skip to main content
10.1145/3234781.3234790acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiceegConference Proceedingsconference-collections
research-article

Philippine SUCs compliance performance on RA 10173: a case study on Bukidnon State University

Authors Info & Claims
Published:13 June 2018Publication History

ABSTRACT

The advancements in technologies have accelerated educational institutions by improving service delivery while reducing costs. As a result, it provided avenues of learning, the use of online discussions, Virtual Learning Environments (VLEs) and mobile technologies, thus making data security vulnerable. With these, it is imperative that through the lens of R.A. 10173 and NPC's five pillars that data be protected by a policy that is sustained and executed effectively. This qualitative research using case study technique aimed to evaluate, explore and explain the level of compliance of Bukidnon State University (BukSU) with RA 10173. Likewise answering the research question how does PSUCs apply and integrate R.A. 10173 with its Information Systems and Business Processes? Using single case holistic design with common rationale, and pattern matching technique in interpreting the tabulated results. It was found out that BukSU, just like most government agencies in the Philippines, is qualitatively described as Partial Compliant. Furthermore, their compliance was due to moral suasion, where BukSU, considers it as its moral obligation to protect the students and its employees' data. An initiative from PASUC, to come up with a Data Privacy Manual that will serve as a model for all PSUC's in drafting their own manual, where BukSU practices can be aligned with that of PASUC. After the September 11, 2017, deadline, BukSU invested in a UTM Unified Threat Management with a three-year license to safeguard university data resources.

References

  1. Hassan, K. H. 2011. Personal Data Protection in the Business of Higher Education: Malaysian Law, 10, 53--57.Google ScholarGoogle Scholar
  2. Ching, M. R. D., Fabito, B. S., and Celis, N. J. 2017. Data Privacy Act of 2012: A Case Study Approach to Philippine Government Agencies Compliance, Soshum 2017, 1--8.Google ScholarGoogle Scholar
  3. McKelvey, N. 2014. Data Protection Issues in Higher Education with Technological Advancements, International Journal of Evaluation and Research in Education (IJERE), 3, 3, 133--141.Google ScholarGoogle ScholarCross RefCross Ref
  4. Trustwave A. and Institutions, P. E. 2008. Data Security Program for Higher Education.Google ScholarGoogle Scholar
  5. Singh, D. and Ramutsheli, M. P. 2016. Student data protection in a South African ODL university context: risks, challenges and lessons from comparative jurisdictions, Distance Educ., 37, 2, 164--179.Google ScholarGoogle ScholarCross RefCross Ref
  6. Chance, C. 2017. "A QUICK GUIDE TO PHILIPPINE DATA PRIVACY LAW COMPLIANCE," no. August, 1--8.Google ScholarGoogle Scholar
  7. European Union Agency for Fundamental Rights and The Council of Europe, 2014. Handbook on European Data Protection Law.Google ScholarGoogle Scholar
  8. Congress of the Philippines, 2012. RA 10173: Data Privacy Act of 2012.Google ScholarGoogle Scholar
  9. NPC, 2017. NPC Privacy Toolkit A guide for Management and Data Protection Officers.Google ScholarGoogle Scholar
  10. Sutinen, J. G. and Kuperan, K. 1999. A socio-economic theory of regulatory compliance, Int. J. Soc. Econ., 26, 1/2/3, 174--193.Google ScholarGoogle ScholarCross RefCross Ref
  11. Yin, R. K. STUDY Design and Methods.Google ScholarGoogle Scholar
  12. Celis, N. J. 2017. Compliance Theory: A Case Study Approach.Google ScholarGoogle Scholar
  13. Trochim, W. M. K. Outcome Pattern Matching and Program Theory.pdfGoogle ScholarGoogle Scholar
  14. Breton A. and Ronald, W. 1978. "A Theory of 'Moral' Suasion," 8, 4, 210--219.Google ScholarGoogle Scholar
  15. Ajzen, I. 1988. From Intentions to Actions, Attitudes, Personality, & Behavior. 112--150.Google ScholarGoogle Scholar

Index Terms

  1. Philippine SUCs compliance performance on RA 10173: a case study on Bukidnon State University

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ICEEG '18: Proceedings of the 2nd International Conference on E-commerce, E-Business and E-Government
      June 2018
      106 pages
      ISBN:9781450364904
      DOI:10.1145/3234781

      Copyright © 2018 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 13 June 2018

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
    • Article Metrics

      • Downloads (Last 12 months)3
      • Downloads (Last 6 weeks)0

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader