_commit_at,_commit_hash,_id,_item,_version,_commit,description,tags,date,pdf-url,nature,title,url,timestamp,pdf-content,decision,_item_full_hash,_changed_columns
2023-10-01T11:02:10+08:00,fbd32491db44d3d0c97aa12a99cefd61ec954264,137,137,1,952,"Financial penalties of $4,000 and $7,000 were imposed on Zero1 and XDel respectively for failing to put in place reasonable measures to protect the personal data of the subscribers of Zero1.","[""Protection"", ""Protection"", ""Financial Penalty"", ""Financial Penalty"", ""Information and Communications"", ""Information and Communications"", ""Mobile"", ""Telco"", ""Courier""]",2019-10-10,https://www.pdpc.gov.sg/-/media/Files/PDPC/PDF-Files/Commissions-Decisions/Grounds-of-Decision---Zero1-and-XDel.pdf,"Protection, Protection",Breach of the Protection Obligation by Zero1 and XDel,https://www.pdpc.gov.sg/all-commissions-decisions/2019/10/breach-of-the-protection-obligation-by-zero1-and-xdel,2019-10-10,"PERSONAL DATA PROTECTION COMMISSION
[2019] SGPDPC 37
Case No DP-1803-B1866
In the matter of an investigation under section 50(1)
of the Personal Data Protection Act 2012
And
Zero1 Pte. Ltd.
XDEL Singapore Pte. Ltd.
… Organisations
DECISION
Zero1 Pte. Ltd.
XDEL Singapore Pte Ltd
[2019] SGPDPC 37
Tan Kiat How, Commissioner — Case No DP-1803-B1866
16 September 2019.
Background
1
Zero1 Pte. Ltd. (“Zero1”) is a Mobile Virtual Network Operator
founded in 2017. In order to deliver its SIM cards to its customers, Zero1
contracted XDEL Singapore Pte Ltd (“XDEL”) for courier services. In the
course of delivering the SIM cards, XDEL inadvertently disclosed the personal
data of Zero1’s customers. Central to this case is the question of whether XDEL
and Zero1 (collectively referred to as the “Organisations”) had made
reasonable security arrangements to protect the personal data of Zero1’s
customers pursuant to their obligations under the Personal Data Protection Act
2012 (“PDPA”).
Material Facts
2
In March 2018, XDEL was appointed by Zero1 to deliver SIM cards to
the latter’s subscribers. Zero1’s subscribers would register for mobile services
using Zero1’s website. After their application had been processed, Zero1 would
provide to XDEL the subscriber’s information (including the subscriber’s name,
NRIC number, delivery address and contact number), the SIM card number and
the subscriber’s preferred time of delivery. In the event that the customer had
authorised another person to receive the SIM card on his or her behalf (an
Zero1 Pte. Ltd. and XDEL Singapore Pte. Ltd.
[2019] SGPDPC 37
“authorised recipient”), the authorised recipient’s information (name, NRIC
number, contact number and delivery address) would additionally be provided
to XDEL.
3
Each Zero1 subscriber was provided with a unique URL link which
would allow them to access a customised delivery notification webpage through
which they could monitor the status of their SIM card delivery (the
“notification webpage”). It was through the notification webpages that the
information of the subscribers and authorised recipients (the “Personal Data”)
were accessed.
4
The first batch of SIM card deliveries took place between 8 and 9 March
2018. 333 URLs linking to notification webpages containing the Personal Data
of 292 individuals were sent out in support of this first batch of deliveries.
Investigations revealed that there was unauthorised access (“Unauthorised
Access”) to 175 of the URLs which contained Personal Data. These URLs were
accessed by 82 unique IP addresses over a span of about 34 hours, between 12
and 13 March 2018.
5
The Unauthorised Access was discovered after a post on an online forum
thread warned other users not to reveal their Zero1 account numbers in public,
indicating that it was possible to access another individual’s delivery
notification if one was able to determine another subscriber’s membership
number. The membership number of another subscriber was not difficult to
determine as the membership numbers were generated in sequential order.
6
Further investigations uncovered the following causes leading to the
unauthorised access of the Personal Data:
2
Zero1 Pte. Ltd. and XDEL Singapore Pte. Ltd.
(a)
[2019] SGPDPC 37
Each notification webpage URL comprised of what XDEL
called an “A code” and a “B code”. A sample notification webpage URL
took
the
following
form:
“https://www.xdel.com/ib/?A=00000000&B=4CC5”. In this example,
the A-code is 00000000 and the B-code is 4CC5.
(b)
The A code is a Zero1 subscriber’s membership number and also
the consignment note value, which, as noted above, is a sequentially
generated number.
(c)
The B code is the last 4 characters of a calculated code, generated
using a SHA1 hash on the consignment note number, with a secret salt.
The B code served as a confirmation code. It was meant to secure the
URLs against unauthorised access. The webpage was supposed to return
the delivery status only when the correct B code of 4-character length
was presented. The calculated B code of 4 characters meant that it was
unlikely that an individual would be able to guess the correct code based
on the A code, as there would have been 65,536 possible combinations.
(d)
According to XDEL, the notification webpage system was
developed in-house. In the course of investigations, XDEL admitted that
its developer had failed to test for the scenario where a blank B code was
presented.
(e)
If B codes containing less than 4 characters were presented, the
system would only check that the partial code presented matched the
ending characters of the correct code. As such, if someone guessed the
A code of a subscriber (which as mentioned above was easy enough to
do given that the A code is a sequentially generated subscriber number)
and left the B code blank, the system would identify this as a correct
3
Zero1 Pte. Ltd. and XDEL Singapore Pte. Ltd.
[2019] SGPDPC 37
code, and unauthorised access would be granted to the subscriber’s
personal data. By altering the A code values, this allowed individuals to
see another person’s delivery orders and their personal data.
Accordingly, the Unauthorised Access would likely have been prevented if the
system was programmed to check the complete B Code instead of a partial code.
The Commissioner’s Findings and Basis for Determination
The Relevant PDPA Provisions
7
In respect of this matter, the relevant provision is Section 24 of the
PDPA. Section 24 requires an organisation to protect personal data in its
possession or under its control by making reasonable security arrangements to
prevent unauthorised access, collection, use, disclosure, copying, modification,
disposal or similar risks (the “Protection Obligation”).
Preliminary Issues
8
It is not disputed that the Personal Data is “personal data” as defined in
section 2(1) of the PDPA. There is no question or dispute that the Organisations
fall within PDPA’s definition of an “organisation”.
9
It is also not disputed that the Protection Obligation applies to both
Zero1 and XDEL:
(a)
The personal data of the Zero1 customers and the authorised
recipients originated from Zero1 and was under Zero1’s possession
and/or control. For this reason, Zero1 had the obligation under section
4
Zero1 Pte. Ltd. and XDEL Singapore Pte. Ltd.
[2019] SGPDPC 37
24 of the PDPA to protect the personal data of its customers and that of
the authorised recipients.
(b)
XDEL was the data intermediary for Zero1. XDEL had entered
into the “Service Agreement for the Provision of Domestic Courier
Services” on 1 March 2018 (the “service agreement”). Pursuant to the
agreement, XDEL was to provide for the storage of SIM cards, packing
materials, and delivery service. Clause 11 of the Agreement stated that
XDEL would “process the Personal Data” strictly for the purposes of
providing the stated services to Zero1. This would necessarily
encompass the processing of the personal data of Zero1’s subscribers for
the purposes of delivery. By virtue of section 4(2) of the PDPA, XDEL
had the same obligation under section 24 of the PDPA to protect the
personal data Zero1’s subscribers and that of the authorised recipients.
10
The key issue is therefore whether the Organisations had protected the
Personal Data in its possession and under its control by making reasonable
security arrangements to prevent unauthorised access and similar risks.
Both Organisations failed to make reasonable security arrangements
11
After a review of all the evidence obtained by PDPC during its
investigation and for the reasons set out below, the Commissioner is of the view
that both Organisations had failed to make reasonable security arrangements to
protect the personal data in its possession and control, and both have thereby
breached the Protection Obligation under section 24 of the PDPA.
A. Breach of the Protection Obligation by Zero1
5
Zero1 Pte. Ltd. and XDEL Singapore Pte. Ltd.
12
[2019] SGPDPC 37
Zero1 was aware of the use of the notification webpage and had defined
the type of information contained on the webpage. Presumably, Zero1 had
assessed the necessity and risks of the personal data displayed on the
notification webpage. Zero1 ought also to have satisfied itself that XDEL had
put in place the reasonable security arrangements indicated in the service
agreement, before allowing the webpage to be put into use. Zero1 failed to
demonstrate it had done the above. It had relied entirely on the warranty with
regard to data protection in the service agreement, as well as customer
references provided by XDEL.
13
Reasonable security arrangements in this case would entail minimally
making an effort to identify the possible risks and seeking assurance that the
data intermediary had taken steps to protect against those risks. Unfortunately,
Zero1 failed to do either. In fact, Zero1 were not even aware of the security
arrangements undertaken by XDEL; neither did it make any effort to identify
potential risks associated with the notification webpage. Zero1 has cited a lack
of ability and expertise to audit XDEL’s notification webpage source code as a
reason for not doing so. This cannot be a valid defence as what is required is not
technical oversight but an identification of foreseeable risks, and then requiring
XDEL to take reasonable measures to address them. The extent of Zero1’s due
diligence in the circumstances did not require technical knowledge, but risk
identification and assessment. For instance, Zero1 could have identified the risk
as whether a stranger coming across the website would be able to makes changes
to it and retrieve a subscriber’s information; similarly, whether all information
displayed on the notification page was necessary for the subscriber to monitor
his SIM card delivery. Having articulated the risks, Zero1 ought to have worked
with XDEL on assessing the likelihood of their occurrence, impact on
subscribers should the risk occur and what steps XDEL could propose that
would be reasonably effective in preventing the occurrence of the identified
6
Zero1 Pte. Ltd. and XDEL Singapore Pte. Ltd.
[2019] SGPDPC 37
risks and, should they nevertheless occur, minimise the impact of the risks. This
process does not require technical expertise on the part of Zero1; and allows it
to rely on XDEL to provide the technical expertise during the risk assessment
and mitigation discussion.
14
It is therefore assessed that Zero1 did not meet the standard of having
reasonable security arrangements in place.
B. Representations submitted by Zero1
15
Zero1 submitted its representations to the PDPC after a preliminary
decision was issued:
(a)
Zero1 had taken measures to identify and mitigate potential
risks. As Zero1 did not have technical capabilities in coding, cyber
security or data encryption, it relied on XDEL’s declarations and
assurances of its capabilities and track record. Zero1 also visited
XDEL’s operation centre to audit its processes and was satisfied that
there were no foreseeable risk; and
(b)
It is unreasonable to expect Zero1 to pinpoint the possible
avenues by which personal data could be compromised. The Incident
could not have been pre-empted by Zero1 without the relevant
experience and technical knowledge.
16
Zero1 had previously highlighted that they lack technical expertise and
this has already been dealt with at paragraph 13 above. It should be pointed out
that while Zero1 may have audited the operation centre, this does not detract
from the matters raised in paragraph 12 above.
7
Zero1 Pte. Ltd. and XDEL Singapore Pte. Ltd.
17
[2019] SGPDPC 37
In relation to the 2nd point raised in paragraph 15(b), what was required
is for Zero1 to have engaged XDEL on the security arrangements that it had put
in place to protect the personal data on the notification webpage, including
generating URLs using the membership number and the B Code. This did not
require technical expertise on the part of Zero1. It is in the failure to do so that
the present breach is found.
18
In the circumstances, the Commissioner maintained his finding that
Zero1 is in breach of section 24 of the PDPA.
C. Breach of the Protection Obligation by XDEL
19
XDEL created the notification webpage system knowing that it would
be used to contain the personal data of Zero1 subscribers and their designated
authorised recipients.
20
XDEL ought to have taken reasonable security arrangements to protect
the personal data from unauthorised access. The reasonable arrangements in this
case include adequate testing to verify that the measures were correctly
implemented. In this regard, XDEL had implemented the B code to prevent
unauthorised access of the notification webpage. The B code would have
prevented unauthorised access had it worked as intended.
21
However, while XDEL tested the notification webpages to make sure
they could not be accessed by an incorrect B code, they failed to test for
scenarios where the B code was absent or when an incomplete B code was used.
Since the B code was, by design, a 4-character field, it would seem obvious that
the module should have been designed to cater for the situation where the B
code did not meet this condition and thereafter to test for this scenario. Given
that the B code was crucial to the verification of the user and granting the user
8
Zero1 Pte. Ltd. and XDEL Singapore Pte. Ltd.
[2019] SGPDPC 37
access to the user's personal data, tests should have been conducted to ascertain
the behaviour of the webpage in the absence of the B code. Their failure to do
such tests rendered their efforts to reasonably secure the Personal Data hosted
on the notification webpage insufficient.
22
Accordingly, it is assessed that XDEL, like Zero1, did not meet the
standard of having reasonable security arrangements in place. XDEL’s failure
to meet this standard is more serious than that of Zero1, given that XDEL was
the party that was responsible for the webpage notification system that failed.
D. Representations by XDEL
23
XDEL submitted representations to the PDPC on the quantum of the
financial penalty only. It asked for a reduction of the financial penalty quantum
as it had recently incurred expenses to relocate to new premises. As this is not
a mitigating factor or relevant in determining the financial penalty quantum, the
Commissioner has decided to maintain the initial financial penalty quantum.
Given its current cash flow considerations, the Commissioner has varied his
directions to XDEL, as set out below, to allow XDEL to pay the financial
penalty in instalments.
The Commissioner’s Directions
24
Having found the Organisations to be in breach of section 24 of the
PDPA, the Commissioner is empowered under Section 29 of the PDPA to give
the Organisations such directions as he deems fit to ensure compliance with the
PDPA.
9
Zero1 Pte. Ltd. and XDEL Singapore Pte. Ltd.
25
[2019] SGPDPC 37
In determining the appropriate directions to be imposed on each of the
Organisations, the Commissioner has taken into account the following
aggravating factors:
(a)
The Personal Data disclosed, which included the personal
addresses of the subscribers and authorised recipients, as well as their
NRIC numbers, was sensitive in nature.
