Data Protection in the Practical Context: Strategies and Techniques [1 ed.] 9789811133763

Data Protection in the Practical Context – Strategies and Techniques provides a detailed study of the law, practice and

259 72 121MB

English Pages 364 [203] Year 2017

Report DMCA / Copyright

DOWNLOAD PDF FILE

Table of contents :
Chapter 1 The Context of Protecting Personal Data
Chapter 2 The Practical and Conceptual Framework
Chapter 3 The Concept of Personal Data
Chapter 4 Notification Obligation
Chapter 5 Consent Obligation
Chapter 6 Purpose Limitation Obligation
Chapter 7 Data Protection by Design and Default
Chapter 8 Access and Correction Obligations
Chapter 9 Care of Personal Data
Chapter 10 Transfer Limitation Obligation
Chapter 11 Other Notable Provisions in the European Union
Chapter 12 Looking Ahead
Recommend Papers

Data Protection in the Practical Context: Strategies and Techniques [1 ed.]
 9789811133763

  • 0 0 0
  • Like this paper and download? You can publish your own PDF file online for free in a few minutes! Sign Up
File loading please wait...
Citation preview

MONOGRAPH SERiEsS

Data Protection in the Practical Context Strategies and Techniques Hannah YeeFen Lim

.ERIP

Academyy

Publishing

Academy Publishing is a division of the Singapore

Academy of Law ("the Academy"). The Academy is the promotion and development agency for Singapore's legal industry. Its vision is to make Singapore the legal hub of Asia. It aims to drive legal excellence through developing thought leadership, world-class infrastructure and legal solutions. It does this by building up the intellectual capital of the legal profession by enhancing legal knowledge, raising the international profile of Singapore law, promoting Singapore as a centre for dispute resolution and improving the eficiency of legal practice through the use of technology. More information can be found at www.sal.org.sg.

IN

SINGAPORE ACADEMY OF LAW

IN THE

DATA P R O T E C T I O N PRACTICAL CONTEXT

Strategies and Techniques

MONOGRAPH ABOUT THE

in-depth, compreheensive publish treatises providing issues. legal

The series aims to analysis of c u r r e n t Law

SERIES

of Sales in Singapore (2017) before the Singapore

Courts 1965-2015 Tort of Defamation (2017) Study and Empirical A Comparative Materials (2016) Singapore-Cases & Employment Lawin

Making (2015) Law in Singapore (2015) International Issues in Family

Singapore Law: 50

Juvenile Justice

-

Data Protection Law in SingaporeInterconnected World (2014)

Takes

Privacy

Singapore Law on

Arbitral Awards

Stage (2014) Sovereignty in an

Centre

and

Model Criminal Law for the 21lst Century-A (2012) Industrial Design Law in Singapore

PRACTICAL CONTEXT Strategies and Techniques

Years in the

Where Rehabilitation

DATA PROTECTION IN THE

Code

for

Singapore (2013)

(2011)

Guidelines for the Assessment of General Damages in Personal Injury

Hannah YeeFen Lim BSc, LLB, LLM (Hons) (University of Sydney); Advocate and Solicitor (Singapore); Associate Professor of Business Law,

Cases (2010) An Asian Perspective on Mediation (2009)

Nanyang Business School, Nanyang Technological University

Coroner's Practice in Medical Cases (2008) The Law on Corruption in Singapore - Cases and Materials (2007)

(2007) Confidentiality in Arbitration- How Far Does Life Sciences: Lawand Ethics- Recent Developments in Singapore (2006) It Extend?

Acadenmy

Publishing 2017

Academy Publishing is a division of the Singapore Academy of Law ("SAL

SAL is the promotion and development agency tor Singapore's legal to make Singapore the legal hub of Asia. It aims to drive legal excellence through developing hought lcadership, world-class

industry. Its vision is

infrastructure and legal solutions. It does this by building up the intellectual

capital of the legal profession by enhancing legal knowledge, raising the

Preface

international profile of Singapore law, promoung Singapore as a centre for dispute resolution and improving the efficiency of legal practice through the use of technology. More information can be found at www.sal.org.sg.

DISCLAIMER

Views expressed by the author are not necessarily thOse of Academy Publishing nor SAL. Whilst every effort has been made to ensure that the information

contained in this work is correct, the author, Academy Publishing and SAL disclaim all liability and responsibility for any error or omission in this of publication, and in respect of anything, or the consequences anything, done or omitted to be done by any person in reliance, whether wholly or partially, upon the whole

or

any part of the

contents

of this publication.

on personal data wonder whether a book Some naysayers may infant stage of the is necessary at this relatively protection law in law Singapore. After all, data protection development of personal decisions to date. been less than 30 there have

COPYRIGHT 2016 Hannah YeeFen Lim.

There

Third Impression 2019 Published

by Academy Publishing under exclusive licence.

All rights reserved. No part of this publication may be reproduced, stored in in any form or by any means, whether any retrieval system, or transmitted, electronic or mechanical, including photocopying and recording, without the written permission of the copyright holder. All enquiries seeking such

permission should be addressed

to:

Senior Director, Academy Publishing Singapore Academy of Law 1 Coleman Street #08-06 The Adelphi Singapore 179803

Tel No: (+65) 6332 4388

Fax No:

(+65)

E-mail: [email protected]

ISBN 978-981-11-337%-3

"

789811

"

1337

6333 9747

were

three main drivers for

embarking on this

endeavour. First,

with managing interactions with those tasked through my professional w e r e familiar with that me to they became apparent personal data, it as the personal data protection principles and competent in reciting confident in were less than however, they set out in the legislation, where the principles of those principles, especially the application The n u a n c e s seemed many. other. each with intersected or overlapped where seems to have only small pockets Second, the legal profession in personal data collection, of role the of technology the significance formal disclosure is understood. As a lawyer with storage, use and who and scientist, a as computer qualifications and work experience Australia for 25 years, in law data in protection has practised personal I could offer in this developing area I felt perhaps there was something nexus between personal data close of law in Singapore. Indeed, the not does ring as loudly as it ought to in protection and cybersecurity liabilities arising therefrom also some quarters. The potential risks and individuals. do not seem to be on the radar of many organisations and

the Third, the General Data Protection Regulation was adopted by of a European Parliament in 2016. This is significant piece regulation that will impact organisations in Singapore, not just those engaging in not mere c-commerce, but all organisations with websites that are

Preface passive displays of information will need to take heed of the European requirements. These overseas developments need to be synthesised

and expounded within the Singapore legal context.

This book is an attempt to address some of these issues. This is a modest, first attempt to analyse the personal data protection law in Singapore. It will no doubt grow in the years to come.

I am very grateful to the wonderful team at Academy Publishing for their meticulous editing and typesetting of this book. Special thanks to Bala Shunmugam for his support, encouragement and understanding and to Elizabeth Sheares for the superb final editing of this book and

for her steadfast patience and understanding. Thave endeavoured to state the law as at 28 February 2017. To Him who has given me all things

Hannah YeeFen Lim Ash Wednesday, 1 March 2017

VI

Contents

Page Preface Table of Legislation Table of Tnternational Conventions, Treaties and Reports

Table of Cases Chapter 1 A.

XXxiii

The Context of Protecting Personal Data

Identifying the harms The Erin Andrews case 2

8

Big data 4. Litany of harms Role of information technology in compliance The significance of the European Union legal position

The Practical and Conceptual Framework Chapter2 Scope B. Mandatory requirements

A.

2.

Policies and practices Developing a data protection policy

(a)

C.

1 3

Cybersecurity

3 B. C.

XV

Xxiii

Personal data audit (b) Structure and content Enforcement of rights 1. The Personal Data Protection Commission

(a)

Powers of the Commission

(b) (c)

Dispute resolution powers Review powers

ix

11 17 21 23

28 29 31 31 32 33

35 36 36 36 38 38

Conlenis

Contenis

Page (d) (c) 2.

3. .

Penalties

and

to

direct

decisions made

by the

broad

Appealing the Commission

powers

39

53

Criminal penalties

54 51

(a) Ofences under section (b) Piercing the veil correction (c) Unauthorised access or General penalty (d) Right of private action

Employer liability for employees

54

121

C.

57

59

F. G.

Encouraging compliance Conceptual framework of personal

regime

The Concept of Personal Data

Definition in the legislation

63 64

67

Consent Obligation

Chapter 5

56 56 56

62

B.

120

Position in the European Union

B.

Data intermediaries

A.

Notification of purposes in the online environment

E.

A.

The reasonable person"

Chapter 3

D.

55

D. E.

data

Page

D.

Consent Obligation Excessive consent required Deemed consent Deemed consent for multiple purposes . Deemed consent through action 2. Corollary of deemed consent to disclose Caution on deemed consent . Manner and form of consent

.

Withdrawal of consent Collecting personal data from third parties

G.

Exceptions to the Consent Obligation

67

1.

Evaluative purposes (a) Employment context (b)

123 125

127 132 132

134 136

136 137

138 141 142 145 146 149

"Data and "Information"

68

2.

Format of data

72

3.

To identify an individual

73

.

Personal data: Basic level

76

Personal data: Expanded level 5. Anonymisation of data 1. Receiving anonymised data sets

76

professional settings

83

Business asset transaction

152 155

Publicly available data (a) Definition of publicly available data

159 159

(b) (c)

Presence of restrictions Opening the floodgates

160 161

(d)

2.

2. 3.

85

5.

86

Anonymising data sets

(a)

Anonymisation testing

(b)

A more realistic view of anonymisation

89 93

Insurance Remaining evaluative purposes permitted (c) Managing or terminating an employment relationship Documents produced in business, employment and

149 150

Observable personal data

163

C.

The way forward to anonymising data sets 3. Deceased individuals

105

6.

Solely for artistic or literary purposes

D.

Historical records

106

7.

166 168

E.

Business contact information

107

8.

Research purposes Disclosure for archival or historical purposes

Exceptions of other kinds of personal data

109

9

Conferment of benefits

F.

Chapter 4

Notification Obligation

A.

Introduction

B

Rationales for the Notification Practical considerations

C.

On or before"

a) (b) (c) (d) (e)

111 111

Obligation

Purposes, not activities 2.

102

113 114

115 115

117

B.

Subsidiary purposes

.

Manner and form of notification

118

.

Consequences if personal data is not collected

120

10.

171 172

Private trusts and benefit plan Service for personal or domestic purposes

172

Emergencies Interests of the individual

174 174

Disclosures that provide benefit

176

Remaining exemptions

173

178

H.

Validity of consent of minors in Singapore

181

I.

Some thoughts on consent and exemptions in the Schedules 1. Importance of consent 2. Specific industry sectors

182 182

Impact of the European Union position on consent

188

J.

186

Cones

Contents

Page 1.

2

Directive 95/46/EC under EU General

Consent

Protection

New requirements New requirements for 16 years old

(b)

.

Data

Regulation 2016/679

(a) 3.

minors

under

Union regulations Compliance with European Cookies: Case study of obtaining consent online (a) Cookies on websites (b) Position in Singapore Position in the European Union (c)

(i)

The WP29 Opinion

(ii)

Practical implementations of cookie consent in the European Union

Purpose Limitation Obligation

Chapter 6

Personal Data Protection Commission's views

equivalent to "reasonable"

B.

"Appropriate" is

C.

Assessing the two tests 1.

D.

not

Effect of section 18 on exemptions to consent

Effect of section 18 on exemption to deemed consent 2. The reasonableness test 3. Scope of Purpose Limitation Obligation 1.

Collection, use or disclosure from another

2.

Shortcomings

organisation without consent E.

European Union position 1. Specified, explicit and

(a) (b) (c)

legitimate purposes

188

(a)

Status or significance of some types of personal

191 192

(b)

Personal

(c)

Sensitive personal data

194 198 200 200 202 205 209

Practical examples

239

4.

Data minimisation principle

243

(a)

Data minimisation principle and big data

244

(b)

Data minimisation principle and Internet of

Data Protection by Design and Default

Design 1.

1. 2. 3.

operation of business or organisational practices

Types and amount of personal data collected

xii

249

Access and Correction Obligations

Access Obligation Procedural requirements for Access Obligation 1. 2. Ways in which personal data has been used or

.

B. C.

267 267 270

Prohibitions and exceptions to Access Obligation

271 271 275 281 285 285 289 290 292

(a)

Prohibitions against granting access

(b)

Exceptions to granting access

Right of access- New European Union law

Right to rectification- The Directive New European Union law

Right to rectification

-

270 271

Care of Personal Data

293

Accuracy and completeness of personal data 1. The five factors

293 295

2.

The four aspects

297

3. 4.

Compliance with Accuracy Obligation

298

European Union position

299

Chapter 9

B.

265

disclosed (a) Disclosures to organisations (b) How personal data has been used or disclosed

Correction Obligation European Union position Right of access- The Directive 1. 2. 3. 4.

A.

255 259 260 262 263

Guides Data structures Internet of Things

Chapter 8 A.

237 238

245

Employer/Employee related matters

infrastructure

227 229 234 235

2.

and

B.

214

3.

Chapter 7

2.

254 255

Information technology systems and networked

213

Explicit Legitimate Compatible

data that is unique and

non-changeable

212

219 219 220 222 226

252

data

20

235 237

Specified

Things A.

Page

Protection Consent under EU Data

Protection of personal data 1. The Protection Obligation

301 301

2.

Data protection by design approach

305

3.

Risk assessment

310

Data breach notification - Personal Data Protection

311

251

Commission's Guide

251

(a)

Data breach management plan

312

(b)

Containing the data breach

313

xii

Contents

Page (c) (d) . 6.

Assessing risks and impact

314

data brcach Reporting the the response and recovery Evaluating

315 318

(e) Protection Complying with European Union position (a) Security principle

Personal data breach

(b)

Obligation

320 321 321

noification to

supervisory 322

authority

Personal data breach notification

(c)

to

affected

323 325

individuals Sanctions for non-compliance

(d) C.

Retention Limitation Obligation European Union position Transfer Limitation

Chapter 10 A.

325

Retention of personal data

2.

Personal Data

2.

Protection

Satisfying the Satisfying the

second

331

Obligation

Regulations

second

325 328

2014

requirement: Explicit requirement: "legally

332 situations

enforceable obligations" 3.

B. C.

A.

Assessing the Transfer Limitation Obligation

European Union position EU Data Protection Directive 95/46/EC EU General Data Protection Regulation 2. Asia-Pacific Economic Cooperation Privacy Framework

Chapter

Other Notable Provisions in the European Union

11

Rights object under European Union laws Right to object due to the individual's particular 1. to

Para Children's Online Privacy Protection Act of 1998 15 USC (US)

SS 6501-6505 (2006).

.

. . . .

.

.

336 337 338 338 340 342

16 CFR Pt 312 (US) (2012)

344 345

******************************************************************.****

...5.220, 5.222 Rule 78 Fed Reg 3972 (January 17, 2013) (US) . *************************** .

Computer Misuse and Cybersecurity Act (Cap 50A, 2007 Rev Ed)

.7

Tt....****************************************

9.56

******************************************* .

.

historical research, or statistical purposes Automated decisions and profiling

347

B. C.

Right to erasure

D.

Right to data portability

349 351

Interpretation Act (Cap 1, 2002 Rev Ed) s 48A ********************************************"********************************************************** .. S

O....

...

*

*neo*

*********

******"*****************************

s

Z.0, D. l0,

52

3.1, 3.2, 3.30, 3.48, 3.63, 3.108, 3.123, 5.66, 5.67, 5.69, 5.73,

5.74, 5.83, 5.109, 5.122, 5.147, 5.149, 5.164, 5.169, 5.170, 5.191, 5.192, 8.5, 8.37, 8.40, 9.41, 9.45, 9.47

s 2(1)(c).

**************************

***********"********

*****. 5.80 1.5, 2.3, 2.94, 2.102

s 4(1)(a). ****************************"**************essotes*.**

.*

4.0, D.I49

4(1)(b).. ************************** ****************************°******************* s 4(1)(c). )********************"***************"******************************"*"********************* s

************

357

9.101

***

4.1, 5.5, 7.16, 12.1 **********************.******* ** .s .. . s 2(1). ****** **************** .2.81, 2.86,

347

353

xiv

8.9

Personal Data Protection Act 2012 (Act 26 of 2 0 1 2 ) . . . . 1.1, 2.1, 3.15, 3.25,

s3..**********©*************°****°**************************° .1.4,

Index

5.129

5.129 s 32(1).. ***************************.*************************************************************************

Limitation Act (Cap 163, 1996 Rev Ed)

346

Looking Ahead

5.221

§ 312.5(b)(2) Children's Online Privacy Protection Rule: Final Amendment

yDclsCCuIlY Dul...********************************* Data Protection Act 1998 (c 29) (UK) . . .

New right to object to processing for scientific or

Chapter 12

D.220

Children's Online Privacy Protection Rule

Right to object for purposes of direct marketing

including profiling 3.

333

345

situation

2.

Table of Legislation

*********************************************

XV

*

**

4v

2.3, 2.4

e*... 4.OI, O.0, S.+D 45

Table of Legislation

Table ofLegislation Para

Para ****

********

s

4(4)

***

**

**

...

. . . .

*************

********

s 4(4) (6). *********"*******"** s 4(5)... s 4(0)...

*

****** .

********.

**************** ************************************

*****.*

*********°**

*

******

*************'***

* ********* s 6.. * ********************************** s 11

****

slI(1) .. s 11(2)

***

*********

****.******************************'

******

******

.... **

..2.95, 5.156, 6.34 .

*****

...

********

........ ... . . .

e** ******. **** ***

******************************************'****************

.... '****

*****

************"************'*******

13...

***°*********

s 13(6).... . s 14.....* **

..

.5.9 .0.

) (6)

.........

s21(4)..... 21(5)....

s

*****************°****°*******************

*

***** **

s 14(2)..

**************

14(2)(a)...

..

.0.l4,

.

s

..5.9 ***

15... s

*************************"**********

***************************

s

16(2) *************°*************°**********************

s 16(3) *******************"**** s

16(4) **************

**********

***°********

****

*********

****

*

°***************************

2.1 07, s.17...**************************************** ..............s* *

4.2, 4.6, 5.2, 5.55, 5.6l,

s 17(1) . . *

*eosn****************** *********"**************°************ s 17(2) . *************************"******°****°*************************

s s

18(6).....

*******************************************************************************************

****

******n......

......2.59, 2.104,

.56

4.15, 5.26, 5.34, 6.49, 6.75

s 20(1)(a)......*******e******************°*******°*****°*********** s 20(1) (¢).******************************e******°**** *******.*************°°****°********* s 20(2)

s 20(3)

..4.5, **********************************************************°*********

s 20(3) (a) ************ ...

...3.35, 5.11

4.7, 6.43, 6.48,

.

.4.1 ...4.1 6.49, 6.50 5.9, 6.4

6.48, 4.2,

***

10.1

. . . . . . 10.2

10.2

s 26(2)... s 27...

***********************************************************************************************************

28.

*****************************************************************""********************************

28(1) (a) . 28(1) (6)...

......

***********

********

2.32 2.34

2.35

.

.....

***********

********eso******r

**e*******e*o***e***** 2.36

s 28(2) (a) ***************"***********************************"***************************************°°° 2.35 4» s 28(2) (6).. *********************o******** * .a******o***..*****..* . . . . . . . 2.36 s 4.***************************************** ****************.****. 4 .08 2.38 ***********

s 29(2)...******.***o** .

...

29(2) (d) *********************************"* s 30... ****** **********************************.***********.******.. s

. .....

2.38, 12.4 2.2 Z.8

s 31... * *************************************************"********************* s 31(2).. ************************************** .s .. **********.****.... s

32....... **************************************************************..

s

32(1).... e***********.************°°*****°****

S

Ot

°***********

.**************************************************

*****

2.69 2.70)

...1.17, 2.79, 3.56

. * * . .

33.. **********************.*****************************e**************

Xvii

xvi

*********.o********.*

.

2 , 4.6, 4.18 *****°***°********°*****************°**

....... Z.89, 5.449, 9.98, 9.99, 9.104 ..... J , l 0 , 0 . t 9

..

s 26(3).. ****************************************************************************.*********************** . 10.2

s

s 20......

..

5.50 5.62

s

*****************************

..

26 s 26(1)..

.....5.56

.*so..*..***o*****.

8.52

...

***************"******************"****

.2.105, 3.16, 5.12, 5.18, 6.2, 6.5, 6.16, 6.23, *** 18......s*** 6.25, 6.26, 6.27, 6.28, 6.29, 6.30, 6.34, 6.45, 6.46, 6.47, 6.48, 6.54, 6.58, 6.63, 6.64, 6.66 6.60 **************************************************.************. ....5.12, 6.38, 6.43, 6.51, 6.49 18(a)...... 6.43, ..6.4, ************************ ********************************************

.*...

8.52

8.45,

****°*******************"*****.*****.

**********************************

S40......

* . . . . . . . . 5 . 5 6

s17(3) -.... . . . .

8.45

..... 8.45,

5.47

****5.44

****************************

e********.*****.*****vT9

***.*.....

*************************°**********

.2.106, 4.2, 5.2, 5.26, 5.201, 6.27, 6.30 5 . 2 6 , 5.32, 5.34

.******************************************

15(1).

********

8.50 8 . 4 7 , 8.54 ..************.******"************************** .... 8.47, 8.54 *****************e********************************** s 22(7)...... 9.25 23......... ... s .... .. *****.********************* 9.2, . . . 9 . 2 , 9.26 s 23(a)... ***********'************** ****** -. 9.2, 9.26 s 23(6) . . . ***************"*****.. 2.89, 9.29, 9.40, 9.75 s .**********************************

.

....5.35, 5.36 s 15(2) . ********************************************************* 5.60, 5.190) .5.43, S 16(1) ......... . . **********************************v

22(3)...

8.45 2.36, 8.45

8.5,

***.****

**

**********************

... 22(6)....

*******************************************************************************

*****.****.

*****

22(4)..... )............. o.. ... eo************************************************* s 22(5)..... .* **********************************************************.. 8.45, 8.46,

s......5.12

3.I7,

**********°******************

******

. . 2.36, 2.37, 2.108, 8.4, 8.78, 9.3

***********************************

22(2) (6)...

3.18, 5.19, 5.21, 5.22, 5.210 ********..10 s14(2)(b) .10, 5.14, 5.19 ... s14(3)..*****'** °*** *********"***************************************************** *****.** *..5 v ..7 l s 14(4) S

8.20

8.29 8.21, 8.40 ... 8.20 8.22 8.20, 3, *********** 8.23 * * * * * . * * * * * * * * . 8.20,

****************

***********"*************

22(2)..*******************

2

..

8.20 8.20

.. 8.10, 8.21,

s 22(2) (a)..

..0.20

*****************

******************"******************************"""*******************

*********************°*****°**************

************************°*** 22. s 22(1)...

7 ......5.34 54

14(1)(a)..

s 21(3) (e).

.O.8

*****~*'

***********"**************""*****************°**

***********************************

°****°°****************

°***

8.31

**********"******"*******************°*****°****"*********************** ....

.2

******"************ * . ****"** ** s 1 4 ( 1 ) . . . . .******************""********************'*******************"** .

s

*************"******************"****°****°***

.2.12

...

*

******************

*************************"***********************

*

************************

*

*********************************************

****"**************************************************

8.7

,8.16

****************"'**

*******************"*****.******************************

**

*****************************°*****°********

s 13().

***

..........

***..

Vv

O. ****************"*************

******"*****"****"*********

21(3). s 21(3)(a). s 21 (3)(b).. s 21(3)(c). 21 (3)(d) .. s

.......2.59, 2.106, 5.51

**************************************

s

21 (1) (a)... s 21(1)6)... s 21(2)...

.

*********""*****"****************************°**

12(6).. 12()... s 12(d) *****

4.3

2.35, 2.36, 2.108, 8.4 .. ... .. . .. 4 l . .****************************************"************************************************ . 8.15 ....

********************"*************************"***********

*****. . 2 . 5 9 , 2.95

****

****

4.11, 5.84

. . T.o,,6.89

*******.*.******

. . .

. .

*********

***

*******

.**

****

..

20(4) (b)..

........

**

.

s

.......

20(t)()....

.O.36

2.5 **************************************************** 2 . 1 0 , 2.11 s 11(3) . . * *** **** 2.10, 2.11 11(4) ********** ******** * * * * * * * * * * * ** *** . 2 . 1 ] , 8.9 ** .*** s 11(5) *************************'** ****************'***************** . . . . . . . . .. . . 2 . 1 2 s 12() ***° .12 ****************** ******* 4.. ************* . s *****

4.2, 4.3,

.

**

*******************

***********************************

...2.8, 2.9 ********"****************** .9 s.2.9

**

. .

s

20(3) (b)... ******* 20(4).**

.....

******************"***********

s 4(6) (a).. 4(6) (6)

s

.. 4.2, 4.6, 5.55

3. 120

3.115 *****"*********************************** .. ....2. 2.I03, 3.122, 5.99

****************************

******************...

************* **********.

.1b

2.69

. . . 2.69

Table of Legislation

Table of Legislation Para

Para ***************************************"*********************** *************"*****"'**********************************. ******* .......

s 34(2)... 34(3)

s

*

*

2.69 **

...

.

*

*****'****

***************°******************

s 35..

***""**************

s 35(1)..

*******"**

s 35(4)..

*************

**************4.

***

..2.84 .2.84

...

2.29, 2.30 ******************************************* .2. 2.29

**************

..

***

..

***************************

***********.

*************************

*********

****

***

s 50(2).. s50(3)

.

****************

*************************

*****************"*******

..2.69

2.70

s.......

******"'**********************'***

***** ****************

s 50(1) *************

.

*******************************.

******************

******************************************

s 48(1).. ss 48(2)-48(3). s50.

...

*******************

**************************.

°**

.70

.

*.........

2.31|

**********************.iis..2.31

****************

........

5,99

*********"**.

para 1 (p) (ii).

...................

*****************************************.

.2.72

****°"***************'**

2./76

.

s51.

******************************

**

s51(1).. s51(2).. s51(3)(@) s 51(3)(6) s51(3)().

**

..

********************************************

**********

***

*************4. 6

****.

***************************

*******'**

***************

*************************'***

.

*******************.....*****. ***

********

*****..

....

*****************************

para

3(2) (a).

***

**

.2.74

2 . / 2 , 2.74

*******************'"*****°*******

* * * e *

e.... o s ************************"*********

'************************************

..

2./5

******************************

s 52(1).... s 52(2)

**

52(3)

*******************************************"***********************

5.983

*******************.

5.106

para 3(3).

.

5.106

para 3(3) (a)...

5.106

********************"***

5.10D6 para 3(3) (6) *************e**********************"*************************"******** ******************************

*******************************************""*****°********************.

********

*************************************°***

s 53(1).. s 53(2)..

**

*******. ..2./

e...........

**********

* .

**********************************°***************************************

*********************************

54...*********************.***************

2.75

.2.75 7.22 81

*****

***********"*********************************4.

*********************

********************°****************************

**

************

*

......2.

**********°***************os***.....

. .

para

***************"***************************************************"************ para. para

3(4)

Third Sched..

*************************************************************

**********

***************.***************°*****

************************.****************************************

para 1(b). para 1(c)...

para l (d). '**

***********************************************************************

1(e)..

******************************.*****

...5.66, 5.73, 5.148, 5.189,

para1 ) .****************************************************** ..

2.79

*************************************************************************..

5.64, 5.65, 5.95, 5.96, 5.97, 5.145, 5.166, 5.186, 5.204, 6.4, 6.50, 6.58, 9.103, 12.1 )****************************************************************************************** .5.153

para 1(6) ... ****************************************************°°********************* 5 . 1 5 2 .5.1008, 6.26, 9.103 para 1 (). ********************************°****°°***************°**

.167

*** eson*a*ene*ntssvs. para I (4)... 5.168, 5.189 **.***+o*****.**ts*s**seostsssso*****.********.********s************** para I(e)... ************************************************************** ..5.66, 5.69, 5.148, 5.189, para 1(). 5.191, 5.192, 6.28, 6.51 . 1 2 8 , 6.51 *****'***************************************************.

para l(g).. para 1(h)..

************°****°******************************°**°°****°°****************

5.172 ***************.******es*n*******************e********o***************************

para 1().******************************************************************************** 5.173 ..5.173 para I ( )************************************************************************************* .. para 1(k) ....

5.146, 5.192

para 1(). ******************************************** 5.151 ..5.150, para 1(m) ********************.** *******************e*********** 5.189 5.89, para 1(n) .. 6.58 para I(o).. 6.51, 6.28, ******************************************* ..A11, 5.89, 5.189, ************************************o**************************e********e*********

5.173

****************.

para 1(g. para 1(h)... para 1( ) . .

******************************************.***

para1). para 2

******°***

***

******

5.173

.

5.139

5.57,

e***************************************************

5.5 ,5.85, 5.89, 5.95,

5.98, 5.99, 5.102, 5.128, 5.172, 5.173, 5.189, 5.192, 6.28, 6.51, 6.58

**********************************°**********

*******"**********

5.139

5.58, 5.94, 5.95 . para 3.. . Fourth Sched....*********************************** . 1.5, 2.107, 4.2, 4.6, 4.11, 5.2, 5.9, 5.55, 5.56, 5.57, 5.58, 5.60, 5.61, 5.63, 5.64, 5.65, 5.97, 5.145, 5.160, 5.166, 5.186, 5.204, 6.4, 6.50, 9.103, 12.1 **********************************************************************°

. 5.158, 5 . 1 5 2 , 5.161, 5.162, para 1(c)... ********************************°********°********************** .5.162, 5.163, para I ............... ********************************************************** . 5.108, 6.26, 8.27, para I(e) **************************.********s**s*.***** ....5.167,

para1(a). para 1(6).

********

.

*..****************

10.110 10.10 10.10 9.103 10.10

para 1 ()

. ..5.168, 5.189 .5.164, 5.174 para 1(g). ***************************'******°*********************°*******"************** .5.66, 5.74, 5.148, 5.189, para I(h).. ***********t*********************************** 5.191, 5.192, 6.28, 6.51

para1(i).************°********************************°****************.*******************. 5.173 para 1 )******************************************************************************************** .. 5.173 para 1(k). *********************************************************************************

para 1().********************************************************************************* 5.174 para I (m).*************************

***********************************************************"**************°******* 5 . 1 7 3

.

5.191, 5.192, 6.28, 6.51

*********************************************

2..77

******************************************************************************4.

XVil

1.5, 2.107, 4.2, 4.6, 4.11, 5.2, 5.9, 5.55, 5.56, 5.60, 5.61, 5.63, 5.64, 5.65, 5.145, 12.1 5.166, 5. 186, 5.204, 6.4, 6.50, 9.103, ... 5.153, 10.10 ...5.152, 10.10 . 5.108, 6.26, 9.103 *****************************************°"****** 5.167, 10.10 ...5.168, 5.189 **********************e***********

..

*************

*******************************

para 1(a)

para

***** 5.106

..5.58, 5.96

******************

.Z.

******************************************************************************42.87 0T s 67(2).... Pt IV (ss 13-20)... 5.77 PtV (ss 21-22)... 5.77, 9.1, 10.1 Pt VI (ss 23-26).. *************************************************.***. ...5, 2.107, 4.2, 4.6, 4.11, 5.2, 5.9, Second Sched ... a .....sso . eo***************** 5.55, 5.56, 5.57, 5.58, 5.60, 5.61, 5.63,

para

**

2./5

************°*********************************'******

s 52(4) .. s 53..

......

*****************.

**************************************

s

973

************.os*

1 73

*********

*****************************************

para 3(2) (6)

2.72

****e*s...2.

*******

s 51(5)....

s

*

...

****************************************

5

******"*************"

...

.

s51(4) . . .

s

..2.73

*****************

***"***************"****************

***** *****

***

5.57, 5.58, 5.96 *** para I(7).... 5.1 72 * ******* para 2. . . *********.... 3.99 para *********************************************************"********************* .5.102 ******************************"***************************°****************

para 1(9)..

* * * *

***********************

******************

************'*************"************************

para i(n) . para I (o).

*****°**********************************************.****

5.174 ***********************************************************************************"" 5.174 ************essstsseeessestose*i*************************************** 5.161, 10.10

para 1(p)(i)... ************************************************************************************ 5.99 para I() ****************************************.*******************************.*******. 5.139 v

xix

Table of Legislation

Table of Legislatiom

Para 5.144 . .....5.57, 5.58, 5.85, 5.89, 5.95, ** 5.128, 5.146, 5.172, 5.173, 5.189, 5.192. 6.28, 6.51, 6.58

I(7) para l(I).

para

******""*** ***********"*******

***.

****

para z

********

* *

*********

***************

************* para para 3(2) para 3(2) (b) . . .

.......

*************

***...99

****************d.102

*****************************

..5.98

*****°**** * . . . . 5 . l 0 6

******'*************

5.100 ****.... 139

.

*******

****

*******

** ****

para 4 para (e)....... ...

******

**

*****************

*****

.............

.***************"*******"****

**********************************************

.

para Fifth Sched...

. . 8 . 3 1 , 8.35,

****************.******""**********

***

3.140

..5.58, 5.94, 5.95 *** 8.37, 8.40, 8.47, 12.1

......8.37

*

. .............. . **** ********* *.* .8.35 para 1(6). . *****************....O.35 *********************** . (C) para ********* .. ... ... ***** ***** ***.........8.35 para 1(d)... * *************** ..8.35 35 i para (e) . . ***** ************************"°************* ******"** . ......8.235 para 1 ) . . . . .......8.35 35 ******* ********************* para I(g) **** .Ö.35. *************"*". ****"*******************""*** para 1(h)..... 8.35 **********"******"*******************************d para I(2). . .. 8.41 * * * * *********************** para 1) (1).. ...8.11, 8.30, 8.42 para I() (11).. 8.43 ****~****** ******************* para 1) (ii) *********"******°**** 8.44 para 1) (iv) . . 8 . 1 1 , 8.44 para 1() (v) . . 8 . 4 7 , 12.1 **** *** Sixth Sched.....*********************************°** ******....8.47 paras 1(a)-1(e).. 54 .v I ******************************"*** ******* para l(a). .******s******** ....2.31, 2.40 Ninth Sched..... Personal Data Protection (Enforcement) ..2.31 Regulations 2014 (S 455/2014). para

********************************************************

I(a) .....

1 0 . 5

**

reg 9(2)..

****.**********"*********

reg 9(3)(a) reg 9(3) (6)

TC8 D I T )

**

****

.7

.**..

...

reg 9(3))..... *******"********* reg 9(3)(g9... ******* reg 9(4) (a)... reg 9(4) (6)

..

.***.*......

0.10,

..

**************

..

****

*******************************°'**

**

*********

**

*******

***

****

.

**

*****************************

...

reg 9(4) ( ) . . . .

************************

.

...

*************************"****°******************************.

*************************************

*****************°***************************

*****************************************"****"**********************.

Personal Data Protection Regulations 2014 (S 362/2014) . . . reg 2. reg 3(1) . .

.*.

..

**

****

..8.48

****************************"*"**********

*************************** ..8.8

******"**********************************************

reg o[2){).... . . eg 3(2) (b) **.****** .

reg 4 *************°*****°*** ..

. .

.

**

+**********

. * .

*.

5.9

********************

*.

*******************************************************************

T

T){).

reg 10(1)(a)

.

10.14

. . . 10.144

10.15

.Ld

.***.*.***.******e**.*** 10.15

*****.******.*.*.**.

.

*************************************************

***********°****

reg 10(2) (6) . . . . ********.*

10.14 *******"****

reg 10(3) (6) (i) . .

*.*********.

***********************

***

************

*******.. 10.141

10.16

.o**

************************************

.***********************

.

reg 8 . . . .

reg9(1).. ******.*********°*°****°°****°.****°.

XX

10.15

****** *

10.15

.

10.155

******.**.****.*****.** **°°****°**** 5 . 1 3 0

s 4(2) (c) . ..... 5.130 s 5(3). ******************* 6.54 Sch 1 cl 4.4 *************************** **** ***°°°*****°°°° **°*********************** 6.55, 6.62 cl 4.4.1 *********************************************************"*****°*************** ....... 6.56, 6.58 ***************************************************************************************************

****°.****************.***********

****°°***°°**.

Privacy Act 1988 (Act No 119 of 1988) (Cth) s 6C......

************°°****°**** ***. 2.3

s 6D.. ********"*******************"****************************** Private Hospitals and Medical Clinics Act (Cap 248, 1999 Rev Ed)... *******************°***************.

5.9

..8.110

l 0 . 5

10.10, 1 0 . 4 , 10.8, 10.9, *****************°**** 10.12, 10.13, 10.17, 10.20

10.4, ***************************************************

.

10.15

(SC 2000, c 5) (Canada)

s 4(1)(a)..************************

**************************** so...i*..0.1t, 8.29 .2.36, 8.48

reg 9(1) (a).. ************************°°******************.******************

Teg9(1)(6)

**

.

Personal Information Protection and Electronic Document Act

. . 8 . 1 2 , 8.48

***********************************************°******

10.16

..**************e*******.****.

8 . 1 3

reg 7(4)...

10.16

10.16

*****

reg 10(4)()....

reg ****************°***°*******************"******************e******************** reg /.. ***********************************************

.

**********

**********

.0.10

******************°*********************************

****

10(3) (6) (11).. .... ...... ... 10(3) (6) (i1l) .. . ************* 10(3)(C).... .. ... .. . 10(4)(a) ..... ... o******************* 10(4) (6) ...

.8.9

******************************************

reg 4(1). ************* ************************* reg 4(2) **********************************"** *** * IC

3 ,8.8, 10.4, 10.18

I U.7 , 10.2

*******'******************************'***********

reg 10(1)()....... reg 10(1) (6)

reg

0.12

1 0 . 7

******************°

reg reg reg reg

T0.TT

U

*****e*****

* * .

*****'********

U

10.12

****"*****"***************************************

****

*v

.*

**

***

************************.*********************

reg (O){)..

reg

****"

***

********

...........

****

reg 9(3) (d)...

reg

****

******************************************

****""****".*****"****"***

**********""*********************************

**********************

**********************

para 3(4).. .

***

******

****

*************************

para 3(3)

5.l63

*********

*

*

****'*****

Para

......

****

******************************

10.4 10.13, 10.20 Xxi

**********.. 2.6

**********. **** . 174

Table of lnternational Conventions,

Treaties

and Reports

Para Commission) Article 29 Data Protection Working Party (European EU Approach to (WP37) Privacy on the Internet- An Integrated November 2000).... On-line Data Protection (adopted on 21 4/2007 on the Concept of Personal Data

3.37, 3.45

(WP136) Opinion

(adopted on 20June 2007) P6...

10.

... 3.8

***********************************"**************************************************************

***********************************************************************e*3 . 7 , 3.10

3.21 3.24

************************************ ..3.37, 3.45 *******"********************************* *************************************** pp 16-17... (WP194) Opinion 04/2012 on Cookie Consent Exemption 13..

...

. .

......

(adopted on 7June 2012) pp 6-7....

5.251 ***********e***oseeooe*****************************************

5.249

PP 6-9....

5.250, 5.251 ..**.ossasennos******************************************"******************

P6.

P...***s*.*..

..

. . 3.252, 5.253, 5.254, 5.2555

.

....5.260, 5.262

pp 8-9.........

p8..

.

******************************************************

P9..*.

5.256, 5.257, 5.258, 5.259 5.261

************nsssore*****n*oso**********************************************************"*"*****

(WP203) Opinion 03/2013 on Purpose Limitation

6.72 (adopted on 2 April 2013) . .... 6.765 ************************************************************"*******"********************* P 12. eo..**..**ao**oes*********o*sross**************

p l5... **********o*o******************e*************************************************************** 6.76 ******************* .. 6.77, 6.78, 6.79 p l7..... P 10...

****

6 . 8 0

p 20.. p21.******************************************************************

....6.82, 6.83 ************************ ...6.85, 6.86

*********************************************************************************************

xxiii

Table of International Conventions, Treales and Reports

p 51..

***************************

..

***************

...

6.89

******************************************************

P

p 53....

...

************************. s.....

pp 54-55.

***sos

**********************************************"******"***********

p 54.

.6.90

*******************************************..

*****

******************** ** ** *" * * * * * * * * * * *********************.***

**************************************

*********"**

Pp 56-70...

....

***********

********.

**************

******************************************************

0.91

6.92 .6.95

..6.93,6.94 .....

P .. *****************************.**..0.95 ........ p 60 example 7 . *************************** ..... 15 6.95 p 66 example ***************************************************************** . J0..

*****************************************************

**********'******

.6.87 .0,8. ...6.87, 6.93

Annex 3..

Annex 1.....

*****************

*****************************************"*******

Techniques

Anonymisation (WP216) Opinion 05/2014 on on 10 April 2014). (adopted **************************************************************************

3.83 3.83 ..3.86, 3.87, 3.88 3.84 .3.89 3.87 ......

**************************************"*

p ....*******

********************************************

***

******'**************

PP - / . . . P

*s************************************'***

p

.

*******************************...

*******************************************"****"*******************

Pp 11-12...

Pll......

*

889

****"***************

********************"******************************

pp 12-19.. p 12..

s*sens.....

**************************************************************ssisss...

*

*****************"************"*********************************

PP 13-14..

*********************************°**************************.

******************************°******* p 13.......******************************"**** ******************************************************. Pp 1 4 - 1 5 . .

P ************* p l6....

*************************

ssssn..

**********************************************

P lo..

********

....***********************'************

91 ...3.99 *. .100 3.91

..

**********3.96, 3.101 3.108

****************'****************"***********"***************.

****************************************"**** pp 23-24.. p

3.90

....

**********""******""*********'******************************************

.3.85, 3.104 ..3.83, 3.98, 3.104

****"*****************.

**************'********************************************************.

Pp 24-25...

. *

** *********************************************i 97 ********"**********"************************************** D.9T p 24...... .* on the (WP221) Statement Impact of the Development of Big Data on the Protection of Individuals With Regard To the Processing of their Personal Data in the EU

(adopted on 16 September 2014). **************"******"**"°°******"***********. 6.100 ...6.100, 6.101, 6.102 p2. .

.7.43

PP 16-19..

******************************************************************************************.

p 1 .*****"******"************************* ... ******

************************************** ..6.104, 6.105

6.105 PP 18-19... P

***************

P 19....

.6.107

*********"**************** *******

**

**********************"****"********

****************** .106 ******************** ..6.108

p 22

..6.109 * * ******************nnuosnn. . . . . . ...0.1 (WP238) Opinion 01/2016 on he EU-US Privacy Shield Draft Adequacy Decision (adopted on 13 April 2016).. ****************°*****************. .10.23 Asia-Pacific Economic Cooperation P'rivacy ...10.31 Framework... . p17********************************"********************************** *************************** .183

Charter of Fundamental

Rights of the European

Union

(2010) OJC 83 (2010) Art 8 para l.**************************************************************°******************* ..1.68

the Committee

Economic

of theRegions for

framework

European Parliament, and thc ( C O M / 2 0 1 1 / 0 9 4 2 final-2012) and

Social Committee

in the

trust building services

A coherent e - c o m m e r c e and Market for January 2012)

Digital Single

online

l1

(adopted********************************************************************************.

. .

.217

0.2.

2000 pursuant to I.. Decision 200075207 EC of 26July Parliament and of thec Commission 95/46/ECof the European the Directive of the protection provided by asked Council on the adequacy and related frequently principles safe harbour privacy of Commerce the US Department fn

qucstions issued by

*****************************************************************************

0.22

O4

2000] OJ L 215/7..

too 20 December 2001 pursuant Decision 2002/2/EC of Commission Parliament and of the the of European Directive 95/46/EC data provided by protection of personal Council on the adequate Electronic Information Protection and Canacdian Personal

the . **************.*s Documents Act [2002J OJ L002/13.. Decision (C(2016) 4176 final) of Implemening Commission to Directive 95/46/EC of the 12July 201l6P apursuant on the adequacy r l i a m e t and of the Council European the EU-US Privacy S h i e l d . . . . by provided the protection of on No 44/2001 of 22 December 2000 Council Regulation (EC) the recognition and enforcement of judgments and jurisdiction matters (OJ 2001 L 12, p 1) in civil and commercial Art 15(1)(C) Art

10.22

10.23

1 . l7 . 5

******""******************************************************

****************

J)...*********************************************************************************n********

Rules

Cross Border Privacy For Accountability

"******************"*******"*********************************

Agents..

********************************************************.**

***o***************************senesons********************..*.

For blUSinness

..

1.75 10.332

10.32 0.09

Parliament and of the Directive 95/46/EC of the European of individuals Council of 24 October 1995 on the protection with regard to the processing of personal data and on the frce movement of such data |1995] OJL 281/31.....

1.68, 1.69, 1.70, 1.77, 3.1, 3.3, 5.196, 5.205, 5.207, 5.247, 7.20, 8.56, 8.61, 8.63, 9.24, 9.85, 10.24, 11.3, 11.9, 11.18 .3.31, 3.32, 3.47, 3.86

Recital 26.. . Recital 2 8 . . .

6.775

*.***.******************************************************************* *************************************"""************************************** 8.60, 8.65, 8.72 Recital 41. Art

5.196 ************************************************************************************************

*************************************************************** .5.197, 6.85

Art 2(b).

Art 2(h).

Art 6... Art 6(1) (b)

*

************************************************************************************* 5.199

. 4.31 .o.. **.****.***************************************************************** **************************.... . 4.31, 5.197, 5.201, 6.53, 6.69, 6.73, 6.75

Art 6(1) (c)...

Art 6(1)(d) . .

.... 5.198, 6.70, 6.75

.

***********************************************************************************. 9.22

Art 6(1)(e) ****************

°********

**************************************************** 9.l07

Art 7....*****o*oo**o********n*****i***********************o****** 5.182, 6.82, 6.101 Art 7(a)...**************************** *********************"**************************.5.199, 5.201 Arts 7(b)-7(),.... ************"*************************************************************************** 5.199 Art 7(e)..

......*************

*************************************************** tL

Art 7(1). XXIV

Reports

to the

Communication

Commission Council, the

*ssssssssss***sss**sene*****************************************.

(WP223) Opinion 8/2014 on the Recent Developments on the Internet of Things (adopted on 16 September 2014) ...6.103, 7.43

and

Para

Para ...6.88, 6.89

s*s.

************

******

*********"****

Treaties Table ofInlernalional Conventions,

I1.4 XXV

Table of International Conventions,

Trealies and Reports

Table ofInlernational Conventions,

Treaties and Reportds Para

Para

******************************************************************

Art

...5.182,6.101 5.199,5.201 ...8.56, 8.62

***********************************************......

Art 8(1)... ***********************************************'*****"**** *****************

Art

Art 12(a).

....

**

********

**************************************************************** .8.57, 8.58,

8.59, 8.69

****************~ ..8.62, 8.71, 8.74, 8.75, 8.77, 8

Art

12(b).. **************************

Art

12(c).* . ***************************************************************************.

.

Art

...).

**********************************************************

Arts 13(1)(a)-13(1)(g)..

78

8.62, 8.76

..5.200, 8.56

************.**********************************************************

Art 13(1)...

*******************

************.

8.56 .8.56

.....

*********************************************

******************************** ****************

8.62

Art 14... ..... ****************"******* Il.4 Art 14(a).*****************************************************"****************. .. sssosssaas.l1,6 Art 14(b)... ***********************************************************.* . ***************************** l1,10 Art 15(1) . o984 Art 17. ..... ** 9.84 *************************'************************

**********************"********************"**********

***"**********.*.....

...

.

***************

***

.s*e*s***********************************

*******************************************************

.

Art 17(1)..*********************************************************************** 0 2 1 Art 25(1).*************************************************************** 10.21 Art 25(6).. . 0.18, 10.28 .*******************************************************************. .... 10.25 Art 26(2).

paras 2.65-2.66... **************************************************.

****************"**

***************************************************.

Parliament and of the 2002/58/EC of the European of of 12 July 2002 concerning the processing the protection of privacy in the and data personal electronic communications sector (Directive on privacy

Directive

para

Art 5(3)

ingapore link", which

eant

that the regime would only apply if the personal data was collected from an individual physically present in Singapore, or the

either

data was located in Singapore at the time of collection, or the

organisation used the data in Singapore, or the data was disclosed in Singapore. The final form of the legislation dropped this requirement rendering the regime more effective as it deters those who might

attempt to avoid compliance by shifting or outsourcing collection or use of data overseas. This stance of extratenitorial reach is consistent with other legislation in Singapore, such as the Computer Misuse and Cybersecurity Act" although realistically, for an organisation that has no presence in Singapore, it may be difficult for any claim to be made against it.

2.8 One of the most important points to note is that the personal data protection regime will operate concurrently with other legislative and regulatory frameworks, so organisations in those sectors that have sector specific requirements need to continue to comply with them. Section 4(6) (a) specifically states that nothing in the personal data

protection principles enshrined in the Act "shall affect any authority,

12

Privacy Act 1988 (Act No 119 of 1998) (Cth) s 6D. See also Yee Fen Lim, Cyberspace Law: Commentaries and Materials (Oxford University Press,

13

Computer Misuse and Cybersecurity Act (Cap 50A, 2007 Rev Ed) s 11.

2nd Ed, 2007) at pp 194-195.

30

to be 2.10 at least o n e person are required to designate Act All organisations the with that the organisation complies responsible for ensuring officer ("DPO") for this personal data protection but there is no need For sole officer (or limited to only o n e person). dedicated a to be be the sole trader.7 traders, the DPO may well

2.11 The DP0

organisations, there is

for many be from within the organisation and, if the counsel, either filled legal the role may often be by for human resources.s There is someone

can

one, or

responsible

be an external consultant. Regardless or outside the organisation, the Act within from of whether the DPO is business contact details of the DPO be publicly that the requires available," so it seems imperative that the public has a visible contact no

reason

why

the DPO

cannot

point.

1.

Policies and practices

2.12 In addition to appointing a DPO0, all organisations are required to develop and implement policies and practices that are needed to

14 15 16 17 18 19

Personal Data Protection Act 2012 (Act 26 of 2012)s4(6) (a). Personal Data Protection Act 2012 (Act 26 of 2012) s4(6)(6). Personal Data Protection Act 2012 (Act 26 of 2012) s 4(6) (a). Personal Data Protection Act 2012 (Act 26 of 2012) ss 11 (3) and 11(4). Personal Data Protection Act 2012 (Act 26 of 2012) ss 11(3) and 11(4). Personal Data Protection Act 2012 (Act 26 of 2012) s 11(5).

31

Data Protection in the Practical Context The Practical and

Act and to communicate thes hese o compliance with the must also a organisations Furthermore, staff. to complaints regarding persone and receive respond to process and practices and the complaint protection,2 and the policies ensure

develop

a

website, the personal

be available online in a layered information. to m o r e detailed

manner

complaint

blic upon request.22proces

must be made available to the general

organisation has

their

protection polic through the use of hVne data

Ifan

to

needs

structure to

be

to work closely with all tcams within and implement these policies and pracs develop to educate employees o n the policies and r

and, of course, es. Although the DPO will also likely be the person responsible for and responding to requeste f handling complaints and co-ordinating access or correction, however, the protection of data should be in the psyche of the whole organisation and not just the DPO. If it is lett solely in the hands of the DPO, compliance by an organisation will be

and

content

of the

protection personal data

developed.

Personal data audit

(a) 2.17

2.13 The DPO would need

organisation

Sccond,

policy

the

ConceptualFramework

use

and

disclosure

practices

must

first be

data collection, exercise is to All current i n f o r m a t i o n gathering and analysed. This as well identified a n organisation, held data by overview of the personal of an obtain regarding the handling procedures and systems it and described as its practices, wil to be This will enable the practices personal data. about whether any of the practices assessment to be made also allow a n whether any necessary the legislation and be might be contravening a n audit might organisations, For taken. larger action should be the data organisation discover the kinds of personal necessary to relevant processes and procedures as well as the handles, and collects data. regarding the personal

much more difticult.

2.18

2.14 Organisations should be mindful of compliance with these mandatory requirements of the appointment of a DPO and the development and implementation of policies and practices, as non-compliance can also

form the basis of a financial penalty."

Developing a data protection policy

2. 5

The level of complexity of a data protection policy will depend on how much personal data an organisation collects and how much processing is undertaken by the organisation, as well as whether it discloses any personal data.

to identify a personal data policy is The first step towards developing involve that the activities of organisation the main functions and a small tuition centre might| for list A personal data handling. simple conduct publicity campaigns, look like this: provide tuition services, and operate a website. For each of these activities, handle

complaints,

some of the essential information required might be: what personal data is collected and how it is collected, how the personal data is held, the purposes for the collection, use and disclosure, and whether the personal data is transferred outside Singapore.

2.19 If there are specific approaches or commitments which the organisation has in place, these should be noted and highlighted. Some examples might include:

(a) whether the organisation sells personal data to anyone 2.16 There

(b)

generally two main steps in developing a data protection policy. First, information about the organisation's personal data practices, procedures and systems must be gathered and understood.

20 21

22 3

Personal Data Protection Act 2012 (Act 26 of 2012) ss 12(a) and 12{9 Personal Data Protection Act 2012 (Act 26 of 2012) s 12(6). Personal Data Protection Act 2012 (Act 26 of 2012) s 12(d).

whether and what security protections such as encryption are in place;

are

(c)

to whom and in what circumstances personal data will be disclosed and whether they will be transferred oversees;

(d) what are the procedures and systems for identifying and managing security risk, as well as developing and monitoring (e)

controls for those risks; details of what processes

are

fu Kwe Kitchen Catering Services and Pixart Pte Lid |2016] SGPDPC 14.

32

in

place

personal data that is no longer needed;

33

to

identify

and manage

Data

what processes

(

Protectionin the

are

used to

de-identified;

(g) (h)

(i)

Practical Comtext

ensure

The Practical and ComceptualFramework

Dersonal

pcrsonal

for providing

of the procedurcs of personal data; pdating for upda procedures details of the and accurate; they are procedure. details of the complaints

data dala is is

access

to

destroyed.or

ar

details

ction

personal data (b)

2.20 addition to a D e r e . stressed that in it must be At this juncture, of their Dere. public the general that informs protection policy must also have Dracts practices organisations and protection practices, ees to follow follow in the handling of personal employees for in place policies no douhte in be clearly spelled out, leaving data. These should

minds of employees of what is permissible and what is not Der nissible, for handing ot personal data should not as The procedures in place to do anything th or enable the employees far as possible facilitate ditficult in some settinos be This may the Act. b might contravene

for solutions. Often, technology may have organisations should strive wrongdoing by employees, whether limit to possible any to be utilised should adopt the or accidental. Organisations are intentional

they practice of "personal

data

protection by design

or

"privacy by design"

wherever possible. 2.21 Personal data protection by design is an apPproach where the personal data is protected through embedding protection into the design of that is, the protections are technologies and physical infrastructures, weaved into the design specifications and architecture of new systems and processes. This will be discussed in further detail in chapter 7. 2.22 A very simple example of the implementation of personal data protection by design would be a system that might reduce opportunities for employees to pry into personal data records that they have no business looking into and to collect the personal data. Such a system might be to isue employees with personalised logins and passwords for logging into computer systems instead of just using a generic password shared by many employees. The system can also be layered so that before an employee can access a particular record, they have to input a valid case number, thereby restricting general access. In any event, the personalised login, when set up with the correct software and configurations, would be able to track all the persona data records accessed by employees along with logs of time ana duration of access and all this would assist to ensure compliance and o

34

idcutify the culprit personal data lcak.

in the

event

of

unauthorised

access

and/or

a

Structure and content

2.23 is be taken that the personal data protection policy Care should the terms of in organisation's s e n s e makes that arranged in a m a n n e r audience of the personal data protection policy. functions and the would bec should be provided for areas that individuals details More such as the selling or find with o r objectionable, may most concerned or processes that disclosure of personal data. Similarly, practices not would o r reasonably expect, would not be aware of,

individuals should be highlighted.

2.24

m e a n that c o m m o n The suggestions given above do not, however, There may be business or administrative practices should be ignored. individual as an such filling out a form processes that are self-evident, a is obvious that which address and name delivery to that a with address should be made or that the address is for billing purposes, but these practices should be summarised for the individuals.

2.25

Ideally, the information in a data protection policy should be grouped

under relevant headings such as scope of the policy, collection of use and processing of data, disclosure of personal data, and complaints procedure. Under each of these and choices, rights

personal data,

headings, all the relevant information should be provided with special focus on specific approaches or commitments the organisation has in place. For example, under the heading of collection of personal data, the personal data collected should be clearly stated and include the reasons for collection, highlighting any unusual or unexpected reasons or purposes for the collection, or even unexpected personal data collected. Information under the rights and choices heading should provide details on choices that individuals can make, including the right to request access and correction of personal data held about them and, of course, the complaints procedure should state the procedure on how to make a complaint and what other recourse

limited)

individuals might have. 2.26 If there are new processes introduced in the organisation, the personal data protection policy should be updated to reflect the changes and the new processes should be assessed to ensure that they meet

35

Data Protection

inthe Practical

Context The Practical and

compliance.

In any

be regularly organisation's

event, the

reviewed current

and

personal

data

protection

that

ensure

updated to data handling practices.

it re ould

personal

2.27

simple:

not complying"27 with the believe that the organisation is section that noted 50(1) of the Act does not be should it Act. However, in such a of the Commission to initiate investigations limit the power that:28 states m a n n e r as it simply

grounds

data protection policy should Lastly, the personal and in-house terms, unless the acronyms acronyns avoid legal jargon, detined or explained in the doc are clearly t. and in-house terms use

Conceptual Pramewok

nol:

language,

to

an or of its own motion, conduct The Commission may, upon complaint an organisation is not whether determine to section this under

investigation

complying with

this Act.

2.30

be ruled out that there may c o m e a time when the Commission may conduct audits." For this reason, organisations much a supervisory should be cognisant that the Commission is very with. reckoned be to Hence, it

ENFORCEMENT OF RIGHTS

C.

1.

Protection Commission The Personal Data

cannot

authority 2.31

2.28

overseen by the

data protection regime The Singapore personal Commission as the administrative and Personal Data Protection Commission also has the mandate to The enforcement authority. education and awareness efforts 4 data protection undertake personal ot the Commission may be structure It seems that the organisational Commission of Singapore. The Commission is

styled on the Competition is a quasi-judicial and supervisory authority

with enforcement and varied powers. All the directions of the Commission, except for directions on dispute resolution, can be enforced in the District Court

over whether The Commission appears to have a discretionary power as it may suspend, discontinue or to exercise its powers of investigation of refuse to conduct a n investigation if it thinks fit.30 The powers of the Commission and the inspectors a r e set out in the

investigation

Ninth Schedule.3 Also relevant here are the Regulations," and the Commission has also issued the Advrisory Cuidelines on Enforcement of which are non-binding, but they indicate the Data Proection the Commission's approach in handling complaints, reviews investigations of breaches of the data protection rules, as well as

Provisions,

and

enforcement and sanctions.

regardless of the monetary amount.2

(a)

Powers of the Commission

2.29 The personal data protection regime is one based primarily on a

the Ministry of Information, Communications and the Arts ("MICA") in the Public Consultation

complaints-based approach, however,

Issued by Ministry of Information, Communications and the Arts: Proposed Personal Data Protection Bill ("2012 MICA Consultation")26 made it clear that the Commission may also initiate investigations, regardless of whether a complaint is received, into an organisation's compliance

27

28 29

also s 50 of the Personal Data Protection Act 2012 (Act 26 of 2012). 30 31

26

Personal Data Protection Act 2012 (Act 26 of 2012) Personal Data Protection Act 2012 (Act 26 of 2012)

s s

6. 30.

Mhnistry of Information, Communications and the Arts, Public Consuliatno Issued by Ministry of Informatiom, Communications and the Arts: Prop Personal Data Protection Bill (19 March 2012).

