_commit_at,_commit_hash,_id,_item,_version,_commit,description,tags,date,pdf-url,nature,title,url,timestamp,pdf-content,decision,_item_full_hash,_changed_columns 2023-10-01T11:02:10+08:00,fbd32491db44d3d0c97aa12a99cefd61ec954264,43,43,1,952,"A financial penalty of $14,000 was imposed on Nature Society (Singapore) for breaches of the PDPA. First, the organisation failed to put in place reasonable measures to protect personal data on its website database. Second, it did not appoint a data protection officer. Lastly, it did not have written policies and practices necessary to comply with the PDPA.","[""Protection"", ""Accountability"", ""Financial Penalty"", ""Others""]",2022-01-14,https://www.pdpc.gov.sg/-/media/Files/PDPC/PDF-Files/Commissions-Decisions/Summary-Decision---NSS---03122021.pdf,"Protection, Accountability",Breach of the Protection and Accountability Obligations by Nature Society (Singapore),https://www.pdpc.gov.sg/all-commissions-decisions/2021/12/breach-of-the-protection-and-accountability-obligations-by-nature-society,2022-01-14,"PERSONAL DATA PROTECTION COMMISSION Case No. DP-2011-B7351 In the matter of an investigation under section 50(1) of the Personal Data Protection Act 2012 And Nature Society (Singapore) SUMMARY OF THE DECISION 1. On 6 November 2020, the Personal Data Protection Commission (the “Commission”) received information of an online article reporting about hacked databases being made available for downloads on several hacking forums and Telegram channels. In the article, Nature Society (Singapore) (the ""Organisation"") was named as one of the affected Organisations (the “Incident”). 2. The personal data of 5,131 members and non-members who had created membership and user accounts on the Organisation’s website were affected in the Incident. The datasets affected comprised of names, usernames, passwords (encrypted), email addresses, telephone numbers, types of membership, gender, mailing addresses, dates of births, occupation, company and nationality. 1 3. Following the Incident, the Organisation engaged two IT professionals to carry out an investigation and analysis of the Organisation's website. The investigation and analysis revealed vulnerabilities in the Organisation's website and suspicious SQL injection activities prior to the Incident. The possible attack vector was identified as a SQL injection attack which led to personal data on the Organisation's website database being accessed and exfiltrated by unknown parties. 4. The Organisation took the following remedial measures after the Incident: (a) Edited the website to stop all online membership sign-ups/renewals and logins to the website; (b) Removed all members' and users' data from the website database; (c) Backed up the website database and kept all personal data offline; (d) Change all login passwords; (e) Notified all affected individuals of the Incident via email; (f) Appointed a Data Protection Officer (""DPO"") (g) Developed and implemented a personal data policy; and (d) Engaging vendors to develop a new website to improve security. 5. In its representations to the Commission, the Organisation admitted to having breached the Accountability Obligation under sections 11(3) and 12(a) and the Protection Obligation under section 24 of the Personal Data Protection Act 2012 (""PDPA""), and requested for the matter to be dealt with in accordance with the Commission’s Expedited Decision Procedure. 2 Breach of Section 11(3) of the PDPA 6. First, the Organisation admitted it did not designate one or more individuals (typically referred to as a DPO) to be responsible for ensuring that the Organisation complies with the PDPA. The responsibilities of a DPO includes (a) ensuring compliance with the PDPA, (b) fostering a data protection culture, (c) handling and managing personal data queries and complaints, (d) alerting management to any risks with regard to personal data and (e) liaising with the Commission if necessary. From the foregoing, it is clear that the DPO plays a vital role in implementing and building a robust data protection framework to ensure an organisation’s compliance with its obligations under the PDPA. Breach of Section 12(a) of the PDPA 7. Second, the Organisation admitted it did not develop and implement any personal data protection policy prior to the Incident. In this regard, it is important to reiterate that at the very basic level, an overarching personal data protection policy has to be developed and implemented to ensure a consistent minimum data protection standard across an organisation's practices, procedures and activities. Breach of Section 24 of the PDPA 3 8. Third, the Organisation admitted that it did not make reasonable security arrangements to protect the personal data on its website database. After the Organisation's website was designed and developed by an external vendor in 2011, the Organisation did not have any contract/retainer agreement with the external vendor to maintain the website's security. As a result, the responsibility of protecting its website fell squarely on the Organisation. However, the Organisation failed to carry out any security measures e.g. conducting necessary security updates, patches and penetration tests, thus leaving its website vulnerable to attacks. 9. In the circumstances, the Organisation is found to have breached sections 11(3), 12(a) and 24 of the PDPA. Commission’s Decision 10. After considering the factors listed at section 48J(6) of the PDPA and the circumstances of this case, including (i) the Organisation's upfront voluntary admission of liability which significantly reduced the time and resources required for investigations; (ii) the fact that the Organisation is a non-profit, registered society and (iii) the Organisation's prompt remedial actions, the Organisation is given notice to pay a financial penalty of $14,000. 4 11. The Organisation must make payment of the financial penalty within 30 days from the date of the notice accompanying this decision, failing which interest at the rate specified in the Rules of Court in respect of judgment debts shall accrue and be payable on the outstanding amount of such financial penalty until the financial penalty is paid in full. 12. In view of the remedial actions taken by the Organisation, the Commission will not issue any directions under section 48I of the PDPA. The following are the provision of the Personal Data Protection Act 2012 cited in the above summary: Compliance with Act 11(3). An organisation shall designate one or more individuals to be responsible for ensuring that the organisation complies with this Act. Policies and practices 12(a). An organisation shall develop and implement practices that are necessary for the organisation to meet the obligations of the organisation under this Act. Protection of personal data 24. An organisation must protect personal data in its possession or under its control by making reasonable security arrangements to prevent – (a) unauthorised access, collection, use, disclosure, copying, modification or disposal or similar risks and; (b) the loss of any storage medium or device on which personal data is stored. 5 ",Financial Penalty,50aef1ea4a6b3252366a112e13092602d7c8bd3b,"[""pdf-content"",""timestamp"",""decision"",""pdf-url"",""tags"",""nature"",""url"",""title"",""date"",""description""]" 2023-10-01T11:02:10+08:00,fbd32491db44d3d0c97aa12a99cefd61ec954264,59,59,1,952,"A financial penalty of $25,000 was imposed on Webcada for breaches of the PDPA. First, the organisation failed to put in place reasonable measures to protect personal data on its database servers. Second, it did not have written policies and practices necessary to ensure its compliance with the PDPA.","[""Protection"", ""Accountability"", ""Financial Penalty"", ""Information and Communications"", ""Ransomware"", ""IPMI"", ""Database servers"", ""No Written Policy""]",2021-06-10,https://www.pdpc.gov.sg/-/media/Files/PDPC/PDF-Files/Commissions-Decisions/Decision---Webcada-Pte-Ltd-06052021.pdf,"Protection, Accountability",Breach of the Protection and Accountability Obligation by Webcada,https://www.pdpc.gov.sg/all-commissions-decisions/2021/06/breach-of-the-protection-and-accountability-obligation-by-webcada,2021-06-10,"PERSONAL DATA PROTECTION COMMISSION Case No. DP-2009-B6931 In the matter of an investigation under section 50(1) of the Personal Data Protection Act 2012 And Webcada Pte Ltd SUMMARY OF THE DECISION 1. On 4 September 2020, Webcada Pte Ltd (the “Organisation”) notified the Personal Data Protection Commission (the “Commission”) that three of its database servers had been subjected to a ransomware attack on 29 August 2020 (the “Incident”). 2. The personal data of 522,722 individuals were affected in the Incident. The datasets affected comprised of the individuals’ names, phone numbers, dates of birth, addresses and order histories. 3. Following the Incident, the Organisation engaged an independent third-party consultant to investigate, review and assist in the implementation of additional data protection measures. 4. Investigations revealed that the ransomware had been uploaded onto the affected servers via the Intelligent Platform Management Interface (""IPMI""). The IPMI is a set of computer interface specifications used for remote monitoring and management of servers. There was no evidence of data exfiltration, and all affected data was restored from available back-ups. 5. The Organisation took the following remedial measures after the Incident: (a) IPMI was permanently disabled for all servers; (b) The public IP address of all servers was removed and all remote management access to the servers was configured to allow only trusted IP addresses; (c) End-point protection software with threat hunting capabilities was installed on all servers and computers within the Organisation; and (d) A written data protection policy was developed and implemented to comply with the provisions of the Personal Data Protection Act 2012 (the ""PDPA""). 6. In its representations to the PDPC, the Organisation admitted to having breached the Accountability Obligation under section 12 and the Protection Obligation under section 24 of the PDPA, and requested for the matter to be dealt with in accordance with the PDPC’s Expedited Decision Procedure. Section 12 of the PDPA 7. First, the Organisation admitted it did not have a written data protection policy prior to the Incident. In this regard, it is important to reiterate that an organisation must document its data protection policies and practices in writing as they serve to increase awareness and ensure accountability of the organisation's obligations under the PDPA. This requirement has been emphasized multiple times in previous decisions1. Section 24 of the PDPA 8. Second, the Organisation admitted that it did not configure its IPMI access settings correctly prior to the Incident. It enabled access to the IPMI from the public Internet when this was not necessary. Furthermore, in the monthly vulnerability scans carried out by the Organisation, it had omitted to scan the IPMI. Hence, it was not able to detect vulnerabilities in its IPMI, which were exploited to gain access to and upload the ransomware on the servers. 9. In the circumstances, the Organisation is found to have breached sections 12 and 24 of the PDPA. 10. After considering the factors listed at section 48J(6) of the PDPA and the circumstances of this case, including (i) the Organisation's upfront voluntary admission of liability which significantly reduced the time and resources required for investigations; and (ii) the Organisation's prompt remedial actions, the Organisation is given notice to pay a financial penalty of $25,000. 1 See Re Aviva Ltd [2017] SGPDC 14 at [32]; Re Singapore Taekwondo Federation [2018] SGPDC 17 at [39] to [42]; Re AgcDesign Pte Ltd [2019] SGPDC 23 at [4] to [5]; Re (1)Everlast Projects Pte Ltd (2)Everlast Industries (S) Pte Ltd (3) ELG Specialist Pte Ltd [2020] SGPDC 20 at [8] to [9] 11. The Organisation must make payment of the financial penalty within 30 days from the date of the notice accompanying this decision, failing which interest at the rate specified in the Rules of Court in respect of judgment debts shall accrue and be payable on the outstanding amount of such financial penalty until the financial penalty is paid in full. 12. In view of the remedial actions taken by the Organisation, the Commission will not issue any directions under section 48I of the PDPA. ",Financial Penalty,a8330d4666d7631b3e448330fd698843754474f4,"[""pdf-content"",""timestamp"",""decision"",""pdf-url"",""tags"",""nature"",""url"",""title"",""date"",""description""]" 2023-10-01T11:02:10+08:00,fbd32491db44d3d0c97aa12a99cefd61ec954264,81,81,1,952,"Directions, including a financial penalty of $7,500 were imposed on Majestic Debt Recovery for failing to obtain consent from its debtors to record the debt collection process. Majestic Debt Recovery also did not obtain consent to upload the recordings onto its Facebook Page. Additionally, Majestic Debt Recovery did not have written policies and practices necessary to ensure its compliance with the PDPA.","[""Protection"", ""Accountability"", ""Directions"", ""Financial Penalty"", ""Others"", ""Consent"", ""No DPO"", ""No Policy""]",2020-11-24,https://www.pdpc.gov.sg/-/media/Files/PDPC/PDF-Files/Commissions-Decisions/Decision---Majestic-Debt-Recovery---02032020.pdf,"Protection, Accountability",Breach of the Consent and Accountability Obligations by Majestic Debt Recovery,https://www.pdpc.gov.sg/all-commissions-decisions/2020/11/breach-of-the-consent-and-accountability-obligations-by-majestic-debt-recovery,2020-11-24,"PERSONAL DATA PROTECTION COMMISSION [2020] SGPDPC 7 Case No DP-1903-B3570 In the matter of an investigation under section 50(1) of the Personal Data Protection Act 2012 And Majestic Debt Recovery Pte Ltd … Organisation DECISION 1 Majestic Debt Recovery Pte Ltd [2020] SGPDPC 7 Yeong Zee Kin, Deputy Commissioner — Case No DP-1903-B3570 2 March 2020 Introduction 1 This case concerns a debt collection company’s posting of a video recording on social media as a tactic to shame a debtor. The recordings in question captured exchanges between the company’s representative and staff of the debtor company. Facts of the Case 2 Majestic Debt Recovery Pte Ltd (the “Organisation”) is a company in the business of collecting debts on the behalf of its clients. On 22 March 2019, the Personal Data Protection Commission (the “Commission”) received a complaint from the managing director (the “Complainant”) of a debtor company (the “Company”) stating that the Organisation had been engaged by the Company’s sub-contractor to recover debts from the Company. The Complainant stated that on or around 21 March 2019, the Organisation’s representatives (the “Representatives”) visited the Company’s premises to collect a debt on behalf of its client (the “Incident”). Not surprisingly, heated words were exchanged with the Company’s personnel when the Representatives attempted to recover the debt. The Representatives recorded video footage of the exchanges with the Company’s personnel, including the Complainant (the “Recording”), on a tablet device. The Complainant and the Company’s personnel could be identified from the images and audio captured by the Recording. According to the Complainant, he “protested against the taking of [the Recording and] posting it [on] social media but [the Representative] said he would do it”. The Representatives nonetheless took the Recording and subsequently posted it on the Organisation’s official public Facebook page (its “Facebook Page”). 2 3 During its investigation, the Commission found other video recordings on the Facebook Page. These videos also captured images and voices of other individuals who appeared to be either individual debtors or representatives of corporate debtors of the Organisation’s clients. 4 By its own admission to the Commission, the Organisation did not have any knowledge of the Personal Data Protection Act 2012 (“PDPA”) prior to this incident and had not developed any data protection policies or practices. The Organisation also admitted that it did not have a data protection officer (“DPO”) prior to this incident. 5 Upon being notified by the Commission, the Organisation took the following remedial actions: (a) Removed the Recording and all other videos from the Facebook Page; (b) Designated an individual tasked with data protection matters (i.e. a DPO); and (c) Assured the Commission that it will ensure that it obtains consent in writing from individuals before recording and uploading their personal data onto its Facebook Page. Findings and Basis for Determination Whether the Organisation had breached section 13 of the PDPA 6 Broadly, section 13 of the PDPA prohibits organisations from collecting, using or disclosing personal data about an individual unless the individual’s consent is obtained (either actual or deemed) or such collection, use or disclosure is required or authorised under the PDPA or any written law. As stated at [2], the Organisation recorded the video using a tablet device. The incident took place at the Company’s premises, after the Representatives were met at the reception and brought into the office proper, which was not open to the public. The Organisation posted the Recording on its Facebook Page despite the Complainant’s protests. This disregard of the individual’s wishes is a breach of section 13 of the PDPA given that the collection, use and disclosure of the Recording was not required or authorised under the PDPA or other written law. 3 7 In relation to the Organisation’s assurance (noted at [5]) that it would in future obtain consent from individuals concerned, it seems unlikely or even unconceivable that an individual who owed a debt would willingly consent to be filmed by the debt collecting agency calling on him, and for such recordings to be posted on social media. If such consent were obtained ex ante by an organisation, for example at the time when the loan was first given, and the purpose for posting the recording on social media is to shame the debtor, there is a real risk that this purpose may not be one which a reasonable person would consider appropriate under section 18 of the PDPA; or that consent thus obtained is vitiated under section 14(3), as having been obtained through unfair, or deceptive or misleading practices. 8 However, this is not to say that the capturing of personal data through video will never be appropriate or in compliance with the PDPA. As an example, a security company may wish to equip its security officers with body worn cameras to ensure that its officers are exercising their duties in a responsible and lawful manner and their interactions with the public adhere to their code of conduct. Any organisation that wishes to implement such a practice has to be accountable and should ensure that it has sound legal basis to do so. Additionally, it will need to put clear guidelines and policies in place for its employees in relation to their conduct and the use of such cameras and the video footage captured. In developing such guidelines and policies, such organisations should ensure that the use of these recording devices are in compliance with the PDPA and have measures and controls in place to ensure that these guidelines and policies are adhered to. Whether the Organisation had breached sections 12 and 11(3) of the PDPA 9 Section 12 of the PDPA requires organisations to, inter alia, develop and implement policies and practices that are necessary for the organisation to meet its obligations under the PDPA, and section 11(3) of the PDPA requires organisations to designate one or more individuals (i.e. the DPO) to be responsible for ensuring the organisations’ compliance with the PDPA. 10 By nature of its business, the Organisation would be in possession and/or control of various personal data, including those of its employees and its clients’ debtors or the debtors’ employees. As stated at [3], the Organisation admitted that it did not have any knowledge of 4 the PDPA prior to being notified by the Commission over this incident, did not have any data protection policies or practices, and had not appointed a DPO. 11 In light of the foregoing, the Organisation was also in breach of sections 11(3) and 12 of the PDPA. Representations by the Organisation 12 In the course of settling this decision, the Organisation made representations regarding the findings as set out at [6]. The Organisation raised the following factors: (a) When the Representatives visited the Company to recover debts on various occasions prior to the Incident they had made video recordings of those visits without any objections from the Company; and (b) According to the Organisation, it had “video proof” of the Complainant consenting to the Organisation posting video recordings of the Representative’s visits to the Company on its Facebook Page. 13 Having carefully considered the representations, I maintain the finding that the Organisation was in breach of Section 13 of the PDPA for the following reasons: (a) The Organisation was unable to provide any evidence to support its assertion that there had been consent by the Company on previous occasions to the Organisation video recording the Representatives’ visits to the Company’s premises. The Organisation was also unable to provide the “video proof” referred to at [12(b)]; (b) Even if consent had been obtained previously, section 16(1) of the PDPA provides that on giving reasonable notice to the organisation, an individual may at any time withdraw any consent given, or deemed to have been given in respect of the collection, use or disclosure by that organisation of personal data about the individual for any purpose. As mentioned at [2], the Complainant had expressly objected to the video recording and the subsequent posting of the video on the Facebook Page. In the circumstances, I find that even if consent was given previously as asserted by the Organisation at [12], it had been withdrawn by virtue of the Complainant’s express 5 objections at the material time. Accordingly, the Organisation did not have consent to post the Recording on its Facebook Page; and (c) Furthermore, even if consent had been obtained to post the video recording on social media to shame the debtor, I have grave doubts if the consent will stand up to scrutiny under section 14(2) of the PDPA, which vitiates consent obtained through unfair, and deceptive or misleading practices. For example, if consent to post video recordings made during debt recovery attempts was made a condition of obtaining the loan, it could possibly go beyond what is reasonable in order to provide the loan: see section 14(2)(a). Consent obtained through such unfair practice is vitiated by section 14(3). Neither would such a purpose be one which a reasonable person — on an objective standard — would likely consider to be appropriate under section 18 of the PDPA. The Deputy Commissioner’s Directions 14 In determining the directions to be imposed on the Organisation under section 29 of the PDPA, I took into account the following mitigating factors: (a) the Organisation was cooperative and forthcoming in the course of investigations; (b) the Organisation took prompt remedial action after being notified by the Commission; and (c) there was no evidence of any further unauthorised use of the personal data captured in the Recording. 15 Having carefully considered all the relevant factors of this case, I hereby direct the Organisation to: (a) pay a financial penalty of $7,500 within 30 days from the date of this direction, failing which interest at the rate specified in the Rules of Court in respect of judgment debts shall accrue and be payable on the outstanding amount of such financial penalty until the financial penalty is paid in full; 6 (b) develop and implement policies and practices which are necessary for its compliance with the PDPA; and (c) put in place a program of compulsory training for its employees on compliance with the PDPA. YEONG ZEE KIN DEPUTY COMMISSIONER FOR PERSONAL DATA PROTECTION 7 ","Directions, Financial Penalty",735c56aebf1838696565bb02754125b665e3d968,"[""pdf-content"",""timestamp"",""decision"",""pdf-url"",""tags"",""nature"",""url"",""title"",""date"",""description""]" 2023-10-01T11:02:10+08:00,fbd32491db44d3d0c97aa12a99cefd61ec954264,104,104,1,952,Both MCST 3593 and New-E Security failed to put in place reasonable security arrangements to prevent the unauthorised disclosure of CCTV footage of a common property at Marina Bay Residences. MCST3593 also failed to appoint a data protection officer and put in place policies and practices necessary for the organisation to comply with the PDPA.,"[""Protection"", ""Accountability"", ""Financial Penalty"", ""Directions""]",2020-03-19,https://www.pdpc.gov.sg/-/media/Files/PDPC/PDF-Files/Commissions-Decisions/Decision---MCST-3593-and-Others---02032020.pdf,"Protection, Accountability",Breach of the Protection and Accountability Obligations by MCST 3593 and Breach of the Protection Obligation by New-E Security,https://www.pdpc.gov.sg/all-commissions-decisions/2020/03/breach-of-the-protection-and-accountability-obligations-by-mcst-3593-and-breach-of-the-protection-obligation-by-new-e-security,2020-03-19,"PERSONAL DATA PROTECTION COMMISSION [2020] SGPDPC 6 Case No DP-1903-B3554 In the matter of an investigation under section 50(1) of the Personal Data Protection Act 2012 And (1) Management Corporation Strata Title Plan No. 3593 (2) Edmund Tie & Company Property Management Services Pte Ltd (3) New-E Security Pte Ltd … Organisations DECISION 1 Management Corporation Strata Title Plan No. 3593 & Others [2020] SGPDPC 6 Yeong Zee Kin, Deputy Commissioner — Case No DP-1903-B3554 2 March 2020 Introduction 1 On 19 March 2019, Edmund Tie & Company Property Management Services Pte Ltd (“ETCPM”) on behalf of Management Corporation Strata Title Plan No. 3593 (“MCST 3593”) notified the Personal Data Protection Commission (the “Commission”) of unauthorised disclosure of closed-circuit television (“CCTV”) footage recorded at the premises of MCST 3593, known as Marina Bay Residences (the “Condominium”), by NewE Security Pte Ltd (“New-E”), a company providing security services at the Condominium, to an owner resident of a unit at the condominium (the “Incident”). Facts of the Case 2 MCST 3593 had appointed ETCPM as the managing agent of the Condominium since 2012. In November 2014, MCST 3593 had also engaged New-E to provide security services at the Condominium. ETCPM’s scope of work as managing agent included supervising New-E to ensure it carried out its duties properly. 3 On 1 February 2019, an owner resident of a unit at the Condominium (the “Resident”) approached the security supervisor on duty, who was an employee of New-E (the “Security Supervisor”), to request a copy of the CCTV footage of the Condominium’s lobby on 29 January 2019 between 9.00 pm to 9.30 pm (the “Requested CCTV Footage”). The Requested CCTV Footage had captured images of identifiable individuals who had passed through the common property during that period, and hence contained personal data of those individuals. The Security Supervisor proceeded to review the CCTV recordings and used his mobile phone to record a copy of the Requested CCTV Footage. The Security Supervisor then sent a copy of the Requested CCTV Footage which he had recorded on his mobile phone to the Resident using WhatsApp messenger. The Security Supervisor also sent a copy of the same footage to the residence manager of the Condominium, who was an employee of ETCPM (the “Residence 2 Manager”). Upon receiving the copy of the Requested CCTV Footage, the Residence Manager contacted the Security Supervisor who informed him of the Resident’s request. The Residence Manager instructed the Security Supervisor not to release the Requested CCTV Footage to the Resident and to await further instructions. At that time, the Security Supervisor did not inform the Residence Manager that he had already sent a copy of the Requested CCTV Footage to the Resident. 4 On 2 February 2019, ETCPM informed MCST 3593 of the Resident’s request. MCST 3593 decided not to disclose the Requested CCTV Footage to the Resident and the Residence Manager conveyed MCST 3593’s decision to the Security Supervisor. Both MCST 3593 and ETCPM remained unaware that the Security Supervisor had already sent a copy of the Requested CCTV Footage to the Resident. 5 On 9 February 2019, the Residence Manager was notified that the Resident’s Facebook page contained a post with a copy of the Requested CCTV Footage (the “Facebook Post”). On 11 February 2019, the Residence Manager contacted the operations director of New-E to inform him of the matter. On the same day, the Security Supervisor admitted to the Operation Director of New-E that he had sent a copy of the Requested CCTV Footage to the Resident on 1 February 2019. On 13 February 2019, ETCPM informed MCST 3593 of the unauthorised disclosure of the Requested CCTV Footage by the Security Supervisor to the Resident and the Facebook Post. 6 Since the discovery of the Incident, the following remedial actions have been taken: (a) MCST 3593 appointed a Data Protection Officer (“DPO”) and implemented its Personal Data Protection Policy and Standard Operating Procedure to comply with the Personal Data Protection Act 2012 (“PDPA”). MCST 3593 also informed the Commission that it will also be preparing and including additional data processing provisions in addendum(s) to the respective contracts with its managing agent and security company; and (b) New-E developed a personal data protection policy and operational procedure on personal data protection for all its employees. 3 Findings and Basis for Determination 7 For the reasons set out below, I find MCST 3593 in breach of Sections 11(3), 12 and 24 of the PDPA and New-E in breach of section 24 of the PDPA. I find ETCPM not to be in breach of any of its obligations under the PDPA in relation to the Incident. Breach of Sections 11(3), 12 and 24 of the PDPA by MCST 3593 8 As an “organisation” under the PDPA, MCST 3593 had the primary responsibility of ensuring that there are reasonable security arrangements in place to protect personal data in its possession or under its control. 1 It is not disputed that MCST 3593 had possession and/or control of the Requested CCTV Footage. To the extent that an MCST has appointed a managing agent or vendor to process personal data on its behalf, it should have in place a written agreement with clauses requiring them to comply with the data protection provisions under the PDPA, and carried these contractual obligations through into implementing practices like standard operating procedures.2 9 In the present case, MCST 3593 had engaged New-E to provide security services (including the management of CCTV footage) for the Condominium. In the course of providing security services, New-E was engaged to process personal data on behalf of MCST 3593, to wit, New-E had to process video footages captured by the CCTV network and system. In this case, the Security Supervisor retrieved CCTV footage, made a recording of an extract, and transmitted it. These actions amount to “processing” as the term is defined in section 2(1) of the PDPA. Hence, the true nature of the relationship between MCST 3593 and New-E is that of a data controller and data intermediary. However, the contract between MCST 3593 and New-E did not contain any clauses relating to the protection of personal data or any reference to the PDPA. There were no written instructions in the contract in relation to the management of CCTV footage, and MCST 3593 admitted to the Commission that it had not communicated any data protection requirements to ETCPM or New-E. In the circumstances, I find MCST 3593 in breach of Section 24 of the PDPA. 1 Section 24 of the PDPA See Re KBox Entertainment Group Pte. Ltd. [2016] SGPDPC 1 at [12] and 29(b)(ii); the Commission’s Guide on Data Protection Clauses for Agreements Relating to the Processing of Personal Data (20 July 2016) which provides sample data protection clauses that organisations may find helpful 2 4 10 In addition, during the course of investigations, MCST 3593 admitted that it had not appointed any DPO and it had not developed and put in place any data protection policies, as required under Sections 11(3) and 12 respectively of the PDPA. The importance of these requirements have been emphasized multiple times in previous decisions, 3 as well as the Commission’s Advisory Guidelines for Management Corporations (issued on 11 March 2019) at [2.6]. In the circumstances, MCST 3593 was also in breach of Sections 11(3) and 12 of the PDPA. Breach of Section 24 of the PDPA by New-E 11 As mentioned at [9], the security services provided by New-E included the management of CCTV footage. This amounted to “processing” of personal data as defined in section 2(1) of the PDPA. New-E was accordingly acting as a data intermediary of MCST 3593 with respect to the Requested CCTV Footage. 12 In my view, New-E failed to put in place reasonable security arrangements to protect the Requested CCTV Footage and was in breach of section 24 of the PDPA for the following reasons: (a) According to New-E, it had a practice of only releasing CCTV footage to representatives of ETCPM which was communicated verbally to New-E’s employees and ETCPM. However, New-E conceded that it did not have any written policies to instruct and guide its employees with respect to their obligations under the PDPA, in particular the usage of mobile phones to record CCTV footage. In the present case, the Security Supervisor did not adhere to New-E’s practice and this may be due, at least in part, to the lack of a written policy which clearly sets out the relevant procedures to be followed before CCTV footage is disclosed. (b) New-E did not provide data protection training for its employees. It is well- established that proper training is a key security arrangement in an organisation’s compliance with the protection obligation under section 24 of the PDPA.4 Proper staff 3 See Re Aviva Ltd 2017 SGPDPC 14 at [32]; Re M Stars Movers & Logistics Specialist Pte Ltd [2017] SGPDPC 15 at [31] to [37]; Re AgcDesign Pte Ltd [2019] SGPDPC 23 at [5] 4 Re National University of Singapore [2017] SGPDPC 5 at [15] – [28]; Re SLF Green Maid Agency [2018] SGPDPC 27 at [12]; Re SME Motor Pte Ltd [2019] SGPDPC 21 at [10] and Advisory Guidelines On Key Concepts in the Personal Data Protection Act (Revised 9 Oct 2019) at [17.5] 5 training – which creates data protection awareness amongst employees, imparts good practices in handling personal data, and puts employees on the alert for threats to the security of personal data – is necessary to complement an organisation’s data protection policies. No Breach of the PDPA by ETCPM 13 ETCPM was a data intermediary of MCST 3593 in relation to the personal data it processed on their behalf when carrying out its duties as managing agent. As a data intermediary, ETCPM had an obligation under section 24 of the PDPA to put in place reasonable security arrangements to protect such personal data which was in its possession or under its control. 14 However, the personal data which is the subject of the present case was not in the possession or under the control of ETCPM. In particular, the Requested CCTV Footage was in the possession and under the control of New-E and was within the scope of New-E’s responsibilities as MCST 3593’s security services provider, as mentioned at [11]. Accordingly, it was not ETCPM’s responsibility in the present case to put in place reasonable security arrangements to protect the Requested CCTV Footage. 15 For completeness, I note that pursuant to the written agreement between the MCST 3593 and ETCPM, ETCPM’s scope of services as managing agent included supervising NewE and ensuring that it carried out its duties and responsibilities properly and efficiently. The Incident did not arise due to ETCPM’s lack of supervision over New-E. As mentioned at [3] and [4] above, the Residence Manager instructed the Security Supervisor not to disclose the CCTV Footage to the Resident without further instructions, and subsequently conveyed MCST 3593’s instructions to the Security Supervisor that the Requested CCTV Footage should not be disclosed. Unbeknown to the Residence Manager, his instructions came too late because the Security Supervisor had already disclosed a copy of the Requested CCTV Footage to the Resident before then. 16 In the circumstances, I find that ETCPM was not in breach of any of its obligations under the PDPA in relation to the Incident. 6 Representations by MCST 3593 17 In the course of settling this decision, MCST 3593 made representations regarding the findings as set out at [8] to [10], and on the quantum of financial penalty . The Organisation raised the following factors: (a) MCST 3593 comprises of subsidiary proprietors, and its council is elected annually at the annual general meeting to represent all subsidiary proprietors. All members of the council serve on a voluntary basis; (b) MCST 3593 appointed ETCPM to advise on its obligations and act on its behalf. MCST 3593’s management council relies on ETCPM to guide and help put in place measures to comply with the PDPA. According to MCST 3593, measures and safeguards had already been put in place to ensure that collection, use, disclosure of personal data, as well as protection and retention of personal data are in compliance with the PDPA; (c) The Security Supervisor disclosed the Requested CCTV Footage against the Resident Manager’s instructions and usual standard operating procedures. The Resident Manager’s instructions to the Security Supervisor was for and on behalf of the MCST 3593. No measures or safeguards could have prevented such wilful acts by the Security Supervisor; and (d) MCST 3593 took immediate remedial actions to address the matter, including voluntarily informing the Commission of the Incident. 18 Having carefully considered the representations, I have decided to maintain the quantum of financial penalty set out at [19(a)] for the following reasons: (a) In relation to MCST 3593’s representations on its constitution and the voluntary nature of the members of MCST 3593’s council, it is not disputed that MCST 3593 is an “organisation” as defined in section 2(1) of the PDPA and is therefore required to comply with the data protection provisions. The fact that the members of MCST 3593’s 7 council are volunteers does not lower the standard expected of MCST 3593 in complying with its obligations under the PDPA. (b) It is not disputed that one of the roles that ETCPM had to perform as managing agent was the supervision of New-E. However, the gravamen of the breach lies in the fact that when MCST 3593 appointed New-E, there was nothing in the contract between them, or any written instructions thereafter, that dealt with the protection of personal data in the management of CCTV footage. New-E is a data intermediary to MCST 3593 insofar as it was managing personal data captured and stored in the CCTV system. As such, the contract between MCST 3593 and New-E has to deal with the protection and retention limitation obligations under the PDPA over this set of personal data. This ought to be followed through in their standard operating procedures, which in this case could either be supplied by ETCPM in its capacity as managing agent and supervisor of New-E or put in place between MCST 3593 and New-E. A review of the contract between MCST 3593 and New-E discloses this omission; and no written policies concerning the management of personal data stored in CCTV footage has been produced during investigations. On the contrary, New-E has admitted that there was nothing written up and they relied on verbal instructions of practices: at [12(a)]; and MCST 3593 admitted that it has not given any data protection instructions to either ETCPM or New-E: at [9]. (c) As for MCST 3593’s representations on the Resident Manager’s instructions to the Security Supervisor and the Security Supervisor’s wilful conduct, this does not absolve MCST 3593 from the requirement of having data protection clauses in its respective contracts with ETCPM and New-E and implementing standard operating procedures. The lack of these are sufficient reasons to find a contravention of section 24 of the PDPA by MCST 3593. (d) MCST 3593’s prompt remedial actions and voluntary notification to the Commission of the Incident had already been taken into consideration in my determination of the quantum of financial penalty. The Deputy Commissioner’s Directions 19 Having considered all the relevant factors in this case, I hereby direct: 8 (a) MCST 3593 to pay a financial penalty of $5,000 within 30 days from the date of the directions, failing which interest at the rate specified in the Rules of Court in respect of judgment debts shall accrue and be payable on the outstanding amount of such financial penalty until the financial penalty is paid in full; and (b) New-E to: (i) put in place a data protection policy and internal guidelines, including procedures for proper management and access control in respect of CCTV footage within 30 days from the date of this direction; and (ii) inform the Commission of the completion of the above within 7 days of implementation. YEONG ZEE KIN DEPUTY COMMISSIONER FOR PERSONAL DATA PROTECTION 9 ","Financial Penalty, Directions",eeb49dfd4acb4b4db0e54f38d3c03d45e12085b1,"[""pdf-content"",""timestamp"",""decision"",""pdf-url"",""tags"",""nature"",""url"",""title"",""date"",""description""]" 2023-10-01T11:02:10+08:00,fbd32491db44d3d0c97aa12a99cefd61ec954264,105,105,1,952,Both MCST 4375 and A Best Security Management failed to put in place reasonable security arrangements to prevent the unauthorised disclosure of CCTV footage of an individual injured by a falling glass door at Alexandra Central Mall. MCST 4375 also failed to put in place policies and practices necessary for the organisation to comply with the PDPA.,"[""Protection"", ""Accountability"", ""Directions""]",2020-03-19,https://www.pdpc.gov.sg/-/media/Files/PDPC/PDF-Files/Commissions-Decisions/MCST-4375-and-Others---Decision---03022020.pdf,"Protection, Accountability",Breach of the Protection and Accountability Obligations by MCST 4375 and Breach of the Protection Obligation by A Best Security Management,https://www.pdpc.gov.sg/all-commissions-decisions/2020/03/breach-of-the-protection-and-accountability-obligations-by-mcst-4375-and-breach-of-the-protection-obligation-by-a-best-security-management,2020-03-19,"PERSONAL DATA PROTECTION COMMISSION [2020] SGPDPC 4 Case No. DP-1903-B3437 In the matter of an investigation under section 50(1) of the Personal Data Protection Act 2012 And (1) Management Corporation Strata Title Plan No. 4375 (2) Smart Property Management (Singapore) Pte Ltd (3) A Best Security Management Pte Ltd … Organisations DECISION Management Corporation Strata Title Plan No. 4375 & Others [2020] SGPDPC 4 Yeong Zee Kin, Deputy Commissioner — Case No DP-1903-B3437 3 February 2020 Introduction 1 In late February 2019, a woman was injured when a glass door fell on her at the premises of Management Corporation Strata Title Plan No. 4375 (“MCST 4375”), also known as Alexandra Central Mall (the “Mall”). The Personal Data Protection Commission (the “Commission”) subsequently became aware that closed-circuit television (“CCTV”) footage showing the glass door falling on the woman was disclosed on the Internet (the “Incident”). Facts of the Case 2 At the time of the incident, MCST 4375 had appointed Smart Property Management (Singapore) Pte Ltd (“SPMS”) as its managing agent and A Best Security Management Pte Ltd (“ABSM”) to provide security services at the Mall. These appointments took effect from 1 July 2018 and 1 June 2018 respectively. SPMS’ scope of work as managing agent included supervising service providers such as ABSM to ensure it carried out its duties properly. 3 On 24 February 2019, the senior security supervisor from ABSM (the “SSS”) who was on duty at the Mall’s Fire Control Centre, saw a glass door fall on a woman at Level 4 of the Mall’s car park lift lobby (the “Accident”) through Management Corporation Strata Title Plan No. 4375 & Others [2020] SGPDPC 4 the CCTV monitors. The SSS immediately called for an ambulance and notified MCST 4375’s Property Officer and ABSM’s Operations Manager of the Accident. Shortly thereafter, MCST 4375’s Property Officer asked the SSS to send her a copy of CCTV footage of the Accident. In response to this request, the SSS replayed the portion of the CCTV footage showing the Accident (the “Relevant CCTV Footage”) and recorded it with his mobile phone. The SSS then sent the copy of the Relevant CCTV Footage which he had recorded on his mobile phone to a WhatsApp group chat consisting of the SSS, the Security Executive from ABSM (the “SE”) who was also on duty at the time of the Accident, and MCST 4375’s Property Officer. The SSS also sent a copy of the same footage to ABSM’s Operations Manager in a separate WhatsApp message. Subsequently, the SE forwarded a copy of the Relevant CCTV Footage to the cleaning supervisor (engaged by MCST 4375) on duty at the time of the Accident (the “Cleaning Supervisor”). The SE also told the Cleaning Supervisor to inform the cleaners not to enter the barricaded area (where the Accident occurred) when carrying out their cleaning duties. 4 On 25 February 2019, a member of the management council of MCST 4375 (the “Management Council Member”) requested a copy of the Relevant CCTV Footage from the SSS for purposes of relating to an emergency meeting of MCST 4375’s management council. The SSS sent the Management Council Member a copy of the Relevant CCTV Footage. The Management Council Member then forwarded the Relevant CCTV Footage via WhatsApp to the other members of MCST 4375’s management council for their information. 5 On or around 26 February 2019, a copy of the Relevant CCTV Footage was posted onto the video-sharing website YouTube. The YouTube video containing a copy of the Relevant CCTV Footage was subsequently made available through various websites on the Internet. 2 Management Corporation Strata Title Plan No. 4375 & Others 6 [2020] SGPDPC 4 Since the discovery of the Incident, MCST 4375 took the following remedial actions: (a) MCST 4375 replaced SPMS with a new managing agent with effect from 18 March 2019; and (b) An internal memorandum was issued to all MCST 4375 employees specifying that there shall be no distribution of any documents or media materials from the management office of MCST 4375, without prior approval from MCST 4375’s management council. Findings and Basis for Determination 7 For the reasons set out below, I find MCST 4375 in breach of Sections 12 and 24 of the PDPA and ABSM in breach of section 24 of the PDPA. I find SPMS not to be in breach of any of its obligations under the PDPA in relation to the Incident. Breach of Sections 12 and 24 of the PDPA by MCST 4375 8 Under section 24 of the PDPA, MCST 4375 had the primary responsibility of ensuring that there are reasonable security arrangements in place to protect personal data in its possession or under its control. It is not disputed that MCST 4375 had possession and/or control of the Relevant CCTV Footage. To the extent that an MCST has appointed a managing agent or vendor to process personal data on its behalf, it should have in place a written agreement 3 Management Corporation Strata Title Plan No. 4375 & Others [2020] SGPDPC 4 with clauses requiring them to comply with the relevant data protection provisions under the PDPA1. 9 In the present case, MCST 4375 had engaged ABSM to provide security services which included management of CCTV footage recorded via the Mall’s CCTV system. In the course of providing security services, ABSM was engaged to process personal data on behalf of MCST 4375, to wit, ABSM had to process video footages captured by the Mall’s CCTV network and system. In this case, the SSS retrieved CCTV footage recorded by the Mall’s CCTV system, made a recording of an extract (i.e. the Relevant CCTV Footage) and transmitted it to various parties. These actions amount to “processing” as the term is defined in section 2(1) of the PDPA. Hence, the true nature of the relationship between MCST 4375 and ABSM is that of a data controller and data intermediary. 10 The Commission’s investigations revealed that MCST 4375 had security arrangements in place to restrict access to the Fire Control Centre (which was the only place where CCTV footage could be viewed). However, MCST 4375 did not provide any instructions to ABSM or SPMS in relation to requests for access to personal data, as well as the management of CCTV footage in general. Given its duties (which included processing CCTV footage on behalf of MCST 4375), MCST 4375 should have had written instructions clearly setting out the relevant procedures to be followed by ABSM and SPMS if they received a request for access to, or disclosure of, any CCTV footage recorded at the Mall. In the circumstances, I find MCST 4375 in breach of Section 24 of the PDPA. 1See Re KBox Entertainment Group Pte. Ltd. [2016] SGPDPC 1 at [12] and 29(b)(ii); the Commission’s Guide on Data Protection Clauses for Agreements Relating to the Processing of Personal Data (20 July 2016) which provides sample data protection clauses that organisations may find helpful 4 Management Corporation Strata Title Plan No. 4375 & Others 11 [2020] SGPDPC 4 In addition, under section 12 of the PDPA, organisations are required to develop and implement policies and practices that are necessary for the organisation to meet the obligations of the organisation under the PDPA. The importance of data protection policies have been emphasized multiple times in previous decisions 2, as well as the Commission’s Advisory Guidelines for Management Corporations (issued on 11 March 2019) at [2.6]. 12 It emerged during the course of the Commission’s investigations that MCST 4375 had not developed or put in place any data protection policies. According to MCST 4375, it expected its managing agent (i.e. SPMS) to put in place the necessary policies and practices for MCST 4375 to comply with the PDPA. However, the contract between MCST 4375 and SPMS did not contain any requirements or clauses to this effect. MCST 4375 also conceded that it had not given any instructions to SPMS in this regard. In the circumstances, I also find MCST 4375 in breach of Section 12 of the PDPA. Breach of Section 24 of the PDPA by ABSM 13 As mentioned at [9], the security services provided by ABSM included the management of CCTV footage. This amounted to “processing” of personal data as defined in section 2(1) of the PDPA. ABSM was accordingly acting as a data intermediary of MCST 4375 in respect of the Relevant CCTV Footage. 14 At the material time, ABSM had a Personal Data Protection Policy, which specifically provided that ABSM would not disclose personal data to third parties without MCST 4375’s consent. ABSM also had Standard 2See Re Aviva Ltd 2017 SGPDPC 14 at [32]; Re M Stars Movers & Logistics Specialist Pte Ltd [2017] SGPDPC 15 at [31] to [37]; Re AgcDesign Pte Ltd [2019] SGPDPC 23 at [5] 5 Management Corporation Strata Title Plan No. 4375 & Others [2020] SGPDPC 4 Operating Procedures (“SOP”) outlining the standards of conduct expected of its employees. However, the SOP did not include provisions in relation to the recording, retrieving or disclosure of CCTV footage recorded at the Mall or the personal data captured therein. In addition, ABSM had a Crisis Report Flow Chart for the reporting of incidents (such as the Accident) which also did not contain any provisions relating to the handling of personal data. 15 Although the Relevant CCTV Footage contained personal data that was publicly available and consent for disclosure is not required, section 18(a) of the PDPA overlays the requirement that disclosure must nevertheless be for a reasonably appropriate purpose in the circumstances. In my view, the disclosure of the Relevant CCTV Footage by the SSS to MCST 4375’s Property Officer, ABSM’s Operation Manager, the SE and the Management Council Member was for a reasonably appropriate purpose. Pursuant to the Crisis Report Flow Chart, the SSS had to inform representatives of MCST 4375 and his supervisor (i.e. the ABSM Operation Manager) of the Accident. The SE was on duty at the time of the Accident and would have been working with the SSS to manage the situation post-Accident. As for the disclosure to the Management Council Member, members of the Management Council are representatives of an MCST and disclosure to them was akin to disclosure to MCST 4375. 16 However, the disclosure of the Relevant CCTV Footage by SE to the Cleaning Supervisor was unauthorised and in direct contravention of both ABSM’s Personal Data Protection Policy and Crisis Report Flow Chart. Given that the Relevant CCTV Footage contained personal data that was recorded in the Mall, ABSM’s Personal Data Protection Policy required the SE to obtain MCST 4375’s approval before sending a copy of the Relevant CCTV Footage to the Cleaning Supervisor. The SE’s failure to do so may be due, at least in 6 Management Corporation Strata Title Plan No. 4375 & Others [2020] SGPDPC 4 part, to the lack of any provisions in the SOP setting out the procedures to be followed before CCTV footage is disclosed. 17 It is well-established that proper training is a key security arrangement in an organisation’s compliance with the protection obligation under section 24 of the PDPA3. Proper staff training – which creates data protection awareness amongst employees, imparts good practices in handling personal data, and puts employees on the alert for threats to the security of personal data – is necessary to complement an organisation’s data protection policies. According to ABSM, both the SSS and SE were briefed on the PDPA in August 2018 when they were assigned to work at the Mall. However, the SE’s conduct evidenced a lack of knowledge or understanding of ABSM’s internal policies and procedures. 18 In my view, ABSM failed to properly train and communicate its internal policies and procedures in relation to the protection of personal data to its employees. In particular, ABSM should have had a written policy setting out the procedures to be followed in relation to the disclosure of CCTV footage and the personal data therein. In the circumstances, I find ABSM in breach of Section 24 of the PDPA. No Breach of the PDPA by SPMS 19 SPMS was also a data intermediary of MCST 4375 in relation to the personal data it processed on their behalf when carrying out its duties as managing agent. As a data intermediary, SPMS had an obligation under section 3Re National University of Singapore [2017] SGPDPC 5 at [15] – [28]; Re SLF Green Maid Agency [2018] SGPDPC 27 at [12]; Re SME Motor Pte Ltd [2019] SGPDPC 21 at [10] and Advisory Guidelines On Key Concepts in the Personal Data Protection Act (Revised 9 Oct 2019) at [17.5] 7 Management Corporation Strata Title Plan No. 4375 & Others [2020] SGPDPC 4 24 of the PDPA to put in place reasonable security arrangements to protect such personal data which was in its possession or under its control. 20 Notably, the personal data which is the subject of the present case was not in the possession or under the control of SPMS. In particular, the Relevant CCTV Footage was in the possession and under the control of ABSM and was within the scope of ABSM’s responsibilities as MCST 4375’s security services provider. Accordingly, it was not SPMS’ responsibility to put in place reasonable security arrangements to protect the Relevant CCTV Footage. 21 While SPMS’ duty as managing agent was to exercise a supervisory role over ABSM, the Commission’s investigations revealed that this was limited to exercising broad oversight over the attendance and performance of duties by ABSM’s employees. In both ABSM’s Personal Data Protection Policy and Crisis Report Flow Chart, SPMS did not have a role with respect to the management or approval of requests for access or disclosure of personal data. In particular, there was no requirement for ABSM’s employees to consult or seek approval from SPMS in relation to the disclosure of CCTV footage. The Incident accordingly did not arise due to SPMS’ lack of supervision over ABSM. 22 In the circumstances, I find that SPMS was not in breach of any of its obligations under the PDPA in relation to the Incident. 8 Management Corporation Strata Title Plan No. 4375 & Others [2020] SGPDPC 4 The Deputy Commissioner’s Directions 23 Having considered all the relevant factors in this case, I hereby direct: (a) MCST 4375 to: (i) Develop and implement policies necessary for the protection of personal data in its possession and/or under its control to meet its obligations under Section 12 of the PDPA within 60 days from the date of this decision; (ii) Put in place reasonable security arrangements, including policies necessary for the protection of personal data in its possession and/or under its control to meet its obligations under Section 24 of the PDPA within 60 days from the date of this decision; (iii) As part of the security arrangements to be put in place, conduct training to ensure that its staff are aware of, and will comply with, the requirements of the PDPA when handling personal data within 60 days from date of decision; and (iv) Inform the Commission of the implementation of each of the above within 1 week of implementation; and (b) ABSM to: (i) Put in place reasonable security arrangements, including policies necessary for the protection of personal data in its possession and/or under its control to meet its obligations under Section 24 of the PDPA within 60 days from the date of this decision; and 9 Management Corporation Strata Title Plan No. 4375 & Others (ii) [2020] SGPDPC 4 Inform the Commission of the implementation of the above within 1 week of implementation. YEONG ZEE KIN DEPUTY COMMISSIONER FOR PERSONAL DATA PROTECTION 10 ",Directions,c9534d20c08d9b7217ff8dd7e875c02139ab7e2a,"[""pdf-content"",""timestamp"",""decision"",""pdf-url"",""tags"",""nature"",""url"",""title"",""date"",""description""]" 2023-10-01T11:02:10+08:00,fbd32491db44d3d0c97aa12a99cefd61ec954264,106,106,1,952,"Directions were imposed on Henry Park Primary School Parents’ Association for breaches of the PDPA. First, the organisation failed to put in place reasonable measures to protect its members’ personal data. Second, it did not appoint a data protection officer. Lastly, it did not have written policies and practices necessary to ensure its compliance with the PDPA.","[""Protection"", ""Accountability"", ""Directions""]",2020-02-11,https://www.pdpc.gov.sg/-/media/Files/PDPC/PDF-Files/Commissions-Decisions/Decision---HPPA.pdf,"Protection, Accountability",Breach of the Protection and Accountability Obligations by Henry Park Primary School Parents' Association,https://www.pdpc.gov.sg/all-commissions-decisions/2020/02/breach-of-the-protection-and-accountability-obligations-by-henry-park-primary-school-parents-association,2020-02-11,"PERSONAL DATA PROTECTION COMMISSION Case No. DP-1903-B3531 In the matter of an investigation under section 50(1) of the Personal Data Protection Act 2012 And Henry Park Primary School Parents’ Association SUMMARY OF THE DECISION 1. Henry Park Primary School Parents’ Association (the “Organisation”) is a registered society whose membership comprised parent volunteers. To register as members of the Organisation, individuals provided to the Organisation their names, contact numbers, name of child and the child’s class in Henry Park Primary School (the “Personal Data Set”). The Organisation had a website at https://hppa.org.sg (the “Website”) where members could view their own account particulars upon logging in using their assigned user ID and password. 2. On 15 March 2019, the Personal Data Protection Commission (“the Commission”) received a complaint. The complainant informed that when she performed a Google search using her name, she found a search result of a webpage of the Website which disclosed her personal data (the “Incident”). 