(b)
Approximately
292
individuals
were
affected
by
the
unauthorised access.
26
The following mitigating factors have also been taken into account:
(a)
Zero1 voluntarily notified the PDPC that the Personal Data of
the subscribers and authorised individuals had been breached.
(b)
XDEL acted swiftly to rectify the notification webpage system.
By 13 March 2018, they had managed to modify the code checking
function on the webpage to check for the length of the confirmation
code, thereby correcting the technical vulnerability. XDEL also added
an “alert trigger” that would notify its IT department if an IP address
entered 3 or more consecutive wrong codes, as an additional control to
prevent any further unauthorised access.
27
Having considered all the relevant factors of the case, including the
relative responsibilities and culpabilities of both organisations,
the
Commissioner hereby makes the following directions:
(a)
Zero1 is to pay a financial penalty of $4,000.00 within 30 days
from the date of the Commissioner’s direction, failing which interest at
the rate specified in the Rules of Court in respect of judgment debts shall
10
Zero1 Pte. Ltd. and XDEL Singapore Pte. Ltd.
[2019] SGPDPC 37
accrue and be payable on the outstanding amount until the financial
penalty is paid in full; and
(b)
XDEL is to pay a financial penalty of $7,000.00 in 3 instalments
as set out below, failing which, the full outstanding amount shall become
due and payable immediately and interest at the rate specified in the
Rules of Court in respect of judgment debts shall accrue and be payable
on the outstanding amount of the financial penalty until the financial
penalty is paid in full:
(i)
1st instalment of $2,500 within 30 days from the date of
the Commissioner’s direction;
(ii)
2nd instalment of $2,500 within 60 days from the date of
the Commissioner’s direction; and
(iii)
3rd instalment of $2,000 within 90 days from the date of
the Commissioner’s direction,
28
Given the remediation efforts undertaken by the Organisations, no
further directions relating to the breach itself are issued.
YEONG ZEE KIN
DEPUTY COMMISSIONER
FOR COMMISSIONER FOR PERSONAL DATA PROTECTION
11
","Financial Penalty, Financial Penalty",f6fb3aeaa2483b2aa1c8060f6e827d7401bf887c,"[""pdf-content"",""timestamp"",""decision"",""pdf-url"",""tags"",""nature"",""url"",""title"",""date"",""description""]"
2023-10-01T11:02:10+08:00,fbd32491db44d3d0c97aa12a99cefd61ec954264,147,147,1,952,"A financial penalty of $24,000 and $12,000 was imposed on CDP and Toppan Security Printing respectively for failing to put in place reasonable security arrangements to protect the data of CDP’s account holders from unauthorised disclosure. The incident resulted in other account holders’ data being printed on another account holder’s notification letter. An application for reconsideration was made by Toppan Security Printing. Upon reconsideration, directions in the decision were varied.","[""Protection"", ""Protection"", ""Financial Penalty"", ""Financial Penalty"", ""Transport and Storage"", ""Admin and Support Services""]",2019-08-02,https://www.pdpc.gov.sg/-/media/Files/PDPC/PDF-Files/Commissions-Decisions/Updated-as-of-15-Nov-2019-Decision---CDP-and-Toppan---220719.pdf,"Protection, Protection",Breach of the Protection Obligation by CDP and Toppan Security Printing,https://www.pdpc.gov.sg/all-commissions-decisions/2019/08/breach-of-the-protection-obligation-by-cdp-and-toppan-security-printing,2019-08-02,"PERSONAL DATA PROTECTION COMMISSION
[2019] SGPDPC 24
Case No DP-1706-B0895 and DP-1707-B0908
In the matter of an investigation under
section 50(1) of the Personal Data Protection
Act 2012
And
1. The Central Depository (Pte) Limited
2. Toppan Security Printing Pte Ltd
…Organisation(s)
DECISION
Editorial note: An application for reconsideration was filed against the
decision in Re Central Depository (Pte) Limited & Anor [2019] SGPDPC 24.
Pursuant to this application, the Commissioner has decided to reduce the
financial penalty imposed on the Organisation from $18,000 to $12,000. As
the application did not give rise to significant legal or factual issues, a
separate decision on the application will not be published.
Re The Central Depository (Pte) Limited & Anor.
[2019] SGPDPC 24
Tan Kiat How, Commissioner – Case No DP-1706-B0895 – Case No DP-1707B0908
22 July 2019
1.
Organisations may employ vendors to carry out the printing and mailing of
documents containing the personal data of their customers on their behalf. The
process may involve both the organisations and vendors, which requires a concerted
effort to protect personal data. This case presents the issue of division of
responsibility in protecting personal data under the PDPA in such circumstances.
Background and Material Facts
2.
This case concerns the unauthorised disclosure of personal data of 1,358
account holders of the Central Depository (Pte) Limited (“CDP”) when their
personal data was wrongly printed in the notification letters of other account holders
and sent out. The incident occurred on or about 27 June 2017.
3.
The exposed data included the name and/or CDP securities account number
(“exposed primary identifiers”) which constitute personal data of the individual.
In some notification letters, additional information on the securities owned by the
Re Central Depository (Pte) Limited & Anor
[2019] SGPDPC 24
individual (eg name of security and total amount of dividends or distribution for the
security) was also disclosed. These, when combined with the exposed primary
identifiers, also constitute personal data of the individual.
Parties
4.
CDP provides integrated clearing, settlement and depository facilities for
customers in the Singapore securities market. Toppan Security Printing Pte Ltd
(“TSP”) was engaged by CDP to carry out secure printing and dispatch of
documents, including notification letters of CDP’s customers. Part of TSP’s
engagement with CDP included developing the necessary bespoke software to print
the relevant documents.
The printing process between CDP and TSP
5.
There were three categories of notification letters to be printed depending
on the type of investment(s) held by the account holder – (i) Distribution
Reinvestment Plan – “DRP” or “D Type”, (ii) Scrip Dividend Scheme – “SRP” or
“S Type”, and (iii) “Others” – “Others” or “O Type”. In this case, only the “DRP”
or “D Type” notification letters are relevant because the data breach only affected
this category of notification letters. Notification letters are sent to account holders
to notify them of changes to and movements in their accounts.
6.
During investigations, CDP and TSP represented to the Personal Data
Protection Commission (“PDPC”) that the notification letters were printed in the
following manner:
(a)
CDP sent the raw data in files over an encrypted channel to TSP.
According to CDP, each file may have contained raw data for all 3
types of notification letters.
3
Re Central Depository (Pte) Limited & Anor
(b)
[2019] SGPDPC 24
TSP decrypted the files for processing. The processing included the
pre-processing, layout and printing stages.
(c)
The file provided by CDP contained the raw data in a plain text file.
The data for a single account consisted of multiple lines. Each line
comprised a label, which identified the type of data, and the
corresponding data. To illustrate, a sample of the raw data would be
supplied in the following manner:
D00001ABC
TRUST
1234567
CO
8X
D000029876-54321-
MR ABC
12346
123
DEF
ST
D00004Taxable
3298625
Income
20
D00004Tax Exempt
1944945
Income
60
D00004Capital
0777978
DEF
65432
EST
1
Y
SINGAPORE
Y
SINGAPORE
Y
SINGAPORE
24
D00004Other Gains
0583483
68
D00005660503272
D000029876-12345-
MS JKL
64321
GHI
RD
D00004Taxable
0000012
Income
40
D00004Tax
321
Exempt
78945
6
0000005
Income
60
D00004Capital
0000001
01
D00004Other Gains
0000000
90
D00005000001991
D00001LMN
TRUST
8765432
CO
1X
D000029876-00019-
MR QLM
24689
98
WXY
ST
98745
6
4
Re Central Depository (Pte) Limited & Anor
D00004Taxable
0000125
Income
41
D00004Tax
Exempt
[2019] SGPDPC 24
0000015
Income
60
D00004Capital
0000012
01
D00004Other Gains
0000002
90
D00005000015592
The raw data above is purely for illustrative purposes and the
information is fictitious. As can be seen from the above table, the
labels were designated “D00001”, “D00002”, “D00004” and
“D00005”. For the lines with D00001, D00002 and D00005 labels,
there was only one such line per account, while there could be more
than just one line with D00004 labels for each account. The type of
data that correspond to each of the labels is as follows:
Label
Type of data
D00001
name of the security.
D00002
account number, account holder name and mailing address
D00004
information on credits to the account for the security. The data
corresponding to the D00004 label can be further categorised into
Taxable Income, Tax Exempt Income, Capital and Other Gains, such
that there could be up to 4 lines with the D00004 label for each account.
D00005
total value of the D00004 lines for each individual account
At the pre-processing stage, TSP’s program would carry out checks
on the raw data to determine the integrity of the data and format the
data into a consistent structure (‘formatted data’), primarily to insert
D00001 lines where multiple account holders have invested in the
same security.
5
Re Central Depository (Pte) Limited & Anor
(d)
[2019] SGPDPC 24
At the layout stage, a program extracts the formatted data and
populates the data in each of the notification letters in the following
layout:
(e)
The final stage is the printing stage where the notification letters are
printed as laid out and populated in the layout stage.
7.
Before the deployment of the printing process, TSP had carried out user
acceptance tests (“UAT”) on behalf of CDP, and the test results were presented to
and approved by CDP.
The data breach incident
8.
Prior to the data breach incident in June 2017, TSP had carried out
successful print runs for S Type notification letters.
6
Re Central Depository (Pte) Limited & Anor
9.
[2019] SGPDPC 24
However, as indicated at paragraph 2 above, when the D Type notification
letters were printed the first time, they were printed incorrectly. This occurred as
the raw data only contained one D00004 line for some accounts instead of the four
D00004 lines of data for which the layout stage of TSP’s system was programed.
10.
Where only one D00004 line was present, the notification letter should have
appeared in a format similar to the following sample letter
11.
Instead each incorrectly printed notification letter included data which did
not belong to that account. An example of a notification letter (using fictitious
information) that was printed and sent out follows:
7
Re Central Depository (Pte) Limited & Anor
12.
[2019] SGPDPC 24
A comparison between the sample notification letter which was correctly
printed as shown in paragraph 10 above and an example of the incorrectly printed
letter shown in paragraph 11 above shows that the information marked out within
the larger oval ought not to have been printed. The information in the 3rd, 4th and
5th columns, which has been marked out, shows information relating to another
individual, including his name (ie John Smith), securities account number (ie 987600019-24689) and the security invested in (ie LMN Trust Holdings). Also the total
marked out within the smaller oval is also incorrect.
13.
The incorrectly printed notification letters resulted from the programming
of TSP’s system at the layout stage to expect exactly four lines of D00004 data for
each account, instead of allowing it to accept up to a maximum of four lines of
D00004 data. As will be discussed below, this was due to TSP misunderstanding
each account to always consist of four D00004 lines (i.e. the categories of Taxable
8
Re Central Depository (Pte) Limited & Anor
[2019] SGPDPC 24
Income, Tax Exempt Income, Capital and Other Gains). However, in reality each
account may consist of between one to four D00004 lines. The manner in which
this error resulted in the incorrectly printed notification letters is described as
follows:
(a)
Taking the below table of raw data as an example, at the layout stage,
the program had correctly read the 1st and 2nd lines, which had the
D00001 and D00002 labels respectively.
Line
No.
1
2
3
4
5
6
7
8
D00001ABC TRUST CO
D000029876-5432112346
D00004Taxable Income
D00005329862520
D00001LMN TRUST CO
D000029876-0001924689
D00004Taxable Income
D00005000012541
(b)
12345678X
MR ABC
123 DEF ST
654321
Y Singapore
98 WXY ST
987456
Y Singapore
329862520
87654321X
MR QLM
000012541
The program did the same for the 3rd line which had a D00004 label
(i.e. for the Taxable Income category).
(c)
However, as the raw data did not include any D00004 lines for the
“Tax Exempt Income”, “Capital” and “Other Gains” categories, the
layout program instead assigned lines 4 (which was the total credits to
the account), 5 (the name of the security for the next account) and 6
(and the account holder name and residential address of the said next
account) to these D00004 categories in respect of the first account.
(d)
The program then ignored the 7th line from the D00004 label of the
next account.
(e)
Accordingly, when the printing was subsequently triggered, the
notification letter that was printed had contained the data of the
9
Re Central Depository (Pte) Limited & Anor
[2019] SGPDPC 24
D00001, D00002 and D00004 labels from the next account. It also
skipped the printing of the notification letter for that next account,
since parts of the data had been merged with the current notification
letter and the trailing data field was ignored.
(f)
This error was repeated for the other notification letters of the affected
account holders.
14.
Following the incident, CDP had issued apology letters to the affected
account holders, and halted its engagement with TSP in respect of its print services.
Findings and Assessment
Issues for determination
15.
The issues to be determined by the Commissioner are as follows:
(a)
What obligations did CDP and TSP each owe under the Personal Data
Protection Act 2012 (“PDPA”) in respect of the personal data of the
affected account holders;
(b)
Whether CDP complied with its obligation under section 24 of the
PDPA in respect of the data breach incident that occurred;
(c)
Whether TSP complied with its obligation under section 24 of the
PDPA in respect of the data breach incident that occurred.
10
Re Central Depository (Pte) Limited & Anor
[2019] SGPDPC 24
CDP’s and TSP’s obligations to protect personal data under the PDPA
Relevant provisions under the PDPA
16.
Section 24 of the PDPA provides that an organisation shall protect personal
data in its possession or under its control by making reasonable security
arrangements to prevent unauthorised access, collection, use, disclosure, copying,
modification or similar risks (the “Protection Obligation”).
17.
This obligation is also conferred on the data intermediary under Section 4(2)
of the PDPA. Further, Section 4(3) of the PDPA provides that an organisation shall
have the same obligation under the PDPA in respect of the personal data processed
on its behalf and for its purposes by a data intermediary as if the personal data were
processed by the organisation itself.
18.
The duties of an organisation and data intermediary under section 24 of the
PDPA has been examined in precedents, e.g. Re Singapore Cricket Association and
Another [2018] SGPDPC 19. This case gives occasion to re-state that duty.
Relationship between CDP and TSP in complying with Section 24 of the PDPA
19.
In this case, CDP is the organisation and TSP is the data intermediary in
respect of the personal data of the account holders. Both CDP and TSP are obliged
under the PDPA to protect the personal data of account holders pursuant to Section
24 of the PDPA stated above.
