are required

Area of Interest
Attach file
Allowed file types: .pdf, .doc, .docx

Apply For Internship

All fields are required

Attach resume
Allowed file types: .pdf, .doc, .docx