We really can’t deny that in today’s digital age, universities rely heavily on technology to improve efficiency, speed up administrative work, and provide better services to students. Digitizing student records, enrollment information, grades, and personal details can make school processes faster and more convenient. However, this convenience comes with serious responsibilities. When an institution collects and stores personal information, especially sensitive student data, it is expected to protect that information from unauthorized access, misuse, and disclosure. If it fails to do so, the consequences can be damaging not only to the students, but also to the reputation and legal standing of the institution itself.
In an example situation where a state university in Mindanao created an online student portal so that students could easily access their academic records and personal information. While the purpose of the portal was good, the university failed to implement proper security measures. Because of weak access controls, a student was able to view other students’ private information simply by changing a few numbers in the URL. This means that the system allowed unauthorized access to personal data, including grades, addresses, and contact information. This is a serious privacy violation. It shows that the university did not properly secure the system before launching it, did not conduct enough risk assessment, and did not ensure compliance with the requirements of the Data Privacy Act of 2012 or Republic Act No. 10173. The law protects personal information and requires organizations, including public institutions, to adopt proper safeguards and respect the rights of data subjects.
If I were the university’s Data Protection Officer or DPO, I would treat this incident as both a warning and a responsibility. My role would not only be to respond to the breach, but also to make sure the university becomes fully compliant with RA 10173 and develops a culture of privacy, accountability, and security. I would handle the situation through a three-part mitigation and compliance strategy called ACT: A for Anticipate, C for Contain, and T for Transform. This framework covers the period before, during, and after a breach. It also addresses both short-term and long-term actions. The goal is not only to fix the current problem, but to make sure similar incidents do not happen again.
Understanding the University’s Failure Under RA 10173
Before discussing the solutions, it is important to understand what the university did wrong. The Data Privacy Act of 2012 protects the privacy of individuals while regulating the processing of personal data in both the government and private sectors. It applies to institutions like universities because they collect, store, and process personal and sensitive personal information from students, employees, and applicants. The law, together with its implementing rules, requires personal information controllers to put in place appropriate organizational, physical, and technical security measures to protect personal data from unauthorized access, disclosure, alteration, and destruction.
In this case, the university clearly failed in several ways. First, it did not implement proper access controls. A student should only be able to access his or her own data, not another student’s data. The fact that changing a few numbers in the URL exposed private records suggests insecure direct object reference or a similar access control flaw. Second, the university failed to exercise due diligence before launching the system. A portal that handles grades, addresses, and contact details should have undergone strong security testing, code review, and privacy risk assessment before being made available to users. Third, the university did not adequately inform students about the possible privacy risks, nor did it clearly explain what safeguards were in place to protect their data. Fourth, it appears that the university failed to establish a mature privacy governance framework, which includes compliance monitoring, incident handling, employee accountability, and regular review of data processing systems.
This means the issue is not just technical. It is also organizational, legal, and ethical. A data breach does not happen only because a website has a bug. It also happens because leadership fails to prioritize privacy and because systems are built without proper planning, oversight, and accountability.
If I were the DPO, I would introduce an ACT framework for the university’s privacy and security strategy.
- A – Anticipate means preparing before attacks or privacy incidents happen.
- C – Contain means responding quickly and properly when a breach or attack is ongoing or has just been discovered.
- T – Transform means learning from the breach and building a stronger, long-term privacy and security culture afterward.
This framework is practical because it covers prevention, response, and long-term reform. It also reflects the university’s obligations under RA 10173, which does not only require reaction after a problem occurs, but also proactive protection of personal data through proper safeguards and accountability.
A – Anticipate: Steps Before a Breach Happens
The first duty of a DPO is to anticipate risks before they turn into incidents. Prevention is always better than damage control. In the case of the student portal, the breach could likely have been avoided if the university had taken privacy and security seriously before going live.
1. Conduct a full privacy and security audit
My first short-term action would be to order a complete audit of the student portal and all systems connected to it. This would include checking who can access student data, how user accounts are authenticated, how records are retrieved, whether session controls are secure, and whether the system exposes data through predictable URLs or weak programming logic. I would also review where student records are stored, who has administrative access, and whether logs are kept for system activity.
This audit would not be limited to the portal alone. If one system is weak, other university systems may also be vulnerable. I would therefore include enrollment databases, registrar systems, learning management platforms, payment systems, and any third-party tools that process student information.
2. Map all personal data being processed
A university cannot protect data properly if it does not fully know what data it has, where it is stored, who can access it, and why it is being processed. One of my key short-term measures would be to perform a data inventory and data flow mapping exercise. This means identifying what personal data the university collects, what sensitive personal information it stores, where the data moves, and which offices are responsible for each dataset.
This is important because RA 10173 applies to all forms of personal data processing. A clear map of data flows allows the university to identify weak points, reduce unnecessary collection, and better control access based on necessity and lawful purpose.
3. Review lawful processing and transparency practices
Another important part of prevention is making sure the university has a lawful basis for processing data and that students are properly informed. If I were the DPO, I would review the university’s privacy notices, consent forms where applicable, enrollment forms, portal notices, and internal privacy policies. Students should know what data is being collected, why it is needed, how it will be used, how long it will be kept, and who to contact if they have questions or complaints.
