The Privacy, Data Protection and Cybersecurity Law Review: Singapore


In 2019 and 2020, Singapore continued to develop its data protection, cybercrime, and cybersecurity regimes. As set out in Singapore's Cyber Landscape 2019 report,2 the government focused on four pillars of strategy to protect the country from cyberthreats and reinforce Singapore's standing as a leading information systems hub. It aimed to: (1) build a resilient infrastructure; (2) create a safer cyberspace environment; (3) develop a vibrant cybersecurity ecosystem; and (4) strengthen international partnerships. The key legal components in this strategy include the Personal Data Protection Act 2012 (PDPA), Singapore's first comprehensive framework established to ensure the protection of personal data, the Computer Misuse Act (CMA) to combat cybercrime and other cyberthreats, and the Cybersecurity Act 2018 (the Cybersecurity Act), which focuses on protecting Singapore's Critical Information Infrastructure (CII) in 11 critical sectors and establishing a comprehensive national cybersecurity framework.

In this chapter, we will outline the key aspects of the PDPA, CMA and the Cybersecurity Act. The chapter will place particular emphasis on the PDPA, including a brief discussion of the key concepts, the obligations imposed on data handlers, and the interplay between technology and the PDPA. Specific regulatory areas such as the protection of minors, financial institutions, employees and electronic marketing will also be considered. International data transfer is particularly pertinent in the increasingly connected world; how Singapore navigates between practical considerations and protection of the data will be briefly examined. We also consider the enforcement of the PDPA in the event of non-compliance.

The year in review

i PDPA developments

There were a number of significant developments related to the PDPA and the Personal Data Protection Commission (PDPC – the body set up to administer and enforce the PDPA) from July 2019 to June 2020.

The PDPC increasingly emphasises the principle of 'accountability' in the context of personal data protection and has provided guidance on how organisations may demonstrate accountability for personal data in their care. On 15 July 2019, the PDPC published the Guide to Accountability under the PDPA and updated the PDPC's Advisory Guidelines to include a section on 'Accountability Obligation' in place of the 'Openness Obligation' under Section 11 of the PDPA (which relates to, among other things, obligations on organisations to make available information about their data protection policies and practices). Other recent guidance includes the second edition of the Model AI Governance Framework, released by the PDPC on 21 January 2020, which outlines an accountability-based framework and guidelines by which organisations can deploy AI solutions responsibly. On 17 July 2019, a new Data Protection Officer (DPO) Competency Framework and Training Roadmap was published to clarify the core competencies and proficiency levels for a DPO.

On 17 July 2019, the PDPC announced that the Infocomm Media Development Authority (IMDA) has been appointed as Singapore's Accountability Agent for the Asia-Pacific Economic Cooperation (APEC) Cross-Border Privacy Rules (CBPR) and Privacy Recognition for Processors (PRP) Systems certifications. With this appointment, organisations can now be certified under the APEC CBPR and PRP Systems for accountable data transfers across borders to other certified organisations. Following this, the PDPC amended the Personal Data Protection Regulations on 2 June 2020 to formally recognise the APEC CBPR System and PRP System certifications as one of the accepted modes for overseas data transfers. The PDPC also entered into a Memorandum of Understanding (MOU) with the Philippines' National Privacy Commission and the Office of the Australian Information Commissioner (OAIC) on 9 September 2019 and 25 March 2020 respectively. The MOUs set out, among other things, a framework for cooperation for the mutual exchange of information and assistance in joint investigations, and the development of compatible mechanisms to facilitate cross-border data flows such as participation in the APEC CBPR System.

In September and October 2019, the PDPC published revisions to a number of guidelines. This includes revisions to the PDPC's Guide to Notification, which outlines best practices for notifying individuals about an organisation's personal data protection policies and practices. The revised guide includes a section on key considerations in developing notifications and new examples, including dynamic consent and just-in-time notifications. The PDPC also revised Chapter 6 on 'Organisations' and Chapter 15 on 'Access and Correction Obligations' of the Advisory Guidelines on Key Concepts in the PDPA, and introduced a new chapter on 'Cloud Services' in the Advisory Guidelines on the PDPA for Selected Topics.