3. The Personal Data Sets of registered members were never intended to be disclosed online. The Website had been developed by a parent volunteer using the WordPress content management system. 4. The Organisation had conducted tests to verify that members who logged in to the Website could view their own account particulars. The Organisation also verified that account particulars could not be viewed when accessing the Website as a public user. Nevertheless, the Personal Data Set was crawled, indexed and searchable by Google. This points to a weakness in access control that had not been picked up by these rudimentary tests. 5. Security testing such as vulnerability scans would have identified the access control issue. The Organisation failed to conduct adequate security testing before launching the Website. On the above facts, the Commission found that the Organisation did not put in place reasonable security arrangements to protect the Personal Data Sets. 6. The Commission also found that the Organisation had not appointed a person to be responsible for ensuring its compliance with the Personal Data Protection Act 2012 (the “PDPA”). Further, the Organisation had not developed and implemented any policies and practices necessary for it to meet its obligations under the PDPA. 7. The Organisation had taken the Website offline after the Incident on 15 March 2019. On 14 November 2019, the Organisation had put online a new website that no longer allowed online access to the database of the Organisation’s members. The new website also included a data protection notice. 8. In the circumstances, the Deputy Commissioner for Personal Data Protection found the Organisation in breach of sections 11(3), 12 and 24 of the PDPA. In determining the directions, the Deputy Commissioner took into consideration that the Organisation was a volunteer organisation made up primarily of parents. The Organisation is directed to, within 60 days, (i) appoint one or more individuals to be responsible for ensuring that it complies with the PDPA, (ii) develop and implement internal data protection and training policies, and (iii) to put all volunteers handling personal data through data protection training. ",Directions,79c294efa7335db9a6489bfae8e1c1eedccbf23b,"[""pdf-content"",""timestamp"",""decision"",""pdf-url"",""tags"",""nature"",""url"",""title"",""date"",""description""]" 2023-10-01T11:02:10+08:00,fbd32491db44d3d0c97aa12a99cefd61ec954264,115,115,1,952,"Directions, including a financial penalty of $20,000, were imposed on Society of Tourist Guides for breaches of the PDPA. First, the organisation failed to put in place reasonable measures to protect its members’ personal data. Second, it did not appoint a data protection officer. Lastly, it did not have written policies and practices necessary to ensure its compliance with the PDPA.","[""Protection"", ""Accountability"", ""Directions"", ""Financial Penalty""]",2020-01-09,https://www.pdpc.gov.sg/-/media/Files/PDPC/PDF-Files/Commissions-Decisions/Decision--Society-of-Tourist-Guides-Singapore-261219.pdf,"Protection, Accountability",Breach of the Protection and Accountability Obligations by Society of Tourist Guides,https://www.pdpc.gov.sg/all-commissions-decisions/2020/01/breach-of-the-protection-and-accountability-obligations-by-society-of-tourist-guides,2020-01-09,"PERSONAL DATA PROTECTION COMMISSION [2019] SGPDPC 48 Case No. DP-1903-B3445 In the matter of an investigation under section 50(1) of the Personal Data Protection Act 2012 And Society of Tourist Guides (Singapore) … Organisation DECISION Society of Tourist Guides (Singapore) [2019] SGPDPC 48 Tan Kiat How, Commissioner — Case No. DP-1903-B3445 26 December 2019 Introduction 1 On 3 March 2019, the Personal Data Protection Commission (the “Commission”) received a complaint that personal data of individuals had apparently been exposed to unauthorised access and disclosure through links on the Society of Tourist Guides (Singapore)’s (the “Organisation”) website. Facts of the Case 2 The Organisation is a non-profit organisation that works with the Singapore Tourism Board (“STB”) to promote the professionalism of tourist guides as tourism ambassadors of Singapore. Tourist guides registered with STB may sign up as members of the Organisation (“Members”). In May 2018, the Organisation engaged a Vietnam-based IT company (the “Vendor”) to develop its website https://societyoftouristguides.org.sg (the “Website”). 3 One of the Organisation’s purposes for the Website was to collect personal data from its Members. Personal data was collected from Members through their respective user accounts on the Website and included their names, photographs, contact numbers, e-mail addresses and 2 a write-up of themselves (for example, with the type of services they provided) (“Profile Data”). Members could also upload images of their identification documents (e.g. NRIC, employment pass, driving and vocational licences) which contained various personal data (“ID Data”). 4 Members’ Profile Data were published on their respective public profile pages on the Website. This enabled members of the public to find and engage a Member with the necessary experience and expertise to provide services that he or she required. 5 As regards the ID Data, these were used by the Organisation for a few purposes. These included (i) applying for SkillsFuture grants for training programmes conducted for Members; (ii) facilitating arrangements for Members to gain access to secure locations when required (e.g. transit areas in airports); and (iii) verifying that the Members were qualified to provide transport services based on his or her driving and vocational licences. 6 The Organisation did not specify any requirements to its Vendor with respect to the storage and protection of Members’ personal data collected through the Website. The Website was launched on 1 October 2018. Since its launch, the Organisation has been managing the Website, with the Vendor’s role limited to ad-hoc technical assistance. 7 On 3 March 2019, the Commission received a complaint that there had been disclosure without consent of sensitive information of individuals, such as Singapore National Registration Identity Card (“NRIC”), Driving Licence and photographs, through links on the Website (the “Incident”). The Commission’s investigations revealed that a total of 111 unique 1 Members were affected by the Incident (the “Affected Members”)1. In this regard, the publicly accessible directories on the Website (“Web Directories”) were found to store images of identification documents set out below which contained ID Data of the Affected Members (the “Disclosed Data”): S/N. Type of Identification Document 1 Type of Personal Data in the Identification Document Number of Members Affected 1. Singapore National Registration Identity Card (“NRIC”) Name, NRIC number, photograph, thumbprint, address, date of birth, country of birth, race, gender and date of issue. 97 2. Singapore Armed Forces Identity Card Name, NRIC number/colour, 1 photograph, address, date of birth, country of birth, race, gender, blood group, service status and military rank status. 3. Vietnamese Identity Card Name, card number, photograph, date of birth, place of birth, place of residence, fingerprints, ethnic group, religion and date of issue. 1 4. Singapore Employment Name, photograph, occupation, Pass Foreign Identification Number, date of application, date of issue, date of expiry and employer. 1 5. Singapore Driving Licence Name, licence number (same as NRIC number), photograph, date of birth, classes of vehicles the individual is licensed to drive and each pass date and date of issue. 47 6. Singapore Vocational Licence Name, licence number (same as 16 NRIC number), photograph, date of issue and type and description of each vocational licence held, and their respective dates of issue. A Member could have uploaded images of more than one type of identification document on the Website. 2 8 It also emerged in the course of the Commission’s investigations that the Organisation had not appointed any data protection officer (“DPO”), and had not developed and put in place any data protection policies that are necessary for it to meet its obligations under the Personal Data Protection Act 2012 (the “PDPA”). 9 Following the Incident, the Organisation took the following remedial actions: (a) Appointed two DPOs; (b) With the assistance of its Vendor, disabled public access to the Web Directories and contacted Google to remove all cached images of the Disclosed Data; and (c) Developed a data protection policy. Findings and Basis for Determination Whether the Organisation had contravened section 24 of the PDPA 10 As a preliminary point, the Organisation owned and managed the Website, and had possession and control over the Disclosed Data at all material times. While the Vendor had been engaged to develop the Website and subsequently provided technical assistance on an adhoc basis, the Vendor had not processed any personal data collected via the Website on the Organisation’s behalf. The Vendor was therefore not a data intermediary of the Organisation, and the Organisation was solely responsible for the protection of the Disclosed Data under the PDPA. 3 11 Section 24 of the PDPA requires an organisation to protect personal data in its possession or under its control by taking reasonable security steps or arrangements to prevent unauthorised access, collection, use, disclosure, copying, modification, disposal or similar risks. 12 In this regard, the Commissioner found that the Organisation had failed to put in place reasonable security arrangements to protect the Disclosed Data for the following reasons. First, as mentioned at [6], the Organisation did not specify any requirements to its Vendor with respect to the storage and protection of personal data (including the ID Data) which was collected from Members through the Website. The Organisation had intended for the Website to have public profile pages for which Members’ Profile Data were displayed for public access, but at the same time ID Data was collected and to be used for administrative purposes like applying for training grants, facilitating access to secure location and verifying driving qualifications. Clear requirements could and should have been communicated to its Vendor that ID Data collected through the Website was not meant to be publicly accessible. This can be done by the Organisation from the perspective of the business owner of the Website, while relying on the Vendor to propose the technical implementation that will meet this business requirement. 13 The Commission’s investigations also revealed that security testing had never been conducted since the launch of the Website in October 2018. In this regard, the Organisation admitted that it failed to take into consideration the security arrangements of the Website due to its lack of experience. As observed in WTS Automotive Services Pte Ltd [2018] SGPDPC 26 at [24], while an organisation may not have the requisite level of technical expertise, a 4 responsible organisation would have made genuine attempts to give proper instructions to its service providers. The gravamen in the present case was the Organisation’s failure to do so. 14 The Commission’s Guide on Building Websites for SMEs (revised 10 July 2018) provides guidance on what is expected from organisations contracting professional services to build their corporate websites or other online portals. In particular, organisations that engage IT vendors to develop and/or maintain their websites should emphasize the need for personal data protection to their IT vendors, by making it part of their contractual terms.2 15 Secondly, and as observed in Re Tutor City [2019] SGPDPC 5 at [21] to [23], where documents containing personal data have to reside on web servers, folder or directory permissions are common and direct methods of controlling access and preventing unauthorised access by public users and web crawlers. Depending on its business needs and circumstances, the Organisation could have instructed the Vendor to implement any of the following reasonable technical security measures to protect the Disclosed ID Images: (a) place documents containing the Disclosed ID Images in a non-public folder/directory. (b) place documents containing the Disclosed ID Images in a non-public folder or directory, with access to these documents controlled through web applications on the server. (c) place documents containing the Disclosed ID Images in a sub-folder within the Public Directory but control access to files by creating a .htaccess file within that subfolder. This .htaccess file may specify the access restrictions (e.g. implement a password requirement or an IP address restriction). 2 Guide on Building Websites for SMEs (revised 10 July 2018) at [4.2.1] 5 16 In view of the above, the Commissioner found that the Organisation had contravened section 24 of the PDPA. Whether the Organisation was in breach of sections 11(3) and 12 of the PDPA 17 In relation to the Organisation’s failure to appoint a DPO and develop and implement any data protection policy, these are required under sections 11(3) and 12 respectively of the PDPA. In particular, section 11(3) requires organisations to designate one or more individuals (typically referred to as a DPO) to be responsible for ensuring that they comply with the PDPA. Section 12 of the PDPA requires organisations to (among other things): (a) develop and implement policies and practices that are necessary for the organisation to meet the obligations of the organisation under the PDPA; and (b) 18 communicate information about such policies to its staff. The importance of these requirements have been emphasised multiple times in previous decisions. For example, it is important for an organisation to documents its data protection policies and practices in writing as they serve to increase awareness and ensure accountability of the organisation’s obligations under the PDPA (Re Aviva Ltd [2017] SGPDPC 14 at [32]). Similarly, appointing a DPO is important in ensuring the proper implementation of an organisation’s data protection policies and practices, as well as compliance with the PDPA (see e.g. Re M Stars Movers & Logistics Specialist Pte Ltd [2017] SGPDPC 15 at [31] to [37]). 6 19 In the circumstances, the Organisation was clearly in breach of sections 11(3) and 12 of the PDPA. While it has since appointed DPOs, it has not yet developed written policies and practices necessary to ensure its compliance with the PDPA. Representations by the Organisation 20 In the course of settling this decision, the Organisation made representations on the amount of financial penalty which the Commissioner intended to impose, and requested that the financial penalty be paid in instalments. The Organisation raised the following factors for the Commissioner’s consideration: (a) The Organisation had limited funds in its bank account and does not have any tangible assets which may be sold to raise funds to pay the financial penalty; (b) The Organisation had been making losses in the preceding 3 months; and (c) The Organisation has been seeking funding assistance from the Singapore Tourism Board. 21 Having carefully considered the representations, the Commissioner has decided to maintain the financial penalty set out in [23(a)]. The matters raised by the Organisation in [20] are not additional mitigating factors that justify a reduction in the financial penalty. However, the Commissioner is agreeable to the Organisation’s request that the financial penalty be paid in instalments. 7 The Commissioner’s Directions 22 In determining the directions, if any, to be imposed on the Organisation under section 29 of the PDPA, the Commissioner took into account the following mitigating factors: (a) The Organisation was cooperative in the investigations and provided information promptly; (b) Upon being notified of the Incident, the Organisation took action to disable public access to the Web Directories, and notified its Members of the Incident; and (c) There was limited unauthorised access and disclosure of the Disclosed ID Images as the Web Directories had only been accessed a total of 6 times. 23 Having considered all the relevant factors of this case, the Commissioner hereby directs the Organisation to: (a) Pay a financial penalty of $20,000 in 8 instalments by the due dates as set out below, failing which, the full outstanding amount shall become due and payable immediately and interest at the rate specified in the Rules of Court in respect of judgment debts shall accrue and be payable on the outstanding amount of such financial penalty until the financial penalty is paid in full: (i) 1st instalment of $2,500 on 1 February 2020; (ii) 2nd instalment of $2,500 on 1 March 2020; (iii) 3rd instalment of $2,500 on 1 April 2020; 8 (iv) 4th instalment of $2,500 on 1 May 2020; (v) 5th instalment of $2,500 on 1 June 2020; (vi) 6th instalment of $2,500 on 1 July 2020; (vii) 7th instalment of $2,500 on 1 August 2020; and (viii) 8th instalment of $2,500 on 1 September 2020. (b) Complete the following within 60 days from the date of this direction: (i) Review the security of the Website and implement appropriate security arrangements to protect the personal data in its possession or control; (ii) Put in place written internal policies and practices as required under section 12 of the PDPA; (iii) Develop and implement a training policy for employees of the Organisation handling personal data to be trained to be aware of, and to comply with the requirements of, the PDPA when handling personal data; and (iv) Require all existing employees to attend such training. YEONG ZEE KIN DEPUTY COMMISSIONER FOR COMMISSIONER FOR PERSONAL DATA PROTECTION 9 ","Directions, Financial Penalty",00f2b94a482f683c070998c51833856ca9a1a01a,"[""pdf-content"",""timestamp"",""decision"",""pdf-url"",""tags"",""nature"",""url"",""title"",""date"",""description""]" 2023-10-01T11:02:10+08:00,fbd32491db44d3d0c97aa12a99cefd61ec954264,122,122,1,952,"Global Outsource Solutions was found in breach of the PDPA for failing to put in place reasonable security arrangements to protect the personal data collected by its website and for failing to develop and implement data protection policies. This resulted in the disclosure of personal data of customers on the organisation’s online warranty registration portal. Global Outsource Solutions was directed to develop and implement policies for data protection and staff training in data protection, and to put all employees handling personal data through such training.","[""Protection"", ""Accountability"", ""Directions""]",2019-12-05,https://www.pdpc.gov.sg/-/media/Files/PDPC/PDF-Files/Commissions-Decisions/Summary-Decision---Global-Outsource.pdf,"Protection, Accountability",Breach of the Protection and Accountability Obligations by Global Outsource Solutions,https://www.pdpc.gov.sg/all-commissions-decisions/2019/12/breach-of-the-protection-and-accountability-obligations-by-global-outsource-solutions,2019-12-05,"PERSONAL DATA PROTECTION COMMISSION Case No. DP-1809-B2767 In the matter of an investigation under section 50(1) of the Personal Data Protection Act 2012 And Global Outsource Solutions Pte. Ltd. SUMMARY OF THE DECISION 1. Global Outsource Solutions Pte. Ltd. (the “Organisation”) provided warranties for products purchased by its clients’ customers. To be eligible for this warranty, customers registered their purchases with the Organisation via the Organisation’s website at http://www.globaloutsourceasia.com (the “Website”). The Organisation collected various personal data from such customers for this purpose, including personal information such as their name, email address, mailing address and contact number, and details of the customers’ purchases such as the name of the product purchased, the purchase date, the name of the retailer and the location of the physical store where the product was purchased (collectively, the “Personal Data”). 2. The Personal Data Protection Commission (“the Commission”) received a complaint on 23 September 2018 that the complainant could access the Personal Data of another individual when viewing a warranty registration summary page on the Website (the “Incident”). 3. The Organisation admitted to the occurrence of the Incident but was unable to identify the cause of the Incident. The Commission found that the Organisation had not provided any security requirements to the vendor it had engaged sometime in 2013 to develop the Website. Consequently, it had not reviewed the Website’s security arrangements or conducted any security testing on the Website. In the circumstances, the Organisation had not implemented reasonable security arrangements to protect the personal data collected by the Website (including but not limited to the Personal Data disclosed in the Incident) and is therefore in breach of section 24 of the PDPA. 4. The Commission also found that the Organisation did not have any internal data protection policies for its employees in relation to the handling of personal data for the purposes of registering products through the Website. This failure to develop and implement such internal data protection policies is a breach of section 12 of the PDPA. 5. The Organisation has since removed the warranty registration section on its website and is in the process of revamping its Website to incorporate the necessary security arrangements. The Organisation is directed to develop and implement policies for data protection and staff training in data protection, and to put all employees handling personal data through data protection training. ",Directions,ab0971aeb10525bfdeea3bf683966ddd8fc40f11,"[""pdf-content"",""timestamp"",""decision"",""pdf-url"",""tags"",""nature"",""url"",""title"",""date"",""description""]" 2023-10-01T11:02:10+08:00,fbd32491db44d3d0c97aa12a99cefd61ec954264,124,124,1,952,"A financial penalty of $12,000 was imposed on The Travel Corporation (2011) for breaches of the PDPA. The Organisation failed to appoint a data protection officer and did not put in place reasonable security arrangements to protect its customers’ personal data stored in portable storage devices.","[""Protection"", ""Accountability"", ""Financial Penalty""]",2019-12-05,https://www.pdpc.gov.sg/-/media/Files/PDPC/PDF-Files/Commissions-Decisions/Grounds-of-Decision---The-Travel-Corporation-2011-Pte-Ltd.pdf,"Protection, Accountability",Breach of the Protection and Accountability Obligations by The Travel Corporation (2011),https://www.pdpc.gov.sg/all-commissions-decisions/2019/12/breach-of-the-protection-and-accountability-obligations-by-the-travel-corporation-(2011),2019-12-05,"PERSONAL DATA PROTECTION COMMISSION [2019] SGPDPC 42 Case No. DP-1810-B2821 In the matter of an investigation under section 50(1) of the Personal Data Protection Act 2012 And The Travel Corporation (2011) Pte. Ltd. … Organisation DECISION The Travel Corporation (2011) Pte. Ltd. [2019] SGPDPC 42 Tan Kiat How, Commissioner — Case No. DP-1810-B2821 19 November 2019 Introduction and Material Facts 1 The Travel Corporation (2011) Pte. Ltd. (the “Organisation”) offers travel packages both directly to Singapore customers and via third party travel agencies. On 1 October 2018, the Organisation notified the Personal Data Protection Commission (the “Commission”) regarding the loss of a portable hard disk (the “Hard Disk”) which contained unencrypted files with the personal data of the Organisation’s customers, employees and suppliers (the “Incident”). The facts and circumstances of the Incident are as follows. 2 On 25 July 2018, a new employee of the Organisation left the office with her laptop and the Hard Disk; and misplaced both these devices on her way home. She initially only informed the Organisation about the loss of the laptop and a police report was made on 31 July 2018. The misplaced laptop did not contain any personal data. She eventually informed the Organisation about the loss of the Hard Disk on 21 September 2018 and the Organisation made another police report that day. 2 3 The table below summarises the number of affected individuals and their corresponding types of personal data contained in the Hard Disk: S/N. Category Types of Personal Data in the Hard Disk 1. Name, Email Address, Phone Number, Date of Birth and Postal Address Customers Number of Individuals Affected 5,437 2. Same as item 1 plus Passport Number 21 3. Same as item 1 plus NRIC Number 242 4. Prospective Customers Same as item 1 11,000 5. Employees Name, Office Email Address and Office Phone Number 30 6. Suppliers Names, Company Address, Email Address, Mobile Number, Office Number 1,900 Total number of individuals 18,630 4 It also emerged in the course of the Commission’s investigations that the Organisation had not appointed any data protection officer (“DPO”) prior to the data breach incident on 25 July 2018. Remedial actions by the Organisation 5 The Organisation subsequently took the following remedial measures: 1 (a) The Organisation ceased the use of portable storage devices and implemented the use of cloud-based storage for personal data in its possession; and (b) The Organisation appointed a DPO on 22 October 2018. Findings and Basis for Determination Whether the Organisation had breached its obligation to protect personal data under section 24 of the PDPA 6 Section 24 of the PDPA requires an organisation to protect personal data in its possession or under its control by making reasonable security arrangements. A review of the evidence disclosed that business contact information of the Organisation’s own employees and its suppliers comprised about 10% of the total number of affected individuals. Pursuant to 4(5) of the PDPA, section 24 of the PDPA did not apply to such personal data. However, the personal data of the Organisation’s customers and prospective customers (the “Customers’ Personal Data”) have to be protected under the PDPA. 7 The Organisation failed to protect its Customers’ Personal Data as it failed to implement appropriate internal policies governing the use of portable storage devices containing personal data. While the Organisation has a Portable Computer and Storage Devices Policy that stipulated that ‘portable computing and storage devices used for business purposes must have designated custodians’, the Organisation did not have any operational frameworks or procedures in place that effectively implements this policy in its individual business units. The Organisation only relied on verbal instructions to instruct its employees not to bring any 2 portable storage devices out from the office premises. Further, the Organisation did not implement any password protection policies or data encryption policies for its portable storage devices, including the Hard Disk, although it had clear guidelines in its Acceptable User Policy and Information Sensitivity Policy to do so. 8 In the circumstances, the Commissioner found that the Organisation had not made reasonable security arrangements to protect its Customers Personal Data. The Organisation is accordingly in breach of section 24 of the PDPA. Whether the Organisation was in breach of section 11(3) of the PDPA 9 Section 11(3) of the PDPA requires organisations to designate one or more individuals (typically referred to as a DPO) to be responsible for ensuring that they comply with the PDPA. Appointing a DPO is important in ensuring the proper implementation of an organisation’s data protections policies and practices, as well as compliance with the PDPA: see e.g. Re M Stars Movers & Logistics Specialist Pte Ltd [2017] SGPDPC 15 at [31] to [37]. 10 As the Organisation failed to appoint a DPO prior to the data breach incident, the Commissioner found the Organisation in breach of section 11(3) of the PDPA. The Commissioner’s Directions 11 In view of the above findings, the Commissioner directs the Organisation to pay a financial penalty of $12,000 within 30 days from the date of this direction, failing which, interest at the rate specified in the Rules of Court in respect of judgment debts shall accrue and 3 be payable on the outstanding amount of such financial penalty until the financial penalty is paid in full. 12 In coming to this finding, the following mitigating factors were taken into account: (a) the Organisation notified the Commission of the Incident and fully co-operated with the Commission’s investigations; (b) the Organisation promptly implemented remedial measures, as set out at paragraph 5, to address the breach; (c) the Organisation is actively addressing system security related recommendations provided by an external auditor; and (d) 13 the Commission had not received any complaints as a result of the Incident. In view of the remedial measures taken by the Organisation, the Commissioner decided not to impose any other directions. The Organisation’s Representations 14 After the preliminary decision was issued to the Organisation, it made representations for a warning be issued instead of an imposition of a financial penalty. The Organisation did not dispute the finding that it had breached section 24 of the PDPA. 4 15 In support of its request for a warning instead of the imposition of a financial penalty, the Organisation represented that it had taken the following rectification and remediation measures: (a) conducting a PDPA impact and gap analysis; (b) developing and enhancing internal PDPA policies and procedures; (c) improving current back-up systems and disaster recovery plans across the business promptly following the Incident; (d) notifying the affected individuals as soon as possible after the Incident; (e) filing a police report in case of potential misuse, ransom and/or other criminal activity; 16 (f) arranging for PDPA training for employees; (g) publishing a privacy notice / statement on its website; and (h) demonstrating proper coordination and practices in place; and (i) appointing a DPO. The majority of the matters raised in mitigation are essentially remediation measures following from the gap analysis that the Organisation had performed. Due consideration had already been given to the prompt action that the Organisation took when the quantum of financial penalty was initially determined. None of the measures warrants an adjustment to the 5 quantum of the financial penalty. Hence, the Organisation did not provide sufficient justification for the financial penalty to be replaced with a warning. 