A system may be technologically advanced, but if students are not properly informed, the university still fails in transparency. Privacy is not just about secrecy. It is also about fair and lawful processing.
4. Require security testing before launch and after updates
One major lesson from this case is that systems should never go live without adequate testing. Under my leadership, no online portal or digital platform that handles personal data would be launched without security testing. This includes vulnerability assessment, penetration testing, access control review, secure code review, and user authorization checks.
I would also require testing every time there is a major system update. Many organizations make the mistake of testing only once, then assuming the platform will stay secure forever. In reality, new vulnerabilities can appear after upgrades, feature additions, or changes in user roles.
5. Implement role-based access control and least privilege
To prevent unauthorized viewing of student records, I would implement strict role-based access control. Students should only access their own records. Faculty should only access information relevant to the subjects they handle. Registrar personnel should have defined access based on official functions. IT administrators should not have unrestricted viewing rights unless absolutely necessary and properly logged.
This follows the principle of least privilege, which means a person should only have the minimum access needed to perform their job. This is one of the most effective ways to reduce accidental or intentional misuse of personal information.
6. Adopt minimum security measures required by privacy regulations
As DPO, I would also make sure the university’s systems comply with the required organizational, physical, and technical security measures. The NPC emphasizes that personal information controllers must adopt these safeguards to protect personal data. This includes internal policies, trained personnel, controlled access to systems and facilities, and technical protections such as authentication, monitoring, and secure configuration.
In short, Anticipate means not waiting for a disaster before acting. It means identifying risks early, fixing weaknesses early, and treating privacy as part of system design, not an afterthought.
C – Contain: Steps During or Immediately After a Breach
The second part of my framework is Contain. Even with the best preparation, incidents can still happen. What matters then is how quickly, honestly, and effectively the university responds. In the given scenario, once the vulnerability was discovered, the university should have acted immediately. As DPO, I would lead that response.
1. Immediately disable or isolate the vulnerable function
My first immediate response would be to contain the technical vulnerability. If students can access records by changing the URL, then that feature must be disabled or restricted at once until it is fixed. If needed, I would temporarily suspend access to the portal to prevent further exposure. Some may worry that this would inconvenience students, but temporary inconvenience is better than continued privacy violations.
The priority in the first few hours is to stop the leak. That means patching the flaw, restricting access, reviewing logs, and making sure no more data can be exposed while the investigation is ongoing.
2. Start an incident response procedure
A privacy breach should never be handled informally. It requires a structured incident response process. I would activate the university’s incident response team, which should include representatives from the IT department, legal office, administration, records office, and communications office. As DPO, I would coordinate the privacy side of the response while ensuring that actions are documented properly.
The team would determine what happened, when it started, what data was exposed, how many students were affected, whether sensitive personal information was included, and whether unauthorized persons were able to copy or misuse the data.
3. Preserve evidence and review logs
One common mistake in breach situations is fixing the system too quickly without preserving evidence. As DPO, I would make sure logs, screenshots, server records, and access histories are preserved. This is necessary not only for internal analysis but also for accountability, regulatory compliance, and possible disciplinary action if negligence is found.
We would examine how long the vulnerability existed, how many times records were accessed, and whether the breach was accidental or intentionally exploited. Without this information, the university cannot give accurate notice to regulators or affected students.
4. Notify the National Privacy Commission and affected students
Under NPC breach reporting rules, the personal information controller must notify the NPC and the affected data subjects within 72 hours upon knowledge of or reasonable belief that a notifiable personal data breach has occurred, especially if the breach involves sensitive personal information or creates a real risk of serious harm. Notification may initially be based on available information, with fuller details submitted afterward.
This is one of the most important legal duties. If I were the DPO, I would make sure the university does not hide the incident or delay disclosure. Students deserve honesty. They have the right to know if their grades, addresses, or contact information were exposed. The notification should explain what happened, what information was involved, what the university is doing to fix it, and what students can do to protect themselves.
Transparency is essential. A school that tries to minimize or conceal a breach will only lose more trust.
5. Provide support to affected students
The response should not end with a notice. As DPO, I would recommend practical support measures for affected students. This may include a dedicated help desk, official updates through verified channels, guidance on recognizing phishing attempts, and a clear contact point for complaints and concerns. If particularly sensitive information was exposed, the university should also consider stronger support mechanisms.
A breach is not only a technical incident. It is a human incident. Students may feel violated, anxious, or angry. The university must respond with empathy, not defensiveness.
6. Issue internal accountability measures
If the breach was caused by negligence, poor supervision, or failure to follow internal procedures, then internal accountability must also be addressed. This does not mean immediately blaming one person, but it does mean identifying what duties were neglected. Was there no testing? Were warnings ignored? Was deployment rushed? Were privacy reviews skipped?
As DPO, I would recommend a formal review of responsibility. Without accountability, the same culture of carelessness will continue.
T – Transform: Long-Term Steps to Prevent Future Breaches
The final part of my framework is Transform. This is the long-term stage. Many institutions respond to a breach by fixing the immediate technical flaw and then moving on. That is not enough. If the university truly wants compliance with RA 10173 and lasting protection for students, it must transform how it handles personal data.