As further discussed in Part X, from 14–28 May 2020, the Ministry of Communications and Information and the PDPC launched an online public consultation on the proposed amendments to the PDPA and related amendments to the Spam Control Act.

ii CMA developments and the Cybersecurity Act

Cybercrime and cybersecurity are regulated under the CMA (formerly known as the Computer Misuse and Cybersecurity Act) and the Cybersecurity Act, both of which are closely linked.

The CMA was amended in 2013 and again in 2017 to strengthen the country's response to national-level cyberthreats. The amendments broadened the scope of the CMA by criminalising certain conduct not already covered by the existing law and enhancing penalties in certain situations (for example, the amended CMA criminalises the use of stolen data to carry out a crime even if the offender did not steal the data himself or herself, and prohibits the use of programs or devices used to facilitate computer crimes, such as malware or code crackers). The amendments also extended the extraterritorial reach of the CMA by covering actions by persons targeting systems that result in, or create a significant risk of, serious harm in Singapore, even if the persons and systems are both located outside Singapore.

In keeping with the government's emphasis on safeguarding critical information infrastructure, the Cybersecurity Act was enacted on 31 August 2018. The Cybersecurity Act creates a framework for the protection of CII against cyberthreats, creates the Commissioner of Cybersecurity with broad powers to administer the Cybersecurity Act, establishes a licensing scheme for providers of certain cybersecurity services, and authorises measures for the prevention, management, and response to cybersecurity incidents in Singapore.

While there have been no significant legislative developments in this area since 2018, cross-border enforcement of the Cybersecurity Act remains a challenging problem, particularly for cloud-based service providers. Singapore has signed MOUs and entered into cooperation arrangements with multiple foreign governments to facilitate international collaboration to address cybersecurity. These MOUs and cooperation arrangements were with Australia, Canada, India, France, Germany, Japan, the Republic of Korea, the Netherlands, New Zealand, the United States and the United Kingdom.

iii Recent developments and regulatory compliance

Although the developments with the CMA and the Cybersecurity Act represent significant milestones in Singapore's overall cybersecurity strategy, the key compliance framework from the perspective of companies and organisations remains at this point with data protection and privacy. The CMA is primarily a criminal statute, and the government has not issued any regulations or guidelines for the CMA. The Cybersecurity Act imposes a number of legal requirements on CII owners and cybersecurity service providers, but until the government issues implementing regulations or advisory guidance regarding these new requirements, organisations' focus will be on the PDPA and its related regulations, subsidiary legislation and advisory guidelines.3

Singapore experienced its most serious data privacy breach yet in July 2018 when hackers infiltrated Singapore Health Services' (SingHealth) databases, compromising the personal data of 1.5 million patients, including the outpatient prescriptions of Prime Minister Lee Hsien Loong. The PDPC fined Integrated Health Information Systems (the IT agency responsible for Singapore's public healthcare sector) S$750,000 and SingHealth S$250,000 for breaching their data protection obligations leading to the breach. Since then, there have been a number of high-profile data breach incidents, as highlighted in Part VII.

Regulatory framework

i Privacy and data protection legislation and standards

The PDPA framework is built around the concepts of consent, purpose and reasonableness. The main concept may be summarised as follows: organisations may collect, use or disclose personal data only with the individual's knowledge and consent (subject to certain exceptions) for a purpose that would be considered appropriate to a reasonable person in the circumstances.