20.
The overlap in obligation for organisation and data intermediary to protect
personal data means, in practical terms, that organisations and their data
intermediaries would necessarily have to work together in formulating the right
protective measures and processes.
11
Re Central Depository (Pte) Limited & Anor
21.
[2019] SGPDPC 24
This is especially pertinent in this case because both CDP and TSP had roles
in developing the system or process by which the notification letters were printed.
Amongst other things, CDP was the one which determined the format of the raw
data and the specifications for which TSP would build its program around to
generate the notification letters which required the processing of personal data and
the printing and dispatch of those notification letters.
22.
Hence, both CDP and TSP had the obligation to ensure that the printing
system and process they developed would sufficiently protect the personal data it
was handling and processing. As part of this, there needed to be proper testing of
the system and implementation of exception handling and checks to prevent errors
from compromising the security of the personal data. In the Commissioner’s view,
this responsibility fell on both CDP and TSP.
23.
One of the ways in which organisations can develop a system which protects
personal data is by adopting a Data Protection by Design approach in which
organisations consider the protection of personal data from the earliest possible
design stage of any project and throughout the project’s operational lifestyle. This
may be very relevant to organisations which are looking to develop any new
processes that deals with personal data (as in this case). This is a design approach
that is advocated in the PDPC’s Guide to Developing a Data Protection
Management Programme.1
Whether CDP complied with its obligations under section 24 of the PDPA
24.
CDP’s duty under section 24 was to make reasonable arrangements to
protect the personal data to be processed on its behalf. As explained at paragraphs
21 and 22 above, CDP had the responsibility in the development, testing and
1
https://www.pdpc.gov.sg/-/media/Files/PDPC/PDF-Files/Other-Guides/guide-to-developing-adpmp---011117.pdf at p22
12
Re Central Depository (Pte) Limited & Anor
[2019] SGPDPC 24
implementation of exception handling of the system to ensure that they would
adequately protect personal data. In the Commissioner’s view, this entails:
(a)
Providing clear specifications and representative test data that covered
the full range of data to be processed and the various processing
scenarios. Specific to the present context, this meant making clear that
there was a range in the number of D00004 lines (ie between 1 to 4
lines) per account in the data file supplied by CDP. In Re Singapore
Cricket Association and Another [2018] SGPDPC 19, the Deputy
Commissioner had found that the provision of proper and clear
instructions to a developer of a website that holds personal data should
form part of the protection obligations of the organisation. In failing
to do so, the Singapore Cricket Association was found in breach of
Section 24 of the PDPA. The same principles apply here.
(b)
Advising on the scope of the UAT since the test is based on test data
provided by CDP. CDP would therefore need to supply test data that
covered the full range of scenarios for processing in order for there to
be proper UAT testing. Again, this included supplying test data that
allowed for a range of D00004 lines to be tested.
(c)
Ensuring that the requirements that it provided anticipated and catered
for processes that could handle exceptions and could verify that the
processing was carried out correctly.
25.
The Commissioner finds that CDP did not discharge its duty under section
24 of the PDPA:
(a)
CDP did not provide reasonably clear specifications to TSP. CDP
knew that some of its D Type letters had just 1 D00004 line instead of
13
Re Central Depository (Pte) Limited & Anor
[2019] SGPDPC 24
4. However, the specifications that CDP provided to TSP did not make
this clear:
i.
There was no explicit statement by CDP making clear to TSP
that the number of D00004 lines may vary.
ii.
Instead, what was indicated in CDP’s specification was that the
D00004 lines was “repetitive”. This could be understood to
mean that there would be more than one D00004 line, and since
CDP had only provided TSP with samples which had four
D00004 lines at that stage, TSP misunderstood this to mean that
they would always occur four times, ie four D00004 lines for
each notification letter. Had there been more clarity from CDP
on what it meant at that point, the issue may have been averted.
(b)
CDP did not ensure that the UAT carried out was robust enough to
test for variations in the number of D00004 lines that may be
encountered in actual cases. This is because CDP had only supplied
test data that had exactly four D00004 lines per account, for both
initial tests as well as UAT, and, as such, did not detect any problems
with variations to the number of D00004 lines of data. The test data
supplied also gave the mistaken impression that there were exactly
four D00004 lines of data for each notification letter. A wider range
of test data would have allowed for broader scoping of the UAT,
which is lacking in this case.
(c)
CDP did not specify exceptional scenarios and how the printing
system would handle exceptions or verify that processing was correct.
14
Re Central Depository (Pte) Limited & Anor
i.
[2019] SGPDPC 24
As the organisation with primary and supervisory responsibility
to protect personal data,2 CDP did not ensure that the printing
system could detect and raise alerts when an exception or error
was encountered.
ii.
As will be examined below, TSP’s layout program did not detect
that there was only one line of D00004 data supplied in respect
of some accounts, instead of the four D00004 lines it was hard
coded to read, and to trigger an alert. Instead, it continued to
extract or ignore the subsequent lines erroneously. TSP’s layout
program had therefore lacked the capability to handle
exceptions or issues arising from the data supplied.
iii.
Additionally, CDP also did not satisfy itself during UAT that
TSP’s system had the means to verify that the data was
processed correctly throughout all the stages of the process.
26.
Having regard to the above, the Commissioner finds CDP to be in breach of
section 24 of the PDPA.
Whether TSP complied with its obligations under section 24 of the PDPA
27.
The Commissioner likewise finds that TSP has did not discharge its duty
under section 24 of the PDPA. First, TSP ought to have ensured that the software it
used correctly processed and printed out the relevant data. Giving TSP the benefit
of doubt and assuming that it had processed them correctly, TSP would have
understood the requirements to mean that there were always four lines of D00004
data. TSP’s layout program did not detect that in this case, there was only one line
2
See Re The Management Corporation Strata Title Plan No. 3696 and Another [2017] SGPDPC 11
and Re The Cellar Door and Another [2016] SGPDPC 22
15
Re Central Depository (Pte) Limited & Anor
[2019] SGPDPC 24
of D00004 data; and it went on to read the subsequent lines as though they were
D00004 data. If the program was hardcoded correctly to expect 4 lines of D00004
data, it ought to have recognised that some accounts only contained one line of
D00004 data and the system ought to have raised an alert in cases of deviation.
28.
The program read the subsequent lines incorrectly as if they were D00004
data as the program did not check for four occurrences of D00004 labels per account
but assumed that this was always the case. Thus, even based on TSP’s
misunderstanding that there will always be four D00004 lines per account, TSP’s
program was not designed to detect an exception to this (albeit mistakenly)
expected feature. The incorrect processing of the data by TSP’s program at the
layout stage was what caused the notification letters to be printed and sent wrongly.
There was a lack of exception and error handling such that it cannot be said that
TSP had implemented a reasonable security arrangement that would protect
personal data.
29.
The incident may have been prevented if the developers of the program had
co-ordinated and adopted the same interpretation of the requirements. In this regard,
TSP’s program incorporated 2 checksum tests at the pre-processing stage. One
checksum test was a check that the value of the D00005 data for each account
correctly totalled the value of the D00004 lines for each account. The second
checksum test calculated the total value of the D00005 data of all the accounts sent
to TSP for printing. The pre-processing stage of TSP’s system would then check if
the data it received is accurate by comparing the total value of the D00005 data of
all accounts CDP sent to TSP with the total value stored in the very last line of the
file as a separate record. However, these checksum tests at the pre-processing stage
were ineffective to address the unauthorised disclosure in this matter; it was merely
a check on the integrity of the file received by TSP.
30.
Ultimately, TSP did not implement the proper capability to detect or handle
exceptions or errors in the processing and printing of the notification letters. It is
16
Re Central Depository (Pte) Limited & Anor
[2019] SGPDPC 24
fundamental to the protection of personal data that the system handling personal
data is able to detect and carry out exception and error handling. Otherwise, this
may lead to a system failure which poses risks of a data leak or data breach (as in
this case).
31.
It is timely for the Commissioner to refer to the PDPC’s Guide to Printing
Processes for Organisations3, which states that organisations should consider the
following, amongst other things, for their printing process:
“Appropriate juncture for the check(s) i.e. performed at a suitable stage
for corrective actions to be able to reverse and/or eliminate any potential
error(s).
Intensity and extent of check(s) should be proportionate to the volume and
sensitivity of the personal data present in the printing process.”
32.
TSP did not carry out a proper test on the system. It ought to have tested for
variations in the number of D00004 lines that is provided to verify whether TSP’s
program is able to handle those variations such as different number of lines for the
D00004 labels. These variations may occur due to inadvertence or mistake, and
TSP ought to test whether its program is able to handle them.
33.
For the reasons above, the Commissioner finds TSP to be in breach of
section 24 of the PDPA.
3
https://www.pdpc.gov.sg/-/media/Files/PDPC/PDF-Files/Other-Guides/Guide-to-PrintingProcesses-for-Organisations-030518.pdf
17
Re Central Depository (Pte) Limited & Anor
[2019] SGPDPC 24
Directions
34.
The Commissioner is empowered under section 29 of the PDPA to give the
Organisations such directions as it deems fit to ensure the Organisations’
compliance with the PDPA. This may include directing the organisations to pay a
financial penalty of such amount not exceeding S$1 million as the Commissioner
thinks fit.
35.
Pursuant to section 29(2) of the PDPA, and the investigation and assessment
of this matter having been completed, the Commissioner is satisfied that CDP and
TSP did not make reasonable security arrangements and are in breach of section 24
of the PDPA.
36.
Having carefully considered all the relevant factors of this case, the
Commissioner hereby directs:
(a)
That CDP pays a financial penalty of S$24,000 within 30 days from
the date of the directions, failing which interest shall be payable on
the outstanding amount of such financial penalty;
(b)
That TSP pays a financial penalty of S$18,000 within 30 days from
the date of the directions, failing which interest shall be payable on
the outstanding amount of such financial penalty.
37.
In assessing the breach and determining the directions to be imposed on
CDP in this case, the Commissioner took into account the following aggravating
and mitigating factors:
(a)
CDP is the central depository for financial market account information
in Singapore. Individual account holders must be able to rely on CDP
to protect their personal data.
18
Re Central Depository (Pte) Limited & Anor
(b)
[2019] SGPDPC 24
The personal data that was disclosed comprised of financial
information of the individual, which is sensitive personal data.
(c)
That said, CDP took steps to prevent recurrence following the data
breach incident.
(d)
38.
CDP also promptly notified the affected individuals and the PDPC.
CDP submitted representations on the proposed decision in this case by way
of a letter dated 8 April 2019. In its representations, CDP acknowledged that the
specifications, test data and test scope provided to TSP could have been, and should
be, improved. However, it was of the view that it had not breached section 24 of the
PDPA.
39.
In this regard, CDP asserts that TSP ought to have reviewed the
specifications, test data and user acceptance tests (“UAT”) for both the S Type and
D type letters, instead of just the D Type letters, as the specifications for the print
programme would have been similar. According to CDP, it had provided a S Type
letter template to TSP which consisted of a maximum of two D00004 lines and
provided UAT test data for S Type letters which consisted of one D00004 line. CDP
asserts that “[f]rom this TSP ought to have been aware that the actual data sent by
CDP for printing may vary from the templates/test data provided”. Also, CDP
asserts that it has specified in the specification that the number of the D00004 lines
would be “repetitive”, i.e. “not a fixed number of lines of crediting details but with
variations within this type of crediting details”. Further, CDP asserts that it had used
the word “always” to indicate if a value or the number of lines is fixed or static and
it did not indicate that the number of D00004 lines “always” consisted of 4 lines.
40.
The Commissioner agrees that TSP is also liable for unauthorised disclosure
of personal data in the wrongly printed notification letters and has already found
19
Re Central Depository (Pte) Limited & Anor
[2019] SGPDPC 24
TSP to be in breach of section 24 of the PDPA. Nevertheless, CDP’s representations
do not absolve CDP of its shortcomings in respect of this incident. CDP’s use of
the word “repetitive” in its specifications was ambiguous when considered together
with the fact that the test data provided to TSP for the D Type letters all contained
four D00004 lines per account. This led TSP to assume that “repetitive” meant four
D00004 lines for each account. It did not help that even though the test data
provided had some records with four D00004 lines and others with fewer D00004
lines, the records with four D00004 lines were associated with D Type letters. Even
though CDP intended for the dataset to be applicable for all types of letters, its
omission to inform TSP led TSP to make the assumption that D Type letters always
had four D00004 lines. CDP could have expressly instructed TSP that the test data
provided was to be treated as applying across all the various types of letters and not
merely the individual types of letters to which the test data corresponded.
41.
CDP also asserted that it had requested TSP to conduct an additional visual
check on the notification letters and that if TSP had done so, they would have caught
the error. In relation to this, CDP referred to a Document Management Services
Agreement (“DMSA”) entered into between CDP and TSP to support its assertion.
However, a review of the DMSA does not reveal a specific requirement to conduct
a visual check of the letters that are sent out. In the circumstances, the
Commissioner did not accept CDP’s representations that it had instructed TSP to
conduct a visual check of the notification letters.
42.
Finally, CDP requested that, should the Commissioner maintain his finding
that CDP was in breach of section 24 of the PDPA, the financial penalty imposed
be reduced. In this regard, CDP made 2 submissions. First, CDP acknowledged that
the disclosed personal data was sensitive but asserted that the potential harm to the
affected individuals was relatively limited and not likely to lead to any loss or
prejudice. The Commissioner agrees that there is no evidence of financial loss or
damage. The absence of financial loss or damage has already been taken into
consideration in determining the financial penalty imposed in this case.
20
Re Central Depository (Pte) Limited & Anor
43.
[2019] SGPDPC 24
Secondly, CDP also referred to its prompt notification of the error to
affected individuals and to the PDPC, as well as to the proactive and prompt steps
CDP took to remediate the matter. The Commissioner accepts these points and has
included them in paragraph 37(d) above.
44.
In the circumstances, the Commissioner maintains his finding that CDP was
in breach of section 24 of the PDPA. However, taking into account CDP’s
representations, the Commissioner has decided to reduce the financial penalty from
the initial quantum of $30,000 to the amount stated in paragraph 36(a) above.
