Empowering the digital economy

Data Terminator recently received the ASOCIO Cybersecurity Award 2022

Data Terminator recently received the ASOCIO Cybersecurity Award 2022, in recognition of our contribution to the cybersecurity eco-system in Singapore.

We would like to take this opportunity to thank ASOCIO and SGTech for the recognition of our contribution to the cybersecurity ecosystem,
and also our customers for their trust in engaging us to destroy their data securely with compliance to regulatory requirements like GDPR and PDPA.

Last but not least, a big shout out to the Data Terminator team for their hard work in making this possible!

 

 

Data Terminator has been awarded the Data Protection Trustmark!

Data Terminator has been awarded the Data Protection Trustmark!

The Data Protection Trustmark (DPTM) is a voluntary enterprise-wide certification for organisations to demonstrate accountable data protection practices.

Being certified with the DPTM, our customers can be assured that we have put in place responsible data protection practices and will take better care of your personal data.

 

About Data Terminator

Data Terminator was incorporated in 2007 to provide the best security solutions and services in their classes. It began life as a company specializing in Data Leakage Protection, providing certified equipment and professional services for secure electronic data destruction. DT’s comprehensive range of secure data destruction equipment and services are in compliance to US Department of Defense (DoD) and National Security Agency (NSA) standards.

Its processes are ISO 9001:2015 and ISO 14001: 2015 certified, giving customers the confidence that must be delivered with security and environmentally friendly. Over the years, we have developed in depth other security solutions that help our customers to protect their Data in motion and Data in use as well. This includes the provision of leading Enterprise Fraud Detection solutions, database security and secure communication encryption software across different platforms. DT’s key customers include various Government Ministries, Statutory Boards and MNCs.

GovWare 2022 in Singapore

GovWare Conference and Exhibition is set to return better, stronger and in person, this year, and the Data Terminator team is looking forward to this gathering of great minds with cybersecurity trailblazers, business leaders and policy-makers coming together to address real challenges, discuss the best practices and identify new opportunities.

Data Terminator was incorporated in 2007 to provide the best security solutions and services in their classes. It began life as a company specializing in Data Leakage Protection, providing certified equipment and professional services for secure electronic data destruction. DT’s comprehensive range of secure data destruction equipment and services are in compliance to US Department of Defense (DoD) and National Security Agency (NSA) standards.

Its processes are ISO 9001:2015 and ISO 14001: 2015 certified, giving customers the confidence that must be delivered with security and environmentally friendly. Over the years, we have developed in depth other security solutions that help our customers to protect their Data in motion and Data in use as well. This includes the provision of leading Enterprise Fraud Detection solutions, database security and secure communication encryption software across different platforms. DT’s key customers include various Government Ministries, Statutory Boards and MNCs.

Come to the Sands Expo and Convention Centre in Singapore from the 18th to 20th of October 2022, and visit us at Booth E28.

To register: https://www.govware.sg/

Data Centre World in Singapore

The 8th edition of Data Centre World, Asia’s largest data centre event returns on 12th and 13th October 2022 at the Marina Bay Sands, Singapore.

We, at Data Terminator, are looking forward to being part of this leading cybersecurity event, which has been connecting cyber security professionals and business leaders with experts, solutions and services to explore scalable, secure solutions that anchor businesses in a world of change.

Data Terminator was incorporated in 2007 to provide the best security solutions and services in their classes. It began life as a company specializing in Data Leakage Protection, providing certified equipment and professional services for secure electronic data destruction. DT’s comprehensive range of secure data destruction equipment and services are in compliance to US Department of Defense (DoD) and National Security Agency (NSA) standards.

Its processes are ISO 9001:2015 and ISO 14001: 2015 certified, giving customers the confidence that must be delivered with security and environmentally friendly. Over the years, we have developed in depth other security solutions that help our customers to protect their Data in motion and Data in use as well. This includes the provision of leading Enterprise Fraud Detection solutions, database security and secure communication encryption software across different platforms. DT’s key customers include various Government Ministries, Statutory Boards and MNCs.

Come visit us at Booth #K49 and meet with our cybersecurity experts from across the region!