There is no prescribed list of 'personal data'; rather, these are defined broadly as data about an individual, whether or not they are true, who can be identified from that data or in conjunction with other information to which the organisation has or is likely to have access.4 In addition, the PDPA does not distinguish between personal data in its different forms or mediums. Thus, there is no distinction made for personal data that are 'sensitive', or between data that are in electronic or hard copy formats. There are also no ownership rights conferred on personal data to individuals or organisations.5 There are certain exceptions to which the PDPA would apply. Business contact information of an individual generally falls outside the ambit of the PDPA,6 as does personal data that is publicly available.7 In addition, personal data of an individual who has been deceased for over 10 years8 and personal data contained within records for over 100 years is exempt.9

Pursuant to the PDPA, organisations are responsible for personal data in their possession or under their control.10 'Organisations' include individuals in Singapore, whether or not they are residents, local and foreign companies, associations and bodies (incorporated and unincorporated), whether or not they have an office or a place of business in Singapore.11 The PDPA does not apply to public agencies.12 Individuals acting in a personal or domestic capacity, or where they are an employee acting in the course of employment within an organisation, are similarly excluded from the obligations imposed by the PDPA.13

Where an organisation acts in the capacity of a data intermediary, namely an organisation that processes data on another's behalf, it would only be subject to the protection and retention obligations under the PDPA. The organisation that engaged a data intermediary's services remains fully responsible in respect of the data as if it had processed the data on its own.14

There is no requirement to prove harm or injury to establish an offence under the PDPA, although this would be necessary in calculating damages or any other relief to be awarded to the individual in a private civil action against the non-compliant organisation.15

Subsidiary legislation to the PDPA includes implementing regulations relating to the Do Not Call (DNC) Registry,16 enforcement,17 composition of offences,18 requests for access to and correction of personal data and the transfer of personal data outside Singapore.19

There is also sector-specific legislation, such as the Banking Act, the Telecommunications Act and the Private Hospitals and Medical Clinics Act, imposing specific data protection obligations. All organisations will have to comply with PDPA requirements in addition to the existing sector-specific requirements. In the event of any inconsistencies, the provisions of other laws will prevail.20

The PDPC has released various advisory guidelines, as well as sector-specific advisory guidelines for the telecommunications, real estate agency, education, social services and healthcare sectors. The PDPC has also published advisory guidelines on data protection relating to specific topics such as photography, analytics and research, data activities relating to minors and employment. While the advisory guidelines are not legally binding, they provide helpful insight and guidance into problems particular to each sector or area.

ii General obligations for data handlers

The PDPA sets out nine key obligations in relation to how organisations collect, use and disclose personal data, as briefly described below.


An organisation may only collect, use or disclose personal data for purposes to which an individual has consented. Where the individual provided the information voluntarily and it was reasonable in the circumstances, the consent may be presumed. Consent may be withdrawn at any time with reasonable notice.22 The provision of a service or product must not be made conditional upon the provision of consent beyond what is reasonable to provide that product or service.

An organisation may obtain personal data with the consent of the individual from a third party source under certain circumstances. For example, with organisations that operate in a group structure, it is possible for one organisation in the group to obtain consent to the collection, use and disclosure of an individual's personal data for the purposes of the other organisations within the corporate group.23

Purpose limitation24

Organisations are limited to collecting, using or disclosing personal data for purposes that a reasonable person would consider appropriate in the circumstances and for a purpose to which the individual has consented.


Organisations are obliged to notify individuals of their purposes for the collection, use and disclosure of the personal data on or before the collection. The PDPC has also released a guide to notification to assist organisations in providing clearer notifications to consumers on the collection, use and disclosure of personal data that includes suggestions on the layout, language and placement of notifications.26

Access and correction27

Save for certain exceptions, an organisation must, upon request, provide the individual with his or her personal data that the organisation has in its possession or control, and how the said personal data has been or may have been used or disclosed by the organisation during the past year. The organisation may charge a reasonable fee in responding to the access request.

The organisation is also obliged to allow an individual to correct an error or omission in his or her personal data upon request, unless the organisation is satisfied that there are reasonable grounds to deny such a request.28

An organisation should respond to an access or correction request within 30 days, beyond which the organisation should inform the individual in writing of the time frame in which it is able to provide a response to the request.29


An organisation is obliged to make a reasonable effort to ensure that the personal data collected by or on behalf of the organisation is accurate and complete if they are likely to be used to make a decision that affects an individual or are likely to be disclosed to another organisation.