36

See

Proposed Personal Data Protection Bill (19 March 2012) at para 2.125. See

with any provision of the Act, "if it is satisfied that there are reasonable

24 25

Ministry of Information, Communications and the Arts, Public Consultatiom Issued by Ministry of Information, Communications and the Arts: Proposed Personal Data Protection Bill (19 March 2012) at para 2.123. See also s 50 of the Personal Data Protection Act 2012 (Act 26 of 2012). Personal Data Protection Act 2012 (Act 26 of 2012) s 5(1). Ministry of Information, Communications and the Arts, Public Consultation Issued by Ministry of Information, Communications and the Arts:

32 33

Personal Data Protection Act 2012 (Act 26 of 2012) s 50(3). Personal Data Protection Act 2012 (Act 26 of 2012) s 50(2) and Ninth Schedule.

Personal Data Protection Regulations 2014 (S 362/2014); Personal Data

Protection (Enforcement) Regulations 2014 Personal Data Protection Commission,

Advisory ofthe Data Protection Provisions (21 April 2016). 37

45 5/ 014). Gauidelines

on

Enforcement

Data Prolection

The Practical and ConceptualFramework

Dispute resolution powers

(b) 2.32

with organisation, the In

in the Practical Context

dealing

a

mediation with the any other

dispute

complaint

Commission consent

made

by

an

individual

has the power to relevant

of the

resolution method

with

refer the

under both section 21 to access the request by the complainant individual's own personal data as well as section 22 to correct personal

against an

amat r for rder tho consent

parties, without

as well

or

the relevant parties.

Commission

was

a

fee

Data However, charged to correct personal Protection Regulations 2014 specifically states that n o fee can be charged for correction of personal data under section 22(2) of the Act can

be

and organisations should be cognisant of this." Section 28(2) (6) grants

the Commission the power to confirm, reduce or disallow a fec, or direct the organisation to make a refund to the complainant as the

2.33 Consultation," MICA felt that mediation In the 2012 MICA resolution of complaints by facilitatina carly

encourage between the affected

gives the impression that data. The way this provision is worded data. the Personal

parties

and

given the power

to

hence

refer the

it

was

Ould e essential th

parties

to

mediatieon.

ne

case may be.

2.37 The third review power concerns the situation where an organisation has refused to make a correction to personal data under section 22 of

the Act or has failed to do so within a reasonable time. The (c)

Review powers

Commission may confirm the refusal to correct the personal data, or

direct the organisation to correct the personal data with full power to 2.34

dictate the manner of correction and set any time frames.

Under section 28 of the Act, upon the receipt of a complaint, the

Commission can review the exercise ot power by organisations in

Penalties arnd broad powers to direct

relation to three areas where an organisation has made a decision

(d)

regarding personal data.35 The three areas are: refusal or failure to provide access to personal data, the quantum of the fees charged for access to or correction of personal data and a refusal by the organisation to correct personal data or a failure to do so within a

2.38 The Commission also has broad powers to give directions to any organisation so as to ensure compliance with the Act.S9 Hence, it can

reasonable time.

direct an organisation to cease collection, use, disclosure of personal

data, as well as to destroy personal data.0 In the 2012 MICA Consultation," MICA also stated that directions can be given for

2.35 In relation to a refusal to provide access to personal data requested under section 21 of the Act by the complainant or a failure to provide access within a reasonable time, the Commission may confirm the refusal to provide access, or direct the organisation to provide access to the personal data within a set timeframe.S7

compensating affected individuals as a result of non-compliance with

2.36

In the few cases to date, the Commission's approach to enforcement

28(1) (6) of the Act gives the Commission jurisdiction to review Section a fee required from the complainant by an organisation in relation to a

can

the data protection law. Importantly, the Commission has the power to impose a financial penalty of up to $lm.12 This administrative law penalty is distinct from the criminal penalties which will be discussed below. 2.39

34

Personal Data Protection Act 2012 (Act 26 of 2012) s 27.

35

Ministry of Information, Communications and the Arts, Public Consuliation ssued by Ministry of Information, Communications and the Arts: Propeset

36 37

Personal Data Protection Bill (19 March 2012). Personal Data Protection Act 2012 (Act 26 of 2012)

s

38

38 39 40 41

28.

Personal Data Protection Act 2012 (Act 26 of 2012) ss 28(1)( and

28(2) (a).

be seen to be tempered by a concern to raise awareness and understanding of the requirements of the personal data protection

42

Personal Data Protection Regulations 2014 (S 362/2014) reg 7(4).

Personal Data Protection Act 2012 (Act 26 of 2012) s 29. Personal Data Protection Act 2012 (Act 26 of 2012) s 29(2).

Ministry of Information, Communications and the Arts, Public Consultation Issued by Ministry of Information, Communications and the Arts: Proposed Personal Data Protection Bill (19 March 2012) at para 2.118. Personal Data Protection Act 2012 (Act 26 of 2012) s 29(2) (d). 9

Data Protection

in the Practical

Context

The Practical and Conceptual Framework directions

rather

than

issuing appropriate Unversal regime through Travel od Purel of In the decision Las punitive approach. t disclosino respondent) travel agent (the which involved a na tour to individ four customers of a group als who data of 37 of its in the tour, the Commission cancelled their participation that

causd without the disclosures of persona he employees'part the respondent's lack of awareness on data and not due to a systemic iissue that could result protection Obligations o r further harm to be made be disclosures to caused in further mistakes made by the respondo the disclosures were bona jde notification were consent and

such,

employees

who

were

seeking

to

assist

the

there

passengers ith their was a wilful disrepari

one where insurance claims, and not tor Since disclosures were made to a Act." the nited the provisions in to their personal e-mail addresses and th. number of persons and was in relation to limited individho data that was disclosed

personal

to remedy the situation by, inter alia, informing within two weeks the individuals who received the

the respondent the Commission directed

passenger list not

to

disclose the list to other third parties: to send course on the obligations under the Act

employees to attend training and the organisation's data protection policies within six months; and a

to put in place within three months a data protection policy and internal guidelines to comply with the provisions of the Act and, in 16 particular, to prevent future r e c u r r e n c e s of the breaches. 2.40

In the decision of Universal Travel Cop Pte Ltd," the Commission did

individuals

impose a penalty, partly due to the small number of personal data disclosed and partly due to the co-operative nature of the respondent. This case can be contrasted with the case of Fei Fah Medical Manufachuring Pte Ltd5 where the Commission levied a penalty not

of$5,000 fora data leak. User login identifications, poorly encrypted

passwords, e-mail addresses and mobile phone numbers of at least 836 individuals were leaked." The respondent company had no idea how the leak occurred and were unable to explain or to provide during the investigation. The Commission the user login identifications and password would have

sufficient information noted that enabled anyone to log 43 44 45 46 47 48 49 0

in and obtain access to other personal daa

[2016] SGPDPC 4.

Universal Travel Corp Pte Lid [2016] SGPDPC 4 Universal Travel Corp Pe Ltd [2016] SGPDPC 4 Universal Travel Corp Pte Ltd [2016] SGPDPC 4

[2016] SGPDPC 4. [2016] SGPDPC 3.

Fei Fah Medical Fe Pah Medical

[21]. at [21]. at [20]. at

Manufacturing Pte Ltd [2016] SGPDPC 3 at [7 Manufacturing Pte Lid [2016] SGPDPC 3 at [13]-|l5]. 40

respondent company "had been had nor forthcoming in its responses" and even completely ignored a had and provided incomplete responses of Documents and Information ("NTP") individuals."

rclating to the neither co-operative

Notice

to

Require the

The

Production

Commission under

the power

given

to

it under the

issued by the Act. Although the respondent company had Ninth Schedule of to take remedial actions, the instructed its data intermediary did not o c c u r until m o r e than actions remedial the implementation of of the initial data leak.5 As a result of the after discovery ten months

in addition to giving various directions these factors, the Commission, a new website and to conduct a web application such as to implement all vulnerabilities, imposed a financial scan and to

vulnerability

patch

penalty of $5,000.54

2.41

It would appear that the scale

or amount

of personal data that has a have

played been leaked and the co-operativeness of the respondents the key factor in determining the quantum of penalty imposed by and Ltd Entertainment Pte K of Box the case In Group Commission. Finantech Holdings Pte Lid where the data leak involved 317,000 K Box

Commission

to members' details, the imposed the highest date of $50,000 on K Box6 and $10,000 on its data intermediary Finantech.57 The data leak disclosed quite substantial amounts of personal data belonging to cach member, namely, the individual's

penalty

name, NRIC/passport/FIN number, Singapore mailing address,

contact number, e-mail address, gender, nationality, profession and date of birth.55 The leak of personal data was caused largely by a failure to make reasonable security arrangements to protect the personal data.33 In addition to numerous failings in its protection of personal data, K Box also had not appointed a DPO or put in place personal data policies.0 51 52 53 54 55 56

Fei Fah Medical Manaufacturing Pte Ltd [2016] SGPDPC 3 at [20]. Fei Fah Medical Manufacturing Pte Ltd [2016] SGPDPC 3 at [33]. Fei Fah Medical Manufacturing Pte Ltd [2016] SGPDPC 3 at [33].

Fei Fah Medical Manufactuing Pte Ltd [2016] SGPDPC3 at [35].

(2016] SGPDPC 1. K Box Entertainment Croup Pte Ltd and Finantech Holdings Pte Ltd [2016] SGPDPC 1l at [44].

57

K BoxEntertainment Group Pte Ltd and Finantech Holdings Pte Ld [2016]

58

K Bow Endertainment Cronp Pte Ltd and Finantech Holdings Pe Ltd [2016]

59

K Box Enterainment Group Pte Ltd and Finantech Holdings Pte Ltd [2016]

60

K Box Entertainment

SGPDPC 1 at [45].

SGPDPC 1 at [3].

SGPDPC 1 at [26). SGPDPC 1 at [42].

Group

Pte Ltd and Finantech

41

Holdings

Pte Ltd

[2016]

Practical Data Prolection in the

Context

The Practical and Conceptual Framework 2.42 Although the

remedial actions

of

both

K Box and

Finan

ech were

data leak,61 their shortco after the personal fair and prompt in the assistance their lacklustre were in ne in providing informat was not forthcoming investigation, K Box he that K Box had onlv in criicising Commission was scathing the investigatio ions, which did their responses during bare facts in Finanteco investigations.Similarly, Commission's the facilitate dr do information in providing appeared not to be forthcoming NIPs the were to only nro investigation. Finantech's responses were first issued in Octah ed after the NTPs months seven almost delaying the investigation process.

investigations. Duri

mings

provide

2014

thereby

2.43

data leak where the Commission imnoes In another case of personal Commission impOsed a penalty of $i0.000 the a substantial penalty," The personal against the Institution of Engineers Singapore ("TES°). data disclosed included members online login identification mobile phone numbers. TES was unable to ascertain how many members' personal data were disclosed but the Commission

passwords and

noted that the titles of the two lists that were disclosed indicated somewhere in the range of between 6,000 and more than 60.000

members personal and

data may have been disclosed.5 The IES

throughout

forthcoming

the

Was

Commission's

co-operative investigation and it promptly took measures, including additional security measures following its discovery of the personal data leak.57

2.44 It would appear that for personal data leaks that involve large

numbers, the penalties range from $5,000 upwards, but there is no clear formula that can be gleaned from these cases. The disclosure of the personal data of at least 836 individuals in Fei Fah Medical Manufacturing Pte Ltd earning it a penalty of $5,000 cannot really be reconciled with the $10,000 imposed on the IES for the disclosure of

61 62

K Box Entertainment Group Pte Ltd and inantech Holdings Pte Ltd (2016) SGPDPC 1 at [42]-[43]. K Box Entertainment Croup Pte Lid and Finantech Holdings Pte Ltd SGPDPC 1 at [42].

[2016

63

K Box Entertainment Group Pte Ltd and Finantech Holdings Pte Ltd [201o SGPDPC 1 at [43].

64 65 66

The Institution of Engineers Singapore [2016] SGPDPC 2. The Institution of Engineers Singapore [2016] SGPDPC 2 at The Institution of Engineers Singapore [2016] SGPDPC 2 at

67 68

[13].

42

not. Likewise,

was

Cellar Door and its the Commission expressed that both The cavalier attitude by providing a had "displaycd data intermediary issued by the Commission",70 which incomplete responses to the NTPs Cellar Door being landed with a $5,000 The to contributed Pte

Ltd

no

doubt

The Commission, a penalty and its data intermediary $3,000 penalty. unfortunately, did not elaborate on how many individuals' personal which is rather unhelpful because justice needs to data were disclosed, to have been meted out. The higher penalty to The seen be clearly

as was due to the Commission's view that The Cellar Door, the data controller, retained the primary responsibility and obligation

Cellar Door to

customers.71 protect the personal data of its

2.45

In two late 2016 cases where the breaches were very similar factually, of a financial penalty of $3,000 was imposed on the respondent in each the two cases. In both cases, the primary respondent was a catering

firm and, in both cases, the breach occurred in their online ordering system. In both cases, the breaches were the result of poor computer programming practices whereby the online order review web page or order details of a customer could be viewed by anyone. The personal data of other customers could be viewed by simply changing the number at the end of the web address, and these review web pages never expired and were permanently accessible." There were two further decisions in late 2016 that could be argued to be relatively factually similar to these two catering company cases; one imposed similar financial penalty of $3,000 whereas in the other, only a warning was issued.73

69 70 71

[2016] SGPDPC 22. The Cellar Door Pte Lid and Global Interactive Works Pte Ltd [2016] SGPDPC 22 at [36].

The Cellar Door Pie Lid and Global Interadtive Works Pe Ltd [2016] SGPDPC 22 at [39].

72

[7J-18).

The Institution of Engineers Singapore [2016] SGPDPC 2 at [39).

[2016] SGPDPC 3.

of members' personal data ranging from 6,000 to unknown number not even 60,000. If anything, the fact that the IES could more than been a factor to have breach should the cxtent of determine the exact indicia that level of penalty because it was a further increase the IES was the was data lacking. However, protection for the personal Medical Fei Fah whereas he process investigation co-operative with in The Cellar Door Ple Lid and Global Interactive Works an

73

Fu Kve Kitchen Catering Services and Pixart Pte Ltd [2016] SGPDPC 14 at [6] and [16]; Smiling Orchid (S) Pte Ltd, T2 Web Pte Ltd, Cybersite Services PeLtdand East Wind Sohutions Pte Ltd [2016] SGPDPC 19 at [13]-[14]. GMM Technoworld Pte Ltd [2016] SGPDPC 18; ABR Holdings Ltd [2016] SGPDPC 16.

13

Data Protection

in

the Practical

Context The Practical

2.46 Services and Pixart Plo Kwee Kitchen alerng In the decision of Fu names, postal addresses and the FuKwee had failed to protect and had not implemente its customers contact numbers of the collection, use o r di. for policies personal data protection a DPO." It is unclear ho of personal data, n o r appointed individuals' personal data ere involved, but Fu Kwee was

Lud ddresses and personal

forthcoming in providing

only provided

information

any

many

during the investigation 0

d the investioat bare facts in its responses during 1ons,76 Pixart, was also not co-operative d.

Fu Kwee's data intermediary, it did take active steps to recsie." the investigation process, although The Commission imn e weeks." two vulnerability within around on Pixart.78

penalty of $1,000

Subcontracted the that T2

identified

2.47

investigations

development of the CMS "developers based in China" 82

actual

as

to

another entity

2.49 information technology system and outsourcing of the The repeated serious cybersecurity issues. If n o o n e in the raises software product in the code, nor has the programming is what knows various entities there is arguably n o integrity nor warranty in the code been tested, c a n the programming code contain Not code.

only

programming business that exposes itself to this kind of liability is malware but any business assets, not only in the form of its customer risking its valuable of financial and other sensitive information that terms in base but also may also

The second case of Smiling Orchid (S) Pte Ltd, 12 Web Pte Lid, Crbersit Services Pte Ltd and East Wind Solutions Pte Ltd" was rather sketchy in th facts pertaining to who was responsible for what and the primaru respondent, Smiling Orchid, was so unco-operative during the that the Commission noted that.80

and Conceptual ramework

be

collected.

2.50

the full data protection breach involved the disclosure of mobile numbers, workplace addresses addresses, residential names, Orchid's customers.83 The and workplace e-mail addresses of Smiling individuals' how mention not personal data many Commission did affected. In the final analysis, since m o r e detailed facts of the The

personal

were

.. [it] was still unable to establish the pertinent facts on what caused the discourse and the specific roles of the parties involved at the material time As a result, the Commission had to take statements from the relevant parties in order to gather and distil facts.

2.48 T2 was engaged by Smiling Orchid to design the Smiling Orchid webpage and build a Content Management System ("CMS").31 T2 created the design and HTML code but outsourced the development of the entire CMS to a freelancer, who in turm

74 75

[2016] SGPDPC 14. FuKuee Kitchen Catering Services and Pixart Pte Ld [2016] SGPDPC:

76

Fu Kwee Kitchen Catering Services and Pixart Pte Lud [2016] sGPDPC 14

at [34].

responsibilities, especially of T2, could not be established, was the only party the Commission found to have been Orchid Smiling in breach of personal data protection requirements and hence imposed the $3,000 financial penalty upon it. roles and

2.51

A third case with relatively similar facts is GMM Technouorld Pte Lud where the respondent's unjustifiable ignorance or misunderstanding of the functions and features of a paid third party software it had implemented to collect personal data for registration of warranty resulted in the names, e-mail addresses, mobile phone numbers and residential addresses of 190 customers being publicly accessible.85 A financial penalty of $3,000 was handed to the respondent, taking into account that the respondent was co-operative in the investigation and took immediate steps to rectify the breach.86

at (32].

77 78 79 80 81

Fu Kve Kütchen Catering Services and Pixat Pe Lid [2016] at [33].

SGPDPC 14

Fu Kuee Kitchen Cateing Services and Pixart Pte Ltd [2016] SGPDPC 14 at [35].

82

[2016] SGPDPC 19.

83

Smiláng Orchid (S) Pte Lud, T2 Web Pte Ltd, Cybersite Services Pte Ltd and Eas Wind Solutions Pte Ltd [2016] SGPDPC at 19 [61)]. Smiling Orchid (S) Pte Ld, T2 Web Pte Ltd, Cybersite Seruices Pte Ltd and bAs* Wind Solutions Pte Ltd [2016] SGPDPC 19 at [6].

84 85 86

44

Smiling Orchid (S) Pte Ltd, T2 Web Pte Ltd, Cybersite Services Pte Ltd and East Wind SolutionsPte Ltd [2016] SGPDPC 19 at [7]. Smiling Orchid (S) Pte Lud, T2 Web Pte Ltd, Cybersite Services Pte Ld and East Wind Solutions Pte Ltd [2016] SGPDPC 19 at [11]. [2016] SGPDPC 18. GMM Technoworld Pte Ltd [2016] SGPDPC 18 at [6]. GMM Technoworld Pte Ltd [2016] SGPDPC 18 at [16] and [18].

45

Data

Protection

The Practical and Conceptual Framework

R7

Kitchen Catering Serico 7 in Fu Kwee decisions of the chairma were Pte Ltd" while Smilaing Orchid"9 was a

2.52 Both

the

decisions

GMM Technoworld Commission,

Thai, Leong Keng Yeong Zee

Commission member

mete out

any

Kin. In a

Commission

relatively similar facts,

and the

decision Yeong Zee Kin d did g no

tourth

member

financial penalties.

2.53 In

Conlext in the Practical

Swensen's Kids Clubthe respondent's of members by innse:e data the

websit

ABR Holdings Ltd

personal

allowed anyone as the memb embership numbgan membership number, guessable easily were issued in running sequence." The personal data of membersthat names, date ot birth, redemption states of accessible were their to

access

were

sundaes and "stamps",

number

of stamps

accumulated

and the

ev.

date of the membership. It could be said that these types ofnersSonal data revealed

intrusive as the personal data in Fu K. Kwe it is perhaps for this reason that 0 and Services" However, the respondent was informed by th

were

not

as

Kitchen Catering was imposed. penalty Commission of the breaches on 2 April 2014," before the Act d 2014, another complaint was lodged come into force. Yet, on 15July the s a m e breaches. When the Commission outlining with the Commission on 5 August 2014. t was informed by the respondent the names and immediately changed what could be viewed by omitting

date of birth of the members on the web pages. The inaction of the respondent for four months between April and August 2014 should surely have warranted some financial sanctions and not just simply a warning The Commission took the view that since the provisions only came into force on 2 July 2014, the infractions were only for about one month. This, however, is a myopic view given that the Commission itself acknowledged that the respondent had "ample time to take

corrective measures" between April and August 2014.

37 88 39 90 91 92 93 94 95 96 97 98 99

[2016] SGPDPC 14. (2016] SGPDPC 18.

[2016] SGPDPC 19. ABR Holdings Ltd [2016] SGPDPC 16. [2016] SGPDPC 16. ABR Holdings Lud [2016] SGPDPC 16 at [5]. ABR Holdings Ltd [2016] SGPDPC 16 at [8]. (2016] SGPDPC 14. ABR Holdings Lud [2016] SGPDPC 16 at [2]. ABR Holdings Ltd [2016] SGPDPC 16 at [3]. ABR Holdings Ltd [2016] SGPDPC 16 at [10]. ABR Holdings Ltd [2016] SGPDPC 16 at [21]. ABR Holdings Lud [2016] SGPDPC 16 at [20].

46

did not impose financial decided in 2015 also carlier cases few A the namcs, personal c-mail Ple Lld, the case of Metro Denaltics. In mobile phone numbers, dates of numbers, personal addresses, NRIC 445 of Metro's user login identifications of Facebook birth and active steps following the Metro had taken

2.54

were

disclosed.

customers the sccurity of its website, including engaging The data leak to strengthen internal IT security audit.102 an undertake to another firm was imposed.0 n o Metro but pcnalty a warning to Commission issued the personal data of Sociely, Comtputer in Singapore Further, disclosed via c-mail to the s a m e were inadvertently 214 individuals event. The Singapore who had registered for a n 214 individuals the breach to the itself reported ("SCS") Computcr Society Commission issued a warning without any penalty Commission and the full names, data disclosed were the registrant's to SCS. The personal e-mail addresses, organisation and numbers, contact NRIC numbers, and Singapore In both Metro Pte Lid designation information. in 2015. The in earlier time, occurred the breaches Computer Society, role in those m o r e strongly its educative felt Commission, perhaps, data leaks did not have was perhaps felt that the early cases. Further, it n o financial penalties w e r e imposed. hence and severe consequences NRIC numbers should be mnet With respect, any data leak involving numbers are very important NRIC with the highest level of censure, as identifiers that should be accorded the highest protection.8

universal

2.55 From the foregoing cases, it is unclear whether the current magic for the unauthorised disclosure of a number to

penalty trigger around personal data might be the disclosure of but Pte Technoworld GMM Lid109 in data as individuals' 200 personal the noting that the respondent in that case was co-operative during immediate corrective m e a s u r e s . The breaches took and investigations non-financial

in GMM Technoworld Pte Ltd

occurred in 2016 and is

100 101

[2016] SGPDPC 7. Metro Pte Ltd [2016] SGPDPC 7 at [6].

102 103

Metro Pte Lid [2016] SGPDPC 7 at [19]. Metro Pte Ltd [2016] SGPDPC 7 at [20].

104 105 106 107 108 109 110

[2016] SGPDPC 9. Singapore Compuler Society [2016)] SGPDPC 9 at [2]. GPDPC 20 [2016] SGPDPC 9. See ch 7. [2016] SGPDPC 18.

[2016] SGPDPC 18.

47

a

later

case

than

Data Protection

in

thePractical Context

The Practical and

Socety," both of whiL and Singapore Compuler Metro Ple Lid 2015. Certainly, in the occurred in with breaches that ases ore appcared Commission cared to be m more the willing decided in January 2017, In Protner substantial financial penalty.

which deal

impose a

Realty

penalty of $10,000 P e 1,765 individuals; this h e of data disclosure of the personal e imposed on JEs penalty financial contrasted with the $10,000 data belonging to 6,000 the personal of the disclosure 60,000 individuals. In P Pepperdine Group Pte Lid, 15 a i n a n c i ;to 2016 for to

Ltds the

more

imposed

Commission

a

financial

for placing the personal da ta was imposed penalty of $10,000 disclosure. There was no evidence that of risk the 30,000 individuals at uncO-operative with two cases were the respondents in these investigation process.

2.56

The remaining cases where the Commission has only issued

nings

co-operative respondens without imposing penalties of the breach of th the and impact breach likely the and where were somewhat limited. Obligations data have

personal

involved

protection

2.57 Spear Security Force Ple Ltdo involved an unattended open log book

data at a condominium and there was no evidence suggesting that personal data actually had been exposed to unauthorised third parties."7 Similarly, in Full House Communications Pe Lud8 the lapse in security involved the auto-fill function being enabled for drop-down boxes on laptops used by consumers ata furniture fair to enter a lucky draw. This led to consumers being able to see the personal data of other consumers who had entered their personal data for the lucky draw.19

containing visitors' personal

2.58 In Yestuition Agency20 the respondent had disclosed on its website without consent of the individuals, the photos of around 30 individuals who

had

registered

to

be

its

tutors,

using

the

111 112

(2016] SGPDPC 7. [2016] SGPDPC 9.

113

[2017] SGPDPC 1. The lnstiution of Engineers Singapore [2016)] SCPDPC 2.

114 115 116

117 118 19

120

48

at

no

evidence of how

2.59

of that involved the disclosure of the personal data resulted in a also being warning to about 30 recipients two individuals " the n a m e and of Jump Rofpe (Singapore), meted out. In the case e-mailed to around were individuals two NRIC number of of the for warning the schools about purpose 30 government schools two individuals. The so called "name and the of the blackisting to help schools in making decisions shame" exercise was meant solcly The Commission found when engaging rope skipping instructors. reasonable person standard in section 11 of the of breach a was A

Case

there

breach of the consent requirement. There appears to it was stated that section 20 was also be typographical errors where breached while in other paragraphs, the Commission stated that the Act25 and

a

section 20 was not relevant to the case. In any event, because the and breach only involved a limited number of government the personal data disclosed were limited and related to only two

schools

individuals, and the respondent was co-operative during the

investigation, the Commission decided a warning was the appropriate course of action. As will be discussed in chapter 6, this decision does not appear to have been correctly decided based on sections 11 and 13 of the legislation, hence, the non-imposition ofa financial penalty was indeed the appropriate course of action. 2.60 The facts of AIA Singapore Pte Ltd28 involved the unauthorised disclosure of one individual's bank account details to one other party, namely, the individual's chiropractor.23 This was a case that also

121

Yestuition Agency [2016] SGPDPC5 at [18].

122

[2016] SGPDPC 21.

and [18].

127 ump Rope (Singapore) [2016) SGPDPC 21 at [17].

[2016] SGPDPC 8.

SGPDPC8

was

123 Jump Rope (Singatpore) [2016] SGPDPC 21 at [7]. 124 Jump Rope (Singapore) [2016] SGPDPC 21 at [7] and (9]. 125 Personal Data Protection Act 2012 (Act 26 of 2012). 126 Jump Rope (Singapore) [2016] SCPDPC 21 at [14] but compare [15]. [16]

Spear Security Force Pte Ltd [2016] SGPDPC 12 at [13]. (2016] SGPDPC5.

here

the filenames. as NRIC numbers the vicwed the photos and NRIC numbers, but had many people had been co-operative and the respondent that Commission noted taken the investigation proccss and had also forthcoming during o n c e it was awarc of the breach situation the proactive steps to remedy of the Act. 2

individuals'

[2017] SGPDPC 2. [2016] SGPDPC 12.

Full House Communications Pte Ltd [2016]

Comceptual Framework

[9]-[ll).

128

[2016] SGPDPC 10.

129

AlA Singapore Pte Lid [2016] SGPDPC 10

49

at

[1].

Data Protection in

the Practical Context The

Obligations0 andd involved a sin one single party concerning one single ne to was disclosure the only no evidence of actual loss or da of personal data, and there was undertaken an immediate revin had suffered and the respondent issued only a warning. Another a of Commission the its proceses, also which involved the and discl was issued a where

only warning

My Digital Ioc k Pte mobile phone number and complainant's personal his disclosed on the social media Dlatf address m

is the of personal data of a single individual

Ltd

The

residential

case

of

were

Facebook, on the account of the employee of the respondent for

than longer information

o the purpose of transferrino an hour, apparentdy for the from his mobile phone to a computer tor sending on to

The Commission also took into account the limited mobile phone number and sensitivity of the personal data, namely, residential address, as well as the co-operative response of th

legal advisors.3

respondent in the investigation.4

co-operative with the investigations

and had proactively taken steps to the Commission not issue any dircctions but warning to both respondents.11

remedy the breach,

only issued

a

did

2.62 For breaches of the personal data protection Obligations involving of Central Depository (Pte) Ltd financial personal data, the July and Toh-Shi Printing Singapore Ple Ltd is instructive. This case involved the disclosure of 195 individuals' personal data. There was an crror which caused 92 individuals to receive personal data belonging to others. The personal data disclosed included account information such as name, address and account number; securities held; transaction The remaining 103 individuals summary and payment summary.

2016 case

received similar personal data belonging to others, except that there

were no details on securities held; transaction summary and payment

summary.14 The Commission found that Central Depository (Pte) Ltd was not in breach of the Protection Obligation as it had valid clauses in

2.61

the contract with its d a t a i n t e r m e d i a r y t o p r o t e c t p e r s o n a l data. 5

One case where the quantity of personal data disclosed was large but the nature and method of the personal data disclosed was not significant is the case of Challenger Technologies Ltd and Xirlynx Innovations. 5

Challenger's data intermediary, Xirlynx, had erroneously

sent e-mails containing the personal data of members of Challenger's ValueClub programme to other members of the programme, who were the wrong recipients.56 There were 165,306 recipients of e-mails with someone else's personal data.37 Nevertheless, the personal data disclosed was limited to the member's name, accumulated points and membership expiry date "5 The Commission noted that the personal

data disclosed were not of a sensitive nature and the personal data leaked could not be used by the individuals who had received them to profiteer or benefit from them, and was unlikely to lead to any harm or loss to the individuals concerned." Since the respondents had been

Singapore Pte Ltd [2016]

130 131

AIA AlA

132

[2016] SGPDPC 20. My Digital Lock Pte Ltd [2016] SGPDPC 20 My Digital Lock Pte Ltd [2016] SGPDPC 20

133 134 135 136

Practical and Conceptual Framework

Limitation

breach of the Purpose

SGPDPC 10

Singapore Pe Ltd [2016] SGPDPC

[2016] SGPDPC 6.

10

at at

at at

Protection Obligation and a penalty of $5,000 was imposed on Toh-Shi

Printing.0 The Commission noted that the personal data disclosed constituted sensitive financial personal data and that a total of 195 individuals' personal data were affected."" 2.63 Toh-Shi Printing was again sanctioned in a subsequent case. In Aviva Ltd and Toh-Shi Printing Singapore Pte Ltd 8

its own staff failed to comply with its own security measures and

140

[25]. [28].

144

Ltd and

Xirlynx Innovations [2016] SGPDPC

137

Challenger Technologies at (15].

Ltd and

Xirlynx Innovations [2016] SGPDPC

138

Challenger Technologies t [14).

Ltd and

Xirlynx Innovations [2016] SGPDFU

147

139

Challenger Technologies at

Ltd and

Xirlynx Innovations [2016] SGPDr

148

50

Challerger Technologes Ltd and Kirlynx Innovations [2016] sGPDPC 6 at [37]-[38]. Chalenger Technologies Lid and Xirlynx Innovations [2016] SGPDPC 6 at [39).

142 143

Challenger Technologies at [14).

[37].

Aviva was found not to have

breached any of its obligations concerning personal data protection but Aviva's data intermediary, Toh-Shi, caused the data breach when

141

[18]-[21]. [24].

The

data intermediary was, however, found to be in breach of thc

145 D

146

[2016] SGPDPC 11.

Central Depository (Pte) Ltd and SGPDPC 11 at [8]. Central Depositor (Pte) Ltd and SGPDPC 11 at [9).

Toh-Shi

Printing Singapore Pe

Lud [2016]

TohShi

Printing Singapore Pte

Lid [2016]

Central Depository (Pte) Ltd and Toh-Shi Printing Singapore Pte Ltd [2016] SGPDPC 11 at [17]-[18]. Central Depository (Pte) Ltd and Toh-Shi Printing Singapore Pte Ltd [2016] SGPDPC 11 at [23]. Central Depository (Pte) Ltd and Toh-Shi Printing Singapore Pte Ltd [2016] SGPDPC 11 at [24). (2016] SGPDPC 15.

51

Dala

Toh-Shi's

procedures.

spreadsheet for Toh-Shi the

sort,

to

an

information

in the

without

Practical in the

staff had

further

the knowledge

take advantage

incomplete

or

Context

sorted

approval

The Practical and Coneeptual Framervork data data

the of

the order

in perfor

savings," of postage of the policyholders

selection

This resulted in

raw

in

Aviva, in

but

data was made. was printed information that

in the

account

Prolection

orming

acco

am mismatch a

and sent out.

2.64 the personal data bclonoi the disclosure of The breach involved Public Officers Gr under the Aviva roup 7,794 Aviva policyholders " Erroneous annual premi. ("POGIS"). Insurance Scheme to the POGIS policvhalia 2015 were sent out statements for the year data of 8,022 individuals, includin:the In total, however, the personal were disclosed in the data breach POGIS policyholders' dependants, data disclosed were the names of th incident.15 The personal the s u m insured under tho o r beneficiaries,

policyholder's dependants a m o u n t and type of coverage.153 insurance policy, the premium 2.65

not merely from a personal data disclosed were of a sensitive nature, financial perspective but that the disclosures could also be socially embarrassing; that this was Toh-Shi's second infraction in less than a the investigation and year; and that Toh-Shi was co-operative 55 took promnpt remedial and preventive actions.

during

2.66 From the cases to date, a few observations can be made. The Commission takes a much stricter view if the personal data in question is financial or sensitive in nature.136 For non-financial personal data, it would appear that the Commission is more forgiving of non-technological or human error, including errors of judgment,

157

Aviva Ltd and Toh-Shi Printing Singabore Pte Ltd [2016] Avva Ltd and Toh-Shi Printing Singapore Pte Ltd [2016] Avva Lid and Toh-Shi Printing Singapore Pte Ltd [2016] Aviva Ltd and Toh-Shi Printing Singapoe Pte Ltd [2016] Aviva Ltd and Toh-Shi Printing Singapore Pte Ltd [2016] Aviva Ltd and Toh-Shi Printing Singapoe Pte Ltd [2016] Aviva Ltd and Toh-Shi Printing Singapore Pte Ltd [2016] Central Depository (Pte) Ltd and Toh-Shi

15 at [14]. 15 at [15). 15 at |1]. 15 at [(2]. 15 at [8|. 15 at [37). 15 at |38]

Printing Singapore Pte Ltd SGPDPC 11; Aviva Lid and Toh-Shi Printing Singapore Pte Ltd SGPDPC 15.

practices where

onc-oll

arc

Commission appears systemic

to

2.67 Data

errors

[2016 |2010

Spear Security Foce Pte Ltd [2016] SGPDPC 12; Full House Communicatio Pte Ltd [2016] SGPDPC 8; Challenger Technologies Ltd and Xriyni

that trigger personal dat wno

are not

be lookcd

limited about

impact. A

The

ensuring

that

protcction breaches

co-operative and

upon favourably

are not

rectified. forthcoming

10

are

aggravating

financial penalties. consider in calculating

6l

2.68

question if the quantum ot the penalties imposed to date are small. Certainly, penalties in the order of $5,000 to $10,000 may effect. It may be that the leniency of the not serve any deterrent a is date to sign of its desire to raise awareness and simply Commission in time. If the penalties remain at this level in to educate at this point the long term, it will have a deleterious effect on compliance.

One may

(e)

Appealing the decisions made by the Commission

2.69 There is a procedure provided in section 31 whereby applications can be made by either the organisation or the individual to the Commission within 28 days for it to reconsider any of its directions or decisions. In addition, the decisions and directions of the Commission, including the decisions and directions made as a result of the

Innovations [2016] SGPDPC 6; AIA Singapore Pte Ltd [2016] SGPDPC 10; Yestuition Agency [2016] SGPDPC 5; My Digital Lock Pte Ltd [2016]

159

SGPDPC 20; GMM Technoworld Pte Lid [2016] SGPDPC 18. Unaversal Travel Corp Pte Ltd [2016] SGPDPC 4; Singapore Compruter Society

2016] SGPDPC 9;My Digital Lock Pte Ltd [2016] S PDPC 20;, Jump Rope (Singapore) [2016] SGPDPC 21. Fei Fah Medical Manufacturing Pte Ltd [2016] SGPDPC 3; K Box Entertainment Grouy Pte Ld and Finantech Holdings Pe Lud 12016] SGPDPC 1; The mstitution of Engineers Singapore [2016] SGPDPC 2; Smiling Orchid (S) Pe Ld, T2 Web Pte Ltd, Cybersite Services Pte Ltd and East Wind Solutions Pte Ltd

2016] SGPDPC 19; Fu Kwee Kitchen Catering Services and Pixart Pte Ltd 160 161

2016] SGPDPC 14.

rei Fah Medical Manufacthuring Pte Ltd [2016] SGPDPC 3; K Box Entertainment

Group Pte Ltd and Finantech Holdings Pte Ltd [2016] SGPDPC 1. Personal Data Protection Commission, Advisory Guidelines on Enforcement ofthe Data Protection Provisions (21 April 2016) at paras 25.1-25.3.

(cont'd on the next page)

52

with

Concerned

very

consistent with the Advisny Audelnes on Enfocement of the Protection Provsions 1SSued by the Commission, which sets out and mitigating factors that the Commission may

These some

De

ormation technology is involved, inffor

specially respondents I astlv, thosc will not with information

158

SGPDPC SGPDPC SGPDPC SGPDPC SGPDPC SGPDPC SGPDPC

they

too

financial penalty of $25,000 On The Commission imposed a Toh-Shi.15 The Commission took into account the fact that the

149 150 151 152 153 154 155 156

ecially if

53

Data

Protection

can

reconsideration

process, in sections 33

in

be to

the Practical

taken

35.

Context

The Practical and Conceptual Framework

through

an

The irst relevant

appcal

appellate

cess

body is but if there is concurre

which is set out Committee, an Protection Appeal the Data reconsideration, the a Commission for to the is Protection Appcal C application The Data deemed to be withdrawn. Commission and otherwise mat the remit the m a t t e r to mo y may Commission itself could have which the or decision o r direction taken could itself have Commission which the other such step take

mittee

2.70

direction is decision under noted that while a It should be direction or decision thar the of effect the reconsideration o r appeal, is not suspended, exccpt n reconsidered o r appealed is being or against the imposition of of appeals reconsideration applications for financial penalty.5 A decision the amount the or of a financial penalty Committee can be appealed to the of the Data Protection Appeal on a point of law or o n the amount of a Singapore High Court is a further right of appeal to the Singapore or

financial

penalty.164 There

in the case of decisions made Court of Appeal as exists of its original civil jurisdiction.l6 High Court in the exercise

2.

by

the

individuals

The penalty for the Act. for a term not imprisonment non-natural persons penalty for

is a

is

a

than

fine of up 12 months,

fine of not

more

to or

$10,000

than $100,000.167

2.73 that any person or organisation which Section 51(3)(a) specities or destroys records with intent to conceals falsifies, disposes of, alters, correct to o r access personal data o r information to evade a request to use o r disclosure of personal data, is subject collection, about the for and individuals $50,000 non-natural1 to $5,000 for a fine of up pcrsons. 68

2.74 Lastly,

or recklessly makes a false statement to anyone wh0 knowingly to mislead the or who knowingly misleads or attempts Commission, the o r powers under duties its of exercise the Commission in the c o u r s e of individuals is a fine an offence.The penalty for the Act also commits not more than 12 months, o r imprisonment for a term to $10,000 of up for non-natural persons is a fine of not more than or both. The penalty

(b)

Piercing the veil

2.75

The Act is

considerably strengthened

offences. The offences

procedural

so as

are

to ensure

with the inclusion of a number of

both substantive in nature as well as that there are no obstructions in the

administration of justice. Jurisdiction vests in the District Court to try

has power any offence under the Act and the District Court the full penalty or punishment in respect of the offences.

to

impose

situations Section 52 provides for the corporate veil to be pierced in there is Where non-natural committed are persons. offences where by a non-natural person, such as a an offence that has been committed by "" body corporate," a partnership, or an unincorporated association, then an officer or a partner or any member who manages who had, to through their consent or connivance or neglect allowed the offence occur, is also guilty of an offence, in addition to the body corporate,

partnership,

or

unincorporated association.

Offences under section 51

2.72 A general offence of obstruction or impediment can be foundn section 51(3)(6), which imposes criminal penalties on any organisation or individual that obstructs the Commission or an authorised officer or

the Commission in the performance of their duties or powers under 162

Personal Data Protection Act 2012 (Act 26 of 2012)

163 Personal Data Protection Act 2012 164 Personal Data Protection Act 2012 165 Personal Data Protection Act 2012 166 Personal Data Protection Act 2012

34(2).

(Act 26 of 2012) ss 34(3) and 31(2) (Act 26 of 2012) s 35(1). (Act 26 of 2012) s 35(4)

(Act 26 of 2012)

167 168

169 s

s

170

171 172 173

51 (5). s of 2012) 51(4) Personal Data Protection Act 2012 (Act 26 of2012) s 51(3)(¢). Personal Data Protection Act 2012 (Act 26 of 2012) Personal Data Protection Act 2012 (Act 26

s

Personal Data Protection Act 2012 (Act 26 of 2012) s 51(6). and Personal Data Protection Act 2012 (Act 26 of 2012)

ss 52(1)

Personal Data Protection Act 2012 (Act 26 of 2012) s 52(3). Personal Data Protection Act 2012 (Act 26 of 2012) s 52(4).

54.

55 54

or

both. The

$100,000.170

Criminal penalties

2.71

(a)

more

52(2).

Data Prolection inthe

Practical Context The Practical and Conceptual Framework

Unauthorised access

(c)

or

correction

2.80

2.76

some

safeguards for individuals

The remedies available

ao

hose The Act also provides other individal themselves as who who fraudulently represent + from themselves as having authority fraudulently represent access to or to chan offence to obtain individual. It is a n the individual Without the authori another of about personal data ,000 or imprisonmen is a fine of up to $5,04 individual." The penalty for o r both.175 months, than 12 term not m o r e

iniunctions

or

for this

declarations

private

action

are

wide-ranging,

damagcs and any othcr rclief

to

from

as

the

court thinks fit.

other

a

General penalty

(d)

4.

Employer liability for employees

2.81

The

Act is realistic and fair in its placement of liability in the and acts of an employee in the employment context. The conduct course of employment are treated as being done by both the employec

and the employer, whether

or

not

they

were

done

or

engaged

in with

the employer's knowledge or approval.76 The definition of "employee"

2.77 There is

"catch-all" penalty clause in scction 56 which: section provides the penalty where. natural persons. This An a

applies

general

only offence has no specific penalty expressly provided. Section 56 imno. poses not exceeding $l0,000 or imprisonment for a maximum a penalty to

term not exceeding three years or both. For a continuing offence it

also allows for further fines of up to $1,000 for every day the offener continues.

2.78

in the Act

includes

volunteers.77

2.82 This places the onus on employers to have systems, processes and procedures in place to supervise and monitor employees in the proper handling of personal data and to minimise any contraventions of the Act. Indecd, the Act provides a defence for the employer if the employer can prove that such steps as were practicable were taken to prevent the employee from doing the act or engaging in the

The slew of criminal sanctions in the Act, combined with the robust

conduct.8 It is thus imperative for employers to have sound policies

powers of the Commission, ensures the enforcement system has

and practices regarding employee conduct in the handling of personal data and to have checks in place to ensure that they are adhered to. A case in point is Aviwa Ltd and Toh-Shi Printing Singapore Pte Ltd,

significant power to deter.

where Toh-Shi's own employees breached its own procedures and

Right of private action

3.

2.79 Individuals who have suffered loss or damage directly as a result of a breach of any of the provisions in the personal data protection Obligations, namely, those set out in Part IV, V or VI of the Act, by an organisation have a right of private action for relief in civil proceedings section 32. The only proviso is that if there has been a decision

under

further, lapses occurred when its own quality control sample checks failed to spot the error as the sample checks were verified against the erroneously sorted file instead of the source data from Aviva.0 In the case of My Digital Lock Pte Ltd8 there was evidently no policy in place prohibiting employees from using an open social media platform such as Facebook to transfer personal data, which resulted in the employer being found liable for the breach by the employee in the course of employment.182

made by the Commission regarding a contravention of the personal data protection principles, then the private action regarding the same contravention cannot be commenced until all the

have been exhausted.

174 175

appeal processc

Personal Data Protection Act 2012 (Act 26 of 2012) s 51(1) Personal Data Protection Act 2012 (Act 26 of 2012) s 51(2). 56

176 Personal Data Protection Act 2012 (Act 26 of 2012) s 53(1). 77 Personal Data Protection Act 2012 (Act 26 of 2012) s 2(1). 78 Personal Data Protection Act 2012 (Act 26 of 2012) s 53(2). 179 [2016] SGPDPC 15. 180 Aviwa. td and Toh-Shi Printing Singapore Pte Ltd [2016] SGPDPC 15 at [16]. 181 182

[2016] SGPDPC 20.

My Digital Lock Pte Ltd [2016]

SGPDPC 20

57

at

[13]1-[14].

Data

Protection

Context in thePraclical

The Praclical and Conceptual Framework

levels and layers of. 2.83 is used, the apPpropriate the surreptitious cotri Where technology to prevent should be in place and access disclosure of personal use and and and subsequent should always be adopted. T. by design a good illustrasrin be personal data protection would I discussed in chapter Andreus case and appropriate technolOf training how crucial both employee should have been trainedgcal not to The hotel employees processes are. and not to accede to a stranger's , names of guests the disclose female celebrity, and the hotel's i next door to a to rent the room have been configured to hise should area telephone in a public room number of hotel guests.

data by employeelection

request

2.84 The Act also provides

have

a

employees

if

the

DATA INTERMEDIARIES

D. 2.86 data

act

was

done

or

the

conduct

engaged in

employee

was

ca

is defined in section 2(1)

data

defines "processing" the carying

on

as an

organisation which

organisation but does not organisation.87 Section 2(1) also

behalf of another

of that

other

in relation to

88 personal data as:

out of any operation or set of operations includes any of the following:

in relation

to

the

personal data, and

(a)recording;

in good

holdings

)

()

course

act or conduct must not have been consented to or connived in by the

organisation, adaptation or alteration; retrieval; combination; transmission;

(gerasure or destruction.

employee or be in any way attributable to any neglect on the part of the employee.85

intermediary

nrocesses personal include an employee

fai or in accordance with instructions oi of employment, in the course The employee in of employment. the employer in the by an instance must not be an otficer or someone Wno manages, and the

show that the

stringent

personal data.

..

defence for

DBS Hong Kong from liability if it did this may well absolve olicies and practices in place for the protection of

ed

invo

2.87

2.85 A case closer to home to watch on the interplay between employer and employee liability is the case in Hong Kong where some 20 DBS Hong Kong employees are being investigated by Hong Kong's anti-corruption agency, the Independent Commission against Corruption ("ICAC"). It appears that the employees had allegedly used bribery to obtain personal data of DBS clients which were then passed on to a call centre in mainland China offering telephone promotions for high-interest Some Hong Kong customers who received loan marketing calls

loans.

from people claiming to be DBS staff made complaints and DBS's internal investigation showed that the calls came mainly from the said call centre, even though DBS has never worked with the call centre on

telephone promotions. A report was then made to the ICAC for further investigations by the relevant authorities. It appears that the call centre shared commissions with the errant employees. It will be interesting to see whether DBS Hong Kong will be held liable for the personal data breaches of the errant employees but if bribery was 183 Erin Andrews v Marriott nternational Inc, et al 11C48311 (Tenn Davidson Co, 2016). 184 Personal Data Protection Act 2012 (Act 26 of 2012) s 48(1). 185 Personal Data Protection Act 2012 (Act 26 of 2012) ss 48(2)-48(3).

58

Processing is thus very widely defined and would appear to include any activity done in relation to personal data. As a consequence, the concept of a data intermediary and the scope of what a data intermediary can do is also extremely wide, ranging from those who offer document destruction services, to accounting and other organisations that provide payroll services, to those who provide courier services, even to freelance photographers hired just to take photographs at one event. Network service providers that merely act as conduits for the transmission of personal data will not be liable in respect of third party material in the form of electronic records to which they merely provide access.90 2.88 Whether a party is a data intermediary will depend to a large extent on the contract between the party and the organisation for whom it is 186

Lee Xin En, "MAS

monitoring

(9 December 2016), available

187 188 189

190

at

DBS

Hong Kong

case" The Straits Times

(accessed 9 December 2016).

Personal Data Protection Act 2012 (Act 26 of 2012) s 2(1). Personal Data Protection Act 2012 (Act 26 of 2012) s 2(1). Personal Data Protection Commission, Advisory Guidelines on Key Concepts in the Personal Data Protection Act (revised on 15 July 2016) at para 6.24. Personal Data Protection Act 2012 (Act 26 of 2012) s 67(2).

59

the Practical Context Dala Prolection in data. The

contract should

The Practical and Conceptual Framework

state clearlu

rights

processing personal well as the responsibilities cach party, as and obligations of and data, including wheth in relation to the personal liabilities

organisation is

to

process

personal

data

on

If the

behalf of

and One

for

the is silent or men for acceptanaly

contra tract

other organisation. purposes of the to another sent by one party consists of quotations both parties will occurs, Act the breach of payment, when a data Obligations to the full extent m

the personal Act. This was the case in

answer

to

KBox

Entertainment

where the scope of the

e Ltd and Croup Ple.

processing by

to

he

antech

Finantech

Ld both parties were held to the full extent Holdings K Box was unclear; Pte

dnd

ssible

for the breaches.

2.89

The Act does not "impose any obligation on a data intermediar in of personal data on behalf of and for the respect of its processing pursuant to a contract which purposes of another organisation

evidenced or made in writing," except in relation to the obligatione of personal data under to the security and protection section 24 and the retention of personal data under section 25,191 The

relating

organisation which has contracted out its personal data processing

activities is vicariously liable for any breaches of the Act by the data intermediary within

the bounds of the contract.

Hence.

organisations should engage data intermediaries that can and will with the personal data protection laws.

comply 2.90

In a few of the early cases, the Commission noted that the failure by the organisation to put in place data protection terms and conditions in its contract with the data intermediary instructing it to protect

personal data amounted to a breach of the Protection Obligation." Would an organisation which does have such a clause in the contract with its data intermediary be absolved from liability for breach of the Protection Obligation should the data intermediary not comply with the Protection Obligation? The question was answered in the 191

Personal Data Protection Commission, Aduisory Gruidelines Key Concapts in the Personal Data Protection Act (revised on 15 July 2016) at para 6.21.

192

[2016] SGPDPC 1 Personal Data Protection Act 2012 (Act 26 of 2012) s 4(2). Personal Data Protection Act 2012 (Act 26 of 2012) s 4(2). Personal Data Protection Act 2012 (Act 26 of 2012) s 4(3). See aiso Fei Fah Medical Manufacturing Pte Ltd [2016] SGPDPC 3. K Box Enlertainment Group Pte Ltd and Finantech Holdings Pte Ltd [zu 16] SGPDPC 1 at [42]; The Institution of Engineers Singapore |2016J Sur* C2 at [30].

193 194 195 196

on

60

eaative in the July 2016 case ot Cenlral Depository (Pte) Ltd and Tah Shi Printing Singapore Ple Lla." The contract had required the intermediary, Toh-Shi Printing. to take necessary actions and data to protect the personal data during the rinting process. The ommission did not find Cenral Depository recautionary

measures

Prcc

(Pte)

Ltd in breach

of the Protection Obligation.

198

2.91

in K Box Enterlainment Group Ple Ltd similar vein, the Commission also stated that in discharging its Pe Holdings Drotection Obligation, the data intermediary which was, in this case, information technology service provider, should have an outsourced K Box, of failings in the data security customer, its notified arrangements.20 If it had done so, the Commission would have taken In

a

nnd Finantech

Lud

this into account in its

2.92

assessment

of Finantech's

culpability 201

be possible for the contract data intermediary to include indemnity clauses to force the data intermediary into indemnifying the organisation that has hired it for any personal data breaches.

It is also not between the

entirely clear organisation

but it and

might

its

2.93 If the data intermediary acts beyond the processing required by the organisation under the contract, then the data intermediary will not be considered a data intermediary in respect of such use or disclosure. In such circumstances, the data intermediary will cease being a data intermediary and will need to comply with all the personal data protection provisions.22 Thus, it is imperative for organisations to be explicit and clear in their contracts with data intermediaries in terms of what processing the data intermediaries are contracted to carry out for the organisations. It should be noted that a data intermediary is only a data intermediary for the personal data that it processes for or on behalf of another. Hence, a data intermediary will not be a data

197 198

[2016] SGPDPC 11. Central Depository (Pte) Ltd and Toh-Shi Printing Singapore Pte Ld [2016)

SGPDPC 1l at [171-[18]. 199

[2016] SGPDPC 1.

200 K Box Entertainment Group Pe Ltd and Finantech Holdings Pte Ltd [2016] SGPDPC 1 at [37]-[381. 201

K Box Entertainment Group Pte Ltd and Finantech Holdings Pte Ltd [2016]

202

Personal Data Protection Commission, Advisory Guidelines on Key Concepts n the Personal Data Protection Act (revised on 15July 2016) at para 6.22.

SGPDPC 1 at [38].

61

Data

for

intermediary data as

personal

Protection

the personal

of its

oWn

in the Practical

data it

Context

holds for

The Praclical and Conceptual its

own

bses, such 2.97

employees.

conducive to effective objective standard. As will be the ovable feast of what is a chapters, remaining would consider to and what this reasonable person

it is currently data protection

as TheAct personal

seen in the

"THE REASONABLE PERSON"

oropriate

the

of

ndeed,

the

reasonable

person

would

ler

consider

appropriate

in

poses

the

"203

2.95 that organisations, in Act further states Section 11(1) of the consider what a should Act under the nable their responsibilities in the circumstances.204 The consider appropriate would person considered section 11, however it is decision Jump Rope (Singaporeh was incorrectly decided and case the submitted that the respectfully 6.206 more fully in chapter decision is discussed

meeting

of

2.96

law and how and what this of the "reasonable person" in works well where there is a think would only reasonable person of the "reasonable person". The consensus or clear understanding reasonable the person test in an area such as problem with using which is so strongly intertwined with data protection, personal technology, is that it is practically impossible to determine what such a use

reasonable person might consider to be appropriate in any given

circumstance. The fundamental question is: who is the reasonable person? The social media addicted younger generation will have very different views and understanding of what personal data protection is or ought to be that would colour their thinking of what is appropriate. At the other extreme could be an age group that clings to the

traditions and values of restraint and non-exhibitionism, whose views on what is appropriate will be determined by their values. Somewhere in between, there may be a group of reasonable people who have some knowledge of technology and have seen the grave dangers of personal data misuse. 203

204 205

Personal Data Protection Act 2012 (Act 26 of 2012) Personal Data Protection Act 2012 (Act 26 of 2012)

[2016] SGPDPC 21.

206 See ch 6,

at

s

3.

s

11(1).

62

not

the

most

an

challenging

to

achieving

useful bascline

ENCOURAGING COMPLIANCE

2.98

data protection regime is in place and appears issues, including giving the Commission material the to cover all be done by the Commission. could more Substantial powers, the

personal

2.99 has been proactive and has issued a considerable The Commission and guides, which are publicly accessible on its number of guidelines commendable. are constantly updated which is, indeed, These website.207 assist in to documents these for compliance is by However, if the aim the Commission ought to make it easy for organisations,

organisations, abreast of the updates or changes by including individuals, to be kept made to the guides and guidelines, or at amendments highlighting the older versions of the documents the of archive an least, keep the very which comparisons can be made. This will enable on its website, with to, at a glance, ascertain which sections have been

organisations amended or updated, instead of trawling through multiple guides and guidelines from scratch, some of which are over 50 pages long, each

time the Commission issues an update. The Commission ought to make it easier and not more difficult for organisations to comply. In any event, as a matter of best practice, procedural fairness would entail

the organisation have access to a publicly available document which

the Commission has issued in the past and which the organisation may have followed but yet, the organisation may still face investigation over an alleged breach of the provisions in the Act. 2.100 Secondly, the Commission has yet to educate the community at large on the dangers, risks and consequences when personal data is misused.

It has thus far not seemed to realise that the best catalyst for organisations to comply with the pesonal data Obligations is pressure

207

paras 6.32-6.44.

is

it lacks

F.

A/hile

circumsances.

The

as

protection.

need of

individuals

organisations a

r c a s o n a b l e person" reter to the er section around 3, ccentres stated in as

in the Act

of the Act, data and the the their personal to protect data for personal disclose use o r to collect,

intention

right that

drafted

sonable person will prove

E.

2. 94 Many provisions

Frameauork

https://www.pdpc.gov.sg (accessed 16 February 2017). 63

Data and expectations organisations, organisations

in

one

way

individuals

Context

in the Practical

individuals,

from

and

Protection

are

Jnless

aware

fully

misuse

the

all,

Unless

another.

or

of

after who a r e

The Practical and Conceptual Framework the

custon

and and

unt

of the of

stomers of

unüil risks,

both dang ECs,

personal

as

by organisations with liability and 1, compliance highlighted in chapter will be, at best, h a l t - h e a r t e d and lukewarhe . obligalions personal data consequences

CONCEPTUAL

G.

FRAMEWORK

OF

DATA

PERSONAL

REGIM

anObligation

but

one

that

1s

not

well

undcrstood

nor

importani complicd with.

use o r disclosure of thc individual, c o n s e n t from thc onal data has use o r disclose the pcrsonal data.212 colled person required t o dividual is lematic as it encompasses the c o n s e n t is of issue the However, which complicates the application of the deemed consent, conccpt of

2.106

f o r the Gh after the purposes becn notificd

collection,

to the

Obligation of Consent.213

101 The

personal

which

must are

consent

data

protection

regime

has

Concepts

a

of key conce personal dataP and

number

such

as

be understood. understanding of fundamental to the

how the

reo

operates. .102

what docs excluded from

data"so

to "personal not legislation only applies th "personal data" is immediately as will be seen in chapter 3, "personal application of the Act. However, a n d it has many complexities

The

constitute

data" is

not

an

to grasp easy concept the definition.

intertwined within

2.103 data a r e excluded from the Second, certain types of personal business c o n t a c t information so for example, of the Act, operation the to recourse personal data protection can be handled without Act.2 Obligations in the

2.104

Third, once something is classified as personal data, before any collection, use o r disclosure of the personal data is carried out, the of the individual must be noified of the purpose or are there data. the However, collection, use or disclosure of personal

purposes

exceptions.210

107

for the requirement of however, also cxceptions circumstances set o u t in within the lalls data that conscnt. For personal F o u r t h Schedules, there a r e copious lists of and Third the Second, not required for collection, use o r s situations whereby consent

Sixth,

there

are,

disclosure of the

personal

data.211

2.108

need to

data would organisation holding any personal data protection Obligations set out in the personal comply with such as access to personal data by Parts IV to VI of the Act, Obligations about the individual by the held data of the personal an individual correction of personal data and security of personal organisation," will need careful data.216 Some of these principles o r Obligations between the will be there as overlap consideration and implementation the principles and s o m e of the other provisions that may of application For example, even if a piece of personal data prove to be confusing. in the above-mentioned falls into the categories of the exceptions and use Schedules and do not require c o n s e n t for collection, for have the example, to right, disclosure, a n individual appears to still of that disclosure use and piece of the collection, withdraw c o n s e n t for is not the case. this in examined 5, will be as but chapter personal data, There are n u m e r o u s such intersections in the implementation and them to real life situations c a n of the Act and

Seventh,

an

application prove to be perplexing.

applying

2.105

Fourth, there is a limitation on the permissible purposes of the collection, use or disclosure of the personal data.2 This is an

208 209 210 211

Personal Data Protection Act 2012 Personal Data Protection Act 2012 Personal Data Protection Act 2012 Personal Data Protection Act 2012

54

(Act 26 of 2012) s 3.

