Back to Blog
security

Security & IP Protection When Outsourcing to the Philippines: 2025 Complete Guide

Jomar Montuya
January 13, 2025
18 minutes read

Security & IP Protection When Outsourcing to the Philippines: 2025 Complete Guide

"Can I trust Philippine developers with my source code?"

This question stops 40% of US companies from considering Philippine software development, despite 60-70% cost savings. The concern is legitimate: you're sharing intellectual property with developers 8,000 miles away.

But here's reality: The Philippines has stronger IP laws than many assume, 200+ ISO 27001-certified development firms, and a $38.7 billion BPO industry built on client trust. Philippine courts enforce NDAs, code ownership is clearly defined by law, and data breaches are actually less common than with US contractors (0.8% vs 2.3% incident rate per Verizon 2024 Data Breach Report).

After securing IP and data for 40+ US, UK, and Australian clients over 8 years—including healthcare, fintech, and construction platforms handling sensitive data—I'm sharing the legal frameworks, security practices, and contract structures that actually protect your intellectual property.

Philippine IP Laws: Stronger Than You Think

The Legal Framework

Republic Act No. 8293 (Intellectual Property Code of the Philippines):

  • Enacted: 1998
  • Aligns with: TRIPS Agreement (WTO intellectual property standards)
  • Protections: Patents, trademarks, copyrights, trade secrets
  • Enforcement: Philippine courts recognize and enforce IP claims

Key Protections:

  • Copyright: Automatic upon creation (no registration required)
  • Software as "Literary Work": Source code protected under copyright law
  • Trade Secrets: Protected under unfair competition laws
  • Duration: Life of creator + 50 years (same as US copyright)

Source: Intellectual Property Office of the Philippines (IPOPHL)

How Philippine IP Law Compares

AspectPhilippinesUnited StatesEnforceability
Copyright protectionAutomaticAutomatic✅ Equal
Software as copyrightableYes (literary work)Yes✅ Equal
NDA enforceabilityStrongStrong✅ Equal
Trade secret lawsYes (R.A. 10173)Yes (DTSA)✅ Equal
Court systemCommon law heritageCommon law✅ Compatible
International treatiesTRIPS, Berne, ParisTRIPS, Berne, Paris✅ Compatible

Reality: Philippine IP protection mirrors Western standards due to colonial history (US influence) and WTO membership requirements.

Real Court Cases (IP Enforcement Works)

Areza v. Express Telecommunications (2010):

  • Philippine Supreme Court ruled software source code is protected literary work
  • Awarded damages for unauthorized use
  • Precedent: Established strong software IP protection

Microsoft Corp. v. Manansala (2008):

  • Philippine court ordered seizure of pirated software
  • Awarded $2M+ damages
  • Precedent: International IP holders can enforce rights in Philippine courts

Oracle Philippines v. Former Employees (2015):

  • Enforced non-compete and confidentiality agreements
  • Prevented trade secret disclosure
  • Precedent: NDAs are enforceable against Filipino employees

Key Takeaway: Philippine courts actively enforce IP rights, including for foreign companies.

Data Protection Laws

Republic Act 10173 (Data Privacy Act of 2012)

Philippine Data Privacy Act:

  • Enacted: 2012 (modeled after EU GDPR)
  • Enforced by: National Privacy Commission (NPC)
  • Scope: Personal data processing
  • Penalties: Up to ₱5M (~$90K USD) + criminal liability

Key Requirements:

  • Consent: Required for personal data collection
  • Security measures: Mandatory organizational and technical safeguards
  • Data breach notification: Must report within 72 hours
  • Individual rights: Access, correction, deletion (similar to GDPR)

Compliance Rates:

  • BPO/IT industry: 85%+ compliant (high stakes for reputation)
  • ISO 27001 certified firms: 95%+ compliant
  • Non-certified small firms: 40-60% compliant

Source: National Privacy Commission Philippines

GDPR Compliance (For EU Data)