To register: https://www.datacentreworldasia.com

Data Terminator has been awarded The Cybersecurity Award 2020 – SME (Vendor) category

 

SME (Vendor) DATA TERMINATOR PTE LTD

Data Terminator (DT) plays an important role in Singapore’s cybersecurity eco-system of data protection by providing military-standard equipment and professional services for secure electronic data erasure, destruction and IT asset disposal. With acquired knowledge, experience and a proven track record, Data Terminator will continue to provide cost-effective and efficient data sanitization solutions to our customers. Data Terminator has also derived innovative solutions to meet the demand of highly sensitive organizations that require data sanitization to be carried out at sites with operational constraint.

 

INTERPOL World Event

What is the event about

Fostering Innovation for Global Security Challenges INTERPOL World is a biennial international security trade event owned by INTERPOL – the world’s largest international police organization with 190 member countries. Scheduled to be in Singapore from 14-16 April 2015, INTERPOL Worldwill be held in conjunction with the official opening of the INTERPOL Global Complex for Innovation (IGCI) on 13 April 2015 and the 22nd INTERPOL Asian Regional Conference from 15-17 April 2015.

INTERPOL World provides unprecedented opportunities for security manufacturers and solution-providers to interact with international police organizations, law enforcement agencies and security professionals to identify current and future challenges and offer innovative solutions. It also promotes public-private partnerships to develop and drive security initiatives for real world security situations. Heads of States, Governmental high representatives, Chiefs of Police of INTERPOL’s 190 member countries and at least 450 key decision makers from INTERPOL and law enforcement community will be invited to attend INTERPOL

Supported by Singapore Ministry of Home Affairs and managed by MP International, INTERPOL World will focus on 4 main domains, but not limited to: Cybersecurity, Border Management, Safe Cities and Supply Chain Security. The three-day event will also play host to over 250 international and local exhibitors and 8,000 trade and professional visitors.

Getting to INTERPOL World

Sands Expo and Convention Centre Marina Bay Sands 10 Bayfront Ave Singapore 018970 Located in the heart of Singapore’s central business district, Marina Bay Sands is the ultimate destination for entertainment, business and shopping. The landmark building comprises a luxury hotel, state-of-the-art convention and exhibition facilities, theatres and some of the finest shopping and dining in the region.

Direction

By Car

Car park entrance is located at Sands Expo and Convention Centre via the Bayfront Link (enter from Bayfront Avenue and turn right into covered car park). Valet parking is available at entrance driveways of Hotel Towers 1 and 3, and Casino.

Alternatively, drivers may opt for the Park and Ride scheme where a satellite car park will be operated at Marina South (located on Marina Grove). Under this Park and Ride scheme, for a fixed $10 entry fee, drivers can park their vehicles and board the Marina Bay Sands shuttle bus at the entrance of the car park to travel to the property.

By Mass Rapid Transit

The nearest MRT station is the Bayfront MRT Station (CE2 and Exit B, C, D and E).

By Bus

Bus services to Marina Bay Sands include SBS 97/97E, 106, 133, 502/502A, 518/518A; and Night-rider service: NR1 and NR6 (available on Fridays and Saturdays).

By Taxi

Taxi service is available from the taxi stand situated at the main entrance. Available 24 hours, advance bookings can be made with the taxi companies with a booking fee. Electronic road payment, city area, midnight and peak hour surcharges apply. You can book for a taxi using the following local numbers:

CityCab/Comfort Taxi 65 6552 1111
Premier Taxis 65 6363 6888
Prime Taxi 65 6778 0808
SMRT Taxis 65 6555 8888
Smart Automobile 65 6485 7777
Trans-cab 65 6555 3333
Yellow-Top Taxi 65 6293 5545

RSA Conference 2015 – Asia Pacific & Japa

22 – 24 July, 2015
Marina Bay Sands, Singapore
Visit DT-Asia Group at booths E55 & E80

Conference Tracks

  • Cloud and Data Security

    Data Security covers strategies, practices, and technologies to classify, track and protect data and will cover issues such as compliance, privacy, regulations and big data trends. Cloud Security includes data sovereignty, security architecture in the cloud, cloud security governance, risks, migration issues, and vendor Service Level Agreements (SLAs).