(Act 26 of 2012) s 4(5). (Act 26 of 2012) s 20. (Act 26 of 2012) s 18.

212 213 214 215

Personal Data Protection Act 2012 (Act 26 of 2012) s 13. Personal Data Protection Act 2012 (Act 26 of 2012) s 15. Personal Data Protection Act 2012 (Act 26 of 2012) s 17 and Second, Third and Fourth Schedules. Personal Data Protection Act 2012 (Act 26 of 2012) s 21.

216

Personal Data Protection Act 2012 (Act 26 of 2012) s 22.

65

Data Protection in 2.109 Eighth,

the Practical Context defin the perso

are not

the

terms

and "disclose "collect", "use", of of the e s s e n c e of are

personal

the

part data though they Act, in the e x a c t meaning m a ult in The uncertainty regime. a s c e r t a i n whethe protection to per be problematic where it may"collected", data has actually been "used" or "disclosed". Furthaona] re, situations even

disclosure

is

a

form of

doubts about what else "use".217 the notion of

2.110

use

and

might

the

be

inclusion

of

excluded f r o m

framework

the broad conceptual and this b0ok data protection regime issues, topics and individual dissecting the

This is

disclosure understand

the

ve

of

CHAPTER 3

The Concept of Personal

Data

Singapore ne this framewO requirements of the reai of the

will

use

3.1

The centrepiece of the Personal Data Protection Act 2012 (the "Act") is the concept of personal data,' around which all the provisions evolve. Conceptually, the definition in the Act is a fairly standard of many jurisdictions, as well as in one found in the legislation such as the European Union ("EU") Data framework legislation Protection Directive 95/46/EC and the General Data Protection Regulation 2016/679.3 The definition, however, though seemingly

simple, has generated multifaceted complexities in its application.

A.

DEFINITION IN THE LEGISLATION

3.2 The term "personal data" is defined in section 2 of the Act to meaan "data, whether true or not, about an individual who can be identified

2(1)

Personal Data Protection Act 2012 (Act 26 of 2012) s of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the on the data

Directive 95/46/EC 3

217

4

See further ch 5.

66

processing of personal data and free movement of such [1995] OJL 281/31 ("EU Data Protection Directive 95/46/EC").

Regulation (EU) 2016/679 of the European Parliament and of the Counciltoofthe27 April 2016 on the protection of natural persons with Tegard processing of personal data and on the free movement of Such data, and repealing Directive 95/46/EC (General Data Protection Regulation) ("EU General Data Protection Regulation 2016/679"). Personal Data Protection Act 2012 (Act 26 of 2012) s 2(1).

67

Data Protection

inthePractical other

and from that data access". to have

or from that data; has o r is organisation

Context

(the "Commission")

Personal Data Concepts in the

that the

definition

construed and

which the

likely

3.3 noted that the Personal Data it should be At the outset, stated in thc Adv Commission

TheConcept of PersonalData

information to

Protection

Acé "is

p...

otecton Advisory Guidelines on Key idelines

("KeyConcepts not

intended to be

narro of personal data data from which an individual wly

covers

can De

all types of

identified".6

3.4

of this definition is that if an individhat

The simple understanding be identified from that piece

of data or from that piece of

ann

ta then the iirst piece data or combination with other informaton, data. lt sounds simple information constitutes personal Guidelines given bu L even some of the Advisory

of

but,

unfortunately,

Commission

have served

fuel confusion."

3.7

exactly does "data" and "information" about an individual encompass? In effect, most data "about' an individual falls into three broad categories that are not mutually exclusive: data with some

So what

about an individual; data with a purpose element about individual; and data with a result element about an individual.

content

3.5 There

1.

to

the

but the usage of two terms may have resulted from sutltation papers, sponding to the feedback from the consultation rounds. In the initial Public Consultation, the definition for "personal data" ata Protection, "information about an referred solely to the term "information", identifie or identifiable individual", which is a definition commonly such as the EU. Due to concerns raised found in other jurisdictions in the meaning of "identifiable individual", of clarity" about the lack of "personal data" was changed in the legislation definition the final and the result was to encompass both terms. The term to clarify information" could perhaps be argued to be a more general and common term. The term "data", on the other hand, perhaps more a more technical term. This, however, is neither here nor be to seems have the same meaning. there as they both

are

three

preliminary points to note about this definition,

an

3.8 The content element category of the concept is probably the easiest to comprehend and would certainly include any statements about an

"Data" and "Information"

3.6 First, the terms "data and "information" are both not defined in the legislation, so they should be interpreted in their ordinary meanings. The two terms seem to be synonymous according to many dictionaries, which means "information" and "data" appear to be interchangeable terms and any reference in the legislation to one can be taken to mean the same as the other. This, of course, raises the question of why the Legislature chose to use two different terms

individual and would cover "objective" data, such as a person's height, age and weight, as well as "subjective" data, such as opinions or

assessments.2 Often recorded subjective data would include assessments about an individual's credit worthiness, the person's risk of developing health problems, and the performance of an employee. Examples of data with some content about an individual would also include any results of medical tests conducted on the individual and any information contained in a company's folder under the name of an individual, whether an employee or client.

rather than one. No indication of the reasons can be found in the 9

5 6 7 8

Personal Data Protection Commission, Advisory Guidelines on Key Concepis in the Personal Data Protection Act (revised on 15 July 2016). Personal Data Protection Commission, Advisory Guidelines on Key Conceps in the Personal Data Protection Act (revised on 15July 2016) at para 5.2. See

paras 3.50-3.114 below on anonymisation. See, eg Cambridge Dictionary Online

(accessed 23 May 2010), Webster Merriam Dictionary Online dictionary/data> (accessed 23 May (accessed 23 May 2016). 68

10

11

Ministry of Information, Communications and the Arts, Public Consultation Issued by Ministry of Information, Communications and the Arts: Proposed Protection Bill (19 March 2012) at para 2.1. Ministry of Information, Communications and the Arts, Public Consultation Issued by Ministry of Information, Communications and the Arts: Proposed Personal Data Protection Bill (19 March 2012) at para 2.2. See also EU Article 29 Data Protection Working Party, WP136,

PersonalData

Opinion 4/2007 on the Concept of Personal Data (adopted on 20 June 2007) at 10. 12

See also EU Article 29 Data Protection Working Party, WP136, Opinion 4/2007 on the Concept of Personal Data (adopted on 20 June 2007) at p 6.

69

the Practical Context Data Protection in

3.9

that the

data can

The Concefpt of Personal Data be true

explicitly specifies subjectve data, such as assese the objective or if even hence, c o n s t i t u t e personal data would still turn out to be untrue, they

The

definition

false,

ents,

impact, other

the

the types of about the individual's such as their work roles' individual, the as well activities undertaken by behaviours. This leads to the purpose eleme economic as social and hnt where the data is used o r is likely to use category of the concept, in a certain way or influence treat with the purpose to evaluate, of an individual." This category may encomna status or behaviour information conveyed by the data concer situations where the information

primarily objects in the first instance and not individuals. Those ahiects

but have some pnysical or geographical belong to someone else proximity with individuals or with other objects, or they may be der

may

have an impact upon individuals. It i the control of individuals or that it can be considered that the connection indirect the because of data relates to those individuals or those objects. 3.11 An example of this category might be the log of a particular telephone extension number of a company office which provides information about the alls that have been made to and from that telephone. The telephone log can be brought into relation with different individuals, The telephone extension might be under the exclusive control of a certain employee during working hours and calls are supposed to be made by the employee. The call log will provide information about whom the employee has called. The telephone can also be used by whomever is allowed into the premises in the absence of the employe, for example, when the employee is on leave. The call log can be for example, for the purpose of checking how many phone calls and

used,

the duration of the phone calls that the employee makes and whether they are personal calls to numbers that are unrelated to the job responsibilities. Here, both outgoing and incoming calls would contain information concerning individuals' private life, social relationships and communications, and these can be used for some purpose or

other. 13 14

of the concept, this is where the the result lement category garding an impact on an individual, or the to have data is likely use of and interests. The impact need not be a major

individua

3.10 doCs not specify or lim: it 2 of the Act The definition in section be personal data, r can data kind of hence any type of data, characteristics to the

from

3.12

as

rights

long

as

the

individual might be treated differently from

as a result of the processing of such data. So the

persons

dividual could, for example,

be

tagged

indivie

given a

certain status.

3.13

A evample of this might be the monitoring of credit card transactions Financial institutions often have a department h financial institutions. monitors credit card transactions, with the purpose that continuously

weeding out dubious-looking transactions, especially those irom overseas or online transactions that seem transactions originating The purpose of this 1s to prevent credit card fraud at the fraudulent. before huge sums are committed. The earliest instance, especially the monitor to purchasing habits or the movements of nurpose is not data can be used for such purposes, for the holder. Yet, card he Credit from the shops of example, if a customer is consistently purchasing of

the financial institution may well tag the luxury brands, then status possibly as a high net worth individual, accordingly, individual's individual who spends but does not save. The classification or even as an itself would be enough for the result element category.

3.14 One form of data about an individual that transcends all categories might be biometric data. With the advances of technology, biometric data has increasingly been collected and used for identity verification purposes, especially at border controls. Biometric data can be said to

be about the individual's characteristics in that they can be biological

or physiological characteristics, such as fingerprints, retinal patterns, birthmarks, voices, and even hand geometry. These are all about the individual and because some biometric data is unique, they can also identify the individual by providing the unique link. So, biometric data can function as "identifiers" to identify the individual. The analogy would be that instead of identifying an individual by name, the individual can be identified by his or her thumbprint. Whilst it is true that the current technology used to measure or compare a person's thumbprint patterns against a record of a thumbprint may not yet be faultess, the fact that a certain degree of probability is involved does not disqualify the thumbprint from being personal data.

Personal Data Protection Act 2012 (Act 26 of 2012) s 2. See also EU Article 29 Data Protection Working Party, WPI30 Opinion 4/2007 on the Concept of Personal Data (adopted on 20 June zv at p 10.

70

or

71

Data

Prolection

in the Praclical

Context

The Concept of Personal Dala

Format of data

3.17

O t h e r than han

3.15

is of data. This is

format

the

also

mats for

not which the da data is The the form in or the Act5 and the Act is technology prescribed by ogy definition in as the e l e c t r o n i c and non-electr ronic stored is unimportant data in personal covers both is data hence as even transferred and consistency looieOm is to e n s u r e This is indecd a forms. This vice versa. and media and second

point

concerns

collected

eutral

it

be

to

digital

sensible

approach.

database

or

Data

need

not

in a str structure care in implement

non-electronic

of the data would comprise

torms

of data, other possible

presentation mode, whcther

using alpha-numerical, graphical, photographical, as videos. both sounds and images such through

presented

sounds

or

r

paper

or

electronic

To

3

identify a n

individual

contained

be

much should take file. Organisations to e n s u r e the same level of data protection policies their personal forms. Many organisation data in both still and paper, some protection for personal data using pen then collect and process personal electronic tormat, hence even the data into transfer the personal to the personal1 adhere data itself needs to conversion process

3.18

The third prcliminary

being

able to

ot

point

identify a n

defined

concerns

the issue of what is

individual from the data. The term

international data in the Act and in

meant

by

"identify"

protection law

be able to single out a to identify" concept arlance, the a person from other individuals and to person or to distinguish is

means to

park

discover

who the

person is.

protection principles.

3.19

3.16

data is collected

and in later chapters, if personal As will be elucidated non-electronic means, then there may he stored using subsequently for the protection of ditferent pieces of differing considerations some pieces of same the piece of paper. For example, personal data on others whilst should be data can be retained for longer

data" in the Act:9

more clarity to data that is 'identifiable' that was used in the has been removed and replaced with 'who can be DP public consultation that information (whether a single identified'. However, it maintains the position that relates to an or a group of information taken together) piece of information individual will be considered personal data. [emphasis in

personal a compliance challenge if the destroyed sooner. This may pose handwritten data collection the original has simply kept organisation draw

typical example of typically collect the

form. A

this would be name

and

a

lucky

contact

place"

destroyed

The

form which

if

form also asked questions about opinions on competitors' products, such answers would be irrelevant to the subsequent marketing purposes and would need to be destroyed.

17

ssued by Ministry of Information, Communications and the Arts: Propose Personal Data Protection Bill (19 March 2012) at para 2.9. Itwould be difficult to find any legitimate legal or business purpose retain such information under s 25(6) of the Personal Data Protection Act 2012 (Act 26 of 2012). Furthermore, retention of this kind o

information would arguably be

prohibited under s 18. 12

also aims

to

provide

term

3.20 MICA proceeded to state in the following paragraph that the new definition "is not significantly different in effect from that which was earlier proposed and its principles are similar to internationallydefinitions of personal data".From this clear stance, the

adopted

of 2012).

Personal Data Protection Act 2012 (Act 26 Ministry of Information, Communications and the Arts, Public Consultaton

definition

identified or identifiable original

18 15 16

new

identifiable'. In this definition, the

information of the

would individual. As most lucky draws have a marketing element involved, individuals' names and assuming that consent is obtained to retain the contact details for contacting them for marketing purposes, all other information on the lucky draw form would probably need to be So, for example, the after the lucky draw has taken

Communications

view of the Ministry of Information, This was also the in the Public Consultation Issued by Ministry of ("MICA") Arts and the Prolection Communications And The Arts: Proposed Personal Data nformation, to the amended definition of "personal relation in 8 stated it Bil where

19

20

Ministry of Information, Communications and the Arts, Public Consultation Issued by Ministry of Information, Communications and the Arts: Proposed Personal Data Protection Bill (19 March 2012). Ministry of Information, Communications and the Arts, Prublic Consultation Issued by Ministry of Information, Communications and the Arts: Proposed Personal Data Protection Bill (19 March 2012) at para 2.6. Ministry of Information, Communications and the Arts, Public Consultation Issued by Ministry of Infomation, Communications and the Ars: Proposed Personal Data Protection Bill (19 March 2012) at para 2.7.

73

Data

Prolection

jurisprudence

in thePractical Conlext

from

international

guidance and "identifiable" can "identificd" o r meaning of

be

The Concept of Personal Data sources

referred to.

on

the

In this way, it can be seen that the name of is not necessarily cquivalent to the "identity" of the an of a n individual in this example would be a The dividual. but not a unique identifier. A person's name is data useful "that reveals that he individual uses that combination of letters and nds to distinguish himself and be distinguished by other persons SOhom he establishes relations"" If a person has a purple in the shape of a star, that would arguably be a on his head hirthmark b i more unique identifier than the name of the person.

height

of the

ividual. indivic

individual

name

h

3.21 Party ("WP29") Data Protection Working The EU Article 29 "identified" when ateq considered as be can na that an individual from all other he or she is "distinguished" of persons, group that a n individual "is 'identis follows from this of the group. It nocele not been identified yet, it is has when, although the person 22 The WP29 suffix able')" of the do it (that is the meaning threshold condition in practice the is latter the that noted

nembers

ssible to h

3.22

"identitiable" require that a perso being "identified" or name is only one of many identifiers A person's name be known? individual 's name to be discovered would not be necessary for an to distinguish this individual from all able satisfy this. The key is being

Would

other individuals.

3.23 As already discussed above, fingerprints are also identifiers. Identifien

are data that hold a particularly close relationship with the particular individual. Some identifiers such as fingerprints and an individual's full name are so uniquely linked to the individual that a person can (often) be narrowed down and distinguished by that one identifier alone. Other identifiers will not have that close nexus and will not be sufficient to achieve identification on its own. So, for example, a common Chinese surname in Singapore like Tan or Lim will usually not be sufficient to identify someone, but if a Mr Tan is present in a room with other persons who are all non-Chinese, that is, he is the only ethnic Chinese person in the room, Mr Tan can most likely be identified. 3.24 The name of an individual is the most common identifier but in some instances, where there is more than one individual with the same identical name, in order to distinguish the individual accurately, the name has to be combined with other of such as the information pieces date of birth, the address or even known such as

physical attributes

22

3.25

TAc

determining identifiability.

21

identifier

u

EU Article 29 Data Protection Working Party, WP136, Opinion 4/200 the Concept of Personal Data (adopted on 20 June 2007) at p 12. EU Article 29 Data Protection Working Party, Opinion 4/200 the Concept of Personal Data (adopted on 20 JuneWP136, 2007) at p 12.

74

personal data as data about an individual who can be

require a person's Derson or to point out

that it is this individual

that individual. The pinpoint a certain to name, otherwise, the identity by Derson, not necessarily have inserted the extra words "by name". It should would Legislature that once an individual can be singled out, in this be noted, however, is often not dificult to discover the person's name. The it digital age, of being able to identify an individual is essentially about being able to single out the flesh and bone individual. or

be able to est in the Act is thus only merelythe toindividual

concept

3.26 Lastly, it should be noted that the Act is worded such that it requires the data to be able to identify an individual. This means that it must not be a mere hypothetical possibility. If the possibility does not exist or is negligible, the individual should not be considered identifiable and the information would not be considered as personal data. As the Commission has stated with respect to anonymisation, to re-identify means to be able to identify an individual beyond doubt and not just the ability to identify an individual through educated guessing.25

23

24 25 0

defines

identified, hence, to identify an individual would not necessarily name to be known, only to be able to distinguish the

Working Party, WP136, Opinion 4/2007 EUArticle 29 Data Protection the Data 13. Concept of Personal

on

(adopted on 20June 2007) at p Personal Data Protection Act 2012 (Act 26 of 2012). ersonal Data Protection Commission, Advisory Guidelines on the esonal Data Prolection Act for Selected Topics (revised on 20 December 2016) at paras 3.32-3.33.

75

Dala Protection

in the Practical

Context

The Concept of Personal Dala

level Personal data: Basic

the

area

concept

3.27

levels. At the most basic level individual, then the informati."a n is identify an of information can examples of personal data: t the Obvious data.

the Act has The definition in

piece regarded

as

two

personal

name,

photograph

or

see

3.28 can

be

true

or

false,

infor

Consultation

3.30

as the detinition encompase..

both true and untrue data. This means that a piece of informatioon, an individual by itsele which can be used to identily even if it is false but would still satisfy th information, other with or in combination data that could constitute personal data might be. definition. False for example, a photograph of photograph that has been doctored, onto an existing photograph person's face might be superimposed individual who was in the the was it really making it look like The photograph by nature of it being

a

compromising position.

doctored would be false data, but this, în accordance with the data. In this case. definition, does not disqualify it from being personal the individual can be identified through the photograph of the face.

5.

protection at the international level. There, the

was

nnal Data

include a person's basic level would y biometric information h a person's face, camera image of to the individ. are these unique of scans. Each fingerprints and iris themselves identify an individo most cases by in therefore can and

The information

of data of data

was simply defined as any information relating to an hile individual", which cssentially means that from the "identilia can be identified and which a n individu. would, of formation, the possibility ofcombining the information with other include se, finition of "personal data" in the Indecd, the original rmation. had Public definition, but it was amended due to respondents requests for a clearer definition.2 in

used this

deliniuon

This cxpanded level ot the fnformation that would otherwISe

serves

to

encompass much personal data. In the definition at this level is not overly wide, the order to ensure the ambit of the definition adopted by the ntrol test to limit with which Legislatur is that the other piece of inform Singapore original data is combined must be one that the organisation has or not

be considered

cont

the

is likely to

have

access

to.28

3.31 to Singapore and it narrows the This control test is relatively unique In other somewhat. definition the jurisdictions such as the EU of scoDe Canada, there is no such control test. In the EU Data Protection Directive 95/46/EC,23 Recital 26 provides that "account should be taken of all the means likely reasonably to be used", with the result that many courts in the EU have interpreted this to mean that if there is any piece of data that exists and can reasonably and possibly be used to

and

combine with the first piece of data to identify an individual, this will

Personal data: Expanded level

render the first piece of data to be personal data. 3.29 The second and more expanded level of the definition of personal data can be found in the latter half of the definition. At the expanded level of the definition, data which by itself cannot identify an individual can become "personal data" if, when combined with other information that the organisation has or is likely to have access to, can identify an individual. The inclusion of this concept of identification through combination of data is crucial in the digital age, where much data can be quickly and easily combined and matched. This concept was adopted by the Organisation for Economic Co-operation and Development ("OECD") in the 1980 OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data, one of the earliest initiatives 26

1980 OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data (accessed 23 cl May 2016), 76

1(b).

3.32 Recital 26 of the EU General Data Protection Regulation 2016/679 has also confirmed this approach and states that: account should be taken of all the means reasonably likely to be used, such to identify the natural person directly or indirectly. To ascertain whether means are reasonably likely to be used to identify the natural person, account should be taken of all objective factors, such as the costs of and the amount of time required for identification, taking into the available technology at the time of the processing and

assingling out..

consideration

technological developments

27 28 29 30

Ministry of Information, Communications and the Arts, Public Consultation LSSued by Ministry of Information, Communications and the Arts: Proposed Protection Bill (19 March 2012) at paras 2.1-2.2.

ersomal Data Personal Data Protection Act 2012 (Act 26 of 2012) s 2(1). EU Data Protection Directive 95/46/EC, Recital 26. EU General Data Protection Regulation 2016/679, Recital 26. 77

Data Protection in

3.33

2016/679 does r e refer to Data Protection Regulation to be considered but ir them and require "all objective factors" tactors in the assesen consideration of subjectuve not preclude the This is illustrated in to be used. likely of the means reasonably addresses that will be disee Protocol (P) on Internet

The EU

General

discourse

below. 3.34

become personal data if data will only the In Singapore, the access to the second piece of dar have data. or is likely to has organisation of data to would limit the second piece that In practical terms, this obtain. This, o n the face of can feasibly t, which the organisation that is in the public domain, or which he would mean that any data o r otherwise, or throu obtain through purchase gh organisation can will render the original piece of dato other means, some obscrvation or data if it can be used in conjunction to identif constitute

personal

to

The Concepl of Personal Data

the Practical Context

the individual.

data

specify that the data that the organisation The Act, however, does has or is likely to have access to must only be accessible through legal

inder the purpose would sit under

this

personal

data.

home

identify

3.38

an

numbers, technically, only a small number of entities both a person s name and the person's NRIC number.

erarding NRIC

should hold number has been and continues to be Tnfortunately, the NRIG in too many contexts in Singapore, and and equested far too often residents have willingly given and permanent many Singaporeans

their

NRIC numbers,

even

for mundane purposes such

as

low

ade Jucky draws. As a result, ists containing a person's name and these of course can be obtained and used NRIC number abound and individual. to

3.35

nent

category and result element lecvel of the definition expanded of data the more familiar content category of with data, along of ldentification Card ("NRIC") numbers, National Registration numbers, IP addresses, credit card ddresses, c a r plate would all be personal data under the numbers and telephone numbers of infornation can be used to as all these picces level nded individua when combined with other data. 3.37

Much category of da

match and identify a n

not

considerations of legality should be entered into. Whilst this may seem an odd proposition, the reason is as follows, means,

and

as

such,

no

the enactment of the Act, Singapore had a rampant culture of combined with the collecting and sharing personal information. This, for the of 19 section in personal data collected allowance set out Act Prior

to

before the enactment of the Act, means that there may still exist

numerous avenues one can obtain data which might appear legal but which might actually fall into the shades of illegality.

3.36 It should be further noted that the definition in the Act only refers to information to which the organisation has or is likely to have access. There are no other factors other than "information" delimiting the control test. Hence, all other factors such as the means available to the organisation, the purposes of the organisation for the data, the advantage expected by the organisation, the interests at stake or even the costs involved to combine the pieces of data need not and should not be considered.

3.39

these can also constitute personal data. terms of home addresses, at an address, other data While there may be muliple persons residing can be used to identify the resident of attributes the such as physical if the data comprises of a For in example, individual question. the residential address, Address X and other information which the organisation has access to indicates that the particular individual is 60 elderly and there is only one person at Address X who is over years can be used as it data be X would Address of age, then clearly personal in combination with other information to identify the elderly person. At this juncture, recall that identification does not require the name of the individual to be known, only to be able to single out

In

the individual

and to know who the person is. Other physical attributes that can also constitute information with which to combine and identify individuals

would include the height, build, colour of hair, length of hair of a person and so on. 32

See EU Article 29 Data Protection Working Party, WP37, Priuacy on the

Internet-An Integrated EU Approach to On-line Data Proleation (adopted on 21 November 2000); EU Article 29 Data Protection Working Party,

WP136, Opinion 4/2007 on the Concept of Personal Data (adopted on

31

Personal Data Protection Act 2012 (Act 26 of 2012) 78

20 June 2007) at pp 16-17; Patrick Breyer v Bundesretrublk Deutschland Case C-582/14, Opinion of Advocate General Campos Sánchez-Bordona delivered on 12 May 2016); EU General Data Protection Regulation s

19.

2016/679, Recital 30.

79

the Practical Dala Prolection in

3.40

Context

The Concetpl of Personal Data

Commission, in the unhelpful that Key view that the Concepts Guidclines, cxpressed dlata will depend. or set of data is personal Iw]hether a certain piece the in a certain situation an individual context. Data that may identify no individual's residential addrese On this

point,

the

it is rather

an

example, individual's personal data. While thio:olten regarded as forming part of the about the individhhe as part of other data if the address is collected or the addrese information, contact and other example, with his name its in other contexts. data be not personal oWn may in

another.

For

delivery neighbours, delive

persons, contractorS and so on. The Commission

overlooked the definition in the Act. appea

3.44

Car

plate

numbers,

potenti:

IP addressCs and telephone numbers data for much the same reason as

nersonal

other data to allow family members that peopledo

be combined

can

all

they can all identify individuals. Although it is true

with

and friends to drive their cars, is small and limited

the number of persons permitted to drive

red to the whole world. Indeed, it is this narrowing down of to a much smaller group that makes the individu task of possible identifying an individua relatively casy when other data is combined, is at the core of why personal data has been defined as such and this decades now. A piece of information will take on for several the of personal data when the number of possible individuals to comparedto

3.41

the Commission is not present in th. This notion of "context" raised by Commission generates conf6 the Act and reference to it by sion, sets the control test as whether o r Act the simply The definition in the other to access informatin has or is likely to have

ion;

the organisation

contexts which can give a skeu the Act makes no mention of data" and also thercby di of lute impression of the meaning "personal

the definition.

aracter

it can be applicable is substantially narrowed, and when it is

mbined with other information, makes the identification of the indiv Dossible. This is truly the key to the concept of personal data. Personal data is information that assists in narrowing down

3.42

The example which the Commission gave concerning the notion of

notential individuals and when combined with other information. the individual can be singled out and the identity of the person discovered.

"context" is equally unhelpful:s4 A business wishes to sell its products to households within a certain area

around its location. It engages a service provider to distribute flyen advertising its products to all residential addresses within the area without

3.45 This is also the

reason

why

even

IP addresses

can

be

personal

data.5

Each computer connected to the Internet must have a unique

collecting or using the names or other personal data of individuals living at

IP address, so if the same employee is using the same computer every

those addresses. The residential addresses would not be personal data collected and used by the business.

day at a set time, and the IP address is not dynamically assigned (random) each time, then the IP address becomes personal data because it would be possible to identify the particular employee through the IP address when combined with information about all the employees who use that particular computer and at what time they used the computer. Even the information keyed into the computer by the employee can be used to connect the employee to the IP address.

3.43 The Commission's conclusion that the residential addresses thus collected would not be personal data is rather dubious. Just because the business does not collect or use the names or other personal data of individuals living at those addresses would not automatically disqualify the residential addresses from being personal data. The control test in the Act is whether the business has other information or is likely to have access to other information that can be combined with the addresses to identify the individuals. Such other information would not be difficult to obtain as residents' names would often be known to

This kind of information to link a computer or IP address to an

individual would be of relevance and great importance in many situations. For example, organisations that use cookies on their websites to track the website visitors may use the information for 35

See EU Article 29 Data Protection Working Party, WP37, Prvacy on the Internet- An Integrated EU Approach to On-line Daia Protection (adopted on

21 November 2000); EU Article 29 Data Protection Working Party, 33 34

Personal Data Protection Commission, Advisory Guidelines on Key ConcCps in the Personal Data Protection Act (revised on 15 July 2016) at para 5.12. Personal Data Protection Commission, Advisory Guidelines on Key Conceia in the Personal Data Protection Act (revised on 15 July 2016) at para 5.12.

80

WP136, Opinion 4/2007 m the Concept of Personal Data (adopted on at pp 16-17; Patrick Breyer v Bundesretrublik Deutschland Case C-582/14, Opinion of Advocate General Campos Sánchez-Bordona

20June 2007)

(delivered on 12 May 2016); EU General Data Protection Regulation

2016/679, Recital 30. 81

the Data Protection in

Practical Context

The Conceptof Personal Data

when compromising or or in times purposcs, to e m a n a t e from the com have been found activities or materials the offender. used to identify information can be commercial

nputer,

the

3.46 With respect

to

dynamically assigned

IP addresses,

Advocate

General

in Mav ("AC") 2016

the Campos gave his opinion in the cas Court of Justice ("CJEU"), which deal e European Federal Reprublic of Germany, with of Patrick Breyer v stated that:7 AG The IP addresses. assigned dynamically 1or the provider of Inter address must be classified, A dynamic IP the existence of a third data in view ot Sánchez-Bordona,

Manuel

as

(the Internet

3.47 He came to this

noting that Recital 26 of the Data based on there being a reasonabie was 95/46/EC Protection Directive which tuned on looking at whether he chance of identification, the data is reasonable: possibility of access to only if the conditions governina Information may be obtained 'reasonably first of which being the lepa are satisfied, the data of kind that access to t to others. It is true that the he and transterring possibility of retaining refuse to reveal the data concerned bu Internet access service provider may The possibility that the dala may be transfered the opposite is also possible. transforms the dynamic 1IP address, in acordane reasonable, itself is which perfectly nto personal data for the provider of services 95/46, 26 with recital of Directive on

conclusion

after

the Internet. [emphasis added]

3.48 test in the Singapore legislation This also illustrates that the control of narrower personal data than in the EU. concept a results in slightly other some piece of information exists and By and large, in the EU, if to be combinable and may taken be it can can be reasonably obtained, not the case in Singapore This is data. be to data render the personal information with which of due to the requirement that the other piece

Opinionof 12 May on

36

Patrick Breyer v BundesTepublik Deutschland Case C-582/14, Advocate General Campos Sánchez-Bordona (delivered

37

2016). Palrick Breyer v Bundesrepublik Deutschland Case C-582/14, Opinion of 12 May 201l0) Advocate General Campos Sánchez-Bordona (delivered on at [74].

38

to

access to.9 "Likely to have access to" is narrower than :

have

likely "can reasonably obtain'". is

3.49

forcaoing, it is crucial to always remember that "personal

From

ta" is

not

merely about a n individua but can also objects, processes and cven events.

comprise

of

about

information

ANONYMISATION OF DATA B.

personal

which may reasonably be approache service provider) n data that, combined with a du amic additüonal other order to obtain of a user. identification facilitate the IP address, can

services,

ata is combined must be one that the organisation has or t h e original

Patrick Breyer v BundesTepublik Deutschland Case C-582/14, Opinionof 2010) Advocate General Campos Sánchez-Bordona (delivered on 12 May at [72].

82

3.50

is exponentially more data available rise of big data, there With the than ever before. Much of this data contains for analysis now that can identify dividuals, for this reason, the data information

before use or disclosure. This would be the best uld be anonymised data the if subjects have given consent for secondary o r oractice even because the secondary use may often uses o r disclosures subsequent more dire than envisaged when combined with consequences produce which may go beyond the consent given other data sets 3.51

benetits that can be reaped from big There are enormous perceivable such as predicting resource and business for purposes data, not just also for health research through the search for consumer trends, but and other insights. Indeed, the applications in patterns, correlations are almost endless. For example, researchers data of analytics the field Sick Children have made use of big data at Toronto's Hospital for of lives the save premature babies.0 Through the analysis analytics to the researchers created an algorithm to vital signs, of already-collected most likely to develop a life-threatening predict which babies were infection before acute symptoms of infections appeared. For tiny detection is a lifepremature babies with little immunity, this early field of data analytics the in measure. Indeed, the applications

saving

are almost endless.

3.52 cannot lf data has genuinely and truly been anonymised, then it is no longer personal data. identify any individual and by definition, it However, to achieve the state of true anonymisation is a challenge.

39 40

Personal Data Protection Act 2012 (Act 26 of 2012) s2(1). Brian Proffitt, "Toronto Hospital Detects Infections with Analytics IT World Canada (27 April 2012).

83

Dala Prolection in

the Practical Context the

scientists rescarching in when shown that even and established

Many computer

area

data

of

I ne Concept of Personal Data data analvti

has supposedlv

the data subiectCe to re-identify anonymised, it is possible the m o r e notorious cxam of Two sets. combined with other data successful

already

have

reidentification

been

highlighted ted

the Personal Data

data sets Receiving anonymised

ehave

nples c

by Protert. the

. 3.54 Commission

vnect an organisation to take active steps to attempt to re-identify does not exp

ction Aduisory Guidelines Guidelines"). In a ater resear Topics ("Selected forSelected Topics a computer scientist1, found that o project in 1990, Latanya Sweeney, Commission

on

in its

(216 million of 248 million) of the population in the US

idenified

through

the

use

of only

three

attributes:

5-digit

individuals from anonymised data in order to make a determination as to data held by the in view of such data is personal thec which the organisation has or is likely to have acces. ation to

organisation

uld be

postal

birth." gender and date of

stated in the Selected Topics Guidelines that itt

The

cod code,

3.53 data so that individuals cann It is extremely difficult to anonymise annot outlined some anonymisatio Commission The be reidentified. Guidelines," which it warned was techniques in its Selected Topics exhaustive. However, it should be noted that the seven technianes data reduction, da data (pseudonymisation, aggregation, replacement, and masking) highlighted by th data shuffling suppression, Commission are all fairly primitive techniques which have been used

for many decades." Indeed, these very techniques were the ones used to anonymise data sets that computer scientists, such as Sweeney, were

3.55

news for organisations which have obtained or indeed good his is This sets of anonymised data they are not expected to received d a t a recc ascertain e the data sets constitute personal data by expending effort In effect, when an and r e - i d e n t ify individuals. organisation

to

try

anonymised

data sets, it

can assume

receives constitute personal data.

that the data sets do not

3.56

Ahile this obviates the need to engage in data analytics, in real terms it

that the data sets will never constitute personal data does not mean Bearing in mind that the Act also allows for private actions by any

individual who

has sutfered loSs

or

damage,"

an

organisation would

likely to hold other want all the data sets are combined, individuals data sets so that when cannot be identified. This would require the organisation to have a system to continuously assess its data inventory. For some organisations, it may be as simple as knowing and keeping track of to

able to re-identify individuals.

take steps

to ensure

that it it is

holding

or

what data and data sets it holds and tracing the life cycle of data. Data and the availability of data will likely increase over time, and this, coupled with developments in data matching capabilities, will mean organisations need to constantly monitor their data inventory. 3.57 or additionally, it may be wise for the organisation to insert indemnity clauses into the contract with the anonymised data set provider or to obtain warranties that consent for the use and disclosure of the data sets have been obtained from the data subjects.

Alternatively

41

Personal Data Protection Commission, Advisory Guidelines on the Personal Data Protection Act for Selected Topics (revised on 20 December 2016) at paras 3.15-3.16.

42

LSweeney, Simple Demographics Ofiten ldentily People Uniquely (Carmegie Mellon University, Data Privacy Working Paper 3, Pitsburgh 2000)

chttp://dataprivacylab.org/projects/identifiability/paperl.pdf> (accessed

43

44

23 May 2016). Personal Data Protection Commission, Advisory Guidelines on the Personal Data Prolection Act for Selected Topics (revised on 20 December 2016) at para 3.8. this book was a computer science undergraduate in the these the obvious anonymisation that were

The author of 1980s and were being implemented then.

techniques

84

15

Personal Data Protection Commission, Advisory Guidelines on the Fersonal Data Protectiom Act for Selected Topics (revised on 20 December 2016) at para 3.20.

6

Personal Data Protection Act 2012 (Act 26 of 2012) s 32,

85

Data Protection in

the Practical Context

The Concept of Personal Data

Anonymising data sets

2.

receiving the anonyinisccd dala, as well as its motivation in entifying individuals rom the anonymised data set, the number of of the anonymised data, additional enforceable restrictions cipients of sclosure of the data and robust data and subscquent the use on nolicies and processes that will ensure the destnuction of data retention policie

Oganis:

reid

3.58 an

organIsatuon anonymiscs data to or sharing with others,

There may be occasions where for its own purposcs or for disclosing care must there is a disclosure to others, special hat the data set has truly been anonymiscd.

to

be taken

cither

W to e

when

they n o

longer:scrve any business

or

legal purpose.50

3.62

3.59

data but still retains

Ifan organisation anonymises the data means to re-identify, then data. Hence,

organisations

re-identify and, of

set would

must ensure that

course, ensure

that

the

the

"key"

still constitute nereo

sonal

they discard all meane original raw data is not

retained. To re-identify means to be able to identify an individhal individual through Similarly, even if it can be ascertained that tho

beyond doubt and not just the ability educated guessing

to

idenuty

prard, the the Commission appcars to be taking a less than towards the definition of personal data. By is personal data is whether something proclaimingthat on this regard, ientific approach

In

or

an

same individual is in two different data sets but the individual's identi cannot be discovered, this would not be re-dentification. However, ir

the individual can be positively identified by combining these two data sets with other data to which the organisation has or is likely to have data.8 access, then it would constitute personal

ependent

me2sured by the risk of re-identilication, it moves the definition into

the realm of great uncertainty Risk cannot be used as the test for

whether somethi is personal data the definition of personal data is out in section 2. already clearly spelled -

3.63 The Commission gave the example of fingerprinis to illustrate its view

t opined that a sct of fingerprints is not likely to be personal data to the lay person but the same set ot fingerprints would likely be personal

data to the expert, who would have the skills, technologies and complementary information for re-identification" By adopting the

3.60 In terms of how effective the anonymisation must be before it is no longer considered to be personal data, the Comnmission has stated that it takes a practical approach when assessing anonymisation and the

risks of identification:" If the risk of reidentification is high, then the data will be considered personal data. If the possibility of re-identification is trivial, the Commission will consider the data anonymised.

3.61 The Commission has also given some guidance on the factors that will impact on the risks of re-identification, which include the nature or type of data deidentified, the anonymisation techniques employed, the complementary data (likely to be) available, the capability of the 47

Personal

Data Protection

Commission,

Advisory

Guidelines

on

approach of assessing the subjective risks of re-identification, the

Commission appears to have interpreted the definition of personal data as a subjective test instead of the objective test as set out in the Act. According to the definition in the Act, something is personal data simply if an individual can be identified from that data or from that data and other information to which the organisation has or is likely to have access. This is an objective test, it is cither possible or not possible

to identify the individual from the data

"can be identified"

The

only subjective element of the definition is whether the organisation has or is likely to have access to the data. By introducing factors such as skills and technologies, the Commission has considerably confused the concept of personal data.

the

Personal Data Protection Act for Selected Topics (revised on 20 December 2016) 48

49

at paras 3.30 and 3.32. Personal Data Protection Commission, Advisory Guidelines on te Personal Data Protection Act for Selected Topics (revised on 20 December 2010) at paras 3.30 and 3.34-3.35. Personal Data Protection Commission, Advisory Guidelines on Personal Data Prolection Act for Selected Topics (revised on 20 December 2010)

50

at para 3.29.

52

86

51

Personal Data Protection Commission, Personal Data Protection Act for Selected Topics at paras 3.27-3.28. Personal Data Protection Commission, Fersonal Data Protection Act for Selected Topics at para 3.24.

Advisory Guidelines on the (revised on 20 December 2016) Advisory Guidelines on the

(revised

Personal Data Protection Act 2012 (Act 26 of 2012)

87

on

s

20 December 2016)

2(1).

The Concetpt of Personal Data

Practical Comtext Data Prolection in the gislation, s h1sanld oul

3.64

unclear, the Commission also to motivation of the organisatic

To make matters the relevance of the

cn.

ciated re-identify

even m o r e

data. It stated:53 Even does

3.68

skills and information for re-identüficas. if one has the requisite risks of re-identif ntification are high. mean that the not necessarily be considered.

uon, it

motivation to

re-identify

data

must

also

3.65

legal

or

contractual obligations

individuals from data. The motivations and incentives

The

or

to

explain that motivation

addition

if there are disincentives s1ch consequences for re-identi6

introduction

any

makes

of the

more

assessment

importantly,

of the riske

taken

into

account

as a

in

assessing

the

to consider tor assessing the risks of the Commission also recommended anonymisation of assessing the risks of re-identification,3

the factors

means

Anonymisation testing

3.69

Commission recommended that before organisations disclose anonymise data scts, they nould employ a "motivated intruder test" 56

consideratio

it takes the

to to

dentification,

(a) The

of

definiti of personal data further into the realm of subjectivity, somethino n. not the where from mandate for th unclear provided for in the Act. It is but since it is not in the Act, it mav he factor of motivation originates, re-identification rather vague,

In

esting

The Commission then proceeded be low reidentify an individual may

be

re-identification risks.

This

was

a

test

originally introduced by the UK Informatio

missioner's Office ("ICO) im its Anonymisation: Managing Data

Protection Risk

Code of Practice

57

actions. in open to challenge, especially private

3.70

3.66

data the anonymised data has been derived.

The "motivated intruder under the test is a person without any prior

Enowledge who wishes to identily the individual from whose personal The Commission also made a distinction between information publicl

available or knowledge that is held personally. If an individual canbe easily re-identified based

on

information that is

readily available

to the

public, then the re-identification risks are likely to be significant. The Commission's guidance is that in5 ascertaining the reidentification risks of an anonymised data set, one

should take into account the use of public knowledge for re-identification,

has been targeted for identification." However, some kinds of data will be more attractive to a "motivated intruder" than others, for example, Dersonal data about an individual for nefarious personal reasons or financial gain and any information that might cause mischief by embarrassing others or reveal newsworthy information about public figures. The characteristics of the motivated intruder are as follows:

but not necessarily personal knowledge of the individual or the people close to the individual.

3.67 While it is true that the re-identification risks are more likely to be significant if the complementary information is publicly available, it should be noted that there will be occasions where non-publicly available information of the individual will be a clear and relevant consideraion and these, in accordance with the wording of the

55

Personal Data Protection Commission, Advisony Guidelines on the

56

Personal Data Protection Act for Selected Topics (revised on 20 December 2016) at paras 3.41-3.47. Personal Data Protection Commission, Advisory Guidelines on the

Personal Data Protection Act for Selected Topics (revised on 20 December 2016) at para 3.45.

57 58 59

53

Personal Data Protection Commission, Advisory Guidelines on the Personal Data Protection Act for Selected Topics (revised on 20 December 206) at para 3.26.

54

Personal Data Protection Commission, Advisory Guidelines on the Personal Data Protection Act for Selected Topics (revised on 20 December 2010) at para 3.39.

88

The Commission stated

that the motivated intruder test assumes that no particular individual

UK Information Commissioner's Office, Anonymisation: Managing Data Protection Risk Code ofPractice (November 2012) at p 22. UK Information Commissioner's Office, Anonymisation: Maraging Data Protection Risk Code of Practice (November 2012) at p 22. Data Protection Commission, Advisory Guidelines on he Personal Personal Data Protection Act for Selected Topics (revised on 20 December 2016) at para 3.45.

60 61

UK Information Commissioner's Office, Anonymisation: Managing Data Protection Risk Code of Practice (November 2012) at p 23. Personal Data Protection Commission, Advisory Guidelines on the

FersonalData Protection Act for Selected Topics (revised on 20 December 2016) at para 3.43.

89

Data Protection

(a)

(b)

in the Practical Context

The Concept of Personal Data

reasonably competent; has access to standard

librarics, and all

resources such as the Intero and published infaand documents public

information

such as public directories;

(c)

(d)

employs

standard

investigative tcchniques such

who may have additional enquiries of people

as

knowledge maki of ntheg anyone with

or even advertis identity of the data subject information to come forward; is not assumed to have any specialist knowledge such as ompute

equipment; and hacking skills, or to have access to specialist such as burglary or hacking. not resort to criminality does ng, to gain (e) access to data that is kept securely. to

3.72

the

the

Furthermore,

that

are

capal

be,

might

Commission

Commission

not directly not

vample,

elased

to

re-identification.5

averred that all to

a

other "residhal"

recipient's motivation

and

These

being unintended recipients with compromised better ability

or

of

data that is or a more conlidential or sensitive nature amission recommended more robust assessments than the intruder test. This should also be the case if the

Of

term

n

the

also

re-identify should also be taken into account. of the data for example, risks

mistakenly discle

3.73

ale

related

Commissi

motivated

consequences ot re-identification are more severe for the individuals

3.71 The Commission acknowledged that the amount of effort require

a n d / o r t h e organisation.66

the motivated intruder test will vary, however, the examples of ef for

it it

gave were somewhat simplistic. It suggested that, at the higher end

might entail "obtaining and processing publicly available but limitaed (eg national archives) resources to try to link anonymised data to .an

individual's identity" In reality, there is much more data available than just those publicly available in repositories such as national archives: social networking websites, for example, contain abundan information on individuals. If one hosts a website, there is already a

mountain of data that is collected by the website and, in addition to that, there are many databases one can either buy or subscribe to

Further, if the recipient organisation is a telecommunications company, for example, then it would already hold the vital data of many individuals such as their names, dates of birth, NRIC numbers, home addresses, telephone numbers and so on, which can be used to match the data sets. Indeed, the Commission affirmed that where the motivations, reidentification capabilities and other information in possession of that recipient are known or can be reasonably inferred these should also be accounted for.

3.74 In

to

e

consider

p.eEcult mental

the behaviour

exercise involving

Personal Data Protection Commission, Advisory Guidelines

on

is

a

second-guessing the motives, knowledge, resources and technical expertise of the intruder, as well as asS1umptions about the content, nature and usefulness of the data.

3.75

In essence, while the Commission has given guidelines on anonymising

data sets and the recommended or expected course of action appear to be a relatively light-touch measure, at the practical level, however, the guidelines may provide little assistance to organisations due to the generalised nature of the guidelines and uncertainty in their meaning and application. 3.76 The Selected Topics Guidelines do not provide the requisite level of clarity and certainty about how to anonymise and make judgments about the permissibility of disclosing data sets. It is also not exact role of the Guidelines, as the Guidelines are non-binding. It is unclear to what standards an organisation will be

completely

clear the

62

of a motivated intruder

he

Personal Data Protedtion At for Selected Topies (revised on 20 December 2016) at para 3.43. 63

Some of these would include Wherenext Intelligence System (WIS),

65

Amicus Data's database and HousesActually.sg, all of which specialise in 64

property-related information. Personal Data Protection Commission, Advisory Guidelines on Personal Data Protection At for Selerted Topics (revised on 20 December 2010) at para 3.45.

90

Personal Data Protection Commission, Advisory Guidelines on he ersonal Dala Protection At for Selected Topics (revised on 20 December 2016) at para 3.45.

6

Fersonal Data Protection Commission, Advisory Guidelines on the ersonal Data Protection Act for Selected Topics (revised on 20 December 2016) at para 3.46.

91

Data

Prolection

paragraph 1.2 judged. For examplc,

of the

Selected

states tha:67 These

The Concefpt of Personal Dala

in the Practical Context

in conjunction Guidelines should be read are subject the Guidelines' and

with

Topics Guidos

to the

Introduction to

(including

other

the document .

but

damage consequential

special

disclaimers settitled out

for any loss, claims, actions, costs, expenses not limited to any direct, indirect,

lable not liable

ommission is

ines

or

or punitive, profits)

damages, loss of income, revenue whether arising directly or indirectly from any decision in reliance on the Guidelines.

or

howsoever caused action taken

therein. 3.77 "Introduction Paragraph 3.1 of the first disclaimer as follows:

3.80 Paragraph to

the Guidelines"

expres.

the

constitute legalad The Guidelines are Commission or any other party e on the binding not legally C They are other and legislation PDPA made to the reference should be of any such leaiclase statement of the provisions complete and definitive or supplement in any way the legal e The Guidelines do not modify laws cited including, but not limited to, the D of PDPA any and interpretation as regulations and rules) issued und. 1der and any subsidiary legislation (such the PDPA. The provisions of the PDPA and any regulations or ules over the Guidelines in the event of issued thereunder will prevail any

advisory in

ctresses that all

9 3.3 stres

responsibility rests with that they rely on

effectively warns organisations

cach organisation the Guidelines at

a n d

their own rIsk.

nature and do not

3.81

All

these

decisions on

to respect permissible to disclose.

(b)

organisation in no clearer a position with anonymisation techniques and whether it is

claimers leave

A more realistic

an

vieW

of anonymisation

inconsistency. 3.82

3.78

that the Guidelines are not legally binding Paragraph 3.1 clearly on the Commission or any other party and the Guidelines appecar to have no legal effect. The next disclaimer informs that the Guidelines states

do not dictate nor give any assurance oft what courses of action the

missing from the Selected Topics Guidelines is One of the key insights heacknowledgement that anonymisation techniques are in practice the Commission seems to give eurrenly not fully effective, instead, that anoymity the impression is a binary issue. At present, actual

anonymisation

is

more

of

an

ideal rather than

something

that is

practically achievable.

Commission will or must take:" Nothing in the Guidelines shall be construed as granting any expectation that the Commission will take or not take any particular course of action in the future arising from or due to anything in the Guidelines. Accordingly,

the Guidelines shall not be construed to limit or restrict the Commission's administration and enforcement of the PDPA.

3.79

Lastly, paragraph 3.3 states as follows:20 The Guidelines are intended to provide general guidance only. Each

organisation remains responsible for assessing the appropriate action to be taken or decision to be made in its particular circumstances. The 67 68 69 70

Personal Data Protection Commission, Advisory Gruidelines on the Personal Dala Prolection Adt for Selected Topics (reuised on 20 December 2016) at para 1.2. Personal Data Protection at para 3.1.

Commission, "Introduction to the Guidelines

3.83 A thorough and more realistic assessment of current anonymisation was presented by the EU Article 29 Data Protection

techniques

Working Party ("WP29") in its Opinion 05/2014 on Anonymisation Techniques ("Anonymisation Techniques Opinion")." There, the WP29

analysed the effectiveness and limits of existing anonymisation techniques and concluded that all the current techniques which they assessed failed to meet with certainty the criteria of effective anonymisation.? It acknowledged that case studies and research publications have shown how difficult it is to create a truly anonymous data set whilst retaining as much of the underlying information as required for the task.28 The understanding of the limits and ettectiveness of anonymisation is important, given that should the

EU Article 29 Data Protection Working Party, WP216, Opinion 05/2014

Personal Data Protection Commission, "Introduction to the Guidelines, at para 3.2.

72

Personal Data Protection Commission, "Introduction to the Guidelines

73

at para 3.3.

onAnonymisation Techniques (adopted on 10 April 2014). BU Article 29 Data Protection Working Party, WP216, Opinion 05/2014

0nAonymisation Techniques (adopted on 10 April 2014) at p 23. BU Article 29 Data Protection Working Party, WP216, Opinin 05/2014 0n Anonymisation Techniques (adopted on 10 April 2014) at p 5.

92

93

Data Protection in the Practical Context anonymisation

organisations protection as

process will need to set out

in

not

The Concept of Personal Dala

prevent re-identific.

effectively

ation,

standards for personol comply with the d the Act for the inetfectivcly anon

3.87

a

The WP29 need

ined three criteria an efective anonymisation solution tisfy in order to achieve this:79 t o satis.

would

personal data.

the singling out of an individual in a data set which be idecnti out); enable the linking of two records within a data set about the prever individual or same groups of individuals, or between two (b) same and data sets (linkability);

(a)

3.84 The WP29 began its analysis

by making

1t

clear that the

proce

operation in itself

data

a processing anonymising personal data is can only be carried o anonymisation hence, under EU regulations, in collected compliance with appliet the original personal data was also hold true ae would this data protection laws." In Singapore, "use" under the Act

would constitute

prever

separate

prevent the possibi

(C)

and

anonymisation process would for which the need to be compatible with the original purpose data was collected.

(singling

them to

information

deduce with significant (inference).

in such data set

probability, any

line with the Singapore position, where the Commission has that to re-identify means to be able to identify an individual beyond doubt and not just the ability to identify an individual through This is in

educated guessing.0

3.85

evaluated by WP29 found that tho. The anonymisation techniques was no perfect anonymisation technique and, in light of this

3.88

recommended using a

airectly identifying elements in itself was not enough to ensure that

combination of

techniques and

outliner

strengths and weaknesses to consider when anonymising data.5 The Anonymisation Techniques Opinion gave some usefül and practical so that it can be used for on how to make data anonymous whole range of activities from big data analysis to medical research.

guidance

a

3.86 The WP29 defined anonymisation as something that results from

the three criteria, the wP29 concluded that the mere removal of

direca

entification of the individuals is no longer possible. Additional easures to prevent identification will be required, depending on the context and purposes of the processing for which the anonymised data contex

areintended.8

3.89 In the same vein, data sets that have been pseudonymised would also

data in order to irreversibly prevent identification,%

not be considered equivalent to anonymised data as it allows an individual to be singled out and linkable across different data sets.

stated that "to determine whether a person is identifiable, account should be taken of all the means likely reasonably to be used" to

Therefore, pseudonymisation is not an anonymisation technique and

processing personal

it noted that Recital 26 of the EU Data Protection Directive 95/46/EC reidentify the person." This same test of "rcasonably likely to be used is retained in the EU General Data Protection

Regulation 2016/679.

data that has been pseudonymised still constitutes personal data and remains within the scope of the legal regime of data protection. This has also been explicitly expressed in the EU General Data Protection Regulation 2016/679.5 The incffectiveness of pseudonymisation as an anonymisation technique was well illustrated by the America Online 79

74 75 76

EU Article 29 Data Protection Working Party, WP216, Opinion 05/2014 on Anonymisation Techniques (adopted on 10 April 2014) at p 7. EU Article 29 Data Protection Working Party, WP216, Opinion 05/2014

80

on Anonymisation Techniques (adopted on 10 April 2014) at pp 23-24.

8

EU Article 29 Data Protection Working Paty, WP216, Opinion 05/2014 on Anonymisation Techniques (adopted on 10 April 2014) at pp 6-7.

77

EU Data Protection Directive 95/46/EC, Recital 26.

8

EU General Data Protection Regulation 2016/679, Recital 26.

94

82 63

EU Article 29 Data Protection Working Party, WP216, Opinion 05/2014 on Anonymisation Techniques (adopted on 10 April 2014) at pp 6-7 and 11-12. Personal Data Protection Commission, Advisory Cuidelines on the Personal Data Protection Act for Selected Topics (revised on 20 December 2016) at paras 3.30 and 3.32. EU 29 Data Protection Working Party, WP216, Opinion 05/2014 on Anonymisation Techniques (adopted on 10 April 2014) at pp 6-7. EU Article 29 Data Protection Working Party, WP216, Opinion 05/2014

Article

on Anonymisation Techniques (adopted on 10 April 2014) at p26.10. EU General Data Protection Regulation 2016/679, Recital

95

Data

Protection

The Concept of Personal Data

in the Practical Context

where a databasc of 20 million ("AOL") incident in 2006, AOL users were releasoreh threc-month period by keywords over a h identification replaced by a numerical att only their AOL uscr identified along with be to along with their able Some of the users were

(b)

.This involves altering the values within the data set just swapping them from one record to another, so it by olves shuffling the information in the records so

Permuta

value being attached to individual X, it now stcad of the i n d i v i d u a l Y with individual Z to individual gs cxample might be to individual Y's ight value. An Y's va Y's .ol XX's weight and so on. Such by individual maintains

locations.*1

replace

3.90 examined

The WP29 randomisation and

the

two

anonymisation

main

swapping the and distribution of values but correlations betwecn values theindividuals will be changed Permutation is useful when and act distribution of each to retai attribute important

technin

individual techniques generalisation," and the addition, permutation, differe noise cach of these categories: and -diversity, and t-closenese aggregation, kanonymity privacy, of the techniques' strengths and weaknesses as well as the cOmmon to their use were assessed against he mistakes and failures related and inference. These will linkability out, criteria three now of singling

it is thin the

data

exact weight of

set, for example, if it is of the individuals 8

deindividualised and anonymised views of a data set through

whilst a statistical algorithm copy of the original data. The anonymised views would typically be generated

3.91 Randomisation is a class of techniques that alters the veracity of he data and the individual data so that the strong link between the is

retaining

through a series of queries for a particular third party.8 The

method adds noise, that is, random talse information, in order to one individual within the data set. make it difficult to identity any

removed. The aim is to transform the data so that it is less accurate no longer reter

to

a

specific

individual

Randomisation will still maintain the singularity of each record in that cach record is derived from the one same individual but randomisation can be combined with generalisation techniques to achieve

stronger

privacy

protection.

The

main

randomisation

3.92 nifferential privacy is unique in that it also integrates the concept of dhe level of acceptable risk, which is derived from an awareness of known re-identification risks such as linkage attacks and multiple the data anonymiser can have some control over a overall "privacy budget', that is, the maximum privacy level dataset's the expectation of the number and type of queries it required given answer. This gives the data anonymiser the ability to add levels of noise that is appropriate to the number of data queries that will be

queries. From this,

techniques are as follows.86 (a)

new

generates

applying

that the data can

important to know the

each

Differenial privacy is a relatively Differential privacy. (c) technique and it is used when the organisation

be addressed briefly.

so

having

Noise addition. This consists of altering information in the data set so that they are less accurate whilst retaining the overal distribution. An example might be the age of individuals. Instead of the exact age, the age might be changed so that they are within a tolerable limit of either plus or minus five years. Noise addition should be combined with other anonymisation techniques such as the removal of any attributes that might amount to quasi identifiers. The level of noise introduced should depend on the necessity of the level of information required as well as the

will

permited. Differential privacy is more effective in anonymisation because the level of noise to be added can be adjusted and, the place or places where the noise should be added can also be calibrated in

order to both obscure every individual while retaining at least some useful qualities of the data.

impact on individuals' privacy.37 84

EU Article 29 Data Protection Working Party, WP216, Opinion 05/2014

85

EU Article 29 Data Protection Working Party, WP216, Opinion 05/2014 on Anonymisation Techniques (adopted on 10 April 2014) at pp 12-19. EU Article 29 Data Protection Working Party, WP216, Opinion 05/2014 om Anonymisation Techniquas (adopted on 10 April 2014) at p 12. EU Article 29 Data Protection Working Party, WP216, Opinion 05/2014

on Anonymisation Techniques (adopted on 10 April 2014) at p 11.

86

87

on Anonymisation Techniques (adopted on 10 April 2014) at p 12.

96

88

EU Article 29 Data Protection Working Party, WP216, Opinion 05/2014 on Anonymisation Techniques (adopted on 10 April 2014) at pp 1-14.

89

EU Article 29 Data Protection Working Party, WP216, Opinion 05/2014

90

Cynthia Dwork && Aaron Roth, "The Algorithmic Foundations ot Differential Privacy" (2014) Foundations and Trends® in Theoretical Computer Science Vol 9 (No 3-4) at Pp 211-407.

on Anonymisation Techniques (adopted on 10 April 2014) at p 15.

97

The Concept of Personal Data

Practical Context Data Protection in the

and k-anonymity. Inese techniques involve grouping at least k other individuals. The result is that the viduals with to such an extent that each individual shares is on

3.93 An

example

privacy student:

of how differential

example given by

a

rescarch

after

move

to

his

move

to another

would

ofi

(a)

n

database

allow you

to

generalised

value. For example, attributes such as salaries, height, or the dose of a medicine cani be generalised by grouping

data

that allows

deduce

you

to comDuto

before

his income.

the

to

extract

it is possible Through inference, To overcome

supposedly-hi

th

to inject noise in the form of giving The solution might be the result of more than one resident moving out of the area or na

changes to

ference attacks when the values of data against distributed.95 a r e well attributes lT-closeness. This 1s a retinement of -diversity, in that it aims to prote

king

the income.

create categories

super-sensitive

differential privacy might be appropriate. A case in point would be the Urban Redevelopment Authority's ("URA") database on private

AnthonyTockar, Diferential Privary: (accessed 23 May 2016).