45.
In assessing the breach and determining the directions to be imposed on TSP
in this case, the Commissioner took into account the following aggravating and
mitigating factors:
(a)
The personal data that was disclosed comprised of financial
information of the individual, which is sensitive personal data.
(b)
TSP was cooperative and willing to provide information on a timely
basis to the Commission;
(c)
TSP took steps to prevent recurrence following the data breach
incident.
46.
The Commissioner hereby directs CDP to carry out the following within 60
days:
(a)
For CDP’s data protection officer (appointed under section 11(3) of
the PDPA) to be given authority to assess the data protection
requirements in developing new printing processes that involves
personal data; and
21
Re Central Depository (Pte) Limited & Anor
(b)
[2019] SGPDPC 24
For CDP to provide the full range of expected processing scenarios in
the test script during development testing and UAT for all types of
printing jobs (except for ad-hoc printing jobs) which are being carried
out by TSP as at the date of this direction.
YEONG ZEE KIN
DEPUTY COMMISSIONER
FOR COMMISSIONER FOR PERSONAL DATA PROTECTION
22
","Financial Penalty, Financial Penalty",850caf449162034d53605762c40ce355aee93042,"[""pdf-content"",""timestamp"",""decision"",""pdf-url"",""tags"",""nature"",""url"",""title"",""date"",""description""]"
2023-10-01T11:02:10+08:00,fbd32491db44d3d0c97aa12a99cefd61ec954264,168,168,1,952,"A financial penalty of $250,000 and $750,000 was imposed on SingHealth and IHiS respectively for the failure to make reasonable security arrangements to protect personal data of individuals.","[""Protection"", ""Protection"", ""Financial Penalty"", ""Financial Penalty"", ""Healthcare"", ""Healthcare"", ""Patient"", ""Prescription""]",2019-01-15,https://www.pdpc.gov.sg/-/media/Files/PDPC/PDF-Files/Commissions-Decisions/Grounds-of-Decision---SingHealth-IHiS---150119.pdf,"Protection, Protection",Breach of the Protection Obligation by SingHealth and IHiS,https://www.pdpc.gov.sg/all-commissions-decisions/2019/01/breach-of-the-protection-obligation-by-singhealth-and-ihis,2019-01-15,"COMMISSIONER FOR PERSONAL DATA PROTECTION
[2019] SGPDPC 3
Case No DP-1807-B2435
In the matter of an investigation under section 50(1) of the Personal
Data Protection Act 2012
And
(1) Singapore Health Services Pte.
Ltd. (UEN No. 200002698Z)
(2) Integrated Health Information
Systems Pte. Ltd. (UEN No.
200814464H)
… Organisations
DECISION
Singapore Health Services Pte. Ltd. & Ors.
[2019] SGPDPC 3
Tan Kiat How, Commissioner — Case No DP-1807-B2435
14 January 2019
1
This case concerns the worst breach of personal data in Singapore’s history. In an
unprecedented cyber attack on the Singapore Health Services Pte Ltd’s (“SingHealth”) patient
database system, the personal data of some 1.5 million patients and the outpatient prescription
records of nearly 160,000 patients were exfiltrated in a cyber attack (the “Data Breach”).
2
Following the announcement on 20 July 2018 by the Ministry of Communications and
Information and the Ministry of Health (“MOH”), a four-member Committee of Inquiry
(“COI”) was convened by the Minister for Communications and Information to look into the
cyber attack, find out what went wrong and recommend ways to better safeguard critical
systems. The COI concluded its hearings and submitted its report on 31 December 2018 to the
Minister-in-charge of Cyber Security. The public report of the COI’s findings was released on
10 January 2019 (“Public COI Report”).
3
Soon after the announcement of the Data Breach, the Personal Data Protection
Commission (the “Commission”) received several complaints from members of the public
regarding the Data Breach. The Commission commenced its investigations thereafter
(“Investigation”). The organisations involved were SingHealth and Integrated Health
Information Systems Pte Ltd (“IHiS”).
4
SingHealth and IHiS (collectively, the “Organisations”) agreed to cooperate with the
Commission to expedite the Investigation and determination of liability and for the
Commission to issue such directions that it deems fit on the basis of the Organisations’
representations. In this regard, the Organisations voluntarily and unequivocally admitted to the
facts as set out in this Decision and accepted the Commissioner’s findings in this Decision.
5
The Commissioner’s findings and grounds of decision, which are based on the
Organisations’ representations, are set out below. Additionally, the Organisations have agreed
to incorporate references to relevant sections of the Public COI Report relating to their
1
representations and the factual issues addressed therein. Accordingly, the Commissioner has
referred to some parts of the Public COI Report in the grounds of decision.
Material Facts
6
The following chronology and summary of admitted facts were provided by IHiS and
SingHealth in its submissions. SingHealth is one of three healthcare clusters in the Singapore
public healthcare sector. In Singapore, public healthcare institutions (“PHIs”) are grouped into
clusters (“Clusters”). IHiS and SingHealth are wholly-owned subsidiaries of MOH Holdings
Pte Ltd (“MOHH”), the holding company through which the Singapore government owns the
corporatised institutions in the public healthcare sector. MOH determines the policies and
structures within the healthcare sector.
7
The SingHealth Cluster comprises Singapore General Hospital (“SGH”), Changi
General Hospital, Sengkang General Hospital, KK Women’s and Children’s Hospital, National
Cancer Centre, National Dental Centre Singapore, National Heart Centre Singapore, National
Neuroscience Institute, Singapore National Eye Centre, SingHealth Community Hospitals and
SingHealth Polyclinics.1 SingHealth’s primary function is the provision of healthcare services.
8
IHiS is the central national IT agency for the public healthcare sector in Singapore. IHiS
is also the MOH-designated Sector Lead for the healthcare sector for liaising with the Cyber
Security Agency of Singapore (“CSA”). Prior to 2008, PHIs were responsible for their own IT
functions and strategy. In July 2008, IHiS was established by MOH to centralise all of the IT
functions and capabilities of the PHIs (including IT staff) in a single entity, which would
support all the PHIs. IHiS also assumed responsibility for the development and maintenance
of the Clusters’ IT systems (including SingHealth). The objectives of centralisation were to,
inter alia: (i) enable better alignment of IT strategies and integration of patient care across
PHIs, and (ii) reduce the cybersecurity vulnerabilities inherent in a varied and fragmented IT
landscape.
9
IT resources in the public healthcare sector were further consolidated in November
2016, when MOHH’s Information Systems Division (“ISD”) was merged into IHiS. With this
merger, national healthcare systems which were originally managed by ISD came under IHiS’
1 Polyclinics in Bedok, Bukit Merah, Marine Parade, Outram, Pasir Ris, Punggol, Sengkang and Tampines, as well as Bright
Vision Hospital. Two other polyclinics in Queenstown and Geylang used to be under SingHealth.
2
management as well. Each Cluster, SingHealth not excepted, has a Group Chief Information
Officer (“GCIO”) and a Cluster Information Security Officer (“CISO”). Pursuant to the public
healthcare sector policy, Healthcare IT Security Policy and Standards (Version 3.0) (“IT-SPS”),
the GCIO provides leadership and direction for the Cluster’s IT security program, including
the establishment and maintenance of the program objectives, strategy, and near- and mediumterm activities such as aligning strategic IT initiatives with the Cluster’s business objectives.
The GCIO is assisted by the CISO, who is charged with security oversight for the Cluster. The
CISO reports to the GCIO directly on security matters.
10
Upon the formation of IHiS in 2008, the employment of the majority of IT staff across
the Clusters at the time, including SingHealth, were transferred to IHiS. Since then, IHiS has
been responsible for hiring and managing IT personnel at both the management and operational
level for functions such as general management, maintenance and security management.
However, IHiS designates some IT personnel to be redeployed to the Clusters to be responsible
for providing leadership and direction for the IT security program as well as executive
management oversight of the local Cluster IT systems. In the present case, the SingHealth
GCIO and SingHealth CISO are employed by IHiS but deployed to SingHealth to serve the IT
needs of SingHealth. The staff of the SingHealth GCIO Office2 that supports the SingHealth
GCIO and carries out, among other duties, operational and security oversight of SingHealth’s
IT systems are also deployed by IHiS to SingHealth.3
11
GCIOs are accountable to their Clusters for the Chief Information Officer (“CIO”)
services they provide, such as IT capability development, systems resiliency and security. In
SingHealth, the GCIO reports to SingHealth management via the SingHealth Deputy Group
Chief Executive Officer (Organisational Transformation and Informatics) (“DGCEO
(OT&I)”). The SingHealth GCIO is also concurrently accountable to the Chief Executive
Officer (“CEO”) of IHiS for the quality of the CIO services provided to the Cluster.4
12
IHiS has a centralised Delivery Group which manages the day-to-day operations and
technical support, maintenance and monitoring of the entire SingHealth IT system, including
2
The SingHealth GCIO Office has a staff strength of 50 members who are IHiS employees.
The SingHealth GCIO Office is made up of staff deployed from IHiS who are mostly IT Directors from
SingHealth’s institutions that carry out management oversight roles of the institutions’ IT operations.
4
The CEO of IHiS sets the key performance indicators of the SingHealth GCIO and GCIO Office, namely
capability development, resiliency and cost effectiveness.
3
3
the Sunrise Clinical Manager system (“SCM”), as well as the other Clusters’ IT systems. The
IHiS Delivery Group also covers the security aspects of the Clusters’ IT systems and plays a
supportive role in rolling out security measures. Within the IHiS Delivery Group, the Security
Management Department (“SMD”) covers a broad portfolio of IT security in the Clusters. The
SingHealth GCIO Office relies on the IHiS Delivery Group for their technical expertise on
security and operational matters.
SingHealth’s Electronic Medical Record system
13
SingHealth uses SCM, an Electronic Medical Record (“EMR”) software solution from
Allscripts Healthcare Solutions, Inc (“Allscripts”). Through SCM, there is a single enterprisewide EMR containing real-time patient data. SCM is vital to SingHealth’s operations and is
actively used by SingHealth staff in patient care and management.
14
SCM was implemented by SingHealth in 1999. The IHiS Delivery Group took over the
management of SCM in 2008, when the IT team at SingHealth responsible for managing SCM
was transferred to IHiS. The SCM database contains patient medical records, including the
following types of personal data concerning SingHealth’s patients:
(a)
patient particulars (e.g. name, National Registration Identification Card
numbers (“NRIC”), address, gender, race and date of birth);
(b)
clinical episode information (e.g. A&E, inpatient, outpatient);
(c)
orders (e.g. laboratory, radiology, cardiology, medication, nursing);
(d)
results (e.g. of diagnostic tests and orders);
(e)
clinical documentation (e.g. from doctors, nurses, rehabilitation);
(f)
vital signs (e.g. blood pressure, pulse);
(g)
medical alerts and allergies;
(h)
diagnosis and health issues;
(i)
vaccination details;
(j)
discharge summaries;
4
15
(k)
medical certificates; and
(l)
outpatient medication dispensed (with associated patient demographics).
As of July 2018, the SCM database contained patient data of over 5.01 million unique
individuals.
16
The SCM IT network is spread across two sectors:
(a)
the SingHealth network, which includes infrastructure in the SingHealth
campus; and
(b)
the Healthcare-Cloud (“H-Cloud”) at the Healthcare Data Centre (“HDC”). H-
Cloud was set up in 2014 by IHiS as part of a data centre consolidation exercise across
the PHIs as well as for IHiS to leverage cloud technologies in serving the PHIs.
17
Before June 2017, the SCM system (which includes the Citrix servers hosting the SCM
client application and the SCM database servers) was located at SingHealth’s SGH campus.
The Citrix servers serve as middleware (i.e. the bridging between an operating system or
database and applications on a network) supporting many applications used in SingHealth’s
daily operations, including the SCM client application. Citrix servers allow for virtualisation
of the SCM client application without the need for a local installation on the user’s workstation.
There is no transactional data that flows directly between the user’s workstation and the SCM
database. Users can only view screen images of the SCM client application.
18
The SCM system at SGH (i.e. both the SCM database servers and Citrix servers) was
migrated to be hosted in H-Cloud in June 2017. Since June 2017, a typical SingHealth user
would access the SCM system in the following manner:
(a)
from the user’s workstation, the user launches a virtual SCM client application
hosted on the H-Cloud Citrix servers. The application will require the user to enter his
unique user credentials to log in to the SCM client application. The user credentials are
sent through the Citrix server to the SCM security server for authentication; and
(b)
upon successful authentication, the user will be able to access information on
the SCM database corresponding to the user’s designated role and responsibilities.
5
Data Breach
19
Between 27 June to 4 July 2018, the personal data of 1,495,364 unique individuals were
illegally accessed and copied from the SCM database. The illegal access and copying was
limited to a portion of the SCM database, and only in respect of the following personal data:
(a)
the names, NRIC numbers, addresses, gender, race, and dates of birth (“Patient
Particulars”) of 1,495,364 SingHealth patients; and
(b)
the outpatient dispensed medication records (“Dispensed Medication
Records”) of 159,000 patients (which is a subset of the full set of illegally accessed
personal data).
Sequence of events
20
Based on forensic investigations by IHiS and CSA, the attacker gained initial access to
the SCM network in August 2017 by infecting a user’s workstation. This was likely through
an email phishing attack, which led to malware and hacking tools subsequently being installed
and executed on the user’s workstation.
21
Once the attacker established an initial foothold through the affected workstation, the
attacker used customised malware to infect and subsequently gain remote access to and control
of other workstations between December 2017 and May 2018. From these compromised
workstations, the attacker was able to gain access to and control of two user accounts: (i) a
local administrator account, and (ii) another service account (a special user account that
applications or services use to interact with the operating system) (“Compromised Accounts”):
(a)
the local administrator account was a dormant account not ordinarily used for
day-to-day operations, and was originally created as a back-up account for use by
administrators. This account was secured with an easily deduced password
(“P@ssw0rd”); and
(b)
the service account was also a dormant account with full administrative
privileges. This account was secured with a password which was self-generated during
the installation of the services.