  • Cyber Investigation and Law Enforcement

    This track provides the latest information and practical demonstrations of techniques to address cyber investigation. It covers strategies to enable local law enforcement personnel to collaborate more closely with international police organizations as well as tap global intelligence for tackling high-tech crimes and formulate appropriate cybersecurity policies. Topics covered include identifying and addressing emerging crime threats, fraud, intellectual property theft, environmental and organized crime, analytics and incident response.

  • Governance and Risk Management

    This track provides a business-oriented view and covers the creation and implementation of risk management frameworks, standards, governance, and quantification and management of risk. Sessions will cover how to successfully communicate and enforce policies and standards in the enterprise as well as how organizations measure and calibrate risk as well as exploring people-related issues like social networking/engineering, insider threats and security awareness programs.

  • Mobile Security

    Mobile Security will focus on the policies, processes and technologies for managing employee-owned devices and BYOD programs, smartphone/tablet security and consumerization trends. In this track you’ll find in-depth sessions on mobile malware, mobile application threats, device management and emerging threats to mobile platforms and workers.

  • Security Infrastructure

    This track will cover the architectural and strategic planning considerations for the deployment of security-enabled technologies, including trends in emerging technologies, network and endpoint security, vulnerability assessments, penetration testing , IDS/IPS, physical and embedded device security. In this track you’ll also find the processes, technologies and policies for identity and access management including managing digital identities, their authentication, authorization, roles, and privileges.

  • Sponsor Special Topics

    Listen to a spectrum of experts and security issues delivered and discussed by leading edge companies.

  • Threats and Threat Actors

    These sessions include discussions on the threat landscape, advanced threats, APTs, new classes of vulnerabilities, exploitation techniques, malware, reverse engineering, hacktivism and how to combat these problems. Some sessions will include live demos and code dissection.

Personal Data Protection Act

The purpose of Personal Data Protection Act is to govern the collection, use and disclosure of personal data by organisations in a manner that recognises both the right of individuals to protect their personal data and the need of organisations to collect, use or disclose personal data for purposes that a reasonable person would consider appropriate in the circumstances.
Overview

What is Personal Data?

Personal data refers to data, whether true or not, about an individual who can be identified from that data; or from that data and other information to which the organisation has or is likely to have access. Personal data in Singapore is protected under the Personal Data Protection Act 2012 (PDPA).

What is the Personal Data Protection Act?

The PDPA establishes a data protection law that comprises various rules governing the collection, use, disclosure and care of personal data. It recognises both the rights of individuals to protect their personal data, including rights of access and correction, and the needs of organisations to collect, use or disclose personal data for legitimate and reasonable purposes.

The PDPA provides for the establishment of a national Do Not Call (DNC) Registry. The DNC Registry allows individuals to register their Singapore telephone numbers to opt out of receiving marketing phone calls, mobile text messages such as SMS or MMS, and faxes from organisations.

Objectives of the Personal Data Protection Act

Today, vast amounts of personal data are collected, used and even transferred to third party organisations for a variety of reasons. This trend is expected to grow exponentially as the processing and analysis of large amounts of personal data becomes possible with increasingly sophisticated technology.

With such a trend comes growing concerns from individuals about how their personal data is being used. Hence, a data protection regime to govern the collection, use and disclosure of personal data is necessary to address these concerns and to maintain individuals’ trust in organisations that manage data.

By regulating the flow of personal data among organisations, the PDPA also aims to strengthen and entrench Singapore’s competitiveness and position as a trusted, world-class hub for businesses.

How does the Personal Data Protection Act Work?

The PDPA will ensure a baseline standard of protection for personal data across the economy by complementing sector-specific legislative and regulatory frameworks. This means that organisations will have to comply with the PDPA as well as the common law and other relevant laws that are applied to the specific industry that they belong to, when handling personal data in their possession.

The PDPA takes into account the following concepts:

  • Consent – Organisations may collect, use or disclose personal data only with the individual’s knowledge and consent (with some exceptions);
  • Purpose – Organisations may collect, use or disclose personal data in an appropriate manner for the circumstances, and only if they have informed the individual of purposes for the collection, use or disclosure; and
  • Reasonableness – Organisations may collect, use or disclose personal data only for purposes that would be considered appropriate to a reasonable person in the given circumstances.