92Urban Redevelopment Authority, (accessed 1June 2016).

EU Article 29 Data Protection Working Party, WP216, Opinion 05/2014 on Anonymisation Techniques (adopted on 10 April 2014) at p l6.

98

initial distribution of

perhaps only

one

of the three criteria of singling out,

linkability and

inference. The WP29 summarised its findings in a table format as

follows:

94

The Basics

the

3.97 From the forgoing, it should be clear that each technique will target

residential property transactions.

91

resemble

at least i different values should exist within each of data, not only that each value is represented as also many times as category, but mirror the initial distribution of each attribute.6 to necessary

online databases that the general public can query on a 24/7 basis

3.96 Generalisation is the second category of anonymisation techniques. It essentially comprises generalising the attributes of individuals in the data set by altering the respective scale or order of magnitude. For example, instead of the exact age, the age might be changed to bands of ten years such as 20 to 30 years old. Generalisation can be effective to prevent singling out, but it will not prevent linkability and inference.5 The main generalisation techniques are as follows.

that

attributes in the data set before anonymisation. For each category

3.95 Differential privacy will not be a very useful technique if the data is resolutions but in terms of some of tho al

required

region

ttacker with background knowledge on a specific data subject is with: significant uncertainty. Ldiversity is effective to always left

that

moves.

streeU n a m e tO

occurrence of categories with poor attribute variability, so that an

they both give the total the datasets are income of residents in the same area, albeit before and after Mr WVhite sense

the granularity of a location can be

or country,91 lowered Ldiversity. This extends k-anonymity and ensures that in cach L cquivalence class or category of data (for example, age group), attribute has at least1 different values so that probabilistic every inference attacks are no longer possible. he aim is to limit the

from

this problem, the so White. information about Mr is to apply some noise-generating mechanism to the related data.sets

related in the

weight,

same

into intervals; similar

and

(b)

3.94

Aggreg

cited

th It you knew that Mr wi.Ota certain area. Wa this database ho area, simply querying

have access to a Suppose you residents in a all of income

going

might work is the

EU Article 29 Data Protection Working Party, WP216, Opinion 05/2014

onAnonymisation Techniques (adopted on 10 April 2014) at p 16.

9

EU Article 29 Data Protection Working Party, WP216, Opinion 05/2014

96

On Anonymisation Techniques (adopted on 10 April 2014) at p 18. EU Article 29 Data Protection Working Party, WP216, Opinion 05/2014

97

0EUAnonymisation Techniques (adopted on 10 April 2014) at p 18. Article 29 Data Protection Working Party, WP216, Opinion 05/2014 on Anonymisation Techniques (adopted on 10 April 2014) at p 24.

99

Data

Protrction

in the Practical Conlext

Is Singling out still a

risk?

The Concept of Personal Data

Is Linkability

Is Inference

still a risk?

still a risk

Yes

Yes

Pscudonymisation

Yes

Noisc addition

Ycs

May not

May not

Permutation

Yes

Yes

May not

Aggregation or K-anonymity

No

Yes

Yes

Ldiversity

No

Yes

Differential privacy

May not

May not

May not May not

lso has its problems if logical links persista person's between attributes. For exanplc, in a table cotaining

3,100 Permutation alsc

diflere

and and

salary, cven il the auributes of the income are clear that a Chiet Executive Officer would be receivingth highest salary ilst the unemployed or part-time worker the lowest salary.0 From this, other information such as age can also be identified. be in the table role

ld be

would be

receivi.

might

3.101

differential privacy also can be problematic if not iniccted. Further, if a query history is no retained and

The technique of aiauc of noise

is

10ughi s ttreated independenuy, then an attacker who queries the is r c a t query database with ultiple questions can progressively reduce the breadth until a specific value of an individual or a outputted

Cno

3.98 From the table, it is clear that there is no one particular anonymisatio technique that satisfies all three criteria and the WP29 Went great details to present instances of each technique's wcakno ness,

.

nploy1mcnt permutatcd, i t w o u l d

cach

of the

individuals group of

a

101 is discovered.

Pseudonymisation is probably the most pronounced in this regard

The WP29 cited recent research at Massachusetts Institute

of of 15 months of spatial-temporal mobility coordinates of 1.5 million

Technology which found that from a pseudonymised data set

people on a territory within a radius of 100km, it was possible to single

out 95% of the population with four location points. Even more alarming was that just two points were sufficient to single out more Te

than 50% of the data subjects.3

3.102

of k-anonymity 1s that it does not prevent inference ttacks, in particula k-anonymity can be defeated through an equivalence attack. The attack can come from using a

The main failure available

data

set

to de-anonymis

publicly

another. As the example of

Mr White above showed, equivalence attacks can also be launched aCainst data sets that are updated periodically. The mere act of keeping a data set updated can inadvertenty reveal sensitive information because aggregate averages will change over time.

3.99 As for noise addition, the WP29 highlighted its failure with the well-known Netflix incident. Netflix released a database of over 100 million ratings on a scale from 1-5 of 18,000 movies, expressed by nearly 500,000 users. It was "anonymised" according to an internal privacy policy and all customer identifying information were removed except the ratings and dates. Noise was added on the ratings so that they were slightly increased or decreased. After analysing the geometric properties of the data set and comparing it with a publicly available data set, researchers found that 99% of user records could be uniquely identified in the data set using eight ratings and dates with 14-day errors as selection criteria.9

3.103 As for diversity and ttcloseness, they are not an improvement over

kanonymity in terms of unlinkability in that the probability that the same entries in two data sets belong to the same individual is the same. The main improvement of l-diversity and tcloseness over k-anonymity is that it is no longer possible to set up inference attacks against a "-diverse or "t-close" database with certainty,12 3.104 From the foregoing, it is clear that none of the anonymisation techniques can prevent singling out, linkability and inference. The 100

EU Article 29 Data Protection Working Party, WP216, Opinion 05/2014

on Anonymisation Techniques (adopted on 10 April 2014) at pp 14-15. 98 99

EU Article 29 Data Protection Working Party, WP216, Opinion 05/2014

om Anonymisation Technigues (adopted on 10 April 2014)

EU Article 29 Data Protection Working Party, WP216,

p 23. Opinion 05/2014

at

on Anonymisation Techniques (adopted on 10 April 2014) at p 13.

100

01

02

BU Article 29 Data Protection Working Party, WP216, Opinion 05/2014 at p l6. EU Article 29 Data Protection Working Party, WP216, Opinion 05/2014

0n Anonymisation Techniques (adopted on 10 April 2014)

onAnonymisation Techniques (adopted on 10 April 2014) atp 18. 101

Dala WP29 stressed that

possible

to

cach data

give

set

Protection

most

minimum

needs

to

in the Practical Context

The Concetpt of Personal Data

techniques carry risks and recommendations

be considered

on a

that

it

1or parametecrs

case-by-casc

was no

basislo8as If

of the three criteria is not met, a thorough evaluation n e identificaion risks should be perfomed. There will almost alwa residual risk of identification inherent in cach of the techi Careful engineering in devising the apPplication of an indis

application of a cumulative technique required along f both randomisation and generalisation techniques. This will ene 1surc a is

with the

more robust outcome.

willbe or

AOL

Netflix ion

regular he

unclear

to what kind of standards there be similar incidents in

incidents,

the

and grievous for

an

organisation

Singapore like amifications would be serious for

the affected individuals

the the

organ

analysis must be the Act and the definition of As alrcady discussed above, personal data means that can identify an individual from the data or the data in

3.108 starting

point for 07

personal data".o

data

with other information

to

which the

organisation has or is the control test. Hence, when ikely disclosing anonymised data to another organisation, the capabilities resources of the other organisation need to be considered to ertain if the data is likely to be personal data to the other to

Good anonymisation practices outlined by the WP29 include audits to identify new risks to re-identification and to re-evaluate

is

Chould

combinat

3.105

tt

isclosing data.

o

have

access,

the latte

being

residual risks and to adjust practices accordingy; in etfect, to monitor and control the risks. In addition, relevant contextual elements m

organisation.

also be taken into account. These would include the nature of th original data, sample size, secuity measures restricting access to the

data set, the availability of public information resources and envisaged release of data to third parties. Of course, if the nature of the datai one that is appealing for attackers, such as sensitive or financial

3.109

Organisations

need

to

be

nindful of the grave

probability

of

eidentification. It is the control test of "other information to which the organisation has or is likely to have access that poses challenges. If

nersonal data is supposedly anonymisecd and released to the public,

personal data, then this will be a strong key factor to consider. 105

this will effectively mean that all members of the general public will

106 The WP29 also recommended that the purposes to be achieved through the anonymised data set should be clearly set out as these are pivotal in determining the identification risk.

When all members of the general public are considered, the "other information" that is available or likely to be accessible would be Jimitless as organisations range from the wealthy and resource-rich multinationals which can purchase a multitude of information and

need to be considered as the "organisation" under the definition.

data sets to the savvy IT companies or IT' researchers who have the vast

3.

The way forward to anonymising data sets

3.107 Given the disclaimers 06 by the Commission for the various Guidelines, for anonymisation, and the clear instructions therein that direct reference should be made to the Act and other legislation for the "complete and definitive statement" of the law, organisations that wish to avoid liabilities should tread very cautiously in anonymising and

incuding

expertise to combine and re-identify data sets. If organisations encompass those which have limitless knowledge and abilities, with the currently known anonymisation techniques, if only one technique is used, the supposedly anonymised data set will very likely be able to be reidentified, and if so, the supposedly anonymised data set would fall squarely within the definition of "personal data"' under the Act as it can be used in combination with other information to identify the individuals. Hence, if the supposedly anonymised data set is reidentified and is personal data, then the organisation that disclosed the supposedly anonymised data set will fall foul of the disclosure

103 104

EU Article 29 Data Protection Working Party, WP216, Opinion 05/2014 om Anonymisation Techniques (adopted on 10 April 2014) at p 23. EU Article 29 Data Protection 05/2014 Working Party, WP216,

provisions in the Act, not to mention incurring the wrath of the public and the individuals whose personal data have been compromised.

at paras 3.1-3.3.

Personal Data Protection Act 2012 (Act 26 of 2012) s 2(1).

Opinion

Anonymisation Techniques (adopted on 10 April 2014) at pp 23-24. EU Article 29 Data Protection Working Party, WP216, Opinion 05/2014 on Anonymisation Techniques (adopted on 10 April 2014) at pp 24-2 Personal Data Protection Commission, "Introduction to the Guidelines, on

105 106

102

103

Dala Protection

The Concepl of Personal Data

in the Practical Context

DECEASED INDIVIDUALS

3.110 One

conclusion to

is be drawn from this

to the general public thorough consideration

that

if o n e wishes to

case utmoa required before ro

so-called anonymised data, the be

and testing would would be wise to heed the guidancs oft the Furthermore, organisations cumulative use of anonymisation techniquee WP29 and apply a randomisation and generalisation. the two groups of

from

C. in

3.115

the Act also

Personal d

decea

ed but

the

more than

the

coverage

includes personal data about

is for those who have

not

the

been dead for

years.0 Even then, the coverage for the deceased is provisions o n non-disclosure and the protection of the

limited t o

scnt has been

personal data unless

obtained.

The Act does

any additional obligauon to retain personal data of the

3.111

because so much big d is rather unfortunate data benefit the health sci to enhance and and available for exploiting other sectors. Flowever, until anonymisa saüon technology, business and the risks are disproportionately high.

This, of

course,

iences,

techniques are improved,

3.112

disclose so-called prudent but to disclose onlv the to publiC sets general anonymised data enable s o m e control over the leml selected recipients. This will also arise by inserting relevant clauses into the contras that The

course

more

liabilities

not

deceased.

of aclion might

be not to

may

with the recipients. These clauses can contain warranties as to use and

be ifficult for an orga isation to ascertain whether actice, it may In the data relates is still alive or has died. The Act whom individual to the data belonging to the deceased from being personal prohibit

3.116

does

under the same regime as for those : still alive. So, data belonging to individuals whether alive or all personal in fact, processed be according to the same standard required eased can Act without distinction, and it may be simpler for an the under set of procedures and one stand to have o n e policy, ganisation

disclosure as well as indemnities. However, the disclosing organisation combination of anonymisation should still exercise care it does not have consent from the data where especially

and utilise

since

pecially pact on

a

techniques, subjects to disclose personal data.

not

handled or processed

the

personal data concerning the deceased can have an personal data of individuals still alive, and thereby of compliance with the Act. A case in point

triggering the requirement

pertaining to health or hereditary, if the deceased

medical

are

3.113 should develop good governance structures to conduct an initial risk analysis and ongoing follow-up. Indeed, any organisation wishing to anonymise data must engage in much discussion with the relevant IT personnel in order to develop workable anonymisation solutions. Co-ordination between data protection officers and those with technical expertise in applying the anonymisation techniques is essential. Key questions that need to be addressed include what is the data, for what purposes is the data being anonymised and for how long.

Organisations

issues. For illnesses

or diseases and the parent was a parent that that the parent was a carrier will reveal that carrier, this information also have the same disease. For example, a most would likely the child be a carrier for haemophilia, there is then a 50% chance

is data

is

a

woman may that her son will suffer from haemophilia contained in the X-chromosome.

as

haemophilia is linked

to a

gene

3.117 other rules of Secondly, for s o m e kinds of personal data, For requirements confidentiality example, apply. confidentiality may

are the methods being used appropriate and what re-identification

for medical personnel often persists even with the death of the patient.

risks may be posed.

Thus, it may not be personal data.

so

straightforward

to

put

a

time limit

on

the

3.114

Anonymisation is a highly complex field, both legally and scientificaly but the notion that anonymisation is merely in the realm of statisticians and researchers and too esoteric to be an issue of importance shoud be permanently dispelled. A healthy and realistic appreciation of the limitations of anonymisation, which are also becoming more apparey is in order. Once a data set has been released into the public doma

it is not feasible to "recover" or retract it.

104

3.118 In practical terms, it may therefore be good practice and indeed a the deceased SImpler one to process and handle the data concerning t h e same way as personal data concerning the living as required

08 Personal Data Protection Act 2012 (Act 26 of2012) s4(4)( 09

Personal Data Protection Act 2012 (Act 26 of 2012) s 4(4)6).

105

Data Prolection in the Practical

Context

the two than to separate under the Act, rather such as steps also include taking course, would the data if there

are

no

The Concetpl of Personal Data

sets

of

datta.

manenty destThis, oi for the data to be

or other reasons

legal

BUSINESS CONTACT INFORMATION E. 3.122

retained.

An

3.119 In order

to

minimise

costs

for organisations in

wclusion from the is business contact inform

important

the Do Not Call regime ontained in the same Act but which is

the event

under

that

deceased attempt to exercise any of the representatives of the Ohe of the deceased, such as the rights on behalf data protection correction, the data records could be digitised and ficlds be insertedt

beyond

the scope

3.123 contac

is known signal if the data subject 7. in detail chapter m o r e in discussed

D.

to

be deceascd. This is

of the data operation protection although this is still covered

of this work.

information

1siness

will

e

for his or

HISTORICAL RECORDS

is

defined

to mean

an

individual's

name,

title, business telephone number, business ition o r address, business c-mail nail addre address or business fax number, and any other similar information about the individual not provided by the individual her

personal

purposes.

112

solely

clear

3.124 types of information that are considered business contact The on are the standard kind of information one would find on a int card. This exclusion was name siness or designed with the the transfer.of business contact information is often that gnition integral to many business operations, and that in the context of

generally be excluded anyway, as it 1s not common for there to be

business contact information for certain purposes is often implied.13

personal data created and contained in any record if the person has

This exclusion relies on the concept of deemed consent that Singapore

3.120

the data protecti. The Act contains an interesting in a record thar contained data regime in excluding all personal Given that averac 100 least at years." for been in existence kife is well below 90 years, it 1s not entirely clea in exclusion from

expectancy

Singapore

why this exclusion is needed. Personal data in this category would

exchanging business contact information, consent for the use of

not yet been born. Given the average life expectancy is under 90 years,

has adopted. As will be discussed in chapter 5, the concept of deemed

most personal data in this category would not fall within the ambit of the Act as a person who dies at the age of, for example, 85, would have most of the protection ceasing upon death and all protection ceasing

consent may enable compliance to be less troublesome, but it leaves gaps in security and in the protection of personal data.

95 years after they were born.

3.125 The effect of excluding business contact information from the operation of the personal data protection provisions means that such information can be collected, used and disclosed without any restrictions whatsoever and they are also not subject to any of the personal data protection principles. On the positive side, this gives free to all to amass business contact information for purposes such as talent and recruitment, for general networking and perhaps

3.121 This exclusion could arguably have some application to wills but unclear why there is such a prominent exception for it. Perhaps, the exclusion was designed for the administrative benefit of archivists and others dealing with historical records. They would not need to check if the person is still alive and can simply proceed to collect, use and

it

disclose the historical personal data without incurring any compliance COsts.

reign

searches

to combine and compile to ascertain what kind of talent pool a rival

organisation might have.

l Personal Data Protection Act 2012 (Act 26 of 2012) s 4(5). 2Personal Data Protection Act 2012 (Act 26 of 2012) s 2(1). l3 Ministry of Information, Communications and the Arts, Public Consuitahon 5Ledy Ministry of Infermation, Communications and the Arts: Proposed 110

Personal Data Protection Act 2012 (Act 26 of 2012)

106

s

4(4) (a).

Personal Data Protection Bill (19 March 2012) at para 2.30.

107

The Concept of Personal Data

Data Prolection in the Practical Contex

3.126 the exclusion 1s that one's persona One of the negative effects of and combined witho raded, compiled can be frecly sold, information

corrected

or

delo

having erroneous domain the individual' the public effect, it is putting into individual works (or has the information concerning where name of recourse

to

collect any percentage ot the fares or of the the taxi drivers were plying their trade as taxi their mobile telephone numbers formed business contact did

not

ookings" As

pondents

a

ny n

me

the worlthe workplace, the and the role they hold even the qualifications of the n and the address of the workplace on anonymisation above in the section As already mentioned data or protession is one of the kev ni. life about an individual's working used to be can other data easily match and information with which

individual

drivers

information as tdly Iaxi service,

at

pieces

i twas imperative for the passengers to communicate

with the

bookings.

taxi drivers

ach

such

as thec

for matterS concerning the delivery of the pick-up location or cancellation of the

Being busIncss contact information, the mobile phone from the operation of the were cxempt personal data

ers visions rotection provis

and

mumb

their disclosure did not constitute any

breach.

of to reidentify the individual from data that is supposedly anonymised.

EXCEPTIONSs OF OTHER KINDS OF PERSONALIDATA F.

3.127 or monetay gain role is a It is true that a person's employment there should not be and in undertaken public any activity that is shielded. However, where a person works is of being expectation of their ume, in fact, it woul where they spend a large majority the number one spot of where for home individual's with the

compete

number of hours. Hence, when the the individual is located the most of the workplace are known, the location of address the and workplace individual will also be known. Thie the physical whereabouts of the makes it extremely easy to locate an individual, especially since the individual will be at that location on a regular basis. This kind of data would be prime data for narrowing down and singling out and distinguishing an individual, and thereby leaving the individual with reduced security both over the individual's person and the individual's personal data, and increased vulnerability to attacks. It is quite unfortunate that this exclusion is present in the Act.

3.128 There has only been one case to date on business contact information. The personal data in question in Comfort Transportatiom Pte Ltd and

3.129

give a general conception of what is under the Act. As will be seen in later nderstood to more kclusions or exceptions contained in there are many chapters, which are situational, so that whilst information may constitute e Act will be the case that some of the requirements in the has This chapter

sought

to

data be personal

ersonal data, it

legislation are exempt

from compliance.

3.130

be the classification of whether a piece of biggest hurdle can data. As already discussed in this chapter, even is personal information to have suggested a subjective and movable the Commission seems definiüion of personal data when dealing with supposedly anonymised personal data.This is a problematic move because if personal data becomes a subjective concept, the fact that the data is not regarded as personal data to personA means that person A can deal with the data The

in any manner without reference to the Act and can sell the data

to person B, and so on. This will perpetuate the disclosure and disemination of personal data as each person in the distribution chain

CiyCab Pte Ltd was the mobile telephone numbers of two taxi drivers

will try and claim the data is not personal data; soon, the weakest link

which was disclosed to passengers who had booked taxi services offered by these drivers. The Commission found that the two respondent taxi companies were acting as intermediaries in matching the taxi drivers with the passengers, The taxi drivers were not employees but the independent hirers in the business of driving taxis, furthermore,

becomes the biggest chain of personal data urading. By conceptualising personal data as a subjective concept and allowing a liberal view, more personal data then becomes publicly available and, as will be seen in

114 115

17 Conort Transportation Ple Ltd and CityCab Ple Ltd [2016] SGPDPC 17

[2016] SGPDPC 17.

Comfort Transportation Pte Lid and CityCab Pte Ltd [2016] SGPDPC

T7

Comfort Transportation

Pte Ltd and

at [16].

108

CityCab Pte Lid [2016]

SGPDHC

at u6

at (1]. 116

later chapters, when personal data is publicly available, its treatment

"

[8] and [16].

Comfort Transportation Pte Ltd and CityCab Pte Ltd [2016] SGPDPC 17

at [16]. 19 See paras

3.58-3.106. 109

Data Protectionin the different under the Act is is

not

required.20 This, of

as

Practical Context and dio ramifications forSre for

use consent for collection,

course,

has

serious

security.

CHAPTER44

Notification Obligation

INTRODUCTION

A. 4.1

or Obligations' outlined in the Personal are nine key principles 2012 (the "Act"); the first of which is the Act Protection Data the individual regarding all purposes of requirement of notification to of the individual's personal data on o r disclosure or the collection, use, or disclosure." The Personal Data Protection use, the collection, before Commission (the "Commission") has named this the Notification Obligation." The organisation should also be able to provide, when requested by the individual, the business contact information of someone who can address the queries of the individual.5

There

4.2 There are two main exceptions to the Obligation of Notification contained in section 20(3): where consent is deemed under section and in the situations listed in the three schedules referred to in

15

1

The Personal Data Protection Commission refers to the principles as

Obligations', see Personal Data Protection Commission, Aduisory Guidelines on Key Concepts in the Personal Data Protection Act (revised on

2 4

5

120

6

See ch 5.

110

15 July 2016) at para 10.2. Act 26 of 2012.

Personal Data Protection Act 2012 (Act 26 of 2012) s 20(1) (). Personal Data Protection Commission, Advisory Guidelines on Kry Concept5 mthe Persomal Data Protection Act (revised on 15 July 2016) at para 8.1. Personal Data Protection Act 2012 (Act 26 of 2012) s 20(1) (0). Fersonal Data Protection Act 2012 (Act 26 of 2012) s 20(3)(a).

111

Data Prolection in the

Practical Context

Notification Obligation

Third, a n d Fourth Schedules t the Sccond, section 17, namely, consent, n o notification is i deemed it is a situation of disclosure falls within.Cquire. ds use, o r collection, if the of Similarly, situations in the Second, Third, or Fourth Schedules, then

data to be collected from third parties without individual, but the collecting must organisation the the disclosing organisatiion with sufficient information the purpose of the collecion to enable the disclosing ding regar to determine whether the disclosure would be in 4.5

1 1 The Act a ll ou vS

the

conscnt

no required," subject to the emp notification of the purposes evePoymen in section 20(4). The out sct the exception exception to Schedules will be be duons discussed Se Third, and Fourth is

out

in the Second,

4.3

provide

in

chapter 5.

employer c a n collect In the employment context, an employee for the purpose of mo disclose personal data about relationship, the employee mu or terminating an employment first that in any situation Section requires 20(4) notified.10 be where o r disclosed for the Durnre used, personal data is collected, an employment relationship betwee managing or terminating the organisation must inform and individual, that organisation the individual of the purpose" and, on request by the individual, the business contact informatüon of a person who will be able to answer th individual's questions about that collection, use, or disclosure on before

accordance

of Information, Communications and the Arts ("MICA") had indicated hat it would be permissible for an organisation to give a general blanket notification in documents such as staff manuals and staff bulletins. Thus, for example, if employers wished to monitor the activities of their employees at work using closed circuit television cameras or video cameras, computer monitoring software and other surveillance devices, they are permitted to do so with just a blanket It would also appear that employers c a n collect and use notification. data of employees collected from social media and other personal with such a blanket notification, as long as the purpose is for managing or terminating the employment relationship.

platforms

the secuon on anonymisation

in chapter 3,5 the

erlosure of personal data to another organisation should not be done

managing

4.4 Although notification is required in such circumstances, the Ministry

Act.!1 with the

4.6 discuSed in

an

behalf of the organisation.

Dersonal

of the

data that is discloscd to lightly. In this regard, whatever personal nother organisation must only be for the same purposes that the first ranisation had notified to the individuals and consent obtained, and

in good practice, the disclosures should also be notificd to the individuals as well. Notification to the individual of the disclosure to

another organisation may be dispensed with if the personal data was

obtained via deemed consent or if the personal data to be disclosed to the other organisation falls within any of the situations listed in the Second, Third and Fourth Schedules.17

B.

RATIONALES FOR THE NOTIFICATION OBLIGATION

4.7 The reason for the notification of the purposes of the collection, use and disclosure is because of the need to obtain the individuals' consent for these activities with the personal data. The Consent Obligation will be discussed in chapter 5. Indeed, in the case of Universal Travel Conp Pte Ltd, the Commission found that since the travel agent had disclosed the passenger list containing the personal data of the 37 passengers without obtaining their prior consent, and in doing so had also not informed them of the purposes for which it was disclosing their personal data, it was also in breach of section 20 of the Act." 4.8

he notification of the purposes of the collection, use and disclosure

10 11 12 13

Personal Data Protection Act 2012 Personal Data Protection Act 2012 Personal Data Protection Act 2012 Personal Data Protection Act 2012 Personal Data Protection Act 2012 Personal Data Protection Act 2012

(Act 26 of 2012) s 20(3) (6). s 26 of (Act (Act 26 of 2012) 2012) ss20(3) 20(3)(a) (6) and "17. s 26 of (Act 2012) 20(4). (Act 26 of 2012) s 20(4))(a (Act 26 of 2012) s 20(4) (b). Ministry of Information, Communications and the Arts, Public Consullano cauons Arts, nfo of by Ministry Arts: PTOps 55ued muncations and the lDala Protection Bill (10 Personal Data Bill (19 March 2012) at para 2.69. ond

112

Ses the boundaries o f w h a t t h e o r g a n i s a t i o n is p e r m i t t e d to d o with

1

5

16 17 18 19

sonal Data Protection Act 2012 (Act 26 of 2012) s 20(2). See ch 3, at paras 3.50-3.114. Pe Data Protection Act 2012 (Act 26 of 2012) s 20(3)(a). 9na Data Protection Act 2012 (Act 26 of 2012) ss 20(3) (6)

[2016] SGPDPC 4. Uauersal Travel Corp Ple Ltd [2016] SGPDPC 113

4

at

[13].

and 17.

Context Data Protection in the Practical personal

data. The

organisation's

collection,

Notification Obligation use

and

disclo

Purposes, not activities

has beeSure limited to the purposes will be Any new purpose will require fresh notification and consent from the the

for which notification

4.9 The notification of informed decisions

purposes as

to

also

scrves

whether

they

to enable ole wish

to

choice

and

the purposesto

individuals

individuals to give consent formake

collection, use or disclosure for the stated purposes. The

cation

control

some over the Obligation gives individuals assess whether they are and allows individuals to data personal a m a n n e r for beneit used in such for their personal data to be s or

gains, if any.

10 Furthermore, by providing individuals with the purpose or purposes

for the collection, use and disclosure, individuals will be in a better position to ascertain whether the collection, use or disclosure complies with the Purpose Limitation Obligation, or whether what the organisation is requesting is excessive. 4.111 It should be noted, however, that the exception to the exceptions set out in section 20(4) above does not require consent, only notification. Hence, organisations may collect, use or disclose personal data with notification but without consent for the purposes of managing or

terminating an employment relationship.20

4.12 the minimum,

At

organisations

should provide notification of the primary purposes of collection, use or disclosure, that is, the specific

functions

or

objectives for which

the

a

particular personal data

is collected.

hence h ence

ctivities that it

use

and

disclosure.

individuals of It is

not a

inform individuals of all the possible uses and

requirement

disclosures,

there is no need for organisations to list all the

will undertake in relatio

to the personal data.2 For

i f the purpose is to enable the delivery of goods, there is no

instance, if eed to list all the

acuviues

t h a t will

be

undertaken with

respect to

the.

nhone number and delivery address such as stating that the ersonal data will be entered into a database, printed out, passed o n to

he delivery personnel whowould may be need external inform contractors and so on. individuals of its an organisation imilarly, notnormalto business practices, such as that internal purposes form part of and business planning

auditing,

billing.

4.14

t is more important for organisations to identify the purposes or objectives or reasons for the collection and use of the personal data and to state them clearly. By stating the purposes clearly, this would also help establish whether the personal data collected is consistent with the purposes identified and thereby minimising the risk of contravening the personal data protection Obligations in the Act.

"On or before"

2.

PRACTICAL CONSIDERATIONSs

C.

requirement informing

Obligation is a llection, collection. of the

4.13 The Notification

individuals.

4.15 Second, the requirement in section 20 is for the notification of purposes to be given "on or before" the collection, u s e o r disclosure of means that the notification may be given well in advance or just before personal data is collected, used o r disclosed. The usual practice would be to give the purposes for collection, use o r disclosure prior to collection so as to cover all activities for the stated personal data has been collected. If after the once personal data has been collected and an organisation would like to use

personal data. This

arposes

the

ne personal data for additional purposes, these would have to be noutied to the individuals and fresh consent obtained. Hence, it would

20

This is due to to

the exceptions in the Second, Third and Fourth Sched pertaining personal data collection, use and disclosure. n the of employment for purpose managing or terminauo019 2017 emploment relationship, see, eg, Personal Data Protection Act 26 of (ACt

2012) Sched 2, para 1(o). See 114

ch

5,

at

paras 5.84-5.88.

make practical sense to be well prepared and thorough before any collection of personal data is made. 21

ersonal 2e 4

Data Protection Commission, Advisory Guidelines on Key Concepis Fersonal Data Protection Act (revised on 15July 2016) at para l4.15.

115

Data

4.16 Where

Protection

in

the Praclical Context

collected, used data needs to be individuals need to be collection of the personal to the first

personal

periodic basis, informed

prior

formed

Notificalion Obligation or

disclo.

of this and data.22

d, however, be stresscd

on ; to

hbe

formedand

nurposcs

the

evident, t h e r e

dala appear that notification

that Cven where

there is a

for collection,

be

use and disclosure of will be situuations wherc

given.

1he

neXL

Where

there is n o formation of c o data is collected and the noification of the to advisable give be it would in a m a n n e r as noticcable as possihi

personal

involved,

C 3.

and protection. Ther is every visitor who ente The security cameras are conunuously capturing the ima of individuals cither as videos or as photographs and these are clearl personal data. As such, premises that utilise security cameras shoule

4.20 ld

premiscs obviously premises.

for

no

the purposes formal contract

of

security

formed with

deal with this

SubsidiaryY purposes

practicable carly Cxamplc, consider the situation where security cameras are 1,"or on as

as

personal

sound practice will

Section will

dictate

4..17

contract

be wise for organisations to distunguish between the levels or

and to assess how much depth of the purposes need of purposes lavcIs h e notificd to individuals.here are no concrete rules to be fallowed in this regard but the aim is for uhe individual to comprchend

have the notification of purposes at the gates or entry points of the

be put to. To this end, if the the all the purposes uirDoses will involve disclosure of the personal data to third parties or

premises. If the notices are located only at pointS well after where he

t the purposes thus far stated do not give an adequate idea of the full

security cameras are positioned or where visitors are unlikcly to sce them, there would be room to argue that the notification was not given before

he

collection

of personal

data

in

contravention

of the

Notification Obligation.

personal data will

extent of the use or disclosure of personal data in order to achieve the

stated purposes, then, the stated purposes should probably be more specific and detailed. For example, if there will usually be disclosures made to others, this should be notificd to the individuals and if the list

of recipients of the personal data is too long, they can be categorised 4.18

into recognisable classes or types of recipients.

Where personal data needs to be collected as part of a contract, then the notification should be given before the contract is formed. It may be the case that for some types of contracts, consent can be dcemed of he purposes is not required under and, as such, notification unless 20(3) purposes extend beyond the purpose of the contract. For example, for contracts involving a dclivery, in many purposes for the collection, u s e and disclosure of personal data such as the address and phone number will be clear

4.21 Often, there will be subsidiary purposes that will alrcady be encompassed by the main purposes stated, but for various reasons, such as the lack of possession of specialised knowledge, the subsidiary purposes would not be apparent to individuals and would need to be specifically notified to the individuals. Subsidiary purposes should not

section (a), instances, the

the

from thee context and they would be situations where consent can be

deemed and hence example in this

no notification will be required. The classic regard would be the ordering of pizzas for delivery. The address for delivery and the telephone number would need to be used for delivery purposes and they would also need to be disclosea to the delivery personnel who may be third-party subcontractoi However, if there are additional or secondary purposes that are o related to the purchase and delivery of pizzas, such as keeping u delivery address to send advertising materials, the secondary purpo must be notified and consent obtained, preferable at o r before u ime of personal data collection, so that there is no double handling

22

Personal Data Protection Commission, Advisory Guidelines on Key in the Personal Data Protection Act (revised on 15 at

July 2016)

116

para

naepts

be confused

with

secondary

purposes.

Subsidiary

purposes

are

that are intertwined with and usually deeply related to the main purpose and are required in order to achieve the main purposes.

purposes

Secondary purposes are usually understood as additional purposes Whether they are related to the mairn or primary purposes or not.

4.22

Cxample might serve to illustrate the point. Suppose an individual ISes

to

open

a

trading

account

wih

a

broker

so

that the individual

the

Singapore Stock Exchange ("SGX"). Here, the Conde dctual purposes are clear and thus the purposes of collecion, use lheosure of personal data also clear. It would be obvious that ODectives of the personal data collection, use and disclosure are on

are

ththe poses SGX and,

of

setting

up

an

technically, cons

account can

117

and

to

engage

be deemed and

in

no

trading o

notification

Data Prolection

is

necessary.

In this instance,

to the organisation to

the

formation

in the Practical

would however, it

actually provide

of the

data

notification

that

contract so

there

collection,

Notification Obligation

Context

is

be good of

no

use

practicefo Pria

the purp

ambiguity

and

ut he

disclo

of the personal the m a i n obJCctives o r p u r is because although r e a s o n for this to be use« used or disclosed need data may obvious, the personal the individual mayy not which in be and ways subsidiary purposes and other frameworks surroundine of due to the regulatory a trading accou in addition to setting up trading. For example, Dank and disclosed for the to be collected need account details may related to but which is a purpose of depositing dividends,

objectives

rposes are

for Ware

quity

POse

sube

the purpose of setting up the trading account. Individuals may l o be need to be ex thus, and, they aware of this subsidiary purpose informed

4.

so

that

Manner

their

consent can

be

obtained.

plicitly

and form of notification

be provided also be prou

also

through personal a

data

protection is indeed feasible, the organisation would nced to While this 2 data data protection policy 1s the nersonal actually accessed or that could

notification

personal

policy.

ure

by

the

r e aid vidual

data

to

protec

unreasonable

iis

somehow brought

to the attention of the For example, if the personal policy is only available online, it would be assert that notification has taken place as not

individual

ensure

or

true

notification.

or client has access

customer o r clier

to

the

every lnternet, and know that the

nal data protection policy contains the notification of purposes t h e website to find the personal data where o n

Ptoknknow and to

protection

such a situation, the organisation should explicitly direct

duals to the personal data protection policy for the notification of the policy o r the relevant furnish a copy parts of the purposes or

policy

of

policy to

individuals.

4.25

mhedding the notification ot purposes in a personal data protection

organisauons r u n the risk that the nolicy may also m e a n Droad be too may or t o o general for a section of notification tdividuals and, hence, may necd to be supplemented with a more that

1.23 The Act does not specify any requirements as to the manner or form of

the notification. For this reason, the most appropriate manner and form will depend on the circumstances. In the example of the security ove, a notice at the point of entry would be the best method

cameras of providing the notification as that would be the first oPportunity to notify individuals of the collection of personal data and it would also be the most visible. Similarly, for the recording of telephone calls, where a person's voice and the contents of what the individual says would be the relevant personal data collected, the earliest point at which notification could take place would be at the beginning of the call. Thus, the notification of purposes could take the form ofa recorded message about the purposes of recording the telephone call before the telephone call is actually answered by a human being. In this regard, a number of organisations in Singapore using call centres greet their callers with the noification that the call may be recorded for quality and training purposes". Arguably, these a r e then the only purposes for which the personal data can be used, s o that if there is a dispute as to the substance or content of what transpired during the the recorded conversation cannot be used against the caller that would not fall within "quality and training purposes".

cnecific notification of purposes. This might be the case, for example, of

if the organisation offers a wide variety services o r products but for the much more details of the certain services offeredbyFor organisation, a n insurer are example, may provide health Durposes required. insurance as well as home insurance. The purposes for the collection

and use of personal data for a health insurance policy will be more complex than the purposes for a home insurance policy and, hence,

the notification should be more comprehensive. 4.26 For some transactions, it would be efficient and ideal if the organisation states the notification of purposes and, at the same time, obtains the individual's acknowledgement of the notification and consent in writing, either electronically o r o n paper.

conversation, because

4.24 For evidentiary reasons, it would, of course, be beneficial tor notification to be recorded in some way, such as in written form, eiu

in electronic or paper format. The Commission has suggested that

118

23 24

ersonal Data Protection Commission, Advisory Guidelines on Key Concepts at para 14.12. Snal Data Protection Commission, Advisory Guidelines on Key Concepls eFersonal Data Protection Act (revised on 15July 2016) at para 14.13.

he Personal Data Protection Act (revised o n 15 July 2016)

119

Data Protection in the 5.

Consequences

4.27 In providing

if personal

Practical Context

data

is

not

Notification Obligation

collected

POSITION IN

of the collection 1, of the purposes holistic view to be prese a for data,

notification

n

use and

ted, i

of personal to elaborate for organisations would also be helpful all of the personamain o r some if for the individual consequences used o r disclosed. not collected,

disclosure

personal data is

4.28

the signie list every single c o n s e q u e n c e , only to result need to be be expected could that consequences avoided o r lessened can be some of the consequences other not but personal data, this individual providing some notification. Some examples of consequences

There is

no

need

o ifican thro should

to

highlighted in the o r disclosed micat data is not collected, used may result if personal o r concession cann membership a benefit, that an application for de processed, or that the individual will receive a different level of ervice. individual may n o t be eligible to hire a car, the discount unless the individual provides details of the status of

For example,

fo heir

demerit points under the driver's improvement point system.

4.31 ticle

nirective

6

f

the

THE EUROPEAN

European

95/46/ECprovides

UNION

Union

that

EU") personal data

Data Protection be "collected

must

explicit and legitimate purposes and not further way incompatible with those purposes". This is echoed orocessecche EU General Data Protection Regulation specified,

for

2016/679.27

i n Article5

Data Protection Regulation 2016/679 general transparency obligation on organisations that imposes personal data. Recital 39 of the General Data Protection

4.32

addition, the EU General

In

handle

lation 2016/679 further provides that it should be transpare ndividuals that personal data concerning them are collected, used, and extent the personal data or otherwise to co he processed. Any information and communication relating to the processing of those personal data must be easily accessible and easy to understand, and clear and plain language must be used. This principle of transparency is appicable, inler alia, to the purposes of Drocessing and any further information to ensure fair and transparent orocessing of personal data. Individuals should be made aware of risks,

consulted

processed

what

nules, safeguards and rights in relation to the processing of personal

D.

NOTIFICATION OF PURPOSES IN THE ONLINE

data and how to exercise their rights in relation to such processing. In

ENVIRONMENT

particular, the specific purposes for which personal data are processed should be cxplicit and legitimate, and determined at the time of the collection of the personal data.

4.29 Much personal data is collected and processed in the online environment, either through applications that are used by individuals, such as social media applications or even through the browsing of web pages. These activities would also require users to be informed of the purposes prior to the collection and use of the personal data, unless they fall within an exception.

4.33 The requirements for

notification under the EU General Data a r e far more comprehensive than the requirements under the Singapore legislation. The Act only requires

Protection Regulation 25

.30 In recent years, the use of cookies on Internet web pages to surreptitiously collect and use personal data has drawn mucn attention. This will be discussed in more detail in chapter 5.

26 27

2016/679

Directive 95/46/EC of the European Parliament and of the Council of 24October 1995 on the protection of individuals with regard to the data and on the free movement such data

Processing of personal of 1995] OJL 281/31 ("Data Protection Directive 95/46/EC").

Data Protection Directive 95/46/EC, Art 6(1)(b). 2016/679 of the European Parliament and of the Council of 27 2016 on the April protection of natural persons EU

Kegulation (EU)

with

gard to the processing of personal data and on the free movement of

such data, and repealing

Directive 95/46/EC (General

Data

Protection Kegulation) ("EU General Data Protection Regulation 2016/679"),

Art 5(1) (b).

0EU General Data Protection Regulation 2016/679, Arts 12 and 13, and Recitals 58, 60, 61 and 62.

EU

120

General Data Protection Regulation 2016/679, Recital 39. 121

Data Prolection the

use or of the collection, s o meone the contact details of

purposes

with The EU General Data

along

individuals

such

in the Practical Context

as

are

Protection

provided

with

disclosure who

to

be o.

notilied,

answer que

uestion ensure beyond the n a

can

Regulation 2016/679

information

in the risks, ules and rights

well

relation

to

urpos the processin

transparency concero are personal data. Individuals data will be processed, and the exten. what and how their personal be processed. This rena are o r will which their personal data the purpOses but also of not only Just providing notification law requires that individa EU the In short, be processing activities. relation to the "processing" of th entitled to full

CHAPTER5 C o n s e n tO b l i g a t i o n

requires

in informed about everything defined to include very broadly "processing" with every personal data, data, to including the ac s of done personal conceivable act that can be

collection and storage."

the most contentious and consent appears to be inciple of of the personal data protection regime in aspect problem: of consent is so problematic that it nearly

5.1

The

princip

The principle

apore. borders

on

rendering

unworkable.

obligation

to

the

whole personal data protection regime

Obligation is a helpful and essential those who collect, use or disclose personal impose o n the concept has been shortcoming Is the way

The

Consent

data, but the major legislation. conceived in the Singapore 5.2 There

are two

main aspects to be

of the Consent detrimental.

Obligation that will, in

The first is the concept of

vears to come, prove second is the voluminous situations listed in deemed consent' and the is not required. Both of these allow the the statute where consent without consent and which goes massive stockpiling of personal data collect to The personal data without consent is unchecked. ability the in first floodgates of problems. Once the opening step arguably accumulates. Even if the uses personal data is collected, it remains and of the personal data are stipulated narrowly (which they are often not),

it is near impossible for a third party such as a governmental authority to constanty monitor, let alone enforce, that the personal data is only

30

EU General Data Protection Regulation 2016/679, Art 4(2): is processing means any operation or set of operations which or data or on sets of personal data, whether on performed personal not by automated means, such as collection, recording, organisation, structuring, storage, adaptation or alteration, retrieval, consultation, use, disclosure by transmission, dissemination or otherwise making available, alignment or combination, restriction, erasure or destructon.

122

being used for the permitted purposes. If the personal data is further allowed to be disclosed liberally, the whole process perpetuates iiselt

Personal Data Protection Act 2012 (Act 26 of 2012)

s

15.

Data Protection Act 2012 (Act 26 of 2012) ss 20(3)(6) andl, 2Personal and Second, Third and Fourth Schedules.

123

Data Protection in the Practical Context

Consent Obligation amounts of information, much of it is necessarily al data. These large pools of personal data have come under

and the situation is made even morC acute with even mos

accumulations of personal data. With collection and accum harms has already occurred be one of the because there

biggest

centralised

pool

of information

on

individuals.

vast

tion, is a

vfa s t holder o

rity threats in recent years. the the computers from the to delink was to

sophisticat

coms

delink

Cxperts

5.3 As discussed in chapter 1, the accumulatüon of large pools of ne data over time and from many ditferent sources creates o environment in a number of ways. It can certainly harm people in that were not foreseen. At the top of all concerns for organisat however, would be the associated costs of protecting such Dere

data;

to ensure that there

are no

rsonal

the personal data. The consequences and liabilities of a data leak example, would be far more dire for the organisation than the costs or protection, in financial terms and in reputation and goodwill. Indo of

stolen tangible property.

are

we have to make sure that our system is secure. We can't get infiltrated, data cannot be stolen, somebody can't come in and wipe out your data or cause some other mischief .. In terms of security, safety of our systems, safety of our citizens and information concerning them, it's absolutely necessary. Otherwise, one day you find all your NRIC numbers, addresses and income tax returns for sale on the internet, one package 10 gigabytes How will the Government explain?

5.5 The situation is aptly summed up by the Prime Minister: "In terms of security, safety of our systems, safety of our citizens and information concerning them, it's absolutely necessary" The Government is a Charissa Yong, "Delinking Internet access necessary to keep Govt data PM Lee" The Strais Times 2016). Charissa Yong, "Delinking Internet access necessary to keep Govt da secure: PM Lee" The Straits Times (9 June 2016).

these concerns Act 2012 (the

n

allowing

to

sit

on

security

large collections corporate computer

to be

"Act").

found in

Why,

for prevent of personal data and systems waiting to be

similar concerns that

sations from amassing

ought

to

by hackers, thereby engendering the safety of

and rendering informatior concerning them vulnerable. The

citizen

collection is only the starting point. Ifcybersecurity threats are be ed seriously, organisations should also not be allowed to freely use disclose personal data without consent in the ways that they are the Singapore personal.data protection legislation.

and

allowed to u n d e r

5.6 fndeed, it is because of the enormous negative by-products of personal

dofa CCumulation that security expert Bruce Schneier has called data, especially personal data, "the pollution of the information age" and

A.

that "its

atter-effects

are

toxic"

6

CONSENT OBLIGATION

5.7 The second Obligation set out in the Act mandates that consent be

obtained from the individual before personal data is collected, used, or disclosed." Consent may also be given by any person validly acting on behalf of the individual for the collection, use or disclosure of the individual's personal data. The practice of referring potential customers commonly found in Singapore would fall under this category. An existing customer may disclose, with the consent of the potential customer, the name and telephone number of the potential customer to a bank, for example, and consent would have validly been given to the bank. 5.8 This Consent Obligation, however, does not apply where collection, USe or disclosure of an individual's personal data without consent is

5

(9 June

124

no

example,

argues unequivocally

5.4 So serious are the concerns of data breach and cyber attacks that Singapore's Prime Minister Lee Hsien Loong announced in June 2016 that from May 2017, all computers used by the public service will be disconnected from the Intermet. This, according to the Prime Minister, was "absolutely necessary" to keep government data secure. The press reported that the Prime Minister said:3

secure:

of

he advice from

and

difficult if not impossible to undo. The ensuing damage could, in somo circumstances, be contained but once personal data is stolen, it will be forever stolen as some personal data, such as biomentric data, can never be changed and the information cannot be "recovered", unlike

3

traces

Protection

attacked

breaches of the system and no theft.of

the consequences of a data breach are often unpredictable

are no ondering why there Singapore'sPersonal Data

1

Internet. This leaves one

8

Act 26 of 2012.

Bruce Schneier, "The Tech Lab: Bruce Schneier BBC (26 February 2009). Personal Data Protection Act 2012 (Act 26 of 2012) s 13(). Fersonal Data Protection Act 2012 (Act 26 of 2012) s 14(4)

125

Data Prolection in the Practical Context

Consent Obligation

required or authorised under the Act or any other Written law.

Thus,

the Act is subject to other laws.

5.9

The term "consent" is not defined in the Act but the cone.

the notion of deemed

consent

which will be

dise pt is

complicated by below. Furthermore, pursuant to section 14(1)(a), subject to e d tWo situations falling exceptions under section 20(3), namely,

withi

deemed consent and the situations set out in the Second, Third Fourth Schedule, consent that is obtained without first notifvino individual of the purposes of collection, use and disclosure is not Thus

imperative that organisations provide clear notifications of purposes.

purposes beyond

what would be

new

considered

reasonable. l5

prompted

MICA to cite the requirement of the be reasonable, as this was not enacted in the having ses een in chapter 6, the limitation purpo be sscen will be of purpose As will legislation. a i m p o s e sucha requiremen The test in section 18 is does n o t principle ase :must be one that a "reasonable person would consider hat

5.12 t

is

unclcar

to

that

the

purpose

in the circumstances

hiIs is an appropriateness test

oriate

consent.10 Section 14(1)(6) also requires that the consent given huvalid

individual is for the purposes notified to him or her.

for

r f o ra

is

which

5.13 It is ata

5.10

Consent is also invalid if false or misleading information regardino

is n o t

clear,

it

the same

however,

holds for

arOvisions,

as

requiring the purposes to be reasonable,!7 anisation has never used personal prior to the commencement of

that if

an

keting

purposes

it would

not be able to do sO now

without

consent.

the

the collection, use or disclosure of the personal data has been

provided to the individual, or if misleading or deceptive practices have been utilised.2 The Personal Data Protection Commission (the

"Commission")

has

elaborated

that

this

would

1on encompas

stated in vague or inacCurate tems, in an illegible font or placed in an obscure area of a document or a

situations where "the purposes

are

a

location that is difficult to access" 5.11 Section 19 deals with the position of personal data collected before the commencement of the provisions. It allows organisations to use such personal data for the purposes for which the personal data was collected, unless consent has been withdrawn." The Ministry of Information, Communications and the Arts ("MICA") has stated that this is limited to existing uses that are reasonable taking into account the nature of the organisation's business. Hence, organisations are not required to obtain explicit consent for the continued use and processing of their personal data unless they use existing personal data

EXCESSIVE CONSENT REQUIRED

B. 5.14

the validity of consent is the important restriction concerning what consent organisations can require from individuals on limitation use and disclosure of personal data as a regarding the collection, o r sevice. The Act a of product prohibits an providing condition

An

organisation from requiring an individual to consent to the collection,

disclosure of personal data about the individual beyond what is reasonable to provide the product or service to that individual. If consent is obtained but this test of reasonableness in section 14(2) (a) is not satisfied, then the consent obtained is invalid.19 use or

5.15 In effect, there are two main areas this provision covers. First, it prohibits organisations from requiring individuals to provide excessive 15

Ministry of Information, Communications and the Arts, Publc Consultatio

Issued by the Ministry of Information, Communications and the Ars: Proposed 9 10

Personal Data Protection Act 2012 (Act 26 of 2012) s 13(b).

Personal Data Protection Act 2012 (Act 26 of 2012) ss 14(1)(a) and 20(3). See also the case of Universal Travel Corp Pte Ltd [2016] SGPDPC 4.

12

Personal Data Protection Act 2012 (Act 26 of 2012) ss 14(2)0

13

and 14(3). Personal Data Protection Commission, Advisory Guidelines on Key Coneps in the Personal Data Protection Act (revised on 15 July 2016) at para 12.22.

14

Personal Data Protection Act 2012 (Act 26 of 2012) s 19.

126

6 17

Personal Data Protectiom Bill (19 March 2012) at para 2.139. Personal Data Protection Act 2012 (Act 26 of 2012) s 18(0). The Ministry of Information, Communications and the Arts may have relied on s 14(2) of the Personal Data Protection Act 2012 (Act of 2012), but that section deals with the provision of a product or service Personal data already collected and used by organisations for whatever purposes may not be associated with any good or service provided. s Data Protection Act 2012 (Act 26 ().

26

of 2012) 14(2) Personal Personal Data Protection Act 2012 (Act 26 of 2012) s 14(3). 127

Consent Obligation

Data Protection in the Practical Context or extra

personal

data that is

not

reasonable in order

to

Dro.:

woO product or service. A scenario that might ould bethe store membership or privilege card for the holder to obtain d a when making purchases. In order to provide the scrvice o

discour

discounts, it would be reasonable for the organisation

g

to

information such as the name, gender and telephone number would also be relevant for the purpose of identifyins the

individ

uncommon

IC

The combination of the name and telephone number is o test. sufficient to identify a person, there is no necd for the date ofbi

th. Some stores may give special discounts for the birthday month of the individual and, in such a case, the personal data requested should h the month of birth, not the date of birth.

reasonableness

use

or

store discount

obtained

would

be invalid

ronsent

for stores to request information not such date of birth and National Registration ldentification Card ("NRt a

number, it is doubtful if these would satisfy the reasonablenes

organisat

unreasonable

these

a residential address is really not necessary for identification n

Although it is

An example of the former would which is legitimately collectedbe an number ividual's t e l e p h o n e and test but to require nableness tecst individuals to consent the the of satishying disclosure disclo telephone numbers in unrelated to the t membership, such as for marketingways to which mesages, and would fall foul of section 14(2) (a) and able and any id be disclosed b y t h e

illustrate this

de

Similarly, for something such

as a store membership for discounts, requesting an individual's NRIc

onale behind the prohibition is valuable, the way the is worded has resulted in some dilution of the effect. It provision is still request the individual to an o r g a n i s a i o n may 5.18 Whilst

the

rationale

give

that

ot for the collection, use o r disclosure of the excess or cxtra it is thec choice of the individual whether or not to data, but nalthe personal data The wording of section 14(2)(a) is:

appears

consen

supply "An organisation

shall

service, require an

not

as a

ondition of

providing product a

or

individual to consent to ..". This suggests that an

and governmental landscape. Even if the store membership programi

nisation may still request the information, but the organisation require it. However, this request woul still be subject to the requirementset out in section 18 of purpose limitation to be discussed

one whereby members can accumulate points for redemption, the bes

in chapter 6.

number would seem to be excessive, especially given the special significance and importance of NRIC numbers in the Singapore legal

cannot

way to safeguard the points from fraudulent use is to utilise a system of

passwords or personal identification numbers ("PINS") for members, The collection, use and disclosure of NRIC numbers will be dealt with in chapter 7. 5.16 The types of personal data that would cdearly be unreasonable to collect, use or disclose for a mere store discount membership would be information on medical illnesses, an individual's educaional qualifications and the type of car the individual drives, if any. 5.17 The second main area this provision covers is the prohibition against organisations from requiring individuals to consent to uses or disclosures of the personal data beyond what is reasonable to provide the product or service. This can apply to both personal data validly collected for the provision of products or services within the reasonableness test, but which the organisation is requiring consent for extra or excess uses or disclosures; additionally, it can also apply to extra personal data that the organisation is seeking to collect for the extra uses or disclosures. An example of the latter would be similar to

5.19

f an organisation wishes to obtain consent lor the extra personal data,

it would need to ensure that individuals are informed that the consent for the collection, use or disclosure of the excess or extra data is not mandatory; otherwise individuals may assume that all the personal data is required, leading to the consent thus obtained falling foul

requested

ofsecion 14(2) (a) and the consent would be deemed invalid.20 To this end, it would be useful when collecting personal data through forms, whether online or on paper, that those fields or questions that are mandatory or required are clearly marked, for example, with an asterisk, to alert individuals to the fact that the other fields are

optional 5.20 The example of the store discount membership would illustrate how this might operate. If the store wishes to send out notifications of OCcasional promotions to the members, it can do so with consent via

mobile phone text messages. Alternatively, it may request the ndividual for an address to which the promotional details can be sent.

Arguably, to achieve this, an e-mail address would suffice but if an

what has been discussed above in relation to the first area, information such as a person's medical illnesses should not be required in the first

place

for

a

mere

store discount

128

membership, let alone used

or

Personal

Data Protection Act 2012 (Act 26 of 2012) ss 14(2)()

and 14(3).

129

Consent Obligation

Data Protection in the Practical Context c-mail address, then a residential or worl ork to this scenario s could be collected. There are three layers whether to individual the to should be optional any of for receiving promotional address, c-mail or physical, mate is materials als likely to ho of individual has

no

First, it form

provide

promotional because the receipt the service of provi what is reasonable to provide be mandatory for the not should it discounts. Second, addressCs. One kind of and email both physical provide

oviding membereyond

dual ada dress should be sufficient. Third, it may be that there will be OCca the presentation of physical vouche whereby the store will require certain promotions to limit the number of redemptions. In s informed that those who do event, individuals should be

not

leave

it to the individuals to decide whether they wish to provide thei. residential addresses. In short, individuals should not be require provide their physical addresses; it should be optional but they shonld

be informed that they will be precluded from the opportunities

enjoy promotions using physical

vouchers.

5.21 The Commission has, however,

in

this.

Toput

to

that section

opined 14(2) (a) may not prohibit certain situations in which an organisation may seek to

require consent. It gave the example of organisations providing "offers, discounts or lucky draw opportunities to individuals that are conditional on the use or disclosure of their personal data for specified purposes"2

collection,

5.22 It would appear that he Commission may be referring to the situation where the contract or bargain itself is purely to enter into a lucky draw or to obtain a discount or offer. It would otherwise be to see how the Commission could have reached this view, that the given plain words in section 14(2) («) refer to "providing a product or service", which would encompass the situations of "offers, discounts or lucky draw opportunities". Since "offers, discounts or lucky draws" are products or services, in accordance with the plain words o section 14(2)(a), there can be no conditions attached to the provision of the products or services requiring consent for personal data beyond what is reasonable to provide the products or services, unless the product or service itself is the offer, discount, or lucky draw.

difficult

are

more

a

meml

membership. Contrast this with

colle what

is

reasonable

provision

organisatio

permisib

is

one

where the

effect, the individual "sells" personal data in

ter exchange for the discount, or the opportunity to enter into a lucky

se may be. Thus, an example of the latter scenario might called Moonbucks that sels coffee. A latte at Moonbucks be a provide their personal data to $6, but if individ normally is Moonbucks nd consent to heir personal data being used for draw, as the store

called

dtering and outreach purposes, they will in return receive a voucher them to buy a latte:at $3. The voucher for the latte at $3 is a enablin separate and independeni contract or transaction and would be a transaction for personal data collection, use and disclosure permissible under the Act.

5.24

This provision gives autonomy to individuals to decide how and whether they wish to trade their personal data for goods and services, and this would appear to be in line with the Government's desire to

engender business innovation and entrepreneurship, and not to stifle economic activity. Indeed, it tries to balance the need to stimulate economic activity and growth with the need to protect personal data. 5.25 However admirable the goals of this provision are, organisations should be acutely aware that one of the key tenets of good personal data practice is to collect enough personal data for the

protection

purposes and not too much. As will be seen in chapter 9, the less

personal data that an organisation collects and holds, the less in terms security and protection the organisation will need to provide for the

of

personal data. In this modern digital age where hacking and daa arching is cheap, easy and prevalent, and often applied to compile

profiles of individuals, as a matter of best practices, personal data idt 1S Sensitive

esdential 21

product

discount

store

scenario

nr videan a

physical address will be foregoing those kinds of promotions and

Concrete manner, ne Cxample given above of con membership has as the mc or service the nefits. As Such, consent for the vith discount the bership ndd disclosure of perSOnal data cannot move beyond ollection, use a n the onable to provide the consideration of the contract between the the situation here wh of and the individual is the personal data in discount at the store. This latter scenario xchange f o r would be for a to the Commission. In u n d e r the Actaccording

5.23

or

addresses,

significant,

such

as

NRIC numbers

and

even

should be collected

sparingly. This should be so y tor the good of protecting individuals' personal data, but also

Personal Data Protection Commission, in the Personal Data Prolection Act

Advisory Guidelines on Key Concey (revised on 15 July 2016) at para 12.

