3
Most read
5
Most read
8
Most read
Title of Show
Name of Presenter
Date
Applying the
Personal Data Protection Act
(Prepared for the Internet Society,
Singapore Chapter)
Benjamin Ang
Lecturer, Law & Management, Temasek Polytechnic
Consultant, Keystone Law Corporation
techmusicartandlaw.blogspot.com
www.isoc.sg
Are these practices safe under the Act?
o NUTZ Supermarket runs a lucky draw contest
and collects phone numbers and email
addresses from 100,000 customers.
1. NUTZ hires a telemarketing company to call all the
customers to offer them discount card membership
2. NUTZ shares the phone numbers with Krusty Cheese, a
large supplier of NUTZ, so that Krusty can run a sales
promotion
Are these practices safe under the Act?
3. Jacky, the former IT manager of NUTZ, leaves to start
his own business, and sends SMS to all customers
telling them of his new venture
4. In order to investigate CBT by Jacky, NUTZ hands over
the customer data to the police
5. Customers call NUTZ to complain, and are left on hold
because no department is prepared to handle them
QUICK REVISION
Personal Data Protection Act
o Controls the collection, storage, use and
disclosure of personal data –
• data about an individual who can be identified from
that data, or
• who can identified from that data + other information
to which the organisation has or is likely to have access
o Does not apply to actions by individuals for
personal use (s4)
o Does not apply to Business Contact Information
Business Contact Information
o Information not provided by the individual
solely for his personal purposes e.g.
• name,
• position name or title,
• business telephone number,
• business address,
• business electronic mail address etc
Consent Required
o Section 13: Organizations need consent to
• Collect personal data
• Use personal data
• Disclose personal data
o Section 14: Organizations cannot collect consent
through deceptive or misleading practices
o Section 16: Individuals can withdraw consent
that they have given to organizations
Where Consent is Not Required
o Section 21: Organizations
are allowed to release
personal data to law
enforcement agencies
o No changes to other
existing laws (e.g. search
and seizure under the
Criminal Procedure Code)
The Do Not Call Registry (Part IX)
o If a person signs up with the Do Not Call
Registry, organizations cannot call or message
that person to try to
• sell products or services
• or offer business
• or investment opportunities
o unless the person has given consent
o Also covers SMS messages (Sections 36 and 37).
DNC Registry – persons responsible
o “sender”, means a person —
• sends the message / makes a call,
• causes the message to be sent / call to be made, or
• authorises the sending of the message / making of the
call
DNC Registry - duties
o Duty to check the Register anytime within the
period of 30 days before sending the message
o Calling line identity not to be concealed
o Clear and accurate information of persons who
authorises the sending
o Contact information of individual/organisation
o Information provided to be reasonably for at
least 30 days after message is sent
What organisations must do
o Develop policies and
practices to ensure
compliance
o Designation of key
personnel to ensure
compliance but
organisation remains
ultimately responsible
o Staff education
o Develop a complaints
response process – e.g. a
process to take in
requests for correction of
DP and withdrawal of
consent
o Transparency to the
public regarding
information of
designated personnels
and complaints response
process
o Seek legal advice
What individuals can do
o Make a complaint to the
Personal Data Protection
Commission, who can
• direct them to resolve it
through mediation
(Section 27),
• or make an order against
the organization to stop
what it’s doing, destroy
the data, and pay a
penalty of up to $1 million
o If the individual wants
compensation,
• start civil proceedings in
court (Section 32)
• seek compensation or an
injunction
Are these practices safe under the Act?
o NUTZ Supermarket runs a
lucky draw contest and
collects phone numbers and
email addresses from 100,000
customers.
1. NUTZ hires a telemarketing
company to call all the
customers to offer them
discount card membership
2. NUTZ shares the phone
numbers with Krusty
Cheese, a large supplier of
NUTZ, so that Krusty can run
a sales promotion
3. Jacky, the former IT
manager of NUTZ, leaves to
start his own business, and
sends SMS to all customers
telling them of his new
venture
4. In order to investigate CBT
by Jacky, NUTZ hands over
the customer data to the
police
5. Customers call NUTZ to
complain, and are left on
hold because no department
is prepared to handle them

More Related Content

PDF
Personal Data Protection Singapore - Pdpc corporate-brochure
PDF
GDPR Demystified
PPTX
General Data Protection Regulation (GDPR)
PPTX
GDPR Presentation slides
PDF
What about GDPR?
PPTX
Introduction to GDPR
PDF
Pdpa(kewal)
PDF
Highlights of the Singapore Personal Data Protection Act 2012
Personal Data Protection Singapore - Pdpc corporate-brochure
GDPR Demystified
General Data Protection Regulation (GDPR)
GDPR Presentation slides
What about GDPR?
Introduction to GDPR
Pdpa(kewal)
Highlights of the Singapore Personal Data Protection Act 2012