An organisation is obliged to implement reasonable and appropriate security safeguards to protect the personal data in its possession or under its control from unauthorised access or similar risks. As a matter of good practice, organisations are advised to design and organise their security arrangements in accordance with the nature and varying levels of sensitivity of the personal data.32

Retention limitation33

An organisation may not retain the personal data for longer than is reasonable for the purpose for which they were collected, and for no longer than is necessary in respect of its business or legal purposes. Beyond that retention period, organisations should either delete or anonymise their records.

Transfer limitation34

An organisation may not transfer personal data to a country or territory outside Singapore unless it has taken appropriate steps to ensure that the data protection provisions will be complied with, and that the overseas recipient is able to provide a standard of protection that is comparable to the protection under the PDPA (see Section IV).


Previously known as the 'Openness Obligation', under the 'Accountability Obligation', an organisation is taken to be responsible for personal data in its possession or under its control. To that end, it is obliged to designate one or more individuals to be responsible for ensuring the organisation's compliance with the PDPA, implement necessary policies and procedures in compliance with the PDPA, and to ensure that this information is available on request.

iii Technological innovation and privacy law

The PDPC considers that an IP address or a network identifier, such as an International Mobile Equipment Identity number, may not on its own be considered personal data as it simply identifies a particular networked device. However, where IP addresses are combined with other information such as cookies, individuals may be identified via their IP addresses, which would thus be considered personal data.

In relation to organisations collecting data points tied to a specific IP address, for example, to determine the number of unique visitors to a website, the PDPC takes the view that if the individual is not identifiable from the data collected, then the information collected would not be considered personal data. If, on the other hand, an organisation tracks a particular IP address and profiles the websites visited for a period such that the individual becomes identifiable, then the organisation would be found to have collected personal data.

Depending on the purpose for the use of cookies, the PDPA would apply only where cookies collect, use or disclose personal data. Thus, in respect of session cookies that only collect and store technical data, consent is not required.36 Where cookies used for behavioural targeting involve the collection and use of personal data, the individual's consent is required.37 Express consent may not be necessary in all cases; consent may be reflected when an individual has configured his or her browser setting to accept certain cookies but reject others.

If an organisation wishes to use cloud-based solutions that involve the transfer of personal data to another country, consent of the individual may be obtained pursuant to the organisation providing a written summary of the extent to which the transferred personal data will be protected to a standard comparable with the PDPA.38 It is not clear how practicable this would be in practice; a cloud-computing service may adopt multi-tenancy and data commingling architecture to process data for multiple parties. That said, organisations may take various precautions such as opting for cloud providers with the ability to isolate and identify personal data for protection, and ensure they have established platforms with a robust security and governance framework.

As regards social media, one issue arises where personal data are disclosed on social networking platforms and become publicly available. As noted earlier, the collection, use and disclosure of publicly available data is exempt from the requirement to obtain consent. If, however, the individual changes his or her privacy settings so that the personal information is no longer publicly available, the PDPC has adopted the position that, as long as the personal data in question were publicly available at the point of collection, the organisation will be able to use and disclose the same without consent.39

iv Specific regulatory areas


The PDPA does not contain special protection for minors (under 21 years of age).40 However, the Selected Topics Advisory Guidelines note that a minor of 13 years or older typically has sufficient understanding to provide consent on his or her own behalf. Where a minor is below the age of 13, an organisation should obtain consent from the minor's parents or legal guardians on the minor's behalf.41 The Education Guidelines42 provide further guidance on when educational institutions seeking to collect, use or disclose personal data of minors are required to obtain the consent of the parent or legal guardian of the student.

Given the heightened sensitivity surrounding the treatment of minors, the PDPC recommends that organisations ought to take relevant precautions on this issue. Such precautions may include making the terms and conditions easy to understand for minors, placing additional safeguards in respect of personal data of minors and, where feasible, anonymising their personal data before use or disclosure.