6
22
Through these Compromised Accounts, the attacker was able to gain access to and
control of the Citrix servers located at SGH (“SGH Citrix Servers”). IHiS had planned to
decommission these SGH Citrix servers following the migration of the SCM database and the
Citrix servers to H-Cloud in June 2017 but the SGH Citrix Servers remained operational and
part of the SCM network while the decommissioning process was ongoing because the SGH
Citrix Servers were still hosting other applications which were either planned for migration to
H-Cloud or decommissioning by FY 2018.
23
While the attacker had managed to log in to the SGH Citrix Servers, which gave it a
direct route to the SCM database, the attacker still did not have the credentials that would have
enabled it to log in to the SCM database. As such, between end-May to mid-June 2018, the
attacker made multiple failed attempts to access the SCM database using invalid credentials,
or accounts that had insufficient privileges to gain access to the SCM database.
24
On 11 June 2018, an IHiS database administrator from the IHiS Delivery Group
discovered the multiple failed attempts to log in to the SCM database. She noticed that some
user IDs were used on separate occasions to log in to the SCM database, but they could not log
in because they were non-existent user IDs or were not granted access. One of the user IDs
belonged to a domain administrator from the IHiS Systems Management Department but she
verified that he had not made any attempts to log into the database.
25
More attempts to log in to the database were made on 12 and 13 June 2018. One of the
user IDs used was the same as those used on 11 June 2018. It became clear to her on 13 June
2018 that the failed attempts to log in were evidence of someone attempting to gain
unauthorised access to the database. On 13 June 2018, a few members of the staff from the
IHiS Delivery Group met with the SMD over these login attempts. A chat group was created;
members included the SIRM, the SingHealth CISO and members of the SMD.
26
On 26 June 2018, the attacker managed to obtain login credentials for the SCM database
from the H-Cloud Citrix server. CSA assessed that there was an inherent coding vulnerability
in the SCM client application which allowed the attacker to retrieve the SCM database login
credentials from the H-Cloud Citrix server. These credentials were then used to access the SCM
database using one of the compromised SGH Citrix Servers.
7
27
Between 27 June and 4 July 2018, the attacker used the stolen SCM database login
credentials to access and run numerous bulk queries from one of the compromised SGH Citrix
Servers on the SCM database. Data that was illegally accessed and copied through such queries
was then exfiltrated by the attacker through the initial compromised workstations to the
attacker’s overseas Command and Control (“C2”) servers.
28
Suspicious circumstances were observed by staff of the IHiS Delivery Group who were
not members of the SMD. They brought their suspicion to the attention of individual personnel
from IHiS’ Security Incident Response Team (“SIRT”), which is part of the SMD. One of the
personnel thus notified was the Security Incident Response Manager (“SIRM”). The staff in
the IHiS Delivery Group had reported the suspicious circumstances as they suspected that there
was something amiss. While the matter was referred to the SMD, the SIRT was not formally
activated at any point. This was not in accordance with IHiS’ Healthcare IT Security Incident
Response Framework, version 2.1 (“SIRF”) and IHiS’ Cluster IT Security Incident Response
SOP, version 1.0 (“IR-SOP”).
29
On 4 July 2018, an IHiS Assistant Lead Analyst from the IHiS Delivery Group
supporting SCM observed alerts generated by a performance monitor which was programmed
to monitor database queries. He commenced investigations into the unusual queries on the
SCM database. When the Assistant Lead Analyst was unable to trace the user launching the
queries or make sense of the queries on his own, he alerted his colleagues from the IHiS
Application, Citrix and Database teams to assist in the investigations. An automated script was
then developed and implemented on the SCM database by the Assistant Lead Analyst together
with an IHiS Database Administrator from the IHiS Delivery Group to terminate the queries,
log the queries and send alerts to them when such queries are identified. The Citrix Team Lead
also took steps to block access to the SCM database from any SGH Citrix Server, and submitted
requests to create firewall rules to block all connections to the SCM database originating from
any SGH Citrix Server. Collectively, these efforts stopped the further exfiltration of data from
the SCM database.
30
The SIRM and the SingHealth CISO were both aware of the suspicion of attack since
13 June 2018 and the remediation efforts of 4 July 2018. They were both copied on emails and
were members of a chatgroup created to investigate these incidents. The SingHealth CISO was
apprised of the investigations but did not make further enquiries. Instead, he waited passively
8
for updates. The SIRM was overseas until 18 June 2018 without nominating a covering officer.
During this time, neither the SIRM nor the SingHealth CISO escalated the matter despite their
knowledge of these circumstances through meetings and messages. Also, neither the SIRM nor
the SingHealth CISO took any steps to activate the SIRT in accordance with the IR-SOP.
31
IHiS senior management and the SingHealth GCIO were only alerted to the attack on
the evening of 9 July 2018. Even though the SingHealth GCIO did not receive details of the
unauthorised access (and in particular the exfiltration of data), he promptly escalated the matter
and informed the CEO of IHiS that there was suspected unauthorised access into the SCM
database. Concurrently, the SingHealth GCIO informed the SingHealth DGCEO (OT&I) of the
suspected unauthorised access. After being informed, the CEO of IHiS consulted with IHiS’
director for Cyber Security Governance (“CSG”) and organised an urgent conference call
between IHiS senior management and the relevant employees at 1:00 p.m. the next day, where
he was to be briefed on the matter.
32
Details of the attack and the exfiltration of data were first shared with the CEO of IHiS
and the SingHealth GCIO, at the conference call on 10 July 2018. The CEO of IHiS
immediately recalled all relevant employees and IHiS senior management for an urgent
meeting at IHiS’ office on the matter and to undertake an examination of IHiS’ logs of the
attacker’s queries on the SCM database to ascertain the extent of data exfiltration (if any). More
details of the incident were ascertained and the CEO of IHiS and IHiS senior management were
informed of the same at the meeting that afternoon. Arrangements were made to immediately
notify CSA. Notifications were also issued by IHiS to MOH and SingHealth. A “war room”
with five working cells for containment, investigation, patient impact, communications and
reviewing of security measures for other systems was also set up.
Remedial actions
33
From 10 July 2018, IHiS and CSA worked jointly to put in place containment measures
to isolate the immediate threat, eliminate the attacker’s foothold and prevent the attack from
recurring:
(a)
IHiS reset the system accounts twice in succession to invalidate any existing
full-access authentication tokens that the attacker might have;
9
(b)
IHiS Security Operations Centre was placed on high alert to look out for
suspicious activity and signs of compromise and failed login attempts, which allowed
CSA and IHiS to detect and respond to fresh callback attempts by the attacker on 19
July 2018 to the C2 servers;
(c)
the IHiS Network team tightened firewall rules;
(d)
IHiS reloaded all Citrix servers with clean images to ensure no compromised
Citrix servers were left running;
34
(e)
IHiS mandated passwords changes for all users (including administrators); and
(f)
IHiS put in place extensive monitoring of all administrator accounts.
IHiS also supported CSA in its investigations by providing forensic images of
computers suspected to be compromised, memory dumps, and proxy and network logs for
forensic analysis by CSA. IHiS also simulated the attacker’s queries to ascertain the extent of
data exfiltration.
35
On 19 July 2018, attempts by the attacker to access the SCM network were again
detected and CSA recommended the adoption of Internet Surfing Separation (“ISS”) to contain
the attack. ISS was instituted immediately thereafter on 20 July 2018 for SingHealth, and by
22 July 2018 for the other two Clusters.
36
Shortly after SingHealth was informed of the cyber attack, SingHealth made plans for
patient communications using multiple channels of communication. Within days after the
public announcement of the cyber attack on 20 July 2018, SingHealth sent out SMSes or letters
to notify patients whether their data was illegally accessed and how they can seek help.
Telephone hotlines were also set up for members of the public to obtain further information.
Members of the public could also check whether their data had been accessed on the
“HealthBuddy” mobile application and the SingHealth website.
37
On 1 November 2018, IHiS announced that it will be adopting a slew of measures to
strengthen cybersecurity across the public healthcare sector following the cyber attack. IHiS
identified and initiated 18 security measures which will be implemented progressively. Such
measures include:
10
(a)
addressing Advanced Persistent Threat (“APT”) by sophisticated actors: IHiS
has initiated several measures to improve its ability to detect indicators-of-compromise,
record and monitor endpoints’ system-level behaviours and events, detect advanced
malwares and remove the threats (if any). IHiS will also be implementing two-factor
authentication for endpoint local administrators who manage end-user devices and
installation of software;
(b)
addressing vulnerabilities to prevent unauthorised access to Clusters’ IT
networks: To further prevent the use of weak passwords, IHiS will be enhancing the
access management capability to manage complex passwords centrally and
automatically update and protect administrator accounts. Access management will be
boosted with threat analytics to provide earlier detection of suspicious account activities
by applying a combination of statistical modelling, machine learning, as well as
behaviour analytics to identify unusual activities, and respond faster to threats; and
(c)
enhancing security of the Allscripts SCM: IHiS has put in place database
activity monitoring for SCM and it is being enhanced with more comprehensive blocks
and alerts on execution of bulk queries.
Findings and Basis for Determination
38
The issues for determination are as follows:
(a)
whether IHiS was acting as a data intermediary for SingHealth in relation to the
SingHealth patients’ personal data on the SCM database; and
(b)
whether each of the Organisations complied with its obligation under section 24
of the Personal Data Protection Act 2012 (“PDPA”) in respect of the Data Breach.
39
As a preliminary point, the Commissioner finds that the Patient Particulars and
Dispensed Medication Records are personal data as defined under section 2(1) of the PDPA
because they contain data about patients who could be identified from that data.
40
Given the facts and circumstances surrounding the Data Breach, the Patient Particulars
and Dispensed Medication Records were disclosed without authorisation in the Data Breach.
11
(a)
Whether IHiS was acting as a data intermediary for SingHealth
41
A data intermediary is defined in section 2(1) of the PDPA as an organisation that
processes personal data on behalf of another organisation but does not include an employee of
that organisation. SingHealth engaged IHiS (MOH’s designated IT arm of the public healthcare
sector), as required by MOH, to manage its IT systems and provide day-to-day operations and
technical support, maintenance, and monitoring of the entire SingHealth IT system (including
the SCM database which held the personal data of SingHealth’s patients). These activities
include “processing” of personal data on behalf of SingHealth, as defined in section 2(1) of the
PDPA.
42
The scope of the IHiS Delivery Group’s duties and responsibilities to SingHealth are
set out in the following policy documents:
(a)
the IT-SPS, which is a policy document jointly prepared by MOHH and IHiS;
(b)
the annual IT workplans for each of the SingHealth institutions, which establish
an agreement between each of the SingHealth institutions and IHiS;5 and
(c)
the IHiS Data Protection Policy (“DPP”) (read in conjunction with the MOHH
Information Sharing Policy), which expressly states that IHiS is a data intermediary for
SingHealth and all other healthcare institutions in the Clusters.6
43
Notably, the DPP makes it clear that IHiS will only collect, use, disclose and/or process
SingHealth’s data to the extent necessary to fulfil its duties and obligations to SingHealth. This
includes, among other things, collecting, using, disclosing and/or processing SingHealth’s data
for the purposes of investigating and resolution of issues and errors reported in IT programs
and systems and IT support.7
The IT workplans expressly include the provision of SCM maintenance support as an item under the list of “IT
System Support and Maintenance Services” to be provided.
6
Clause 1.1.3 of the DPP states:
5
“As IT professionals who support healthcare organisations, IHIS acts as a “data intermediary” in
relation to Client Data, will exercise reasonable care in protecting Client Data from unauthorised
access, collection, use, disclosure, copying, modification, disposal or similar risks (our “Protection
Obligation”), and we undertake steps to ensure that we do not retain personal data longer than is
required for business or legal purposes (our “Retention Obligation”).
[Emphasis added.]
7
Clause 6.1.1 of the DPP.
12
44
Pursuant to section 4(2) of the PDPA, a data intermediary that processes personal data
on behalf of and for the purposes of another organisation pursuant to a contract which is
evidenced or made in writing has a duty to comply with sections 24 and 25 of the PDPA. Under
section 4(3) of the PDPA, an organisation that engages a data intermediary to process personal
data on its behalf and for its purposes has the same obligation in respect of such personal data
as if it had processed the personal data itself. Accordingly, SingHealth and IHiS each have an
obligation to make reasonable security arrangements to protect the personal data of
SingHealth’s patients that are in their possession or under their control.
The GCIO Office
45
At this juncture, it is pertinent to deal with the issue of where the roles of the GCIO
(and the GCIO Office) as well as the CISO fit within the Organisations. Because of the way in
which all IT functions and capabilities (including IT staff) for the public healthcare sector are
centralised in IHiS, it is not readily apparent whether SingHealth or IHiS is responsible for the
actions of the GCIO and CISO.
46
As mentioned at paragraph 9 above, every Cluster has a GCIO and CISO. It is not
disputed that the SingHealth GCIO and SingHealth GCIO Office are operationally part of
SingHealth and its organisational structure. The SingHealth GCIO is positioned at the top of
and is in charge of the SingHealth GCIO Office, through which he carries out services and
owes responsibilities to SingHealth in terms of overseeing SingHealth’s IT systems. In
SingHealth, the SingHealth GCIO and his office have a number of duties. These include:
(a)
the SingHealth GCIO is responsible for updating the SingHealth Board of
Directors on important IT security matters and attends the SingHealth Board IT
Committee (“ITC”) meetings. For example, the SingHealth GCIO provides
SingHealth’s Risk Oversight Committee (“ROC”) with information relating to
proposed or implemented measures to improve SingHealth’s IT security, such as
encryption of data in SingHealth’s servers, monitoring of unusual access to the EMR
and outgoing network traffic, and phishing exercises conducted on SingHealth staff.