130

to

. e compliance costs for the organisation, as well as to reduce

miability arising from the personal data being compromiseu. 131

Data Protection

in

Consent Obligation

the Practical Context d

C.

his or her address to tacilitate the actual delivery of

za delivery, a n d

has been ordered. Furthermore, there would also be no

DEEMED CONSENT

the p i z z at h a t

5.26

adopted to mi. consent was The concept of deemed in the on organisations the impact of the new regime collection." Section 15 of the Act2 data processes of personal consent. The section begins with. the meaning of deemed to the collection, use or disel. consent individual is deemed to no

doubt

s

Act setss day ou "

Consent is deemed from an individual ir use, and disclosure. without actually giving consent, voluntarily provides

the individual, the for that purpose, and it is reasonak. personal data to the organisation would provide the data,24 n voluntarily that the individual nd

disclosure is at the core of the consent that is deemed. The purnoee must be clear to both parties. This also raises the question of how man that can be deemed: are can there be in any given transaction

purposes there any limits to the number of purposes? Would all the purposes

have to be clear to both parties? Arguably, if there is any purpose which is unclear or which was not envisaged by the individual, these would need to be notified to the individual, and if this is the case, then the situation would not fall under the section 15 deemed consent and would bounce back to the obligation to notify the purposes under section 20 and consent would need to be obtained as required under section 14(1).

1.

1o be

which

contractors,

nsent All this speeds up the transaction and assists in the

decmed

conse

s

losure of personal data about the individual by an organisation for a purpose if.." Hence, the key to this provision is the purpose of the collect ection,

understanding of what is the purpose of the collection, use,

hop tto o obtain explicit consent for the personal data shop

thepizzato the the delivery person, even it they are third party for disclosed to is often the case, because this too would fall under

c e dl

Deemed consent for multiple purposes

5.27 A simple example of deemed consent would be the telephone ordering of a pizza for delivery. Instead of the pizza shop staff having to enquire explicitly whether the individual consents to the collection and use of the customer's name, telephone number and address, the consent can be deemed. Under the deemed consent provision, the shop can legitimately assume consent for the collection and use of the customer's name to identify the customer, the customer's telephone number in case of a delay or some other misadventure in

pizza

OTgan

in its

delivery

productivity

of

goods

and

and

enables

the

organisation

to be efficient

services.

that are clear from the above example are the purchase of a pizza. However, oth purposes serve only a single

5.28

The purpoSCS

delivery

purposes are intimately interconnected. If the the personal data to, for example, provide future such as o enable future orders to pizza shop service i n the more efficientfaster.m a n n e r , the shop would not be able to rely on the a in be taken to do this. To illustrate, if the shop wishes to ned consent provision data, it would first need to retain the personal data. utilisethe personal 9 on the retention of personal data, the be seen in chapter As will to tain the personal data if, inter aha, it is is permitted rganisation his in instance, there may well be tax law and law, quired by reanirements to retain some ot the personal data. However, the retention of the personal data in this regard would be for

and

ian and

transaction a n d was

he

two

to utilise

Dermitted

business process efficiency purposes. So, purposes, not for identifies the individual through the the if shop piz2a for example, it cannot for efficiency reasons retain number, individual's telephone number and address on the system as a the individual's telephone record to avoid having to re-take o r re-input the delivery address for future orders. Further, if the individual had ordered a Hawaiian pizza the first time, the pizza shop would also not be permitted to use deemed consent to retain the choice of pizza ordered and ask the customer if they would like to order a Hawaiian pizza again. All the personal data and the type of pizza ordered can be retained for tax purposes and this should be kept at the backend. The personal data and the kind of pizza ordered, however, should not be retained and used, and be accessible to front end staff for the purpose of enabling more efficient ordering of pizzas in the future, unless explicit consent has been obtained.

tax related

5.29 22

23 24

Ministry of Information, Communications and the Arts, Public Comnsulkation ssued by Ministry of Information, Communications and the Arts: Proposed Personal Data Protection Bill (19 March 2012) at para 2.48. Personal Data Protection Act 2012 (Act 26 of 2012). Personal Data Protection Act 2012 (Act 26 of 2012) s 15(1). 132

as of analysis can be applied to other industries and e , where there is only a single or one-off transaction with a clear

nis kind

settüngs

Purpose or clear closely inter-connected purposes, such ordening of a taxi service or visiting a show flat.

as

133

in the

Consent Obligation

Practical Context Data Protection in the

What consent, if any, can be deemed for the use the collection stag tage.

5.30

there can Onc situation where of retention personal data

the

where

an

individual submits

perhaps be clear decmed co might be in the employment a

job

application interest

in

by

for

writing

working a n

a general organisation expressing he ume frame. The oroa without any expressed organisation llon the of consent individual to deemed could be said to have the the for future positions that mieP t arise data on file indefinitely

personal

endure unil the individual vithS may would need to dest case the organisation consent, in which roy the individual. the on personal data it holds

This deemed

he photograph? This is a difficult question and much o f tu disclosure If the was taken at a r be for the might deemed to be rt, the a t t c n d e e s of the wo but not beyond that, the ated amongst commercial purposes. If the photograph was taken at certainlyn o t f o r par perhaps with the individual standing ark o r a theme pa toon characters, the deemed consent life-size a short duration side p h o t o g r a p h t o be displayed in on

consent

amusement

famous

Indeed, it would appear that the concept of deemed consent

Pplies

one main o r primary purposc. It well to situations that have only may consent to more than one purpose in be difficult to apply deemed any the purposes have only a tenuous where or given scenario, especially

no relationship to each other. As a matter of sound practice and

ugh

rule of thumb, explicit consent should probably be obtained if an An wishes to claim deemed consent for more than one mmain

organisation

purpose in any given

scenario.

the befor

rould

order

for the

photograph

photograplhs i f

they

so

and

the to

cameras

entering

premises, the

individual hereby consents to

ptured by the security cameras. Would

this her images when the individual consent given by the individ factual case bea Or would tthe situation be better characterised into the premises? steps consent provISion that by taking the action to step mder the deemed the individual has, through action, provided the into the premises, cameras? This is really a moot point as the nersonal data to the seccurity Po under cither conceptions. The former characterised be consent can would be tenable under a contractual model, that conceptualisation of the contract o r condition is collection of an individual's image part The latter conceptualisation is equally the onto premises. of entering who without Section 15(1) merely refers to an individual,

palatable. to in section 14, voluntarily provides actually giving consent referred The relevant the personal data to the organisation for that purpose. The into the sign with the premises. purpose here would be entering make it clear to notification at the entry point of the premises would will be the individual that for security purposes, security cameras The the into who all premises. of step persons capturing the images individual voluntarily provides the personal data to the organisation

the purpose of entering into the premises when he or she voluntarily steps into the premises and allows the organisation's 1or

Personal Data Protection Commission, Advisory Guidelines on Key Concepis in the Personal Data Protection Act (revised on 15July 2016) at para 12.25.

134

purchase

use

security cameras to record the individual's images. 25

to

Beyond that, it would be difficult

brings i n t o

having his o r

5.33 The scope of deemed consent through action can also sometimes be contentious. Take the example of a person taking photographs. If the subject of the photograph actually posed for the photograph, it would be safe to say that the individual being photographed has given deemed consent for the photograph to be taken. However, that is only

desired.

inspect

into question the images recorded by security cameras Notification Obligation. It was mentioned 4 c in chapter discussed p r o t e c t e d by security cameras, a nouification of premises that for shoulk be placed at the entry points of the there of security the lividuals the notification required under section 20. individ to give premises consent be conceptualiscd in such a situation? Any How would the would n o doubt state something along the lines that 5.34 This

ch notificationthese

5.32 Consent can also be deemed through action as section 15(1) does not pecify the manner in which the individual has to provide the personal data. The Commission gave an examnple in this regard," of a person visiting a medical cinic for a check-up and allows herself to be subjected to the collection and use of personal data, such as measurement of her height and weight for the purpose of the check up. These would all fall within deemed consent, even though the individual did not actually give the personal data as such but the personal data was provided to the clinic through measurements.

for

to

deemed consent.

Such

Deemed consent through action

ubjects

a r g u e a n yo t h e r

on

2.

carto

alongside

consent

5.31

photograph photograph

the circumstances.

u l dd e p e n d o n

135

Consent Obligation

Data Prolection in the Practical Context

Corollary of deemed consent to disclose

3.

The purpose or

individ

data

5.35 Section 15(2) specifically states that should an individual ual deemed to have given consent to the disclosure

by

the

hould

also

be

clea

to

purposes for the deemed the individuals and there should be

n od o u b i s ,

give of personal dataor byis

one organisation to a second organisation lor a particular

purpoUsee,

then the individual is deemed to have consented to the collecti

and disclosure of the personal data for that particular purpose second organisation.6 This is a logical necessity if the whole deemed consent is to be workable.

there is discl losure

5.38

Wherd

need

to

required

ensure

the

oncept of

part

of the consent

for the collection, use limited purposes and disclosure of would be constuctive to it and data reiterate this to the al

rganisation

b conethe

as

receiving party of the personaldeemed. data is

awareofthe

t h ep e r s o n a l

receivingparty.

5.36 The pizza delivery scenario set out above would provide

as

delivery

deemed consent is a retrograde step for personal and personal data security. It allows security security, finaancial personal used and disclosed without collected, be explicit consent, to data the protectio onal data. The also gaps in concept openir and those who have been the purposes given access to the 5.39

a

example of the meaning of this provision. The customer who or the pizza was deemed to have consented to personal data such he personnel. For delivery address to be disclosed to the to workable, the delivery personnel must also receive some protectinbe from personal data protection liability when the personal dat on s received by the deliverer. Hence, section 15(2) also the customer to have provided consent for the delivery to receive, use and disclose the personal data for that same of the the Section namely pizza. purpose delivering l15(2) is really the flipside of the initial deemed consent to disclose. In the situation of the pizza delivery personnel, the deliverer would need to receive or collect the address to deliver the pizza. The address would be used by the deliverer when the delivery of the pizza takes place. Lastly, the deliverer may need to disclose the address to others if the deliverer cannot find the address and requires extra directions from others; order to find the address. Section 15(2) automatically makes all this possible by deeming consent for all of these activities by the delivery personnel.

this

deems personnel purpoe

In all,

as a

ans

cent,

conc

that

nsl data are not properly tracked and are thus difficult to be held

accountable.

MANNER AND FORM OF CONSENT

D.

5.40 The legislation does not dictate the manner and form of the consent but for evidentiary purposes, good personal data protection practices the consent be obtained in wTiting Consent may also be obtained verbally but way.

would entail

or

recorded in

proof of this

some

may be

ificult unless the process is somehow embedded, or the verbal consent is followed up with a confirmation of the consent in writing, whether in electronic or paper format. Verbal consent can be recorded

iftis given over the telephone, or it may take the form ofa pre-recorded 4.

message

at the beginning of the telephone call deemed by continuing with the telephone call.

Caution on deemed consent

5.37 Deemed consent is efficient and useful for keeping transactions at a minimal level of engagement for both parties, but it should be applied with caution. Where there is any doubt whether the deemed consent

provision applies, obtaining consent from the individual would avoid

disputes from arising and save the collecting organisation from having8 to prove elements such as voluntariness in the provision of persona

5.41 The Commission has made it clear that a failure to opt out will not always be regarded as consent in all situations." Much will depend on the actual circumstances. A failure to tick a box on a form to opt out of where the box before the place where the individual

consent

Personal Data Protection Act 2012 (Act 26 of 2012)

136

s

15(2).

appears

has to sign is likely to signal valid consent, whereas a failure to do an

27 26

stating that consentis

Personal Data Protection Commission, Advisory Gauidelines on Key omcepis N he Personal Data Protection Act (revised on 15 July 2016) at para 12.10.

137

Consent Oblagaton

Data Prolection in the Practical Context

act such as mail back to the organisation a consent opt out leta

unlikely to be considered a

ter s

valid consent.

advised 5.45

the withdrawal of consent

e to the individuals

ncerned and which clearly inform

easily accessible

he form and manner to submit a notice to withdraw

being

declared invalid, organisations should adhere to the good practice

obtaining consent from an individual through a positive action individual to consent to the collection, use and disclosure personal data for the stated purposes.

facilitate

ng aDpropriate consent withdrawal policies that are

through desig

5.42 To avoid the risk of having a failure to opt out type of consent he

to

are

anisauo

Onganisatic

for specifio

consent their

or

disclosure of his

the

whom, submitted

mcans

purposcs as well as the person to notice to withdraw consent should

stating

by which, the

time frame for the withdrawal to be and the expected nisations should make clear which this end,

To effected,

essary and which are optional to the supply of the

purposes are

S0od

WITHDRAWAL OF CONSENT

E.

services. Furthermore, it must be possible for individuals to for optional purposes without concurrently having to

withdrawc o n s e n t . consent

for the necessary purposes.

withdraw

5.43 Consent for the collection,

use

and disclosure of personal data for any

purpose can be withdrawn by an individual at any time, even where e

consent has been deemed, with reasonable notice to be given to th

organisation.2 The Commission has indicated that it is difficult

the to

prescribe a specific time frame for reasonable notice to be given but, as a general nile of thumb, the Commission would consider a withdrawal

notice of at least ten business days from the day the organisaion receives the withdrawal notice to be reasonable notice. Should an organisation require more time to give effect to a withdrawal notice the organisation should inform the individual of the time frame which the withdrawal of consent will take effect.29 5.44 Organisations cannot prohibit an individual from withdrawing consent and this does not affect any legal consequences arising from such withdrawal f consent is withdrawn, then whatever legal consequences that may arise from the withdrawal will have to be borne by the

individual but upon receipt of the notice of withdrawal of consent, the organisation has the responsibility to inform the individual of the likely consequences of the withdrawal of consent, even if the consequences may already be stated in another document

of consent notice needs to be clear about what it ctive. Hence, if an individual does not to be to for it the consent has been withdrawn, it will be what purposes pecify for the withdrawal notice. The to act ificult for the organisation taken upon a busines-friendly position in mmission has, however, the withdrawal notice tor marketing is general in inctances where consent for marketing messages". The as "withdraw my such nature withdrawal of consent for marketing that consider will any

5.46

T h ewithdrawal.

pertains

Commission is worded generally

provide

33 28

Personal Data Protection Act 2012 (Act 26 of 2012) s 16(1).

29

Personal Data Protection Commission, Advisory Gruidelines om Key Concenis the Personal Data Protection Act (revised on 15 July 2016) at para 12.42. Personal Data Protection Act 2012 (Act 26 of 2012) s 16(3).

30

31 32

Personal Data Protection Commission, Advisory Guidelines on Key Comaeps in the Pesonal Data Protection Act (revised on 15 July 2016) at para 12.51.

138

via

a

particular

channel

to

only apply

to

facility

Personal Data Protection Commission,

Aduisory Guidelines on Key

Comcepts in the Personal Data Protection Act (revised on 15 July 2016) of Information, Communications

in

Personal Data Protection Act 2012 (Act 26 of 2012) s 16(3). Personal Data Protection Act 2012 (Act 26 of 2012) ss 16(2) and 16(

sent

via that channel. So, it an e-mail withdrawing consent messages the organisation is was generally worded, for marketing messages cease sending marketing messages via e-mail only. For to only obliged to all other channels, such as the withdrawal of consent to apply to need would individual explicitly state the channels of SMSes, the communications." Similarly, if an individual only indicates the withdrawal of consent for telephone related marketing purposes, then the withdrawal of consent would include telephone calls, SMS messages and any other kinds of telephone communications. f organisations a for individuals to withdraw consent, such as a web sent

4

and the

at paras 12.41-12.43; Ministry Arts, Public Consultation Issued by Ministry of Information, CommunualioS 2.55. at n the Arts: Proposed Personal Data Prolection Bill (19 March 2012) para on Ky Data Protection Commission, Advisory Guidelines Personal Coneps

in the Personal Data Protection Act (revised on 15 July 2016) at para 12.3

Data Protection Commission, Advisory Guidelines on Key Concept sonal D e Personal Data Prolection Act (revised on 15 July 2016) at para 12.49.

139

Consent Obligation

Data Protection in the Practical Context page, the organisations withdrawals.36

cOLLECTING PERSONAL DATA FROM THIRD PARTIES

should clearly indicate the scope

such

5.47 The legal consequences of the withdrawal of consent is unar

uld be exercised before great c a r e an llects personal data from a party other than the As organisation collects personal data, it must always individual. Befo. purpose of the collection to the individuals who are ovide the purp ation about themselves. This is also still the case if the noted

the provision, so if the withdrawal of consent means the individsby

will no longer be able to receive the services or if thereheis individual an termination fee that will be imposed as a result of this, the ind:.rly

4, in chapter

organis

disclosing i n f o r data

personal

is collected third

llected

ion,

must cease and ensure its data intermediaries and agents also o

collecting, using, or disclosing the personal data. There arecease no requirements for the organisation to inform third parties of. means

that

the

onus lies on

the the

individual to seek out the other organisations to withdraw consent which is quite burdensome on the individual. The individual wouid first need to request from the organisation the individual's personal

data in its possession or control as well as information concerning the ways in which his or her personal data may have been disclosed and to whom. Then the individual, armed with the list of organisations, approach the other organisations directly to withdraw consent for the collection, use or disclosure of personal data for such purposes.

Can

5.49 It should be noted that the withdrawal of consent will not affect the retention of data. Under section 25, an organisation may retain personal data, for example, if it is necessary for legal or business

purposes. Certainly, for most organisations, it would be advisable to retain the personal data for at least until the statute of limitations

expires. 5.50 The main exception to the permissibility of the withdrawal of consent the collection, use, or disclosure is required or authorised by law.40

is where

to disclos data

the personal data, the organisation

woul itself be in breach of the Act for using personal data for which it has no

personal ing the subsequently and ing collect to do so.11 permission consent

or

5.52 Organisations

ollecting personal data from third parties should

due diligernce to check and ensure that the validly disclose the personal data for use and third party mmission has recommended that disclosure. In this regard, the organisatior adopt one or more of the following measures

rcise

exerci

the

appropriate

source

can

ollecting

appropriate to (a)

Seek a

36

from a

data ispermission

5.48 Once a withdrawal of consent has been received by an organisaia.

withdrawal of consent, which

a tthird party. Furthermore, if personal party and the third party does not, in fact,

from

would have to bear the consequences."

an

term

the

circumstances

undertaking

from

at

hand:12

the

disclosing organisation through

of contract between the two organisations that the

disclosure for the stated purposes is within the scope of the

consent given by the individual to the disclosing organisation.

(b)Obtain confirmation in writing from the disclosing organisation,. c) Obtain, and document in an appropriate form, verbal

confirmation from the disclosing organisation. (d) Obtain a copy of the document(s) containing evidence of the consent given by the individuals concerned to the disclosing organisation to disclose the personal data. This often may not be possible for commercial and other reasons. 5.53 In essence, the measures that the Commission suggests are mainly

contractual or quasi-contractual measures.

Personal Data Protection Commission, Advisory Guidelines on Kq on 15 July 2016)

Concepts in the Personal Data Protection Act (revised at paras 12.47-12.48. 37 38 39 40

Personal Data Protection Act 2012 Personal Data Protection Act 2012 Personal Data Protection Act 2012 Personal Data Protection Act 2012

(Act 26 of 2012) s 16(3). (Act 26 of 2012) s 16(4). (Act 26 of 2012) s 25(b). (Act 26 of 2012) s 16(4).

140

Personal Data Protection Act 2012 (Act 26 of 2012) s 13. Personal Data Protection Commission, Advisory Guidelines on Key Concepts n tne Personal Data Protection Act (revised on 15 July 2016) at para l2.30.

141

Consent Obligation

Dala Prolection in the Practical Context

the extensive cxceptions to the Consent be considered in the next section.

rely

COllected in accordance with the situations set hedule can be used without consent for purposes olt nuith the purposc of the collection. Similarly, paragraph 1(s) waS a l data that

5.54

For collecting organisations, where possi ble, it may perhaps be sar. on

Obligation, whichierwillto

consistent

personal data collected in the Sch chedule to be disclosed for nsistent with the purpose of the collection. Lastly, Second Schedule allows personal data that was 1(7) of the Schedule

enables

Fourth

of

the

set

out

in

the

Second

ircumstances

G.

EXCEPTIONS TO THE CONSENT OBLIGATION

raph

paragra

disclosed

5.55

validly

section 17 situations which, in fact, refer to the circumstances in

the

Second, Third, or Fourth Schedule." It is appropriate at this junctae to consider the section 17 exemptions in their own right. The section 17 exemptions weaken considerably the power and force ofthe Singapore data protection regime, and to a certain extent, they define

the Singapore personal data protection regime. 5.56 Section 17(1) permits personal data to be collected without the consent of the individual in the circumstances set out in the Second Schedule including collection from third parties. Sections 17(2) and 178) similarly provide that personal data can be used or disclosed without consent in the circumstances set out in the Third and Fourth Schedules, respectively. As will be seen below, these Schedules contain wide exemptions, such as where the personal data is publicly available, or where the use is necessary for evaluative purposes (evaluative purposes is defined widely in the Act), or where the personal data is collected solely for artistic or literary purposes. Some of these exemptions may have materialised through pressure from industry driven by concerns

about compliance costs. These exemptions, however, are extremely broad and dilute substantially any meaningful protection accorded to personal data. This, in turn, will impact negatively on data security and cybersecurity due to the fact that once informatio is released, it is "out there" and impossible to "retrieve" or "recall" and fence in and, even worse, some personal data, like biometric data, cannot be altered. 5.57 In addition, the circumstances in the three Schedules have cumulative effect. By virtue of paragraph 1() of the Third Schedul, 43 44

Personal Data Protection Act 2012 (Act 26 of 2012) s 17. Personal Data Protection Act 2012 (Act 26 of 2012) ss 20(3) (6) and 17.

142

consistent

5.58 For

circumstances

collected

The exemptions contained in section 17 of the Act" have alread.

been mentioned in relation to the Noüfication Obligation in ter 4. For the Notification Obligation, no notification of the purposes. of collection, use, or disclosure is required if the situations fall within he

se out in the Fourth Schedulc to be without the consent of the individual for purposes of the disclosure. with the purpose

in the

nal data collected prior to he commencement of the personal

data protcction provision

person

Second

iedule, these

can

in the circumstances set out in the

also be used and discloscd.13 Under

of the Third Schedule, all such personal data is deemed accOrdance wth in paragraph 1() of the have been collectcd that all personal data collected in the means This Schedule. Third the Second Schedule prior to the out in set rcumstances of the personal data protection regime can be used commencement consistent with the purpose of the collection. Similarly for purposes Daragraph 5 of the Fourth Schedule decms all such personal data in accordance with paragraph 1(s) of the to have been collected This m e a n s that all personal data collected in the Schedule. Fourth Second Schedule the in prior to the circumstances set out data protection regime can be the of personal commencement disclosed for purposcs consistent with the purpose of the collection. Lastly, paragraph 4 of the Second Schedule deems all personal data

nhbh

paragra

disclosed prior to the commencemcnt of the personal data protection

provisions in the circumstances set out in the Fourth Schedule to have been collected in accordance with paragraph 1(7 of the Second Schedule, so that such data can continue to be collected for consistent purposes. 5.59

As will be seen below, there appcars, however, to be a gap in the exemption for personal data that was generated or produced but not disclosed prior to the commencement of the personal data protection

provisions.

Personal Data Protection Act 2012 (Act 26 of 2012) Third Sched, para 3.

143

Consent Obligation

Data Protection in the Practical Context

5.60 An issue to consider here is whether personal data that falls wis circumstances of the Second, Third and Fourth Schedules tha for collection,

consent from individuals require have the consent over its collection,

wording of section

use or

individual risk for security wide-ranging purposes. Th a This

rnoses.

itself

he do

disclos re o

use or disclosure withdrawn,' can would suggest that this is not possible-t6 he 16(1)

.. an individual may at any time withdraw any consent given, or dees. have becn given under this Act, in respect of the collection to

purpose

withdrawing

not required as in the section 17 references to the Second, Third and

Fourth Schedules.

comprehensive

exemptions

The

ons in the three Schedule Indeed, some of the circumstances

isted their

are

true

For avoidance of doubt, the withdrawal of consent would not affect the collection, use or disclosure of personal data that is publicly available. In such cases, an organisation that receives a withdrawal of consent may wish to

cease further use or disclosure of the photographs or video recordings in question as a good practice.

so

broad broa

cffects

in scope and cxpressed in very general terms that

are

hitherto

unknown.

Evaluative purposes

1.

If

Schedules referred to in section 17:"

sections

Cxemptions con

5.66

5.62 This interpretation appears to be supported by the Commission, which has said, in relation to the exemption to the requirement of consent for "publicly available" personal data that appears in all three

for

cctions will examine the brcadth of some of the kev the three Schedules and will elucidate the of situations covered cxamples by the categories. rough ide is not to provid. coverage of all the intention

5.65 following

Cxemp

5.61 The withdrawal of consent provision only applies to consent given, or deemed to have been given under this Act". It.any does in instances where not state that withdrawal is permitted consent is m

challenge

cybersecurity.

disclosure by that organisation of personal data about the individal o r T any

let alone their use and disclosure indeed presents a

the

callection,

collectior

use

or

disclosure

is

necessary

for

evaluative

then no consent nor notification is required for the purposes,18 th

or disclosure of the personal data. This is one of the exemptions of the Consent Obligation. The term most in ealuative purposes" is defined very broadly section 2(1) of the Act llection,

use

far-reach

to encompass

many

situations.

5.67

the purpose of determining the suitability, eligibility or the individual to whom the data relates, "evaluative of qualifications Durposes" would include the situations of evaluation for the purposes In relation

to

of 49

5.63 This is clear indication that under the Singapore personal data protection regime, it is not possible to withdraw consent for the collection, use or disclosure of personal data that falls within the situations set out in the Second, Third and Fourth Schedules. 5.64

(a)

(b) (c) (d) (e)

This, unfortunately, leaves individuals with little control over their personal data, a "no escape" situation and, as will be seen below, an almost losing proposition. Whether an individual likes it or not, the

three Schedules give wide ambit for their personal data to be collected,

() selection for an athletic or artistic purpose; of financial or social assistance, or the delivery of appropriate health services, under any scheme adminisiered by

grant

a public agency;

used or disclosed. The resulting conglomeration of personal data is in

46 47

Personal Data Protection Act 2012 (Act 26 of 2012) s 16(1). Personal Data Protection Commission, Aduisory Guidelines on the Persona

Data Protection Ad for Selected Topics (revised on 20 December 2016) at para 4.21.

144

employment or appointment to office; promotion in employment or office or for continuance in employment or office; removal from employment or office; admission to an education institution; the award of contracts, awards, bursaries, scholarships, honours or other similar benefits;

48 49

rersonal

Data Protection Act 2012 (Act 26 of 2012) Second Sched,

para 1);Third Sched, para 1() and Fourth Sched, para 1( Data Protection Act 2012 (Act 26 of 2012) s 2(1). 145

Consent Obligation

Data Protection in the Practical Comtext

(h)

determining honour

or

whether any contract, award, other similar benefit should be

or cancelled;

(i)

bursary, scholanarst continued, mod

odified

deciding whether to insure any individual or propert or continue or renew the insurance of any individual or Dro and other simnilar purposes as may be prescribed by the

types

exemption

cluding

minister

5.68 The list of situations that come within the evaluative purmo POses exception is quite broad and encompasses a wide variety of scti. Some of these will now be considered, beginning with one of the m prominent situations in the above list, that of the employment

(a)

The

this

that can be collected and data thar reanal data covered under are extremely broad: personal data such as the and alifications; ormal education nistory, isconduct or talures during any tenure of any misc personal

ot

employment

i n d i v i d u a l' s f o r m a l

operty,

conte

or appointment to office.

5.71

Employment context

the

on nformation nployment; any i n f

inchn

be might ny that any

employec;

individual's

levant

to

releu

convictions,

convictions;

lifestyle,

individual's integrity or

the individual's and

eve

likes and dislikes,

any

standing

morality

as a model nformation on the

hobbies and

family background,

may all all be factors determining an individual's suitability for

as

these

may

employmecnt.

5.72 from the be s e e n As can ollected and accumulated

the types of personal data that can without consent are extensive, SO that employers c a n readily build a complete profile of an albeit for the purpose of evaluation for employment or individual,

foregoing,

extensive

appointment to office.

5.69

Under paragraph 1() of the Second Schedule of the Act, there is na need to obtain consent from individuals before collecting personal data from them or from any other source if it is necessary for determining the individual's suitability, eligibility or qualifications for employment or appointment to office. This would certainly cover the situation where the individual submits a job application, but it would also cover situations even where the individual is not actually looking to be a candidate for employment or appointunent to office. Thus, the exception would allow employers to conduct searches and compile liss of potential candidates without having to first obtain consent from the individuals.

5.73 Similarly, paragraph 1)

5.70 Of course, background checks can also be conducted on potential employees. There are many available sources of personal data from which employers can do this, ranging from social media networks to simple searches that trawl the whole Internet for information about individuals. There also appears to be no limits on the methods one can example, if an employer wishes to "friend" a person on the social media network Facebook, using a fictitious name in order to look into the person's private or personal life, including access to

the specific purposes, the practical enforcement and restriction of the

employ. So, for

photos or posts that may be restricted, it would appear that the

ot

the

Third Schedule allows the

use

of

individual concerned for personal data This means that after accumulating a complete evaluative purposes." on an individual, the profile containing ide-ranging personal data in organisation may use the personal data any way that is related to the determination of the individual's suitability, eligibility or qualifications for employment or appointment to office. As mentioned above, one of the biggest harms has already occurred when there is a centralised without

consent

ot

the

deposit of information concerning an individual. Once the personal data has been collected in one place, although the uses are limited by use to the specified purposes are often challenging. For organisations, to clearly define the permissible purposes attached to each piece of personal data they hold and to set systems, procedures and practices in place to limit the personal data to such purposes.

they would need

5.74

paragraph 1 (h) of the Fourth Schedule permits the isclosure of personal data for evaluative purposes without the consent

Furthermore, O the

individual.52 This

that

have

20)

and

Act 2012 (Act 26 of 2012) s200)

and

means

that the

complete profiles

employer may do so under this evaluative purposes exception. 50

Personal

Data Protection Act 2012 (Act 26 of 2012)

Second Sched, para 1().

146

s

2(1)

and

52

Data Protection Personal Third Sched, para 1( Data Protection ersonal Fourth

Sched, para 1(h).

Act 2012 (Act 26 of 2012)

147

s

Consent Obligalion

Data Protection in the Practical Context been built and used can also be disclosed for the purposes of a e . individual's suitability, cligibility or qualifications for emnlng or appointment to officc. It would not be uncommon for organi to trade such personal data for a fec. One ot the negative clte cts the evaluative purposcs exemption is that it condones the tra. irade personal data for evaluative purposes associated with employme appointment to office. In this regard, the Act effectively ran recruitment organisations a free reign over the personal daa collect, use or disclose about individuals. Thus, in Singapore, giventhey the weak laws in this area, hackers and other cyber intruders would regard the computing systems of recruitment organisations with collections of personal data as prime targets of attacks. The this is that the amassing of the personal data of individuals can e asily be used for other less savoury purposes by hackers. an

their corolla

5.78

not required

also

if

the

collectio

os of promotion

Consc

in or

use or

disclosure

removal trom

tinuance in employmen

t h ec v a l

conti

is for

employment

office. This would

Hce orrly the same position as recruitment firms in the sheput ersonal data data they can accumulate without consent and hing thc compuung systems ot human resource another vet another rich wellspring ot pesonal data to be as yet rtments for

office r

or

mploye

volume

departn

criminal

geted

for

activity.

ue that that the kinds kinds of personal data that can be collected argue may h y an employer for promoton and removal purposes should of

5.79 Some

and used

paid job description. While this may be do include codes of conduct for nany urue, to abide by and these codes of conduct would address their as convictions. or other kinds of misconduct issues such c a n De removed or demoted from their ans by which employees

be

5.75

is

valuative p u r p o s e s «

closely

aligned

with

the

employment

contracts

employees

Indeed, regarding the hack of the 1 billion accounts of Yahoo Ine security experts cautioned that "the real danger of the attack was not

that hackers gained access to Yahoo users e-mail accounts, but that they obtained the credentials to hunt doWn more lucrative information about their targets wherever it resided across the web".53

means

positions.

(b)

Insurance

5.76

Moreover, the exemption for evaluative purposes amplifies the

exemption from the operation of the Act of business contact information discussed in chapter 3. Business contact information such as those appearing on business cards can be used without consent for any purpose whatsoever and is not limited to search and hiring processes. Thus, business contact information can be used as the foundation of databases with other kinds of personal data added to it to build complete profiles of individuals. 5.77 A cautionary note for organisations such as recruitment firms which amass personal data is that they are still required to comply with the other Obligations in the Act, such as the Protection Obligation, which will be discussed in chapter 9. Thus, although organisations may collect, use or disclose personal data without consent for evaluative purposes, they still need to comply with the other rights given to individuals over their personal data in Parts V and VI of the Act.

5,80 The

definition of "evaluative purpose

in section

2(1) also includes

a

to the purpose of deciding whether to reference in subclause () individual or property or to continue o r renew the insure any or property. This provision preserves the insurance of any individual of insurance companies and underwriters of collecting, using

practices

and disclosing personal data about individuals to make sound business decisions and to guard against insurance fraud.

(c)

Remaining evaluative purposes permitted

5.81 The remaining evaluative purposes permitted without the need to

obtain consent from individuals can be loosely categorised into four broad categories. First, the conferment of bencfits such as the grant of financial or social assistance or the award of honours such as awards,

Scholarships, bursaries and whether such awards should be continued, modified or cancelled. The second broad category is for the selection

Or an athletic or artistic purpose. Both of these categories have been

agued to be necessary, especially where the awards are nominated by 53

Vindu Goel & Nicole Perlroth, "Hacked Yahoo Data is for Sale Dark Web" The New York Times (15 December 2016).

148

on the

parties and the individuals need not take any action, for exampie,

LVCTSItes may be asked to nominate their students for scholarships

149

Consent Obligalion Data Protection in the Practical Context

and bursaries, and the exemption is intended to allow this actiske continue without interference. While the purposes are honon bearing in mind that individuals cannot withdraw consent for th kinds of uses, those organisations involved in the collection, these disclosure of such personal data should take care that only releu personal data is collected and, further, that they do not engage levant in the wholesale collection of every single individual's available personal dan data, especially where the individuals have, for example, little or no cha hance of being selected for any athletic or artistic purpose.

arable,

5.82 The third broad category of admission to an education institution 1s also aimed at the practicalities of enabling education institutions to screen and select their students. Indeed, a very broad range of personal data can be collected to facilitate this purpose, but it should arguably be restricted to those individuals who have applied for admission and not a general cross-section of the public.

as been given, consent is not requiredffor the collection, tification has

sure

categorywith far-reaching implications. It is surprising that it is

grouped together with the award of awards, bursaries, scholarships and other honours in the definition in section 2(1). This category no doubt has business aims in mind as it enables organisations to screen and

assess to whom it awards conturacts by conducting background checks without the need to obtain consent. Like the purpose of evaluating admission to an education institution, in evaluating whether a contract

should be awarded, an organisation should restrict itself to only collecting, using or disclosing the personal data of those cont nders for the contracts and not simply amassing vast amounts of personal data on contractors and other parties who have not expressed any interest in the contracts or who are in no way related to the contracts.

data.

-hedule of the Act," paragraph 1(0) allows emplovers

Schea

585 Second

the.

in to

ollect

data without consent as lorng as the collection is the purpose of managing or terminating an

personal

or

reasonable

onship betwcen the organisation and the individual.

hove. paragraph 1(j) of the Third Schedule is a blanket allows personal data collected by an organisation in the clausethat Second Schedu to be used i n the Second set out by the circumstances consiste with the purposes purpose of that for of the Fourth Schedule is a Similarly, paragraph 1(s) data collected in the circumstances allows personal clause that blanket S e c o n d Schedule to be disclosed by the organisation for the set outin with the purpose of that collection.

employment

As mentioned:

organisation

collectior

ses

consistent

5.86

5.83 The fourth broad category of exemption from consent is for the evaluative purpose of the award of contracts as well as whether the contracts should be continued, modified or cancelled. This is another

of p c r s o n a l

u s e o rd i s c

data collected for the purpose of managing or relauonship between the organisation employnent terminating used and disclosed without consent. so can be and the individual consitute managing an employment Examples of what might found in the management of employer can be readily relationship For example, the allocation of computers to equipment o r resources. thereof are both aspects of managing an employees and their usage monitors the computer relationship. lf the employer

Hence,

any

personal an

employment information on which websites they usage of employees by collecting and personal data collected could then be used access, the information if they were, the to determine if any prohibited websites were accessed; terminate the or to employer could then use the information manage to the information this disclose to and employment of the employee relevant authorities. 5.87 t should be noted, however, that the exemption does not empower of of collection, use, and disclosure with unfettered

2.

Mar

agi

or terminating an employment relationship

5.84

in any In chapter 4, it was discussed that section 20(4) requires that situation where personal data is collected, used, or disclosed for the or terminating an employment relationship between the organisation and that individual, the organisation must Once the give notification and inform the individual of the purpose.

purpose of managing

150

employers e personal

rights

data of their employees to manage or terminate the

cnployment relationship. The personal data collected, used, disclosed must still comply with the other personal data protectio

or

provisions. For example, if an employer feels that an employee spernas Fersonal Data Protection Act 2012 (Act 26 of 2012). 55 stry of Information, Communications and the Arts, Pubac Consuuon ArIS: Tupoa Communications and the of Information, Po PersonalMinistry Data Protection Bill (19 March 2012) at para 2.69.

151

ConsentObligation Data Protection in the Practical Comtext inordinate amount of time in the toilet, it would not be apDron. employer to install cameras inside the toilet to check t e the employee is doing inside the toilet. what

wasadopted from the Canadian position in was no doudt anven by business efficacy t tions need not worry about

an

for the

exclusio and

This BrtishColumbia

means

cxclusion

his

TCasorno f t h e i r day-to-day

5.88 There are,

of course, grey

areas

on

what

would

be conside

idered appropriate or reasonable. Consider an organisation which has as one of its main aims to promote life and has a strong stance agains abortion. Could the organisation collect information employees' spouses and other immediate family members to ascer the certain if any of the immediate relatives are strong proponents of abortior There are arguments that this might be inappropriate or as the relatives are not employees, whilst equally valid arguments woul

aga on

unreasonah

suggest that if the employee is a senior enough employee, this wonil

be perfectly reasonable as the reputation of the organisation tarnished and the organisation might be labelled a hypocrite. just one example of the broad and uncertain scope of the exemptions contained in the three Schedules.

mighthe This

3.

to-day document crealuon processes that include

Documents produced in business, employment and

rsonal within

this

mployees. Some Some examples of documents falling

employces.

of

data

clude minutes of mectings that may contain

exclusi

whether an. an employee was absent or present and what

whether

on

have said at the meeting if he attended, e-mails might oploy ntained an employee's name, records of the times at

information

g e nerat h e

ich

that contain

records

employee' rate

rived arriv

employee

the

of pay,

and

with

at work and effectively anything in the

the human resources department, such as the been or should be the employment

increments has

any salarY documents any other

whether

whether

related to

produced in the course of and business or profession. This takes purposes for the ustrate even wider. Some examples should of the exclusio ambit the e x c l u s i o is. If an individual wishes to set up a business the how broad or retail space, then the lease of the premises andrequires be a document that is produced in the course of and for wOuld clearly of the individual 's business, as would all other documents the purposes relate to the leasing of the premises. Such as e-mails generated that and collected in all of these data produced Hence, all personal use or would not require consent for their collection, 5.91

chsion

covers documents

also

of

he

individual's

commercial.

professional settings 5.89 The Act also provides for an exemption from consent in paragraph 1(n) of the Second Schedule if personal data is included in a document that was produced and collected in the course of the individual's employment, business or professional life, as long as the personal data was produced and collected for the purposes of the individual's employment, business or profession.55 Furthermore, by virtue of the catch all provisions in the Third and Fourth Schedules, personal data that was produced and collected in this manner can also be freely used and disclosed for consistent purposes subject to any other kinds of confidentiality requirements other than the personal data protection regime." Such personal information included in work

product documents, although excuded from the requirements of

documents

use as long as the collection, with the purposes of leasing the premises.

disclosure,

or

disclosure

are

consistent

5.92

professional, say a legal or medical a practising certificate, the is application of the practising certificate is a document that produced

Similarly, if professional

the individual is and

wishes

to

a

obtain

n the course of and for the purposes of the individual's profession,

and

would fall under this exclusion, hence

tne collection,

use

and

disclosure

of

no consent

the

is

personal

required data

in

for the

consent for collection, use and disclosure, would still need to comply

application.

with the other data protection principles or Obligations in the Act

sociations do not need permission from their members to couec Se and disclose their personal data, as long as the use and disclosure ot tne iited to the purposes of collection, which is membership

such as those pertaining to access, accuracy and correction.

This

would

effectively

mean

that

all

professional

professional body.

56

Personal Data Protection Act 2012 (Act 26 of 2012) Second Sche para I(n).

57

Personal

Data Protection Act 2012 (Act 26 of 2012) Third para 1() and Fourth Sched, para 1(s).

152

Sched

58

the Arts, Public

Lntormation, Communications and le Ministry of Information, Commaunications and the D Usonal Data Protection Bill (19 March 2012) at para 2.31.

153

Consultaton

Ats:

Froposeu

Consent Obligation

Data Protection in the Practical Context

5.93 Other

examples of documents produced the course f profession might be the reports, professional opinions assessments generated by professionals Such as doctors, architects. A doctor's medical report on a patient will engine reveal per information about the patient, such as the patient's rsonal identity, conditi symptoms, treatments and so on. It is also, however, a document tho hat is generated in the course of and for the purposes of the individal lual's (the doctor's) profession. It comprises the doctor's professioa opinion and action taken as a medical

professional. The med report will also contain the doctor's diagnosis which will refloe competency of the doctor amongst other things, and hence will althe constitute personal data about the doctor. A report such as this can h freely used and disclosed by the patient without obtaining Drio

consent from the doctor, but only for purposes consistent with the purposes for which document was created, which would likely to be the delivery of medical treatment. This, prima facie, appears to be a sensible exclusion as it would be rather tedious and an inefficient delivery of healthcare if the doctor's consent is required each time the patient visits a specialist doctor and wishes to share the first doctor's report and diagnosis with the specialist doctor.

5.94 As discussed consent

above,

specifically provides exemption from the requirement for personal data collected, used or disclosed the commencement of the personal data protection the Act

provisions.3 However, there appears to be a gap in the legislation in clearly provide that documents that were generated or

that it does not

produced prior to the commencement of the personal data protection provisions with personal data contained therein can be collected even though they can be used and disclosed without consent. Collection is not defined in the Act and it cannot be presumed to include the act of generation of documents. The Commission has said that "[c]ollecton refers to any act or set of acts through which an organisation obtains control over or possession of pesonal data". 0

This understanding of

collection" would not be helpful in the situation where documents are generated, as the generation of documents such as e-mails does not necessarily mean that the organisation has control over the personal data or has possession of the personal data. There is the further legal

Commission's interpretation of the term

the uch weight cr be disputed i t h e mat

should

in

individual's

before

issuc o f how

will

carry

5.95

the

Thi ed

effect,

In he

manncr set

Schedule, paragraph

out

consc

Paragraph lection.

collec

the Second

in

1() enables data Scheedule to be used collected in without

before the commencement of the in the he circumstances and regime

collected

data

ection

prior

purposes are consistent with the purposes of the of the Third Schedule, provides that

3

personal

personal

conditions set out in

proteo

Schedule

atisfy paragraph 1()) of the Third Sch

shall satisfy

data the

Second notwithstanding that it was not im force at the time of the collection device

appears in paragraphs 1(9) and 5 of the Fourth Schedule

Aesimilar garding disclosure.

Second Schedule. The "back-dating" nroie The anomaly is in the 4 ot Second Schedule, but it only refers et Out in paragraph Second dchedule which deals with the situation the of naragraph 1() "disclosed to the organisation" and "collected

5.96

to

wherepersonal

datavwas

Hence, in the situation where documents were nt disclosed as such but were produced in the course of and for the of the individual's employment, business or profesional life to the commencement of the any disclosure whatsoever prior by the organisation".

nurposes without Dersonal data provisions,

then, it would not be permissible to collect

the personal data contained in such documents under the Second Schedule without consent. Such personal data can, however, be used and disclosed without consent. This is yet another example of the complex and perhaps unintended scope of the exemptions in the three Schedules.

4.

Business asset transaction

5.97 The Act also allows for the "business asset transaction" exception which 1s elaborately detailed in

the

Second and Fourth Schedules. This

exception has a clearly defined life cycle and it is the only instance in the Act that requires personal data to be destroyed or returned. 5.98

59 60

Personal Data Protection Act 2012 (Act 26 of 2012) Third Sched, para and Fourth Sched, para 5. Personal Data Protection Commission, Advisory Guidelines on Key Conaeya in the Personal Data Protection Act (revised on 15 July 2016) at para 7.2.

154

Aprerequisite before CIS

the business

asset transaction excepu

that both organisations must have entered into an

Teent that requires the prospective party to use or disclose the d a t a solely for purposes related to the business asset

155

Consent Obligation

Data Protection in the Practical Context

transaction. the

This is to safeguard against wTongiul use personal data by the collecting organisation.

5.99 This data

or discl. disclosure o

exception allows the collection, and disclosure of belonging to employees, customers, directors, perso offiena shareholders in the defined situation of a business asset transao This is clearly defined list of individuals; use

a

business associates and

trading partners.

missing from this n,

This means that co e and business associates such as agrent joint venture or

with with

trading partners subcontractors, agree supply agreements, purchase agreements, partnership distribution agreen management agreements, fee share agreements and other ements, party agreements that contain personal data are not relate business asset transaction exception and cannot be covered revealed wie first obtaining consent. It is unlikely that the information exemption can be uilised to coverbusiness C these Contac agreements as these agreements would usually contain more kinde ners of data than just the mere business contact information of ersonal the individh.

duals.

100

"Business

asset

transaction"

is

detined

in

paragraph 3(4)

of tho

h u d i n gp e r s o n a

business asse

102

trasaction cxception,

Um

isclose

busine

consent

to

of the

the

areholders,

ithout

a

tomers, share.

or

its

assets,

where there iv

consideration, organisation is prospectiv party certain individuals, whether they be personal data nder

the e r

permi.

rganisation an

OspcCtit

directors or officers. The the business asset in

data must, personalemployees or

question or that part of ncerns the business asset transaction and the necessary ecessary for the organisation m u s t be to data with the business asset transaction66 determine proceed etherto relate directly

he

ganisation that

however

persona

5.103

can o r neceds

on

the

to

depena

rt specific.

necessity,

the amount ent of of personal data a due be disclosed duri exercise business n a t u r e of t transacted

the requirement Given

For example,

being

diligence

and will be

very if the value of a business is directly linked to

as in the case of an tise of its staff, be necessary to disclose more then it may start-up, process than would during the due a b o u t the staff

tac

that will

information technology

diligence

personal

data

otherwise

be necessary.

the

purchase, sale, lease, merger amalgamation any other acquisition, disposal or financing of organisation portion of an or of of the business or assets of an organisation any organisation other than the personal data to be disclosed under paragraph 1(P). or

an

or

or

a

5.101 It is clear that a business asset transaction does not include the situation where the transaction concerns the personal data itself, that is, it does not cover the trading in personal data such as the purchase, sale, lease, or amalgamation of personal data. This definition of a business asset transaction does, however, include the financing of an organisation or a portion of an organisation, hence, it would cover the situation where an organisation seeks financing for its own operations, as well as where an organisation seeks financing for the purchase of

62

Personal Data Protection Act 2012 (Act 26 of 2012) Second Sched, para 3(2) (6); Third Sched, para 1() and Fourth Sched, para 3(2) (6). Personal Data Protection Act 2012 (Act 26 of 2012) Second Sched,

63 64

paras 1(p) (i) and 3; Third Sched, para 1() and Fourth Sched, paras 1 (p) (ü) and 3. Personal Data Protection Act 2012 (Act 26 of 2012) s 4(5). Personal Data Protection Act 2012 (Act 26 of 2012) Fourth Sched,

61

nal data.

a n o t h e ro r g

the exper

Fourth Schedule to mean: ...

isation ora porttion of another.

or

para 3(4).

5,104

eally, fnancial information will be required for due diligence but. nicaly in most business transactions, the individual names and

records of employees may not be necessary for an organisation to determine whether to proceed with the business asset transaction.

instead, aggregated information about the employees of the busines, uch as deidentified information about salaries, leave entitlements and long service leave entitlements, and time and wages records would be more the norm. In addition to this, it might be necessary to reveal some individual employee records, such as key executive staff or key service personnel. If there are any agreements with employees that

contain material provisions, for example, compensation for loss of office or payment of any bonuses or profit shares, these would probably be considered necessary as well.

65

Personal Data Protection Act 2012 (Act 26 of 2012) Second Sched,

paras 1(p) (ii) and 3,; Third Sched, para 1) and Fourth Sched, 66

paras 1 (p) (ii) and 3. Personal Data Protection Act 2012 (Act 26 of 2012) Second Sched,

para 3(2) (a); Third Sched, para 1() and Fourth Sched, para 3(2)(a).

156

157

Consent Obligation

Data Protection in the Practical Context

Publicly available data

5.105

Regarding

the personal data of customers, these would gcnen aggregated statistical non-personal data about the ybe customer base but, sometimes, personal data about customaor their financial information omers and might be necessary.

limited

to

Definition

(3 5.108

5.106

Where the business

ofpublicly

the

cxemppti

transaction

does not

paragraph

proceed, all ne

data collected must be destroyed or returned to the dise organisation.67 Where the transaction is entered into," the emnig and other individuals whose personal data have been disclosed ces be notified that the business asset transaction has taken place an personal data about them has been disclosed to the other parha t ha the event that excess personal data was collected for example. i he personal data collected did not relate directly to the busines asset then any such excess data must be destroyed or returned

should

heduleP Schedule,

personal

within the d

sed

use

1(d)

of

or

disclosure, which means that that comnes available" can be nition of "publicly collected, used or and p u r nose p o s e and there are no means of any stopping the or disclosure as consent cannot be withdrawn 72 or

anything

11Se or t hcollection,usc e

for

disclosure:

use

collection,

cole

2(1) defines "publicly available" in relation to personal data Sectio

individual

bout

to

mean:73

an

rsonal data that is generally available to the public, and includes which can be observed by reasonably expected means at a personal data perso

location

rather than keep or make copies of personal data.

collect,

individual.

of

5.107 As a general rule, the

disclosing organisation should try and proida only de-identified information wherever possible. It would also he good practice to allow the prospective party to only inspect document

organisations may

disclose nersonal data is publicly available without the data if the There is no restricion on the dual. T; the purposes of personal

Four

-

disclosing organisation." Of course, the recipient organisation only use or disclose the personal data collected for the same nu may for which the disclosing organisation had permission to use urposes or dieclose the data.

ontained in paragraph I() of the Second t(d of the Third Schedule and paragraph

Schedule, the

ata

1 () o f t }

Under

asset

available

or

(a)

(6)

an

event

-

individual appears; and at which the that is open to the public

5.110 The definition is in effect focused on the element of being "generally arnilable to the public" with the explicit inclusion about personal data

that Can be observed by reasonably expected means. The Commission went to great lengths to describe the meaning of the "publicly 2vailable" concept and focused at length on physical locations that

micht be in public but may or may not be considered to fall within the

noion of being "publicly available"." Much of the Commission's

67

Personal Data Protection Act 2012 (Act 26 of 2012) Second Sched,

jurisprudence on this topic is reminiscent of the notions of "public" in copyright law that has developed over the decades, especially in overscas jurisdictions such as the UK and Australia."5 For example, the copyright cases had to determine whether there had been a communication or distribution or performance of the copyright

para 3(4). 68

Personal Data Protection Act 2012 (Act 26 of 2012) Second Sched, para 3(3) and Fourth Sched, para 3(3).

69

Personal Data Protection Act 2012 (Act 26 of 2012) Second Sched,

70

para 3(3) (c) and Fourth Sched, para 3(3). Data Protection Act 2012 (Act 26 of 2012) Second Sche, Persc

71

para 3(3) (6). Personal Data Protection Act 2012 (Act 26 of 2012) Second Sched, para 3(3)(a). 158

2 73

See the discussion on withdrawal of consent at paras 5.43-5.50 above.

Personal Data Protection Act 2012 (Act 26 of 2012) s 2(1). 4Personal Data Protection Commission, Advisory Guidelines on Key oncepis in the Personal Data Protection Act (revised on 15 July 2016) at paras 12.57-12.67.

eg ee, Telstra

cases

like APRA Ltd v Tolbush Pty Lid APRA (1997) 191 CLR 140.

Corp Ltd v

159

(1985)

62 ALR 521 and

Consent Obligation

the Practical Contex! Data Prolection in

protected work cases

to

the

"public"

or

"in public".

Many

whether issues such dealt with similar music heard by mobile or whether as

a

of

room

thes.

of a

phone

copyrights hospita subscribers

n public76 while they were waiting "on hold" fell within he definitio transmitted "to the public"" It would ot be surprising in Singapore come Commission and the courts in the future. cases such jurisprudence from

to

rely rely

on

being

some of

amount

ncommon

the

individual

that

name,

mber and residenti:

Singapore? If it is assumed for their personal data such address to be disclosed to all

considered to be members, can this personal of and above be the club entry fee Would available'? "generally available to the considered be t o be data be

2

$28,000

"publicly a

barrier

public"? Further,

it lor

have over 19,000 members," would such a number be to the data being "generally large to Commission The "? gave public" very little guidance the

personal

amournt

some

Presence of restrictions

in

members gave consent

contac

suficiently

(b)

with some clubs

WIth s o m e

ailable

to

on this.

5.111

Opening the floodgates

The Commission explained that personal data is "generally availahi..

ble to data stresed

the public if any member of the public could btain or access the with few or no restrictions"." However, the Commission also

5.114

that just because restrictions are present does not necessarily me n

that the personal data is not publicly available.79

(c

the Commission

Furthe.

mentioned

the situation where personal

closed to a single member of the public who is inadvertently data is known to the individual concerned" and concluded not personaly

5.112 To illustrate, the Commission gave a few examples. There may be a group which requires membership to Join, such as a group on social media. Although one needs to be a member to access the group and

the contents and communications addressed to the group members membership to the group can easily be obtained. Examples of this would be social media groups such as Facebook groups, where it seems almost routine for many users to add strangers as their "friend". The Commission gave a contrasting example of where personal data is disclosed to a closed circle of an individual's family and friends, and in this latter example, the personal data would not be "publicly available, even if it is inadvertently disclosed to a single member of the public who is not personally known to the individual concerned.30

dat would not be "publicly available" under this that the personal must surely be tempered by how the disclosure is circumstance. This is, for example, made to a person's social media disclosure made. If the Facebook page, which happens to have settings that enable everyone,

nen those without a Facebook account, to be able to view the person's Facebook page, the disclosure would surely become "publicly available" as anyone

would be able to

see

the disclosure.

5.113

5.115 Further, what if the disclosure was inadvertently made to ten persons not personally known to the individual concerned, would this uansiorm the personal data to become "publicly available"? The Commission did not explain whether "publicly available" will always be determined by the number of people the personal data is disclosed to. It gave the example of one person outside the circle of family and

These are simple cases at the extreme ends of the spectrum. The

friends and ruled out that one recipient could change the character of

Commission did not address the difficult situations. What if the

the personal data to be "publicly available", but it gave no guidance of

personal data is disclosed within a club amongst its members and

Wnether the number of recipients of the disclosure would be a relevant

the entrance fee to join the club is over $28,000, which is not an

cOnsideration and, if so, what the threshold number of recipients nght be for the personal data to be transformed into being "publicly

76 77 78 79 80

Duck v Bates (1884) 13 QBD 843. Telstra Corp Ldv APRA (1997) 191 CLR 140. Personal Data Protection Commission, Aduisory Guidelines on Key Gonc in the Personal Data Protection Act (revised on 15 July 2016) at para 12. Personal Data Protection Commission, Advisory Guidelines on Ney Concepis in the Persomal Data Prolection Act (revised on 15 July 2016) at pa Personal Data Protection Commission, Aduisory Guidelines on 9 ncehis m the Persornal Data 59. Protection Act (revised on 15 July 2016) at patd -

160

available". the entrance fee for the Raffles Town Club, nisChub was v Lim Eng Hock Peter [2013] 1 SLR 374 at [17]. Or

see

Rafles

Toun

example, Raffles Town lub had 19,048 members, see atjles 1 ourt

ub v Lim Eng Hock Peter [2013] 1 SLR 374 at [3].

a l Data Protection Commission, Advisory Guidelines on Key Coneps Protection Act on 2016) at para 12.59.

Fersonal Data

(revised

161

15July

Data Protection inthe I'ractical 5.116

Context

Consent Oblhgation

nersonal

to

give guidance on whethcr t h . The Commission cinitilüon could be governed by the class of of "publicly available" ersons. The ious at the obviou end is of friends the and example of family of a definition the could presence but the question remains: allow the personal data to remain not class or category of persons to 19,0 class of persons amounts the if even available", also did

ipients, a n d ,

not

spectrum,

publicly 9,000 individuals?

can,

grapple wth, especially sin ce These questions of the rights, if any, tha a clear consensus hat seems to be lacking in Singapore are aimed at data protection laws copyright law, the issue of "public" is made slightly clearer with are

dificult

to

become data

personal collected, used or

Closed for any purpose. This exemption nption efee persona gives v e r their their personal data and ntrol oover no opens up many fividuals and and data security of the individual. in the p e r s o n a l

discldry disclosed

y

all

fectively

conirol

indivie

erabilities

highlighted

should be

idition,

that the

Commission was also

there

the personal data in question cxplicit licly available at the point of collection, organisations would

aim

without consent, be publicly available at the point in time whe it is used or disclosed.*7 This, mission, is to avoid organisatüons according to the to

protectingpersonal For

the economic rights of the c of copyright law being to protect will aim to holder, thus any interpretation of "public" uphole by copyright law. economic given holder's rights copyright

copyrig)

5.118 In all, this exemption of "publicly available" is antithetical to

1nstantancously

that all the

thuss

5120

5.117

data would have

would be le". The result from the onwards, be

blicly available".

the

that in its position

In

able

to

good

data to be instantly transformed into personal data that can be free collected, used and disclosed without any restrictions whatsoever simply releasing it to the public. The personal data will then be "publicly available" and thus fall outside of the personal data protection regime forever. MICA was asked to clarify this very point br it sidestepped the issue by stating that the provisions of the Act will not override other existing laws. Of course, the perpetrator of wrongful disclosures will have to suffer the consequences of any existing laws. The question is the status of the personal data that has been wrongfully disclosed, does it fall within the purview of this exemption or not? In the absence of any confirmation to the contrary by MICA, one can only presume that such personal data will come within this very broad

exemption. 5.119

Hence, all that is needed is one unscrupulous person to upload massive amounts of personal data onto the Internet to websites such as

and

long

disclose

as

personal

notwithstanding that the personal data

a n t verify that the

ording to

personal data protection policy and makes cybersecurity near impossible. This exemption enables almost every piece of personal

use

as

the

data

may

no

longer

having

data remains publicly available which,

mmission, Comr

is an "excessively burdensome" task.88

5.121

clear that one of the rationales behind this exemption is to the burden of compliance on organisations. It has, however, the effect of chilling cybersecurity etforts and opens all personal data belonging to individuals to attack. Organisations should also be

It seem

mindful that even though the personal data regime sanctions such

collection, use or disclOsure, organisations may still be liable under other areas of law such as criminal law, contract law or even the tort of

negligence should they or their systems have played a part in harm occuring as a result of such collection, use or disclosure of personal data

(d)

Observable personal data

5.122 The definition in section 2(1) also includes be observed in public. There are two main personal data:9

personal

data that can that the

requirements,

Wikileaks,3 or to e-mail the personal data to a large number or 84 85

See ch 1.