Financial institutions

A series of notices issued by the Monetary Authority of Singapore (MAS),43 the country's central bank and financial regulatory authority, require various financial institutions to, among other things:

  1. upon request, provide access as soon as reasonably practicable to personal data in the possession or under the control of the financial institution, which relates to an individual's factual identification data such as full name or alias, identification number, residential address, telephone number, date of birth and nationality; and
  2. correct an error or omission in relation to the categories of personal data set out above upon request by a customer if the financial institution is satisfied that the request is reasonable.

On 5 December 2019, the MAS issued two further Notices: a Notice on Cyber Hygiene44 to licensees and operators of designated payment systems and a Notice on Technology Risk Management45 to operators and settlement institutions of designated payment systems, pursuant to Section 102(1) of the Payment Services Act 2019. They set out, among other things, cybersecurity requirements to protect customer information from unauthorised access or disclosure.

In addition, legislative changes to the Monetary Authority of Singapore Act, aimed at enhancing the effectiveness of the anti-money laundering and the countering of financing of terrorism (AML/CFT) regime of the financial industry in Singapore, came into force on 26 June 2015.

Following the changes, MAS now has the power to share information on financial institutions with its foreign counterparts under their home jurisdiction on AML/CFT issues. MAS may also make AML/CFT supervisory enquiries on behalf of its foreign counterparts. Nonetheless, strong safeguards are in place to prevent abuse and 'fishing expeditions'. In granting requests for information, MAS will only provide assistance for bona fide requests. Any information shared will be proportionate to the specified purpose, and the foreign AML/CFT authority has to undertake not to use the information for any purpose other than the specified purpose, and to maintain the confidentiality of any information obtained.

Electronic marketing

The PDPA contains provisions regarding the establishment of a national DNC Registry and obligations for organisations that send certain kinds of marketing messages to Singapore telephone numbers to comply with these provisions. The PDPA Healthcare Guidelines46 provide further instructions on how the DNC provisions apply to that sector, particularly in relation to the marketing of drugs to patients. In relation to the DNC Registry, the obligations only apply to senders of messages or calls to Singapore numbers, and where the sender is in Singapore when the messages or calls are made, or where the recipient accesses them in Singapore. Where there is a failure to comply with the DNC provisions, fines of up to S$10,000 may be imposed for each offence.


The PDPC provides that organisations should inform employees of the purposes of the collection, use and disclosure of their personal data and obtain their consent.

Employers are not required to obtain employee consent in certain instances. For instance, the collection of employee's personal data for the purpose of managing or terminating the employment relationship does not require the employee's consent, although employers are still required to notify their employees of the purposes for their collection, use and disclosure.47 Examples of managing or terminating an employment relationship can include using the employee's bank account details to issue salaries or monitoring how the employee uses company computer network resources. The PDPA does not prescribe the manner in which employees may be notified of the purposes of the use of their personal data; as such, organisations may decide to inform their employees of these purposes via employment contracts, handbooks or notices on the company intranet.

In addition, collection of employee personal data necessary for 'evaluative purposes', such as to determine the suitability of an individual for employment, neither requires the potential employee to consent to, nor to be notified of, their collection, use or disclosure.48 Other legal obligations, such as to protect confidential information of their employees, will nevertheless continue to apply.49

Section 25 of the PDPA requires an organisation to cease to retain or anonymise documents relating to the personal data of an employee once the retention is no longer necessary.

Considerations for foreign organisations

The PDPA applies to foreign organisations in respect of activities relating to the collection, use and disclosure of personal data in Singapore regardless of their physical presence in Singapore.

Thus, where foreign organisations transfer personal data into Singapore, the data protection provisions would apply in respect of activities involving personal data in Singapore. These obligations imposed under the PDPA may be in addition to any applicable laws in respect of the data activities involving personal data transferred overseas.