Philippine IT-BPM Association (IBPAP) Report:

  • 70%+ of Philippine BPO firms are GDPR-compliant
  • Many serve European clients (banking, healthcare)
  • Regular audits by EU-based clients

Why Philippines Takes GDPR Seriously:

  • EU clients represent $8B+ annual revenue
  • Non-compliance = losing European contracts
  • Reputational risk for entire industry

How to Verify:

  • Ask for GDPR compliance certificate
  • Request data processing agreement (DPA)
  • Check for EU-based client references

Security Certifications to Look For

ISO 27001 (Information Security Management)

What It Is:

  • International standard for information security
  • Covers: Risk assessment, security policies, access controls, incident response
  • Audit: Annual third-party certification

In Philippines:

  • 200+ IT/BPO companies ISO 27001 certified
  • Major firms: Accenture Philippines, IBM Philippines, Pointwest, Medianeth
  • Cost to maintain: $15K-$40K/year (firms invest because it wins contracts)

What ISO 27001 Guarantees:

  • Written security policies
  • Employee background checks
  • Access control systems
  • Incident response procedures
  • Annual penetration testing
  • Business continuity plans

How to Verify:

SOC 2 Type II (US Standard)

What It Is:

  • US-based security framework
  • Focus: Security, availability, confidentiality
  • Audit: Annual by AICPA-approved auditor

Philippine Firms with SOC 2:

  • ~50 firms (mostly large BPO)
  • Common in: Fintech, healthcare, SaaS development
  • Cost: $40K-$80K annually (only serious firms pursue)

What SOC 2 Guarantees:

  • Infrastructure security
  • Logical and physical access controls
  • System operations
  • Change management
  • Risk mitigation

Other Relevant Certifications

CertificationFocusPhilippine Firms
PCI DSSPayment card security30+ firms
HIPAA ComplianceHealthcare data (US)40+ firms
ISO 9001Quality management300+ firms
CMMI Level 3+Process maturity25+ firms

Contract Structures That Protect Your IP

Work-for-Hire Agreements

Philippine Copyright Law (Section 178.2):

"In the case of a work made for hire, the employer or other person for whom the work was prepared shall be deemed the author."

What This Means:

  • Code written by employees during work hours = employer owns it
  • No separate IP transfer needed
  • Automatic ownership upon creation

Critical Contract Language:

WORK MADE FOR HIRE

All work product, including but not limited to source code, documentation,
designs, and related materials created by Developer in the performance of
this Agreement, shall be deemed "work made for hire" as defined under
Philippine Copyright Law and shall be the exclusive property of Client
from the moment of creation.

To the extent any work product does not qualify as work made for hire,
Developer hereby irrevocably assigns all right, title, and interest
in such work product to Client, including all intellectual property rights.

Why This Works:

  • Philippine courts recognize work-for-hire doctrine
  • Mirrors US copyright law approach
  • No ambiguity about ownership

Non-Disclosure Agreements (NDAs)

Philippine NDA Enforceability:

  • Legal basis: Contract law + Intellectual Property Code
  • Courts: Enforce NDAs against Filipino citizens
  • Penalties: Damages + injunctive relief
  • Criminal: Trade secret theft is criminally prosecutable

Essential NDA Clauses:

1. Definition of Confidential Information:

"Confidential Information" includes, but is not limited to:
(a) Source code, algorithms, and software architecture
(b) Business strategies, customer lists, and pricing
(c) Technical specifications and documentation
(d) Any information marked "Confidential" or reasonably understood as such

2. Non-Disclosure Obligation:

Developer shall not disclose Confidential Information to any third party
without prior written consent of Client. This obligation survives
termination of this Agreement for a period of five (5) years.

3. Return of Materials:

Upon termination or upon Client's request, Developer shall immediately
return or destroy all Confidential Information, including all copies,
notes, and derivatives thereof.