The SingHealth GCIO also informs the ROC about major IT security incidents in
SingHealth’s network, remediation of cybersecurity weaknesses observed in
SingHealth’s servers, and the status of SingHealth’s compliance with IT security
standards, such as the IT-SPS;
13
(b)
the SingHealth GCIO sits on several SingHealth management level committees
that have oversight over IT matters in SingHealth, specifically the Cluster IT Council
(“CITC”), Electronic Medical Record Steering Committee (“EMRSC”) and Enterprise
Resource Planning Steering Committee (“ERPSC”).8 The SingHealth GCIO Office is
also the secretariat of the CITC, the overall governing body for IT matters across the
SingHealth Cluster;
(c)
the SingHealth GCIO Office oversees SingHealth’s IT operations and security
and exercises oversight over the IHiS Delivery Group’s administration and
implementation of policies;
(d)
the SingHealth GCIO Office prepares and presents for approval, papers on IT
security proposals and budgets, including various annual IT work plans and budgets to
SingHealth’s management, management committees and board committees, such as the
CITC and ITC. The SingHealth GCIO works with the respective SingHealth PHIs to
prepare the IT workplan9 for each SingHealth PHI;
(e)
the SingHealth GCIO Office tracks the implementation of audit remediation
measures recommended by MOHH’s Group Internal Audit division (“GIA”) 10
according to the timeline agreed between IHiS and GIA;11 and
(f)
the SingHealth GCIO and GCIO Office also play a key role in SingHealth’s
staff IT security education and awareness initiatives by developing various security
policies pertaining to cybersecurity in accordance with the IT-SPS, such as the
SingHealth IT Acceptable Use Policy, the SingHealth Response Plan for Cyber Attacks
(Version 3.0) (“SingHealth RP CA”), the standard operating procedure (“SOP”) for
Incident Communication and Escalation and the SingHealth Data Access Policy. The
SingHealth GCIO also sends out memos to all SingHealth staff in relation to IT security
risks and staff training initiatives, e.g. phishing exercises.
8
See paragraph 66 below for more details on the CITC and other board committees in SingHealth with oversight
over IT matters.
9
An IT workplan would typically include IHiS’ direction for implementation of IT initiatives, including IT
security initiatives (such as Advanced Threat Protection and hard disk encryption) for the financial year.
10
The scope of the GIA’s audits are discussed at paragraphs 71 to 73 below.
11
The SingHealth GCIO Office does not verify whether the audit remediation measures have been implemented.
The GIA would validate if the remediation measures had in fact been performed and update SingHealth
management accordingly.
14
47
Similarly, as mentioned at paragraph 9 above, it is not disputed that the SingHealth
CISO is charged with security oversight for SingHealth and reports to the SingHealth GCIO
directly on security matters. The SingHealth CISO does not have any staff reporting under him
and relies on the IHiS Delivery Group (specifically the SMD) for their technical expertise on
security and operational matters. The SingHealth CISO has a key role in the organisational
structure of SingHealth with regard to IT security. Under the IT security incident reporting
processes developed and/or adopted by SingHealth, the SingHealth CISO has substantial
responsibilities including the assessing, monitoring, and coordinating of responses to such
incidents. He is accountable for the actions of incident response functions and is responsible
for making regular, direct reports to the SingHealth GCIO, SingHealth management and other
relevant parties such as the CSG.
48
On balance, while IHiS employees deployed to fill the SingHealth GCIO or CISO role
may owe concurrent duties and responsibilities to IHiS, to the extent that they are carrying out
the functions of the SingHealth GCIO or CISO, it is not disputed that they act on behalf of
SingHealth. Insofar as they perform the work and operate on behalf of SingHealth, the
Commissioner finds that the actions of the SingHealth GCIO and CISO as well as the
SingHealth GCIO Office should be attributed to SingHealth.
(b)
Whether the Organisations complied with their obligations under section 24 of the
PDPA
49
Section 24 of the PDPA requires an organisation to protect the personal data in its
possession or under its control by making reasonable security arrangements to prevent
unauthorised access, collection, use, disclosure, copying, modification, disposal or similar risks
(the “Protection Obligation”).
50
Pursuant to section 11(1) of the PDPA, the reasonableness of the security arrangements
made is to be objectively determined, having regard to what a reasonable person would
consider appropriate in the circumstances. The following factors as set out in the Advisory
Guidelines on Key Concepts in the PDPA (revised 27 July 2017) (at [17.2]) are taken into
consideration in assessing the reasonableness of security arrangements:
(a)
the nature of the personal data;
15
(b)
the form in which the personal data has been collected (e.g. physical or
electronic); and
(c)
the possible impact to the individual concerned if an unauthorised person
obtained, modified or disposed of the personal data.
51
In assessing the reasonableness of the security arrangements adopted by the
Organisations, the Commissioner took into consideration the fact that medical data is personal
data of a sensitive nature which should be accorded a higher standard of protection. 12 The
health sector handles some of the most sensitive personal data and patients have the right to
expect that the data will be looked after.13
52
As observed in Re The Cellar Door Pte Ltd and Global Interactive Works Pte Ltd [2016]
SGPDPC 22, “reasonable security arrangements” for IT systems must be sufficiently robust
and comprehensive to guard against a possible intrusion or attack:14
“Another important aspect of a “reasonable security arrangement” for IT
systems is that it must be sufficiently robust and comprehensive to guard
against a possible intrusion or attack. For example, it is not enough for an IT
system to have strong firewalls if there is a weak administrative password which
an intruder can “guess” to enter the system. The nature of such systems require
there to be sufficient coverage and an adequate level of protection of the
security measures that are put in place, since a single point of entry is all an
intruder needs to gain access to the personal data held on a system. In other
words, an organisation needs to have an “all-round” security of its system.
This is not to say that the security measures or the coverage need to be
“perfect”, but only requires that such arrangements be “reasonable” in the
circumstances.”
[Emphasis added.]
53
The public healthcare sector is heavily reliant on IT and a wide variety of IT systems
that hold personal data are employed as part of a healthcare institution’s operations. 15 In
particular, the SCM system is hosted in H-Cloud and the SCM database contains the full
medical records of all SingHealth’s patients, which is very sensitive personal information. It is
12
Re Aviva Ltd [2018] SGPDPC 4 at [17].
UK, ICO, Health Sector Resources .
14
Re The Cellar Door Pte Ltd at [29].
15
These include clinical systems that provide direct patient care to administrative and infrastructure systems that
automate processes and workflow and facilitate sharing of information and communications across teams within
and outside of the institution.
13
16
therefore critical to protect the security and confidentiality of such medical records. As
highlighted in the Advisory Guidelines for the Healthcare Sector (updated 28 March 2017) (at
[4.2]):
“In relation to the Protection Obligation, the PDPA requires an organisation to
make reasonable security arrangements to protect personal data in its
possession or under its control. There is no ‘one size fits all’ solution for
organisations to comply with the Protection Obligation. Generally, where the
personal data stored is regarded as more confidential and where the
adverse impact to individuals is significantly greater if such personal data
were inadvertently accessed (e.g. relating to sensitive medical conditions),
tighter security arrangements should be employed. Healthcare institutions
should consider the nature of the personal data in their possession or under
their control (as the case may be) to determine the security arrangements
that are reasonable and appropriate in the circumstances.”
[Emphasis added.]
Whether SingHealth complied with its Protection Obligation
54
As an organisation subject to the data protection provisions under the PDPA,
SingHealth has the primary responsibility of ensuring that there are reasonable security
arrangements in place to protect the personal data in its possession or under its control, 16
regardless of whether SingHealth has appointed a data intermediary to process patient personal
data on its behalf.
55
While SingHealth may outsource the activities necessary to protect the personal data in
the SCM database by engaging IHiS to maintain and secure its IT network and the SCM
database, SingHealth has a duty to ensure that any data intermediary that processes personal
data on its behalf complies with the PDPA.17 This means that SingHealth can still be liable for
a data breach for failing to meet its responsibility, even though IHiS was found to have its own
responsibility, and vice versa.18
56
The Commissioner takes this opportunity to reiterate that while organisations may
outsource work to vendors, the responsibility for complying with statutory obligations under
the PDPA may not be delegated:19
16
Clause 5.1.1 of the DPP expressly states that Clients (i.e. SingHealth) will at all times remain in control over
Client Data (i.e. the personal data of SingHealth’s patients).
17
See Re Smiling Orchid (S) Pte Ltd and others [2016] SGPDPC 19 at [46].
18
Re Social Metric Pte Ltd at [16], citing Re Smiling Orchid. See also Re Singapore Telecommunications Limited
and another [2017] SGPDPC 4 and Re Aviva Ltd and another [2016] SGPDPC 15.
19
Re WTS Automotive Services [2018] SGPDPC 26 at [23].
17
“Further, organisations should take note that while they may delegate work to
vendors to comply with the PDPA, the organisations’ responsibility for
complying with statutory obligations under the PDPA may not be
delegated.”
[Emphasis added.]
57
Having said that, our earlier decisions have recognised that there may be different
responsibilities that an organisation or data intermediary may undertake under the PDPA. In
Re Social Metric Pte Ltd [2017] SGPDPC 17, the Commissioner explained that where the data
processing activities are carried out by the organisation’s external vendor, the organisation has
a supervisory or general role for the protection of the personal data, while the data
intermediary has a more direct and specific role in the protection of personal data arising from
its direct possession of or control over the personal data.20
58
In this case, on the basis of the Organisations’ representations and evidence in these
proceedings, the Commissioner is satisfied that SingHealth had some security arrangements in
place to meet its supervisory role for the protection of the personal data, such as by maintaining
oversight and control over IHiS’ processing of the SCM database. However, the SingHealth
CISO’s failure to comply with the IT security incident reporting processes and failure to
exercise independent judgement call into question whether SingHealth had taken reasonable
and appropriate measures to protect the personal data in the SCM database from unauthorised
access and copying. More importantly, it points to a larger systemic issue within the
organisation.
59
To begin with, parties should put in place a contract that sets out the obligations and
responsibilities of a data intermediary to protect the organisation’s personal data and the
parties’ respective roles, obligations and responsibilities to protect the personal data. 21 The
foreign data protection authorities have taken the position that a data controller that outsources
the processing of its personal data to data processors must take all reasonable steps to protect
that information from unauthorised use and disclosure while it is in the hands of the third-party
processor.
20
21
Re Social Metric Pte Ltd at [16], citing Re Smiling Orchid.
Re Singapore Telecommunications Limited at [14].
18
60
According to the Information Leaflet on the Outsourcing the Processing of Personal
Data to Data Processors published by the Hong Kong Office of the Privacy Commissioner for
Personal Data’s (“PCPD”),22 the primary means by which a data user may protect personal
data entrusted to its data processor is through a contract.23 The PCPD recommends that the
following obligations should be imposed on data processors:
“How to comply with the requirements
Through contractual means
The primary means by which a data user may protect personal data
entrusted to its data processor is through a contract. In practice, data users
often enter into contracts with their data processors for the purpose of defining
the respective rights and obligations of the parties to the service contract. To
fulfil the new obligations under DPP2(3) and DPP4(2), data users may
incorporate additional contractual clauses in the service contract or enter into a
separate contract with the data processors.
The types of obligations to be imposed on data processors by contract may
include the following:(a)
security measures required to be taken by the data processor to
protect the personal data entrusted to it and obligating the data
processor to protect the personal data by complying with the data
protection principles (The security measures that are appropriate and
necessary for a data user will depend on the circumstances. Basically,
the data processor should be required to take the same security measures
the data user would have to take if the data user was processing the data
himself);
(b)
timely return, destruction or deletion of the personal data when it is no
longer required for the purpose for which it is entrusted by the data user
to the data processor (it is for the parties to agree the appropriate number
of days);
(c)
prohibition against any use or disclosure of the personal data by
the data processor for a purpose other than the purpose for which
the personal data is entrusted to it by the data user;
(d)
absolute prohibition or qualified prohibition (e.g. unless with the
consent of the data users) on the data processor against sub-contracting
the service that it is engaged to provide;
(e)
where sub-contracting is allowed by the data user, the data processor’s
agreement with the sub-contractor should impose the same obligations
22
Hong Kong, PCPD, Outsourcing the Processing of Personal Data to Data Processors (September 2012)
. Under Hong Kong law, a data user is
to take all reasonably practicable steps to safeguard the security of personal data held by it. Where personal data
is entrusted to a data processor, a data user is responsible for any act done by the data processor.
23
However, the PCPD also recognised that other means of compliance, such as being satisfied that data processors
have robust policies and procedures in place and having the right to audit and inspect, may be used.
19
in relation to processing on the sub-contractor as are imposed on the
data processor by the data user; where the sub-contractor fails to fulfil
its obligations, the data processor shall remain fully liable to the data
user for the fulfilment of its obligations;
(f)
immediate reporting of any sign of abnormalities (e.g. audit trail
shows unusual frequent access of the personal data entrusted to the data
processor by a staff member at odd hours) or security breaches by the
data processor;
(g)
measures required to be taken by the data processor (such as
having data protection policies and procedures in place and
providing adequate training to its relevant staff) to ensure that its
relevant staff will carry out the security measures and comply with
the obligations under the contract regarding the handling of
personal data;
(h)
data user’s right to audit and inspect how the data processor
handles and stores personal data; and
(i)
consequences for violation of the contract.
The above list is not exhaustive and data users may need to make adjustments
or to include additional obligations on data processors under the contract having
regard to factors such as the amount of personal data involved, the sensitivity
of the personal data, the nature of the data processing service and the harm that
may result from a security breach.”
[Emphasis added.]
61
In a similar vein, the Office of the Privacy Commissioner of Canada’s (“OPC”)
guidance note, Privacy and Outsourcing for Businesses, 24 states that organisations that
outsource the processing of personal information must be satisfied that the third party has
policies and processes in place, including training for its staff and effective security measures,
to ensure that the information in its care is properly safeguarded at all times:
“The Personal Information Protection and Electronic Documents
Act (PIPEDA) — Canada’s federal private-sector privacy law – requires
organizations to take privacy consideration into account when considering
outsourcing to another organization.
There is nothing in PIPEDA that prevents organizations from outsourcing the
processing of data.
However, regardless of where information is being processed—whether in
Canada or in a foreign country—organizations subject to PIPEDA must take all
reasonable steps to protect that information from unauthorized uses and
disclosures while it is in the hands of the third-party processor.
Canada OPC, Privacy Topics – Privacy and Outsourcing for Businesses (January 2014)
.
24
20
Organizations must also be satisfied that the third party has policies and
processes in place, including training for its staff and effective security
measures, to ensure that the information in its care is properly safeguarded
at all times.”
[Emphasis added.]
62
The position taken by the foreign data protection authorities is consistent with the
Commissioner’s views in Re Smiling Orchid. There should be a clear meeting of minds as to
the services the service provider has agreed to undertake and organisations must follow through
with procedures to check that the outsourced provider is delivering the services:25
“Data controllers that engaged outsourced service providers have to be clear
about the nature and extent of services that the service provider is to provide.
