The Singapore Personal Data Protection Act (PDPA) is a law that governs the collection, use and disclosure of an individual’s personal data. First enacted in 2012 and revised in 2020, the PDPA recognizes both the right of individuals to protect their personal data and the need of organizations to collect, use and disclose that data for reasonable purposes.
The PDPA includes ten obligations, with one – the Protection Obligation (Section 24) – applying most directly to third-party data processor outsourcing. Therefore, it is critical to ensure that third parties use the strongest security controls when storing, managing or maintaining your organization's customer data.
Have reasonable purposes, for notifying and obtaining consent for the collection, use or disclosure of personal data
Allow individuals to access and correct their personal data
Take care of personal data (which relates to ensuring accuracy), protect personal data (including protection in the case of international transfers), and do not retain personal data if no longer needed
Notify the Singapore Data Protection Commission and affected individuals of data breaches
Have policies and practices to comply with the PDPA
The PDPA Third-Party Compliance Checklist
Download the PDPA Third-Party Compliance Checklist to reveal third-party considerations in the law and identify key third-party risk management capabilities that can help you address its requirements.
Meeting PDPA TPRM Requirements for Data Protection
The summary table below maps capabilities in the Prevalent Third-Party Risk Management Platform to select articles in the PDPA, Section 24 - the Protection Obligation.
NOTE: This is a summary of the most relevant articles only, and it should not be considered comprehensive, definitive guidance. For a complete list of articles, please review the complete document in detail and consult your auditor.
PDPA Section | How We Help |
---|---|
Protection of Personal Data, Section 24: “An organisation must protect personal data in its possession or under its control by making reasonable security arrangements to prevent — |
|
Advisory Guidelines on Key Concepts in the PDPA The Data Protection Obligation, 17.3 c) “Implement robust policies and procedures for ensuring appropriate levels of security for personal data of varying levels of sensitivity” |
Prevalent partners with you to build a comprehensive third-party risk management (TPRM) program in line with your broader information security and governance, data protection, risk and compliance programs based on proven best practices and extensive real-world experience. Our experts collaborate with your team on defining and implementing TPRM processes and solutions; selecting risk assessment questionnaires and frameworks; and optimizing your program to address the entire third-party risk lifecycle – from sourcing and due diligence, to termination and offboarding – according to your organization’s risk appetite. Prevalent enables organizations to assess and monitor their third parties based on extent of the threats to their information assets by capturing, tracking and quantifying inherent risks for all third parties. The outcome is a tiered and categorized list of vendors with an inherent risk score to inform further due diligence. |
Advisory Guidelines on Key Concepts in the PDPA The Data Protection Obligation, 17.3 d) “Be prepared and able to respond to information security breaches promptly and effectively” |
Prevalent enables your team to rapidly identify, respond to, report on, and mitigate the impact of third-party vendor incidents by centrally managing vendors, conducting event assessments, scoring identified risks, correlating against continuous cyber monitoring, and accessing remediation guidance. Key capabilities include:
|
Advisory Guidelines on Key Concepts in the PDPA The Data Protection Obligation, 17.4 In addition, it might be useful for organisations to undertake a risk assessment exercise to ascertain whether their information security arrangements are adequate. In so doing, the following factors may be considered: a) the size of the organisation and the amount and type of personal data it holds; |
Prevalent delivers a comprehensive third-party data protection risk assessment program that includes the following capabilities: Discovery and Third-, Fourth- and Nth-Party Data Mapping Self-Assessments Vendor Risk Assessments Risk Response Compliance Tracking and Reporting Continuous Breach Event Notification Monitoring |
Align Your TPRM Program with CCPA, GDPR, HIPAA and More
Download this guide to review specific requirements from 6 data privacy authorities, identify TPRM capabilities that map to each requirement, and uncover best practices for ensuring compliance.
Review key PDPA requirements and share best practices for simplifying the compliance process.
Mitigate privacy risks and comply with GDPR requirements by assessing third-party data protection controls with these...
If your vendors handle data on California residents, then you'll want to focus on 4 key...