Ministry of Information, Communications and the Arts, Public Consul by Ministry of Communications and the Ars: Fropu Personal Data ProtectionInformation, Bill (19 March 2012) at paras 2.65-2.66. See Wikileaks at Issued

86

(accessed 7July 2016).

Yee Fen Lim,

yberspace

Law:

Commentaries and Materials (Oxford

University Press, 2002) at p 132. Yee Fen Lim, Cyberspace Law: Commentaries

and Materials

(Oxford

University Press, 2002) at p 132. rganisation for Economic Co-operation and Development, The OECD Cy ramework 2013 (accessed 7 July 2016) at p8.. Asia-Pacific Economic Cooperation, APEC Privacy Framework au

184

the consent of the data subject but the collection is also limited to the

185

Consent Obligation

Data Prolection in the Practical Context the notice. Furthermore, personal data cannot be ised o for other purposes without fresh consent. This is a vast . or proces the wide sweeping exemptions in Singapore, which are alsot r e in nature, so that once a piece of personal data is collee. and disclosed for rele ed unde it can also be used

that in all aspects of the employment relationship,

without consent.

disclosirng

employve employer

from

amulatitheve

exemption,

is only ecollecting, using oro rsonal and emp relatio the cmployment n e n t cmploveea f r o m the nce the withdrawal

seems,t h e r e f 5190

h e as

long

nsent is hatsent data

as

required does not

apply to personal personal data where consent has notapply free reign to employers as they would never hesentprhis gives 170 employees. no couision

been cxempted, this oc fo n s

from their

consent

btain

Specific industry sectors

2.

have t

5.188 When

19

some

are

specific industry sectors of personal data collection,

how permissive 5.189

employers in the employees and potential

For

considered. use

ill be clear

disclosure the Ac

is.

handling of personal data data belonging employees for the purposes of. o

emplo

related purposes. th ment not for other non-employment above have elucidated how liberal are the requirements oCtons Prior to employment, in assessing and finding candidates t e hire,Act

and

prior

consent

is needed for collection,

evaluative purposes

use or

disclosure

During employment.

exemption.

notice is given, the employer can collect, use

or disclose

no

C the

long

concerned with managing the em relationship," including terminating the relationship. For 'n

data for any purpose

ona t

in other aspects of the employment relatuonship such as promotion

this would be covered by the evaluative purposes exception,l67 The evaluative purposes exception can also be used for the purpose od terminating the employment relationship. AS tor documents produced in the course of and for the purposes of the employment,8 Consent for these are also not required.

f

there is any misconduct bv

employees, any collection, use or disclosure of personal data is also permitted for any investigation or proceedings.169

164 165 166 167 168 169

See, eg, the position in the European Union. Personal Data Protection Act 2012 (Act 26 of 2012) Second para 1(; Third Sched, para 1 (f) and Fourth Sched, para 1 (h). Personal Data Protection Act 2012 (Act 26 of 2012) Second para 1(o); Third Sched, para 1() and Fourth Sched, para 1(s). Personal Data Protection Act 2012 (Act 26 of 2012) Second para 1(); Third Sched, para 1() and Fourth Sched, para 1(h). Personal Data Protection Act 2012 (Act 26 of 2012) Second para 1 (n); Third Sched, para 1(j) and Fourth Sched, para 1(s). para 1(e); Third Sched, para 1 (e) and Fourth Sched para 1().

is recruitment would appear to be in

tion than other employers in general regarding

neasier reCruitment firm retains employees, no consent mpliance. f from the employees as long as the organisation

an even

casier

ld b er e q u i r e d

hevond employment related purposes with the personal

data that a recruitment firm handles about the personal c o n f i n e s of recruitment purposes, all of these the d i v i d u a l s w i thin hir from the requirement of consent for collection, use b e exempt f r o m

d o e sn o t m o v e

or

d a t a . A sf o r

purposes exemption." As discussed data that can be collected, used of the types the suitability, eligibility or of "determining disclosedfor the 1"172 for for em employment or appointment to of the aualifications wide. Ience, for an organisation whose business is extremely are. oftice arguably not need to obtain uitment services, they wou limited to collection of personal data for any of their business the nt for handle personal data for purposes other than ctivities. If they then those other ctivities would need to be assessed. under

1ative the evalua

disclosu

or

above,

personal

Durpose

individual"l72

recruitment,

5.192

equally privileged position. they For insurance companies, collected, used and disclosed for employment data Again, personal consent from their employees or related purposes would not require There are also sweeping exemptions for personal are in an

Dotential employees. data collected, used or disclosed in connection with insurance policies both prior to insuring using the evaluative purposes exemption,73 as

Sched, Sched, Sched, Sched,

Personal Data Protection Act 2012 (Act 26 of 2012) Second Sched,

186

se busin business ations whose

i..

170 Personal Data Protection Act 2012 (Act 26 of 2012)

s

16(1).

71 Personal Data Protection Act 2012 (Act 26 of 2012) Second Sched, para 1(; Third Sched, para 1() and Fourth Sched, para 1(h).

2 Personal Data Protection Act 2012 (Act 26 of 2012) s 2(1). 173 Personal Data Protection Act 2012 (Act 26 of 2012) s2(1); Second Sched, para 1(); Third Sched, para 1() and Fourth Sched, para 1 (h).

187

Data Protection in the Practical Contex

ConsentObligation

well as all other aspects of the conterment and adm

nistraion

insurance policy using the benefit plan exemption 7strar

t o Control their personal data; and to ensure data within the EU member states. Thus, the d a t a with personal the data subject is at the hcart of the of t h e i rright

in particular,

.

t h e frce o w

o fp e r s o n a l

.193 For many organisations, especially those in the the retai

retail

sector, the cOnsent aspec personal coll disclose about customers or clients, or potential custome

EUregime.

arca they will need to scrutinise concerning the co data will likely be the personal data tho

omers or ciens

Dala

only and es

OF THE CONSENT

EUROPEAN

UNION

POSITION ON

"colle.

EU The data

IMPACT

ction Dire Directive 95/46 46/EC mandates that personal "collected for specific explicit and legitimate be processed in a way incompatiblc with those f 6urther urt data is very broadly defined'78 processin concept of

Protection 5.197

may

).

by

data

conrol

not

The

cludes collection, consultat

n, disclosure and even erasure

or

purpos

and

destruction.

5.194 As discussed in chapter 1, organisations in Sinoapproach personal data protection with a myopic view,

pore canno

expanded

territorial

reach of

Regulation 2016/679,"3

the

EU

organisations

General

woul

ta

need

especially their online activities and if they are caug

teritorial reach, to ensure they do not fall foul of of the

the

the EU.

to

Proexamitecionne

new

laws in

The EU General Data Protection Regulation 2016/679 did no the requirements and concepts concerning consent, insteadchan

confirmed the concepts and requirements in a clearer and comprehensive form. For this reason, both sets of personal more data protection will now be considered.

Consent under EU Data Protection Directive

95/46/EC

5.196

Both the

public

and

private sectors Protection Directive 95/46/EC, and

175

excessive

not

in

that personal data must be

relation

further

and/or collected,

ed

data

personal

elevant a n d

cannot

to

adequate, relevant

the purposes for which they are

This effectively means that the disclosed must be necessary and

processed.

used

or

excessive. be in any way

for when personal data may be legally conse of the data subject is one of the orocessed - the all requiring an element of criteria with the remaining ritera," is ecessary to protect the vital where processing necessitysuch as The definition of consent that must be of the data subject."* dat to be processed means "any the datasubject for personal given by informed indication" of the data subject's and specific freely given that consent must be explicit for the wishes. 181 Article 8 requires of data, such as racial or ethnic origins, processing of special categories lists the

criteria

unambiguous

interests

religious

or

philosophical

beliefs and

political affiliation.182

that member states may permit in The small number of exceptions and other issues are: measures to safeguard national consent of respect and related regulatory functions; security; defence; public security breaches of ethics for regulated professions and related regulatory functions, an important economic interest of a member state or of

Personal Data Protection Act 2012 (Act 26 of 2012) Second Sched,

para 1();Third Sched, para 1() and Fourth Sched, para 1(s). Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons wiun regard to the processing of personal data and on the free movement of

Such data, and repealing Directive 95/46/EC (General Data Protecion 176

requires

5.200

covered

by the EU Daa the two objectives listed in Protection Directive 95/46/ECT are to are

Article 1 of the EU Data protect the fundamental rights and freedoms of natural persons and, 174

6(1) (c)

5.199 icle 7

5.195

1.

6.198

Article

Regulation) ("EU General Data Protection Regulation 2016/679).

EUData Protection Directive 95/46/EC, Art 1. 188

177 EU Data Protection Directive 95/46/EC, Art 6(1) (b). 178 EU Data Protection Directive 95/46/EC, Art 2(b). I79 EU Data Protection Directive 95/46/EC, Art 7(a).

80 EU Data Protection Directive 95/46/EC, Arts 7(b)-7().

EU Data Protection Directive 95/46/EC, Art 2(h). 82 EU Data Protection Directive 95/46/EC, Art 8(1). 189

Consent Obligalion

Data Prolection in the Practical Contev related regulatory lunctions; and the the EU and frecdoms of the rights and subject or of of enti ntire industries exemptions wholesale or r

others.

worded

legislation. in the Singapore

5.201

otection of the There

no idd daa

that are preserm

of

not Is T h is on s id e r a b l yb br re oader

considcrabl

Didual.

provide the oduct or servico that necessity but a testof what is sonable, the test of

necessity.

is which

on

persona

ictin g the

collected andrealisefurher

the amount ot personal data collecto purposes and to be the smallest possihl processed for the purposes To over the personal data, consent must he.

subjectcontrol given by the data subject

to

test

test

aa

consent pursuans. EU standard 95/46/EC 1s that purposes musthe the EU n Directive Protection must be legitimate purposecs I8Oficd,a to the data subject and they 184 further processed must be necesea The and data collected in relationa not excessive.185 This would resalt in the purpOses and

In summary, the

able hat is reaso

beyondWhat i s

for the

collection,

use

and

unambilosureguo

that consent ca the stated purposes,which for the ciDe dee position.Lastly, unlike the Singapore ion and of special categories of data, explicit consent i means

processing

5.204

can

med in in

more 0

the

EU regime.

Singapore, which is quite contrary nambiguous and Cxplicit consent in

decmed

of

Lastly

antithctical

than deemed

the three Schedule permienccivcd re broadly conceived. It would

Eve.

exemptions

U6 tists of o

in

is legIslation

the EU

SiDgapore

dis

to

onal perso.

the the

is restrictiv.

adhere to

the

data

apore

collecion, use

Thus, if

oor

requirementsorganisations under

the on, they would need a complete overhaul of their legisia tion practices should they come under the

ore

SU

position

simply

conser

u l e s s C

t

gthy

ingapo.

al

be

crequiremecnt onsent

protecti

data

of jurisdictions

such

as

the EU,

purn

EU General Data Protection nsent under Regulation 2016/679

5.202 The EU position sits in stark contrast to the legislative requirem

Singapore. Not only must the amount of personal data collec

ents in

and also be Unambiguous consente

processed be the bare necessary minimum, the purposes must explicit, legitimate and not overly broad.

of the

data subject must be obtained and there are no wide.e.

af

5.206

In the

consent,

the

area

2016/679

reaffirm

on Protection Directive 95/46/EC.

EU

General Data Protection and clarifies the EU Data

strengthens

Sweeping

All this serves to ensure that the smallest amoun personal data can be legitimately collected and further processed of

exceptions.

5.206 The definition

5.203 Singapore's position with respect to the purposes permitted, as will be seen in chapter 6, is that which a reasonable person would considet

of consent is largely nchanged, Article 4(11) defines

"consent" of the

data

subject

to mean:l89

appropriate in the circumstances; this is far broader than the

informed and unambiguous indication of the freely given, specific, which he or she, by a statement or by a clear subject's wishes by to the processing of personal data affirmative action, signifies agreement

EU requirement of legitimate and explicit purposes. There is no

relating to him

any

data

or

her[.]

requirement in Singapore that the personal data collected, used or disclosed be limited to that which is necessary. The only stipulation in

the Singapore legislation is that an organisation cannot, as a condition of providing a product or service, require an individual to consent to the collection, use or disclosure of personal data about the individual

183 EU Data Protection Directive 95/46/EC, Art 13. 184 EUData Protection Directive 95/46/EC, Art 6(1) (6). 185 EU Data Protection Directive 95/46/EC, Art 6(1)(c). 186 EU Data Protection Directive 95/46/EC, Art 7(a). 187 Personal Data Protection Act 2012 (Act 26 of 2012) s 15. 188 EU Data Protection Directive 95/46/EC, Art 8(1).

190

5.207

remains equally broad and incudes The definition of "processing" disclosure.0 Article 6 sets out the and combination collection, storage, situations where the processing of personal data is lawful. It is nearly that other identical to the EU Data Protection Directive 95/46/EC in

EU Ceneral Data Protection Regulation 2016/679, Art 4(11). 190 EU General Data Protection 2016/679, Art

8

Regulation 191

4(2)

Data Protection in the Practical

than the consent the e l e m e n t

of

the data

subject, all the

2

of necessity.

Consent Obligation

lext

other

siluations Tequige

frecly

frecly

en

not

on

have

he

oro pro

of personal date of special categories The processing has data given explicit subjec unless the prohibited data for specified purn such personal processing of such as where proccssino is limited situations, other the the data subject or ane of interests vital protect the is incapable of giving consent 194 1s where the data subject constitutes specia categories The list of what the processing of genetic data, bior to include

data

coninue 93

ing

expanded

identifying

a

kept

as

neces one eto

individu consent,"" applicable of personal data has beens

atural person

the purpose of uniquely such all the other existing categories

or if

netric data tor

and it

reasonable

the

duct

or

of what is necessary. whas

of

consent

beyond what service, instead of the

EU

General

Data Protection ETI 2016/679 details of what will be requ ired to meet some of the

to the

.211 The Recitals

alsoprovidemuch

Regulation

e l e m e n t so fc o n s c n t .

hasalso

oncerning health

EU General

32 stipulates and

Regulation 2016/679 has int. introduc clarifying the concept and requiremen

Protection The EU General Data

several new requirements

provide

pro

to

to

standard

New requirements

5.209

a

i1s

higher

5.212

(a)

not nccessary

he be

can

pplicd

pore

Singa

Standard js

performa of a conditional on consentcontract, inclu to the processing

ecessary for the pertormance of that compared with section 14(2)(«) of the for provides similar restriction, 202 which except the in Singapore requirin 1s

that

This

201

i r a c t»

to sent to thbee

if if tthe

scrvic

o fa

data da1a

o f perso

5.208

p given

been

of consent. Article 7 lays down several conditi for consent to b that the data suhia lid, It specifies that the onus of showing have consented to the processing of their personal data lies organisation. Where the consent is obtained in the contevs he of a written declaration which also concerns other matters, the uest fo

oftheonsent

Regulation 2016/679208

unambiguous

act uch as clear afirmative

by a statement, whether writen or an oral statement. A form, in simple would consist of ticking a box when visiting an

processin

through

in

Data Protection

should be a freely given, specific, informed that indication of the individual's agreement to the her personal data. This indication must be of his or

hard copy,

or

method

electronic internet website

or

Recital Moreover,

orinactivity in

should

consent shall be presented in a manner which is clearly distinguishahle

personal data

from the other matters, in an intelligible and easily accessible fom

all of them.

choosing technical settings for online services ovides that silence, pre-ticked boxes not nstitute consent. Where the processing of

32 expressly

has multiple purposes, consent needs to be obtained for

using clear and plain language.Where this is not done, the Consent is

not

binding.

199

5.210 The right to withdraw consent at any time must be made known to the data subject at the time the consent was obtained and it must be as easy to withdraw consent as to give consent.200 Consent will likely be held to

191 EU Ceneral Data Protection Regulation 2016/679, Art 6(1)(a). 192 EU General Data Protection Regulation 2016/679, Arts 6(1)(b)-6(1)). 193 EU General Data Protection Regulation 2016/679, Arts 9(1) and 9(2)a 194 EU General Data Protection Regulation 2016/679, Arts 9(1) and 9(2)0). 195 BU General Data Protection Regulation 2016/679, Arts 9(1) and 9(2) 196 EU General Data Protection Regulation 2016/679, Art 9(1) 197 EU General Data Protection 2016/679, Art 7(1) 198 EU General Data Protection Regulation Art 7(2). 199 EU General Data Protection Regulation 2016/679, Art 7(Z 2016/679, Regulation 200 EU General Data Protection Regulation 2016/679, Art 7(3).

192

5.213 the organisation to ensure that the data subject The onus is also upon and the extent to which consent is given. 204 In that fact is aware of the of consent pre-formulated by the organisation declaration a particular, should be written in an intelligible and easily accessible form, using clear and plain language and should not contain unfair terms.20 The minimum information that needs to be provided to the data subject in order for the consent to be informed is the identity of the organisation and the purposes of the processing for which the personal data is intended.206

201 EU General Data Protection Regulation 2016/679, Art 7(4). U Personal Data Protection Act 2012 (Act 26 of 2012). 5 BU General Data Protection Regulation 2016/679, Recital 32.

0U General Data Protection Regulation 2016/679, Recital U General Data Protection Regulation 2016/679, Recital U

General Data Protection Regulation 2016/679, Recital 2.

193

Dala Protection in the Practicat Context

Consent Obligation

5.214

to be freely given if the Consent is not considered withdraw consent with or refuse to unable vein, consent is presumed not to be frecly given if it.

rmally

data subject is

ilar does notSimallow different personal data operations in circumstances where it is appropriate to do

separate

consent

to

be

given

to

processing

so 208

nrovided

provided

Thus,

charge

direct

object

individual requc m e a n s that

of

at a

a

distance, by

esent

online

5.215 Lastly, where personal data is collected or processed marketing purposes, the data subject shall have the ight t and at any time to the processing of perso free of

for remuneration,

recipient of services"electronic ans anddistance 215 2N5 The C e is a ided without the 216 enn a t simultaneously present.216 The service traP ust be one the arties. ission of data on that is through individual provided 217 request definition is quite broad and would cover a the wide variety of as electronic at the

seri

commerce in

goods, including aharmaceutical products, electronic commerce

luding online gambling. lt would also extend networks and even ocational training by distance learning 218

in

to social

concerning him or her for such marketing, which includes profilina

This right should be explicitly brought to the attention of subject and presented clearly and separately from anny other data information.210

5.218

special of those under 16 of age is that they may be less aware of the risks, consequences andyears safeguards in ation to the and their rights of personal concern is when personal data is used for the

Therationale for

treatment

processing

concerned

keting or creating personalhty or user profiles and wherepurposes services fered directly to a child. One ot the harms in the minds of the

New requirements for minors under 16 years old

(b)

5.216 The EU General Data Protection

Regulation 2016/679 introdticed specific protection in the context of children's personal data h putting restrictions on the validity of consent given by children21l This is something completely new in the EU data protection landscape. Article 8(1) states that when offering information society services directly to children under the age of 16, or a lower age provided by EU member state law but which may not be below 13 years, consent is only valid if it is given or authorised by the holder of parental responsibility over the child.2 The organisation bears the onus to make reasonable efforts to verify that consent is given or authorised by the holder of parental responsibility over the child, taking into

consideration available technology.213

a s probably the rise in the number of online predators, becially sexual predators. It is interesting to note that the consent of the holder of parental responsibility is not necessary in the context of preventive or counselling services offered directly to a child.29

5.219

These new rules on minors under 16 years of age will pose challenges to those wishing to offer goods or services, even without charge, to those in the EU. Considering that teenagers are the largest consuners and, in some respects, drivers of online goods and services, whetherin terms of social media, games or the purchase of music, they represent a significant segment of the market. Organisations that need to continue to tap into those market segments will need to devise ways of with these new requirements. They would need to first

complying

establish if the person is under 16 years of age and if they are, to

5.217 Article 4(25) states that "information society service" has the same meaning as service" in another EU directive?1 and is "any service

nformation in the field of technical regulations and of rules Directive services [2015] OJ L 241/1 ("EU

ontormation Society 207

208 209

210

EU General Data EU General Data EU General Data

EU General Data Protection Regulation 2016/679, Recital

General Data Protection ZEU Regulation 2016/679, Art 8 and EU General Data 212 Protection Regulation 2016/679, Art 8(1) 213 EU General Data

214

i 216

Protection Regulation 2016/679, Recital *. Protection Regulation 2016/679, Recital 45 Protection Regulation 2016/679, Art 21 cital 38.

Protection Regulation 2016/679, Art 8(2). and of the Directive (EU) 2015/1535 of the European Council of 9 September 2015 laying down a proceParhame om the nextpag (cont'd 194

2015/1535").

EU Directive EU Directive

2015/1535, Art 1(1)(b). 2015/1535, Art EU Directive 2015/1535, Art 1(1)(b)( Council, Parliament, the OCommission Communication1(1)(b)(1) to the European COnomic and Social Committee and the Committee

t

for

4 coherent framework for building irnust in n 2012) (adoptea 1l LTC and online services (COM/2011/0942 finalJanuary 2012) at fn 1. 219 General Data Protection

gulation 2016/679,

195

Recital 38.

Consent Obligation

Dala Proteclion in the Praclical Context

cnsure

that

they obtain permiSSion no

parental responsibility. this

might

be

legislation has

This is

achieved

existed for

could some

authorisation fror om the hold casy task. Some puid.

the consent is

or

be gleaned

ume to

m

protect minors

T of

in enacted in the US

1998

to

Act

amended

where

the

to

range of operators.22

additional or

parent

legal

legal guardian

post:

guardian

address

proviso that

children

personal information. confirmatory e-mail following receipt of consent, a

to

telephone irming the parent

or

or number from the parent or

and confirminc

call.

letter or

consent

was safety.

cgulatüFTCons The

legal Organisations guardian's

can i

strengthen reol

parental

disclose

telephone by that use this notice that the must provide parent or legal guardian hod ke any consentgiven in response to the earlier

or

to mobile application devel. expanding COPPA's reach and on the collecion of personal infs. expanding the prohibition lion of without verifiah 13 under age years from children to a wider

Such

("COPPAy

protect children's onli line ("FTC enacted Rule" in 1999.

Commission

Trade The US Federal COPPA ("COPPA implementing the Rule in 2012* COPPA the

not

ons incude: include: sendine steps sending

t h e organisation.

btaining a

5.220 Children's Online Privacy Protection The

consent

does

elines on how the US,

the parent or legal guardian with

5,222 last meth

The and

it

ded

concluded

is

termed

the

that it remains

"e-mail plus" method2 the by FTC a valued and

for certain organisations.

mechanism f o r «

other methods of consent, the FT innovate

to

create

additional

However,

as

cost-effective consent it is less reliable than

"strongly encourages industry to

useful

mechanisms

as

quickly

as

p o s s i b l e "225

5.221

Some of the acceptable methods for proving "verifiable na parental

consent" include the following: 22 (a) (b)

5.223

a signed parental consent form returned to the operator hu postal mail, facsimile, or electronic scan; requiring a parent or legal guardian, in connection with

a

monetary transaction, to use a credit card, debit card, or other

(c)

(d) (e)

(f)

220

221 222 223

online payment system that provides notification of each discrete transaction to the primary account holder; having a parent or legal guardian call a toll-free telephone number staffed by trained personnel; having a parent or legal guardian connect to trained personnel via video-conference; verifying a parent or legal guardian's identity by checking a form of government-issued identification against databases of such information, where the parent or legal guardian's identification is deleted by the operator from its records promptly after such verification is complete; or an organisation may use an e-mail coupled with additional steps to provide assurances that the parent or legal guardian prova

Children's Online Privacy Protection Act 1998 15 USC (US) SS 650l-0 (2006).

Online Privacy Protection Rule 78 Children's Fed Reg 3972 (anuary 17, 2013) (US).

Children's Online Privacy Protection Rule 78 Fed Reg 3972 (anua at 3972 and 3985. Children's Online Privacy Protection Rule 16 CFR Pt 314 S)

2013) (US)

$ 312.5(b) (2) (2012).

196

Cane organisations in the US, such as social media provider Facebook,

haue Complied with COPPA by not permiting users under 13 years old to 1se their social media service. However, the screening is quite nrimiúve and appears to be bascd on the date of birth entered by the

ser and no further checks are done. It is doubtful whether such kinds of simplistic screenings will be acceptable in the EU regime and, in any event, the onus lies with the organisation to demonstrate compliance.

Thus, an ineffective measure to restrict children under 16 years of age to access the service such as this would probably not satisfy the requirements in Article 8 of the EU General Data Protection Regulation 2016/679. 5.224 lt 1s, of course, unclear how many, if any, of the methods listed by the

Cwill be found to be satisfactory to the EU regulators but they represent some of the available techniques to date. The burden will be On organisaticons that collect, use and disclose personal data to comply.

Odren's Online Privacy Protection Rule 78 Fed Reg 3972 (January1, 2013) (US) at 3990. 25 Ch

Protection

Rule 78 Fed Reg 3972 (January 17,

Oo 2013) (US Tvacy ebook Help Centre, "How do I report a child underthe age ot (acc

at (accessed 11 July 2016). 201

Consent Obligalion

Data Protection in the Practical Context matter of course. Although users can disable cookies in .

websites one can access since websiteS so

commonly

c setings (

numbercookico utilis

that that the lack of meant it was difficult for cookie a 1on accompanying a user to assess whether to accept or not accept a particular cook This situ been the technologies. It has long

case

changed somewhat in the past few years, especiz

of the

numb

their browser programs, this may drastically reduce the

information

in the EU 28

ion has

telephoncc

the

ocation

version

owser usecd, peof u l d b e r e a s o n a b l e

hese

would

5.238

mission

5.239 The Commission presents an example of how deemed consent would operate in the context of websites. For Internet activities that the user has clearly requested, there may be no need to seek consent for the use of cookies to collect, use or disclose personal data where the user is aware of the purposes because the user, having voluntarily provided such personal data, can be deemed to have consented to the collection, use or disclosure by the cookies.241

phone,

the None of the online

on.

facilitating

his his

consented

actively manage of an t the imply that the individual has consented individual

does not collect personal data, then no consent is required 29cookie Commission gave the example of cookies that "only collect and saThe technical data to play back a video on a website"0- no consent be required for such cookies.

for

also

accept.313

In Singapore, the position of the Commission is that if

necessary

opined that consent may be reflected in the wav browser to accept certain cookies but rejects a to the be found to have he may collection, use and athers; nersonal data by the cookies that he has chosen disclosurd to Commission was the caref to note that 292 However, the

5.241

usCr

Position in Singapore

vice if it is a mobile the browser and so

purchase,

configures

(b)

of

to:

his

browser

mere

settings does not collection, use and

to the his personal data by all websites for of their stated disclosure purposes.245 In fact, many users of he Internet are unaware of how to

change the

browser

settings.

5.242

Importantly, the Commission was of the view that the obligation to

ahtain the individual's consent tor the collection of his personal data lies with the organisation that is collecting such personal data24

Thus, in the situation where organisation X operates a website but organisation Y, a third party, collects personal data, then organisation Y has the obligation to obtain consent.213 5.243

5.240 It should be noted, however, that this example given by the Commission would only make sense if the cookies are only using and disclosing personal data for the purpose which iscollecting, deemed. Often, cookies collect a lot more information for many other purposes that are quite unrelated to the primary interaction. For example, if the interaction with the website is to facilitate an online purchase, it is not uncommon for cookies to collect information about the deviccs 238 239

240

241

Yee Fen

Lim, Cyberspace Law: Commentaries and Materials (Oxrord University Press, 2002) at pp 114-118. Personal Data Protection Commission, Advisory Guidelines o Personal Data Protection Act for Selected Totpics (revised on 20 Deceme 2016) at para 7.7.

Personal Data Protection Commission, Guidelines Personal Data Prolection Act for Selected Topics Advisory at para 7.7. (revised on 20 Decemoer

Personal Data Protection Personal Data Protection At

at para 7.8.

forbehavioural

212

Personal Data Protection Commission, Advisory Guidelines on the Fersonal Dala Prolection Act for Selected Topics (revised on 20 December 2016) at para 7.9.

ersonal Data Protection Commission, Advisory Guidelines on the

O a Data Protection Act for Selected Topics (revised on 20 December 2016) at para 7.9.

* O n a l Data Protection Commission, Advisory Gauidelines on the ersonal Data Protection Act for Selected Topics (revised on 20 Decemor 4UO at para 7.10.

the

Commission, Aduisory Gue for Selected Topics (revised on 20 Den 2016) 202

Lastly, the Commission made it very clear that where cookies are used targeting, the individual's consent is required for such collection, usage or disclosure of personal data.246

ersonal Data Protection Commission, Advisory Guidel1nes o

Personal Data Protection Act. for Selected opics (revised on 20 December 2016)

246

at para 7.10.

Protection Commission, Advisory Guidelines 0n the Persomlata Personal Data Protecti Act for Selected Topics (revised on 20December at para 7.11.

203

Data Protection inthe Practical Contex!

Consent Obligation

Position in the European Union

(c)

informed, be specific be of the indication freely nd individual's wishes. be anisations clear explicit, and the natu of cookies emplov compreher eir disclosures Ies employed consent their obtaining use

or

lection,

g T v C na n d

5.244 In the EU, there is a specific law that deals with cooks

relevance, Article 5(3)

was

amended

to

European Parlia

and it

is

irective ment. Of

rovide stronger protecuon

for

The law previously permitted vebsites to use cookies Where there was clear advance notice to the user. This was

users.

information nmonl ahouty

achieved by a website's privacy policy providi cookies that are employed on the website.

ensure

that

the

storing of information, in

already

transmission network,

or

of

as

society service the service.

or access

a

for

processing. sole

the

communication

over

prevent anv carrying out the electronic

purpOse

an

of

provide

5.246

as

web

beacons/bugs*"

before

they

5.247

248 250

exemptions

o r where they are in order for necessary requested of thea provider of an inlormation society service explicitly by

strictly

communica

to

provide

that

service.

5.249

T FIl Artcle

Protection

29 Data Working Party's Opinion 04/2012 anCookie Consent Exemptaon ("WP29 Opinion") has concluded that the Wo Categories of exemptüons in Article 5(3) would include the following

uypes of cookies.251

5.250 First, "user input cookies', which refers to session cookies that are used to keep track of a user's input in a series of message exchanges with a These are typically first party service provider in a consistent manner cookies relying on a session-ID, a random temporary unique number generated for the session, which expires when the session ends, although some may persist beyond the session. These first party user input session cookies are normally used to keep track of a user's input wien filling online forms over several pages, or in shopping cart Scenanios to keep track of the items the user has selected for purchase.

Article 5(3) specifically refers to the EU Data Protection Directive 95/46/EC,0 hence, the consent must be obtained prior to

249

5,248 n s 1from consent provided in Article 5(3) are wo The where cookics are used fori the sole purpose of carrying out the transmission

communications

order for the provider of an information requested by the subscriber or user to

other similar technologies such can be employed by the website.

on

uscrs'

to

the

Specifically, Article 5(3) requires prior informed consent for storage or for access to information stored on a user's terminal equipment, thus, organisations must obtain users' consent to the use of cookies and

24

prior

cauino.8aning

strictly necessary in explicidy

to

about

The WP29 Opinion or

of access to information the terminal stored, subscriber or user is only allowed on condition that the subscriher ta concerned has given his or her consent, having been provided with clear and comprehensive information, in accordance ith Directive 95/46/EC inter alia, about the purposes of the This shall not

technical storage

and be

real

websitesp

he user

5.245 The new Article 5(3) reads:218 Member States shall

must

requires

contained in what 1s Commonly known as the e-Privam. es

which was amended in 2009 by the

lisclosure, dis

constitute a

Directive 2002/58/EC of the European Parliament and of the Coun 12 July 2002 concerning the processing of personal data and the pro of privacy in the electronic communications sector (Directive on and electronic communications) [2002] OJL 201/37 ( r Directive 2002/58/EC"). See Art 5(3) of the Yee Fen Lim,

e-Privacy Directiv 2002/58/EC. Cyberspace Law: Commentaries and University Press, 2002) at pp 118-119. Directive 95/46/EC of

24 October 1995

on

the

Materus

processing of personal 1995] OJ L 281/31.

data and

on

the free movement

of sucn 0aa

taken irom wng section on the examples of exempt cookies are 04/2014 29 WP194, Data Protection Working Party, BUArticle Opinion

1t

the Councilof the

page) (cont'd on the next

204

wDether it be filling in a form or purchasing an item online."

of

(Oxford

European Parliament and or u the protection of individuals with regard t

nese cookies are exempted because they are clearly needed to provnde an information service explicitly requested by the user,

0 C0okie Consent Exemplion (adopted on 7 June 2012) at ppoAcle 29 Data Protection Working Party, WP194, pn0

COOkie Consent Exembtion (adopted on 7 June 2012) atp 04/2012 Protection Working Party, WP194, Opinion Data on Cookie LOORie Comsent Exenption (adopted on 7 June 2012) at pb.

205

Data Protection in lhe Practical Context 5.251 authentication

cookies which

are used

Consent Obligation

dentify auser

Second, 251 into a wcbsite.254 Authenicalion cookies the user has logged once usually session okies but they are essential to allow continue

to

provide

access

example, upon logging

into

to a

the

various

pages

banking website,

of

the account balance and transacti. know it is still the s a m e user and allo

the

te to

website. Fo

next page scet records, the websi needs

access to the to transaction records webpage. The website will be able to :

through the

authentication cookie. Witho

checkbo box

balance and ascertain the authenticatio Cookithcis,

the user would have to provide a username and password

password

on cach of the bank's website that is accessed. As the authentication information service the user is an essential part of the

page

cookie is

society

requesting, it would be exempted under Article 5 (3),55

explicitly

5.252

"keep me.logged in" next Lo the

i n d i c a t ec o n s c n t , 2 5 8

the website

an overview of all accounts held. In order to move to tho access

as

such to.

5,254

type

hird yP

T h et h i r d

have h e s p

ily

b e e ne x p l i c i t l y

submit button

to

of cookie is he user centric 1ask of increasing the security the user. An requested by

security cookie 259 These of the service has example of this can bethatffound detect repeated failed login attempts on website system designed to protect the login system

okies used to m

a

o

other

from This type of cookie falls within the exempion as of websites and it is a service for the security that has been he uSer. This type of user secunty cookie lifespan in order to fulf their security purpose.20 usually has a

or some

access.

unauthorised

i is

used

requested

longe

5.255

multimedia player session coOkies are cookies used to store

technical data required to play back video or audio content, such as

The WP29 Opinion sounds a warning

authentication cookies must only use

them tor

that websites thas use

authentication

purpose poses behavioural monitoring or advertising without consent 56such For example, if a bank user is checking the toreign currency rates on an

and must not

use

the authentication cookies for other

as

hourly basis on the bank's secured website, the bank cannot ue the authentication cookies to track the welb pages visited by the conclude the user is interested in foreign currency investments

user and or

present foreign currency advertising without first obtaining consent.

quality, network link speed and bufifering parameters.261 These are commonly known as lash cookies", named after Adobe Flash hich is the most utilised platform for the delivery of Internet

image

altimedia content. These cookies should not endure for longer than the session and other additional information that are not strictly

multin

necessary for the playbacko

the media content should not be

cookie.262 included into the

to

5.253 There are, however, also authentication cookies that are used by e-mail providers and others that are stored for longer than a session; these are not exempted from the consent requirement according to the WP29 Opinion. The rationale for this is that users may not be

5.256

Fith, Ioad balancing cookies also fall within the exemption.35 The task of a load balancing cookie is to ensure that the web server requests from a specific user is always forwarded to the same server. Organisations often have a pool of machines to handle and process

web server requests. Load balancing enables the eicient allocation of resources in this regard. A load balancing gateway is used to process

immediately aware of the fact that closing the browser will not clear their authentication settings.25 Users may return to the website under the erroneous assumption that they are accessing anonymousy whereas, in fact, they are still logged in to the service. Consent can

be obtained for these kinds of persistent login cookies by using a 254

258 EU Article 29 Data Protection Working Party, WPI94, Opinion 04/2012 on Cookie Consent Exemption (adopted on 7 June 2012) at p 7. 259 EU Article 29 Data Protection Working Party, WP194, Opinion 4/2012

onCookie Consent Exemptionm (adopted on 7 June 2012) at p1.

EU Article 29 Data Protection Working Party, WP194, Opinion 04/401 0n Cookie Consent at p Exemption (adopted on 7 June 2012) 6. EU Article 29 Data Protection Working Party, WP194, Opinion U4/4u 2012

250 EU Article 29 Data Protection Working Party, WP194, Opimion U9/2012 onCookie Consent Exemption (adopted on 7June 2012) at p i.

Cookie Consent Exemplion (adopted on 7 June 2012) at pp o. /2012 256 EU Article 29 Data Protection Working Party, WP194, Oinion On Cookie Consent Exembtion (adopted on 7 June 2012) at p7 4 EU Article 29 Data Protection Working Party, WP194, Opinion.0/

onCookie Consent Exemption (adopted on 7June 2012) at p. i c l e 29 Data Protection Working Party, WP194, Opinion 04/2012 0n Cookie Consent Exemption (adopted on 7June 2012) at pi. 04/2012 29 Data Protection Working Party, WP194, Opinion

255

on

om Cookie Consent Exemption (adopted on 7June 2012) atp .

206

261

EU Article 29 Data Protection Working Party, WP194, Onion U704

c le Cookie Consent Exemption (adopted on 7June 2012) at po.

207

Consent Obligation

Data Protection in the Practical Context

web requests available

users

from

internal

and

machines

it

directs

the wch web

in the pool,261

request to one

of

5.257

a ser must be originating from specific user Often, all requests to maintain the the the consistency of p0ol s e r v e r in same to the cookice may be use load balancing a the processing. Thus, load balancer can corree! so that the server in the pool These are Session coOKIes that expire web server requests. fall within the exemption because the the session. They nave the dof sole o n e of the servers in the he pool an purpose of identifying c o m m u n i c a u o n over the the networt 26 thus to m.

forwarded

denify tthhee Trectly redirect -

necessary

carry out

by the WP29 Op on is the social type of coo last sharing ent he ent sha of a social enefit. lt should social network. be noted embers that the ogged-in nion only singled out the social plugin content sharing the these exemption; are 99 Opn within from which cookie king cial plug-in tracki requires the conscnt of the cookie discussed

the

k.

5.260

cookie. This

USCr

5.261

can

The sixth example

of

exempt

interface

C1ct.

saion

expliciuly

requested the service to remember a certain piece ofinformation

s store user's preference regarding an aspect of a :service across web pages and are not linked to other persistent identifiers such as a name. Some common examples of user intertace customisation

:

cookies re language preference cookies that are used to remember the lange

selected by a user on a multilingual website, as well as result disnia

preference cookies used in online search queries that will display a set number of results per page.267

they

are

plug-in

modules" that website

on the social network. These plug-ins the user's device in order to allow the social

connected

cookies

in

andtoaccess identify their members hen they interact with these plug

store

emption would only be available for those social network

netw

ins. This e x

example, by clicking on a button or ticking a box. These cookiee a

"social

suets to share content they like with their "friends" or those with

cookies.26 This type of cookie occurs where the user has

provide rovide

integrate into their websites, such as to allow social

integrate

users

whom

coOkies 1S user

networks

ocial Many o perators

networks

5.258

distinguished

WP20

cookie as

embers

loggea

in

who are logged in. This is so because only users who are to use and access social would expect to be able on

plug-ins

Those who are not logged in or who are not embers would not ha such an expectation. hus, for those who are ged in, the cookie is trictly necessary for a functionality explicitly the user and therefore falls within the exemption, 270

third party websites.

requested by 5.262

This type of cookie may be session cookies or have a lifespan of week or months, depending on their purpose, but since they are customised by the user, they are explicidly enabled by the user of an information

These types of cookies are session cookies because in order to serve their particular purpose, they only need to persist for as long as the user is logged in or as long as the browser is not closed. Social networks that wish to use cookies for a longer duration or for additional purposes should inform their users on the social network

5ociety service, and are strictly necessary in order for the provider of

platform itself and obtain the relevant consent.271

5.259

the service to provide that service, hence they fall within the would be for the customisation to exemption. However, the persist only for the duration of the session unless otherwise brought to norm

the attention of or

i)

requested by the user.288

Practical implementations of cookie consent in the European Union

5.263 264 265 200

267 268

EU Article 29 Data Protection

Working Party, WP194, Opinion 4/201 on Cookie Consent Exemption (adopted on 7June 2012) at p8. EU Article 29 Data Protection Working Party, WP194, Opinion 4/201 on Cookie Consent Exemption (adopted on 7June 2012) at p 8. EU Article 29 Data Protection Working Party, WP194, Opinion U 012 on Cookie Consent Exemption (adopted on 7 June 2012) at p 8.. 04/2012 EU Article 29 Data Protection Working Party, WP194, pnune o on Cookie Consent at on 7 Exemption (adopted ö.. 04/2012 EU Article 29 Data Protection Working June Party,2012) WP194, pOpinmon on

Cookie

Consent Exemption (adopted on 7June 208

2012) atp

o.

Complying with

the EU cookie law may seem daunting but it 15 not more may need to provide

particularly difficult. First, organisations

C0EU Article 29 Data Protection Working Party, WP194, Opiniom 4/2012 220ookie Consent Exemption (adopted on 7 June 2012) at pp Article 29 Data Protection Working Party, WP194, Onuon 04/2012

Cookie Consent Exemption (adopted on 7 June 2012) atp.. 271 U 04/2012 EU Article 29 WP194, Opinion Data

L0OR2

Prot

ction Working Party,

Consent Exemption (adopted on 7June 2012) at Pp 209

Data Prolection in the Practical Context

Consent Obligation

detailed information about the use of cookies in their

protection policies. Second, some form of website ban

personal tata or pop-p

notice that seeks and obtains a user's consent will be:required. will be would only need to be shown for users from the EU.

These

cific aand clear; and lastly, it must be n

i

Ist

must

be

specific

Google and Dagc annoying, b various

5.264

which is e

to install and set up. lt is a JavaScript-based kit that will automa to add a header banner available in 24 once the user has banner header disappears or re cookies used on the website. Included in the kit are the a tool to declare the cookies and provide a link to thc co

languages the web matically accepted bpage. The the

following,

noice

helps to

of cookies; a consent cookie to prevent prior storage remembe choice of the user across the website and a template for tha

he for the cookie

notice p a g e 272

uscrs

in the the

EU, the the cookie

ons functio,

5.267

ogleservices

of the cookies that

cookies more For organisations that extensively, they may d to that Google has had to emulate the types of implement as a result of requests by EU data protection authorities to practices in the EU.27" Google had been surreptütiously tracking users across websites and other applications over the years using cookies and other technologies before they were discovered. Google has, in July 2015, launched a new user consent policy for users of its AdSense. DoubleClick for Publishers and DoubleClick Ad The of cookie consent by Google may provide insight into what satisfactory compliance would entail under the EU General Data Protection Regulation 2016/679.275

the in the

Google uses

EU contain

ific disclosures specific

In the

a conscnt page that about how

obtaincd

provides users

GoOgle heir activities and toprocesses personal interact with the disclosures before they can procecd any further on the very "in your tace. The they a r e quite disclosures include website information onwhat what and how personal data i1s collected and what kind ha lot of It requires data.

users

to

pause

-

personal data collected will be put to. It provides with of the cookies and show ifthey disagree angeanytheaspect the uSCrs where they can cha settings and how to change the

choices

olso settings. It als

5.265

revocal

notices appear on almost eed click click throu. through them; some at cxplicit and specific consent may find this can be

necd to to

forthe

The European Commission ofters a "cookie consent ki" , e

page; a JavaScript API with methods and functions that

serviccs

provides users with

information

on

how

they can delete

their accounts.

use

consent

change

Exchange products

implementation

5.268

example of an explicit disclosure that is shown to EU users reads: This site uses cookies from Google to deliver its services, to personalise ads and to analyse trafic. Information about your use of this site is shared with Google. By using this site, you agree to its use of cookies." This statement is then followed by two buttons which users can click on. One is "Leam More" and the other is "Got it".

.266 The kind of consent required has three main elements: it must be obtained prior to any collection, that is, before cookies can be utilised; 272

European Commission,

273

en.hun#section_4> (accessed 11 July 2016). Google, "Introducing a new user consent policy" .26. h e Personal Data Protection Act (revised on 15 July 2016) para

273

Data

Access and Coreclion Obligations

Prolection in the Practical Context

consent. This would also not be applicable in in tho the data in question is embodied The

personal

which is not publicly available as such, but

Information,

within the ample under th. CC

of presed finsuy

of

Bey

data was reco stSoougs ody of

does not make the CCTV personal data publicly available. If a person was

footage containn orded the shopping centre that day, the personal data perceived cally at the "live" and could arguably be in senseswould be public

the

area

o fm a s k i n g a

h ec o s t

such as video footage, it is embodied in

that form and

once

aterial formm the

data cannot be said to be publicly available unless the available for general viewing, such as i was

Pesonal

uploaded onto aideopubliclywas

accessible website.

.28 As neither of the two circumstances outlined by the Commise applicable, it is submitted that the better view is that such fonta before

they

can

be revealed

to

esting

hdtind

be

noted,

Shou hould

discussed

access

however,

burden

onable

to

the

an

or

organisation

request

on

to

will he

provide

access would be

disproportionate

ual's interest, and

to

disproportionate

the organisation could decline to

p r o v i d ea c c e s s ,

requesting individuals for access to

security camera ide. the access request is for a short period of time deo footage, suchas one or two minutes, the video footage will likely show the faces and of as other individuals well. This would trigger the bodies prohibition in section 21(3) (c) as it reveals personal data about another individual.2 The question then becomes whether it is possible to mask or conceal the faces and bodies of all the other people in the footage Technically, this would be possible, but external technical assistance may be needed to do this, and it is unclear the extent to which

access

a

the Act places an obligation on organisations to acquire such skill sets the tools required to achieve such results. The Commission has stated that the purpose of the fee is to allow organisations to recover or

the incremental costs of responding to the access request

8.31

provides that organisations are not required to accede request in respect of the matters specified in the although organisations may do so if they so wish.49 Fith Schedule18 alt ifaganisations take advantage of the exceptions and do not provide gan data in response to an access request, the access to personal Commission has advised that where appropriate, organisations should, as good practice, inform the individual of the relevant reason(s), so that the individual is aware of and understands the organisation's reason (s) for its decision".50 ction 21(2)

Sectios 10

an

access

It also

expressed the view that organisations are required to make the necessary arrangements to provide for standard types of access requests, but that costs incurred in capital purchases such as the purchase of new equipment in order to provide access to the requested personal data should not be transferred to individuals." Given that the

Ministry of Information, Communications and the Arts, Public Consulation ssued by Ministry of Information, Communications and the Ars: Proposed PersonalData Protection Bill (19 March 2012) at para 2.139. Personal Data Protection Regulations 2014 (S 362/2014) reg 7. Personal Data Protection Act 2012 (Act 26 of 2012) 5

Fifth Sched,

para (1) () (ii).

A4

required

providing

or

charge.

exceptions which

is not

or

unreasona

coRSidered

even if

42 43

such costs to the

allowed to

the t.17 Thus, if the time and cost of masking other is video footag for great, the example, if the video individuals in period than a few a much longer minutes, it may be for is to the organisatior

Exceptions to granting a

onc of the

organisatio expense of

individual's i n t e r c s t , 17

8.29

considering

pass

through the fee it is

howev

is that

a c e s s i ft h e

are

from

probably

Owner

v i d u a lr e q u e s t i n g

loolag

otage security cameras need to have the images of other individuale

When

camera

setuniy

through the

public. Hor personal data is no longer "live" but captured into:a

can a icw na sicw ld appear that incharge such a reasonable fee on a sis, r t vidco circumstance where footage is unlikely to be great, the

at rccovey

Shopping Centre ABC. Just because the personal data in a

Communications and the Arts ("MICA")

that organisatio

o f

Personal Data Protection Act 2012 (Act 26 of 2012) s21(3)(9. Personal Data Protection Commission, Advisory Guidelines on Key Conepis in the Personal Data Protection Act (revised on 15 July 2016) at para Personal Data Protection Commission, Advisory Guidelines on l3.i. 27n the Personal Data Protection Act (revised on 15 July 2016) at para

Ke nG

274

Personal Data Protection Act 2012 (Act 26 of 2012) s 21(2). Fersonal Data Protection Commission, Advisory Guidelines on Kiy oncepis t h e Personal Data Protection Act (revised on 15 July 2016) at para l5.23 resonal Data Protection Commission, Advisory Guidelines on Ky tndys e 2016) at para on Protection Act

PersonalData

(revised

275

15 July

i.

Data

Protection in the Practical Context

Access and Comectiom Obligation

8.32

organisation

declines to provide access to personal . request, the Commission has opined that the a the personal data in question for a 30 calendar days after rejecting the access mi request.31 This is to individual to seek a review to the Commission of This all w the the decision.2 If such an application of review is made to the sation's and if the Commission issues a Notice of Review Annl:

If

an

is s u l j e c tt o to

t

organisationdata under

mission,

organisation, the organisation should preserve the withheldion to the

data until the review by the Commission is concluded and an the individual to apply for reconsideration and appeal is exh2 For the avoidance of doubt, an organisatimay face hausted action should the review of the Commission find that there valid grounds upon which the personal data was withheld f 23 individual.54 he

personal right of

Korcement

8.33 The Commission has averred that "as good practice, the organieat'. should keep a record of all access requests received and

documenting clearly

whether the

rejected" 55

8.34 The

requested

access was

a prosecution and

isrclatea

Osccution h a v e

easonable period,hould keep

ninimaly

legal privilege;*

related

an

to

s

appcals

in

the

of

the

lated to the

proceedings and the proceedings mercial information that

been completed:58

confidential

opini

position of

or

investigat

have not

and d w o u l dr e v c a l

the proceedings

not been completed7

reasonable

a

organisation:59

person,

could,

harm the

competitive

etsonal data of the beneficiaries of a lely for the purpose ofaadministering the trust:0private trust kept eot by an arbitral institution rsonal data or a mediation 0 r e Ssolely for the purposes of arbitration or mediatio the arbitral by institution or proceedings administered

mediation

Centre

is personal data collec

he in

conduct of

appointed

to

lated

(th) i s r e l a t

act;

to

a

or created by a mediator or arbitrator

mediati.

or

any examinatio

or

arbitration for which he

conducted by

institution, examination scripts and, prior examination results, examination results.3

processod provided.

to

an

was

education

the release of

8.36

some of the key following exceptions and, like the consent from discussed in chapter 5, the exemptions reader is encouraged to closely examine each of the items listed in the Fifth Schedule.

highlights

ald be he noted here that since the Act is subject to other laws, the h should provisions

of the personal data protection regime do not affect

Hicovery obligations under other laws that the parties to a legal

dispute may have.

8.35

One group of exceptions in the Fifth Schedule covers situations where the personal data or information is in some ways confidentúial and should not therefore be revealed. These include situations where the information:

51 52

Personal Data Protection Commission, Advisory Guidelines on Key Conce in the Personal Data Protection Act (revised on 15 July 2016) at para Personal Data Protection Commission, Advisory Gauidelines on Key Concepis n the Personal Data Protection Act (revised on 15 July 2016) at para lb.3

l5.3

53

Personal Data Protection Commission, Advisory Guidelines on Key Lontye

54

Personal Data Protection Commission, Advisory Gauidelines on Key ona

55

Personal Data Protection Commission, Advisory Guidelines on he)

in the Personal Data Protection Act (revised on 15 July 2016) at para l3.0

in the Personal Data Prolection Act (revised on 15 July 2016) atpara dnaepts t

17n the Personal Data Protection Act (revised on 15July 2016) at para 10

276

S6 Personal Data Protection Act 2012 (Act 26 of 2012) Fifth Sched,

para (1) (). 57 Personal Data Protection Act 2012 (Act para (1) (e). 8 Personal Data Protection Act 2012 (Act para (1) (h). Personal Data Protection Act 2012 (Act para (1) (g). 0Personal Data Protection Act 2012 (Act para (1) (). Data Protection Act 2012 (Act Personal para (1) (d).

62

Fersonal Data para(1)(i).

26 of 2012) Fifth Sched, 26 of 2012) Fifth Sched, 26 of 2012)

Fifth Sched,

26 of 2012)

Fih Sched,

26 of 2012) Fifth Sched,

Protection Act 2012 (Act 26 of 2012) Fifth Sched,

ersonal Data Protection Act 2012 (Act 26 of 2012) Fifth Sched, para (1) (6). Daa Dal Data Protection Act 2012 (Act 26 of 2012) s 4(6); Personal in the Fersonau n Commission, Advisory Guidelines on Key Concepts Da Dala Protection Act (revised on 15 July 2016) at para l.0.

277

Access and orrection Obligatiom Data Protection in the Practical

Context 's background

t h e employer's

8.37 The remaining exceptions contained in the Fifth fh Schedule wide variety of situations. First, opinion data kept solel purposes are exempt irom access.

only

Lerm is not to or about individuals made in the context of evaluative broadness of the definition of "evaluative purposes" in sect: Ses. The discussed in chapter 5 on Consent Obligation and it wOuld was the exception from access would allow those

judgments opinig inions appear that making ecisions

itio

, in

an

individual

or

to

remove

individual, an individhto

employment. During the term ot employment, the reDorte from opinions guiding processes such as annual review and promarand processes, grievances, misconduct investigations and decisions afee

dle

t h eF i f t h S c h e d u l e

pupo

gricvances

edin

and

section

1 o a

can also be triggered to misconduct

2(1)

detined

of

the Act to Act to

eement

breach

encompas breaches of

so

in incdude

there

exceptions mentioned

avoid auons,

are

employment

providin dingacce ess. "investigation" is an investigation rela g no doubts

contract.

that it would

Hence,

while

oing and the appeal procesS has not yet been access can also also be denied under paragraph (1)(h) of

ivesigation exvhausted,

to

from

to the ception for opinion data kept solely for evaluative mployment context, the other

for

review of

8.38 This evalluative purposes exception would be useful for em in their deliberations on whether to hire an ployers promotion

printouts

cover

It should ho

evaluative purposes to be able to do so freely without fear of a their decisions or decision making processes later on.

as

ites.

ial media websites,

"opinion data" is not required o be provided but thitha defined in the Act. It would presumably1

ecks, such

u i l so t t h e

the investigation has also not be possible. ents may as opinion data kept

F i t hS c h e d u l e .

thedocumcnts

night be classified

nat

urpose of the

a k e nf r o m

ied,

the

access to

many Apart from informatior solely for the evaluative

investigation, if evidence or information had been

her individuals

such as employees or customers, and it 11s from the contents that the information is from those

Nould b eo b v i o u s

individuals, then access to that information can be denied in section 21 (3) (d), that is, it would lead to ound set out the af identification o f thOse individuals, even it their names have been

particular

employees individually, such as job transters, can be denied accece on the basis that they comprise opinion data solely fo evaluative purposes. For example, if an employee is posted to another division or another job role, this may have been the result of an evaluation of the employee's ability to pertorm the task required, I however, the reason for the transfer is policy-based such as the closure of a division in the organisation and not unique to the particular employee, then the employee would be able to access such information, but as a matter of best practice, most employers would, as a matter of course, inform their employees of the policy reasons in such instances.

ofthe investigating panel may also be denied because it is thereportbe considered opinion data kept solely for evaluative hkely to access to iniormation on the identity of the OuDOseS. Finally, embers of the investigation panel can also be denied based on ecion 21(3) (d). It would appear that the only sure information the

8.39 The evaluative purposes exception also means that those individuals who were unsuccessful in applying for employment positions or

841 Secondly, an organisation may reject a request for access if it would unreasonably interfere with the operations of the organisation because of the repetitious or systematic nature of the requests.5 The obvious cxample of this may be where an individual makes the same request on

employees

admission into educational institutions cannot demand to see the opinions formed that led to their unsuccessful applications. f an

the information or documents. Furthermore, access to

cmployee would be able to access is the result of the investigation, which one would hope would be made available in any event.

a weekly or fortnightly basis and there have been no changes and

employer still holds the personal data of applicants who were unsuccessful and these do not constitute opinion data, the employer

Cenls or incidents

would, however, need to provide details of these in response to an

personal data.

that would

have

changed or increased the

ganisation's holdings or use or disclosure of the individualls

access request. Some of such personal data or information may be the

65

Personal Data Protection Act 2012

para (1) (a).

(Act 26 of 2012) Fifth Schea,

66

Pers

ersonal Data Protection Act 2012 (Act 26 of 2012) Fifth Sched,

para (1) () ().

278

279

Dala

Protection in

the Practical

Access

Context

8.42

Thirdly, access

mentioned, an organisatic where the burden or expense as

further quire.

may also refuse of

the :access

neca

the

on i

Dcan cant

purposes of the

1

quest fromn the

hay

provi

o he given ahoa footage from security cameras. In the same vein, if an to access all video footage of him or request indivic her over the past one year, this would be regarded as both unrcasonab) organisation and disproportionate to the ole to the the ime and effort that would have to be interests to s due ta individual from the footage and to conceal expended the personal ify the other individuals. of all

cORRECTION OBLIGATION

concerwasnintgo vidual

individual's

request.

making

disproportionate would be period of the

8.43

TheCorrection on

in ections

Obligation provides

that is due

to

a

right

held by

data the personal

error

or

or

for

individuals to

under the

request

controlof

omission."Organisations

an

not to correct the data.3 If an oganisation decide ides against correction, then the personal data should the correction that was requested but not made4 shoul correct the he organisation personal data as soon as and send the correctecd personal data to acticable every other the the personal data was to w h i c h disclosed by the Oganisation before one year the date the correction on within was made. if the other organisation does not need the corrected or business data for any legal purpose, then the first persona. does not need to do this.7 With the consent of the idual, an organisation ich is not a credit bureau can also send the corrected personal lata only to specific organisations to which the rsonal data was disclose by the organisation within a year before

grounds,

choose

b ea n n o t a t c

Fourthly, organisations information in response

do not need to to

an

access

provide

request

if the

rWIse, Oltherwn

personal

da.

data

information or data and information does personal is no longer required to be tion t kept by an organisation,informatir this excep provides an incentive for the to

not exist or cannot be found." For

organisation

longer than is necessary. For cxample, applicants who have been unsuccesstul in for

ception retain persanal. for the personal al data data o their not

job business or legal reasons to retain such applications i data employers should delete such personal data as soon personal as possible eliminate the burden of having to meet the Access are no

Obligation arisin from such personal data. The deletion such personal data of will also assist the organisation to minimise their in the event of liability breaches in personal data security, as will be discussed in chapter 9.

8.44

The last

two

requests

are

exceptions that organisations may rely on to deny access where the information is trivial" or where the request is otherwise frivolous or vexatious." It may be that in order to determine if a request is frivolous or vexatious, in some situations, organisations 67

Personal Data Protection Act 2012 (Act 26 of 2012) Fifth Sched,

68

Personal Data Protection Act 2012 (Act 26 of 2012) s 4(6); Personal Data Protection Commission, Advisory Guidelines on Key Concepts in the Parsona Data Protection Act (revised on 15 July 2016) at para 15.24.

69

Correction Obliga ga lions

c n to

unreasonable to the organisation or providing individual's interests. An example of this was

there

and

para (1) () (i).

Personal Data Protection Act 2012

para (1) () (iii). 70

Personal

71

Personal Data Protection Act 2012

Data Protection Act 2012

para (1)()(iv). para (1)() (V).