Cybersecurity and data breaches

i Data breaches

While the PDPA obliges organisations to protect personal data, it does not currently require organisations to notify authorities in the event of a data breach. However, as noted below, there are proposals to amend the PDPA to introduce a mandatory data breach reporting requirement. In the absence of mandatory data breach requirements, government sector regulators have imposed certain industry-specific reporting obligations. For example, MAS issued a set of notices to financial institutions on 1 July 2014 to direct that all security breaches should be reported to MAS within one hour of discovery.

ii Cybersecurity

Singapore is not a signatory to the Council of Europe's Convention on Cybercrime.

In Singapore, the CMA and the Cybersecurity Act are the key legislations governing cybercrime and cybersecurity. The CMA is primarily focused on defining various cybercrime offences, including criminalising the unauthorised accessing82 or modification of computer material,83 use or interception of a computer service,84 obstruction of use of a computer,85 and unauthorised disclosure of access codes.86

The 2017 amendments to the CMA added the offences of obtaining or making available personal information that the offender believes was obtained through a computer crime87 and using or supplying software or other items to commit or facilitate the commission of a computer crime.88

The Cybersecurity Act greatly expands national cybersecurity protections, including by imposing affirmative reporting, auditing and other obligations on CII owners and by appointing a new Commissioner of Cybersecurity with broad authority, including the power to establish mandatory codes of practice and standards of performance for CII owners.

Under Section 2 of the Cybersecurity Act, 'cybersecurity' is defined as the state in which a computer or system is protected from unauthorised access or attack and, because of that state:

  1. the computer or system continued to be available and operational;
  2. the integrity of the computer or system is maintained; or
  3. the integrity and confidentiality of information stored in, processed by or transmitted through the computer or system is maintained.

CII is defined as computer systems, located at least partly within Singapore, that are necessary for the continuous delivery of an essential service such that the loss of a system would have a debilitating effect on the availability of the essential service in Singapore. The Commissioner will designate those systems that it determines qualify as CII, and will notify the legal owner of such systems in writing. An owner or operator of a system that has been designated as CII must comply with various requirements set forth in the Act, including but not limited to reporting to the Commissioner certain prescribed incidents, establishing mechanisms and processes for detecting cybersecurity threats and incidents, reporting any material changes to the design, configuration, security or operation of the CII, complying with all codes of practice and standards of performance issued by the Commissioner, conducting regular audits of compliance of the CII with the Cybersecurity Act, and participating in cybersecurity exercises as required by the Commissioner.

Under the Cybersecurity Act, however, the Commissioner's authority goes beyond CII. Any organisation, even if it does not own or operate CII, must cooperate with the Commissioner in the investigation of cybersecurity threats and incidents. In furtherance of such investigations, the Commissioner may, among other things, require any person to produce any physical or electronic record or document, and require an organisation to carry out such remedial measures or cease carrying out such activities as the Commissioner may direct. Finally, the Act establishes a licensing regime for providers of (1) services that monitor the cybersecurity levels of other persons' computers or systems; and (2) services that assess, test or evaluate the cybersecurity level of other persons' computers or systems by searching for vulnerabilities in, and compromising, the defences of such systems. Any person who provides a licensable cybersecurity service without a licence will be guilty of an offence.

The Cybersecurity Act represents a move away from sector-based regulation. The Act requires mandatory reporting to the new Commissioner of Cybersecurity of 'any cybersecurity incident' (which is broader than but presumably would also include data breaches) that relates to CII or systems connected with CII. In issuing the bill, the government noted that it had considered sector-based cybersecurity legislation but had concluded that an omnibus law that would establish a common and consistent national framework was the better option. However, sectorial regulators continue to play a part in regulation in this area. For example, in December 2018, MAS launched a S$30 million Cybersecurity Capabilities Grant to enhance cybersecurity capabilities in the financial sector and assist financial institutions in developing local talent in the cybersecurity sector. The IMDA has also formulated Codes of Practice to enhance the cybersecurity preparedness for designated licensees. The Codes are currently imposed on major Internet Service Providers in Singapore for mandatory compliance.


In keeping with its declared strategy, Singapore continues to clarify and enforce its existing data privacy and cybersecurity regime, and future legislative developments appear forthcoming.