What's hot (20)

PDF
GDPR Basics - General Data Protection Regulation
PPS
Introduction to Data Protection and Information Security
PDF
Complying with Singapore Personal Data Protection Act - A Practical Guide
PPTX
Legal obligations and responsibilities of data processors and controllers und...
PPTX
PDPA Compliance Preparation
PDF
DPDP Act 2023.pdf
PPTX
General Data Protection Regulation
PPTX
Pdpa presentation
PPTX
Data Privacy Introduction
PPT
Data Protection Act
PPT
PDPA 2010 at office (HairulHafiz)
PPTX
Rodo reakcja na_naruszenia
PPTX
GDPR Introduction and overview
PDF
Data Protection and Privacy
PPT
Data Protection (Download for slideshow)
PPTX
GDPR
PPTX
Data Security - English
PPTX
Data protection ppt
PDF
Checklist for SMEs for GDPR compliance
GDPR Basics - General Data Protection Regulation
Introduction to Data Protection and Information Security
Complying with Singapore Personal Data Protection Act - A Practical Guide
Legal obligations and responsibilities of data processors and controllers und...
PDPA Compliance Preparation
DPDP Act 2023.pdf
General Data Protection Regulation
Pdpa presentation
Data Privacy Introduction
Data Protection Act
PDPA 2010 at office (HairulHafiz)
Rodo reakcja na_naruszenia
GDPR Introduction and overview
Data Protection and Privacy
Data Protection (Download for slideshow)
GDPR
Data Security - English
Data protection ppt
Checklist for SMEs for GDPR compliance
Ad

Viewers also liked (12)

PDF
Personal data Protection Act Singapore How-to Perform Assessment
PDF
Outsourcing and transfer of personal data - Titta Penttilä - TeliaSonera
PDF
Cybercrime Court Decisions from Latin America - Legal and Policy Developments...
PPT
Ethics and information security 2
PPTX
Data Protection & Privacy in Malaysian Total Hospital Information System
PPT
Personal Data Protection in Malaysia
PDF
Overview of Information Security & Privacy
PDF
Personal Data Protection Act - Employee Data Privacy
PDF
Emerging Trends in Information Security and Privacy
PPTX
Lecture01: Introduction to Security and Privacy in Cloud Computing
PDF
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
PDF
The Security and Privacy Threats to Cloud Computing
Personal data Protection Act Singapore How-to Perform Assessment
Outsourcing and transfer of personal data - Titta Penttilä - TeliaSonera
Cybercrime Court Decisions from Latin America - Legal and Policy Developments...
Ethics and information security 2
Data Protection & Privacy in Malaysian Total Hospital Information System
Personal Data Protection in Malaysia
Overview of Information Security & Privacy
Personal Data Protection Act - Employee Data Privacy
Emerging Trends in Information Security and Privacy
Lecture01: Introduction to Security and Privacy in Cloud Computing
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
The Security and Privacy Threats to Cloud Computing
Ad

Similar to Applying the Personal Data Protection Act (Singapore) (20)

PPTX
Introduction to data protection - Edinburgh - 29/04/15
PPTX
An introduction to data protection - Manchester - 24/06/15
PPTX
An introduction to data protection - 2/09/2015
PPTX
3A – DATA PROTECTION: ADVICE
 
PPTX
14 Laws Affecting Direct Marketing
PPTX
PPTX
Ico sme-webinar-slides-090217
PDF
Pasoco ITSMF,SPMI-PDPA-140626-public
PDF
Blake lapthorn In House Lawyer forum - 11 Sept 2012
PDF
An introduction to data protection - Edinburgh
PDF
GDPR webinar for business leaders
PDF
Introduction to data protection
PPTX
The changing face of privacy laws
PDF
Prep your app for gdpr compliance
PDF
Legal and data protection update
PPTX
GDPR Is Coming – Are Emailers Ready?
PPTX
GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...
PPTX
GDPR Breakfast Briefing for Business Advisors
PDF
DMA - DPC Workshop - 23 October 2013
Introduction to data protection - Edinburgh - 29/04/15
An introduction to data protection - Manchester - 24/06/15
An introduction to data protection - 2/09/2015
3A – DATA PROTECTION: ADVICE
 