17 In its representations, the Organisation had provided an explanation for its failure to appoint a DPO. It had sent 2 employees to attend a data protection certification course. The Organisation explained that it did not appoint a DPO at the material time as its employees who attended the Certified Information Privacy Manager (“CIPM”) course had failed to pass the CIPM exams despite multiple attempts and the Organisation was under the impression that they could not be appointed as DPOs without passing the relevant exams. 18 This misapprehension conflates the obligation to appoint a DPO and what is a reasonable way to go about it. The obligation for organisations to designate a DPO to ensure compliance with the PDPA under section 11(3) of the PDPA is a mandatory requirement under law. In the ideal case, the person appointed would be qualified to perform the role and undertake the responsibilities of a DPO at the time of appointment. The PDPA does not specify what these qualifications are. Furthermore, the pool of qualified DPOs, while growing, is small. There will be many instances where organisations will not be able to identify a member of staff or management who is already qualified. It is, therefore, perfectly acceptable to appoint a DPO and then send her for the necessary courses. In these situations, the Organisation should monitor 6 the DPO’s progress to ensure that there is no tardiness in completing the courses and achieving the requisite qualification. YEONG ZEE KIN DEPUTY COMMISSIONER FOR COMMISSIONER FOR PERSONAL DATA PROTECTION 7 ",Financial Penalty,673e8e9d7c2079f8018401c7ea6189c7ee37e666,"[""pdf-content"",""timestamp"",""decision"",""pdf-url"",""tags"",""nature"",""url"",""title"",""date"",""description""]" 2023-10-01T11:02:10+08:00,fbd32491db44d3d0c97aa12a99cefd61ec954264,132,132,1,952,"Directions, including a financial penalty of $15,000, were imposed on EU Holidays for breaches of the PDPA. The organisation failed to put in place reasonable measures to protect its customers’ personal data and did not have written policies and practices necessary to ensure its compliance with the PDPA.","[""Protection"", ""Accountability"", ""Directions"", ""Financial Penalty""]",2019-11-04,https://www.pdpc.gov.sg/-/media/Files/PDPC/PDF-Files/Commissions-Decisions/Grounds-of-Decision---EU-Holidays-Pte-Ltd.pdf,"Protection, Accountability",Breach of the Protection and Accountability Obligations by EU Holidays,https://www.pdpc.gov.sg/all-commissions-decisions/2019/11/breach-of-the-protection-and-accountability-obligations-by-eu-holidays,2019-11-04,"PERSONAL DATA PROTECTION COMMISSION [2019] SGPDPC 38 Case No DP-1901-B3254 In the matter of an investigation under section 50(1) of the Personal Data Protection Act 2012 And EU Holidays Pte. Ltd. … Organisation DECISION 1 EU Holidays Pte. Ltd. [2019] SGPDPC 38 Tan Kiat How, Commissioner — Case No DP-1901-B3254 4 October 2019 Introduction 1 On 14 January 2019, the Personal Data Protection Commission (the “Commission”) received a complaint that personal data of EU Holidays Pte. Ltd.’s (the “Organisation”) customers was accessible through its website (the “Incident”). Facts of the Case 2 Pursuant to a Quotation of Services dated 16 May 2017 (“Contract”), the Organisation engaged an IT vendor (the “Vendor”) to develop a new website with e-commerce capabilities (the “Website”). One of the purposes of the Website was to allow the Organisation’s customers (“Customers”) to make online reservations for tour packages either directly or through the Organisation’s partner agents. Information relating to travel reservations received from Customers were stored in 2 web directories. For reservations made directly by Customers on the Website, the tax invoice generated would be stored in a web directory (“Web Directory 1”). As for reservations made through the Organisation’s partner agents on the Website, the tax invoice generated would be stored in another web directory (“Web Directory 2”). 3 The scope of work in the Contract did not specify any requirements with respect to the storage and protection of Customers’ personal data which was collected through the Website. The Website was launched on 9 December 2017. Since its launch, the Organisation has been managing the Website, with the Vendor’s role limited to maintenance and technical troubleshooting. 4 On or around 5 January 2019, a member of the public (“Complainant”) discovered copies of tax invoices containing Customers’ personal information while browsing for tour packages on the Website. The Complainant notified the Commission of the Incident on 14 January 2019. 2 EU Holidays Pte. Ltd. 5 [2019] SGPDPC 38 Based on the Organisation’s internal records, from 9 December 2017 to 14 January 2019, tax invoices containing information of 1,077 Customers were exposed to unauthorised access and disclosure through links to Web Directory 1 and Web Directory 2.1 The information contained in the invoices include the following personal data (collectively, the “Disclosed Personal Data”): (a) Name; (b) Email address; (c) Address; (d) Contact number; (e) Booking date; (f) Travel destination; (g) Departure date; (h) Gender; (i) Date of birth; (j) Passport details (including number, date of issue and expiry); (k) Rooming arrangement (i.e. whether travellers are adults / children and the type of beds required); and (l) 6 Amount payable. Upon being notified of the Incident, the Organisation promptly carried out the following remedial actions: (a) Deleted all tax invoices stored on Web Directory 1; and (b) Disabled public access to Web Directory 2. 1 Specifically, the information of 336 Customers were stored in Directory 1 and the information of 741 Customers were stored in Directory 2. 3 EU Holidays Pte. Ltd. 7 [2019] SGPDPC 38 Separately, the Commission’s investigations revealed that the Organisation had not developed or implemented any internal data protection policies that are necessary for it to meet its obligations under the Personal Data Protection Act 2012 (the “PDPA”). Findings and Basis for Determination Whether the Organisation had contravened section 24 of the PDPA 8 As a preliminary point, the Organisation owned and managed the Website and had possession and control over the Disclosed Personal Data at all material times. While the Vendor had been engaged to develop the Website and subsequently provided maintenance and technical troubleshooting services, the Vendor had not processed the Disclosed Personal Data on the Organisation’s behalf. The Vendor was therefore not a data intermediary of the Organisation, and the Organisation was solely responsible for the protection of the Disclosed Personal Data under the PDPA. 9 Section 24 of the PDPA requires an organisation to protect personal data in its possession or under its control by taking reasonable security steps or arrangements to prevent unauthorised access, collection, use, disclosure, copying, modification, disposal or similar risks. In the Commissioner’s view, the Organisation failed to put in place reasonable security arrangements to protect the Disclosed Personal Data as explained below. 10 First, the Organisation failed to assess the risks to the Disclosed Personal Data collected through its Website and stored in Web Directory 1 and Web Directory 2. The investigations revealed that the Organisation had left it to the Vendor to put in place the appropriate security arrangements to protect the Disclosed Personal Data. Consequently, as mentioned at [3], the scope of work in the Contract did not include any requirements with respect to how the Disclosed Personal Data was to be stored or protected. The Organisation also did not review the standard of security of the Website and left it completely to the Vendor. In particular: (a) In relation to Web Directory 1, prior to the Incident, since the Organisation did not provide any instructions to the Vendor on the storage of tax invoices generated from direct reservations on its Website, it was unaware that such tax invoices were stored in Web Directory 1 which was publicly accessible. In this regard, the Organisation’s assertion was that it had intended for these tax invoices to be stored in a backend 4 EU Holidays Pte. Ltd. [2019] SGPDPC 38 Content Management System which only authorised staff could log into and access. Its intention was not translated into action. (b) In relation to Web Directory 2, the Organisation intended for tax invoices generated from reservations through its partner agents to be stored in Web Directory 2, and accessed by partner agents using their respective email addresses and password. The Organisation asserted that did not intend for Web Directory 2 to be publicly accessible. However, since the Organisation did not provide any instructions to the Vendor in relation to access controls for Web Directory 2, none was implemented. 11 What is expected from organisations contracting professional services to build their corporate websites or other online portals is explained in the Commission’s Guide on Building Websites for SMEs (revised 10 July 2018). In particular, organisations that engage IT vendors to develop and/or maintain their websites should emphasize the need for personal data protection to their IT vendors, by making it part of their contractual terms.2 Given that the development of the Website was for the purposes of e-commerce (including the collection of Customers’ Disclosed Personal Data in relation to reservations for tour packages), the Organisation’s failure to specify clear requirements with respect to the protection of personal data is particularly glaring in this case. 12 Secondly, and as observed in Re Tutor City [2019] SGPDPC 5 at [21] to [23], where documents containing personal data have to reside on web servers, folder or directory permissions are common and direct methods of controlling access and preventing unauthorised access by public users and web crawlers. Depending on its business needs and circumstances, the Organisation could have instructed the Vendor to implement any of the following reasonable technical security measures to protect the Disclosed Personal Data: (a) place documents containing the Disclosed Personal Data in a non-public folder/directory. (b) place documents containing the Disclosed Personal Data in a non-public folder or directory, with access to these documents controlled through web applications on the server. 2 Guide on Building Websites for SMEs (revised 10 July 2018) at [4.2.1] 5 EU Holidays Pte. Ltd. (c) [2019] SGPDPC 38 place documents containing the Disclosed Personal Data in a sub-folder within the Public Directory but control access to files by creating a .htaccess file within that sub-folder. This .htaccess file may specify the access restrictions (e.g. implement a password requirement or an IP address restriction). 13 In view of the above, the Commissioner found that the Organisation had contravened section 24 of the PDPA. Whether the Organisation had contravened section 12 of the PDPA 14 Section 12 of the PDPA requires organisations to develop and implement policies and practices that are necessary for the organisation to meet its obligations under the PDPA and communicate information about such policies to its staff. 15 By the nature of its business as a travel agency, the Organisation regularly collects personal data of customers to fulfil reservations for tour packages. Notwithstanding this, the Organisation did not have any internal data protection policies to provide guidance to its employees on the handling of such personal data. 16 In the circumstances, the Commissioner found that the Organisation had contravened section 12 of the PDPA. The Commissioner’s Directions 17 In determining the directions, if any, to be imposed on the Organisation under section 29 of the PDPA, the Commissioner took into account the following mitigating factors: (a) the Organisation took prompt remedial actions following the Incident; (b) the Organisation was cooperative during the investigations; and (c) Although the Disclosed Personal Data of 1,077 Customers was at risk of unauthorised access and disclosure, actual disclosure was only to the Complainant in respect of Customers’ Disclosed Personal Data in 20 invoices albeit for a period of more than 1 year. 6 EU Holidays Pte. Ltd. 18 [2019] SGPDPC 38 Having considered all the relevant factors of this case, the Commissioner hereby directs the Organisation to: (a) Pay a financial penalty of $15,000 within 30 days from the date of the directions, failing which interest at the rate specified in the Rules of Court in respect of judgment debts shall accrue and be payable on the outstanding amount of such financial penalty until the financial penalty is paid in full; (b) Complete the following within 60 days from the date of this direction: (i) Review the security of the Website and implement appropriate security arrangements to protect personal data in its possession and/or under its control; (ii) Put in place a data protection policy, including written internal policies, to comply with the provisions of the PDPA; and (iii) Develop a training programme for the Organisation’s employees in respect of their obligations under the PDPA when handling personal data and require all employees to attend such training YEONG ZEE KIN DEPUTY COMMISSIONER FOR COMMISSIONER FOR PERSONAL DATA PROTECTION 7 ","Directions, Financial Penalty",e42f8ca451f258f74f2ef56d5d97b02110634815,"[""pdf-content"",""timestamp"",""decision"",""pdf-url"",""tags"",""nature"",""url"",""title"",""date"",""description""]" 2023-10-01T11:02:10+08:00,fbd32491db44d3d0c97aa12a99cefd61ec954264,138,138,1,952,"A financial penalty of $1,000 was imposed on Advance Home Tutors for failing to put in place reasonable security arrangements to protect the personal data collected from its tutors and for not developing and implementing data protection policies and practices necessary to ensure its compliance with PDPA.","[""Protection"", ""Accountability"", ""Financial Penalty"", ""Education"", ""Tuition""]",2019-10-10,https://www.pdpc.gov.sg/-/media/Files/PDPC/PDF-Files/Commissions-Decisions/Grounds-of-Decision---Advance-Home-Tutors.pdf,"Protection, Accountability",Breach of the Protection and Accountability Obligations by Advance Home Tutors,https://www.pdpc.gov.sg/all-commissions-decisions/2019/10/breach-of-the-protection-and-accountability-obligations-by-advance-home-tutors,2019-10-10,"PERSONAL DATA PROTECTION COMMISSION [2019] SGPDPC 35 Case No DP-1806-B2218 In the matter of an investigation under section 50(1) of the Personal Data Protection Act 2012 And Advance Home Tutors … Organisation DECISION Advance Home Tutors [2019] SGPDPC 35 Yeong Zee Kin, Deputy Commissioner — Case No DP-1806-B2218 12 September 2019 Facts of the Case 1 On 7 June 2018, the Personal Data Protection Commission (the “Commission”) received a complaint that personal data of many individuals had apparently been disclosed without authorisation on the Organisation’s website, www.advancetutors.com.sg (the “Website”). Upon investigation, the Commission found the following facts leading to this apparent unauthorised disclosure of personal data. 2 The Organisation is a sole proprietor who provides “matching services” through the Website between freelance tutors and prospective clients seeking tuition services. 3 In January 2017, the Organisation engaged a freelance web developer based in the Philippines (the “Developer”) to provide the following services: (a) to design and develop the Website; and (b) to migrate the existing databases and files of the Organisation’s old website to the Website. 1 Advance Home Tutors 4 [2019] SGPDPC 35 At that point in time, 834 freelance tutors had signed up with the Organisation and some of these tutors had chosen to upload their educational certificates to the Website’s server (the “Server”) via the Website. These certificates would be used by the Organisation to evaluate the suitability of the tutors for prospective jobs. In addition, copies of a tutor’s certificates were to be disclosed on the tutor’s public profile on the Website if the tutor consented to such disclosure. Out of the tutors who had uploaded educational certificates, a total of 152 tutors (the “Affected Individuals”) had not consented to disclosure of their educational certificates on their public profile. 5 The Developer subsequently migrated the educational certificates of the tutors who had uploaded them to the Website and stored them in an image subdirectory of a public directory found on the Server (the “Image Directory”). These directories were not secured with any form of access controls and were accessible by the public via the Internet if the path to the relevant directory was typed into a web browser. Furthermore, no measures were taken to prevent automatic indexing of the Image Directory by Internet search engines. This resulted in the contents of the Image Directory, including the educational certificates of the Affected Individuals, showing up in search results on Google after the Website went live on 17 October 2017. 6 On 6 April 2018, the Organisation informed the Developer to make certain changes to the Website in order to disclose the education certificates of consenting tutors on their public profile pages on the Website. The Organisation provided written instructions to the Developer to “migrate all existing tutor profiles from the [old website] to the [Website]”, and to “impose all pre-existing conditions in the [old website] to the [Website] when migrating the tutors”. 2 Advance Home Tutors [2019] SGPDPC 35 According to the Organisation, one of the pre-existing conditions of the old website was to only disclose educational certificates of tutors who had consent. 7 The Organisation also represented that it had provided the following verbal instructions to the Developer: (a) to “hide the educational certificates of tutors who did not give consent”; (b) to “respect and protect the privacy and confidentiality of all the data that is present in AHT website”; (c) it “should not disclose or share any of the personal data or AHT Admin user account details with a third party”; and (d) to “ensure users’ data is protected as AHT had entrusted them for the purpose of IT services”. 8 Acting on the Organisation’s instructions, the Developer wrote a coding script to enable the retrieval and display of the educational certificates from the Image Directory. However, the coding script lacked a validation condition to ensure that only educational certificates of tutors who had consented to disclosure were disclosed on the tutors’ profile pages on the Website. This resulted in all of the educational certificates found in the Image Directory, including those of the Affected Individuals, being retrieved and publicly disclosed on the Website through the tutors’ respective profile pages. 9 The disclosure of the Affected Individuals’ educational certificates (described at [5] and [8] above) resulted in the unauthorised disclosure their personal data which were found on their respective educational certificates (the “Incident”). The disclosed personal data included data such as the individual’s name and NRIC number, educational institutions attended and grades attained for each subject (the “Disclosed Data”). 3 Advance Home Tutors 10 [2019] SGPDPC 35 Separately, during the Commission’s investigations, the Organisation admitted that it had not developed or implemented any data protection policies relating to its compliance with the Personal Data Protection Act 2012 (the “PDPA”). Remedial measures taken by the Organisation 11 After being notified of the Incident, the Organisation took the following steps to mitigate the effects of the breach and to prevent its reoccurrence: (a) deleted all the educational certificates that were stored in the Image Directory; (b) ceased retention of any educational certificates received from the tutors; (c) requested Google to remove any cached copies of the educational certificates from the Image Directory; (d) conducted a penetration test to discover and address any gaps in respect of its security arrangements in respect of the Website and its server; (e) removed all front-end access to the “Search Tutor” and “Tutor Profile” pages of the Website; (f) engaged an external system analyst to check the work which may be performed by the Developer in future; and (g) developed a data protection policy. Findings and Basis for Determination Whether the Organisation had breached section 24 of the PDPA 4 Advance Home Tutors 12 [2019] SGPDPC 35 Although the Organisation had engaged the Developer to provide various services, the Organisation retained possession and control over the Disclosed Data at all material times. It was responsible for the security arrangements to be implemented on the Website and its back-end system, as well as to protect the Disclosed Data. 13 Section 24 of the PDPA requires an organisation to protect personal data in its possession or under its control by making reasonable security arrangements to prevent unauthorised access, collection, use, disclosure, copying, modification, disposal and similar risks. 14 To determine whether the Organisation was in breach of section 24, the relevant question is whether it had put in place reasonable security arrangements to safeguard the Disclosed Data hosted on the Website and its Server. As the Disclosed Data included the NRIC numbers of the tutors concerned, it should be borne in mind that NRIC numbers are of special concern as they are “a permanent and irreplaceable identifier which can be used to unlock large amounts of information relating to the individual”.1 Further, the Commission’s Advisory Guidelines on the PDPA for NRIC and Other National Identification Numbers (issued 31 August 2018) at [2.4], albeit not effective at the time of the breach, points to the risks and potential impact of any unauthorised use or disclosure of personal data associated with an individual’s NRIC; and the expectation that organisations are to provide a greater level of security to protect NRIC numbers in its possession or control. 15 As the Organisation had engaged the Developer to develop the Website, the onus is on the Organisation to ensure that its security requirements for the 1 Re Habitat for Humanity Singapore Ltd [2018] SGPDPC 9 at [19] 5 Advance Home Tutors [2019] SGPDPC 35 Website and Server will be and have been met by the Developer. As part of this, the Organisation could have done the following2: (a) emphasised the need for personal data protection to the Developer by making it part of the written contract; (b) when discussing the Developer’s scope of work, required that any changes the Developer made to the Website did not contain vulnerabilities that could expose the personal data, and to discuss whether the Developer had the necessary technical and nontechnical processes in place to prevent the personal data from being exposed, accidentally or otherwise; and (c) tested the Website before any new changes went live to ensure that the Organisation’s instructions to the Developer were properly implemented and that the Website was sufficiently robust and comprehensive to guard against a possible cyberattack. 16 The Organisation admitted to the Commission that “there was a lack of technical expertise within Advance Home Tutor to protect personal data”, including the lack of expertise “on how to make the technical assessment and ensure that the assessment is robust enough for adequate protection for personal data”. This is also evident from the fact that the Organisation had required the Developer to migrate the information of its then-existing tutors from the old website to the Website “with the exact same conditions imposed” 2 Further information on the steps that the Organisation should have taken when outsourcing the development of its Website may be found in the Commission’s Guide to Building Websites for SMEs. 6 Advance Home Tutors [2019] SGPDPC 35 on the old website, without having any idea of how its old website had been configured. 17 Similar to Re Tutor City [2019] SGPDPC 5 (“Tutor City”), the Organisation also did not: (a) communicate any specific security requirements to the Developer to protect the personal data stored on the Server; (b) make reasonable effort to find out and understand the security measures implemented by the Developer for the Website; (c) attempt to verify that the security measures implemented had indeed “respect[ed] and protect[ed] the privacy and confidentiality of all the data that is present on the Website” to the extent expected by the Organisation; and (d) 18 conduct any reasonable security testing (e.g. penetration tests). To be clear, the lack of knowledge on the PDPA or expertise in the area of IT security is not a defence against the failure to take sufficient steps to comply with section 24 of the PDPA. There were resources, including the guides published by the Commission, and skilled personnel available that the Organisation could have relied on to increase its knowledge in the relevant areas or to assist it in complying with its obligations under the PDPA. 19 Related to the above, I note that the Organisation’s purported instruction to the Developer to “respect and protect the privacy and confidentiality of all the data that is present on the Website” does not constitute a security measure. The Organisation should have reviewed the security standard implemented on 7 Advance Home Tutors [2019] SGPDPC 35 the Website and provided its Developer the intended use cases and identify foreseeable risks.3 20 More generally, although the Organisation asserted that it had provided verbal instructions to the Developer (see [7] above), these have not been substantiated by any evidence. According to the document entitled “Project Scope” entered into between the Organisation and the Developer, there was no specification relating to the security arrangements that the Developer was required to design into the Website and its back-end system. The Organisation ought to have entered into a written agreement with the Developer that clearly stated the standard of compliance that the Organisation expected its Website and Server to have with the PDPA, and the Developer’s responsibilities in this regard. 21 As regards security testing, while the Organisation had conducted some testing of the Website from the functionality perspective, i.e., to verify that certificates of consenting tutors were disclosed on their profile pages, it did not check the profile pages of non-consenting tutors to ensure their certificates were not disclosed. It also did not check if the Website contained any other vulnerabilities that posed a risk to the personal data hosted on the Server. Had the Organisation done a proper security test, the lack of access controls for the certificates hosted on the Image Directory and the unauthorised disclosure of the certificates of non-consenting tutors on their profiles would have been apparent. It would then have been able to take the necessary steps to rectify these security issues. That said, I understand that the Organisation has, since the Incident, procured the Developer to conduct a penetration test and resolve the high risk issues identified by it. 3 Re Tutor City [2019] SGPDPC 5 at [18] 8 Advance Home Tutors 22 [2019] SGPDPC 35 As regards the lack of access controls, it has been observed in Tutor City (at [21] to [23]) that technical measures are available that prevent indexing of images by web crawlers: viz, 23 (a) First, the Organisation could have placed these documents in a folder of a non-public folder/directory. (b) Second, the Organisation could have placed these documents in a folder of a non-public folder or directory, with access to these documents being through web applications on the server. (c) Third, the Organisation could have placed these documents in a sub-folder within the Public Directory but control access to files by creating a .htaccess file within that sub-folder. This .htaccess file may specify the access restrictions (e.g. implement a password requirement or an IP address restriction). In view of the above, I find the Organisation in breach of section 24 of the PDPA. Role of the Developer 24 The Developer’s role in data migration constitutes “processing” within the meaning of the PDPA. One of the causes for the breach of the protection obligation may be traced to the migration of educational certificates to the Image Directory which was publicly accessible and could be indexed by search engines: see discussion at [4] above. As the Developer is in, and supplied the Services from, the Philippines, I intend to refer this aspect of the case to the Philippines National Privacy Commission. 9 Advance Home Tutors [2019] SGPDPC 35 Whether the Organisation had breached section 12 of the PDPA 25 Section 12 of the PDPA requires an organisation to develop and implement policies and practices that are necessary for the organisation to meet its obligations under the PDPA. Although the Organisation is a sole proprietorship with no employees, it collects a significant amount of personal data from the tutors and clients seeking tuition services via the Website. As such, it is required to have an external data protection policy which sets out its practices relating to such personal data and the purposes for which the tutors’ and students’ personal data are collected, used and disclosed by the Organisation. 