From 14 to 28 May 2020, the Ministry of Communications and Information and the PDPC launched a public consultation on proposed amendments to the PDPA and related amendments to the SCA. Notable proposals include:

  1. the introduction of a mandatory breach notification requirement if a data breach results in, or is likely to result in, significant harm to individuals, or is of a significant scale;
  2. the expansion of the definition of 'deemed consent' to allow greater scope for organisations to collect, use or disclose personal data;
  3. the introduction of a 'Legitimate Interests Exception' and a 'Business Improvement Exception' to allow organisations to collect, use or disclose personal data without consent in a wider array of circumstances;
  4. the introduction of a data portability obligation to give individuals greater choice and control in transferring their data to other organisations;
  5. the introduction of new offences relating to egregious mishandling of personal data; and
  6. heavier financial penalties for non-compliance with the PDPA (up to 10 per cent of an organisation's annual gross turnover in Singapore or S$1 million, whichever is higher).

These amendments appear designed to align Singapore's existing data protection regime with international developments, with the aim of strengthening public trust and enhancing organisational accountability.



1 Yuet Ming Tham is a partner at Sidley Austin LLP.

2 See Singapore's Cyber Landscape 2019, Cybersecurity Agency of Singapore, issued on 26 June 2020, available at

3 Government agencies are not covered by the scope of the PDPA.

4 Section 2 of the PDPA.

5 Section 5.30, Advisory Guidelines on Key Concepts in the PDPA (PDPA Key Concepts Guidelines) issued on 23 September 2013 and revised on 2 June 2020.

6 Section 4(5) of the PDPA.

7 Second Schedule Paragraph 1(c); Third Schedule Paragraph 1(c); Fourth Schedule Paragraph 1(d) of the PDPA.

8 Section 4(4)(b) of the PDPA. The protection of personal data of individuals deceased for less than 10 years is limited; only obligations relating to disclosure and protection (Section 24) continue to apply.

9 Section 4(4) of the PDPA.

10 Section 11(2) of the PDPA.

11 Section 2 of the PDPA.

12 Section 4(1)(c) of the PDPA.

13 Sections 4(1)(a) and (b) of the PDPA.

14 Section 4(3) of the PDPA.

15 Section 32 of the PDPA.

16 Personal Data Protection (Do Not Call Registry) Regulations 2013.

17 Personal Data Protection (Enforcement) Regulations 2014.

18 Personal Data Protection (Composition of Offences) Regulations 2013.

19 Personal Data Protection Regulations 2014.

20 Section 4(6)(b) of the PDPA.

21 Sections 13 to 17 of the PDPA.

22 In Section 12.42 of the PDPA Key Concepts Guidelines, the PDPA would consider a withdrawal notice of at least 10 business days from the day on which the organisation receives the withdrawal notice to be reasonable notice. Should an organisation require more time to give effect to a withdrawal notice, it is good practice for the organisation to inform the individual of the time frame under which the withdrawal of consent will take effect.

23 Section 12.32, PDPA Key Concepts Guidelines.

24 Section 18 of the PDPA.

25 Section 20 of the PDPA.

26 PDPC Guide to Notification, issued on 11 September 2014 and revised on 26 September 2019.

27 Sections 21 and 22 of the PDPA.

28 Section 22(6) and Sixth Schedule of the PDPA.

29 Section 15.18, PDPA Key Concepts Guidelines.

30 Section 23 of the PDPA.

31 Section 24 of the PDPA.

32 See discussion in Sections 17.1–17.3, PDPA Key Concepts Guidelines.

33 Section 25 of the PDPA.

34 Section 26 of the PDPA.

35 Sections 11 and 12 of the PDPA.

36 Sections 6.5–6.8, Advisory Guidelines on the PDPA for Selected Topics (PDPA Selected Topics Guidelines), issued on 24 September 2013 and revised on 9 October 2019.