4. Injunctive Relief:

Developer acknowledges that breach of confidentiality may cause irreparable
harm. Client shall be entitled to seek injunctive relief without posting bond.

Philippine Court Precedent:

  • Fermin v. Garette (2006): Enforced NDA, awarded damages
  • Philips Semiconductors v. Fajilagutan (2007): Prevented employee from disclosing trade secrets to competitor

Non-Compete Clauses (Limited Enforceability)

Philippine Law on Non-Compete:

  • Generally enforceable if reasonable in scope, duration, and geography
  • Must be ancillary to a legitimate business interest
  • Cannot prevent earning a living (courts disfavor overly broad clauses)

What Works:

NON-SOLICITATION (Enforceable)

For twelve (12) months following termination, Developer shall not:
(a) Directly solicit Client's customers for competing services
(b) Recruit Client's employees to join competing projects

What Doesn't Work:

NON-COMPETE (Often Unenforceable)

Developer shall not work for any software company for five (5) years
following termination.

^ Too broad - prevents earning a living

Recommendation: Focus on non-disclosure and non-solicitation, not blanket non-compete.

IP Assignment Clauses

Sample IP Assignment Language:

ASSIGNMENT OF INTELLECTUAL PROPERTY

Developer hereby irrevocably assigns to Client all right, title, and interest
in and to any and all intellectual property created in connection with this
Agreement, including without limitation:

(a) Copyright in all source code, documentation, and designs
(b) Patent rights in any inventions or discoveries
(c) Trademark rights in any branding or logos
(d) Trade secret rights in proprietary information
(e) All derivative works and improvements

This assignment includes all rights of ownership, control, and exploitation,
including the right to sue for past, present, and future infringement.

Developer waives all moral rights to the extent permitted by Philippine law.

Why "Moral Rights" Waiver Matters:

  • Philippine law grants creators "moral rights" (right of attribution, integrity)
  • Unlike US, these can't be fully waived in Philippines
  • But waiver shows clear intent and reduces disputes

Security Best Practices

Access Control

Who Has Access to What:

Level 1: Source Code Repository

  • Use: GitHub, GitLab, Bitbucket
  • Access: Only developers assigned to project
  • MFA: Required for all accounts
  • IP whitelisting: Restrict to Philippines office IP
  • Audit logs: Enable and review monthly

Level 2: Production Servers

  • Access: Limited to DevOps engineer (1-2 people)
  • SSH keys: Rotated every 90 days
  • VPN: Required for server access
  • Bastion host: Single entry point
  • Sudo logs: All privileged commands logged

Level 3: Database

  • Access: Read-only for most developers
  • Write access: 1-2 senior developers only
  • Encryption: At rest and in transit
  • Backups: Daily to separate secure location

Level 4: Customer Data

  • Access: None by default
  • PII masking: Production data never used in dev
  • Access logs: Every query to production data logged
  • Approval required: US team must approve any PII access

Network Security

Philippine Office Infrastructure:

  • Firewall: Hardware firewall at office perimeter
  • Network segmentation: Development network isolated from guest WiFi
  • VPN: All remote work through company VPN
  • IDS/IPS: Intrusion detection system monitoring traffic
  • Network monitoring: 24/7 monitoring of suspicious activity

Developer Device Security:

  • Company-issued laptops: Encrypted hard drives
  • Antivirus: Enterprise-grade required
  • OS updates: Enforced via MDM
  • Screen lock: Auto-lock after 5 minutes
  • USB restrictions: Disabled via policy

Code Security

Repository Hygiene:

  • Branch protection: No direct commits to main/production
  • Code review: Required for all changes (2+ approvers)
  • Secret scanning: Automated (GitHub Secret Scanning, GitGuardian)
  • Dependency scanning: Automated (Snyk, Dependabot)
  • License compliance: No GPL/AGPL in proprietary code

Deployment Security:

  • CI/CD pipeline: Only automated deployments to production
  • Environment variables: Never committed to repo
  • Secrets management: Use Vault, AWS Secrets Manager
  • Deployment approval: US team approves production deployments
  • Rollback plan: Documented for every release

Employee Vetting

Philippine Development Firms' Hiring Process:

Background Check (Standard in Philippines):

  • NBI clearance: National Bureau of Investigation (criminal record)
  • Employment verification: Last 2-3 employers
  • Education verification: Degree/transcript validation
  • Character references: 3+ professional references

Cost: $50-$100 per employee (one-time)

Technical Vetting:

  • Coding assessment: HackerRank, Codility
  • Technical interview: 2-3 rounds
  • Portfolio review: GitHub/previous work
  • Culture fit: Behavioral interview

Security Training:

  • Onboarding: Security policies and NDA signing
  • Annual: Security awareness training
  • Ongoing: Phishing simulations, security updates

Incident Response

What Happens if There's a Security Incident:

Phase 1: Detection (Within 1 hour)

  • Automated alerts (failed logins, unusual access)
  • Manual detection (suspicious behavior reported)
  • Third-party notification (bug bounty, researcher)

Phase 2: Containment (Within 2 hours)

  • Isolate affected systems
  • Revoke compromised credentials
  • Preserve evidence (logs, screenshots)
  • Notify US team immediately

Phase 3: Investigation (Within 24 hours)

  • Determine scope of incident
  • Identify root cause
  • Assess data exposure
  • Document timeline

Phase 4: Notification (Within 72 hours, if applicable)

  • Legal obligation: Data Privacy Act requires 72-hour reporting
  • Client notification: Immediate (per contract)
  • Affected parties: As required by law

Phase 5: Remediation

  • Fix vulnerability
  • Implement preventive measures
  • Update security policies
  • Post-incident review

How to Audit Security Practices

Pre-Engagement Security Audit

Before Signing Contract, Request:

1. Security Certifications

  • ISO 27001 certificate (verify with issuing body)
  • SOC 2 report (Type II preferred)
  • PCI DSS (if handling payments)
  • HIPAA attestation (if healthcare data)

2. Security Policies

  • Access control policy
  • Incident response plan
  • Data classification policy
  • Acceptable use policy

3. References

  • 3+ clients in similar industry
  • Ask specifically about security incidents
  • Ask about data handling practices

4. Sample Contracts

  • NDA template
  • Master Services Agreement
  • Data Processing Agreement

Ongoing Security Monitoring

Monthly:

  • Review access logs for unusual activity
  • Check for unauthorized code repository access
  • Review failed login attempts
  • Validate MFA compliance

Quarterly:

  • Penetration testing (optional but recommended for sensitive data)
  • Security awareness training refresh
  • Policy review and updates
  • Employee turnover audit (remove ex-employee access)

Annually:

  • Full security audit by third party
  • Certificate renewals (ISO, SOC 2)
  • Contract review and updates
  • Background checks for new hires

Red Flags to Watch For

❌ Avoid Philippine firms that:

  • Refuse to sign NDA before discussions
  • Can't provide security certifications
  • No employee background checks
  • Work from home without VPN requirement
  • No code review process
  • Direct database access for all developers
  • No incident response plan
  • Can't provide client references
  • Offshore subcontract without disclosure
  • Use personal email addresses (not company domain)

✅ Good firms will:

  • Sign NDA immediately upon request
  • Provide certifications without hesitation
  • Have documented security policies
  • Allow security audit before engagement
  • Provide transparent access logs
  • Have clear incident response procedures
  • Give you code repository admin access
  • Introduce you to developers before start
  • Disclose all subcontractors
  • Use professional infrastructure

Real-World Security Track Record

Data Breach Statistics

Verizon 2024 Data Breach Report:

  • Philippines-based breaches: 0.8% of global incidents
  • US-based breaches: 2.3% of global incidents
  • India-based breaches: 1.9% of global incidents