26 In view of the Organisation’s admission that it had not developed and implemented any such policies, I also find the Organisation in breach of section 12 of the PDPA. Representations by the Organisation 27 In the course of settling this decision, the Organisation made representations to waive the imposition financial penalty for the following reasons: (a) The Organisation is a small home business which does not generate much revenue. If the proposed financial penalty is imposed, the Organisation would take 5 to 6 years to recover the financial penalty amount based on its annual revenue; (b) As a sole proprietor, the Organisation’s director neglected operational duties of the business in order to assist the 10 Advance Home Tutors [2019] SGPDPC 35 Commission with the investigations into the Incident. This resulted in a significant drop in the Organisation’s annual revenue in 2018 and its revenue has yet to recover; (c) The Organisation incurred significant costs in undertaking remedial and preventive actions following the Incident; (d) This is the first time a data breach involving the Organisation has occurred; and (e) The Organisation compared the present case to Tutor City with similar facts where only a warning had been issued taking into account the number of affected individuals, the type of and duration for which personal data was at risk, and the remedial actions taken. 28 While accepting full responsibility of its breach of Section 12, the Organisation also asserted in its representations that based on the grounds of decision of Tutor City, it “…implicitly understood that [Tutor City] also had no policies and practices meeting the PDPA obligations set in place. However, they were not found in breach of the Section 12”. 29 With respect to the Organisation’s representations comparing the present case to Tutor City, I would like to emphasize that my decision is based on the unique facts of each case. While the facts may appear similar in 2 cases, my decision in each case takes into consideration the specific facts of the case and the totality of the circumstances so as to ensure that the decision and direction(s) are fair and appropriate for that particular organisation. In this regard, I would highlight that Section 12 of the PDPA was never an issue of 11 Advance Home Tutors [2019] SGPDPC 35 concern in Tutor City as the organisation in question did, in fact, have the requisite policies and processes. Accordingly, this is not a point that would need to be reflected in Tutor City. Unlike Tutor City, I have decided that a financial penalty is warranted in this case because the Organisation has been found in breach of Sections 12 and 24 of the PDPA, and there was a larger number of individuals’ personal data at risk in the present case. I have also taken into consideration the fact that the duration for which personal data was at risk in the present case is significantly shorter than Tutor City. 30 Having carefully considered the representations, I have decided to reduce the financial penalty to $1,000. The quantum of financial penalty has been calibrated after due consideration of the Organisation’s financial circumstances and to avoid imposing a crushing burden on the Organisation. Although a lower financial penalty has been imposed in this case, the quantum of financial penalty should be treated as exceptional and should not be taken as setting any precedent for future cases. Outcome 31 In assessing the breaches and determining the directions to be imposed on the Organisation in this case, I also took into account the following mitigating factors: (a) the Organisation fully cooperated with the Commission’s investigations; and (b) the Organisation took prompt action to mitigate the effects of the breaches and prevent reoccurrence of similar breaches. 12 Advance Home Tutors 32 [2019] SGPDPC 35 In consideration of the relevant facts and circumstances of the present case, I hereby direct the Organisation: (a) to put in place a data protection policy to comply with section 12 of the PDPA within 60 days of this direction; (b) to inform the Commission within 7 days of implementing the above; and (c) to pay a financial penalty of $1,000 within 30 days from the date of this direction failing which, interest at the rate specified in the Rules of Court in respect of judgment debts shall accrue and be payable on the outstanding amount of such financial penalty until the financial penalty is paid in full. YEONG ZEE KIN DEPUTY COMMISSIONER FOR PERSONAL DATA PROTECTION 13 ",Financial Penalty,6d5126ad62fbafa12fb94c50aff6b767e9edb84c,"[""pdf-content"",""timestamp"",""decision"",""pdf-url"",""tags"",""nature"",""url"",""title"",""date"",""description""]" 2023-10-01T11:02:10+08:00,fbd32491db44d3d0c97aa12a99cefd61ec954264,181,181,1,952,"Directions were issued to Singapore Cricket Association for failing to make reasonable security arrangements to prevent unauthorised disclosure of individuals’ personal data on its website, and for failing to put in place data protection policies.","[""Protection"", ""Accountability"", ""Directions"", ""Arts, Entertainment and Recreation""]",2018-08-21,https://www.pdpc.gov.sg/-/media/Files/PDPC/PDF-Files/Commissions-Decisions/Grounds_of_Decision_Singapore_Cricket_Association_and_Ors_210818.pdf,"Protection, Accountability",Breach of Protection Obligation by Singapore Cricket Association,https://www.pdpc.gov.sg/all-commissions-decisions/2018/08/breach-of-protection-obligation-by-singapore-cricket-association,2018-08-21,"PERSONAL DATA PROTECTION COMMISSION [2018] SGPDPC [19] Case No DP-1704-B0707 In the matter of an investigation under section 50(1) of the Personal Data Protection Act 2012 And (1) Singapore Cricket Association (UEN No. S65SS0010H) (2) Massive Infinity Pte Ltd (UEN No. 201131950M) … Organisations DECISION Singapore Cricket Association & Ors [2018] SGPDPC 19 Singapore Cricket Association & Ors. [2018] SGPDPC [19] Yeong Zee Kin, Deputy Commissioner — Case No DP-1704-B0707 21 August 2018 1 This case concerns the unauthorised disclosure of the personal data of cricket players on the Singapore Cricket Association’s (“SCA”) websites (the “Incident”). On 20 April 2017, the Personal Data Protection Commission (the “Commission”) received a complaint regarding the unauthorised disclosure of personal data on the player profile pages on the SCA’s websites and commenced its investigations thereafter. The Deputy Commissioner’s findings and grounds of decision based on the investigations carried out in this matter are set out below. 2 The SCA is the official governing body of the sport of cricket in Singapore. It administers various cricket leagues in Singapore with more than 100 cricket clubs participating across several league divisions. The SCA owns the rights to the domain name www.singaporecricket.org (the “First Domain”), which has served as the SCA’s official website since August 2007 (“Website”). The SCA also owns the rights to the domain name, www.cricketsingapore.com (“Second Domain”). Both domains were accessible to the public and the hosting of both domains were set up and managed by the SCA or on its instructions. 3 All clubs and their players are required to register with the SCA in order to participate in any of the SCA leagues. To register new players, clubs are required to submit the following player personal data through the registration form on the SCA’s Website:1 1 (a) Player name; (b) Player photograph; Clubs were also required to provide information such as the season, league, division and club the player will be playing in as well as the player’s category, role, bowling style and batting style. Singapore Cricket Association & Ors 4 (c) NRIC/FIN number; (d) Date of birth; (e) Email address; and (f) Mobile number. [2018] SGPDPC 19 Player profile pages which showed the registered player’s name, photograph, player code (a unique identifier assigned to players upon registration) as well as player statistics (“Player Profile Information”) have been made available on the SCA’s Website since it was launched in August 2007. Player Profile Information was disclosed on the SCA’s Website to identify players participating in the leagues and to promote interest in the sport by providing the public information on the league players in the same way that some soccer and tennis players have public profiles.2 5 In February 2016, SCA engaged Massive Infinity Pte Ltd (“MI”), a Singapore-based web design and development company, to revamp its Website and design and develop a new custom web portal for SCA (“Revamped Website”) in accordance with the website development specifications provided to MI. 3 However, as the SCA’s website development specifications were set out in very general terms and did not specify the contents of the Revamped Website, details of the exact contents of the Revamped Website were communicated to MI in meetings, and through phone calls and Whatsapp text messages. 6 During the development and testing of the Revamped Website, the Second Domain was used as a trial or user acceptance testing site.4 In the course of conducting user acceptance tests, the SCA requested the inclusion of some additional pages to the Revamped Website, such as Given the SCA’s long-standing practice of publishing Player Profile Information on its Website, players were deemed to have consented to the disclosure of the Player Profile Information when they registered to participate in the league through their respective clubs. 3 Together with the Website revamp, the SCA also switched the web hosting company for the First Domain from an India-based web hosting company to one in Singapore. However, MI was only engaged to provide the user interface design and web development of a new custom web portal and did not provide web hosting services. 4 The Second Domain was removed by the SCA on 17 April 2017 after the First Domain had stabilised. MI had set up a staging environment (scastg.azurewebsites.net domain) (“Testing Domain”) for development and testing purposes. The Testing Domain was the only web hosting setup maintained by MI for development purposes and was closed soon after the code was pushed to the SCA’s testing environment, i.e. the Second Domain, on 17 November 2016. The Testing Domain was not accessible by search engines. 2 Singapore Cricket Association & Ors [2018] SGPDPC 19 the player profile pages. These additional pages were not part of the original design and were therefore not included in the design documents. Neither party was able to produce any evidence of instructions from the SCA on the type of player information that was to be shown on the new player profile pages. While the SCA represented that its intention was for the Revamped Website to show the same Player Profile Information that was on its original Website, it conceded that it did not expressly highlight the type of player information that was to be included on the player profile pages on the Revamped Website. 7 In the absence of any specific instructions on the required fields for the new player profile pages, MI created the new player profile pages based on the information collected from the SCA’s player registration page on the Website. Consequently, in addition to the Player Profile Information that had previously been disclosed on the Website, the new player profile pages included fields for personal data such as the player’s NRIC/FIN number, date of birth, email address and mobile number (the “Additional Player Personal Data”). 8 During the investigations, the parties gave conflicting accounts as to when the SCA was first shown the new player profile pages. MI represented that before the new player profile pages with actual player data were pushed to the Second Domain, mock-up player profile pages created using “dummy data” were sent to the SCA for its review. The Revamped Website, including the new player profile pages with actual player data from the database of registered players’ data that the SCA had provided to MI (“Registered Players Database”),5 was pushed to the Second Domain for the SCA’s review and approval on 17 November 2016. The SCA, however, represented that it had only discovered that contrary to its intention, the Additional Player Personal Data was disclosed after MI uploaded the new player profile pages on the Second Domain and subsequently on the First Domain. 9 The SCA and MI held a meeting on 28 November 2016 to review the changes that MI had made to the Revamped Website. However, the SCA claimed that at the time of the meeting, the new player profile pages were missing from the Revamped Website. MI, in turn, stated that as the SCA did not raise any issues with the new player profile pages at the meeting, MI 5 The SCA received the database of the registered players’ personal data from their previous vendor based in India. Singapore Cricket Association & Ors [2018] SGPDPC 19 assumed that the SCA had approved the content of the new player profile pages and they were to proceed to production as created. 10 The Additional Player Personal Data was made available on the First Domain on or around 9 January 2017 after the system was migrated from the staging server (i.e. the Second Domain). Upon discovering that the Additional Player Personal Data was disclosed on the new player profile pages, the SCA took steps to remove them from the player profile pages leaving only the Player Profile Information. 11 The Additional Player Personal Data was disclosed on the respective player profile pages and therefore publicly accessible for the following periods: (a) from the Second Domain, from 17 November 2016 until its removal on 6 February 2017; (b) from the First Domain, from around 9 January 2017 until its removal on 6 February 2017; and (c) cached versions of the Revamped Website continued to be listed among the search results on major online search engines until the SCA submitted a request for their removal in May 2017. 12 The parties were unable to determine conclusively the exact number of players whose personal data had been disclosed on the Revamped Website on the First and Second Domains. However, based on the number of pages cached by the search engines, the SCA estimated that as many as 100 players were affected. Findings and Basis for Determination 13 The main issues for determination are: (a) whether MI breached section 24 of the PDPA; (b) whether the SCA complied with its obligations under section 12(a) of the PDPA; and Singapore Cricket Association & Ors (c) 14 [2018] SGPDPC 19 whether the SCA breached section 24 of the PDPA. It was not disputed that the Player Profile Information and Additional Player Personal Data disclosed on the new player profile pages were “personal data” as defined in section 2(1) of the PDPA. Whether MI breached section 24 of the PDPA 15 Section 24 of the PDPA requires an organisation to protect personal data in its possession or under its control by taking reasonable security steps or arrangements to prevent unauthorised access, collection, use, disclosure, copying, modification, disposal or similar risks. MI was engaged by the SCA to revamp the Website and was subsequently instructed to create new player profile pages on the Revamped Website. The SCA gave MI a copy of the SCA’s Registered Players Database in order for MI to upload the players’ personal data to the new player profile pages. Accordingly, the Deputy Commissioner is satisfied that the personal data in the Registered Players Database was in MI’s possession or under its control at all material times and MI was required to make reasonable security arrangements to prevent unauthorised access, collection, use, disclosure, copying, modification, disposal or similar risks. 16 However, MI intentionally disclosed the Additional Player Personal Data on the new player profile pages because it was under the impression that the SCA had intended for the Additional Player Personal Data to be disclosed on the new player profile pages. In this regard, seeing as MI relied on the SCA for directions as to the personal data that was to be disclosed on the player profile pages and there was no evidence that MI should have known what personal data was to be disclosed from the SCA’s instructions or from the circumstances, the Deputy Commissioner finds that MI did not act in breach of its Protection Obligation under section 24 of the PDPA when it disclosed the Additional Player Personal Data. Whether the SCA complied with section 12(a) of the PDPA 17 Section 12(a) of the PDPA imposes an obligation on organisations to develop and implement policies and practices that are necessary for the organisation to meet its obligations under the PDPA. The SCA represented, in a witness statement dated 12 June 2017 provided by Singapore Cricket Association & Ors [2018] SGPDPC 19 a representative authorised by SCA, that it did not have any internal guidelines and/or policies for the protection of personal data at the time of the Incident and that it was in the process of reviewing this and coming up with a data protection policy and guidelines.6 18 It bears repeating that the development and implementation of data protection policies is a fundamental and crucial starting point for organisations to meet their obligations under the PDPA.7 As the Deputy Commissioner highlighted in Re Aviva Ltd [2017] SGPDPC 14 (at [32]) on the role of general data protection policies: Data protection policies and practices developed and implemented by an organisation in accordance with its obligations under section 12 of the PDPA are generally meant to increase awareness and ensure accountability of the organisation’s obligations under the PDPA. 19 In this regard, the Deputy Commissioner agrees with the observations in the Joint Guidance Note issued by the Office of the Privacy Commissioner of Canada, the Office of the Information and Privacy Commissioner of Alberta and the Office of the Information and Privacy Commissioner for British Columbia that employees will be able to better protect personal data when they are able to first recognise when a matter involves data protection:8 Training and general education on privacy are very important. Our Offices have seen instances where issues were not identified as privacy issues when they should have been. As a result, appropriate steps were not taken to prevent or address privacy breaches. In other cases, we have seen a lack of awareness or appreciation for privacy risks on the part of employees result in the development of products or services that were not compliant with applicable privacy law. In Alberta, human error is the most common cause of reported breaches resulting in a real risk of significant harm to an individual. Examples include: misdirected faxes and mail, e-mail addresses viewable in mass e-mails, inappropriate disposal of documents, and disclosure of passwords. Employees will be able to better protect privacy when they are able to recognize a matter as one that involves personal information protection. 6 The SCA had a data protection officer but its data protection officer had not undergone any training on data protection matters. 7 Re M Star Movers & Logistics Specialist Pte Ltd [2017] SGPDPC 15 (at [25]). 8 Office of the Privacy Commissioner of Canada, Office of the Information and Privacy Commissioner of Alberta and the Office of the Information and Privacy Commissioner for British Columbia, Getting Accountability Right with a Privacy Management Program at p 13. Singapore Cricket Association & Ors [2018] SGPDPC 19 [Emphasis added.] 20 Therefore, by the SCA’s own admission, it failed to meet its obligations under section 12(a) of the PDPA. Whether the SCA complied with section 24 of the PDPA 21 The SCA obtained the Registered Players Database, which contained the personal data of all its registered players, from its previous vendor based in India. A copy of the Registered Players Database was handed over to MI “for a week” for MI to upload the players’ data onto the new player profile pages. The SCA alone had the right to determine whether and how many of the players’ personal data would be held and presented in the Revamped Website. Hence, the Deputy Commissioner is satisfied that the personal data in the Registered Players Database remained under the SCA’s control at all material times. 22 Having considered the matter, the Deputy Commissioner finds that the SCA failed to put in place reasonable security arrangements to protect the personal data in its control and therefore acted in breach of its Protection Obligation under section 24 of the PDPA. 23 Player profile pages were in the SCA’s original Website and the SCA’s eventual actions disclose its intention to retain player profile pages as a function of the Revamped Website. As stated in paragraph 5 above, the SCA did not provide sufficiently detailed requirements to MI. The omission of the player profile pages was eventually discovered during user acceptance testing. The SCA then requested that player profile pages be retained in the Revamped Website. Again, the SCA did not provide detailed requirements specifications and MI was left to devise player profile pages based on the information provided by players via the online registration form. Needless to say, this disclosed too much personal data. 24 Despite the fact that the inclusion of player profile pages had been made during the final stages of the project, the SCA failed to follow up to check that this function of the Revamped Website had been properly implemented. Such an omission is particularly egregious given its context and chronology. A flaw in the Revamped Website had been identified by the SCA and certain directions had been given to MI. One would expect that the natural behaviour of the owner of a website would be to ensure that identified flaws are properly fixed. The Singapore Cricket Association & Ors [2018] SGPDPC 19 omission of the player profile pages and how this has been resolved by MI ought to have been in the SCA’s consciousness. This betrays the SCA’s lackadaisical attitude towards protection of the personal data of registered players and sets the context for the severity of its negligence which is examined below. 25 First, the SCA provided a database of all existing players in its Registered Players Database to MI. It should have clarified whether its intention was for all the personal data in the Registered Players Database to be displayed in the new player profile pages. The SCA simply assumed that MI would replicate the same fields in the previous player profile pages. As owner of the Revamped Website, the onus is on the SCA to give clear instructions to MI. As a result of the SCA’s failure to state in clear terms the required fields to be created in the new player profile pages, the Additional Player Personal Data of as many as 100 registered players were disclosed on the First and Second Domains. 26 Second, considering that the registered players’ personal data would be disclosed in the new player profile pages, the SCA ought, at the very least, to have reviewed the new player profile pages before MI uploaded it to the First and Second Domains. Had the SCA done so, the disclosure of the Additional Player Personal Data could have been avoided. It bears repeating that this omission is especially egregious given the fact that the SCA had identified a flaw, which would have meant that this omission should have been in its consciousness, but it failed to follow up with ensuring that it had been properly addressed. 27 Simply assuming that MI would replicate the same fields in the previous player profile pages is a clear derogation of its protection obligation. The provision of proper and clear instructions to the designer and developer of a website that holds personal data can and should form part of the protection obligations of the organisation that owns it. In failing to do so, the SCA is in breach of the protection obligation. Further, as mentioned above, the Deputy Commissioner found that the SCA’s website development specifications lacked website content details. As a result, instructions and details of the SCA’s requirements were conveyed to MI piecemeal in meetings and through phone calls and Whatsapp text messages, which appears to have led to confusion and miscommunication between the parties as to the exact requirements for the Revamped Website. Singapore Cricket Association & Ors 28 [2018] SGPDPC 19 Regardless of whether the SCA was shown the new player profile pages at the 28 November 2016 meeting or earlier, the Deputy Commissioner finds that at least between 28 November 2016 and 6 February 2017,9 the SCA could have and ought to have, but failed to, discover and prevent the unauthorised disclosure of the Additional Player Personal Data on the new player profile pages. However, the SCA was unable to explain why it had failed to pick up on the unintended disclosure of the Additional Player Personal Data earlier or provide sufficient information on what arrangements or measures (if any) were implemented to review the changes made to the Website. 29 At this juncture, the Deputy Commissioner reiterates that organisations that engage service providers to process personal data on their behalf should clarify and properly document the nature and extent of service provided. 30 This was highlighted in Re Smiling Orchid (S) Pte Ltd and Ors. [2016] SGPDPC 19 (at [51]) where the Commissioner emphasised the need for a clear meeting of minds as to the services the service provider has agreed to undertake: It is unclear whether T2’s actions would have been different had it been engaged to do more than enhancing the design of the site. Data controllers that engaged outsourced service providers have to be clear about the nature and extent of services that the service provider is to provide. There must be a clear meeting of minds as to the services that the service provider has agreed to undertake, and this should be properly documented. Data controllers should follow through with the procedures to check that the outsourced provider is indeed delivering the services. In the absence of such clarity of intent and procedures, it is risky to hold that the outsourced service provider is a data intermediary. In any case, the Commission has found that T2 is not a data intermediary for the reasons set out at paragraphs 35 to 38 above. [Emphasis added.] 31 Also, as highlighted in the Guide on Building Websites for SMEs (at [4.2.1]), organisations that engage IT vendors to develop and/or maintain their websites should ensure that their IT vendors are aware of the need for personal data protection: 9 As mentioned above, the SCA removed the Additional Player Personal Data from the First and Second Domains on 6 February 2017. Singapore Cricket Association & Ors [2018] SGPDPC 19 Organisations should emphasise the need for personal data protection to their IT vendors, by making it part of their contractual terms. The contract should also state clearly the responsibilities of the IT vendor with respect to the PDPA. When discussing the scope of the outsourced work, organisations should consider whether the IT vendor’s scope of work will include any of the following:  Requiring that IT vendors consider how the personal data should be handled as part of the design and layout of the website.  Planning and developing the website in a way that ensures that it does not contain any web application vulnerabilities that could expose the personal data of individuals collected, stored or accessed via the website through the internet.  Requiring that IT vendors who provide hosting for the website should ensure that the servers and networks are securely configured and adequately protected against unauthorised access.  When engaging IT vendors to provide maintenance and/or administrative support for the website, requiring that any changes they make to the website do not contain vulnerabilities that could expose the personal data. Additionally, discussing whether they have technical and/or non-technical processes in place to prevent the personal data from being exposed accidentally or otherwise. [Emphasis added.] 32 Therefore, in light of the above, the Deputy Commissioner finds that the Organisation failed to make reasonable security arrangements to prevent unauthorised disclosure of the Additional Player Personal Data and is therefore in breach of section 24 of the PDPA. Directions 33 Having found that the SCA is in breach of sections 12(a) and 24 of the PDPA, the Deputy Commissioner is empowered under section 29 of the PDPA to give the SCA such directions as it deems fit to ensure compliance with the PDPA. 34 The Deputy Commissioner took into account the following factors in assessing the breach and determining the directions to be imposed: Aggravating factors Singapore Cricket Association & Ors (a) [2018] SGPDPC 19 the personal data disclosed included the registered players’ NRIC/FIN numbers; Mitigating factors (b) the SCA took prompt action to mitigate the impact of the breach by removing the Additional Player Personal Data from the player profile pages on the First and Second Domains soon after it discovered the Incident; and (c) 35 the SCA cooperated fully in the investigation. Having considered all the relevant factors of this case, the Deputy Commissioner hereby directs the SCA: (a) to develop and implement policies and practices that are necessary for the SCA to meet its obligations under the PDPA within 90 days from the date of this direction; (b) to conduct personal data protection training for its employees to ensure that they are aware of, and will comply with the requirements of the PDPA when handling personal data within 90 days from the date of this direction; and (c) to inform the office of the Commissioner of the completion of the above directions within 7 days of implementation. YEONG ZEE KIN DEPUTY COMMISSIONER PERSONAL DATA PROTECTION ",Directions,25d5268ed669c201d4b55ce4d00b7442bfa8671e,"[""pdf-content"",""timestamp"",""decision"",""pdf-url"",""tags"",""nature"",""url"",""title"",""date"",""description""]" 2023-10-01T11:02:10+08:00,fbd32491db44d3d0c97aa12a99cefd61ec954264,183,183,1,952,"A financial penalty of $30,000 was imposed on Singapore Taekwondo Federation for failing to make reasonable security arrangements to prevent the unauthorised disclosure of minors’ NRIC numbers on its website. Directions were also issued to the organisation to appoint a data protection officer and to put in place data protection policy.","[""Protection"", ""Accountability"", ""Financial Penalty"", ""Directions"", ""Arts, Entertainment and Recreation""]",2018-06-22,https://www.pdpc.gov.sg/-/media/Files/PDPC/PDF-Files/Commissions-Decisions/Grounds_of_Decision_Singapore_Taekwondo_Federation_220618.pdf,"Protection, Accountability",Breach of Protection Obligation by Singapore Taekwondo Federation,https://www.pdpc.gov.sg/all-commissions-decisions/2018/06/breach-of-protection-obligation-by-singapore-taekwondo-federation,2018-06-22,"PERSONAL DATA PROTECTION COMMISSION [2018] SGPDPC 17 Case No DP-1705-B0810 In the matter of an investigation under section 50(1) of the Personal Data Protection Act 2012 And Singapore Taekwondo Federation … Organisation DECISION Singapore Taekwondo Federation [2018] SGPDPC 17 Tan Kiat How, Commissioner — Case No DP-1705-B0810 22 June 2018 Background 1 This matter involves the Singapore Taekwondo Federation (the “Organisation”), a society registered with the Registry of Societies that is responsible for promoting, supporting, and developing taekwondo-related programmes and activities in Singapore. 