There must be a clear meeting of minds as to the services that the service
provider has agreed to undertake, and this should be properly
documented. Data controllers should follow through with the procedures
to check that the outsourced provider is indeed delivering the services. In
the absence of such clarity of intent and procedures, it is risky to hold that the
outsourced service provider is a data intermediary.”
[Emphasis added.]
63
Having reviewed the policy documents at paragraph 42 above, the Commissioner finds
that IHiS’ duties and obligations as a data intermediary are clearly set out and properly
documented in the policy documents. In particular:
(a)
the IT-SPS sets out IHiS’ roles and responsibilities, including to design
procedures and processes needed to implement the IT security policies and standards
as described in the IT-SPS;26 and
(b)
the DPP provides guarantees of security of the personal data processed on behalf
of SingHealth as it expressly states that IHiS shall exercise reasonable care in protecting
SingHealth’s personal data and shall ensure that it implements and maintains
appropriate security measures when processing personal data on behalf of SingHealth.27
25
Re Smiling Orchid at [51]. See also Re Singapore Cricket Association & Ors. [2018] SGPDPC 19, where the
Commission reiterated that organisations that engage service providers to process personal data on their behalf
should clarify and properly document the nature and extent of service provided.
26
Clause 6.1.1 of the IT-SPS.
27
Clause 1.1.3 of the DPP:
“As IT professionals who support healthcare organisations, IHIS acts as a “data intermediary” in relation
to Client Data, will exercise reasonable care in protecting Client Data from unauthorised access,
21
64
The above policy documents evidence the parties’ intentions to be contractually bound
by, and define the scope of the duties and obligations set out therein.
65
Additionally, SingHealth has developed and implemented a number of data protection
policies and practices, which were communicated to its staff. These include:
(a)
a Data Protection Policy, which explains how SingHealth institutions handle
personal data and is available to the public on SingHealth’s website and at its premises;
(b)
a PDPA Employee Standards Manual, which is a resource and guide for
SingHealth employees regarding SingHealth’s obligations under the PDPA;
(c)
a dedicated intranet page for PDPA training materials, which is accessible to all
staff;
(d)
a Master Data Share Agreement that SingHealth entered into with its subsidiary
institutions to regulate the sharing of information among the SingHealth institutions;
(e)
a Data Access Approval Policy, which sets out the policy and procedure for
handling data access requests from data subjects at the SingHealth level; and
collection, use, disclosure, copying, modification, disposal or similar risks (our “Protection
Obligation”), and we undertake steps to ensure that we do not retain personal data longer than is required
for business or legal purposes (our “Retention Obligation”).”
[Emphasis added.]
Clause 11.1.1 of the DPP:
“The principles under which we discharge our Protection Obligations as data intermediary under the PDPA
for Client Data are as follows:
11.1.1 When Handling Client Data on behalf of Clients in connection with such services as IHiS may
provide to Clients from time to time at Clients’ request, IHiS shall ensure that it implements and
maintains appropriate security measures to ensure the security of the Client Data.
11.1.2 In doing so, IHiS may be required to appoint vendors to advise on and execute the appropriate
data protection measures, and Clients authorise IHiS to appoint such vendors as may be necessary to
perform tasks in connection with meeting its obligations under Section 25 [sic.] PDPA under its
engagement with the Clients.”
[Emphasis added.]
22
(f)
a Data Breach Management Policy, which sets out the policy and procedure for
the implementation of SingHealth’s personal data breach management programme to
manage personal data breaches effectively.28
SingHealth management and board oversight of IT operations and security
66
Apart from the policy documents, there is evidence that SingHealth maintained
oversight of IT operations and security through various oversight and auditing mechanisms,
such as through the following board and management committees:
(a)
SingHealth’s senior management and Board members are apprised of IT
matters, such as IT audits and assessments, and the budgeting of IT projects, by the
SingHealth GCIO Office;
(b)
other than the SingHealth Board of Directors, there are three Board committees
that have oversight of IT security matters and meet regularly throughout the year:
(i)
the ITC: a Board committee comprising Board members and co-opted
members from external institutions who have IT expertise. Senior
management representatives from SingHealth such as the Group CEO
(“GCEO”) and Deputy Group CEO, as well as the SingHealth GCIO
attends the ITC meetings. ITC approves the various annual IT workplans
for the SingHealth Cluster, which are prepared by the SingHealth GCIO
and the IHiS Delivery Group; and
(ii)
the Audit Committee (“AC”) and the ROC: where audits and key risks
relating to cyber security matters, such as SingHealth’s compliance with
and key cyber security initiatives undertaken as part of the IT-SPS, and
efforts to raise IT user security awareness, are deliberated upon. The
ROC receives updates from the SingHealth GCIO on proposed or
implemented measures to improve SingHealth’s IT security;29
28
In the present case, as the suspicious circumstances were first observed by IHiS staff from the IHiS Systems
Management Department, the cyber security incident reporting framework which was followed was IHiS’ IRSOP.
29
These include updates on the encryption of data in SingHealth’s servers, monitoring of unusual access to the
EMR and outgoing network traffic, and phishing exercises conducted on SingHealth staff.
23
(c)
at the management level, the CITC is the overall governing body for IT matters
across the SingHealth Cluster. The CITC reports to the ITC.30 The CITC meets
monthly to review and endorse SingHealth’s Cluster-wide IT projects and
initiatives and to oversee and review the IT security program. Its role is to ensure
that IT strategy and investments are aligned with the business strategy and IT
architecture of the Cluster, resulting in the effective and efficient use of IT in
enabling SingHealth to achieve its goals. The SingHealth GCIO sits on the CITC.
There are two further sub-committees under the CITC:
(i)
the ERPSC; and
(ii)
the EMRSC, which is the central governance body to oversee EMR
access audit and continuous access monitoring requirements. The
EMRSC members comprise of the SingHealth GCIO as well as the
Directors of Medical Informatics of the various PHIs in SingHealth.
Operational measures
67
In addition to the board and management level oversight, the Commissioner finds that
through the SingHealth GCIO and GCIO Office, SingHealth also followed through with
operational procedures and checks to ensure that IHiS carried out its functions to protect their
personal data.
68
The SingHealth GCIO Office exercises oversight of the IHiS Delivery Group’s
administration of policies. It monitors and verifies that policies are carried out and issues of
security are addressed primarily through various operational meetings between the SingHealth
GCIO Office and the IHiS Delivery Group, such as:
(a)
the monthly SingHealth IT Management, Communication and Coordination
Meeting chaired by the SingHealth GCIO, where issues of cyber security are discussed,
allowing the SingHealth GCIO to track and ensure follow up of any outstanding
remediation measures to be done;
SingHealth’s GCEO chairs the CITC, and DGCEO (OT&I) is the Deputy Chair. The CITC members include
the other SingHealth DGCEOs and the heads of the various PHIs in SingHealth. The SingHealth GCIO Office is
the secretariat of the CITC.
30
24
(b)
regular meetings between the SingHealth GCIO Office Application Directors
and the individual IHiS Delivery Group teams (e.g. the SMD), which further allows for
cyber security issues and policy compliance to be tracked; and
(c)
ad hoc meetings between the SingHealth GCIO Office and the relevant IHiS
Delivery Group teams to track and ensure that detected vulnerabilities in the SingHealth
network are addressed.
69
As mentioned at paragraph 72 below, the SingHealth CISO also keeps track of the
timelines agreed between IHiS and the GIA on the audit remediation measures. In the
circumstances, the Commissioner finds that there are governance and audit mechanisms in
place for SingHealth to maintain oversight and control over IHiS’ processing of the SCM
database.
Audits and risk management
70
The security measures put in place by IHiS are also subject to regular audits. The
SingHealth CISO conducts yearly Critical Information Infrastructure (“CII”) risk assessments
on SingHealth’s mission-critical IT systems (i.e. SingHealth’s SCM system) on behalf of
SingHealth. This exercise is overseen by the SingHealth GCIO and the SingHealth CISO relies
on technical input from members of the IHiS Delivery Group in assessing the risks or threats
to the CII, the controls in place and the steps that should be taken to improve on the existing
controls. The SingHealth CISO’s assessment is presented to the SingHealth ITC.
71
Separately, MOHH’s GIA conducts a CSA CII Compliance Review on the SCM system
annually to ascertain if SingHealth, being a CII operator, has complied with CSA’s
requirements for the CII.
72
The GIA also conducts an annual audit of SingHealth’s IT systems. 31 The GIA
identifies and prioritises the key risk areas (including for cyber security) and comes up with
the annual audit plan together with input from SingHealth management for the SingHealth
31
The GIA is an independent centralised internal audit division housed within MOHH which audits the Clusters
and IHiS. Audit findings from the GIA are presented directly to the AC and the ROC. Their findings are also
addressed by the IHiS Board Audit and Risk Committee. The GIA reports to the MOHH Board Audit and Risk
Committee, which comprises all the Audit Committee Chairmen from all the MOHH subsidiaries (including
SingHealth and IHiS).
25
AC’s review and approval. The SingHealth CISO coordinates GIA audits by being the parties’
point of contact and keeps track of the timeline agreed between IHiS and the GIA on the audit
remediation measures.
73
By way of example, in FY 2016, the GIA planned an audit on IHiS’ H-Cloud data
centre and engaged external providers to perform an IT security penetration test from three PHI
systems, one of which was from SGH to H-Cloud (the “H-Cloud Pen-Test”). The plan for the
H-Cloud Pen-Test was presented to and approved by the SingHealth AC on 16 May 2016 and
the H-Cloud Pen-Test was conducted in early January 2017.
74
As the H-Cloud Pen-Test was an audit of IHiS’ H-Cloud, the finalised audit report (the
“GIA Audit Report”) was addressed to the CEO of IHiS. However, the audit findings
(including the security risks) and the follow up actions and measures to be taken by IHiS were
brought to the attention of SingHealth’s senior management and were discussed at various
board committees and management committees within SingHealth.
75
Between May 2017 and October 2017, the GIA (which was tasked with eventually
validating that remediation measures had been carried out) presented the results and
observations from the H-Cloud Pen-Test to the SingHealth Board AC, ROC and ITC and
provided updates on the remediation measures and implementation timelines being undertaken
by IHiS to rectify the weakness identified in the GIA Audit Report. This shows that
SingHealth’s various board committees were kept abreast of the follow up for the remediation
measures by the GIA.
76
One area that had previously been identified as a potential issue in the operational
monitoring of the remediation of the audit findings was in respect of the implementation by
IHiS of firewall rules on the SGH Citrix Servers to block remote desktop protocol traffic from
end-user workstations. In its further representations, SingHealth provided evidence that the
SingHealth GCIO Office, through the SingHealth CISO, had been tracking the status of the
remediation of these outstanding issues. The IHiS Delivery Group had informed the SingHealth
CISO on more than one occasion that the implementation of the software firewall rules as a
remediation measure had been completed by 7 August 2017. As the implementation of the
software firewall rules are a matter of configuration of the existing SGH Citrix Servers without
the need for procurement of additional equipment, it is not unreasonable for the SingHealth
26
CISO to have relied on IHiS Delivery Group to provide him with an update after
implementation. In retrospect, the SingHealth CISO could have asked for evidence (e.g.
screenshots) demonstrating that the software firewall had been turned on and was effective in
blocking remote desktop protocol traffic from end-user workstations. But this would have been
a level of operational verification that the SingHealth CISO can reasonably expect the IHiS
Delivery Group to have done before they reported up to him that this audit finding had been
remediated. Having considered SingHealth’s further representations, and the evidence
provided, the Commissioner accepts that SingHealth had exercised reasonable oversight in
respect of the implementation of the software firewall rules.
77
A similar position was taken by the OPC in the Canadian Personal Information
Protection and Electronic Documents Act (“PIPEDA”) Case Summary #2007-365,32 which
relates to the disclosures by the Society for Worldwide Interbank Financial Telecommunication
(“SWIFT”) of personal information to US authorities. The OPC reviewed the contract in place
between SWIFT and the banks, as well as the other means available to the banks to ensure that
SWIFT is providing a comparable level of protection. It found that the banks had fulfilled their
obligations under Principle 4.1.3 of the PIPEDA, citing the various oversight and auditing
mechanism, such as the development and implementation of a highly sophisticated and
elaborate set of security measures, the cooperative oversight and technical oversight group:
“SWIFT and its members have collaboratively developed and implemented
a highly sophisticated and elaborate set of security measures to ensure the
integrity, confidentiality, security and reliability of the financial messages
that SWIFT delivers.
SWIFT reports back to its committees and boards through its Annual
Report and through the security audit report (it should be noted that these
reports encompass far more than personal information handling practices).
Although some of the contractual language appears to place SWIFT in control
of how its system is used and, by extension, how personal information in its
possession is handled, it is nevertheless also obliged to maintain confidentiality
of information.
Furthermore, the Assistant Commissioner noted that there are other means by
which the banks, as members and users of the SWIFT system, can ensure that
a comparable level of protection is in place, particularly with respect to the
cooperative oversight and technical oversight groups. Through these
various oversight and auditing mechanisms, and through the contractual
OPC, PIPEDA Case Summary #2007-365, Responsibility of Canadian financial institutions in SWIFT’s
disclosure of personal information to US authorities considered (2 April 2007) .
32
27
language and various security measures in place, she was satisfied that the
banks are meeting their obligations under Principle 4.1.3.”
[Emphasis added.]
SingHealth CISO’s failure to escalate incident
78
Notwithstanding, as described at paragraph 30 above, the Commissioner observes that
the SingHealth CISO failed to comply with the various incident response policies and SOPs.
The SingHealth CISO’s role in relation to cyber incidents are detailed in the following IT
security incident reporting policy documents:
(a)
under the SingHealth RP CA, the SingHealth CISO’s role is to:
(i)
develop and align IT security incident handling and response policies
and processes;
(ii)
under the Security Incident Response Plans for various scenarios, e.g.