37 Section 6.11, PDPA Selected Topics Guidelines.

38 Section 9(4)(a) of the Personal Data Protection Regulations 2014.

39 Section 12.61, PDPA Key Concepts Guidelines.

40 Section 7.1, PDPA Selected Topics Guidelines.

41 Section 14(4) of the PDPA. See also discussion at Section 7.9 of the PDPA Selected Topics Guidelines.

42 Sections 2.5–2.10, PDPC Advisory Guidelines on the Education Sector (the Education Guidelines), issued 11 September 2014 and revised on 31 August 2018.

43 MAS Notice SFA13-N01 regulating approved trustees; MAS Notice 626 regulating banks; MAS Notice SFA04-N02 regulating capital markets intermediaries; MAS Notice FAA-N06 regulating financial advisers; MAS Notice 824 regulating finance companies; MAS Notice 3001 regulating holders of money-changers' licences and remittance licences; MAS Notice PSOA-N02 regulating holders of stored value facilities; MAS Notice 314 regulating life insurers; MAS Notice 1014 regulating merchant banks; and MAS Notice TCA-N03 regulating trust companies.

44 MAS Notice PSN06.

45 MAS Notice PSN05.

46 Section 6 of the Advisory Guidelines for the Healthcare Sector (PDPC Healthcare Guidelines), issued on 11 September 2014 and revised on 28 March 2017.

47 Paragraph 1(o) Second Schedule, Paragraph 1(j) Third Schedule, and Paragraph 1(s) Fourth Schedule of the PDPA.

48 Paragraph 1(f) Second Schedule, Paragraph 1(f) Third Schedule and Paragraph 1(h) Fourth Schedule of the PDPA.

49 Sections 5.14–5.16 of the PDPA Selected Topics Guidelines.

50 Section 26(1) of the PDPA. The conditions for the transfer of personal data overseas are specified within the Personal Data Protection Regulations 2014 (PDP Regulations).

51 Regulation 9 of the PDP Regulations.

52 Regulation 10 of the PDP Regulations.

53 Regulations 9(3)(a) and 9(4)(a) of the PDP Regulations.

54 Regulation 10A of the PDP Regulations

55 Regulation 9(2)(a) of the PDP Regulations.

56 Section 19.6 of the PDPA Key Concepts Guidelines.

57 Section 9(3)(d) of the PDP Regulations.

58 Section 12(a) of the PDPA.

59 Section 12(b) of the PDPA.

60 Section 12(c) of the PDPA.

61 Section 12(d) of the PDPA.

62 Sections 11(4), 11(5) of the PDPA.

63 Section 4(6) of the PDPA.

64 Second Schedule, Paragraph 1(e) of the PDPA.

65 Third Schedule, Paragraph 1(e) of the PDPA.

66 As discussed earlier, consent is not required if the purpose for the collection, use and disclosure of personal data is for managing or terminating the employment relationship.

67 Section 10(4) of the PDPA.

68 Section 28 of the PDPA.

69 See Sections 28(2) and 29(1) of the PDPA. The PDPC has the power to give directions in relation to review applications made by complainants and contraventions to Parts III to VI of the PDPA.

70 Section 50 of the PDPA. See also Ninth Schedule of the PDPA.

71 Section 29 of the PDPA.

72 Section 55 of the PDPA.

73 Section 56 of the PDPA.

74 Section 52 of the PDPA.

75 Section 53 of the PDPA.

76 Section 35 of the PDPA.

77 Decision Citation: [2019] SGPDPC 33.

78 Decision Citation: [2019] SGPDPC 39.

79 Case No. DP-1903-B3531

80 Section 32 of the PDPA.

81 Advisory Guidelines on Enforcement of the Data Protection Provisions issued by the PDPC on 21 April 2016 at Paragraph 34.3.

82 Sections 3 and 4 of the CMA.

83 Section 5 of the CMA.

84 Section 6 of the CMA.

85 Section 7 of the CMA.

86 Section 8 of the CMA.

87 Section 8A of the CMA.

88 Section 8B of the CMA.

Get unlimited access to all The Law Reviews content