2 Since 2015, the Organisation has been posting, on an annual basis, PDF documents which contain the names and schools of students who are participants of the Annual Inter-School Taekwondo Championships (“Championships”) on the Organisation’s website which is accessible to the general public. It was represented by the Organisation that the purpose of uploading the PDF documents on its website was to enable students to verify their participation in the Championships. 3 On 30 May 2017, a complaint was lodged by a member of the public (“Complainant”) with the Personal Data Protection Commission (“Commission”), alleging that there was an unauthorised disclosure of the NRIC numbers of 782 students who were participants of the 2017 Championships. Whilst the NRIC numbers, within the PDF documents, were set out in columns that were minimised, and, hence, not immediately visible, Singapore Taekwondo Federation [2018] SGPDPC 17 there was an unauthorised disclosure of these NRIC numbers when the Complainant subsequently copied and pasted the contents of the PDF documents on to another document. 4 The Commissioner sets out below his findings and grounds of decision based on the investigations carried out in this matter. Material Facts 5 On 19 May 2017, the Complainant chanced upon the PDF documents on the Organisation’s website, which contained the names and schools of students who were participants of the 2017 Championships. 6 The NRIC numbers of the students were not immediately visible to the Complainant in the PDF documents, as the NRIC numbers were set out in columns which were minimised. Nevertheless, when the Complainant copied and subsequently pasted the contents of the PDF documents on to another document, he was able to view the NRIC numbers of the students. The Complainant proceeded to inform the Organisation of this unauthorised disclosure of the students’ NRIC numbers via email on 19 May 2017. 7 As the Complainant did not receive any response from the Organisation, he proceeded to lodge a complaint with the Commission on 30 May 2017. Upon receiving the complaint, the Commission commenced an investigation into this matter. 8 On 31 May 2017, after the Organisation was notified by the Commission of the unauthorised disclosure of the students’ NRIC numbers, the Organisation removed the PDF documents from its website. The Organisation represented that it had also taken steps to contact Google to remove the cache, as well as 2 Singapore Taekwondo Federation [2018] SGPDPC 17 instructed its staff to delete the relevant information in question before uploading any documents on to the Organisation’s website. 9 During the course of the Commission’s investigation, the Organisation made the following representations in relation to its process of handling the personal data of the students intending to participate in the Championships. Firstly, it would receive an encrypted Excel spreadsheet containing the personal data of students intending to participate in the Championships, including their names, NRIC numbers, dates of birth, gender, school, class, taekwondo grade, names of taekwondo instructors and clubs, from the Physical Education Sport Education Board of the Ministry of Education (“MOE”). 10 After receiving the encrypted Excel spreadsheet, the Organisation’s Head of the Tournament Department (“Tournament Head”) would typically proceed to rearrange the students’ personal data into programme lists and bout sheets using Microsoft Excel. The Tournament Head asserted that in relation to the Excel spreadsheets containing the students’ personal data, he would “hide” their NRIC numbers, before converting the Excel spreadsheets into PDF documents. 11 The Tournament Head describes the process as follows: “I will copy and paste the names, NRIC numbers, and schools into a new excel spreadsheet. I will then hide the NRIC numbers and then add in the programmes into the new excel spreadsheet. I have been doing this since 2015. Thereafter, I will send the new excel spreadsheet with the names, schools, programme list and hidden NRIC numbers to [redacted] who will then convert it into a PDF list for uploading onto STF’s website. She also has been doing this since 2015 but she does not know that I simply hide the NRIC numbers”. [Emphasis added.] 3 Singapore Taekwondo Federation 12 [2018] SGPDPC 17 The investigation carried out by the Commission sought to verify the assertion made by the Tournament Head. A check on the internet, including the website of Adobe Systems Incorporated, the proprietor of the Adobe PDF software, did not reveal the reappearance of “hidden” contents when copied to a separate Microsoft Word or Excel document (“Alleged Bug”) to be a known issue or function. 13 In addition, officers of the Commission had conducted tests to replicate the result of the Alleged Bug. The officers of the Commission first copied the PDF documents in question found on the Organisation’s website to a newly created Microsoft Word document and found that the columns which were not visible on the PDF documents appeared when copied to the Microsoft Word document. This verified the Complainant’s assertion. However, when the officers of the Commission created a new Excel spreadsheet with properly hidden columns, this Alleged Bug did not occur. Subsequently, the officers of the Commission discovered that this issue would only occur if the columns were minimised instead. In other words, if the columns in an Excel spreadsheet were minimised instead of hidden, and the Excel spreadsheet were to be converted into PDF format, then the contents of the minimised columns would reappear when the PDF document was copied onto a Microsoft Word or Excel document. 14 Based on the foregoing, the Commissioner finds that the columns in the Excel spreadsheet prepared by the Tournament Head were not hidden but merely minimised. 15 In relation to the reason for purportedly hiding (but actually minimizing) the column with NRIC numbers in the Excel spreadsheet, the Organisation represented that this was for the sake of convenience in submitting the results of the Championships to participating schools. Following the conclusion of the 4 Singapore Taekwondo Federation [2018] SGPDPC 17 Championships, participating schools would typically request for the name lists of the medalists and the results of the Championships, which would have to contain the students’ NRIC numbers, so as to allow the schools to verify and present colour awards to their students. 16 The Organisation conceded that it was not aware that there were columns which had been minimised in the PDF documents, such that the NRIC numbers in these columns appeared when the contents of the PDF documents were copied and pasted to another document. 17 In addition, the Organisation admitted during the course of the investigation that it was not aware of the Personal Data Protection Act 2012 (“PDPA”). Consequently, the Organisation did not appoint a data protection officer (“DPO”), nor did it implement any policies or practices necessary for it to meet its obligations under the PDPA. Findings and Basis for Determination 18 The issues for determination are as follows: (a) whether the Organisation had complied with its obligation under section 11 of the PDPA to designate one or more persons to be responsible for ensuring that the Organisation complies with the PDPA; (b) whether the Organisation had complied with its obligation under section 12 of the PDPA to develop and implement policies and practices that are necessary for the Organisation to meet its obligations under the PDPA; and (c) whether the Organisation had complied with its obligation under section 24 of the PDPA to implement reasonable security arrangements 5 Singapore Taekwondo Federation [2018] SGPDPC 17 to protect personal data in the Organisation’s possession or under the Organisation’s control. 19 At the outset, although the Tournament Head represented during the investigation that the Organisation is managed mostly by a team of volunteers, pursuant to section 53(1) of the PDPA, the Organisation would be responsible for its employees (which includes volunteers1) actions which are engaged in the course of their employment2. 20 In addition, the NRIC numbers that were disclosed constitutes personal data as defined in section 2(1) of the PDPA, as every single student in the PDF documents could be identified from the NRIC numbers disclosed. Accordingly, the Organisation would be subject to the data protection obligations under Parts III to VI of the PDPA. Nature of personal data 21 As a preliminary issue, the Commissioner first considered the nature of the personal data in this matter. 22 The personal data disclosed NRIC numbers which, according to the Commission’s Advisory Guidelines on Key Concepts in the Personal Data Protection Act3 (“Key Concepts Guidelines”) and the Guide to Basic Data Anonymisation Techniques4 (“Anonymisation Guide”), constitute a data 1 Section 2(1) of the PDPA. 2 Section 53 of the PDPA read with section 4(1)(b) of the PDPA. 3 Revised on 27 July 2017. 4 Published on 25 January 2018. 6 Singapore Taekwondo Federation [2018] SGPDPC 17 attribute that is assigned to an individual for the purposes of identifying the individual and, on its own, identifies an individual.5 The Commission’s Advisory Guidelines on the PDPA for Selected Topics6 (“Selected Topics Guidelines”) also recognise that “NRIC numbers are of special concern to individuals as they are unique to each individual” (emphasis added).7 23 In addition, the NRIC numbers that were disclosed were the NRIC numbers of students, minors who were less than 21 years of age. The Selected Topics Guidelines recognise that certain considerations may arise in this regard, including that “there is generally greater sensitivity surrounding the treatment of minors” (emphasis added).8 Therefore, good practices in protecting minors’ personal data include, amongst other things, placing “additional safeguards against [the] unauthorised disclosure of, or unauthorised access to, [the] personal data of minors” (emphasis added).9 24 A similar approach in respect of minors’ personal data has been adopted in several other jurisdictions. In Canada, the Office of the Privacy Commissioner of Canada (“OPC”) has expressed that it “has consistently viewed personal information relating to youth and children as being particularly sensitive and must be handled accordingly” (emphasis added).10 5 Anonymisation Guide at [3.1] and Key Concept Guidelines at [5.9]. 6 Revised on 28 March 2017. 7 Selected Topics Guidelines at [6.1]. 8 Selected Topics Guidelines at [8.12]. 9 Selected Topics Guidelines at [8.12]. 10 OPC, Guidance for businesses that collect kids’ information . 7 at Singapore Taekwondo Federation 25 [2018] SGPDPC 17 In the United Kingdom, the Information Commissioner’s Office (“ICO”) has taken the view that “children need particular protection when [an organisation is] collecting and processing their personal data” (emphasis added) and if an organisation processes children’s personal data, the organisation “should think about the need to protect them from the outset, and design [the organisation’s] systems and processes with this in mind”.11 The ICO has also expressed that there are “important additional considerations that need to [be taken] into account when [an organisation’s] data subject is a child” (emphasis added).12 26 In Hong Kong, the Office of the Privacy Commissioner for Personal Data (“PCPD”) has taken the view that “children are identified as a vulnerable group who may have special needs in privacy protection” (emphasis added).13 27 Against this backdrop, it is evident that minors’ personal data would typically be of a more sensitive nature, especially when it concerns unique identifiers such as NRIC numbers. Accordingly, when it comes to the protection of “sensitive” personal data, organisations are required to take extra precautions and ensure higher standards of protection under the PDPA. 11 ICO, Guide to the General Data Protection Regulation (22 March 2018) at at p. 155. 12 ICO, Consultation: Children and the GDPR Guidance (21 December 2017) at at p. 19. 13 Hong Kong, PCPD, 2015 Study Report on Online Collection of Children’s Personal Data (December 2015) at . 8 Singapore Taekwondo Federation [2018] SGPDPC 17 Whether the Organisation had complied with its obligations under section 11 of the PDPA 28 At the outset, during the investigation, the Organisation admitted that it had “no idea of the PDPA”, and consequently, was not aware of its data protection obligations under Parts III to VI of the PDPA. 29 Notably, the Organisation’s lack of awareness of its data protection obligations is not a legitimate defence to a breach under the PDPA, as set out in Re M Stars Movers & Logistics Specialist Pte Ltd [2017] SGPDPC 15 (“M Stars Movers”) at [16]: “[i]t is a trite principle of law that ignorance of the law is no excuse. Thus, the Organisation’s lack of awareness of its obligations under the PDPA cannot excuse its breach of the PDPA. The data protection provisions of the PDPA took effect on 2 July 2014 after a “sunrise” period of more than a year from 2 January 2013. Since then, organisations have had ample opportunities to develop and implement appropriate policies and practices to comply with the PDPA. In any event, an organisation’s lack of awareness of its data protection obligations is not a legitimate defence to a breach.” 30 Section 11(3) of the PDPA requires the Organisation to designate one or more individuals, i.e. the DPO, to be responsible for ensuring the Organisation’s compliance with the PDPA. 31 The Organisation confirmed that there was “no person appointed for the role of Data Protection Officer”. 32 By the Organisation’s own admission, the Commissioner finds that the Organisation has failed to meet its obligations under section 11(3) of the PDPA. The Commissioner repeats the comments at paragraph 29 above that a lack of awareness of the obligations imposed by the PDPA does not amount to a legitimate defence against a breach by the Organisation. 9 Singapore Taekwondo Federation 33 [2018] SGPDPC 17 The Commissioner takes this opportunity to reiterate the importance of the role of a DPO as set out in M Stars Movers at [33]: “[t]he DPO plays an important role in ensuring that the organisation fulfils its obligations under the PDPA. Recognition of the importance of data protection and the central role performed by a DPO has to come from the very top of an organisation and ought to be part of enterprise risk management frameworks…The DPO ought to be appointed from the ranks of senior management and be amply empowered to perform the tasks that are assigned to him/her… The DPO need not – and ought not – be the sole person responsible for data protection within the organisation…Every member of staff has a part to play...” 34 Generally, the responsibilities of a DPO include, but are not limited to:14 (a) ensuring compliance with the PDPA when developing and implementing policies and processes for handling personal data; (b) fostering a data protection culture in an organisation and communicating personal data protection policies to stakeholders; (c) handling and managing personal data protection related queries and complaints; (d) alerting management to any risks that may arise with regard to personal data; and (e) liasing with the Commission on data protection matters, if necessary. 14 PDPC, Data Protection Officers at . 10 Singapore Taekwondo Federation 35 [2018] SGPDPC 17 From the foregoing, it is clear that the DPO plays a vital role in implementing and building a robust data protection framework to ensure an organisation’s compliance with its obligations under the PDPA. Whether the Organisation had complied with its obligations under section 12 of the PDPA 36 Section 12(a) of the PDPA requires an organisation to develop and implement policies and practices that are necessary to meet its obligations under the PDPA. 37 During the investigation, the Organisation confirmed that there was “no personal data policy” implemented and represented that the manner of handling the students’ personal data was an “unwritten SOP”. 38 By the Organisation’s own admission, the Commissioner finds that the Organisation has failed to meet its obligations under section 12(a) of the PDPA. Similar to the above, the Commissioner repeats his comments at paragraph 29 that a lack of awareness of the obligations imposed by the PDPA does not amount to a legitimate defence against a breach by the Organisation. 39 The Commissioner takes this opportunity to reiterate the role of data protection policies, as set out in Re Aviva Ltd [2017] SGPDPC 14 at [32]: “…[d]ata protection policies and practices developed and implemented by an organisation in accordance with its obligations under section 12 of the PDPA are generally meant to increase awareness and ensure accountability of the organisation’s obligations under the PDPA…” 11 Singapore Taekwondo Federation 40 [2018] SGPDPC 17 In addition, M Stars Movers highlights the importance of the need for organisations to develop and implement data protection policies and practices at [27] to [28]: “…[a]t the very basic level, an appropriate data protection policy should be drafted to ensure that it gives a clear understanding within the organisation of its obligations under the PDPA and sets general standards on the handling of personal data which staff are expected to adhere to. To meet these aims, the framers, in developing such policies, have to address their minds to the types of data the organisation handles which may constitute personal data; the manner in, and the purposes for, which it collects, uses and discloses personal data; the parties to, and the circumstances in, which it discloses personal data; and the data protection standards the organisation needs to adopt to meet its obligations under the PDPA. An overarching data protection policy will ensure a consistent minimum data protection standard across an organisation’s business practices, procedures and activities...” 41 Finally, the Commissioner reiterates past observations on the benefits and importance of documenting an organisation’s data protection policies and practices in a written policy, as per Re Furnituremart.sg [2017] SGPDPC 7 at [14]: “[t]he lack of a written policy is a big drawback to the protection of personal data. Without having a policy in writing, employees and staff would not have a reference for the Organisation’s policies and practices which they are to follow in order to protect personal data. Such policies and practices would be ineffective if passed on by word of mouth, and indeed, the Organisation may run the risk of the policies and practices being passed on incorrectly. Having a written policy is conducive to the conduct of internal training, which is a necessary component of an internal data protection programme.” 42 It is clear from the foregoing that the development and implementation of written data protection policies and procedures are important in ensuring an organisation’s compliance with its obligations under the PDPA. 12 Singapore Taekwondo Federation [2018] SGPDPC 17 Whether the Organisation had complied with its obligations under section 24 of the PDPA 43 Section 24 of the PDPA requires an organisation to protect personal data in its possession or under its control by implementing reasonable security arrangements to prevent unauthorised access, collection, use, disclosure, copying, modification, disposal or similar risks. 44 The Commissioner’s assessment of whether the Organisation had complied with its obligations under section 24 of the PDPA would be confined to the NRIC numbers of students. As admitted by the Organisation during the course of the investigation, the NRIC numbers of students were not supposed to be contained and disclosed in the PDF documents. 45 Whilst the encrypted Excel spreadsheet containing the students’ personal data was provided by the MOE, the entire process of compiling the personal data into a separate Excel spreadsheet, converting the Excel spreadsheet into PDF documents and uploading the PDF documents were actions that were conducted solely by the Organisation, without any external interference from the MOE or the entity responsible for maintaining the Organisation’s website. 46 That said, the Organisation was unaware and unable to explain why the NRIC numbers were left in the minimised columns in the PDF documents. 47 In this regard, the Organisation’s mistake of not realising that the NRIC numbers were present in minimised columns in the PDF documents and could have been disclosed without authorisation, could be quite easily repeated. Any person could simply copy the contents of the PDF documents and paste it on to 13 Singapore Taekwondo Federation [2018] SGPDPC 17 another document, thereby resulting in further unauthorised disclosures of the students’ personal data. Such potential impact and harm cannot be ignored, especially when it involves the NRIC numbers of 782 students who were also minors, and whose personal data would thus be considered to be more sensitive in nature. 48 It is precisely the fact that the unauthorised disclosure could have reoccurred quite easily due to the same mistake, that focus is drawn to the issue of whether the Organisation had complied with its obligations under section 24 of the PDPA. 49 On this issue, the Commission found that the Organisation did not appear to have taken sufficient steps towards protecting the personal data in its possession, to prevent the unauthorised disclosure of the personal data. 50 An example of an administrative security arrangement which the Organisation could have made in respect of the personal data in its possession, was to “[c]onduct regular training sessions for staff to impart good practices in handling personal data and strengthen awareness of threats to security of personal data”.15 The Organisation could have implemented staff training sessions to “[e]nsure that staff are trained and familiar with the software used to process…documents containing personal data. For example, staff using spreadsheets should be aware of how sorting the data incorrectly may lead to errors”.16 Similarly, the Organisation could have adopted any of the following measures to ensure that personnel using Microsoft Excel to process personal 15 Key Concepts Guidelines at [17.5]. 16 PDPC, Guide to Preventing Accidental Disclosure When Processing and Sending Personal Data (20 January 2017), at [2.1]. 14 Singapore Taekwondo Federation [2018] SGPDPC 17 data were well apprised and updated on the functions of the software, in particular, the difference between columns that were “minimised” and “hidden” in an Excel spreadsheet: (a) “[e]nsure that new and existing staff receive regular training so that they are well apprised and updated on the proper procedures for processing and sending personal data”;17 (b) “[train] staff to ensure only necessary personal data are extracted”;18 (c) “[k]eep ICT security awareness training for employees updated and conduct such training regularly”;19 and (d) “[provide] the appropriate training to ensure proper usage of the software used.”20 51 Given the nature of the personal data in question, the Organisation had not taken into consideration what extra precautions would be required to protect the sensitive personal data of the students, who are minors. 52 The Key Concepts Guidelines express that an organisation should “implement robust policies and procedures for ensuring appropriate levels of 17 PDPC, Guide to Preventing Accidental Disclosure When Processing and Sending Personal Data (20 January 2017), at [2.2]. 18 PDPC, Guide to Data Protection Impact Assessment (1 November 2017), at [7.2]. 19 PDPC, Guide to Securing Personal Data in Electronic Medium (revised on 20 January 2017), at [5.2]. 20 PDPC, Guide to Securing Personal Data in Electronic Medium (revised on 20 January 2017), at [17.7]. 15 Singapore Taekwondo Federation [2018] SGPDPC 17 security for personal data of varying levels of sensitivity”.21 As set out in the Commission’s Guide to Preventing Accidental Disclosure When Processing and Sending Personal Data, “[d]ocuments or communications that contain sensitive personal data should be processed…with particular care” (emphasis added).22 53 The Key Concepts Guidelines goes on to state that (at [8.12]): “…given that there is generally greater sensitivity surrounding the treatment of minors, it may be prudent for organisations to consider putting in place relevant precautions, if they are (or expect to be) collecting, using or disclosing personal data about minors. For example, organisations that provide services targeted at minors could state terms and conditions in language that is readily understandable by minors, or use pictures and other visual aids to make such terms and conditions easier to understand. Other good practices could include placing additional safeguards against unauthorized disclosure of, or unauthorized access to, personal data of minors, or anonymising personal data of minors before disclosure, where feasible.” 54 In this regard, the Commissioner agrees with the OPC that, in the context of children’s personal data, safeguards that are implemented must be “commensurate with the amount and potential sensitivity of the information at risk” and if the appropriate safeguards are not implemented, this “could, in the wrong hands, put children at unnecessary risk of harm”.23 In that case, the OPC found that the personal data of approximately 316,000 Canadian children, in addition to approximately 237,000 Canadian adults, that were in the possession 21 Key Concepts Guidelines at [17.3]. 22 PDPC, Guide to Preventing Accidental Disclosure When Processing and Sending Personal Data (20 January 2017), at [2.2]. 23 PIPEDA Report of Findings #2018-001: Connected toy manufacturer improves safeguards to adequately protect children’s information (8 January 2018) at at Overview. 16 Singapore Taekwondo Federation [2018] SGPDPC 17 of a toy manufacturer had been compromised as the organisational and technological safeguards that were implemented at the time of the data breach incident were not commensurate with the amount and potential sensitivity of the personal data. 55 When it comes to the protection of “sensitive” personal data, the Organisation had failed to take extra precautions to guard against and prevent unauthorised disclosures of personal data, and failed to ensure a relatively higher standard of protection of personal data under the PDPA. At a minimum, the Organisation ought to have ensured that its staff in charge of creating, processing and converting the Excel spreadsheets were given proper and regular training to equip them with the knowledge to utilise the correct function to convert the Excel spreadsheets into PDF documents that were routinely published on the Organisation’s website. 56 Not only did the Organisation fail to develop and implement the appropriate security arrangements upon the PDPA coming into full force on 2 July 2014, this failure had carried on well after 2 July 2014. Considering how there were two other instances where the Organisation had uploaded the personal data of students in the same manner, specifically for the 2015 and 2016 Championships, the Organisation’s prolonged failure to develop and implement reasonable security measures (for instance, in the form of proper and regular staff training to equip staff with the knowledge to use the right Microsoft Excel feature) to protect the personal data is also taken into consideration in this decision. 57 Given the absence of any security arrangements to protect personal data in its possession against unauthorised disclosure, the Commissioner finds that the Organisation has contravened section 24 of the PDPA. 17 Singapore Taekwondo Federation [2018] SGPDPC 17 Directions 58 Having found that the Organisation is in breach of sections 11, 12 and 24 of the PDPA, the Commissioner is empowered under section 29 of the PDPA to give the Organisation such directions as he deems fit to ensure compliance with the PDPA. 59 In assessing the breach and determining the directions to be imposed on the Organisation, the Commissioner took into account, as a mitigating factor, the Organisation’s prompt remedial actions to rectify and prevent the recurrence of the data breach. 