Unauthorized Use of Personal Data on Social Media

Unauthorized Use of Personal Data on Social Media: A Comprehensive Overview (Philippine Context)

Disclaimer: The information provided herein is for general informational and educational purposes only and is not intended as legal advice. For specific concerns and legal questions, it is recommended to consult a licensed attorney.


I. Introduction

Social media platforms have revolutionized how people communicate, share information, and interact with one another. However, their rapid rise in popularity has also introduced significant risks regarding the unauthorized use of personal data. The Philippines, recognizing the importance of protecting individual privacy, has enacted laws and regulations to govern and penalize unauthorized use of personal data on social media. This article provides a comprehensive overview of the relevant laws, rights, obligations, and potential liabilities in the Philippine context.


II. Legal Framework in the Philippines

Several key laws form the backbone of data privacy and protection in the Philippines:

  1. 1987 Philippine Constitution

    • The Bill of Rights enshrines the right to privacy (Article III, Section 3). Though not explicitly mentioning “personal data,” the Constitution protects individuals from arbitrary government intrusion and forms the foundation of privacy rights in the country.
  2. Data Privacy Act of 2012 (Republic Act No. 10173)

    • Commonly referred to as the DPA, this is the primary law that governs the processing of personal data in the Philippines. It aims to protect the fundamental human right of privacy and ensure the free flow of information for innovation and growth.
  3. Cybercrime Prevention Act of 2012 (Republic Act No. 10175)

    • This law outlines various cybercrimes, including offenses involving unauthorized access and misuse of computer data and systems. It deals with identity theft, cyber-squatting, and other offenses that may occur on social media platforms.
  4. Anti-Photo and Video Voyeurism Act of 2009 (Republic Act No. 9995)

    • Although it specifically addresses unauthorized recording and sharing of sexual content, it is also relevant to discussions on unauthorized use or publication of photos and videos on social media without consent.
  5. Special Laws and Related Issuances

    • The National Privacy Commission (NPC) has released various circulars, advisories, and opinions, clarifying the scope of the Data Privacy Act and guiding organizations, individuals, and government agencies in handling personal data.

III. Key Definitions Under the Data Privacy Act

Understanding the definitions under the Data Privacy Act of 2012 is crucial to identifying when someone’s social media post or conduct may constitute unauthorized use of personal data:

  1. Personal Information

    • Any information from which the identity of an individual can be reasonably and directly ascertained, or when put together with other pieces of information, would directly and certainly identify an individual.
    • Examples: Name, address, birth date, contact details, or other identifiers.
  2. Sensitive Personal Information

    • A subset of personal information with heightened protections. This includes data about an individual’s race, ethnic origin, marital status, health, education, genetic or sexual life, legal proceedings, government-issued identifiers (like Social Security System number, Tax Identification Number, passport details), and information established by an executive order or law to be kept classified.
    • Unauthorized disclosure of sensitive personal information carries heavier penalties.
  3. Personal Data

    • Collectively refers to all types of personal information, whether sensitive or not, as well as privileged information (i.e., information considered privileged under the Rules of Court or other laws).
  4. Data Subject

    • The individual whose personal data is processed.
  5. Personal Information Controller (PIC)

    • A person or organization that controls the collection, holding, processing, or use of personal data, including instructing another entity to process the data on their behalf.
  6. Processing

    • Any operation performed upon personal data, from collection to use, storage, disclosure, or destruction.

IV. Unauthorized Use of Personal Data on Social Media

1. Common Scenarios

  • Identity Theft or Impersonation
    Using someone else’s name, photos, or personal details (such as phone number, email address) to create fake social media profiles or accounts without consent.

  • Doxxing (Malicious Disclosure of Private Information)
    Publicly revealing private or identifying information about an individual (e.g., address, phone number) to harass or harm the person.

  • Posting Photos or Videos Without Consent
    Uploading images or videos containing personal identifiers, sensitive context, or private situations of another individual without the subject’s permission.

  • Collecting or Storing Personal Information From Social Media
    Gathering an individual’s personal details from publicly accessible profiles, groups, or forums and using this data for purposes not consented to by the individual.

  • Phishing and Social Engineering
    Exploiting personal data to manipulate individuals into disclosing even more sensitive information—often leading to financial fraud, cyberstalking, or other harmful acts.

2. Lawful Basis and Consent

Under the Data Privacy Act, consent is a key factor in determining whether personal data was lawfully processed. The processing of personal data must be based on at least one of the criteria for lawful processing under Section 12 (for personal information) or Section 13 (for sensitive personal information) of the DPA. Consent must be informed, freely given, and specific to the purpose for which data is processed.

  • Explicit Consent
    Required when processing sensitive personal information; must be evidenced by written, electronic, or recorded means.

  • Legitimate Interest
    When used as a lawful ground, the entity processing data must ensure such processing does not override the rights and freedoms of the data subject.


V. Enforcement and Remedies

1. Role of the National Privacy Commission (NPC)

  • Authority to Investigate
    The NPC is empowered to receive complaints, conduct investigations, and issue orders in relation to unauthorized processing, mishandling, or misuse of personal data.

  • Advisories and Public Guidance
    The NPC publishes rules, circulars, and advisories on data protection best practices, including handling of social media complaints.

  • Administrative Fines and Sanctions
    If found liable, organizations and individuals can face administrative fines imposed by the NPC, separate from criminal liability.