Application of the Personal Data Protection Act

The PDPA covers personal data stored in electronic and non-electronic forms.

The data protection provisions in the PDPA (parts III to VI) generally do not apply to:

  • Any individual acting in a personal or domestic basis.
  • Any employee acting in the course of his or her employment with an organisation.
  • Any public agency or an organisation in the course of acting on behalf of a public agency in relation to the collection, use or disclosure of the personal data. You may wish to refer to the Personal Data Protection (Statutory Bodies) Notification 2013 for the list of specified public agencies.
  • Business contact information. This refers to an individual’s name, position name or title, business telephone number, business address, business electronic mail address or business fax number and any other similar information about the individual, not provided by the individual solely for his or her personal purposes.

These rules are intended to be the baseline law which operates as part of the law of Singapore. It does not supersede existing statutes, such as the Banking Act and Insurance Act but will work in conjunction with them and the common law.

When does the Personal Data Protection Act Come into Effect?

The PDPA takes effect in phases starting with the provisions relating to the formation of the PDPC on 2 January 2013. Provisions relating to the DNC Registry came into effect on 2 January 2014 and the main data protection rules on 2 July 2014. This allows time for organisations to review and adopt internal personal data protection policies and practices, to help them comply with the PDPA.

Development of the Personal Data Protection Act

In the development of this law, references were made to the data protection regimes of key jurisdictions that have established comprehensive data protection laws, including the EU, UK, Canada, Hong Kong, Australia and New Zealand, as well as the OECD Guidelines on the Protection of Privacy and Transborder Flow of Personal Data, and the APEC Privacy Framework. These references are helpful for the formulation of a regime for Singapore that is relevant to the needs of individuals and organisations, and takes into account international best practices on data protection.

Three public consultations were conducted since 2011 to seek feedback on the proposed data protection regime. The public consultation sought the public’s views on topics including the coverage of the proposed law, the proposed data management rules and transitional arrangements for organisations to comply with the new law. For more information on the public consultations, please visit the MCI website.

What can we do for you to cope with Personal Data Protection Act?

  •  Degauss onsite using NSA evaluated degaussers which is capable of erasing both longitudinal and perpendicular magnetic disk storage devices with coercivity of up to 5,000 Oersteds
  •  Shredded/crushed onsite by built-for-purpose HDD and SSD shredder/crusher to break it into smaller pieces

Cyber Intelligence Asia 2014

Singapore, Singapore
11th March 2014 – 14th March 2014

Grand Copthorne Waterfront Hotel

392 Havelock Road, Singapore 169663

Tel: +65 6733 0880

After the successful launch of our Cyber Intelligence conferences and exhibitions our Asia show is moving to Singapore. With many governments in Asia looking to share knowledge and gain a better understanding of how to combat cyber attacks in the region, this is the must attend event in Asia to gain the knowledge and meet with the key policy and strategy makers in the regional governments and law enforcement agencies.

With more sophisticated and harder to trace cyber breaches taking place, governments are finding it harder to keep up to date with the hackers, and are continuing to look towards cooperate with the private sector to be one step ahead of the criminals.

Taking place in Singapore, which as a nation has one of the best critical infrastructures in place. Furthermore, Singapore is where many information security firms locate in Asia allowing attendees to opportunity to meet with many global private sector companies to discuss the latest technologies on offer.

Cyber Security is becoming a faster and a more sophisticated market and Cyber Intelligence Asia 2014 will allow attendees to analyse the latest defences on offer with regards to Malware, Data Loss Protection, Password Security, Critical Infrastructure, Digital Forensics, Data Recovery and Data Retrieving.

Cyber Intelligence Asia attracts a global attendance to network and discuss the latest solutions and systems in the market place that is targeted to law enforcement agencies and government’s in the region.

Data Terminator is a trusted brand in Data Leakage and End-of-Life Data Protection. Our processes are ISO 9001:2015 and ISO 14001: 2015 certified. Our mission is to provide our Customers effective and efficient Data Leakage Prevention solutions. Read more..

SiteLock

Contact us