60 The Commissioner also took into account the following aggravating factors: (a) the personal data disclosed involved the NRIC numbers of minors, which constitute personal data of a sensitive nature, and the disclosure of which could cause substantial actual or potential harm to the students; (b) the Organisation showed a lack of awareness of its obligations under the PDPA; and (c) the Organisation caused quite some delays in the investigation process. Despite the approval of an extension of time for responding to the Commission’s Notice to Require Production of Documents and Information issued under the Ninth Schedule of the PDPA, the Organisation only responded after the Commission had sent subsequent reminders requesting for the Organisation’s response, and only after the President of the Organisation was copied in one of such email reminders. 18 Singapore Taekwondo Federation 61 [2018] SGPDPC 17 The Commissioner has also reviewed the representations made by the Organisation seeking a reduction in the financial penalty imposed, a summary of which follows: (a) The Organisation is a small registered charity with a thin budget; (b) The Organisation did not appoint a Data Protection Officer and as such were unaware of the requirement to have a Data Protection Policy; (c) The Organisation took immediate remedial action; (d) The breach was due to inadvertence and ignorance that the NRIC data could be seen on its website; (e) The Organisation acknowledged the unauthorized disclosure of 782 students but that there is no specific information to suggest that the data of the students involved in the 2015 and 2016 tournaments had been similarly disclosed; (f) The delay was caused by their surprise at the lapse and their need to obtain external advise as well as the Organisation’s internal approval process to respond to the PDPC; 62 It should be noted that the Commissioner had already taken (c) above into consideration in determining the financial penalty quantum. The Commissioner finds that the rest of the above representations do not justify a reduction in the financial penalty. The PDPA applies to all organisations and the mere fact that the Organisation is a small charity is not a mitigating factor. If the Organisation has cash flow issues, it is open to the Organisation to request 19 Singapore Taekwondo Federation [2018] SGPDPC 17 that the penalty be paid in installments. Also, inadvertence and ignorance of the law are not mitigating factors. 63 On the point of delay, the Organisation took 2 months to respond to the first Notice to Produce issued to the Organisation. The initial deadline to respond to the Notice to Produce was on 23 June 2017, 2 weeks after the Notice to Produce was issued. PDPC granted the Organisation’s request for an extension of time to respond to the Notice to Produce by 31 July 2017. The Organisation failed to meet this extended deadline and did not respond even after a first reminder was sent on 2 August 2017. The Organisation only responded to the Notice to Produce after a second reminder was issued on 10 August 2017 and copied to the President of the Organisation. The Organisation had already been granted the requested 5-month extension of time to respond and failed to do so within that time, only responding after 2 reminders were issued. The Commissioner finds that the 7 weeks given to the Organisation to respond was more than sufficient to engage third party experts to assist the Organisation in its investigations and to obtain the necessary internal approval. The delay was therefore unacceptable. 64 In consideration of the relevant facts and circumstances of the present case, the Commissioner hereby directs the Organisation to: (a) pay a financial penalty of S$30,000 within 30 days from the date of this direction, failing which interest, at the rate specified in the Rules of Court in respect of judgment debts, shall be payable on the outstanding amount of such financial penalty; (b) appoint a DPO within 30 days from the date of this direction; 20 Singapore Taekwondo Federation (c) [2018] SGPDPC 17 develop and implement policies and practices that are necessary for the Organisation to meet its obligations under the PDPA within 30 days from the date of this direction; and (d) inform the Commission of the completion of each of the above directions in (b) and (c) within 1 week of implementation. YEONG ZEE KIN DEPUTY COMMISSIONER FOR COMMISSIONER FOR PERSONAL DATA PROTECTION 21 ","Financial Penalty, Directions",94bdb127f92702f7e738acf0d5281fd6d086147b,"[""pdf-content"",""timestamp"",""decision"",""pdf-url"",""tags"",""nature"",""url"",""title"",""date"",""description""]" 2023-10-01T11:02:10+08:00,fbd32491db44d3d0c97aa12a99cefd61ec954264,226,226,1,952,"A financial penalty of $3,000 and $1,000 were imposed on Fu Kwee Kitchen Catering Services and its data intermediary, Pixart, respectively, for failing to implement proper and adequate protective measures to prevent unauthorised access of its customers’ personal data, whereby users could access other customers’ personal data by altering the URL of its order preview webpage. Fu Kwee was also issued directions to send employees for training, appoint a Data Protection Officer and conduct a security audit of its website.","[""Protection"", ""Accountability"", ""Financial Penalty"", ""Directions"", ""Accommodation and F&B"", ""Information and Communications"", ""FU KWEE"", ""PIXART""]",2016-09-21,https://www.pdpc.gov.sg/-/media/Files/PDPC/PDF-Files/Commissions-Decisions/grounds-of-decision---fu-kwee-and-pixart-(210916).pdf,"Protection, Accountability",Breach of Data Protection and Other Obligations by Fu Kwee Kitchen Catering Services and Pixart,https://www.pdpc.gov.sg/all-commissions-decisions/2016/09/breach-of-data-protection-and-other-obligations-by-fu-kwee-kitchen-catering-services-and-pixart,2016-09-21,"DECISION OF THE PERSONAL DATA PROTECTION COMMISSION Case Number: DP-1410-A163 (1) FU KWEE KITCHEN CATERING SERVICES (UEN No. 52824092K) (2) PIXART PTE. LTD. (UEN No. 201011239D) …Respondents Decision Citation: [2016] SGPDPC 14 GROUNDS OF DECISION 21 September 2016 Background 1. On 30 September 2014, the Personal Data Protection Commission (“Commission”) received a complaint against Fu Kwee Kitchen Catering Services (“Fu Kwee”) regarding an alleged data breach by Fu Kwee involving unauthorised access of Fu Kwee’s customers’ personal data. 2. The Commission commenced an investigation under section 50 of the Personal Data Protection Act 2012 (“PDPA”) to ascertain whether there had been a breach by Fu Kwee and/or Pixart Pte. Ltd. (“Pixart”) (the Respondents in this investigation) of their respective obligations under the PDPA. Material Facts and Documents Fu Kwee’s relationship with Pixart 3. Fu Kwee provides food and beverage catering services in Singapore. It owned and managed the following website at the material time of the complaint: http://www.fukweecatering.sg, where different customer orders could be viewed through at the following URLs http://www.fukweecatering.sg/fixmenu1preview.aspx?pid=[number]. 4. Pixart is an IT vendor engaged by Fu Kwee in 2010 to (a) develop an online ordering system for Fu Kwee and Fu Kwee’s corporate website, and (b) host, support and maintain the website. The PDPA came fully Page 1 of 10 into force on 2 July 2014, and as the contract between Fu Kwee and Pixart was only terminated sometime around April or May 2015, Pixart remained responsible for hosting, supporting and maintaining the website at the time of the alleged data breach incident in September 2014. Data breach incident 5. The Complainant stated that she was a customer of Fu Kwee, and alleged that she could retrieve another customer’s order details and personal data (specifically the customer’s name, postal address and personal contact number) by changing the numerals at the end of the URL of Fu Kwee’s order preview webpage at http://www.fukweecatering.sg/fixmenu1preview.aspx?pid=102 from “102” to “97”1 (i.e. http://www.fukweecatering.sa/fixmenu1preview.aspx?pid=97). 6. At the material time, on 17 September 2014, while Fu Kwee had a default anti-virus programme for its server, it did not implement any measures to protect its customers’ personal data from unauthorised access through the type of vulnerability discovered by the Complainant (ie that the personal data of other customers could be viewed by altering the numerals at the end of the URL for Fu Kwee’s order preview webpage). 7. Fu Kwee appeared to be unaware of this vulnerability until the Commission issued its first Notice to Require Production of Documents and Information on 12 December 2014 (“First NTP”). Fu Kwee then instructed Pixart to address the vulnerability on 30 December 2014. No notifications were sent by either Fu Kwee or Pixart to the customers affected by the data breach. 8. Pixart confirmed, from its checks on the system, that the URL of each order preview webpage that was generated after a customer’s order did not expire. Pixart also confirmed that the URL of the order preview webpage would include the customer’s order ID number, which was as short as three digits and generated sequentially via Fu Kwee’s website. This enabled anyone who had a pre-existing URL to access other customers’ orders and their personal data simply by altering the numerals at the end of the URL of Fu Kwee’s order preview webpage. 9. Pixart implemented a “one-time URL” solution on 30 December 2014. This technical solution incorporates a 20-minutes exposure security feature that permits a customer to view his or her own order only once before the URL automatically expires after 20 minutes. The URL would Page 2 of 10 also similarly expire if the webpage was closed or refreshed by the customer. 10. Investigations revealed that the scope of the contract between Fu Kwee and Pixart did not include the implementation of security measures on Fu Kwee’s website to protect customers’ personal data. Pixart had also not conducted any penetration tests on Fu Kwee’s website. Such penetration tests could have enabled Fu Kwee to discover the design flaw of its order preview webpages. 11. Additionally, in the course of the investigations, Fu Kwee was found not to have implemented any password policy to restrict or control staff access to its database of customers’ personal data. Fu Kwee also neither implemented personal data protection policies for the collection, use or disclosure of personal data nor appointed a data protection officer to safeguard its customers’ personal data (“DPO”). 12. Having carefully considered the relevant facts and circumstances, including the statements and representations made by Fu Kwee and Pixart, the Commission sets out its findings and assessment herein. THE COMMISSION’S FINDINGS AND ASSESSMENT Issues for determination 13. The issues to be determined in the present case are as follows: (a) Whether Fu Kwee had breached the obligation under section 24 of the PDPA (the “Protection Obligation”); (b) Whether Fu Kwee had breached the obligation under sections 11 and 12 of the PDPA (the “Openness Obligation”), specifically, sections 11(3) and 12(a), for failure to appoint a DPO and put in place privacy policies and practices, in contravention of those sections of the PDPA; (c) Whether Pixart is a data intermediary of Fu Kwee; and (d) Whether Pixart had breached the Protection Obligation. Page 3 of 10 Issue A: Whether Fu Kwee had breached the Protection Obligation 14. Section 24 of the PDPA states: “Protection of Personal Data 24. An organisation shall protect personal data in its possession or under its control by making reasonable security arrangements to prevent unauthorised access, collection, use, disclosure, copying, modification, disposal or similar risks.” 15. Pursuant to section 24 of the PDPA, Fu Kwee, being an organisation which had its customers’ personal data under its possession and/or control, is required to make reasonable security arrangements to prevent unauthorised access, collection, use, disclosure, copying, modification, disposal or similar risks. The Protection Obligation applies equally to all personal data in the possession or under the control of the organisation, including personal data that the organisation may have collected before 2 July 2014, when the data protection provisions under Parts III to VI of the PDPA came into effect. 16. Following a careful assessment of the relevant facts and circumstances, the Commission is of the view that Fu Kwee had not reasonably discharged its obligation under section 24 of the PDPA until the fixes introduced on 30 December 2014. In particular, the Commission has identified the following vulnerabilities in Fu Kwee’s security arrangements, which illustrate how Fu Kwee failed to make reasonable security arrangements to protect customers’ personal data: (a) Fu Kwee’s website did not require password access, which could have reasonably restricted unauthorised access to customers’ personal data using the website. (b) The order preview URLs that were generated by Fu Kwee’s website whenever a customer placed an order not only did not expire, but were also predictable. This enabled any customer to simply alter the last few digits of an order preview URL in order to access the order details and personal data of other customers. (c) Fu Kwee acknowledged that it had not instructed Pixart to put in place security measures to protect its customers’ personal data even after 2 July 2014, when the data protection obligations in the PDPA came into force. Page 4 of 10 (d) The investigations also found that there were no access controls to Fu Kwee’s database of customers’ personal data. Accordingly, though Fu Kwee had sought to protect its server containing the database using a default Windows firewall, the database remained vulnerable to unauthorised access. 17. The vulnerabilities set out above demonstrate that Fu Kwee could have done more to protect its customers’ personal data that was in its possession or under its control. When viewed in totality, the Commission is of the view that Fu Kwee had failed to make reasonable security arrangements to protect its customers’ personal data because these vulnerabilities were preventable. 18. Although Fu Kwee had outsourced the hosting, support and maintenance of its online ordering system and corporate website to Pixart (which the Commission has determined to be a data intermediary of Fu Kwee for the reasons set out below), Fu Kwee was ultimately responsible for the security of the website and customers’ personal data as if the personal data was processed by Fu Kwee itself (per section 4(3) of the PDPA). 19. In light of the foregoing, the Commission finds that Fu Kwee had breached the Protection Obligation at the material time. Issue B: Whether Fu Kwee had breached the Openness Obligation 20. Sections 11 and 12 of the PDPA together constitute the Openness Obligation under the PDPA, which provides that an organisation must implement the necessary policies and procedures in order to meet its obligations under the PDPA, and shall make information about its policies and procedures publicly available. In particular, section 11(3) of the PDPA provides that an organisation shall designate one or more individuals as a DPO to be responsible for ensuring that the organisation complies with the PDPA. In the same vein, section 12(a) of the PDPA requires organisations to develop and implement policies and practices that are necessary for the organisation to meet the obligations of the organisations under the PDPA. 21. Fu Kwee confirmed that between 2 July 2014 and 12 December 2014, Fu Kwee neither implemented any personal data protection policies for the collection, use or disclosure of personal data, nor appointed a DPO. Page 5 of 10 22. In light of the foregoing lapses, the Commission finds that Fu Kwee had breached the Openness Obligation. Issue C: Whether Pixart is a data intermediary of Fu Kwee 23. Under section 2(1) of the PDPA, a “data intermediary” is an organisation which processes personal data on behalf of another organisation but does not include an employee of that other organisation. The term “processing” in relation to personal data means the carrying out of any operation or set of operations in relation to the personal data and includes, but is not limited to, any of the following: recording; holding; organisation, adaptation or alteration; retrieval; combination; transmission; erasure or destruction. Section 4(2) of the PDPA imposes on a data intermediary the obligation to protect personal data under section 24 of the PDPA and the obligation to cease to retain personal data under section 25 of the PDPA in respect of its processing of personal data on behalf of and for the purposes of another organisation pursuant to a contract which is evidenced or made in writing. Save for the aforementioned obligations, Parts III to VI of the PDPA do not impose any other obligations on the data intermediary, in respect of its processing of personal data on behalf of and for the purposes of another organisation pursuant to a contract which is evidenced and made in writing. 24. Based on the facts and representations by Fu Kwee and Pixart, the Commission notes that Pixart was contractually engaged by Fu Kwee in 2010 to (a) develop an online ordering system for Fu Kwee and Fu Kwee’s corporate website, and (b) host, support and maintain Fu Kwee’s website. As the contract was only terminated sometime in April/May 2015, Pixart was still responsible for hosting, supporting and maintaining Fu Kwee’s corporate website and ordering system at the material time of the data breach incident in September 2014. 25. The Commission is of the view that Pixart had processed personal data of Fu Kwee’s customers, pursuant to the contract between Fu Kwee and Pixart in relation to the hosting, support and maintenance of the online ordering system and Fu Kwee’s corporate website, and Pixart had done so on behalf of and for the purposes of Fu Kwee. 26. In this regard, the Commission finds that Pixart was acting as a data intermediary of Fu Kwee with respect to the relevant websites at the URLs set out above in connection with the data breach incident, as Pixart essentially processed Fu Kwee’s customers’ personal data on behalf of Page 6 of 10 and for the purposes of Fu Kwee in hosting, supporting and maintaining the online ordering system and Fu Kwee’s website. Issue D: Whether Pixart had breached the Protection Obligation 27. Section 24 read with section 4(2) of the PDPA imposes a Protection Obligation on data intermediaries in that a data intermediary is obliged to make “reasonable security arrangements to prevent unauthorised access, collection, use, disclosure, copying, modification, disposal or similar risks”. In view of the Commission’s finding that Pixart was a data intermediary of Fu Kwee at the material time of the data breach incident, Pixart was required to comply with the Protection Obligation under section 24 of the PDPA to protect the personal data it was processing on behalf of and for the purposes of Fu Kwee. 28. In the Commission’s view, as a data intermediary, Pixart had an obligation to protect the personal data of Fu Kwee’s customers using the ordering system on Fu Kwee’s website. Pixart has clearly not discharged the Protection Obligation imposed on it under the PDPA, as it did not have in place reasonable measures to protect the personal data that it was processing for and on behalf of Fu Kwee when it developed, hosted, maintained and provided support in relation to the online ordering system and Fu Kwee’s website. 29. In this connection, the Commission notes that if Pixart had advised Fu Kwee on its obligations to protect personal data, but Fu Kwee had rejected Pixart’s advice, this could have been taken into account by the Commission as a mitigating factor. However, there is presently no evidence before the Commission suggesting that Pixart had actually advised Fu Kwee on the need to have in place adequate security measures to protect the personal data of Fu Kwee’s customers in Fu Kwee’s database. 30. In light of the above, the Commission finds that there had been a breach of the Protection Obligation under section 24 of the PDPA by Pixart. THE COMMISSION’S DIRECTIONS 31. In assessing the breach and the remedial directions to be imposed, the Commission took into consideration various factors relating to the case, including the mitigating and aggravating factors set out below. Page 7 of 10 Fu Kwee’s breach of the Protection Obligation and the Openness Obligation 32. In relation to Fu Kwee’s breach of the Protection Obligation and Openness Obligation, the Commission took into account the following factors: (a) Although Fu Kwee had ample opportunity to put in place reasonable security measures from 2 January 2013 to 2 July 2014, or even after 2 July 2014, when the data protection provisions of the PDPA came into force, it did not do so; (b) Fu Kwee’s disregard for its obligations under the PDPA is also apparent as it had failed to appoint a DPO or put in place policies and practices to comply with the PDPA as at June 2015 (when it appointed a new vendor), even after being notified about the data breach incident in December 2014 by the Commission; (c) Fu Kwee was not forthcoming in providing information during the investigation, and only provided bare facts in its responses during the investigations; and (d) Notwithstanding that the Commission did not receive any other complaints regarding the relevant websites at the URLs described above, the lapses by Fu Kwee meant that anyone who had the exact URL or who had correctly guessed the parameters could potentially access all the personal data of Fu Kwee’s customers who had placed orders online at Fu Kwee’s website. Pixart’s breach of the Protection Obligation 33. In relation to Pixart’s breach of the Protection Obligation, the following factors were taken into consideration: (a) Pixart was not forthcoming in providing information during the investigation, and did not respond to the Second Notice to Require Production of Documents and Information dated 10 March 2015, which was addressed to Pixart; and (b) Pixart took active steps to fix the vulnerability in about two weeks after the Commission informed Fu Kwee about the data breach. Based on the Commission’s assessment, the remedial actions taken were acceptable. Page 8 of 10 34. 35. Having completed its investigation and assessment of this matter, the Commission is satisfied that Fu Kwee had been in breach of the Protection Obligation under Section 24 of the PDPA, and the Openness Obligation under sections 11(3) and 12(a) of the PDPA for the reasons cited above. Pursuant to section 29 of the PDPA, the Commission hereby directs Fu Kwee to do as follows: (a) Pay a financial penalty of $3,000 within 30 days from the date of the Commission’s direction; (b) For all employees of Fu Kwee handling personal data to attend a training course on the obligations under the PDPA and the organisation’s data protection policies and practices within 6 months from the date of the Commission’s direction; (c) Conduct a security audit of the website at http://fukweecatering.com.sg/ to be performed by duly qualified competent contractors or staff. Fu Kwee is to furnish to the Commission, within 30 days from the date the Commission’s direction, a schedule stating the scope of the risks to be assessed and the time within which a full report of the audit can be provided to the Commission, and to confirm in the said report that Fu Kwee no longer stores any personal data of its customers on its website; and (d) To take steps to appoint a DPO and to develop and implement policies and practices that are necessary for Fu Kwee to comply fully with its obligations under the PDPA, and to provide the Commission with a compliance status update within 30 days from the date of the Commission’s direction. The Commission is also satisfied that Pixart has not complied with the Protection Obligation under section 24 of the PDPA for the reasons cited above. Pursuant to Section 29(2) of the PDPA, the Commission hereby directs that a financial penalty of S$1,000 be meted out against Pixart. Page 9 of 10 36. The Commission emphasises that it takes a very serious view of any instance of non-compliance under the PDPA and with the Commission’s directions. The Commission will not hesitate to take the appropriate enforcement action against the organisation(s) accordingly. LEONG KENG THAI CHAIRMAN PERSONAL DATA PROTECTION COMMISSION 1 The URL had been taken down shortly after the data breach incident. Page 10 of 10 ","Financial Penalty, Directions",db94a5779e9ecd6a07c41892161ed40d87b027f0,"[""pdf-content"",""timestamp"",""decision"",""pdf-url"",""tags"",""nature"",""url"",""title"",""date"",""description""]" 2023-10-01T11:02:10+08:00,fbd32491db44d3d0c97aa12a99cefd61ec954264,237,237,1,952,"Financial penalties of $50,000 and $10,000 were imposed on K Box Entertainment Group (K Box) and its data intermediary, Finantech Holdings, for failing to implement proper and adequate protective measures to secure its IT system, resulting in unauthorised disclosure of the personal data of 317,000 K Box members. K Box was also issued directions and penalised for the absence of a Data Protection Officer.","[""Protection"", ""Accountability"", ""Financial Penalty"", ""Financial Penalty"", ""Arts, Entertainment and Recreation"", ""Information and Communications"", ""KBOX"", ""FINANTECH""]",2016-04-21,https://www.pdpc.gov.sg/-/media/Files/PDPC/PDF-Files/Commissions-Decisions/grounds-of-decision---k-box-entertainment-(210416).pdf,"Protection, Accountability",Breach of Protection and Openness Obligations by K Box Entertainment Group and Finantech Holdings,https://www.pdpc.gov.sg/all-commissions-decisions/2016/04/breach-of-protection-and-openness-obligations-by-k-box-entertainment-group-and-finantech-holdings,2016-04-21,"DECISION OF THE PERSONAL DATA PROTECTION COMMISSION Case Number: DP-1409-A100 (1) (2) K BOX ENTERTAINMENT GROUP PTE. LTD. FINANTECH HOLDINGS PTE. LTD. …Respondents Decision Citation: [2016] SGPDPC 1 GROUNDS OF DECISION 20 April 2016 Background 1. K Box Entertainment Group Pte. Ltd. (“K Box”) operates a chain of karaoke outlets in Singapore. Finantech Holdings Pte. Ltd. (“Finantech”) is a third party IT vendor, which is owned and managed by its sole director, [Redacted] (Replaced with Mr G). 2. On 16 September 2014, the website “The Real Singapore” (“TRS”) published a post which indicated that a list containing personal data of about “317,000” K Box members (the “List”) had been disclosed online at http://pastebin.com/bnVhn3mp (“pastebin.com”). 3. The List contained personal data which all customers who sign up for a K Box membership, both before and after 2 July 2014, are required to provide, namely: (a) (b) (c) (d) (e) (f) (g) (h) (i) 4. Name (as per NRIC); NRIC / Passport / FIN number; Mailing Address (Singapore only); Contact number; Email address; Gender; Nationality; Profession; and Date of birth. After receiving complaints from members of the public regarding the data breach, the Commission commenced an investigation under section 50 of the Personal Data Protection Act 2012 (“PDPA”) to ascertain whether 1 there had been a breach by K Box and/or Finantech of their respective obligations under the PDPA. Material Facts and Documents K Box’s relationship with Finantech 5. As at 16 September 2014, K Box had engaged Finantech through the “website revamp contract dated 2012” and the “webhosting and server management contract dated 2009” to develop K Box’s Content Management System (“CMS”) system from the ground up and to revamp, manage and host its website. What the parties referred to as “contracts” were actually quotations sent by Finantech to K Box for their confirmation and acceptance. K Box’s CMS stored and processed the personal data of its members. The CMS system also utilised FCKEditor – a software library component which allowed the user to input formatted text. 6. Mr G of Finantech was the only one who had direct and full access to all the K Box members’ personal data as the sole administrator of K Box’s CMS system. In the past, a former project manager of Finantech, [Redacted] (Replaced with Mrs G], whose role was to help Mr G in managing K Box’s customer data, also had access through the administrative account in the CMS system, i.e. the ‘admin’ account with the password “admin”.1 Mrs G left Finantech on or around 2013. Apart from that, no one else, not even K Box’s IT manager [Redacted] (Replaced with Mr C) or K Box’s Chief Operation Officer, [Redacted] (Replaced with Ms N), had direct access to the database. 7. K Box employees with the title “Captain” and above2 (of which there were about 75 people with such a title) had restricted access to a function that allowed viewing of members’ personal data such as name, package, booking date and time, contact number, members’ number and visit date and time to check and confirm members’ booking. However, they could only view the details of each member one at a time, and not extract the entire members’ list. As such, whenever K Box required members’ personal data with selected criteria for marketing and promotional purposes, they would have to inform Mr G of the data required and he would perform the relevant queries on the database, export the information to an MS Excel document and email the document (unencrypted) via Gmail to K Box’s IT manager, Mr C, who would in turn email the document to K Box’s marketing department via Gmail. During investigations, it was discovered that Finantech had once sent K Box over 90,000 members’ personal data via unencrypted email via Gmail. 