14 Laws Affecting Direct Marketing
Ico sme-webinar-slides-090217
Pasoco ITSMF,SPMI-PDPA-140626-public
Blake lapthorn In House Lawyer forum - 11 Sept 2012
An introduction to data protection - Edinburgh
GDPR webinar for business leaders
Introduction to data protection
The changing face of privacy laws
Prep your app for gdpr compliance
Legal and data protection update
GDPR Is Coming – Are Emailers Ready?
GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...
GDPR Breakfast Briefing for Business Advisors
DMA - DPC Workshop - 23 October 2013

More from Benjamin Ang (20)

PDF
Case study on Building Singapore’s National Cybersecurity Workforce and Resea...
PPTX
Fake News and New Media - impact of disinformation and synthetic media (deepf...
PDF
Online echo chambers, misinformation, disinformation, identity politics, how ...
PDF
Summary of Final Report of the UN OEWG on State Use of ICT (Cyber) 2025.pdf
PDF
Cyber Resilience and Critical Information Infrastructure Singapore Case Studi...
PDF
Changing Domains - Cyber and Information Domains 2024 lecture.pdf
PDF
Regulatory Approaches in Digital Security (OECD Global Forum on Digital Secur...
PDF
Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...
PDF
International Cooperation to Impose Consequences for Malicious Cyber Activity...
PDF
Changing Domains - The Cyber Info Realm 2023.pdf
PDF
Cooperation between ASEAN military civil academic in international cybersecur...
PDF
Technology Disruption Digital Inclusion and the Law.pdf
PDF
Why Application of International Law Applies to ASEAN.pdf
PDF
Lessons learned from Capacity Building on International Cyber Norms in Southe...
PDF
Cybersecurity and National Security in Southeast Asia 2022.pdf
PDF
Cybersecurity and Geopolitical Risk.pdf
PDF
Cybercrime and Cyber Warfare (and Information Operations) – Your questions an...
PDF
Disinformation in Southeast Asia and Pro Russian Anti Ukraine Narratives
PDF
Foreign Interference and National Security - Law Society Public Law conferenc...
PDF
Technology Disruption in the New Normal, Digital Inclusion and the Law
Case study on Building Singapore’s National Cybersecurity Workforce and Resea...
Fake News and New Media - impact of disinformation and synthetic media (deepf...
Online echo chambers, misinformation, disinformation, identity politics, how ...
Summary of Final Report of the UN OEWG on State Use of ICT (Cyber) 2025.pdf
Cyber Resilience and Critical Information Infrastructure Singapore Case Studi...
Changing Domains - Cyber and Information Domains 2024 lecture.pdf
Regulatory Approaches in Digital Security (OECD Global Forum on Digital Secur...
Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...
International Cooperation to Impose Consequences for Malicious Cyber Activity...
Changing Domains - The Cyber Info Realm 2023.pdf
Cooperation between ASEAN military civil academic in international cybersecur...
Technology Disruption Digital Inclusion and the Law.pdf
Why Application of International Law Applies to ASEAN.pdf
Lessons learned from Capacity Building on International Cyber Norms in Southe...
Cybersecurity and National Security in Southeast Asia 2022.pdf
Cybersecurity and Geopolitical Risk.pdf
Cybercrime and Cyber Warfare (and Information Operations) – Your questions an...
Disinformation in Southeast Asia and Pro Russian Anti Ukraine Narratives
Foreign Interference and National Security - Law Society Public Law conferenc...
Technology Disruption in the New Normal, Digital Inclusion and the Law

Recently uploaded (20)

PDF
My India Quiz Book_20210205121199924.pdf
PPTX
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
PPTX
Introduction to pro and eukaryotes and differences.pptx
PDF
Trump Administration's workforce development strategy
PDF
HVAC Specification 2024 according to central public works department
PPTX
TNA_Presentation-1-Final(SAVE)) (1).pptx
PDF
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
PPTX
Computer Architecture Input Output Memory.pptx
PPTX
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
DOCX
Cambridge-Practice-Tests-for-IELTS-12.docx
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PDF
Complications of Minimal Access-Surgery.pdf
PPTX
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
PPTX
20th Century Theater, Methods, History.pptx
PDF
AI-driven educational solutions for real-life interventions in the Philippine...
PPTX
Share_Module_2_Power_conflict_and_negotiation.pptx
PDF
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
PDF
Environmental Education MCQ BD2EE - Share Source.pdf
PDF
Vision Prelims GS PYQ Analysis 2011-2022 www.upscpdf.com.pdf
PDF
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 1)
My India Quiz Book_20210205121199924.pdf
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
Introduction to pro and eukaryotes and differences.pptx
Trump Administration's workforce development strategy
HVAC Specification 2024 according to central public works department
TNA_Presentation-1-Final(SAVE)) (1).pptx
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
Computer Architecture Input Output Memory.pptx
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
Cambridge-Practice-Tests-for-IELTS-12.docx
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
Complications of Minimal Access-Surgery.pdf
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
20th Century Theater, Methods, History.pptx
AI-driven educational solutions for real-life interventions in the Philippine...
Share_Module_2_Power_conflict_and_negotiation.pptx
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
Environmental Education MCQ BD2EE - Share Source.pdf
Vision Prelims GS PYQ Analysis 2011-2022 www.upscpdf.com.pdf
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 1)