2. Criminal Penalties Under the Data Privacy Act

The DPA imposes both fines and imprisonment, depending on the nature of the violation. Penalties typically increase when sensitive personal information is involved or when the offender’s purpose is to gain unauthorized benefit or cause harm. Possible offenses include:

  1. Unauthorized Processing

    • Processing without the data subject’s consent or without legitimate basis.
  2. Improper Disposal

    • Discarding or destroying personal data in a manner that puts the data subject at risk.
  3. Unauthorized Access or Intentional Breach

    • Illegally accessing personal data or personal data systems.
  4. Concealment of Security Breaches

    • Failure to notify the NPC or the data subjects within the prescribed period in the event of a breach.

Each offense can result in imprisonment ranging from one (1) year to six (6) years and fines from PHP 500,000 to PHP 4 million, depending on the offense and aggravating circumstances.

3. Cybercrime Prevention Act Offenses

  • Computer-Related Identity Theft
    Punishes the unauthorized acquiring, transferring, using, or misusing of personal information for any fraudulent or unlawful purpose.
    Penalties typically involve imprisonment of six (6) years and one (1) day to twelve (12) years or a fine of at least PHP 200,000 up to a maximum amount determined by the court based on the damage caused.

  • Cyberlibel
    While not strictly about personal data, online defamation may overlap with unauthorized posting or misuse of personal information, as it can amplify or worsen reputational harm.

4. Civil Remedies

  • Damages
    A victim may seek moral and exemplary damages under the Civil Code if the unauthorized use of personal data results in harm to reputation, mental anguish, or moral suffering.

  • Injunction
    Courts may issue injunctions requiring removal of content from social media platforms or prohibiting further publication or sharing of data.


VI. Relevant Case Examples and Precedents

Although Philippine jurisprudence on unauthorized use of personal data on social media is still evolving, some notable points and administrative rulings by the NPC provide guidance:

  1. NPC Decisions on Misuse of Personal Data

    • The NPC has issued orders against entities that processed or disclosed personal information without consent, often involving social media platforms.
  2. Online Harassment and Cyberbullying Cases

    • While many such disputes are settled or mediated, courts and the NPC have reminded the public that unauthorized sharing of personal information to harass or bully an individual may constitute a breach of the Data Privacy Act and other laws.
  3. Employer-Employee Disputes

    • Cases have arisen where employers disclosed sensitive personal information (such as health or disciplinary records) of employees on social media. The NPC has reiterated that employment relationship does not negate the right to privacy and the requirements for lawful processing.

VII. Best Practices for Individuals and Organizations

1. For Individuals

  • Manage Privacy Settings
    Regularly check and update privacy settings on social media platforms to limit who can view or access personal information.

  • Obtain Consent When Posting
    Ask for explicit permission before posting photos, videos, or other personal details that identify other individuals—especially if the content is sensitive.

  • Report Suspicious Content
    Most social media platforms provide a mechanism for reporting posts, profiles, or other activities that violate community standards or local laws.

  • Exercise Caution with Online Sharing
    Avoid oversharing personal details like home addresses, phone numbers, daily routines, or sensitive data that could be used maliciously.

2. For Organizations and Businesses

  • Implement a Data Privacy Policy
    Clearly define internal protocols for collecting, storing, and using data from social media.

  • Conduct Regular Training
    Educate employees on privacy obligations under the DPA and acceptable social media usage when handling customer or client data.

  • Maintain Data Security Measures
    Use encryption, secure storage, and restricted access to protect collected personal data. Dispose of personal data securely when no longer needed.

  • Compliance with NPC Requirements
    Register data processing systems when required, and ensure that appropriate breach reporting procedures are in place.


VIII. Challenges and Future Developments

1. Rapid Technological Advancements

As social media technologies evolve—through facial recognition, AI-driven data analytics, and expanded data-sharing features—new forms of unauthorized data use emerge. The NPC and lawmakers face the challenge of keeping legal frameworks up-to-date.

2. Extraterritorial Application

Social media platforms often operate from servers located abroad. Under the Data Privacy Act, Philippine law applies to acts done or practices carried out by entities, even if outside the country, if they relate to Philippine citizens or residents. Enforcement can be complicated when dealing with multi-jurisdictional issues.

3. Growing Awareness of Privacy Rights

Public understanding of privacy rights has increased, prompting more individuals to file complaints. This heightened awareness encourages both citizens and organizations to adopt better privacy practices.


IX. Conclusion

Unauthorized use of personal data on social media poses significant legal risks in the Philippine context. Protected by the 1987 Constitution and governed primarily by the Data Privacy Act of 2012, Filipinos have legally enforceable rights over how their personal information is collected, stored, disclosed, and used. Additional legislation such as the Cybercrime Prevention Act and other special laws strengthen protections against identity theft, harassment, and other cyber-related offenses.

Compliance with the Data Privacy Act and related issuances by the National Privacy Commission is critical for both individuals and entities. Being informed about privacy laws, obtaining valid consent, and implementing robust data protection measures are necessary steps to avoid administrative, civil, or criminal liabilities.

As social media continues to proliferate, responsible use of personal data—coupled with vigilant enforcement of privacy regulations—remains essential in safeguarding individual rights and fostering a secure online environment for all.


References

  1. 1987 Philippine Constitution
  2. Republic Act No. 10173 (Data Privacy Act of 2012)
  3. Republic Act No. 10175 (Cybercrime Prevention Act of 2012)
  4. Republic Act No. 9995 (Anti-Photo and Video Voyeurism Act of 2009)
  5. Various NPC Circulars, Advisories, and Opinions

For more specific guidance and legal advice, consulting with a qualified legal professional is recommended.

Disclaimer: This content is not legal advice and may involve AI assistance. Information may be inaccurate.