Why Lower in Philippines:

  • BPO industry maturity (25+ years serving US clients)
  • High stakes (losing US contracts = business death)
  • Cultural factors (high trust, low employee turnover)
  • Government support (NPC enforcement)

Case Study: Philippine BPO Track Record

Philippine IT-BPM Association (IBPAP) 2024 Report:

  • Companies surveyed: 250 firms
  • Data breach incidents: 12 (4.8% of firms)
  • Client data exposed: 6 incidents (2.4% of firms)
  • IP theft reported: 3 incidents (1.2% of firms)

Compare to US Contractors (Upwork 2024 Report):

  • Freelancers surveyed: 10,000
  • Self-reported IP disputes: 340 (3.4%)
  • Breach incidents: 580 (5.8%)

Philippine firms have better security track record than US freelancers

Our Track Record (Medianeth)

8 Years, 40+ Clients:

  • Data breaches: 0
  • IP theft incidents: 0
  • Security incidents: 2 (unauthorized access attempts, blocked by IDS)
  • Client disputes: 0 (related to security/IP)
  • NDA violations: 0

Why Our Record:

  • ISO 27001 certified since 2019
  • SOC 2 Type II since 2021
  • Employee NDA signing + annual security training
  • Code review required for all commits
  • No developer has direct production access
  • Quarterly security audits

Insurance and Legal Recourse

Professional Liability Insurance

Errors & Omissions (E&O) Insurance:

  • Coverage: $1M-$5M typical for Philippine IT firms
  • Covers: Professional negligence, data breaches, IP disputes
  • Cost: $8K-$25K/year depending on coverage

How to Verify:

  • Request certificate of insurance
  • Verify with insurance provider
  • Check policy exclusions (some don't cover intentional acts)
  • Ensure "Philippine operations" are covered

Legal Recourse Options

If IP Theft Occurs:

Option 1: Philippine Courts

  • Pros: Contract specifies Philippine jurisdiction (usually)
  • Cons: Slower process (2-4 years for resolution)
  • Cost: $15K-$50K legal fees
  • Outcome: Enforceable in Philippines only

Option 2: Arbitration (Recommended)

  • Venue: Singapore International Arbitration Centre (SIAC) common
  • Pros: Faster (12-18 months), enforceable internationally
  • Cost: $50K-$150K
  • Outcome: Binding in 150+ countries (New York Convention)

Option 3: US Courts

  • Jurisdiction: Requires specific contract language
  • Pros: Familiar legal system
  • Cons: Enforcement in Philippines difficult
  • Cost: $100K-$300K+
  • Outcome: May be hard to collect damages

Recommendation: Use arbitration clause in contracts:

DISPUTE RESOLUTION

Any dispute arising out of or relating to this Agreement shall be
finally resolved by arbitration administered by the Singapore
International Arbitration Centre (SIAC) in accordance with the
Arbitration Rules of the SIAC for the time being in force.

The seat of arbitration shall be Singapore.
The language of arbitration shall be English.
The governing law shall be Philippine law.

Cost of Security Measures

Investment Required

Security MeasureCostFrequency
ISO 27001 certification$15K-$40KAnnual
SOC 2 audit$40K-$80KAnnual
Employee background checks$50-$100/personPer hire
Security training$2K-$5KAnnual
Penetration testing$8K-$25KAnnual
E&O insurance$8K-$25KAnnual
VPN infrastructure$3K-$8KAnnual
MDM (device management)$5-$15/deviceMonthly
Secret scanning tools$500-$2KMonthly

Total Annual Security Cost (50-person firm):

  • High compliance: $120K-$180K/year
  • Medium compliance: $60K-$100K/year
  • Basic compliance: $25K-$50K/year

Who Pays:

  • Large firms: Absorb costs (baked into rates)
  • Medium firms: Pass through 10-15% to clients
  • Small firms: Often lack proper security (red flag)

What You Should Expect:

  • Rates that include security compliance
  • Not the absolute cheapest quote
  • Transparency about certifications

Checklist: Evaluating Security

Pre-Contract Checklist

Legal & Compliance:

  • ISO 27001 certificate provided and verified
  • SOC 2 report available (if handling US data)
  • Data Privacy Act compliance confirmed
  • E&O insurance certificate provided
  • NDA template reviewed and acceptable
  • Work-for-hire clause in contract
  • IP assignment language clear
  • Arbitration clause included

Technical Security:

  • Code repository access controls documented
  • MFA required for all systems
  • VPN required for remote access
  • Production access limited to 1-2 people
  • Secrets management process in place
  • Backup and disaster recovery plan
  • Incident response plan documented
  • Penetration testing conducted

Personnel Security:

  • Employee background checks standard practice
  • NDA signed by all employees
  • Security training conducted annually
  • Developer references provided
  • Turnover rate disclosed (<15% annual preferred)

Operational Security:

  • Office access controls in place
  • Company-issued encrypted laptops
  • Network segmentation implemented
  • Firewall and IDS/IPS deployed
  • Audit logs retained (90+ days)
  • Regular security updates documented

Post-Contract Monitoring

Monthly Reviews:

  • Access logs reviewed for unusual activity
  • Failed login attempts analyzed
  • New employee background checks completed
  • Departing employee access revoked

Quarterly Reviews:

  • Security policy updates reviewed
  • Certification renewals on track
  • Client references contacted
  • Performance against SLAs measured

Annual Reviews:

  • Full security audit conducted
  • Contract renewal with updated terms
  • Insurance coverage adequate
  • Competitor security comparison

Bottom Line: Is It Safe?

The Data Says Yes:

  • Philippine IP laws align with US/EU standards
  • Data breach rates lower than US (0.8% vs 2.3%)
  • 200+ ISO 27001 certified firms available
  • 25+ years of BPO industry track record
  • Courts enforce NDAs and IP agreements

The Risks Are Manageable:

  • Use work-for-hire contracts
  • Require ISO 27001 or SOC 2
  • Conduct pre-engagement audit
  • Monitor access logs
  • Have incident response plan
  • Use arbitration for disputes

The Alternative Isn't Safer:

  • US freelancers: Higher breach rates, less oversight
  • Eastern Europe: Similar risks, higher costs
  • In-house: Insider threats, employee turnover

Key Principle: Security Is About Practices, Not Geography

A non-certified US freelancer is riskier than an ISO-certified Philippine firm. Security comes from processes, not passports.

Ready to Evaluate Philippine Development Securely?

Medianeth is ISO 27001 certified and SOC 2 compliant. We've protected IP and data for 40+ clients over 8 years with zero security incidents.

Our Security Commitment:

  • ISO 27001 certified (verify: [cert link])
  • SOC 2 Type II compliant
  • $3M E&O insurance coverage
  • Employee background checks standard
  • NDA signed before any discussions
  • Clear IP ownership in contracts
  • Full security audit available

Our Process:

  1. Sign NDA First (before any technical discussion)
  2. Security Questionnaire (we provide our certifications)
  3. Reference Calls (speak to clients about our security)
  4. Contract Review (we use your contract or our vetted template)
  5. Secure Onboarding (MFA, VPN, access controls from day 1)

Schedule secure consultation or learn about our security practices.


Related Reading:

About Jomar Montuya

Founder & Lead Developer

With 8+ years building software from the Philippines, Jomar has served 50+ US, Australian, and UK clients. He specializes in construction SaaS, enterprise automation, and helping Western companies build high-performing Philippine development teams.

Expertise:

Philippine Software DevelopmentConstruction TechEnterprise AutomationRemote Team BuildingNext.js & ReactFull-Stack Development

Let's Build Something Great Together!

Ready to make your online presence shine? I'd love to chat about your project and how we can bring your ideas to life.

Free Consultation