1. Build a strong privacy governance system
Long-term compliance begins with governance. As DPO, I would establish or strengthen a university-wide privacy management program. This would include formal privacy policies, a breach response policy, data retention and disposal policies, records of processing activities, and regular compliance reviews.
Privacy should not be treated as an isolated concern of the IT office. It should involve the registrar, admissions office, finance office, human resources, faculty, student affairs, and top management. Every office that handles personal data must understand its responsibilities.
2. Make privacy by design a standard practice
One of the clearest lessons from the case is that privacy should be integrated into systems from the beginning. This is known as privacy by design. Instead of creating a portal first and worrying about privacy later, the university should build systems in a way that already includes access restrictions, minimization of data exposure, secure defaults, and strong user verification.
For example, a student portal should never reveal record identifiers in a way that allows record guessing. It should validate every request based on the logged-in user’s authority, not just on the URL parameter. It should also hide unnecessary data and display only what is needed.
3. Conduct regular privacy impact assessments
Before any new system, major update, or digital initiative is introduced, I would require a privacy impact assessment or similar risk review. This would identify what data is involved, what the risks are, how the rights of students may be affected, and what controls are needed before launch.
This should become standard procedure for procurement, software development, and institutional digitization projects. A university that processes thousands of student records cannot afford to operate on assumptions.
4. Train employees, faculty, and developers continuously
Technology alone cannot solve privacy problems. Human behavior matters just as much. Many breaches happen because staff members are unaware of privacy obligations, administrators use poor practices, or developers focus only on functionality without considering data protection.
As DPO, I would create regular privacy and security training for different groups:
- for university executives, training on accountability and governance;
- for faculty and staff, training on handling student records properly;
- for IT personnel and developers, training on secure development and access control;
- for students, basic privacy awareness and portal safety guidance.
RA 10173 compliance becomes stronger when privacy is understood across the institution, not just by one office. The requirement to adopt organizational measures makes this especially important.
5. Strengthen vendor and third-party management
Universities often use outside providers for hosting, software development, cloud storage, email systems, or student management platforms. If I were the DPO, I would review all contracts involving personal data processing. Third parties should not be allowed to handle student data without clear obligations on confidentiality, security, breach reporting, and lawful processing.
Even if another company helps run the system, the university cannot simply escape responsibility. It must make sure its service providers also comply with privacy and security standards.
6. Establish continuous monitoring and auditing
Compliance is not a one-time checklist. It requires regular monitoring. I would recommend annual privacy audits, periodic access reviews, vulnerability scans, and internal reporting to university leadership. Audit findings should lead to action plans, not just reports that are ignored.
There should also be monitoring for unusual activity in the student portal, such as repeated requests for multiple records, suspicious URL manipulation, or abnormal login behavior. Early detection can stop a small issue from becoming a major breach.
7. Apply data minimization and retention limits
Another long-term safeguard is to collect and retain only the data that is truly necessary. Universities often keep large amounts of information for convenience, but excessive collection or indefinite retention increases risk. As DPO, I would review whether all data currently shown in the portal is actually needed. Does a student really need to see every stored field online? Does every office need access to complete records?
The less unnecessary data is exposed, the lower the risk in case of a breach. Data should also be deleted or archived securely when it is no longer needed, in accordance with lawful retention requirements.
8. Create a culture of accountability and trust
Perhaps the most important long-term reform is cultural. Privacy must become part of the university’s values. Students should feel that the institution respects them not only as learners, but also as individuals with rights. Administrators should understand that student records are not just files to be processed. They are personal and sometimes sensitive aspects of a person’s life.
As DPO, I would encourage leadership to treat privacy as part of institutional integrity. When privacy is taken seriously, trust increases. When it is ignored, students lose confidence in the university.
My ACT framework directly connects to both the short-term and long-term steps I would take as the university’s Data Protection Officer under RA 10173. A, or Anticipate, focuses on the long-term, because it means preventing breaches before they happen through regular security audits, privacy impact assessments, system testing, and stronger access controls. C, or Contain, focuses on the short-term, because it involves the immediate actions needed once a breach is discovered, such as disabling the vulnerable part of the portal, investigating the incident, preserving evidence, and notifying the NPC and affected students right away. T, or Transform, also focuses on the long-term, because it means improving the university’s privacy culture by training staff, updating policies, strengthening governance, and making privacy part of every future system. In this way, ACT is not just a general framework, but a clear guide for balancing urgent response with lasting reform. It ensures that the university not only reacts properly to the breach, but also builds stronger protection against future violations.
ACT framework helps connect immediate compliance with sustainable improvement under RA 10173. The short-term step is mainly Contain, because the university must first stop the breach, reduce harm, and fulfill its legal obligations quickly. The long-term steps are Anticipate and Transform, because preventing future breaches requires preparation, better system design, and a stronger culture of data privacy. This shows that compliance with RA 10173 is not only about fixing one mistake, but about creating a safer and more responsible institution. As DPO, I would use ACT to make sure the university protects student data both now and in the future.