280

(Act 26 of 2012) Fifth Sched, Sched, (Act 26 of 2012) Fifth Fifth Sched, (Act 26 of 2012)

oganisation

However,

oganisation

he date the

correction

was

made.77

846 When the recipient organisation receives the notice of a correction of peronal data, it also has the same choice as the first organisation as to iether to correct its records." If it does not make the corrections, it mIst also annotate the personal data in its possession or under its Control with the correction that was requested but not made7

847 There are numerous exceptions to the Correction Obligation. The first

s contained in section 22(6), which exempts organisations from having b corect or otherwise alter an opinion, including a professional Or an expert opinion. The remaining exceptions are expressed in Personal Data Protection Act 2012 (Act 26 of 2012) s 22(1). 2ersonal Data Protection Act 2012 (Act 26 of2012) ss 22(2) and 225). ersonal Data Protection Act 2012 (Act 26 of 2012) s 22(5). TSOnal Data Protection Act 2012 (Act 26 of 2012) s 22(2)(a).

ersonal Data Protection Act 2012 (Act 26 of 2012) s 22(2)(0). ersonal Data Protection Act 2012 (Act 26 of 2012) s 22(3). 3onal Data Protection Act 2012 (Act 26 of 2012) s 22(4). rersonal Data Protection Act 2012 (Act 26 of 2012) s 22(). 281

Data Protection in the

Access ana

scction 22(7) and listed in the Sixth Schedule 0 Th subset of the exceptions which are found in the re a sma the Fifth exempting organisations from the Access Scl Sixth Schedule states that the Correction does not the following. app

Obligation Obligation.SchedulThee

(a) (6)

opinion data kept solely for an evaluative purpose: any examination conducted by an education institution scripts and, prior to the release of examination ion,

results,

results;

personal«data

of the beneficiaries of

()

the

(d)

the purpose of administering the trust; personal data kept by an arbitral institution

(e)

a

for the purposes of arbitratio administered by the arbitral institution or

solely

rection Obligations

Practical Context

priva or

trust a

apply to

neous, false

the uture, tne

hat

e

as

n

in

if it

for

reeauences

negauve

Con t context,

howe..CCtn

p o r T e c u o no t h e r

fect the

be

correct

not

xamination

unnecessary

demed erroneous l c n g t h

mediation on centre mediation centre; oceedings a document related to a prosecution it all proceedings related to the prosecution have not been completed. or

«

8.48 The procedural matters in relation to a correction request are t out in the Regulations and they are the same as for the access quest The only differences are that under regulation 5,3 the irame for a response for a correction request is "as soon as so

practicable under regulation 7(4),*" an organisation cannot charge a fee under and the Correction Obligation.

since

of

"ength

of

the

For

to

seven

years. The former data because

i

example, in the employee, Sarah, who with her former requests employment employer of be r ,

years to change the

Sarah

Sarah is is no

Tvice

on

made

If the annotati

kept solely f

mediss

ce

0 ngployer;, unnce

incomplete perso data

and

accurate. This might lead individu

truce

o faO former

consider

ddoes

examination

was

longer

record to

personal

Sarah's be

service requested

itis

employee, and the unchanged at seven personal data was simply an

lett

is

changed but changes were

stating

the

actual number of without made" nething which an organisation seems to be permitted to do being

specific

Sarah was a loyal employee for seven a future the potential employer contacts the lost. be may employer to conduc background checks on Sarah, the ycars former employer will not indicate that Sarah held by the employee for seven years but was an uncommitted a loyal

years, s o

section

22(5),

under

the fact ithat

.

inlornation

had

been

who only stayed with her former employer for seyven

eremployee

months.

851

situations, the power given

In some situati

to an

organisation

to not correct

the advantage of the individual, although work nal data may to be uncertain. If an organisation holds m o r e likely are the effects that are inaccurate or incomplete, then in individuals on nersonal data the data set may be of little or less use to breach, a of security the event accumulated the utilise personal data for nefarious those who wish to this cannot be a truism to be relied upon as However, purposes. will know how to combine data sets intelligent personal data thieves that the personal data is outdated, determine to and will be able to create an even or wrong but will, nevertheless, be used incomplete of the individual with the historical or erroneous faller to

8.49 From the

foregoing, a number of points can be made about the Obligation. First, the obligation to correct is onlylimitedto errors and omissions, and thus constitute relatively narrow grounds on

Correction

which corrections can be requested. 8.50

Secondly, the Correction Obligation is by no means a strict obligation

to correct when the organisation has the power to decide thata correction should not be made, albeit on reasonable grounds, This carries both positive and negative repercussions. One negative etfect is that erroneous, false or incomplete personal data can continue to be held about an individual. Although an annotation of the correction if this is not done properly, it may be possible is

requested 80 81 82

83 84

required,

s 22(7) and Personal Data Protection Act 2012 (Act 26 of 2012) Sixth Sched. Sixth Sched, Personal Data Protection Act 2012 (Act 26 of 2012)

paras 1(a)-1(e). Personal Data Protection Regulations 2014 (S 362/2014) reg 2. Personal Data Protection Regulations 2014 (S 362/2014) reg. reg 7(4) Personal Data Protection Regulations 2014 (S 362/2014)

282

profile

personal data, whichever

case

it may be.

8.52 The third point to be made about the Correction Obigation goes to

the heart of the obligation itself. If personal data is in error the Complete and the individual has requested correction, in cation ought to be made unless it is trivial or insignificant,

or

ch case the individual would probably not have requested tne

oection in the first place. The way the Correction Obligation5 on the gned is problematic. posing a requirement By

283

Data

organisati

to

organisation*"

or

Prolection

in the

Access and Coreclion Obligations

Practical Context

send the corrected a subset thereof,*

person onal data toto to

which

it has personal data in the past one ycar, may create This means that too informed, some of which may not need many oroa

over-inclusiveness.

such as where the need for them to

create the problemoher

disclosed the

the corrected ations may the corrected persoy

longer exists, for example, if the company and the delivery has been completed or provides service for warranty purposes and the the expired.37 no

well as opinion data vould appear that the main

or Cxperto p i n i o n s ,

every

cation could be h i c hr e c t i f i c

since

personal da

organisationif thewasersonal data elivery

i t is

her

Hence,

th.

rsonal data is

or

his

given be

uhat

requested are

individual who has

at

least

without

kept solcly for

bulk of evaluative thosce of a Tsonal data for

factual nature. vested interest to

error or

this minimum ;

mount

ensure omission, individuals

of

control

should

over

personal data.

their

a

ganisation warranty orperiod

FUROPEAN UNION POSITION

has

8.53 To counter this over-inclusiveness problem, the Legislature limiter such that if the other organisation does not need the da personal data for any legal or busines requirement to send the corrected purpose, then there secied organisations. This is a convoluted way of personal data to thohose the structiring Obligation and requires more resources thar Correctic is necessary, bothi its implementation and in the decision-making process of whethae make the corrections and to ther to whom the corrected personal data be sent. For some they may find it easier to sho organisations, comply simply forwarding the corrected personal data to the other organisations it has disclosed the persornal data to in theall the past one v than to make an assessment of whether the year other

organisations need corrected personal data. Untortunately, this would individual's corrected personal data is being passed mean that an around to maaw organisations unnecessarily since they have no need of the corecte

European 855

("EU") law providesacomprehensive

Union ("EU'")

system rights In particular, the EU General Data ta subject. Protection has given individuals 2016/679 numerous new rights with corresponding on ourdens ed of

Regulation

organisations which are requirements quite detailed to be

accompanied

data. Some of the sCussion below is only intende

process p e r s o n a l

and

an

introduction to the

materials.

Right of access

The Directive

the

8.56

personal

are the EU Data Protection Directive 95/46/EC and is further trenothened in the EU General Data Protection Regulation 2016/679. stren Arnicle 12 of the EU Data Protection Directive 95/46/EC sets out the

data. This adds

to

the

availability,

individuals' personal data, thereby accessibility and increasing secuniy risks for the individuals and, ultimately, the organisations as well, as their computing systems would be a rich target for attackers.

accumulation

of

8.54 In terms of good data protection practices that foster personal data security, the individual should simply have been given the ability to have the personal data rectified, and to specify which organisations the corrected personal data should also be sent to as deemed appropriate. This would not give too much power to the individual over the personal data the organisation holds as the exceptions for the

Correction Obligation exclude opinions, whether they are profesional

The right of access for the individual has been enshrined in EU law

clements of the data subjects right of access. To be clear, there are cxceptions to the right of access that are enumerated in Article 13 and which are also applicable to other rights, but these exceptions are selfFlimiting. So, for example, Article 13(1) allows exceptions where it snecessary to safeguard national security; defence; public security; the

8

Personal Data Protection Act 2012 (Act 26 of 2012) s 22(6). Personal Data Protection Act 2012 (Act 26 of 2012) Sixth Sched, para 1 (a).

22(7) and

Regulation (EU) 2016/679 of the European Parliament and of the LOuncil of 27 April 2016 on the protection of natural persons witn egard to the processing of personal data and on the free movement or

Such data, and repealing Directive 95/46/EC (General Data Protection 85 86 87

Personal Data Protection Act 2012 (Act 26 of 2012) s 22(2)(6). Personal Data Protection Act 2012 (Act 26 of 2012)

s22(3).

Personal Data Protection Commission, Advisory Guidelines on Kry

17 the Personal Data Protection Act (revised on 15July 2016) at para l»s4

284

egulation) ("EU General Data Protection Regulaion 2016/679). 94ve95/46/EC of the European Parliament and of the Council of ctober 1995 on the protection of individuals with regara to ue proce of personal data and on the free movement of such aaa

93OJL 281/31 ("EU Data Protection Directive 95/46/ EAU 285

Data Protection in the Practical

Access and Comectiom Obligations

Contex!

prevention, investigation,

detection and prosecution of ethics for regulated financial interest of a

of breaches

8.57 Article 12(a) of the EU Data Protection Directive member states to guarantee every data a constraint and at reasonable intervals to

fessiocrins,minanal

(b) (c)

(d)

(e)

the purposes of the processing; the categories of data concerned; the recipients or categoies ot

disclosed;

data without and o

personal data it following-98

recipients

to

whom

the personal data undergoing processing and any available intormation as to the provided in source of the and

in the case of automated decisions, the

automatic processing of personal data.

the

data

s

ntelligible person- fom

logic involved

example, to saisfy Article 12(a), organisations cannot just cursorily inform the data subject that it is processing his or her name, address and date of

birth without providing the specifics of what name they hold for her, her actual address and her actual date of birth. Thus, this means that an organisation would have to tell an individual specifically, for example, that: "The name on file we have for you is Mary Magdalene, the address in our records for you is 3 Calilee Rd, Magdala, we do not have your date of birth in our records." 8.59 The other information specified in Article 12(a) such as the source of

available, but

the information would also need to be provided where data an organisation must not destroy information about the source of in order to be exempt from disclosing it, nor should it avoid keeping documentation on the source of the personal data. This provision aimed at maintaining fairness and accountability, the two principi

EU Data Protection Directive 95/46/EC, Arts 13(1) (a)-13(1)(g) EU Data Protection Directive 95/46/EC, Art 12(a).

286

the

need

to

s o u r

the on

provide

aled iafornmation

.ndergoes any processing

as well as the

processes explained in intelligible form be to the or legal jargon should end, this be avoided adeect. To where that is the on information being held by eviatu0 be explained to the data subject. Finally, where must

and

an

technical

s,

nced

decisions

aated de

he

ulomated need pocess

Kaluate

The

the

whether

have

ugem

general logic of the decision

with

the

criteria utilised

to

subject,

of the EU the

right

to

Data Protection Directive 95/46/EC access information extends to the past and

pean

arose

from

into

the

explained, along

past. This issue was Union ("CJEU") in

dear

howlong

en made,

b e e e d

5

data

vordin,

an

to the

ab

ganisatuon,

a

practical

terms, Article 12(a) requires the data to be informed about the categories of data processed as wellsubjects as about the actual content of the personal data. For

92 93

nat

the

wethouders van

in ththe

8.58 In

In

stated

subject has a right to obtain confirmation from ular, very data om the organisation whether or not personal data is being on as to process what is and information the

(a)

Sing

SCd

ersonaldata t h a t

personal other information about their personal data. In particula

concerning

Commission has explicitly

above.

and so on

subject right95/46/EC of access Tequires their

processing

be noted that the organisations do not Singapore, the personal data. source of should

It

offences, of important economic or member e EU, including monetary, budgetary and axatior ation matters or of the or

a

examin by the Court of Justice 2009 in the case of College van Rotterdam v MEE Rijkeboes ("Rijkeboer")

dispute

Rijkeboer and the College, College partially refused to provide ata relating to him in the past. Rijkeboer had between

authority, where the municipal with personal

ikeboer uested that the College inform him of all circumstances in which him had been disclosed to third parties in the two years relating to tata neceding his request. In response, the College provided Rijkeboer th the details of the recipients to whom personal data had been isdlosed, but only for the period of one year preceding his request, in accordance with national legislation. The College claimed that personal data dating back more than one year prior to his request had been, according to Dutch law, automatically erased.7 862 The issue in the CJEU was whether the national legislation, which set the time limit of one year, was compatible with Article 12(a). The

gEU outined the role of Article 12 and stated that the right of access

opersonal data is necessary to enable

the data subject to exercise the gIt to rectify, erase or block his personal data or to notify this to

"esonal Data Protection Commission, Advisory Gruidelines on KeyConaepts B Persomal Data Protection Act (revised on 15 July 2016) at para 15.7.

6U Data Protection Directive 95/46/EC, Recital 41. se C-553/07 (7 May 2009) ECLI:EU:C:2009:293.

steT en wethouders van Rotterdam C553/07 ((7 N 3/07 May 2009) ECLI:EU:C:2009:293 at |25).

v

287

MEE

Rijkeboer Case

Data

parties

third

which

Access and Corectiom

Protection in the Praclical Context

arc

contained in Articles 12(h the CJEU also and stressed that t is also necessary to enable the data to cxercio subject object to the processing of personal data his rigt in was of the view that for a data to be subject able of these sets of rights effectively, access to the personal "must of necessity relate to the past",100 ata access the data would not be in a position to exercise his personal data rectified, erased or blocked or

respectively. Secondly,

12

contained

CIEU

effectively

and obtain

acces

Article 14 to. The

exercise both

otherwise, to

bring 10i legal compensation for the damage suffered.

proceeri edings

the

length of time or subject with the

the scope, the CJEU burden of the organisation s personal data. It noted that in other parts of of the EU Data Prote Directive 95/46/EC, account may be taken of otecion the disproportion nature of burdens, and concluded that a

balan. balanced the to stOTe

right of the data

subiject's personal

disproportionate

data for

effort required

a

of

legal obligation to keen. long period of time would hethe

organisations.2

legislation of member states should strike interests of data subjects and the

a

It said

fair balance

organisations holding the personal data.0 The CEU said:101

or

that

ricted ea

anduly ataonabout

een t e processing esSing

limiting the storage of information on the recipients or categories of recipient of personal data and on the content of the data disclosed to a period of one year and correspondingly limiting access to that information. Rules

while basic data is stored for a much longer period, do not constitute a fair balance of the interest and obligation at issue, unless it can be shown that longer storage of that information would constitute an excessive burden on the controller. It is, however, for national courts to make the

determinations necessary.

personal data may not be rights of both parties, rtunity to obtain the personal data. oftheir

the

processing

- New European Union law

R i g h to fa c c e s s -

has

ght of acce

EU

in

the

been further

strengthened

ation 2016/679.

EU

Data

Protection

in the EU In addition to the

General

provisions

Directive 95/46/EC,

the EU

Protection Regulation 2016/679 adds a Article 156 sets out the and clarifies some rights ss by the data subject and it adds that a data subject h ofextra present

obligations.

General

1o

obtain,

where

data will personal

a

the

accCSS one's

acce

timne

The. Data P r o t e c t i o n

Regarding

to

To balano the time limits. restrictcd by a reasonable b j e c t s m u s t a l s o be given

this regara,

bject ight toSulhave

8.63

data

the right

Obligation

ermine

that

the

possible,

8.66 fa order

envisaged period

be stored or, if not

neriod16

and the

right

supervisorya u t h o r i t y . 107

expressly

possible,

of

couple

for which the

the criteria used to

lodging a complaint with

a

give organisauons some flexibility in meeting the es requirement, Recital 63 of the EU General Data Protection that where possible, the controller Reaulation 2016/679 provides remote access to a secure system which to able be provide tould to

wOuld provide the data subject with direct access to his or her personal

daa. However, this should not result in a refusal by the organisation to 108 provide all information to the data subject. 8.67

98 99

wethouders van Rotterdam v MEE Rijkeboer Case C-553/07 (7 May 2009) ECLI:EU:C:2009:293 at [51].

College van burgemeester en

College

van

College

van

burgemeester

en

burgemeester

en

wethouders

van

Rotterdam

v

MEE

C-553/07 (7 May 2009) ECLI:EU:C:2009:293 at [51]-[52]. T00

wethouders

van

Rotterdam

v

MEE

Rijkeboer \ase

MEE

Rkeboer Lase

C553/07 (7 May 2009) ECLI:EU:C:2009:293 at [54]. Rotterdam

101

Rijkeboer Case

College van burgemester en wethouders van C553/07 (7 May 2009) ECLI:EU:C:2009:293 at [54]. 102 Colege van burgemeester en wethouders van Rotterdam v MEB KIRRD0r C-553/07 (7 May 2009) ECLI:EU:C:2009:293 at [62] 103 Colege van burgemeester en wethouders van Rotterdam v MEE KyJReD0 G-553/07 (7 May 2009) ECLI:EU:C:2009:293 at [64]. v MBE RiyReD0 van Rotterdam van burgemeester en wethouders 0LolUEge C-553/07 (7 May 2009) ECLI:EU:C:2009:293 at [70]. 288

v

ase

ase

Ihe organisation should also use all reasonable measures to verify the of a data subject who requests access, especially in the context services and online identifiers. Lastly, possibly with the

dentity aonine hgpadboer case mentioned above in mind, organisations should not cain personal data for the sole purpose of being able to react to potental access requests.

106General Data Protection Regulation 2016/679, Art 15. 07 neral Data Protection Regulation 2016/679, Art 15(1)(a). General Data Protection Regulation 2016/679, Art 1o EU General 09 EU Genera Data 2016/679,

ata

Protection Regulation Recital o Protection Regulation 2016/679, Recital 64. 289

Access and Corectom

Data Protection in the

Article 12 (5) stipulates that the information should he of charge unless the requess from a data subject are provi free unfounded or excessive, in particular because of their character.0 In such cases, a reasonable fee takino int administrative costs of providing the nformation can be account the the organisation may refuse to act on the request. This departure from the position in Singapore and complianco to be costly for organisations.

mani fesdy repeitve

narged or te a compliance mayquiprove

eciiat

8.70 onerous to

right requirements in the EU laws are quite when compared with the Singapore legislati

EU

Protection

Directive 95/46/EC

povnles t n a ld a t a

relating

accuracy

ta

the

piUcula lar

p o c e s s i n g1 . 4

The

les

ightforward exa

a

ired

to

naguired sted.

eland sabject,

name

is

of

rectification

may include where the

where here has been a of nuumber. For some rectilication, evidence may be

change

correct or

antiate the alleged inaccuracy and the changes dentiary proof required must be at an appropriate

substantiat

The evide

must

c an unreasonable burden of proof on the data

placec

not

thereby precludi

data subjects from having their data

may be demanding a birth certificate as example An where the birth certificate may have been cified. proof form of in a w a r . the only fire o r of

destroyed

in a

acccss

comply with

requirements. Organisations that find themselves falling within

the

jurisdiction of the EU laws would need to ensure that their personsl data practices are fully compliant well beforehand.

3.

Data

subjects "must be able to cxerCise the right offurther access him which are being processed, in order to ver hi to o off the data and the lawfulness of racy the

41 o f the

p e l i n go

8.69 As with all data subject rights, the information should he n the data subject without undue delay and within one month ovided of the request. That period may be extend by two further mon where necessary, taking into account the complexity and numh er of the request.

strengthened

-

Practical Context

8.68

The

Obligalio

Right to rectification The Directive

EU Data Protection Directive 95/46/EC also gives (b) of the data erased. This is often due hiects the right to have personal basis for the collection or processing of o the lack of legitimate c o n s e n t has been withdrawn, or where as where al data, such is n o longer needed for the purpose of the data he personal counter sucth a request for erasure, organisations rnlection. Thus, to the legitimacy of the processing,15 il need to show

8.71

As mentioned above in the Rijkeboer case,

the CJEU had held

that one of the reasons for the ight of access was so that data subjects could exercise their right to, amongst others, have their incorrect personal data rectified. Article 12(b) of the EU Data Protection Directive 95/46/EC provides that every data subject has the right to

obtain from the organisation, "as appropriate the recification, erasure the blocking of data the processing of which does not comply with or the of because incomplete in this of Directive, particular provisions

or

inaccurate nature of the data".13

875

data subjects the right to have personal Lastly, Article 12(b) also gives data the

that personal therefore be used for would result in further processing, especially if the processing decisions being made concerning the data subject, in particular, deleted in such a Degative decisions. The personal data will not be fair of processing, the with the Kenario but in accordance principle

da blocked. This was

incorrect

or

might

be due to

allegations

inaccurate and should

not

personal data, in accordance with Article 12(b), cannot be utilised." 8.76

concerns the right of notification to third partiesto or Upersonal data has been disclosed of any rectification, erasure

2c) 110 111 T12

113

Art 12(5). EU General Data Protection Regulation 2016/679,

EU General Data Protection Regulation 2016/679, Art 12(3). Lase Rotterdam v MEE Rijkeboer Colege van burgemeester en wethouders van ECLI:EU:C:2009:293. C-553/07 (7 May 2009) EU Data Protection Directive 95/46/EC, Art 12(6).

290

EU Data Protection Directive 95/46/EC, Recital 41. U Data Protection Directive 95/46/EC, Art 12(D). U Data Protection Directive 95/46/EC, Art 12(b). 291

Data Prolection in the

Practical Context

blocking, unless this is impossible or involves a disprono. personal data has been published on the are many and their identities unknown l17 Inteor,

rtionate elfon

such as when the recipients

and

Right to rectification-New European

4.

CHAPTER9

Union law

Care

8.77

of

Personal

Data

The right to rectification under the EU Gencral nas Data Regulation 2016/679 is far more strongly: and was in the EU Data Protection Directive than 16 of theiu EU General Data Protection Regulation 2016, that an organisation should rectify without undue dat that is inaccurate." As for incomplete personal data, into accou unt the purposes of the processing, the data subje has the to incomplete personal data completed, by means of have 20

rotecion

clearly

worded 95/46/EC.8 Article 16/679 provides

a

delay personal taking right cluding

providing

supplementary statement.

8.78

Article 16 is very clearly articulated and leaves no room for dou unlike Article 12(b) of the EU Data Protection Directive 95/46/EC

prefaced with the words "as appropriate" and which that the right to rectity, erase or block could onlv he exercised when the processing does "not comply with the provisions'n of the EU Data Protection Directive 95/46/EC. Article 16 also grants to the data subject a clear unfettered and absolute right to rectify inaccurate personal data, unlike the Singapore statute which gives the organisation an opportunity to decline correction on reasonable grounds.22 As for the right to rectification of incomplete personal data, the only criteria that can be taken into account according to Article 16 is the purpose of the processing. This is again relatively narrowly specified when compared with the Singapore legislation, where rectification can be declined on reasonable grounds. which

was

specified

h a n t e r will deal with

the tirst three Obligations in Part VI

f Personal Data) of the Personal Data Protection Act 2012 (Care of ithe "Act"), regarding accuracy, protection and retention of personal data, To a large extent, the Accuracy Obligation and the Completeness Obligation are quite lax and may not be effective in achieving their aims.

A.

ACCURACY AND COMPLETENESS OF PERSONAL DATA

9.2 The Accuracy Obligation requires organisations to make a "reasonable to ensure that personal data collected by or on bechalf of an is accurate and complete.* However, even this "reasonable

efort Organisation ettort" required

is not an absolute requirement, as organisations are

Only Tequired to do this if the personal data is likely to be used by the to make a decision that affects the individual to whom the personal data relates* or if it is likely to be disclosed by the organisation

Oganisation

to another organisation. This is indeed very weak protection for the ,

as talse and incorrect information can continue to De

and the the individual.

117 118 119

EU Data Protection Directive 95/46/EC, Art 12(c). EU Data Protection Directive 95/46/EC, Art 12(b). EU General Data Protection Regulation 2016/679, Art 16.

120

EU General Data Protection Regulation 2016/679, Art l6.

121 122

EU Data Protection Directive 95/46/EC, Art 12(b).

Personal Data Protection Act 2012 (Act 26 of 2012) s 22.

292

perpetuated without the knowledge and control of

Act 26 of 2012.

Onal Data Protection Act 2012

(Act 26 of 2012) s 23. Dal Protection Act 2012 (Act 26 of 2012) $ 23(0). Persona Data Data Protection Act 2012 (Act 26 of 2012) s 2510).

293

Data

Care of PersonalData

Protection in the Practical Context

9.3 As noted in

chapter 8, the rights rights and they would not

to

absolute rectio are that is held or used to be accurate, n especially when orga. a choice whether to correct personal incomplete. The Accuracy Obligation 1s data that i in errorhwave

Accuracy Obligation

is set at such it can achieve its stated

ecessarily engender

a

objective.

personal daa

equally relaxed

low level that it s

The

isdced

howhe Personal Data nclear Pro

Commission (the "Commission") has indicated that the e otction Accuracy Obligation is to ensure that where m of the data may personal to make a decision that affects the be used u individual, the data correct and complete so as to ensure that the asonably decision to b takes into account all relevant parts ot accurate personal data 6 made 9.4 First, imposing the obligation ot accuracy "may be used to make a decision 1s

on

only personal

a the

a

common for a data that was initially thought unlikely to be used forpiece o any decisions to be in fact used later on, King perhaps several make a decision. However, as the initial assessment years later. was that unlikely to be used for decision-making, no care was taken to it we ensure that the personal data was accurate and complete. An example of this may be information on an individual's educational qualifications for a store discount card for the purpose of sampling the of customers. This type of personal data may, however, be used years later to make decisions on which holders of the store discount card should be invited for a new co-branded credit card.

personal

malino

demographics

9.5 Secondly, if the aim is to ensure that any decision made affecting the individual takes into account all relevant parts of accurate personal data, then organisations should not be given any choice to decline the correction of personal data that is in error or incomplete. By organisations a choice, this opens the door for inaccurate and incomplete personal data to creep in.

allowing8

6

Personal Data Protection Act 2012 (Act 26 of 2012) s 22. Coma Guidelines on Ky

Data Protection Commission, Advisory rersonal in the Personal Data Protection Act (revised on 15July 2016)

recasonai

Thirdly

of

at

y

that

at pare

16.2.

not

low, well

flexible

l is

circumstances

onable eftort" entail

7TCasc Danad

The five factors

1

h a s provided a list of factors that should be taken what constitutes "a reasonable

The 9 7 Commissior.

effort".

todetermine

into accountt o

Thehirs

factor

is

that

of the nature of the

individ

the health,

it would

higher personal

effort

be

a

would

data such a

9.9

data and its

significance to

example, if the personal data relates nificant type of personal data and, presumably,

concerned,

be

for

required as compared with other types of ference for a brand of mobile phone.

person's

for which the data is

second factor is the purpose The ar disclosed. Presumably, the more

collected,

used

serious or important the purpose,

be to ensure accuracy. The third factor is higher the effort should data. The Commission has confirmed that where the of the reliability DErsonal data was obtained from the relevant individual directly, organisations may presume that the personal data is accurate.° The the

Commission also suggested the device of requiring the individual to

make a verbal or written declaration that the personal data provided is accurate and complete, especially where the personal data may have ben collected some time ago and the currency of the personal data is

important." 9.10 t would appear from this that the Commission would not require nganisations to verify the veracity of the personal data themselves as rersonal Data Protection Commission, Advisory Guidelines on Key Concepts 4 eFersonal Data Protection Act (revised on 15 July 2016) at para l0.t. sonal Data Protection Commission, Advisory Guidelines on Key oncepas e Fersonal Data Protection Act (revised on 15 July 2016) at para nal Data Protection Commission, Advisory Guidelines on Key lb.4. Con0eps Data Protection Act (revised on 15 10 Personal Per 2016) at

July para Protection Commission, Advisory Guidelines 0n Ne) p Persomal Data Protection at Act (revised 15July 2016) para 6.

in the Data

on

294

to meet is

vague,

in in naturc. The Commission has stated that what will depend on the exact entails t" at

a

delincd and,

9.8

data

sloppiness inthat handling of personal data. lt creates encouraging in hierarchy personal data and leads to double standards being appliedtheto valhu of difto fer ent types of personal data. Further, it is not

5

rganisations are required effort. This standard is

ndard that rdly, the standard

access and

295

Dala Protection in the

Care of Personal Data

Practical Context

rt of satisfying the requirement of reasonab able efforts. For there is no need for as part of organisations their reasona sight documents such as the Natio

("NRIC")

to

prove

the truth ot the

individual would suffice.

Kamyleto, Registration onable eforts personal data. ldentifica

data. AAdecaOn Card

decdaration by the

is the im impact on the individual concerned if the the or incomplete. Thi last factor is in some factor of th nature of the data and first its th e he

is factor data

is

T h el a s t

lated to personal

inaccura1

dividual concerned. For example, if the personal

indiv

to

nay3

sigznificance

the

health

9.11

Where personal data is collected from a third party instead the individual, the Commission d of from suggested confirmation from the disclosing organisation of the acuracy completeness of the personal data or it may also cond and independent verification if it deems prudent to do so.l duct further

organisations could obtain

9.12 This also raises the issue of authentücation, especially in the con online interactions. From the Commission's context of

statements, it appea s that that collect personal data online, such as thtongh their websites, can assume that they are collecting from the elevant individuals directly and the personal data is acurate and relevne comple Organisations may, for their own business purposes, implement processes that verify the personal data such as through sending an e-mail to the e-mail address provided to contirm that the owner of the e-mail account has actually signed up or provided personal data on the

organisations

organisation's website.

9.13 The fourth factor to consider is the currency of the data, this appears to suggest that if the personal data was collected some years ago, to meet the requirement of reasonable effort, the organisation would need to take steps to update the personal data. However, the Commission stated that "an organisation may not be required to check the accuracy and completeness of an individual's personal data each and every time it makes a decision about the individual"." From this,

afais

is also significant to the individual in and on the individual may concern the life and death which

related,

the impact on

he individual, and thus the impact is also significant.

oi f sel,

or we.

ors, one is, however, lett wondering what would 8.15 r e nt h e constitute

"reasonable

movable

feast.

effort" as the standard appears to be an Take the example of entering data, a simple

paper form that a customer ould "reasonable effort" require

uncertain personal data from a ansferring Wo computer system. in to a

led

in place, in addition to the data entry

t h eo r g a n i s

who

second a

Cases

as insurance, banking and health would appear to be required as the nature of the data in

some purposes such

purposes, this

These,

the personal data entered? From the

person

lactors, f o r

these

cks checks

would be quite significant

however,

are

to the individual concerned.

the straighttorward

ye25onable effort" required of utilities such as

ision provisio

cases.

What would be the as the

entry for purposes such telecommunications or Internet,

for data

or car

by the Commission do not give clear rental? The factors set out"checker" would be required for accuratee a whether uidance as to into a coomputer system in these cases. It would data entry of personal factors that would dictate a course appear that there are no overriding of action for an organisation to meet compliance. It may be that aim to meet the higher standard and ensure a checker is in place in order to avoid falling short of compliance. This

oganisations would

would, in any event, be the best course of action for the organisation in order to adequately ensure personal data is accurate.

the Commission seems to be suggesting that the factors may well on the or cancel out each other. This makes compliance based a factors relatively difficult; a factor to which the organisation may gve heavier weight may be given a lighter weight by the Commission.

balance

2.

The four aspects

9.16 addition to these five factors, the Commission also listed four lar aspects where organisations should make reasonable eftorts

TlPersonal Data Protection Commission, Advisory Guidelines on 15 July 2016) atompara Conaeps the Personal Data Protection Act (revised 12

on

7

Guidelines A Personal Data Protection Commission, Advisory 2016) at paird 172 the Personal Data Protection Act (revised on 15 July

296

297

Care of Personal Data

Data

"in order

Protection in

to ensure that

Organisations must make (a)

it

accurately

(c) (d) 9.17 The

personal

Context

personal a

records

source,

(b)

the Practical

data is accurate and reasonable effort to enSitre.

personal

.

data which it

data it collects includes all

completeness;

that:4

relevant parts thereof

shatever

rcumstances

informatüon.

Commission recommended

that

organisations perform the: their o to ensure the completeness of personal data that is likely to be usedaccuracy and decision that will affect the individual.5 The Commission to also0make a that an organisation may also not be required to review all the no data currently in its possessionn to ensure that ersonal they are accurate time it is complete each and to use

reasonable ffort

every

individual.16

likely

make

a

decision abontt the

.18 It would appear that the Commission is on the one hand espousing the ideal of making decisions about

organisations

accurate and

complete personal data,"

requiring from organisations order to achieve this.

individuals ing

but on the other hand, it is not the rigour of the standards required in

act on individuals are relatively non-significant pended satisfy

could iht be that any etfort that is hlosure of the currency of the personal data, nseriort" In terms disclost

it has taken the ensure appropriate (reasonable) steps in the to ensure the accuracy and correctness of the it has considered whether it is necessary to update the data and

risk assessment and

here t . h e naturcce 920

collccte

personal

of the personal data, purpOses of the collection use

complete

able

effort"

humb might be that any personal data more than

thum of

ould be verified wit the individual and updated as data ata is relatively static personal dar the personal anless other types of biometricdata.

rule

rough thne years o l d

a

r e q u i r e d ,u n l c s s

asthumbprints, irises

data, purposes of the collection use individuals are significant in any way, then isclosure, or the approach of doing all it can within its c o u l d adopt isations be impractical or impossible. organk imited only by what would of reasonable effort" and would be the standa above sit the

nature

ofthe

personal.

impact on

or

This

would

compliant

obligation. with the

European Union position 4.

9.22

(°EU") position on accuracy and completeness data has been well established since the EU Data Protection Article 6(1) (d) requires that personal data

Union The European of personal

Diecive 95/46/EC.8

mst be accurate and, where necessary, kept up to date; every reasonable step must be taken to ensure that data which are inaccurate

3.

Compliance with Accuracy Obligation

or incomplete, having regard to the purposes for which they were collected or for which they are further processed, are erased or rectified" 19

9.19 the very fact that the standard of "reasonable effort" is a variable requirement depending on the circumstances, it should be relatively easy for organisations to argue that it has complied with the Accurney not Obligation, even though the requirements for compliance are

By

9.23 TheEU General Data Protection Regulation 2016/6790 is similarly Narded in terms of the accuracy of personal data. The requirement in

entirely clear. 13

Personal Data Protection Commission, Advisory Gruidelines on Key Conas n the Personal Data Protection Act (revised on 15July 2016) at para lD.

14

Personal Data Protection Commission, Advisory Guidelines on K A in the Personal Data Protection Act (revised on 15 July 2016) at para

15 16 17

Personal Data Protection Commission, Advisory Guidelines on K

in the Personal Data Protection Act (revised on 15July 2016) at para on Ky n Advisory Gruidelines Fersonal Data Protection Commission, on 15 at 2016) parn July in the Personal Data Protection Act (revised Guidelines on K) Protection Commission, Aduisory Data Personal 2016) at pard Protection Act (revised on 15 July n the

PersonalData

298

irective 95/46/EC of the European Parliament and of the CounCil ot October 1995 on the protection of individuals with regard to the

Caing of personal data and on the free movement of such data

OJL 281/31 ("EU Data Protection Directive 95/46/EU), Art 6(1) (d).

Data Protection EU 0 Directive 95/46/EC, Art

Reg

(EU) 2016/679

of the

6(1)(d)

European Parliament

and or

uie 27 April 2016 on the Cof natural perso regard to the processing of perso protection data and onof the free movement of such d and

repealing Directive 95/46/EC (General Data Protection (cont'd on the next page) 299

Data Protection

in the

Care of Personal Data

Practical Context

EU law is clear, that personal data must be and absolute standard required. It also

vidual

accurate,

that

the an obligation organisations to keep the personal data up toimposes date where re

necessar

osed

disc

that

for

respect

to both

personal

data that was

step had

personal data that incomplete. Under the EU inaccicCurate : Protection Regulation 2016/679, for personal data that isGener Data incomo discussed in chapter 8, the data subject has the mplete, to rectification right under Article 16, manifested in the right to have

well

as

was

as

data

completed, including by

means of

statement.

incomplete personol providing a supplementay

reasonable efforts to ensure that personal data collected by or on behalf of the organisation is accurate and complete.22 To take every reasonable step is to do everything reasonably possible which entails the maximum amount of effort. To make reasonable effort, however, does not involve expending the maximum amount of effort, especially given the five factors outlined by the Commission.23

9.26

on A further point of difference is that the EU law requirements to whereas the requirement make accuracy applies to all personal data,

reasonable effort in the Singapore statute only applies to personal daa

likely

to be used

Regulation) ("EU

by

an

organisation

to

make

a decision

ulae

organisation.25

within the jurisdictional reach of the EU, it hat fallstraightforward to have one set of accuracy of

n e a t e ra n d m o r e s

that adhere to the EU standard. This would and would assist in practices minimising

personal data p r a c t i c e s rb

best

liability

a

industry

claim.

l dindividuals m a k e . eel

OF

PROTECTION

PERSONAL

DATA

B. of personal data in the Act, the the of is key provisions to the personal data Obligation, ovision mandating the security of ithout a regime. rotection data protection regime would Pldata, the whole personal

9.28 The prov

on

the

protection one

Protectio

persona

The Protection Obligation 9.29

Section 24 of the An

General

Data

Protection

Regulation 2016/0

Art 5(1)(d). Regulation 2016/679, Data EU General 2012) s 23. of 26 2012 Act (Act n Personal Data Protection Protection

magtis

Guidelines na 16.4. Commission, Advisory 2016) at pa Personal Data Protection on 15 July Protection Ad (revised 7n the Personal Data 300

Act

organisation

its control

by

provides that:

shall protect making

personal

reasonable

data in its

security

possession

arrangements

to

or

under

prevent

unauthorised access, collection, use, disclosure, copying, modification, disposal or similar risks. 9.30 The Protection Obligation is broadly worded to cover all kinds of

Secunity arrangements from administrative measures to physical and nical measures. The standard that organisations are held to is aOnable security arrangements". Like the standard of "reasonable the Accuracy Obligation, the Commission has stated that tor there

no single solution. Organisations are to adopt security dirents that are reasonable and appropriate in the

Art 5(1) (d). 22 23

data relates?or if it is

to another

ganisations t h a t .

ances.

21

personal

fll apart.

9.25 It should be noted that the EU requirement of taking 'every reasonable step" to ensure that personal data is accurate is quite different from the legislative requirement in Singapore of making

that is

the

organisati

iely

organisations must take everyslight differenc reasonable

inaccurate personal data, while previoue e step the EU Data Protection Directive 95/46/EC, every reasonable under sten to be taken with to

by

whom

an

be to

9.24 The EU General Data Protection Regulation 2016/679a Tmana. every reasonable step must be taken to ates that ensure that are inaccurate, having regard to the purposes forpersonal d that processed, are erased or rectified ithout delay. The which they are in the new EU law is

only with respect

to

fectsthe individual

24

Personal

Some of the factors that are relevant and can De

Data ersonal Data Protection Act 2012 (Act 26 of 2012) s 23(a). 6 Perso Act 2012 (Act 26 of 2012) s 23(6). Tsonal Data Protectic Act 2012 (Act 26 of 2012). n the TOtection Commission, Advisory Gruidelinesaton Key onapis Persomal Data Protection Act (revised on 15July 2016) para ll.6*

Protection.

Personal

301

Data Protection in the Practical

considered include the the

personal

nature of the

Care

Context

data has been collected,personal data and the

both

security arrangements. If a organisation is an employer, then all of the personal data it hol. concerning employees should be given a high level of securi protection. Similarly, the personal data held by healthcare clinics. such as medical clinics and physiotherapy clinics, would comprise largely of health related personal data and, hence, these organisations should be mindful that much of the personal data they hold is highly confidental and sensitive in nature and should implement high levels of security for the personal data. 9.32 Second, the Commission also stated that organisations should identify reliable and well-urained personnel responsible for ensuring information security.31 The Commission is clearly placing the onus on of organisations to engage personnel to manage the security personal are are appropriate personnel in that they data and to ensure that

they

where reliable and well-trained. This cannot be stressed enough ned to information Organisations utilise technology. organisations are to ensure that their computer systems engage specialised personnel that can the consequences secure from unauthorised access and all

29

30 31

Cuidelines on Ky ng Personal Data Protection Commission, Aduisory at para on 15July 2016) Act Protection (revised the n Personal Data Guidelines onm Kay ong Advisory Commission, Protection Personal Data at para Conces on 15 July 2016) in the Personal Data Protection Act (revised on Guidellnes n 7.3(a). Personal Data Protection Commission, Advisory at pa s on 15July 2016) on n the Personal Data Protection Act (revised Advisory Guidelines h) Commission, Protection 2015) at paia rersonal Data Protection Act (revised on 15 July m

the Personal Data

302

employees

as

well

as

others.

nisationss h o u l d

personal data they hold being deleted or tampered

Oganisa

he n t negatively o on the integrity of the personal

negatively albo result

impacting

hereby data.

should implement robust policies and procedures

Third, rganisations she

riate levels of security for personal daa of varying organisations«can implement such policies Before ivity.shey would need to assess their personal data

933

9.31 In terms of compliance with the Commission gave some indications of Protection Oblipatio what would be gation, the exp ected of organisations." First, organisations should security arrangements to fit the nature f the design and or personal data held by the organisation and the possible harm that result might breach0 Organisations would need to0 assess the from a s kinds of per it data holds and devise appropriate personal

from

always be mindful that unauthorised access can

therefron,

tho

individual concerned in the event possible form in which of any unauthorised disclosure, modification and so npact to the on. For example., anu access, use, on health would call for much higher levels levels of security data on an individual's favourite security than data restaurant or the one drives. Similarly, an individual's salary is mod.el of personal car tha often confidential piece of informatuon so that individual's remuneration should be well personal data data cone. conceningsan guarded.

28

Data

of Personal

and

rocedurcbtain the nature of the personal data as required by lined by the Commissio In the employment outlin

ventoryand

requirement

lirst.

the

for

example,

necessitate

might

appraisals idential employee

f o rh i g h l y c o n f i d e

the

this

hhealthcare insurance, employee health

provides employer deserve higher

rds would also

a higher level of security personal data on salaries,

levels of protection.

records

to be prepared and able to respond to organisations need reaches promptly and effectively.3 This is a formation security detailed and which will be considered1 is quite anse Dlan which

9.34

Lastly,

below.

9.35 a considerable number of the cases dealt As discussed in chapter 2, date have concerned lapses or failures to with by the Commission to included cases of data leak such as Fei Fah These data. protect personal Medical Manufacturing Pte Ltd" K Box Entertainment Group Pte Ltd and Finantech Holdings Pte Ltd,5 The Institution of Engineers Singapore and

Metro Ple Ltd37 In these data leak cases, the information technology Ised was not properly secured, and the cases highlight the need for

Onganisations to engage reliable, reputable and trustworthy information echnology personnel. The growing number of cases involving lapscs nthe implementation or usage of secure information technology Commission to publish, in January 2017, Cuide to Prevening

a the

o n a l Data Protection Commission, Advisory Guidelines on Key Concepis 8 33 e Personal Data Protection Act (revised on 15 July 2016) at para 17.3(c. n a Data Protection Commission, Advisory Gauidelines on Key Conces Data Protection Act (revised on 15 July 2016) at para 17.3(a). 4 9010al 2016) SGPDPC 3.

2016] SGPDPC 1. 2016] SGPDPC 2. S7 2016) SGPDPC 7.

303

Data Protection in

Care of Personal Data

the Practical Context

Accidental Disclosure when Processing and Sending Persone onal also included useful short summaries of the information failures in some of the decided cases.3 The fact that to publish such a Guide, as well as the vas a need breaches in the cthere was show that there are substantial gaps in the

Data which

l e n g e rT e c h n

af My Digital Lock Pte Lia" 1s somewhat an oddity as

technology

inable why someone would transfer information from quite unimaginable

technology knowledge of both organisations and those individmsclves, basic

the organisation who ought to have known.

reliable and reputable information technolam ensure the software programs deployed have .PesOnne safeguards in place to prevent unnecessary disclosure of pervo y The cases of Fu Kwee Kitchen Catering Services and Pixant Pte Ld" Pte T2 Orchid (S) Web Pte Ltd, Cybersite Services Pte Lud, Ltd and Ea Smiling Solbutions Pte Ltd" ABR Holdings Lid" and GMM TechnoworlH Pa 1. are cases illustrative of this simple principle. The agreements with information technology providers should also include clausee that warrant the systems deployed do indeed protect and secure data. The importance of such contractual clauses were personal played in PPebperdine Group Ple Lld," where the information provider, Ascentis, was contracted to only provide the design nology of the webpage for the respondent." This absolved Ascentis completely from

Engaging

would also

liability for the breach of the Protection Obligation.

9.37 In other

were

not

properly protected, some

place. For example, in Universal Travel Corp Pte Ld

the respondens

cross-checking, the human errors made in Singapore Compruter Socaty Personal Data Protection Commission, Guide to Preuenting Aecailena Disclosure when Processing and Sending Personal Data (issuwd on 20Jomuay

2017). Personal

Disclosure 41 42 43 44 45

46

47

of transfer,

Such

as direct connection to a

ganisatior

olicies

through C-mailing the files to oneself. Nevertheless, need to protect themselves from liability by setting still ohibit the use of any open platforms for any transfer

that prohiB

ut o fpersonal d a t a .

Id and Toh-Shi Printing Singap0re Ple Lid,

9.38

procedur

were

in

place

but

they

were

on the other hand, not

followed, hence

eed to e n s u r e employees are properly trained and are mployers ot the processing of personal data. acCOuntable at every step

proper

2.

Data protection by design approach

9.39

for personal data, much of it can be n terms of implementing security from the perspective or approach of privacy by design or

data protection by design discussed in chapter 7, and all the principles

personal

data

should have had a policy that prevented the sending of passenger lss that were not redacted. Similarl, had a policy been in place for

40

hods methods

approached cases where

of them were due to administrative human errors that could have been averted if robust policies concerning personal data handling were in

39

using an open social media platform Common sense would suggest many other better

computer to their

Faccbook.

faster

such

computer o r

9.36

38

hone

formation

s in

logies Ltd and Xirlynx Innovations;and Central Depository Shi Printing Singapore Ple Ltd would not have

Data Protection Commission, Guide to when Processing and Sending Personal Data

2017) at para 3.1. [2016] SGPDPC 14. [2016] SGPDPC 19. [2016] SCPDPC 16. [2016] SGPDPC 18. [2017] SGPDPC 2.

JPPepperdine

Group Pte Ltd

and approaches discussed there are relevant to the issue of ensuring reasonable security arrangements are in place. The Commission has given some examples of the administrative, physical and technical

measures that organisations can employ. To address the full range of

security arrangements from administrative measures to physical and technical measures in a given situation, the illustration of the employment context will be considered in more detail. The employment context provides a rich base to begin the discourse as nost organisations are also employers, so they collect, hold and

process a basic

[2017]

[2016] SGPDPC 4. [2016] SGPDPC 9.

304

at

[20].

personal

data.

Preventing (issued on 20Janely

48 49

SGPDPC 2

core of

Accidental

[2016] SGPDPC6. [20161] SGPDPC11.

50 2016)

SGPDPC 20. 2016) SGPDPC 15. Data Protection Commission. A dvisory Guidelines on Key Concepis Personal Data Protection Act((revised on 15 July 2016) at para 17.5.

a

305

Data

Protection in the

Care of Personal Dala

Practical Context

9.40 For

bly

a variety of security measures shoul De adopted o personal data from the time of collection of personal its disposal. The life cycle of personal data could dataa unil pre-application stage when employers are in the bein as the an

employer,

much personal data is collected about potential cruitmen from recruitment firms or from the emplov stage. f seanarches and background checks, best practices requir these toown be even from the prying eyes of kept employees who are not recruitment, directly or indirectly. Indecd, section 94 volved in procedures and processes to ensure that the person

employer's

exposed to unreasonable risks.

be

permissible

mobile

ch

mobile

such as salary, residenti: residential onal data n d date of birth should be SCnsiivei n f o r m a t i o n , aand the

to

aces

pers

address,

restricted

leave and to access

class of employecs.

medical by only.

loyees, eithe

ecurely,

ler pool of employeesbutto more have bile telephone numbery of their colleagues,

943

le, all computer systems holding personal data should Further, passwords should not be shared or passwords. by ted passwords, and employees should be given individual ofa breach, there is the the ability to trace that in

Asa general

be protected

a

event

commor

ords s o responsib those hold to

is

to account.

and

9.41 Where

Lid

Lid and Global Inleractive Works Pte the Cllar Door Pte was unequivocal about the necessity of the system

applicants apply for jobs using employers must ensure that the applicationspaper-based are received applicaions, secure not simply submitted or leit in exposed areas. Access yand

9.44

contents. For examnple, job applications open tray where any person, even if they are employees, and look at the contents. This is to protect not the

measures highlighted by the Commission in this of firewalls on servers, the closure of re the implementation decision 56 o n s e r v e r s and the encryption of login credentials, nused ports of Yahoo Inc, it would be advisable for the data breaches Given the utilised to be reasonably sophisticated and not encryption methods

applications

should be restricted to

only

to the

those who need to sed see he should never be

leftin

an

can walk h

only contents of the that contains the relevant personal data, but also t protect the fact that the individuals have applied for a position with the employer. This fact would be considered personal data under the Act as the individual can clearly be indentified from the data or

applications

application3 and, hence, would be protected under the Act. This would achieve the broader aim of protecting the individual as details

of employment movements are often regarded as sensitive and confidential. For applications that are submitted online such as on employers websites, the information should be encrypted to prevent eavesdropping by hackers.

9.42 During the course of employment, employers must ensure ua employees are bound by confidentiality clauses in their employmentot the sharing contracts. These should extend to prohibitions on both withn with data of people and personal passwords knowledge ensure that should and outside of the organisation. Employers that they need for neu employees only have access to personal data having layercu Work and no m o r e . This, for example, might require with different clearadin computer systems basis. In mostcasc know to need a on levels for different employees

access

53

to

information on

in s 2(1) of the Persona the wide definition of "processing" ch b. and discussed in Protection Act 2012 (Act 26 of 2012)

See

306

In The Cella Commission

administrator's

six

characters

password being strong: it had to be more than

with

a

mix of alphanumeric and special characters.35

Other essential

easily hacked.57

9.45 Employers should invest in conducting regular training sessions for employees to remind them of their obligations towards handling

personal data and

to educate

employees

on

what

are

acceptable and

unacceptable practices. For example, it should be stressed to employees the need for confidential documents to be clearly marked and to ensure that they are given higher security protection. Unacceptable practices, especially if they are known to employers, repeatedly highlighted to employees coupled with stern aings of the consequence for the employees, should they engage in case of the secretly filmed nude videos of Erin Andrews

stould be

nem. The

s e r v e as an incentive and warning for all employers to educate 54

[2016] SGPDPC 22.

larat [30]. Door Pte Lid and Global Interactive Works Pte Ltd [2016] SGPDPC 22

l a(30].rDoor Pe Lid and Global Interactive Works Pte Ld [2016) SGPDPC 22 57 paras 9.93-9.96 below:

(18Teecurity problems (18 December 2016).

Ioseph Menn, Jim Finkle & of too little, too

a

story

307

DustunReuters vo1

late

Data

thcir employees and sanctions are in

understand of

personal

and

Care

Protection in the Practical Context

to ensure

adequate

policies deter erran ant employees.andEmplo physical threats that can data. To this end, ensue ensuc from 1 the employers mu to have in phmis safeguard the security must of for place

the

to

nw.

procedures

disciplinary procedures

employees who mis

cedres, a shodd andi personal dpoligny s, and

a

Unongsr

as

an place. limited with the organisations engaging The eir liabiliy liability for any personal data was the case in bresl Challenger Technologies Ltdprotection and Xirlnx Fei Fah Medical This Manufacturing Pte Ltd and K Box Lid and Finantech Ple Lid. These cases Entertainment vations Holdings can be cont Grout the case of Central P (Pte) Ltd and Toh-Shi Printine Depository with Ltd where the Commission found that Central not in breach (Pte)e of the Protection Obligation asDepository Lud it had in the contract with its data alid clau to clauses protect The data intermediary was, intermediary dau however, found to be inpersonal data Protection Obligation. breach ofathe

bearing

full

was

9.47 The

("UOB")

Personal Data Protection Act 2012 (Act 26 of 2012) s 2(1). Personal Data Protection Act 2012 (Act 26 of 2012) ss 2(1) and 4(2) Personal Data Protection Act 2012 (Act 26 of 2012) s 4(3). [2016] SGPDPC 6. [2016] SGPDPC 3. [2016] SGPDPC 1. [2016] SGPDPC 11. Central Depository (Pte) Ltd and Toh-Shi Printing Singapore Pte Ltd [2016)

SGPDPC 1l at [17]-[18]. 66

Personal Data Protection Act 2012 (Act 26 of2012) s2(1). 308

details

and

client

0ok

log-in paSswords was also found

Other items found included documents

with

otearbage

ns for its wholesale and retail banking units

idential,

which would undoubtedly have to the news report, the bank did data. al of personal data and at bag garbage the of

oncernin

hat were marked

o n t a i n c dp e r s o n a l d a t a .

the

According

e Monetary Authority of Singapore, which is ersight of of all financial institutions in Singapore,

discovery

of writing, th o td e n y

oversight ime

the

for Teyponsible Commission are

investigating the matter

and the

that

849

whole garbage since the

sinc

bag

was

filled with

the bag was perhaps intended for did not reach its destination. somehow ction but if the bag was marked as is clear it n e w s report,

ntial documents

and

aPpcar

would

dential

contidential

repor

news

the from

but this However, n f i d e n t i a l w a s te", e", the

r

tion

such

which

It

shred

being UOB

would

be

as

only one required practice and disposal of personal data,

and

handlin and sensitive

secure

oce durec o n f i d e n t i a l ially

of

9.48 In July 2016, it was reported that a large garbage bag full of unshredded bank documents from United Overseas Bank

reported

number

RIC

organisations

processing personal data can also include the destruction of personal data. Hence, organisations that utilise the services to parties process" personal data, such as the provision of of third confidential destruction of personal data, should ensure the agreements with the third parties have the necessary personal data security clauses in place,

58 59 60 61 62 63 64 65

containcd

0pica"have n e r es a i d t o

g u a r a n t o r ,h i s N R I

i p s í d et h e

organisations that to process personal data should utilis the services of ensure the parties have the necessaiy agreements wiuthi paries personal data security third parties will be clauses in third regarded data intermediaries clauses under the Act is

statements,

internal reports from the bank. The documents data such as the name of a p c r s o n a l da birth. It was also and da

thedocu.

a, inchuting

similar vein,

discovered

o u nlications a a n d int

9.46 In

the bank's head office 7

were several corporate

cred

nents

Data

2016 near

in June

ec

tre.

Under a

of Personal

data.

In

any event,

large

do outsource their confidential waste olve, at the minimum, the documents involv

banks

would

remains

to

be seen how the garbage bag full of

ended up under a tree, but the incident highlights

documents

tions having procedures and processes that ishandled in any way, especially if the not is data personal individuals concerned and, in this instance, for consequences for the will be severe and significant. For highly as well, organisation the the documents data such as barnk docunments, ronfidential personal of the confidential the lest transport chauld be shredded on site,creates more for personal opportunities site another

the importance

ensure

Hocuments

to

route. Organisations holding sensitive or be mishandled en utilise the services of mobile on-site confidential personal data c a n the destruction of its personal data but, even so, for services shredding own employees to oversee the organisations should position their destruction process as it occurs at their premises,

data

to

67

Jamie Lee, "MAS probes case of UOB's unshredded client data" Business

Times (21 July 2016). 8 Jamie Lee, "MAS probes case of UOB's unshredded client data" Busine Times (21 July 2016). 69 See further ch 7 generally.

309

Care

Data Protection in the Practical Context

of Personal Dala

he of special benetit to those holding large data

9.50

Employers

should also ensure that filing cabinets and inside secure personal data is stored premises, and not in areas in locked accessible. Where computer systems and networks are to those, including the physical rooms, utilised controls systems, security alarms and should be secured ui Ces even surveillance cam. ccess mputer networks, databases and systems themselves secured through access passwords and firewalls andshould be e anti-virus software and anti-spyware cryptio activated and kept up to date. software should be instalO Employers should and uld also also imni implement policies regarding the use of portable electronic USB devices. laptops, drives, tablets and obile devices, such : for work that store or hold data. If thesetelephones personal devices are permitod used by employees or are issued by to be employers, should be password protected and policies should be implementedthey to ensure taken by employees over their safe great care are is custody. Employers should also have in place ha that restrict processes and monitor the printing and photocopying of confidential or highly sensitive personal data. 2nd

holding

generaly

ameras. The

these types of when in transit.

personal

data should be

encrypted

when stored

and

a variety

of di fferent

kinds of personal data.

at may be considered tor such a risk assessment o f t h ef a c t o r s

the

of the organisation and the amount and type of o f th

size

hin the with access the persons itholds; personal data is or will be held and whether the eonnal data 1alf of the organisation.72 behal on

C I C r i s caa r e

organisation

data

o

thep

d by

a

third party

nent exercise is similar to the privacy impact assessment 7. Even though the term "privacy" is used, the in chapter the same: an a s s e s s m e n t of the impact of the use

9.54

T h i sr i s k a s s e s s

exercise

is

essentially

i handling

data and whether the measures in place are dat

of personal

Privacy impact assessments, however, are involve examining the whole life cycle more collected, used and closed, whereas the risk f personal data is only in relation to exercise suggested by the Commission propriate or adequate.

generally targeted

and:

esment

the security arrangements.

9.51

The destruction of personal data should also be done securely such that the personal data cannot be re-identified. The Commission has recommended that the preferred sustainable approach to the secure disposal of personal data is the use of cross-cutting shredders that slice documents in at lcast two different directions or confetti shredders, followed by the recycling of such shredded paper.70 Electronically held data should be deleted in such a way that it cannot be undeleted or otherwise retrieved. The risks associated with de-identifying personal data have been discussed in chapter 3 and the present technologies indicate that true anonymisation is extremely difficult to achieve and, hence, re-identification is a real risk.

3.

-

Personal Data Protection

9.55 la temns of compliance with the Protection Obligation, the Commission gave some indications of what would be expected of oganisations, the last one of these expectations mentioned above oncerns the requirement that organisations be prepared and able to

espond to information security breaches promptly and effectively."3 ihe Commission has prepared a Guide to Managing Data Breaches (Data Breach Guide") that is aimed at helping organisations manage personal data breaches effectively.

Risk assessment

9.52 In order for organisations to ascertain whether their intormauou

Security arrangements

are

adequate,

might be useful for organisations

the Commission to

undertake

a

suggested tnat risk

assessimene

Dala

70

Data breach notification Commission's Guide

Guide to Disposal of Personut and * Fersonal Data Protection Commission, at paras 7.2 on Physical Medium (revised on 20 January 2017)

310

1 T2

Data Protection Personal in thete k

mission, Advisory Guidelines on Key Concepis (revised on 15 July 2016) at para 17.4. mmission, Advisory Guidelines on Ky Concepts Perseonal Data Protection Act (revised on 15 July 2016) at para 17.4

Personal Data Protection Act Person Data Protection

inth

ata Protection Commission, Aduisory Guidelines on Key

Onal Data Protection Act (revised on 15July 2016) at pard Lons ersonal Data Protecti Commission, Cuide to Managing Data Breaches (8 May 2015).

