<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=705389681562533&amp;ev=PageView&amp;noscript=1">
whatsappChat

Recent PDPA Amendments - w.e.f. 1 Feb 2021

 

From 1 February 2021, the following three key changes to the Singapore Personal Data Protection Act (PDPA) will take in phases: 

1.  Mandatory data breach notification

A data breach is deemed to cause significant harm (and therefore notifiable) if the data breach results in the compromise of an individual’s full name or national identification number or account information. 

A data breach is also deemed notifiable if it is of a significant scale, i.e. if the data breach affects 500 or more individuals.

Who and when to notify?

  • Organisations must notify PDPC no later than three calendar days after the data breach has been identified.
  • Affected individuals must also be notified as soon as practicable, at the same time or after notifying the PDPC. 

What to notify?
See regulations on notification of data breaches for a prescribed list of minimum information that the notification must contain.

2.  Introduction of offences concerning mishandling of personal data by individuals

Individuals will be held accountable for knowingly or recklessly committing any unauthorised:

  •  Disclosure of personal data
  •  Use of personal data for wrongful gain or causing a wrongful loss to any person
  •  Re-identification of anonymised data.

A maximum fine of SGD 5,000 or a maximum two years imprisonment or both.

3.  Expansion of consent framework

The two new ways consent can be given are:

  • Contractual necessity
  • Notification 

The new exceptions that remove the need for consent are:

  • Legitimate interests
  • Business improvement
  • Research purposes

 

Other notable upcoming changes, expected to be implemented once regulations are issued:

 

4.  Increased financial penalties

Up to 10% of an organisation's annual turnover in Singapore, or SGD 1 million, whichever higher. This higher financial penalty cap will take effect no earlier than 1 February 2022. 

5.  The right to data portability

Organisations must, at the request of an individual, transmit an individual’s personal data that is in the organisation’s possession or under its control, to another organisation in a common machine-readable format.

 

KEY TAKEAWAYS

 
Document_Policy_Sheets_Icon_Blue

Continuous review of existing data protection policies and procedures must be carried out to ensure the organisation is prepared and always compliant.

Reminder_Final_Statement_Icon_Blue

Data breach management plans must be updated to reflect new requirements on mandatory data breach notifications. 

Talking_Chat_Icon_Blue

Internal communications and training should be also conducted regularly to keep staff informed of the latest update, requirements and data breach threats.

For a more in depth understanding of the recent PDPA amendments and how it will affect your business and data handling processes, do have chat with us.

For more information about how you can get DPO advisory and to simplify your data protection program, learn more about DPO2SMETM.     

Source: PDPC’s announcement; the gazetted Commencement Notification

 

Related Insights

Importance of CISO

Deciphering ERP vs Accounting Software: Unveiling the Key Di...

IT Outsourcing vs IT Managed Services

Road to IPO

Why Backup Microsoft 365?

Best practices for performing data backups

Increase ROI on IT assets

8 Data-backup Tips for a Resilient Digital-led Business Post...

New MAS Ruling to Strengthen Cyber Resilience of the Financi...

The importance of IT policy

Four factors to consider in an outsourcing relationship

Trim the bloat to keep afloat

Windows 7 & Windows Server 2008 End of Life – Everything...

Achieving True Digital Transformation Success

Digital-led COVID-19 Recovery Strategy - Why it is important...

Cyber Safe Habits for SMEs and Employees

What is IT governance?

Microsoft Dynamics 365 Licencing Changes – What you should k...

Using IT outsourcing to move beyond the challenge

Chief Technology Officer-as-a-Service (CTO-as-a-Service) - D...

Zero Trust – No Longer A Buzzword But Becoming A Necessity

Outsourcing IT infrastructure: Benefits galore!

Data Protection Tips for Smes and Everyday Users

Digital AGM Made Easy

Have you been spending all your time firefighting? No time t...

Are you looking for the right IT vendor?

Digital Transformation DO’s and DON'Ts

Benefits of Outsourcing your IT function

Importance of CISO

Deciphering ERP vs Accounting Software: Unveiling the Key Di...

IT Outsourcing vs IT Managed Services

Road to IPO

Why Backup Microsoft 365?

Best practices for performing data backups

Increase ROI on IT assets

8 Data-backup Tips for a Resilient Digital-led Business Post...

New MAS Ruling to Strengthen Cyber Resilience of the Financi...

The importance of IT policy

Four factors to consider in an outsourcing relationship

Trim the bloat to keep afloat

Windows 7 & Windows Server 2008 End of Life – Everything...

Achieving True Digital Transformation Success

Digital-led COVID-19 Recovery Strategy - Why it is important...

Cyber Safe Habits for SMEs and Employees

What is IT governance?

Microsoft Dynamics 365 Licencing Changes – What you should k...

Using IT outsourcing to move beyond the challenge

Chief Technology Officer-as-a-Service (CTO-as-a-Service) - D...

Zero Trust – No Longer A Buzzword But Becoming A Necessity

Outsourcing IT infrastructure: Benefits galore!

Data Protection Tips for Smes and Everyday Users

Digital AGM Made Easy

Have you been spending all your time firefighting? No time t...

Are you looking for the right IT vendor?

Digital Transformation DO’s and DON'Ts

Benefits of Outsourcing your IT function