2 By its own admission, K Box had never instructed Finantech to password-protect or encrypt emails containing a large volume of personal data prior to 16 September 2014. K Box’s Protection Measures 8. According to K Box, measures that were reasonable and appropriate taking into account “the nature of the K Box’s business (i.e. value for money, family-orientated, karaoke entertainment for everyone) and the fact that the data are non-financial in nature” were adopted with regard to the security of its members’ data. 9. K Box represented that secure server practices such as access controls and data protection policies that were established and observed in the organisation whether before 2 July 2014 or between 2 July 2014 and 16 September 2014 had been put in place since the implementation of its current website to protect individuals’ personal data. In addition, K Box represented that before 16 September 2014, employees were required to set alphanumeric passwords consisting of eight alphabets/numbers, one capital and one special case in accordance with K Box’s password policy. However, Mr C admitted that K Box did not “conduct audit on whether the staff really use eight numbers/letters alphanumeric, one capital and one special case password (sic.)” and Mr G had noted a receptionist using a one-letter password in the past. A software system “to force employees to adopt passwords that adhered to the KBox’s password policy (sic.)” was only implemented in November 2014. 10. Although K Box had outsourced its website maintenance, which includes maintenance of its backend CMS, and web hosting of its website to Finantech (“Services”), K Box represented that Finantech agreed and undertook that it would keep K Box’s data confidential as it was a term in their agreements. K Box had also held regular meetings with Mr G/Finantech on all aspects of the Services including any IT security concerns and Finantech would not conduct any major works or modification to the Services without first consulting K Box. K Box had “no reason to doubt” the competence or integrity of Finantech or that Finantech would not comply with the security measures and undertaking. However, by Finantech’s own admission, Finantech did not do any system monitoring in terms of IT security, security testing or regular IT security audits at the time of the breach and prior to 17 September 2014. 11. K Box had also represented that it did not have a Data Protection Officer (“DPO”) since 2 July 2014 to 20 April 2015 and conceded that its privacy 3 policy prior to 16 September 2014 was not comprehensive. While each employee’s employment contract contains a term to keep all information relating to the operations of K Box confidential, there was no policy and physical or online security system in place to monitor whether a staff removed personal data from its premises. 12. In this connection, the “contracts” between K Box and Finantech did not include any contractual clauses that required Finantech to comply with a standard of protection in relation to the personal data transferred to it that is at least comparable to industry standards. According to Finantech’s representations, K Box had also never emphasised the need for data protection and their obligation towards K Box under the PDPA or informed Finantech of its data protection obligation after September 2014. Mr G had also represented that while he was aware of the existence of the PDPA, he was not aware of the specifics of it. The List 13. On 16 September 2014, the same day that TRS published the post mentioned at paragraph 2 above, K Box’s management realised, via the “Social Media, employees and The Real Singapore website”, that K Box members’ personal data had been uploaded on pastebin.com. Mr C had also received a call on his mobile phone from an unknown person to inform him that TRS had “posted information of K Box members” and to ask him to verify whether the information belonged to its members. Mr G investigated the breach by matching the disclosed personal data in the List with the information of K Box’s members from its database and confirmed that the List matched the one in K Box’s database. Thereafter, K Box notified its members of the data breach by way of a letter dated 16 September 2014 that was published online on the K Box homepage. 14. The next day, 17 September 2014, Mr C “deleted all the accounts of the staff who left (sic.)” and the unauthorised ‘admin’ account with the weak password “admin” was “deactivated”, “disabled” and the “password to the account was changed”. The CMS user activity log showed that Mr C had removed 36 accounts on 17 September 2014. No Conclusive Evidence that Data Breach Occurred Before 2 July 2014 15. Although the List was uploaded on pastebin.com on 16 September 2014, the List only contained members’ data up to 23 April 2014. There is no evidence available to conclusively ascertain when the List was obtained. 4 16. Based on Finantech’s initial investigation on the day the List was published, Finantech deduced that the List containing the personal data of K Box members could have been obtained by the cyber-attacker on or around 23 April 2014 for the following reasons: (a) The List stopped at the member record that was created on 23 April 2014 at 5.43am; (b) The CMS’s “user activity 2014.csv” (“User Activity Log File”) recorded that someone had logged in using the ‘admin’ account on 23 April 2014 at 9.59am; (c) A new member record was created on 23 April 2014 at 12.17pm but this was not included in the List; and (d) Subsequent member records created after 23 April 2014 were also not included in the List. 17. The User Activity Log File recorded that the user of the ‘admin’ account had logged in on 23 April 2014. The ‘admin’ user account was the account used by Finantech’s former employee, Mrs G. However, given that Mrs G had already left Finantech on or around 2013 and there was no evidence to suggest that she had been remotely accessing the ‘admin’ account, any use of this account after Mrs G had left Finantech would likely have been unauthorised and could be taken to be done by the cyber-attacker. 18. While it is possible that the data breach occurred on or around 23 April 2014, as there was evidence of unauthorised access to K Box’s CMS system in April 2014 or even earlier in 2013, the Commission is of the view that further data breaches could also have occurred in the following months until the new CMS was put in place in November 2014 for the following reasons: (a) The message “Remote session from client name a exceeded the maximum allowed failed logon attempts (sic.). The session was forcibly terminated”, indicating that more than 240 attempts were made in a single day, appeared frequently in the operating system log (“System Log”). The frequency of these messages may indicate unsuccessful attempts to hack into the operating system. The messages started appearing as early as October 2012 and continued until the latest parts of the log file in September 2014; and 5 (b) Finantech itself noted that the System Log showed that the “[unauthorised user of the ‘admin’ account] was used to login a number of times after the breach. However, there was no indication that he had modified any user data.” The Commission has reviewed the System Log and the unauthorised user of the ‘admin’ account had performed about 83 logins in the period from 25 February 2014 to 16 September 2014, and about 15 logins in the entire calendar year 2013. Probable Cause of Breach 19. While the List only contains members’ data up to 23 April 2014, given the number of times the unauthorised user of the ‘admin’ account had logged in to K Box’s CMS system, it is possible that the cyber-attacker had accessed K Box’s CMS system after 2 July 2014 when the data protection provisions in the PDPA came into effect, but chose to publish the List reflecting the members’ list as at 23 April 2014. 20. Finantech had hypothesised that someone hacked into K Box’s CMS using the ‘admin’ user account with ‘admin’ password and planted a malware control and command centre to retrieve and export the members’ data. K Box similarly represented that Mr G had informed Mr C that the breach occurred because “he suspected someone used admin user account with the password also admin to login (sic.)” and “[Redacted] (Mr G) told me there was a Trojan in the hosting server and he suspected that was how the leak occurred (sic.)”. 21. While the System Log showed unauthorised usage of the ‘admin’ user account in 2014 and files detected as malware were found in the CMS folder, the Commission has not been able to conclusively verify Finantech’s hypothesis even after analysing the User Activity Log File and System Log. Nonetheless, the Commission considers that the ‘admin’ user account, which had a weak password “admin” was one of the possible ways that the data breach could have occurred. 22. Having reviewed the relevant facts and circumstances, including the statements and representations made by K Box and Finantech, the Commission has completed its investigation into the matter, and sets out its findings and assessment herein. 6 THE COMMISSION’S FINDINGS AND ASSESSMENT Issues for Determination 23. The issues to be determined in the present case are as follows: (A) Whether K Box had breached its obligation under section 24 of the PDPA (the “Protection Obligation”); (B) Whether K Box had breached its obligation under sections 11 and 12 of the PDPA (the “Openness Obligation”), specifically, sections 11(3) and 12(a), for failure to appoint a DPO and put in place privacy policies and practices in contravention of those sections of the PDPA; (C) Whether Finantech is a data intermediary of K Box; and (D) Whether Finantech had breached the Protection Obligation. Issue A: Whether K Box had breached the Protection Obligation 24. Section 24 of the PDPA states: “Protection of personal data 24. An organisation shall protect personal data in its possession or under its control by making reasonable security arrangements to prevent unauthorised access, collection, use, disclosure, copying, modification, disposal or similar risks.” 25. Pursuant to section 24 of the PDPA, K Box, being an organisation which had its members’ personal data under its possession and/or control, is required to make reasonable security arrangements to prevent unauthorised access, collection, use, disclosure, copying, modification, disposal or similar risk. The Protection Obligation applies equally to all personal data in the possession or under the control of the organisation, including personal data that the organisation may have collected before 2 July 2014, when the data protection provisions under Parts III to VI of the PDPA came into effect. 26. Following a careful assessment of the relevant facts and circumstances, the Commission is of the view that K Box had not discharged the Protection Obligation under section 24 of the PDPA. There are sufficient grounds (whether each on its own or altogether) to show that K Box failed to make reasonable security arrangements to protect the personal 7 data in its possession or under its control from 2 July 2014 to November 2014. In particular, the Commission has identified the following vulnerabilities in K Box’s security arrangements which show how K Box failed to make reasonable security arrangements to protect the members’ personal data: (a) (b) K Box could have, but failed to enforce its password policy, at least between 2 July 2014 and November 2014, thereby permitting the use of weak passwords: (i) As noted at paragraph 9 above, K Box did not “conduct audit on whether the staff really use eight numbers/letters alphanumeric, one capital and one special case password (sic.)”; and (ii) Even though it is a common industry practice to implement an organisation’s password policy in its system, K Box had not done so earlier and the feature where the system would enforce the password policy by rejecting passwords that did not meet the password policy was only built into the CMS system in November 2014. K Box had weak control over unused accounts, specifically, unused accounts were not removed: (i) As stated at paragraph 14 above, as many as 36 accounts were removed from the CMS system on 17 September 2014, which suggests that K Box may not have had the practice of deleting the accounts of staff that had left the company until it conducted the review on 17 September 2014. This is despite the fact that K Box was able to remove the unused accounts within a day after the List had been disclosed online which shows that K Box could have easily removed the unused CMS accounts earlier but it had failed to do so; (ii) As a result of K Box and/or Finantech’s failure to promptly remove unused accounts from the CMS system, the unused administrative CMS account with the user name ‘admin’ and a weak password of ‘admin’ remained in the CMS for about one year after Mrs G had left Finantech. This had put the personal data of K Box’s members at risk because as noted at paragraph 20 above, Finantech itself had hypothesised that someone could have hacked into K 8 Box’s CMS using this ‘admin’ user account and planted a malware control and command centre to retrieve and export the members’ data.; and (iii) (c) 27. Further, as noted at paragraph 18 above, there was evidence of multiple unauthorised accesses to the CMS system through this ‘admin’ user account in 2013 and between 25 February 2014 and 16 September 2014. As such, it is possible that K Box members’ personal data could have been further compromised through this ‘admin’ user account between 2 July 2014 and 16 September 2014 as a result of the failure to remove the unused administrative account. K Box failed to utilise newer versions of the software library and/or to conduct audits of the security of its database and system: (i) K Box’s CMS system utilised an older version of the FCKEditor which according to security vulnerability website CVE, had at least 9 known vulnerabilities which would have allowed cyber-attackers to install remote shells and execute malicious codes and to execute such codes to extract the full member list from the database. Even though this vulnerability could have been prevented by utilising newer versions of the software library or by patching, Finantech, whose role was to manage the CMS system, had failed to do either; and (ii) K Box had also failed to conduct audits to supervise the security of its database and system. As noted at paragraph 10 above, Finantech admitted that it did not carry out any system monitoring in terms of IT security, security testing or regular IT security audits at the time of the breach and prior to 17 September 2014. K Box’s weak enforcement of their password policy and weak control of unused accounts and passwords alone could have enabled an attacker to gain access to substantial personal data simply through the CMS system. Furthermore, K Box’s use of vulnerable software could have allowed the attacker to gain access to the system beyond the CMS limitations and to perform direct access to all data from K Box’s database and potentially misuse the personal data. 9 28. The vulnerabilities set out above demonstrate that K Box could have done more to protect the members’ personal data that was in its possession or under its control. When viewed in totality, the Commission is of the view that K Box had failed to make reasonable security arrangements to protect the members’ personal data because these vulnerabilities were preventable and were likely the main reasons for the data breach and subsequent disclosure of the List on 16 September 2014. In this regard, while K Box had outsourced the developing, hosting and managing of its CMS system to Finantech, it was still the data controller and was ultimately responsible for the security of the CMS system. 29. Apart from the system-related shortcomings highlighted above, investigations disclosed that there was also poor practises. (a) Emails containing large volume of personal data were sent via Gmail without any password-protection or encryption: (i) (b) Even though the unauthorised access to the personal data of about “317,000” K Box members was not caused by a breach that was the result of the use of unencrypted emails, as noted at paragraph 7 above, Finantech had previously sent K Box over 90,000 members’ personal data via unencrypted email via Gmail. The practice of sending large volumes of members’ personal data via unencrypted email is a vulnerability and an example of how K Box had not sufficiently protected the members’ personal data. The better practice would have been for Finantech to encrypt or to ensure that the MS Excel document containing the list of members’ personal data was password protected before sending it to K Box.3 K Box failed to effectively manage its vendor (Finantech) to ensure that they undertook adequate measures to protect members’ personal data: (i) For the reasons stated at paragraphs 33 and 34 below, the Commission finds that Finantech is a data intermediary of K Box and pursuant to section 4(3) of the PDPA, K Box has the same obligations in respect of the personal data processed on its behalf and for its purpose by Finantech as if the personal data were processed by K Box itself. As highlighted in the Commission’s Advisory Guidelines on 10 Key Concepts in the PDPA issued on 23 September 2013 (at paragraph 6.21) that: “… it is very important that an organisation is clear as to its rights and obligations when dealing with another organisation and, where appropriate, include provisions in their written contracts to clearly set out each organisation’s responsibilities and liabilities in relation to the personal data in question including whether one organisation is to process personal data on behalf of and for the purposes of the other organisation.” [Emphasis added.]; and (ii) 30. However, as noted at paragraph 12 above, K Box failed to ensure that its data intermediary, Finantech, complied with a standard of protection in relation to the personal data transferred to it that is at least comparable to industry standards through its agreements and in its interactions with Finantech. On the facts of the case and the assessment conducted, the Commission finds that both K Box and Finantech did not put in place adequate IT security arrangements between 2 July 2014 and November 2014, prior to the implementation of the new CMS system in November 2014. Issue B: Whether K Box had breached the Openness Obligation 31. Sections 11 and 12 of the PDPA together constitute the Openness Obligation under the PDPA, which provides that an organisation must implement the necessary policies and procedures in order to meet its obligations under the PDPA and shall make information about its policies and procedures publicly available. In particular, section 11(3) of the PDPA provides that an organisation shall designate one or more individuals, a DPO, to be responsible for ensuring that the organisation complies with the PDPA. In the same vein, section 12(a) of the PDPA requires organisations to develop and implement policies and practices that are necessary for the organisation to meet the obligations of the organisations under the PDPA. 32. Based on investigations and representations made by K Box, the Commission is not satisfied that K Box has complied with the Openness 11 Obligation under sections 11(3) and 12(a) of the PDPA. To begin with, as noted at paragraph 11 above, K Box conceded in its representations that it did not have a comprehensive privacy policy prior to 16 September 2014. By K Box’s own admission, as there was no policy and physical or online security system in place to monitor whether a staff removed personal data from its premises, a K Box staff could have simply copied the member’s list it received from Finantech and abused that list. In addition, K Box had also represented that it did not have a DPO. In fact, to date, it is unclear whether K Box has appointed a DPO because Mr C represented that K Box was in the midst of appointing a DPO even as late as 20 April 2015 when he gave his statement to the Commission. In light of the foregoing lapses, the Commission finds that K Box has been in breach of the Openness Obligation. Issue C: Whether Finantech is a data intermediary of K Box 33. Under section 2(1) of the PDPA, a “data intermediary” is an organisation which processes personal data on behalf of another organisation but does not include an employee of that other organisation. The term “processing” in relation to personal data means the carrying out of any operation or set of operations in relation to the personal data and includes, but is not limited to, any of the following: recording; holding; organisation, adaptation or alteration; retrieval; combination; transmission; erasure or destruction.4 Section 4(2) of the PDPA confers on a data intermediary the obligation to protect personal data under section 24 of the PDPA and the obligation to cease to retain personal data under section 25 of the PDPA. Save for the aforementioned obligations, Parts III to VI of the PDPA do not impose any other obligations on the data intermediary. 34. Having considered the facts and the representations made by K Box and Finantech, the Commission is satisfied that Finantech is a data intermediary of K Box. The fact that (i) K Box employees, including K Box’s IT manager and the Chief Operating Officer, only had restricted access to the information of members, and (ii) K Box relied on Mr G to extract and send them members’ personal data with selected criteria from the database clearly shows that in practice, Finantech processed (by having access to, storing and retrieving) all personal data of K Box’s customers pursuant to the arrangement between Finantech and K Box. 35. Notwithstanding that the “contracts”, which were in fact quotations sent by Finantech to K Box for their confirmation and acceptance, pre-date the commencement of the data protection provisions of the PDPA and do not identify Finantech as a data intermediary of K Box, in light of the 12 above practices which continued after the commencement of the data protection provisions, the Commission finds that Finantech is a data intermediary of K Box for the purposes of the PDPA. Issue D: Whether Finantech had breached the Protection Obligation 36. Section 24 read with section 4(2) of the PDPA confers an obligation on the data intermediary to “[make] reasonable security arrangements to prevent unauthorised access, collection, use, disclosure, copying, modification, disposal or similar risks”. In view of the Commission’s finding that Finantech is a data intermediary of K Box, Finantech is required to comply with the obligation under section 24 of the PDPA to protect the personal data that it was processing on behalf of K Box. 37. In this regard, on the facts and circumstances, the Commission is of the view that Finantech had failed to put in place the required security measures that K Box needed in order to provide adequate protection for the personal data in K Box’s database and system. In particular, the Commission notes that Finantech had been involved in the setting up and day-to-day processing of K Box’s personal databases from 2007. By dint of its role and function, Finantech is expected to up hold a certain basic professional standard and the vulnerabilities identified at paragraphs 26 to 29 above show that Finantech had not undertaken due diligence in executing its role. Finantech’s failures had led to multiple unauthorised accesses and Finantech had put the personal data of K Box’s members at risk. 38. If Finantech had advised K Box on its obligations but K Box had rejected their advice, the Commission could have taken this into account in its assessment of Finantech’s culpability. However, investigations did not disclose any evidence to suggest that Finantech had actually advised K Box of the need to have in place adequate security measures to protect the personal data in K Box’s database. In fact, as stated at paragraph 12 above, Mr G admitted that he was only aware of the existence of the PDPA but not the specifics. 39. In view of all the relevant facts and circumstances, the Commission is not satisfied that Finantech has complied with the Protection Obligation under section 24 of the PDPA. THE COMMISSION’S DIRECTIONS 40. Under section 29(1) of the PDPA, the Commission may, “if it is satisfied that an organisation is not complying with any provision in Parts III to VI 13 of the Act, give the organisation such directions as the Commission thinks fit in the circumstances to ensure compliance with that provision.” Section 29(2) of the PDPA also empowers the Commission to make all or any of the following directions: (a) To stop collecting, using or disclosing personal data in contravention of this Act; (b) To destroy personal data collected in contravention of this Act; (c) To comply with any direction of the Commission under section 28(2) of the Act; and (d) To pay a financial penalty of such amount not exceeding $1 million as the Commission thinks fit. Other Factors Considered 41. In assessing the breach and the remedial directions to be imposed, the Commission took into consideration various factors relating to the case, including the mitigating and aggravating factors set out below. K Box’s Breach of the Protection Obligation and the Openness Obligation 42. In relation to K Box’s breach of the Protection Obligation and the Openness Obligation, the Commission took into account the following factors: (a) The remedial actions undertaken by K Box were fair and prompt when they discovered the data breach in September 2014; (b) Most of the remedial actions were taken either in September or November 2014; (c) The Commission found no evidence to suggest that the data breach was due to actions taken by K Box staff, through the CMS system; (d) A fairly large amount of personal data (approximately “317,000” K Box members or more) had been disclosed as a result of the lack of security. The personal data comprising their full names, contact numbers, email addresses, residential addresses, contact numbers, gender, profession, date of birth, and member number were sensitive data because it could have led to identify theft; 14 (e) K Box (as the primary data owner) had disregarded its obligations under the PDPA. K Box had ample opportunities to put in place reasonable security measures from 2 January 2013 to 2 July 2014 but it did not do so. K Box had also failed to appoint a DPO or put in place privacy policies or practices as late as April 2015. K Box had also failed to put in place data protection terms and conditions in its contract with Finantech, and instructed it (as the main data processor of K Box members’ personal data) to protect personal data; and (f) K Box was not forthcoming in providing information during the investigation. They had only provided bare facts in their responses during the investigations, which did not facilitate the Commission’s investigations. Finantech’s breach of the Protection Obligation 43. In relation to Finantech’s breach of the Protection Obligation, the following factors were taken into consideration: (a) The remedial actions undertaken by Finantech were fair and prompt when they discovered the data breach in September 2014; (b) Most of the remedial actions were taken either in September or November 2014; (c) A fairly large amount of personal data (approximately “317,000” K Box members or more) had been put at risk as a result of the lack of security. The personal data comprising their full names, contact numbers, email addresses, residential addresses, contact numbers, gender, profession, date of birth, and member number were sensitive data because it could have led to identify theft; (d) Finantech as the data intermediary had disregarded its obligations under the PDPA. Finantech had ample opportunities to put in place reasonable security measures from 2 January 2013 to 2 July 2014 but it did not. There was no evidence to show that Finantech had advised K Box on the reasonable security measures that the owner of an online system ought to implement in order to protect personal data held by the system; and (e) Finantech appeared not to be forthcoming in providing information during the investigation. Although the Notices to Require Production of Documents and Information under the Ninth 15 Schedule of the PDPA (“NTPs”) were sent to Finantech as early as October 2014, Finantech’s responses to these NTPs were only provided in April 2015 – almost seven months after the NTPs were first issued. This delayed the investigation process. 44. 45. Having completed its investigation and assessment of this matter, the Commission is satisfied that K Box has been in breach of the Protection Obligation under section 24 of the PDPA and the Openness Obligation under sections 11(3) and 12(a) of the PDPA for the reasons cited in paragraphs 26 to 28 and paragraph 31 above. Pursuant to section 29(2) of the PDPA, the Commission hereby directs K Box to do as follows: (a) Pay a financial penalty of $50,000 within 30 days from the date of the Commission’s direction, failing which interest at the rate specified in the Rules of Court in respect of judgment debts shall be payable on the outstanding amount of such financial penalty; and (b) Appoint a DPO within 30 days from the date of the Commission’s direction (if it has not already done so). The Commission is also satisfied that Finantech has not complied with the Protection Obligation under section 24 of the Act for the reasons cited in paragraphs 33, 34, 36 and 37 above. Pursuant to section 29(2) of the PDPA, the Commission hereby directs Finantech to do as follows: (a) 46. Pay a financial penalty of $10,000 within 30 days from the date of the Commission’s direction, failing which interest at the rate specified in the Rules of Court in respect of judgment debts shall be payable on the outstanding amount of such financial penalty. The Commission emphasises that it takes a very serious view of any instance of non-compliance under the PDPA and with the Commission’s directions. LEONG KENG THAI CHAIRMAN PERSONAL DATA PROTECTION COMMISSION 16 1 Mr G was the only employee at the material time of Finantech. Mrs G was the only person assisting Mr G in the past. 2 Captain is the supervisor of the service crews and his or her role is to access the customers’ information to check their booking. 3 See paragraph 14.3 of the PDPC’s Guide to Securing Personal Data in Electronic Medium issued on 8 May 2015. 4 See section 2(1) of the PDPA. 17 ","Financial Penalty, Financial Penalty",0f17cc82606ea4b02faecc4e12ee601c188e3db7,"[""pdf-content"",""timestamp"",""decision"",""pdf-url"",""tags"",""nature"",""url"",""title"",""date"",""description""]"