Personal Data Protection Act

Personal Data Protection Act

The purpose of Personal Data Protection Act is to govern the collection, use and disclosure of personal data by organisations in a manner that recognises both the right of individuals to protect their personal data and the need of organisations to collect, use or disclose personal data for purposes that a reasonable person would consider appropriate in the circumstances.

Personal Data Protection Act

Overview

What is Personal Data?

Personal data refers to data, whether true or not, about an individual who can be identified from that data; or from that data and other information to which the organisation has or is likely to have access. Personal data in Singapore is protected under the Personal Data Protection Act 2012 (PDPA).

What is the Personal Data Protection Act?

The PDPA establishes a data protection law that comprises various rules governing the collection, use, disclosure and care of personal data. It recognises both the rights of individuals to protect their personal data, including rights of access and correction, and the needs of organisations to collect, use or disclose personal data for legitimate and reasonable purposes.

The PDPA provides for the establishment of a national Do Not Call (DNC) Registry. The DNC Registry allows individuals to register their Singapore telephone numbers to opt out of receiving marketing phone calls, mobile text messages such as SMS or MMS, and faxes from organisations.

Objectives of the Personal Data Protection Act

Today, vast amounts of personal data are collected, used and even transferred to third party organisations for a variety of reasons. This trend is expected to grow exponentially as the processing and analysis of large amounts of personal data becomes possible with increasingly sophisticated technology.

With such a trend comes growing concerns from individuals about how their personal data is being used. Hence, a data protection regime to govern the collection, use and disclosure of personal data is necessary to address these concerns and to maintain individuals’ trust in organisations that manage data.

By regulating the flow of personal data among organisations, the PDPA also aims to strengthen and entrench Singapore’s competitiveness and position as a trusted, world-class hub for businesses.

How does the Personal Data Protection Act Work?

The PDPA will ensure a baseline standard of protection for personal data across the economy by complementing sector-specific legislative and regulatory frameworks. This means that organisations will have to comply with the PDPA as well as the common law and other relevant laws that are applied to the specific industry that they belong to, when handling personal data in their possession.

The PDPA takes into account the following concepts:

  • Consent – Organisations may collect, use or disclose personal data only with the individual’s knowledge and consent (with some exceptions);
  • Purpose – Organisations may collect, use or disclose personal data in an appropriate manner for the circumstances, and only if they have informed the individual of purposes for the collection, use or disclosure; and
  • Reasonableness – Organisations may collect, use or disclose personal data only for purposes that would be considered appropriate to a reasonable person in the given circumstances.

Application of the Personal Data Protection Act

The PDPA covers personal data stored in electronic and non-electronic forms.

The data protection provisions in the PDPA (parts III to VI) generally do not apply to:

  • Any individual acting in a personal or domestic basis.
  • Any employee acting in the course of his or her employment with an organisation.
  • Any public agency or an organisation in the course of acting on behalf of a public agency in relation to the collection, use or disclosure of the personal data. You may wish to refer to the Personal Data Protection (Statutory Bodies) Notification 2013 for the list of specified public agencies.
  • Business contact information. This refers to an individual’s name, position name or title, business telephone number, business address, business electronic mail address or business fax number and any other similar information about the individual, not provided by the individual solely for his or her personal purposes.

These rules are intended to be the baseline law which operates as part of the law of Singapore. It does not supersede existing statutes, such as the Banking Act and Insurance Act but will work in conjunction with them and the common law.

When does the Personal Data Protection Act Come into Effect?

The PDPA takes effect in phases starting with the provisions relating to the formation of the PDPC on 2 January 2013. Provisions relating to the DNC Registry came into effect on 2 January 2014 and the main data protection rules on 2 July 2014. This allows time for organisations to review and adopt internal personal data protection policies and practices, to help them comply with the PDPA.

Development of the Personal Data Protection Act

In the development of this law, references were made to the data protection regimes of key jurisdictions that have established comprehensive data protection laws, including the EU, UK, Canada, Hong Kong, Australia and New Zealand, as well as the OECD Guidelines on the Protection of Privacy and Transborder Flow of Personal Data, and the APEC Privacy Framework. These references are helpful for the formulation of a regime for Singapore that is relevant to the needs of individuals and organisations, and takes into account international best practices on data protection.

Three public consultations were conducted since 2011 to seek feedback on the proposed data protection regime. The public consultation sought the public’s views on topics including the coverage of the proposed law, the proposed data management rules and transitional arrangements for organisations to comply with the new law. For more information on the public consultations, please visit the MCI website.