311

Data

Protection in the

Care

Practical Context

and fire drills: lire cscape plans instruc t h e event of a lirc and the fire drills are the

lan fire escap¢ plai

9.56

There are no data breach in the cnts in Act and, at data breaches do not needrequirements t at the to be to the reported Commise individuals concerned. However, , ission momen or to the is standalone Cybersecurity Bill in Singapore expected to 2017,"

and table a likcly mandate data brcaches to this be renos piece of probably set out othe to the requirements inported information security breaches. In the any event, the of strongly recommended that the Data Breach Guide COmCnt sion has be advises strongly followe organisations to notify the Commission a4dit possible of any data breaches that might cause s0on where there is a risk of harm to a public conce ot group

legislation

will authorities and

alfected

individuals,7%

9.57 The Data Breach

errors.79 Regardless of the cause of data breaches, computer system they are costly and can lead to financial losses for the organisation and for the individual concerned. Individuals may also lose trust in an

organisation.

organisation

Other

may come in the form of sector-specific rules or laws that may have been breached as well as common law duies that have been breached or not been complied with.3 Data breach

pacusc runs

mission, the data ording t o the

I59

dtord

inpact, reporting

prevent

78 79 80

contain

taken to

be

steps to b e m

the breach and manage the incident.2 the

be akin to the fire wardens in a fire would be ideal for the data breach plan. It how to o u t l i n e possibledata breach plan to runs at least once a year. to hold and practise

members

emeigency

managem

respo

would

9.60

the following:83 contain a breach, including that led (a) shut down the compromised system

to

as

it is

can

aware of a be taken to

the data breach whilst

preserving evidence; the data breach in the system and, where (b) isolate the causes of applicable, change the access rights to the compromised system; (c) remove external connections to the system; (d) prevent further unauthorised access to the system such as through resetting passwords if accounts or passwords have been compromised; eestablish whether steps can be taken to recover lost data, such as from a real-time back up;

0

limit any damage caused by the breach, such as through remotely disabling a lost mobile telephone or tablet stop practices that led to the data breach; and )notify the police if criminal activity is suspected and preserve evidence for investigation.

Personal Data Protection Commission, Guide (8 May 2015) at p 9. Data Protection Commission, Guide

to

Managing Dala Breachas

to

Managing Data Brecls

Personal Data Protection Commission, Guide (8 May 2015) at p 4. Guide Personal Data Protection Commission, (8 May 2015) at p 5. Guide Personal Data Protection Commission, (8 May 2015) at p 4.

to

Managing Data

Breacio

to

Managing Data

Breae

2

Breaco

to

Managing Data

83

312

advises organisations to act as soon are a variety of measures that

There data breach.

"Parliament: New Cybersecurity Bill to be tabled next year to strengtien The Straits Times (11 April 2016).

Personal (8 May 2015).

to

The Commission

and implement a data breach

Singapore's online defences"

i

scenariosand

them

data breach Containing the

management and response plan to manage data breaches. This plan, when developed, tested and perhaps rehcarsed or practised on a regular basis, will assist organisations to handle and react more effectively to data breaches when they occur. The idea is based on the

77

containing

the incident and aluating the response and future breaches. It would be helpful for the plan futi to dataibrcach management team, indicating the ery details ofthe de ho would lead and make time-critical decisions on ns

management plan

Organisations should develop

76

as

such

brcach management plan may asscssing risks and

uhe breach,

inchude.

9.58

75

in

be

se

Guide" defined a data breach as the unauthorien a and retrieval of information that may include corporatete personal data.78 The Commission gave the three causes of data breaches as malicious activities, human errors possible and

an

to

n t ah te e d s

Thesetcam

access

costs for

done

onccpt

ne

«

(a)

of Personal Data

Protection Commision, naData (8 May 2015) at 6. p

Guide to

Managing Data Breaches

Onal Data Protection Commission, Guide to Managing Data Bredees

(8 May 2015) at p 6. ( a Data Protection Commission, Guide to Managing Data breuees (8 May 2015) at p 7.

313

Data

Protection in

the

9.61

Care ofPersonal

Practical Context necessary

This list of measures the best

practices.

provided by

For

the

Commission certainly

to be able to these measures, however,organisations the relevant will need to be executete some personnel in the son ot highly skilled, alert and Sony Online Entertainment aware. A which, in 2011. case. point is breach only some two weeks("SOE") after it occurred. The namee a data mail addresses, birth dates, telephone numbe of 25 million customers bers and otheres, addresses were stolen from "outdated database" from 2007 which servers as inform 23,400 people outside the US andcontained details of an well a inchuded 10,700 direct records for customers in proximatcly Austria, the SpainThe data set was stolen onGermany, Netherla 16 and rlands another data breach at Sony's 17 April 2011, and Playstation before its

to 19 April 2011, where 77 million Network, which occure stolen, including credit card numbers.5 dividuals' personal Sony took around two weeks to discover For both data bre

from 17

to

take. such as to

af the individualsaltectcd,

contains

ganisations

Steps

Data

notify

the

hat can be considered in assessing risks and f a c t o

These include the nature of the personal

many o fd a t a are

breache

There

hether they will

inpac

Lead to financial loss, identity theft or other lass of individuals whose personal data are

harm. The clas,

aaia, whe

on the impact of a breach; whether data may produce different

bearing have a kinds. also can breached nployces' personal ed or

ons m must u s t be aware that the risks and impact have an impact on the organisatio and trust, as well as the substano of

tomers' hey a r ec u

ces.

Organisations

on indiviat

well,i n

terms

of

reputation

the breach.

were

that its systems

compromised.6 9.62 Even

worse

than the

Sony

breaches

hadbeen

the two which were only discovered some two to three Yahoo Inc breache aches, years after the personal data theft, and only after law enforcement showed up on the doorstens of the company with copies of extracts from the stolen personal data that were for sale on the dark web. The was company totally unaware of the 2013 breach involving 1 billion users' accounts, until they were notified by the authorities.7

(c)

were

Assessing risks and impact

assessing

risks and

impact

of data breachesis

toassist

organisations to ascertain the scope of consequences to afected individuals and to the organisations. This in turn will inform the

of risks

of

apects

of data breaches and impact as risks and such issues,

organisations, apart impact of further system

technical

the from omises,

pact ofthe

or

or

other

data is likely it one

compromised

organisations,

to

personal data may be on the organisations

uch

be used by

of the key

need

how

and

processe

on

to also assess the non-technical a breach may be facilitated through rocedures, as well as determine what the

organisations

whether

inadequate

vhether the

as

compromised personal

organisations.0 This breaches at information contained in the

others to defraud other

concerns about

the wo massive data

the hackers will use the fahoo Inc, that data to launch other attacks.

stolen

Reporting the data breach

d)

9.63 The aim of

Interms

9.66 This section of the

Data

Breach

Guide

is by far the most

comprehensive and concrete. It gives clear guidance as to whatis reqired, when it is required and how to execute reporting of a data reach" It would appear that organisations are expected to follow the

84

85 86

Charles Arthur,

"Sony suffers second data

more

user details" The Guardian (3 May 2011). theft of 2óm morc Charles Arthur, "Sony suffers second data breach with user details" The Guardian (3 May 2011). more theft of 2om Charles Arthur, "Sony suffers second data breach with

user details" The Guardian (3 May 2011).

87

breach with theft of 25m

"Yahoo under scrutiny artc Greg Roumeliotis & Jessica Toonkel, December 2010). hack, Verizon seeks new deal terms" Reuters (16

314

latest

Personal Data Protection Commission, Guide to Managing Data Breaches (8 May 2015) at 8. p

onal(8 Pe

Data Protection Commission, Guide to Managing Data Breaches May 2015) at p 8.

Data Protection Commission, Guide to Managing Dala Bree (8 May l2015) at p 8.

nal (8 May Data Protection 2015) at p 9.

Commission, Guide

315

to

Managing Dala Breacns

Data

Protection in

Data

Breach Guide and the the requirements.

Care

the

Practical Context

Commission gave

9.6

The

Commission

noted that

individuals affected by take

a

it

data

1s

Some

clear reason. sons for

cialm e d i a ,

impact

breach

whose personal data cludeduals. the rties who have been may need

third and financial be înstitutions, and the to polic Commission also advised to organisations if a notify the Conm "especially data breach involves sensitive

include banks

b e

actions individuals can take.

mmission

very

was

was

clear

The notilied.

dbe w

nibena n d .

the

the

in

breach

data data

in

doing

uhe data

there

harm

urtier

oganisaluons

or

are

damage,

information

the

as possible.

should be made explicit. Lastly, of ways to contact them for

these

details should provide or

assistance.

addresses numbers, e-ma il ail

notiky,

curred, the types of personal data

occu

breach, and what the organisation has done

the risks that have arisen as a result of SDonse to there are specific facts available on thec data b ebreach. Where tho ofwill individuals can take to minimise actions specificc mised

or if

data breach involves sensitive Commission recommended that it personal data, individuals should notified immediately to enable them to take early avoid, or at least minimise, abuse of the necessary actions t potential Sensitive personal data would include credit compromised data 9 details. The period immediately after the theft card and bank accon count of data is most it is during this period that criminals would attempt to usecrucial as stolen records before customers have been notified and had a preventive measures. Thus, it is critical to shorten this chanceasto take period much

Breach Guide about what should include information on

in the Data

notificat

hrther

In terms of when to

media

tions on what

each

personal data"

9.68

through

c-ma.

d f i c a t i o n ss h o

ilease

dividuals to

should guardians or parentsorganisations of young children consider notifvino

compromised. Relevant

be

a

preventive measures to reduce the will enable to notify and may assist in indivi restoring consumer trust. of the data in some situations, may be legally bre: required to noti Oher parties that otify affected individuz

organisations

means woud

easily comprehensible, specific and provide kar astruction

generally good practice as it

breach,

possible

nails, telephone calls, faxes and letters.5 The

affected

i n h i n a i u z l sa l e

each of

ofPersonal Data

These ese

or

can

be

websites.7

through telephone

hotline

the tionale for

notification

to

the affected individuals

seem

the desire to return to individuals some control g r o u n d e d upon dearly data once there has been a data breach. Individuals The

heir personalare

ae

the o n e s

who

most negatively affected by a data breach and in

and justice, they ought to be armed with the interests of fairness since the data counter whatever harm may result, especially

the hility to

hreach occurred through

no

fault of their

own.

9.73

9.69 The Commission noted that another occasion to infom affected individuals would be when a data breach has been resolved, as

the Commission advises organisations to notify he pries, Commission as soon as possible of any data breaches that might cause

9.70

public concern or where there is a risk of harm to a group of afected individuals. To facilitate this, the Commission has provided and a telephone number for this very purpose. The m

organisations would then be in a better position to provide further details to the individuals.

email address

Regarding there

la addition to advising the affected individuals and the relevant third

the methods of notifying the data breach to individuals, effective ways organisations can inform of on the urgency of the situation and the number

individuals

are numerous

depending

lomamnision is explicit about the contents of the notification to the

rersonal Data Protection Commission, Guide to Managing Data Breaches 92

Personal Data Protection Commission, Guide

to

Managing Data

Breacns

to

Managing Data

Breates

to

Managing Data

bruuo

(8 May 2015) at p 9. 93

Personal Data Protection Commission, Guide

94

Personal

(8 May 2015) at p 9.

Data Protection Commission, Guide (8 May 2015) at p 9.

316

8 May 2015) Per

at p 9.

Data Protection Commission, Guide (8 May 2015) at 9. p

to

Managing Data

Breaches

Data Protection Commission, Guide to Managing Data Breacnes (8

98 PersMay

8 May

2015)

at p 9.

ata Protection Commission, Guide to Managing Data Breaches

2015)

at p 10.

317

Dala

Commission available:99 (a) (b) (c) (d)

Prolection in the Practical

and should

clude

extent of the data breach; type and volume of

the

Care

Context

from occurring."

following informa

measures

that

prerent

s h o u l

Commision oganisations, 104

or

terms

in

,

ced

to

and

Even where ecific information on the data brea is not the Commission has advised that yet organisations should to notification the Commission, providing a brief send anavailable int incident.100 Furthermore, the Commission stresseddescription e the that whether notification was made by an as well as organisation the organisation has adequate recovery procedures in whether place will weigh upon the Commission's decision on whether the

organisation has met

the Protection Obligation.101

9.75 The list of items to be included in the notification to the Commission appears to be aimed at imposing full transparency and accountability on organisations. Given the general manner in which the Protection Obligation is set out in section 24 of the Actl and the clear indication in the Data Breach Guide that

a

data breach notification

to

the

Commission is expected, the onus is undoubtedly placed on organisations to do all it can to protect the security of personal data and to be fully prepared for a data breach, a suitably high duty.

be

addressed

existing

weaknesses in 105 Other both

related

technology

physical

issues

be

software

9.74

rational and policy related issues, some of the nclude the frequcncy of audits on inc

of 977

.

(e)

they are not, then new

be considered. The be adopted should hould four arcas that should be considered by sets out fo

imilar breaches

personal data involved: suspected cause of whether the breach has beenthe breach; rectified; (e) measures and processes that the organisation time of the breach; had put in in () information on whether place at the affected been notified and, if individuals of the not, when the dala hu. g) contact details of persons whom organisation intends to ch have the do s further information or clarification. Commission can liaite nd cause

of Personal Data

curity to

security measures and possible

mcasures

such as the use of outdated

nsider may be whether there to prevent a recurrence of the breach

cons.

introduced

ure breaches should if futur damage mit the responsibiliti roles, the involv e d ed,

processcs

r t ol i m i t

partners are

recur. If vendors and and liability of cach

106 reviewed,

should

9.78 The

be

are the resource related issues. of issues to evaluate were enough resources to manage the data there whether ternal resources are needed to better manage whether

sond

second

nch sucth as

area

area

.

breach and

such breaches, 107

9,79

08

It is on personal data protection trained be inportant for employees skills. Employees in many ways act matters and incident management s the custodians of personal data and should be fully aware of security

Third, employee

related issues also need to be considered. to

rehated issues. The review should consider whether these areas can be improved and how to make the improvements.0

Evaluating the response and recovery

9.76 After the data breach has been resolved, the breach and the secunty arrangements should be reviewed to determine if they

are

adequate

99

Personal Data Protection Commission, Guide to Managing Dala bru

100

Personal

(8 May 2015) at p 10. Data Protection Commission, Guide

to

Managing Data

101

(8 May 2015) at p 10. Personal Data Protection Commission, Guide to Managng Due

102

(8 May 2015) at p 10. Personal Data Protection Act 2012 (Act 26 of 2012).

318

to

aches breaee

ersonal DataatProtection (8 May 2015) p 11. 04

to

Data Protection Commission, Guide to at p 11.

May 2015)

Managing Data Breaches Managing Data

Breaches

rersonal Data Protection Commission, Guide to Managing Data Breaches 8 May 2015) at 11. p a8l Data Protection Commission, Guide to Managing Data Breaches May 2015) at p 11.

ona (8 08

Breaches

Personal (8

Commission, Guide

Data Protection Commission, Guide to Managing Dala BreucneSs

May 2015)

at

11.

ersonal Data p Commissior Guide to Managing Data Breaches (8 May 2015) atProtection 09 Perso p 11. (8(8 Mav 901ea Protection Commission, Guide to Managing Data Breaches

May 2015) at p 11.

319

Data

Protection in

the

Care

Practical Context

9.80

was

Lastly, management related issues necd whether there was a clear line of during the management of the data

be

conei

and responsibility breach, both

e x t e r n a l l y . 110

required

pache persoearnal

ered, such

personal

the

ommunicaiandon

co

int

by the Protection Obligation to breach of the when

pondent he w a s in data and dat data to the third

The

to

of Personal Data

tenant. A

Obligation nancial penalty

'13 disclosed

imposcd.

he

was

ofS500 European U n i o n p o s i t i o n

Complying with

5.

Protection

Obligation Security p r i n c i p l e

9.81

From the foregoing, it can be said that the Protection Obliat. strong duty imposed upon organisations. Although the D 1 a is in couched terms Obligation of reasonable security are what would be considered reasonable has a level of heo can be gathered from industry practices. This certainty is clearly level of data acceptable personal protection than the reasonablene test in, for example, the Access and Correction

gements,

even

erroneous

personal

data

can

Obligations, where

remain uncorrected.

1

9.84

assets

such

as

trade secrets which

organisations keep guarded.

Commission has made it clear that one cannot take personal data The that one has been provided with in one's commercial capacity and chooses"

a

personal

or

domestic

capacity

"as and when

he

In Chua Yong Boon Justin,"2 the respondent was a real

estate agent who disclosed the full names and NRIC numbers of two

third tenant. The Commission made it clear that it h because of the tenancy agreement that the respondent came to nav his possession the full names and NRIC numbers of the two ten and, as such, the personal data was obtained in his co tenants

I1o

to a

Personal Data Protection Commission, Guide

to

(8 May 2015) at p 11.

[2016] SGPDPC 13 at [13]. Chua Boon justin 112 [2016]Yong SGPDPC 13.

320

Managng vue

95/46/EC stated quite explicitly the

personal data, which includes the collection

processing data, to be secure.11 Article 17 effectively sets o f the security principle in great detail. and all the r e q u i r e m e n t s iis that "such measures shall ensure a level the verriding to the risks represented by the processing and of security a p p r o p r i a t e 15 which has the same effect as be protected" to data the of storage

of

personal

requirements

out

nature

legislative he Singapore g

requirement of being "reasonable".

9.85

Data Protection Regulation 2016/679, Article 32 In the EU General of processing and is very similar to its EU Data deals with the security 95/46/EC counterpart, except it is even more Directive Protection detailed and explicit. Under Article 32, organisations "shall implement ensure a level appropriate technical and organisational m e a s u r e s to which is a long-winded wayof to the risk", appropriate ofsecurity

expressing a standard that is reasonable to the circumstances. Articles 32(1) and 32(2) list some of the issues that considered as part of the security measures, such as the technical

need to be

9.83

disclose it in

of

The need forthe

the

9.82 It would appear that as long as organisations adhere to industr standards, they would meet the Protection Obligation. It is thus essential for organisations to be aware what the of industry standards are and to engage skilled personnel where necessary, especially in specialised areas such as the management of information security. In terms of protecting personal data, organisations would do well to treat personal data like any other asset that organisations hold, whether it be physical assets that they guard under lock and key or non-tangible

Directive

Protection

EU.Data

Breachs

requirements,17 including ensuring the ongoing confidentiality,

integrity, availability and resilience of processing systems and services, 25 well as all the different ways that risks can arise, such as through loss

and alteration.118

9.86

cie 5(1)( of the EU General Data Protection Regulation 2016/679 pinciples regarding the legitimate processing of personal data

Chua Yong Boon Justin [2016] SGPDPC 13 at 114 [22J. 15 Fata Protection Directive 95/46/EC, Art 17. 16 ata Protection Directive 95/46/EC, Art 17(1). I1 General Data ilation 2016/679, Art 32(1). EU General Data Protection 118 EU 2016/679, Art 32(1). Regulation Protection e r a l Data (2). Protection Regulation 2016/679, Art o414 321

Data

standard aDDropriate security

also sets the

Care of Personal Dala

Proteclion n the Praclical Context

of

processing personal data ta to personal data includinto be or unlawtul unauthorised procesSing and destruction or damage, using appropriate against of the

9.87

which

to

EU

(d 2ddr measur

organisatioloss,nal

is

Pro code to be used a

an

otecionof

further

its p o s s i b l e

be taken

including,

adverse effects.

by

the controller

where

to

appropriate,

rOvide information is an enduring one, as where pr rovide all the information together at the same rmation may be provide in phases without undue nilar to the requirements set out by the T h i s is

delay. in

128 Singapore.

Commission

security princinle 20dn's

breach notitication

9,91

to

1s

core

a

off o

similarity in the information required in the

breach notification of the EU and the breach requirements of the Commission. The Commission information on the cause or suspected cause of the breach, is not required by the EU law, instead, the EU General Data this Dtection Regulation 2016/679 requires information o n the likely of the personal data breach, which the Commission does

supervisory authority

There

data

person,

notification

EU

requires

.

a

consequences not stipulate

a

in the EU General Data Protection Regulation 2016/679 is the duty to

maintain a record or register of all personal data breaches,129 The facts must be recorded, along with its effects and the remedial action taken. This internal breach register

relating to each personal data breach

9.89 The minimum information that

must

are:126

(b)

the

nature

(c)

of the

personal

be

provided

data breach,

enables the supervisory authority to verify whether compliance has in the notificaion

been met.130

including the categories and

(c)

approximat number of data subjects concerned and the categonies and approximate number of persornal data records concerned; the name and contact details of the data protection officer or other contact

necessary.

An additional duty required of organisations that handle personal data

natural persons.125

(a)

as

9.92

not

a

the likely consequences of the personal data breach; and

Regulation 2016/679, Art5 120 EU General Data Protection Regulation 2016/679, Art 34 35 and o E U General Data Protection Regulation 2016/679, Arts Art T22 EU General Data Protection Regulation 2016/679, 534 Art 30 23 EU General Data Protection Regulation 2016/679, 2016/679, Art 33 E U General Data Protection Regulation 125 EU General Data Protection Regulation 201b/o 38/3)

data breach is likely to result in high risk for apersonal rights and freedoms, the organisation will also have the a

vduals

ation to notify the individuals of the breach without undue Article 34 (2) mandates that the notification to affected als must contain the information that is

EU General Data Protection

EU General Data Protection

Regulation 2016/6/9, 322

Personal data breach notification to affected individuals

9.93

point where more information can be obtained;

f

126

not

it time, the in.

General Data Protection Regulation 2016/679 introduced new mandatory requirement of personal data breach notificationa all applies across that industry sectors.*" lt mandates process personal data must nouty the competentthat those who holdor supervisory authoritv without undue delay after becoming aware of personal data breachl where and, feasible, within 72 hours. If the 72-hour met, reasoned justification for the delay must be timeframe is only exemption from this requirement is where theprovided. The personal data breach is unlikely to result in a risk to the rights and freedoms of

119

mitigate

to

breach,

T h er e q u i r e m e n t t o 9.90

9.88

The

:s to

data

ental

General Data to

adherence

cerufication

Personal data

(b)

the

approved mechanism demonstrate compliance with the

or an

stecionensur agaiinnstg

proposed

tako

the personal

the meas

pOssible

Importantly, Article 32(3) of Regulation 2016/679 enables

hv

one of ens

technical or

mcasures".19

conduct

casures (d)

27

required in the

breach

eneral Data Protection Regulation 2016/679, Art 33(4). (8BMay Commission, Cuide to Managing Data Breaches May 901a 2015) atProtection p 10. EU neral Data Protection Regulation 2016/679, Art 55(9 EU 131 EU Ceneral Data Protection. gulation 2016/679, Art 33(5). General Data Protection.Regulation 2016/679, Art 34(1) 128

323

Data notification

to

the data

must

language"

Protection in the Practical Contert superviso

Care of Personal Data us

p e r s o n a l c d a t a ,1 3 9

plain

9.94 There are three exceptions to the requiremen

those measures

and organisational protecti.on

applied

were

the

to

1telihood

compromised

of

episodes

the

encryption

identity

personal

affecteasures, and encrypted, personal data, other forms ofeffectively limi the

theft or of thee Yahoo Inc data

method

was

misuse."

owever, given asily cracked

breaches, where

employed, the actual

individuals"

Sanctions

notficaion impleme

data personal data breach." An example of this is where was

encral Data

ener i s k for the

rights

:and

t0

freedoms". 110

high

affected individuals. First, where the organisatior technical

appropriate

cOmparable

the position undcr the EU Protection Rcgulation 2016/679, which uses the test of

authority and that "clear

be used.

encryption

technology

implemented would need too be asscssed. Yahoo Inc was. using discredited technology for data known rently stil as in 2013 when the breaches occurred. This was MD5 well after Mellon University's Software Engineering Institute had issued an warning in 2008 to security professionals through a US gowe alert that funded vulnerability MD5 "should be system sidered cryptographically broken and unsuitable for further use" conside

encrypting

9.97

for

for

non-compli

sanction

hefity to meet

the

personal

organisations ito

ertaking

(an

Protection Regulation 2016/679 introduced ce that should be highlighted. Failure reach notification requirements exposes data bre

Data

General EU

The

non-Compliance

administrative fine

an

enterprise

tal worldwide

annual

of

up

group of turnover of the

within

a

to

¬l0m

or

in

enterprises),

preccding

case

of

an

2% of financial year, up

to

the whichever is higher.

Carneg

PERSONAL DATA RETENTION OF

C

Retention Limitation Obligation

1.

9.95 The second

exception

which

is where the that the

organisation

has taken subseauen

high risk to the rights and freedoms of data subjects is no longer likely to materialise.50 The last exception is where notification to the affected individuals would involve measures

ensure

disproportionate effort. In such a case, there should instead be a

public communication or similar measure whereby the data subjecs are informed in an equally effective manner. 137

9.96 aim of notification to affected individuals in EU law appears be The the same as that espoused by the Commission for notfication to to

atfected individuals under the Singapore statute: to allow

atfecied

elves. individuals to take the necessary precautions to protectthemselves

Although the Commission in Singapore recommended that indido Only need to be notified if the personal data breach involves seisu

3UGeneral Data Protection Regulation 2016/679, Art34 38 EU Ceneral Data Protection Regulation 2016/679, ATt T34

135

19

9.98

the retention of The Retention Limitation Obligation concerning Act2 it requires a n and of the section 25 in out personal data is set to c e a s e to retain personal data as s o o n as it is reasonable organisation data was collected is to assume that the purpose for which the personal the of retention served no personal data and that

by

longer being

retention is no longer necessary for legal or business purposes. The legislation does not specify minimum o r maximum periods for to hold retaining personal data, but organisations may be required personal data for set periods of time under other legislation o r

Sectorial requirements. The Commission aptly warned that organisations should not retain personal data in perpetuity where it has no legal or business reasons

to

do so.113 Thus, personal data should not be

retained just in case the data is needed one day for some untoreseen

reason.

EU General Data Protection Regulation 2016/679, Atohlems a stoy

onal(8 May DataatProtection Commission,

Joseph Menn, Jim Finkle & Dustin Volz, "Yahoo securiy pa of too little, too late" Reuters (18 December 2010). UGeneral Data Protection Regulation 2016/679, Art4 c

l41 ETneral Data Protection Regulation 2016/679, Art 34( Art 83(4) (a) 42 Perso Personal Data Protection Regulation 2016/679,

a

E U General Data Protection Regulation 2016/679, ATR6 86. 138 EU General Data Protection Regulation 2016/0, * 324

2015)

143

Cuide to

Managing Dala

Breaches

p 9.

Data Protection.Act 2012 (Act 26 Personal in the Perta onps Data Protection Protectior Commission, Advisory Guidelines on Key 18.2. ETSOnal Data Protection Act (revised 15July 016) para of 2012).

on

325

at

Data

Prolection in the

Care of Personal Data

Practical Context

9.99 Section 25 establish the test for can be retained to be one of be considered a reasonable period will for collection and other legal and business retention of the personal lata may be

inte t h e i r personal data into classes so that it may mayingroup the rationale for why some personal data is kept

Oganisationsm a yg

determining how

nableness. The durlo ng personal that wouldatad depend greatlyuration on

purpose thepurposes nersonal data may need to be retained to necessary. FFor hich the generate which may entail the personal data kample, being kept for one data is required for Teports yea i personal ongoing legal action need to be retained for much involving longer.

explain

to

in

e

recor

the

organis

1S

data

nal

.

should

data

uher

personal

piece

data management to ensure that and stored in a manner which facilitates Retention Limitation Obligation. " Reviews

personal

elop procCsses

an

then it may

periods of time.'16 Organisations also need to

ively long peri

casicr

be

conducted on a regular basis to determine

o f personal

data is still needed and should be da

particular

{a eltained

9.100

The same type of personal data collected for more or or less less the purpose but collected in ditferent settings can sometimes hrin same of different conclusions what may be considered a reasonable neriod of retention. For example, security cameras in a restaurant would h the purpose of capturing incidents such as have rowdy naer leaving without paying and so on. The reasonable patrons or patrons period of retentin ention for such images may only be a very short period of time because anu incident or event requiring a review the

of images would arise quickly. In the event of incidents, the images would need to be fairlw longer for investigative and law enforcement purposes. If thiskeptis compared with images from security cameras installed to deter fraud or theft at a bank's automatic teller machine ("ATM"), the footage at

an ATM would need to be retained for at least a few months as fraudulent transactions may not come to light before victims receive

their bank statements. Further, in the event of a series of ATM

fraudulent transactions, the images may assist to determine if there is a pattern over a period of time.

8103

on hOw long it retains personal and used under the exemptions set may Third and Fourth Schedules of the Act.45 Although Second, he data can seem to be kept without constraints,

Organisations

should exercise

have

ou

of the

care

been collected

personal

data is publicly available,4 the Retention the personal. data from retained all in fact prohib. imit Obligation no longer being served or if there are is collection its Durpose for for the retention of the personal data. All n leral or business purposes such as the Protection Obligation and me

chas

where

being

personal

data Obligations to all personal data Retention Limitation Obligation apply the personal data was exempted from the whether of irespective

de personal the

Consent Obligation and the Notification Obligation. 9.104

in terms of the meaning of ceasing to retain in section 25 of the Act,150 the Commission has stated that this means no longer having access to the documents and the personal data they contain. This means that

the personal data is inaccessible or irretrievable to the The Commission gave some possibilities of what may satisfy this, and

organisation.

9 .101 144 Given that the statute of limitation is six years for contracts and torts it would seem reasonable to deduce that some personal data can

p

kept for at least this long. In this regard, the Commission appeare permit personal data relating to contracts to be retained lor e the ule years from the date of termination of the contract, gven statute of limitation period is six years." 9.102

Organisations should develop personal outlining their approach to retention periods data

retention

tiey included returning the documents to the relevant individuals,

uasterring the documents to another person on the instructions of a

SOnal Data Protection Commission, Advisory Guidelines om Ky onceps 142DePersonal Data Protection Act (revised on 15 July 2016) at para 18.8. a l Data Protection Commission, Advisory Guidelines on Key Concepis Data Protection 2016) at para 13./. on

Peeonal ersonal Data

po

for personal data

150

Act (revised 15 July rotection Act 2012 (Act 26 of 2012). Protection Act 2012 (Act 26 of 2012)

Sched, Pan1(c); Data Third Sched, ara 1(c) and Fourth Sched, para Second 1(4). Personal Data Protectior Act 2012 (Act 26 of 2012). Personal Data Protection Commission, Advisory Guidelines Key Concepis nthe Personal Data 2016) para Act (revised Protection 15 July Personal Data Protection Commission, Advisory Guidelines on Key Concepts in the Person on

144 145

Limitation Act (Cap 163, 1996 Rev Ed) s 6. Personal Data Protection Commission, Advisory 272 the Personal Data Protection Act (revised on 15July

Guidelines

326

2010)

on

ap

Key

Coneys

18.4

on

d

Protection Act

(revised on 15 July 2016) 327

18.10.

at at

para

18.12.

Data data subject, the documents

Protection in the Practical

Context

destroying the documents such ch as by de-identüilying personal data. 153 properly shredding

9.105

There

Care

they

which

or

"

r3, processing" ected

is

in

a permanent and complete manner.51

broadly defined and includes storage, statute

S Siin ng ga apore

in the the

there

restrictions

he r

as

long

rovision would be equivalent to pro that personal data should only

this

hence

nsultation,

are

chnically, depending

Personal Data

further processed".l56 As discussed in

are

very

in

also situations where an to make the organisation may have personal data inaccessible have attempied inaccessible, such as where documents but it ma may not be totally hat have remain in the been organisation's premises. shredd cd still shredder used and the thinness the shreds of of nossihle to re-access the paner the data by be all the together. To deal with suchpersonal piecing grey areas, the shred. consider four factors to determine it an Commission said it wowould retain the personal data. The factors are organisation has ceased whether the any intention to use or access the organisatio to has personal data; how much eftort resources the organisation would nced to in order to seLand expend access the personal data or again; whether third parties have been given access to the personal data; and whether the organisation has made a reasonable attempt to destroy, dispose of or delete the personal data

of

are

legal

or business purposes to do so.

as

k e pf t or,

Generah

Data

Regulation 2016/679157 is als that personal data should be kept

Protection

provides and

orded tthan han

gpnilarly longer data

are

is

necessary

ocessed".58

processed".

no

or however,

sonal

2016/679,

tjon

hegula

personal

be data will da

interest,

public bject the gauistical purposes sub in

the

The EU

purposes for which the Data Protection

General

longer periods of retention for archiving pur solely processed

Lroduced intro

tific

scientifi

the athere

for

historical

or

rescarch

purposes

or

appropriate to implementation order to safeguard the rights m e a s u r e s in of the

a n do r g a n i s a t i o n a l tecthnte

and

freedoms

of the

data subject.

159

General Data

9.109

Recital 39 of the EU however, that s t a t e s that:16 2016/679 Regulation relevant and limited to data should be adequate,

hshould be noted,

9.106 These four factors will be of great relevance in the

Protection

electronic personal data such as those residing on computer servers, portable devices such as laptops and mobile devices such as tablets and mobile phones. If personal data has simply been placed in the "rash bin" on a laptop which can be restored casily by a few clicks of the mouse, the organisation will probably not be considered to have ceased to retain the personal data.

European Union position

2. 9.107

data is

simiar

of personal position in the EU on retention The EU Data Protecton to that of the Singapore legislation. 10r data should be kept that personal Directive 95/46/ECI55 stipulates wete data for which the no longer than is necessary for the purposes The

153 54

155

Conceps 18.10. Advisory Gudetanesat Personal Data Protection Commission, 2016) para Cones on 15 July the PersOnal Data Protection Act (revised

272 Personal

Gudenesat

Data Protection Commission, Advisory 2016) on 15 July Data Protection Act (revised Personal in the Art 6(1)(¬). 95/46/EC, Directive Protection EU Data

328

pa

18.13.

what is

This requires, in personal for which they a r e processed. data are stored is necessary for the purposes the which personal that the period for Darticular, ensuring

of

electronic personal data and the techniques organisations employ to delete case

The

limited

to

a

strict

minimum.

9.110 contextualise and minimum" appears to This requirement of "strict data "for no of keeping personal qualify the general requirement the which personal data for longer than is necessary for the purposes adhere to the to are processed".ioi It places the o n u s on organisations there may be vague sinct minimum" requirement, so that even where business purposes, for Tcasons why personal data need to be retained a closer evaluation to dictate e strict minimum" requirement will

shop might argue ertain the "strict minimum". To illustrate, a pizza and addresses of all its s

business

reasons to

keep

the

names

the for a period until S Who have bought a pizza from it maximuin a limitation ends. Realistically, however, after

EU 57 EU Data Protection Directive 95/46/EC, Art 6(1) (e). 5(1)(e). gulation 2016/679, Art 158 EU General Data Protection Art 5(1) (e). 2016/679, Protection 159 EU Regulation General Data Data Protection Regulation 2016/679, Art 5(1)(e). EU General

General!

6)

Data Protection Regulation 2016/679, Recital3 EU neral eral Data Protection gulation 2016/679, Art 5(1) (e). 329

Data Protection in the Practical Context

riod of one year, there appcars

to be few reasons retain such personal data, i especially if no claims why or other incidents have of food ould need been nade it. Even ses, it may not be foor taxation to necessary retain the recor customers' names and addresses tor so In long. minimum" would likely be not more than one this case the "strictthe year. to

against

poisoning

CHAPTER1 0

Transfer Limitation Obligation

9.111 Under the EU General Data Protec ion Regulation 2016/679.1 time of personal data collection, the data subject should be at he of the envisaged retention period or, if this is not inform used to determine the retention possible, thecritena cr period. 9.112

Probably

one

of the most

in the EU

General

retention

periods

environment. chapter 11.

signiticant

Data Protection is the right to

The right

to

be

new

rights given

to

Regulation 2016/679 individel, relatedeto be forgotten

torgotten

in the n online will be

discussed

n

10.1

in the final Personal provision that was passed section 26 on the transfer of is "Act")' 2012 (the Data Protection Act The limitation on transfer was not outside Singapore. Dersonal data and one can only speculate that it may have addressed in the draft billF on the European Union-Singapore discussions the been spurred by which was completed in 2014. The Transfer Free Trade Agreement, in the Act, grouped Limitation Obligation is the last of the Obligations under Part VI (Care of Personal Data). Onc

surprising

new

10.2 Section 26(1) provides that an organisation must not transfer any outside Singapore, except in This is to requirements prescribed under the Act. ensure that organisations provide a standard of protection to personal data that is comparable with the protection under the Act in Singapore, Even when the personal data is transferred out of Singapore. However, personal data to

a

country

or

territory

accordance with

ganisations may apply to be exempt from this requirement."

10.3

ompliance with this provision falls upon the organisation sending ne personal

62 l63

EU General Data Protection Regulation EU General Data Protection Regulation

330

2016/679, Art 13(2)1a) 2016/679, Art I7.

data

overseas,

so

it would

appear

that

the Senaing

Act 26 of 2012. Publc Consullatnon o t Information, Communications and the Arts, the Ars: Proposea Communications and Information, of Mnistry Pe ersonal Data Protection Bill (19 March 2012). and 26(3). a t a Protection Act 2012 (Act 26 of 2012) ss 26(2)

331

Data

organisation

may look

undertake contractual

protection is given. A.

to

in the

TransferLimitation Obligation

Practical Context

the laws of

the mechanisms to ensure foreign i an

data is: simply atthis ersonal

ctton or

1gpears that

tistying

an

can set out

two

personal data protection provisionsto ensure that 9(1). iwill in

data remains

its

while the nen control second sonal

under its organisation must takepossession to ensure appropriate steps of the that the recini the personal data outside Singapore is bound n by legally obligations to protect the personal data in enforceahi that are at least accordance comparable to the protection underwith standard. or

Singapore.

the Act inin

10.5

the

the

seconc

taken to have satistied the first personal data is in transit or publicly available in requirement if the Singapore The tem "data in transit" has a long definition and means:3

personal

are

data transferred

through Singapore or

in the course of onward country territory outside Singapore, without the personal data being accessed or used by, or disclosed to, any organisation (other than the transferring organisation or an employee of the transferring organisation acting in the course of the employee's employment with the transferring organisation) while the personal data is in Singapore, except for the purpose of such transportation.

transportation

to

a

deal with the

requirement: Explicit

situations

requirement, the Persona Data Protection seven explicit situations where an 2014 provides have satistied this requirement. The first to taken be second

Regulations

can

where the individual consents to the transfer of is wh. in that country or territory, 10 al data to the recipientis f valid In order for such consent such c o n s e n t given However, n o t .all isation

anganis

situations

these.

the personal

have, before giving his consent, been in writing of the extent to which summary a vided with transferred to that country or territory will be be to data the to the protection under the Act in s t a n d ard r d comparable a rotected to must also not have been obtained by the valid,

the

0 be

ividual

must

reasonable

poud

persona

Ca3Dore.Consent

Organisations

to

Singapore en route

REGULATIONS 2014

Before Regulations 2014 provides requirements. vides more details it must organisation transfer satisty perOn requirements in must take data organisation regulation appropriate steps comply with the

overseas, First, the

attempt

assing through servers within

its destination overseas.

sination where

of

Personal Data Protection

of the

is an

definition convoluted

equiy

PERSONAL DATA PROTECTION

10.4

The

Protection

as

usferring organisation erice, unless the transfer

a

condition

of

providing

a

product

or

provide the reasonably individual." Finally, in obtaining the consent the to oroduct or service information to obtain the consent, false or misleading necessary to

is

or attempting

and other deceptive or misleading must not have been provided used." A classic example of where an been have not must

practices

individual would give consent is where an individual is travelling use her overseas for a holiday. For the individual to be able to

Aantomated Teller Machine ("ATM") card overseas to withdraw money, she would have to give consent to her financial institution to transfer

her personal data overseas to facilitate access to her account, including account details such as the available balance for withdrawal. 10.8

C Second situation where an organisation can be taken to have Asted the second requirement is where the transfer of the personal tothe recipient is necessary for the performance of a contract DEDWeen the individual and the transferring organisation, o i n Data Protection Commission, Advisory Guidelines on Key Concepts

S 362/2014. 5

6 8

Personal Data Protection Regulations 2014 Personal Data Protection Regulations 2014 2014 Personal Data Protection Regulations 2014 Personal Data Protection Regulations

332

(S 362/2014) reg 9 (S 362/2014) reg (S 362/2014) reg9o. (S 362/2014) reg

12 13

Peeonal Data Protection Act (revised on 15 July 2016) at para 19.7. Personal Data Protection Regulations 2014 (S 362/2014) reg 9(3) (a). Sonal Data Protection ulations 2014 (S 362/2014) reg 9(4) (a). Persona Data Protectic Perse 2014 (S 362/2014) reg 9(4)(6). Regulations ersonal Data Protection.Regulations 2014 (S 362/2014) reg 9(4)().

Person

333

Data

anything entering

example (the

at the

into a of this

Protection in the Practical

Transfer Limilation Obligation

Context

individual's request with contract with the ransferring view orgto given by the Personal

mely way" pected to with

Data Protection sation" An where an with travel In order to make s ionman the hotel agency that in inchudesindividual hotel accepupurCommi c hases the transferring organisation, reservations, travel agency, whi c h need personal data to the hotelswould he immodat ndiidhishuatiotn.h'se overscas.' in This transfer requirement regulation 9(1). would satisfy

transfer

of the

conclusion

or

the

use

a

organisation

servers are

personal

located outside

data out of

considered

analyse

to be in

of

its

is disclosure

uscor

the

sfer ing

adopt cloud-based clientis personal data and comnuia theputing dod

To transfer Singapore." the individual and on to

Singapore

the cloud servers would

the individual's interest as this would the fulfilment of the contract between the individual

organisation.

he facilitate

and he

certain

the

that the

health

or

satety

affcct

of the individual

and

consent for

or

another

the disclosure

seriously will be and b e .obtained in a timely way," the next-of-kin of data contacting the purpose of tlh for fthe for individual

cannot

the

nd ofany

is

injured

ill

or

deceased individual

or

5

to transferring the personal data overseas, the reasonable steps to ensure that the personal on must take In all sclosed by the recipient for any other o r discl. used be under one of these will n o t scenario that would fall 20 A typical is seriously injured whilst overseas and a n individ is where uires the patient history of the individual 10.11

ch

cases,

prior

Ogan

dala

situation

the overseas hospital before surgery

can

take

place.

10.12 a n organisation is taken to have seventh situations where The sixth and in regulation 9(1) are where the satisfied the second requirement the personal data is publicly where and transit" is in personal data available,3" respectively.

10.10

Fifth, the second requirement in regulation 9(1) is satisfied where the transfer overseas is necessary for a

necessary in the national interest:23 itions, there are reasonable grounds to

conditions

to

subject believe

,

third party which

to store or

the

anotherindividual;22

hl

an

the tana the request or which a reasonable is entered into at the indiui person would consider to dividual's individual's interest." The example he the which the where an Commission gNe decides to a was

solution

o r

disclosure

personal a

reasonably

the life, that threatens the

second

organisation can he in requirement regulation 9(1) is wherken data to the is recipient the of pertormance contract betweennecessary

organisation and

not

is necessaTy to respond to an emergency health or safety of the individual or

discl osure lasture be

a

The third and fourth situations where have satisfied the second

the individual would

ained

"Commission") is the situationon overseas tour

10.9

or

ithhold consent;2

a

also taken to be

disclosure in certain situations where the consent of the individual is not required use

or

under the Act. These are where:

(a)

the use or disclosure is necessary for any purpose which is clearly in the interests of the individual, if consent for its use cannot be

20

2 14 15

16 17

19

Personal Data Protection Regulations 2014 (S 362/2014) reg93)0

Personal Data Protection Act 2012 (Act 26 of 2012) Third Sched, para 1(a) and Fourth Sched, para 1 (a). Data Protection Act (Act 26 of 2012) Third Sched,

Personal

2012

para 1(a).

2Personal Data Protection Act 2012 (Act 26 of 2012) Third Sched, para 1 (6) and Fourth Sched, para 1(6).

Personal Data Protection Commission, Advisory Guidelines on Key Conces in the Personal Data Protection Act (revised on 15 July 2016) at para 9:

23

example 2.

Data Fersonal para 1 (c).

Personal Data Protection Regulations 2014 (S 362/2014) reg 913)G. Personal Data Protection Regulations 2014 (S 362/2014) reg 9( Guidelines on Keay Cones Personal Data Protection Com ISsion, Aduisory 1s 2016) at para n the Personal Data Protection Act (revised on 15 July

example 3. Personal Data Protection Regulations 2014

334

(S

362/2014) reg ON0

Personal para

Data Protection

Act 2012

1(d) and Fourth Sched, para 1(e).

2

Data ersonal para 1(0).

Protection

(Act 26 of 2012) Third Sched,

Act 2012 (Act

26

of 2012)

Fourth Sched,

Protection Act 2012 (Act 26 of 2012) Fourth Sched,

27Ponal Data Protection Regulations 2014 (S 362/2014) reg 9(3) (e. 28 POnal Data Protection Regulations 2014 (S 362/2014) reg 9(3)).

ersonal Data ProtectionlRegulations 2014 (S 362/2014) reg 9(3) (8). 335

Transfer Limilation Obligatia

Data Proletion inthe Practical Context

Satisfying the second requirement: "legally enforceable

2

dircctly

or indircctly, controlled

the recipicnt and the

obligations"

indire

ctly, under the

control

by the trans

ransferring of a

common

aced in the European Union

ules surface

10.13

of these seven scenas cannot tall under any one 1arios, If an organisation can sausIy the second requiremer it it ascertain in it nceds to then regulation 9(1) by taking appropriate steps to ensure that the recini ipient bound by legally enforceahi outside Singapore is of the personal data in accordance with standard data the personal obligations to protect to the protection under the Act ct in that are at least comparable Singapore.2"

10.14

examples of what would constitute lerall,. Regulation 10 provides list is fairly broad and includes any law The enforceable obligations. the recipient contract must, however, require and any contract. The transferrcd to it, a standard of data the personal to rovide to to the protection under the Act is at least comparable that protection the countries and contract must also specify in Singapore" and the transferred under the be data may the territorics

contract.

to

which

personal

would

contract To this end, the in Singapore, Act the in set out

Obligations view that if th has expressed the Protection and intermediary, only the need to be addressed. 10.15

need

to

although

address all the

the Commission

overscas recipient is a data Limitation Obligations

Retention

binding instrument. binding legally

or to the transferring organisation.3" if the recipient, directly related to the transferring organisation the recipient is, the transferring organisation;" indirectly, controls

30

Personal Data Protection Personal Data Protection

31

Personal

32 33

34 35

36

37 38

Data

Protection

Personal Data Protection Personal Data Protection Personal

Data

Concepls in the

Regulations 2014 Regulations 2014 Regulations 2014 Regulations 2014 Regulations

Protection

2014

Personal Data Protection

(S 362/2014) (S 362/2014) (S 362/2014) (S 362/2014) (S 362/2014)

Advisory Act (revised

Commission,

at paras 19.5-19.6. Personal Data Protection

reg 9(1) (6). reg 10(1) (a). reg 10(1)(6). reg 10(2)(a). reg 10(2)(6).

Guidelines on

on

15 July

201)

(S 362/2014) reg 10(1)(¢). Regulations 2014 (S 362/2014) reg l10(1)(). Personal Data Protection Regulations 10(3)(9. 2014 (S 362/2014) reg 10(4)(). Personal Data Protection Regulations 2014 (S 362/2014) reg Protection Regulations Data Personal 2014

336

or

corporate the EU pragmatic means of laws; thesc will be as

10.16 binding corporatec nules must require The evcry recipicnt of ansferred personal data to protect the the data personal transferred to it, of protection hat is at least ndard at a s t to the tion protectio theAct in Singapore The rules must also corporatc of the transferred recipients the personal data to which specily rules apply;? the countries and territories to the ding corporate which lata may be transferred under the

comparable

binding

under

binding corporate the

personal

rules"

and

obligations provided by

the rights and

corporate r u l e s , 1

10.17

binding

rules

arc usctul mechanisms in situations where a may have all of their employee or customer group data processed in one locatio which is outside Singapore. be payroll operation or customer fulfilment These could operations. be transferred fron all around the Personal data would need to world location. Under the Personal Data Protection

orate

Binding c o r p o r a t e

companies

ersonal

Regulations 2014,

t the Singapore legislation, the transter of personal data outside

enforceable obligations can other rules" as well as any corporate the recipient is related be c a n only used where data is Binding corporate nules A recipient of personal

29

discusscd below.

are, person." Bindingdirccdy

x long as binding corporate rules mect or exceed the protections

also take the form of

Legally

ng similar requirements under

meen

erring organisation;

sanisation

the Singapore will satisty

3.

second

Assessing the Transfer

requirement in regulation 9(1).

Limitation

Obligation

10.18 The Transfer Limitation Obligation is a codification of the most efiecdve and workable aspects of the solutions currently found in international practice for protecting personal data that is transferred ONerseas. The Personal Data Protection Regulations 2014 is very clear in permitting the common situations where personal data need to be

9Personal Data Protection Regulations 2014 (S 362/2014) reg 10(4) (6).

Personal Data Protection Regulations 2014 (S 362/2014) reg 10(4)(c).

Fersonal Data Protection Regulations 2014 (S 362/2014) reg 10(3)(a).

Personal Data Protection Regulations 2014 (S 362/2014) reg l0(3)(6) (7). Data Protection Regulations 2014 (S 362/2014) 4ersonal reg 10(3) (6) (in). ersonal Data Protection Regulations 2014 (S 362/2014) reg 10(3)(6)(in). 337

Data

Protection

Trans/er Limitalion Obligation in the

Practical Context

ransferred out of Singapore. In fact, reflect permitting transters of personal data that they were set

Protection Directive 95/46/EC5

the

out in

10.19

Commission has made d.

TogatDataions

the El

Indeed, the only shortcoming with the implementation of the T Limitation Obligation may be the standard of the Singapore protection iransier legislation itself: due to the relatively ed by weak given by the Singapore legislation, most protecti other jurisdiction ecion existing personal data protection laws may well with offer level of protection. a

mparable

10.20 It remains to be seen if the Commission will provide guidance forthe purposes of the second requirement in route that the EU has taken over theregulation 9(1) by taking ng ihe decades, by declaring data personal protection laws of certain jurisdictions to be comparahlethe to the protection under the Act in Singapore.16 .

B.

EUROPEAN UNION POSITION

1.

EU Data Protection Directive 95/46/EC

is the competent body to assess the level of personal data protection in and it consults the countries

through adequacy findings,

European garding Canada's

lhe

an

adequacy finding,

on

assessments with the EU Article 29 Data Protection Working Party

("WP29").

furisdictions where the Canadian legislation is

example

ould h ply European Commission also made an:adequacy finding icable.

nduct, the the US Safe Flarbour Privacy Principles" The was a voluntary scheme where US businesses would the code of conduct. However, this finding of with

conduct,

for

Code

of

a

code o fc o n d u c t

to

in

Court of Jusice of the in the Cou in Maximillian Schrems v Data Prolection Commissioner,

comply

Union

European

challenged

was adequacy

("CJE'U")

in 2015 invalidated the European Commission's

US Safe Harb decisionon the and

10.23 to Subsequentto

blished publis The

WP29

its

Privacy Principles.

EU-US Privacy Shield was created to Privacy Principles. On 13 April, the WP29 the adequacy of the EU-US Privacy Shicld.5

this decision, the

Safe replacethe US

Harbour

on opinion oubts

casted

dou

on the adequacy of this new scheme but on

the European Commission formally adopted a decision Shield.32 Organisations adequacy ot the EU-US Privacy confirming to the standards set out in the EU-US Privacy self-certify in the US may 2016. Shield from 1 August 10.24 of the long-perceived uncertainty of the It is amidst the backdrop of conduct such as the US Safe Harbour code a of adequacy of Privacy Principles that organisations within a multünational group 48

Commission Decision 2002/2/EC of 20 December 2001 pursuant to Directive 95/46/EC of the European Parliament and of the Council on data provided by the Canadian the adequate protection of personal Electronic Documents Act [2002 nformation Protection and

Personal OJL 002/13.

pursuant to Commission Decision 2000/520/EC of 26 July 2000 of the Council on Drective 95/46/EC of the European Parliament and harbour e adequacy of the protection provided by the safe issued byprivacy the 50

Pnciples and related frequently asked questions US Department of Commerce [2000] OJ L 215/7. Se362/14 (6 October 2015) ECLI:EU:C:2015:650, available at p:curia.europa.eu/juris/documents.jsf?num=C-362/14> 1 June 2016).

45

the Coune Parliament and of Directive 95/46/EC of the European with regard to e individuals of 24 October 1995 on the protection movement of sucn data and on the free processing of personal Ant Protection Directive 95/46/EC), Data ("EU reg>u I995] OJL 281/31 362/2014) 2014 (S Personal Data Protection Regulations Art 25(1). EU Data Protection Directive 95/46/EC,

338

for

personal data protection legislation," so

2016, 12July the

10.21 Under the EU Data Protection Directive 95/46/EC," if a non-EU country (third country) has an adequate level of data protection, then personal data can flow freely to the third country. The requirement is of adequacy and not equivalence. In accordance with Article 25(6)od the EU Data Protection Directive 95/46/EC, the European Commision

foreign

a.22

(accessed

Article 29 Data Protection Working Party, WP238, Opinion01/20 on 13 Apnl vacy Shield draft adequacy decision (adopted 2016) 4 l 7 6 final, Commission Implementing Decision of 12July 2010 Cant to Directive 95/46/EC of the European Pariament uncil on the adequacy of the protection ovided by the

Privacy Shield.

339

EU-UJS

Data

Protection in

companies which need,

as data to and from part each corporatc rules.

personal

Transfer Limilaton Obligalion

the

Practical Context s

ot their

business processes. other, have tako aken the route ransler Binding corporate rules are of bin internal rules t

adopted by multinational tinding global policy governing thegroup of companies. These nilessaly international trar within the same iransfers of personastate the group, as it is often within the group corporate the are located in thaat countries which docase adequate level of protection as assesscd not provientities under the EU Directive 95/46/EC. Data Proan a

10.25

Under Article 26(2) of the EU Data organisations may transfer personal dataProtection to a

Directive 95/46/ third level of which da adcquate protection for country adduces adequate personal data i with safeguards to respect the personal data, and protection of th such safeguards may come fr appropriate contractualspecifically, clauses. from Essentially, not ensure an

rules is

an

alternative

having binding comora orate

to an

having to sign standard contractual clauses each time itorganisauon necds to member of its group as it can become transfer personal data to contractual clauses for each transfer madequite burdensome to Sign within a corporate rules present an alternauve mechanism group. Bindino that ensures all transfers made within a group benetit from an adequate level of protection.

their

unless amended, replaced or repealed by the

status

E u r o p e a n C o m m i s s i o n ,5 5

maintain

Gencral

M 7 U T h2 eE

2016/679 affirmed the thods of transterring personal data that are

Data

General

Cxisting

Kegulation

Protection

metho

sed, such as standard contractual clauses 6 Other other cuTent

recognised,

priatesafeguards, such g

and

enforceable

as

binding

corporate rules" and legal

instruments between public authorities,5

are

ding and ded for. Indeed, the EU General Data Protection scts out a

express ulation 2 0 1 6 / 6 7 9

long ist of the minimum Content

binding corporate rules" The EU General Data requircments for also provides two new schemes 2016/67 Regulation on

hereby transfers

will

be allowed: an approved code of conduct

in Article 40 s e t ut sctheme A r t i c l e 42. o u t in

and an approved certification mechanism

set

10.28

Protection Regulation 2016/679, the of personal data in limited ogations to similar exXisting derogations in the EU Data circumstances are Protection Directive 95/46/EC.1 These include explicit consent,

EU General Under the

permitting

Data

transters

contractual necessity," important

reasons

of

public interest

and

vital interests,65

2.

EU

General Data Protection

10.29

Regulation

Given the numerous new schemes and the explicit recognition of axisting mechanisms allowing transfer of personal data to third

10.2

Under the EU General Data Protection Regulation 2016/679, transíers of personal data to third countries continue to be restricted.5 The European Commission will continue to have the power to determine

countries, it would appear that the position in the EU is becoming more permissive and enabling of transfers to third countries than it has ever been.

that certain countries, territories, specified sectors or international

organisations offer an adequate level of protection for data transfers The countries which have previously been approved by the European Commission to have adequate protection for personal data ill

53

of of the European Parliament and the Council of 27 April 2016 on the protection of natural persons wu

Regulation (EU) 2016/679

and regard to the processing of personal data Such data, and repealing Directive 95/46/EC Regulation) ("EU General Data Protection

54

on the free movement o (General Data Protecuo Regulation 2016/b/

Arts 44-47. Art 45(1) EU General Data Protection Regulation 2016/679,

340

0 EU General Data Protection Regulation 2016/679, Art 45(9). EU General Data Protection Regulation 2016/679, Arts 46(2) (c)46(2)(d) K General Data Protection Regulation 2016/679, Arts 46(2)6) and 47. U General Data Protection Regulation 2016/679, Art 46(2)(a). RU General Data Protection Regulation 2016/679, Art 47(2). U General Data Protection Regulation 2016/679, Art 49(1). EU Data Protection Directive 95/46/EC, Art 26. 63 General Data Protection Regulation 2016/679, Art 49 64 RTTneral Data Protection Regulation 2016/679, Art 49)(D). 65 FTTCral Data Protection Regulation 2016/679, Art 49(1){d). eral Data ulation 2016/679, Art 49(1) (). Protection 341

10.30

Since for

Transfer Limitalion Obligation

Data Protection in the Practical Context

Singapore

has not yet achieved

organisations wishing for

Singapore corporate

sharing

rules would

with

to a

adequacy status under R transfer personal data tolaws,

related

organisation,

the

use of h probably be the easiest which do not have approach to: inding any entities, they would need to fall relationship with adopt. Eor scenarios, the higher standard ofback on contractual solutions t need to be the governing standard. protection under EU la

organisations

ould

C.

ASIA-PACIFIC ECONOMIC COOPERATION PRIVACYy

There

are

..only four participating APEC CBPR systemn and Janada. This number may M e x i c o , Japan

currently

0.33

U s, US,

economics: t h e

pecially since the APEC Electronic Commerce the WP29 have, in 2014, produced a common of the APEC CBPR system and the t h e requirements ering is no mutual recognition of both Binding Corporate Rules. the

reasc o v e r t i

cate Rules.There

FU B

certiicationf o r

systems

ification

The

mmOn

nmon

for

questionnaire

10.31

policy constructing barriers to information flows.

perceived

need

to

s e r v e as

the

basis for double

would

woul

nced

to

be submitted to the respective

approval is needed for Authority, binding corporate rules, as well as to the t o be nisations whose approval is needed to be granted APEC a c c o u n t a b i l i t y a g e n t , therefore, be much easier for businesses to be CBPRs. I t w o u l d , the process to obtain even systems, both with compliant u n d e r the two systems.71 different 20proval is The

qDrotection

EU Data

At this juncture, it might be useful to mention anoher the protection of data, if only in terms of the framework fo personal the arena of transfer of value it brinosi personal data. The Cooperation ("APEC") Privacy Framework was Asia-Pacificin Economic adopted 2004. As a framework, it has significant differences from the EU framework and importantly, the APEC Privacy Framework was firmly located within the context of electronic commerce and a

can

an

10.34

FRAMEwORK

referential

organisation.70

whose

granted

CBPRS.

though

avoid

10.32 The

APEC

Cross Border Privacy Rules ("CBPR")

system is It requires self-regulatory. participating businesses to develop and implement personal data

voluntary, certification-based system

a

that is

protection policies consistent with the APEC Privacy Framework. The policies and practices of these businesses are assessed against the

minimum program accountability

requirements

of the APEC CBPR

system by

an

agent. At the time of writing, there were only two accountability agents, TRUSTe in the US and JIPDEC in Japan and thus far, mainly US businesses have applied for CBPR certification.

68

ross Border

at Privacy Rules System, "For Business", available 1 June (accessed www.cbprs.org/Business/BusinessDetails.aspx>

90 2016). Border Privacy Rules System, "For Business", available 1 June 201 2016). www.cbprs.org/Business/BusinessDetails.aspx> (accessed

al

Border Privacy 1 June 2016).

Rules

System