Applying the Personal Data Protection Act (Singapore)

  • 1. Title of Show Name of Presenter Date Applying the Personal Data Protection Act (Prepared for the Internet Society, Singapore Chapter) Benjamin Ang Lecturer, Law & Management, Temasek Polytechnic Consultant, Keystone Law Corporation techmusicartandlaw.blogspot.com www.isoc.sg
  • 2. Are these practices safe under the Act? o NUTZ Supermarket runs a lucky draw contest and collects phone numbers and email addresses from 100,000 customers. 1. NUTZ hires a telemarketing company to call all the customers to offer them discount card membership 2. NUTZ shares the phone numbers with Krusty Cheese, a large supplier of NUTZ, so that Krusty can run a sales promotion
  • 3. Are these practices safe under the Act? 3. Jacky, the former IT manager of NUTZ, leaves to start his own business, and sends SMS to all customers telling them of his new venture 4. In order to investigate CBT by Jacky, NUTZ hands over the customer data to the police 5. Customers call NUTZ to complain, and are left on hold because no department is prepared to handle them
  • 5. Personal Data Protection Act o Controls the collection, storage, use and disclosure of personal data – • data about an individual who can be identified from that data, or • who can identified from that data + other information to which the organisation has or is likely to have access o Does not apply to actions by individuals for personal use (s4) o Does not apply to Business Contact Information
  • 6. Business Contact Information o Information not provided by the individual solely for his personal purposes e.g. • name, • position name or title, • business telephone number, • business address, • business electronic mail address etc
  • 7. Consent Required o Section 13: Organizations need consent to • Collect personal data • Use personal data • Disclose personal data o Section 14: Organizations cannot collect consent through deceptive or misleading practices o Section 16: Individuals can withdraw consent that they have given to organizations
  • 8. Where Consent is Not Required o Section 21: Organizations are allowed to release personal data to law enforcement agencies o No changes to other existing laws (e.g. search and seizure under the Criminal Procedure Code)
  • 9. The Do Not Call Registry (Part IX) o If a person signs up with the Do Not Call Registry, organizations cannot call or message that person to try to • sell products or services • or offer business • or investment opportunities o unless the person has given consent o Also covers SMS messages (Sections 36 and 37).
  • 10. DNC Registry – persons responsible o “sender”, means a person — • sends the message / makes a call, • causes the message to be sent / call to be made, or • authorises the sending of the message / making of the call
  • 11. DNC Registry - duties o Duty to check the Register anytime within the period of 30 days before sending the message o Calling line identity not to be concealed o Clear and accurate information of persons who authorises the sending o Contact information of individual/organisation o Information provided to be reasonably for at least 30 days after message is sent
  • 12. What organisations must do o Develop policies and practices to ensure compliance o Designation of key personnel to ensure compliance but organisation remains ultimately responsible o Staff education o Develop a complaints response process – e.g. a process to take in requests for correction of DP and withdrawal of consent o Transparency to the public regarding information of designated personnels and complaints response process o Seek legal advice
  • 13. What individuals can do o Make a complaint to the Personal Data Protection Commission, who can • direct them to resolve it through mediation (Section 27), • or make an order against the organization to stop what it’s doing, destroy the data, and pay a penalty of up to $1 million o If the individual wants compensation, • start civil proceedings in court (Section 32) • seek compensation or an injunction
  • 14. Are these practices safe under the Act? o NUTZ Supermarket runs a lucky draw contest and collects phone numbers and email addresses from 100,000 customers. 1. NUTZ hires a telemarketing company to call all the customers to offer them discount card membership 2. NUTZ shares the phone numbers with Krusty Cheese, a large supplier of NUTZ, so that Krusty can run a sales promotion 3. Jacky, the former IT manager of NUTZ, leaves to start his own business, and sends SMS to all customers telling them of his new venture 4. In order to investigate CBT by Jacky, NUTZ hands over the customer data to the police 5. Customers call NUTZ to complain, and are left on hold because no department is prepared to handle them