What can we do for you to cope with Personal Data Protection Act?

  •  Degauss onsite using NSA evaluated degaussers which is capable of erasing both longitudinal and perpendicular magnetic disk storage devices with coercivity of up to 5,000 Oersteds
  •  Shredded/crushed onsite by built-for-purpose HDD and SSD shredder/crusher to break it into smaller pieces

Our Services

Secure Erasure

Hard Disk Erasure

DT provides an ISO 9001 Certified for high quality Secure Electronic Data Erasure Services on any storage media such as PATA, SATA, or SCSI. There are many options of erasure. One of it is Software Erase, by overwriting the sector of the disk with a new value with certain amount of passes to ensure that the data is harder to recover. But we also provides a better option than software erase, “Secure Erase” which initiate the drive internal secure erase command, security erase unit, based on the ATA specification by the T13 technical committee.

Degaussing Services

DT provides a high quality degaussing service based on ISO 9001:2008 Certified – Secure Electronic Data Erasure & Destruction Services. We provide a quality checking process to demagnetizes the disk so that all data stored on the disk is permanently destroyed. Thus making the disk impossible to be recovered by any recovery tools available.

Kindly contact us for more details.

Secure Data Destruction

Hard Disk & Tape Sanitization

One of the key solutions to eliminate the risk of data falling into the wrong hands is to degauss hard drives prior to disposal. Hard drive degaussers use powerful magnets or an electromechanical “pulse” to erase data from hard drives. Similarly, tapes should also be properly degaussed before disposal.

In fact, DoD Requirements call for hard drives to be degaussed in an NSA listed Degausser and then physically destroyed prior to disposal.

In fact, DoD Requirements call for hard drives to be degaussed in an NSA listed Degausser and then physically destroyed prior to disposal.

CD/DVD Optical Media Destruction

Destroying CD/DVD Optical Media doesn’t have to be a problem.

Data Terminator has a variety of machines to meet NSA/CSS Specifications for CD/DVD Optical Media Destruction.

IT Asset Disposal

Proper IT asset disposal is becoming more and more important not just on the environmental issues but also on data confidentiality.

Many organizations do not have the dedicated resources or the bulk quantity to justify the investment of procuring the equipment. They may choose to outsource such destruction and disposal. Outsourcing can be affordable and safe when done properly. If you choose this option, ask what methods will be used, where your items will be kept prior to destruction, or if there are any on-site services, what happens to destroyed waste, and what proof you will get that those items were actually destroyed.

Data security is an ongoing process, by being aware of the threats and understanding the destruction options, you will be in a much better position to protect your business and yourself. You will have complete peace of mind that you have left nothing behind.

Data Terminator provides complete IT asset disposal solutions. Our capabilities include the management of the complete disposal process of asset verification, secure data sanitization and asset de-classification, proper destruction and disposal.

Our Services

Information leakage is a major threat to all organisations. IT departments often spent millions of dollars on access security, anti-virus and intrusion-protection. This security fortress becomes inadequate when dealing with information leakage via data storage sanitization. Data Terminator has the capability, competency and track record to provide organisations with effective data leakage protection solutions.

Data Terminator’s secure data sanitization processes are ISO 9001:2008 certified, the first in its class in Singapore, signifying our commitment and priority to organisations’ security needs.

Data Terminator’s secure data sanitization service covers all forms of electronic data storage media, which includes hard drive, magnetic tape, audio/video tape, optical media, flash media, static storage media, floppy and Zip cartridge, etc.

Besides data sanitization, Data Terminator also provides complete IT asset disposal solutions. Our capabilities include the management of the complete disposal process of asset verification, secure data sanitization and asset de-classification, proper destruction and disposal.

When a file is erased or deleted from your computer, the actual data in the file is not gone forever. The space utilized by that file is simply marked as “free” for use by other data. The case also applies to hard disks which are spoilt or with bad sectors. The fact is your data is still lurking in those hard disks that have no operational use.

Many people would think that once other data is written in that space, the original data becomes gone forever. However, with data recovery tools readily available, it is now possible to recover data even after it has been written over a few times.

Data Terminator provides secure and comprehensive data sanitization equipment and services with full compliance and quality to give our customers complete peace of mind. The secure data sanitization equipment used are all NSA-certified and our data sanitization process is ISO-certified.

Data Terminator is a trusted brand in Data Leakage and End-of-Life Data Protection. Our processes are ISO 9001:2015 and ISO 14001: 2015 certified. Our mission is to provide our Customers effective and efficient Data Leakage Prevention solutions. Read more..

SiteLock

Contact us