Malware Infection and Data Loss/Leakage, upon being alerted, the
SingHealth CISO is responsible for crucial steps, including:
(A)
to review and classify the incident and notify the relevant
personnel, such as the SingHealth GCIO, SingHealth’s Corporate
Communication Department, the CSG, and the management of affected
SingHealth institutions (“Relevant Personnel”) within 30 minutes of
receiving the alert;
(B)
to prepare the incident report and provide periodic containment
and incident closure updates to the Relevant Personnel; and
(C)
for the post mortem, to finalise and submit the incident report to
the Relevant Personnel, and update the SOP for such incidents.
(b)
under the IR-SOP, the SingHealth CISO likewise has a direct line of reporting
to the SingHealth GCIO and the following responsibilities in a security incident:
(i)
accountable for the actions of the incident response team and incident
response functions;
28
(ii)
responsible for making regular, direct reports to the SingHealth GCIO,
the CSG and the management of SingHealth institutions;
79
(iii)
perform post-incident review of the incident to improve processes;
(iv)
coordinate with SingHealth’s Corporate Communication Department;
(v)
where applicable, report to law enforcement authorities; and
(vi)
endorse IT security incident handling and response processes.
As mentioned at paragraph 47 above, the SingHealth CISO has a key role in the
organisational structure of SingHealth with regards to IT security, alongside the SingHealth
GCIO. Under the IT security incident reporting processes developed and/or adopted by
SingHealth, the SingHealth CISO has substantial responsibilities including assessing,
monitoring, and coordinating responses to such incidents. He is accountable for the actions of
the incident response functions and is responsible for making regular, direct reports to the
SingHealth GCIO, SingHealth management and other relevant parties such as the CSG.
80
Cyber security incidents are investigated by the IHiS SIRT, which is led by the SIRM.
As the SingHealth CISO does not have any staff reporting under him, the SingHealth CISO
relies on the IHiS Delivery Group for their technical expertise on security and operational
matters. Under the IR-SOP, the SIRM is responsible for leading the effort of the SIRT and
coordinating input from the SIRT members. The SIRM reports to the SingHealth CISO. In
turn, the SingHealth CISO is accountable for the actions of the SIRT and is responsible for
escalating any issues to the SingHealth GCIO Office.
81
In this case, even though the SingHealth CISO was informed of suspicious activities
showing multiple failed attempts to log in to the SCM database using invalid credentials, or
accounts that had insufficient privileges in mid-June 2018, and the attack and remediation
efforts on 4 July 2018, the SingHealth CISO did not escalate these security events. Rather, he
wholly deferred to the SIRM’s assessment as to whether an incident was reportable (who
operated erroneously under the misapprehension that a cyber security incident should only be
escalated when it is “confirmed”) when he should have exercised independent judgement to
escalate the incident to the SingHealth GCIO. To his mind, at the time that he was informed of
these suspicious activities, they were only potential breaches and were not confirmed security
incidents as investigations were still underway. This does not comply with the IR-SOP. Besides
29
failing to exercise his independent judgement, it would appear that the SingHealth CISO also
failed to understand the significance of the information provided to him or to grasp the gravity
of the events that were happening.
82
In this respect, the findings of the COI are relevant. Having thoroughly examined the
incident response up to 10 July 2018, including the sequence of events and the state of mind of
the persons involved, the COI found that with regard to the incidents on 4 July 2018, the
SingHealth CISO’s response was “clearly lacking, and displayed an alarming lack of
concern”. 33 It was clear at that point that a CII system had potentially been breached. The
SingHealth CISO should have recognised it as a Category 1 reportable security incident and
taken steps to escalate the matter immediately but he did not do so. Instead, he “effectively
abdicated to [the SIRM] the responsibility of deciding whether to escalate the incident”.34
83
Furthermore, although the SingHealth CISO was accountable for the actions of the
SIRT under the IR-SOP, the COI found that the SingHealth CISO did not provide any
significant degree of leadership in sharing information, coordinating investigations and
remediation efforts across the various IHiS teams. Instead, the SingHealth CISO “did nothing,
and simply left [the SIRM] and the rest of the SIRT to their own devices in the investigation
of the matter and remediation efforts”.35
84
In the circumstances, the Commissioner finds that the SingHealth CISO failed to
discharge his duties. For the reasons set out at paragraphs 47 to 48 above, the SingHealth
CISO’s failure to comply with the incident reporting SOPs is a lapse that is attributable to
SingHealth. While the attacker had already gained access to the SCM network and SCM
database by that time, given the substantial volume of sensitive medical personal data held in
the SCM database, it is reasonable to expect that someone in the SingHealth CISO’s position,
with the experience and stipulated responsibilities under the IT security incident reporting
processes, should have been more familiar with the incident reporting standards, showed
greater initiative and exercised independent judgement to escalate the incident to the
SingHealth GCIO. However, the SingHealth CISO’s conduct in this case fell far short of what
a reasonable person would expect from someone in his position.
33
Public COI Report at [514].
Public COI Report at [514].
35
Public COI Report at [514].
34
30
85
In its representations, SingHealth referred to evidence of communications between the
SingHealth CISO and SIRT personnel between 13 June 2018 and 9 July 2018, which showed
that the SingHealth CISO raised queries and sought updates while the SIRT was conducting
investigations into the cyber security incident. Having reviewed the evidence submitted by
SingHealth, the Commissioner finds that the SingHealth CISO had not acted reasonably and
failed to discharge his responsibilities. Apart from raising a few questions with regard to the
suspicious activities when they first surfaced on 13 June 2018, the SingHealth CISO failed to
provide any input or guidance to the team or query whether the matter should be escalated.
Rather, the evidence showed that security incidents were handled without sufficient regard for
the importance of protecting personal data and discharging its responsibilities properly.
86
SingHealth’s representations also drew attention to an important point about the role of
the SingHealth CISO from an organisational structure perspective. Because all IT functions
and capabilities for the public healthcare sector, including the domain expertise and technical
capabilities required to investigate and respond to IT security incidents, are centralised in IHiS,
in effect, the SingHealth CISO and GCIO Office have little choice but to rely on the IHiS SMD
for their oversight on cybersecurity incidents.
87
The SingHealth GCIO is supported by the GCIO Office, which has a staff strength of
about 50 IHiS employees. Together, they are collectively responsible for 11 institutions, with
an estimated 30,000 employees, 400-odd IT systems and 350 to 500 IT projects. The
SingHealth CISO’s responsibilities in the GCIO Office are also relatively broad and include:
(a)
working on IT risk assessments;36
(b)
liaising with the GIA and IHiS Delivery Group for audit confirmation,
coordinating progress updates and following-up on any audit findings or observations;
(c)
being part of the security incident response and reporting process;37 and
36
The SingHealth CISO covers at least 4 risk assessments (enterprise risks, CII risks etc) each year from the IT
perspective. Each assessment would stretch over a few months depending on the complexity of the matter. The
SingHealth CISO would also follow up with the IHiS Delivery Group to check on the remediation /
implementation status.
37
The SingHealth CISO would liaise with the IHiS SMD for security event escalation about 3 to 4 times a month.
In such instances, other IHiS Delivery Group colleagues would inform the SingHealth CISO about potential
security issues. The SingHealth CISO would liaise with the SMD for follow up and remediation, and to also obtain
confirmation of remediation.
31
(d)
assisting the SingHealth GCIO in raising end-user awareness of IT security in
SingHealth.
88
Given the size and scale of SingHealth’s IT systems and network and the large
databases of sensitive medical personal data that SingHealth is responsible for, it is reasonable
to expect that considerable resources would have been devoted to the SingHealth CISO to carry
out operational and security oversight of SingHealth’s IT systems. However, the SingHealth
CISO (who is the only staff who has a portfolio specific to security) worked alone and had no
staff reporting under him. As a result of this arrangement, when the SingHealth CISO was on
medical leave between 20 June 2018 and 3 July 2018, there was no one other than the IHiS
SIRM to cover the SingHealth CISO’s duties and provide guidance on the investigation.
89
The SingHealth CISO’s failure to discharge his duties is also not a one-off incident that
would have been difficult to foresee.38 Rather, it revealed a systemic problem in the way the
SingHealth GCIO Office, specifically the SingHealth CISO function, is staffed. The
SingHealth CISO did not have the resources or the technical and IT security expertise for him
to properly fulfil his functions. For example, he should have had a team within SingHealth to
support him and provide adequate cover when he is away. It was evident from the SingHealth
CISO’s response to the Data Breach that the existing arrangements are inadequate. As this
organisational arrangement failed to meet the reasonable standards expected of an organisation
of SingHealth’s size, the Commissioner finds that SingHealth had failed to put in place
reasonable security arrangements to protect the personal data in its possession or under its
control from unauthorised access and copying.
90
In this regard, SingHealth made representations submitting that it relies on and requires
IHiS to ensure that the staff they deploy to carry out functions provided by IHiS, such as the
SingHealth GCIO and CISO, are appropriately qualified and trained to discharge their duties
and do so responsibly. SingHealth has no control over the organisational structure, how the
CISO and SIRT is set up, or how the SingHealth CISO has to rely on the investigation findings
and updates of the SIRT and other teams before making a report upwards or over manpower
allocation. It also emphasised that SingHealth shares an atypical relationship with IHiS which
goes beyond the typical relationship a vendor shares with a customer – IHiS is not an IT vendor
but the MOH-designated IT arm of the public healthcare sector.
38
See Re BHG (Singapore) Pte Ltd [2018] SGPDPC 16 at [25] – [28].
32
91
The Commissioner understands that this is the way the public healthcare sector is
structured and is sympathetic to the fact that SingHealth may have had limited ability to
influence the organisational structure. Nevertheless, insofar as SingHealth is an organisation
as defined in section 2(1) of the PDPA and does not fall within any of the category of
organisations that are excluded from data protection obligations under section 4(1) of the
PDPA, SingHealth is required to demonstrate that it has complied with the obligations under
the PDPA in the event of an investigation.39
92
In this regard, as emphasised in earlier decisions and at paragraph 54 above, it bears
repeating that SingHealth has the primary role and responsibility of ensuring the overall
protection of the personal data in its possession or under its control, even if it has engaged a
data intermediary that has a duty to protect the personal data. 40 The fact that SingHealth is
required to engage and rely on IHiS for all its IT services in accordance with MOH’s policy
does not absolve SingHealth from its responsibilities and obligations under the PDPA. Hence,
these representations cannot absolve SingHealth from liability but the Commissioner
recognises the exceptional set of circumstances in this case, and have taken them into
consideration as mitigating factors in the directions that the Commissioner has made.
93
SingHealth also submitted that the errors of individuals within organisations should not
in and of itself equate to a breach of section 24 of the PDPA unless the individual’s errors
points to a larger systemic issue within the organisation or an inadequacy of security
arrangements which led to or caused the mistakes, lapses or poor judgement.
94
The Commissioner agrees that as a matter of principle, an error or flaw in the
organisation’s systems and processes does not automatically mean that the organisation failed
to take reasonable security arrangements to protect personal data. As highlighted in AIG Asia
Pacific Insurance Pte Ltd [2018] SGPDPC 8 (at [27] and [28]), the Commissioner will consider
whether the organisation had implemented any security arrangements and if so, whether those
arrangements are reasonable:
“The fact that personal data had been disclosed to an unauthorised party
by an error or flaw in an organisation’s systems and processes does not
automatically mean that the organisation is liable under section 24 of the
39
Advisory Guidelines on Key Concepts in the PDPA at [6.3].
See Re The Management Corporation Strata Title Plan No. 3696 and Eagle Eye Security Management Services
Pte Ltd [2017] SGPDPC 11 at [16]; Re The Cellar Door Pte Ltd at [33] and [34].
40
33
PDPA for failing to take reasonable security arrangements to protect personal
data.
For the purposes of section 24, the Commissioner has to consider what
security arrangements (if any) an organisation had implemented to
prevent such unauthorised disclosure, and whether those arrangements
are reasonable.”
[Emphasis added.]
95
In the present case, as the Commissioner has found at paragraphs 87 to 89 above that
the SingHealth CISO’s failure to comply with the SOPs was emblematic of the inadequacy of
the security arrangements, the Commissioner has already taken this into consideration before
SingHealth submitted its representation.
96
Having carefully considered all the relevant facts and representations made by
SingHealth, the Commissioner finds that while SingHealth had maintained oversight over
IHiS’ provision of IT operations and security through various levels of board, management and
operational oversight and audit mechanisms, SingHealth had not taken sufficient security
measures to protect the personal data in the SCM database from the unauthorised access and
illegal copying. Accordingly, SingHealth has failed to meet its Protection Obligation and is in
breach of section 24 of the PDPA.
Whether IHiS complied with its Protection Obligation
97
At the outset, as the personal data in the SCM database was in IHiS’ possession, if not
under its control, IHiS was obliged to implement reasonable security arrangements to protect
the personal data in the SCM database.
98
It is accepted that the Data Breach was perpetrated by a skilled and sophisticated threat
actor. The level of discipline and planning demonstrated during the Data Breach are
characteristic of an APT actor, who used advanced methods that overcame enterprise security
measures:
(a)
the attacker took steps to conduct lateral movement and reconnaissance in order
to avoid breaching the existing detection mechanisms IHiS had put in place, and
could not have easily been noticed;
34
(b)
the attacker used highly customised malware that evaded SingHealth’s antivirus software and security defences and could not have been detected by
standard anti-malware solutions; and
(c)
the attacker employed numerous customised and modified open-source scripts
and tools that were manipulated to evade signature-based anti-virus detection.
99
Furthermore, the attacker deliberately and specifically targeted the SCM database and
took active steps to ensure that it would remain undetected until it had reached the SCM
database.
100
Hence, the key issue for determination is whether, despite the attacker’s sophisticated
and novel tactics, techniques and procedures, IHiS had done enough under section 24 of the
PDPA to prevent the unauthorised disclosure.
IHiS’ security arrangements at the material time
101
IHiS bases its security arrangements on the IT-SPS, 41 which is a policy based on
international information security standards. The IT-SPS covers all the essential IT security
domains, and prescribes the IT security policies, technical security standards and processes to
be implemented by all public healthcare institutions, including policies on user access control
and password management.
102
According to IHiS, it maintained a comprehensive IT security incident and response
framework, which consists of three measures – prevention, detection and response, for all
systems under its purview (including the SCM network during the time of the Data Breach). A
brief summary of the measures taken for the SCM network is as follows:
(a)
technical measures to prevent cyber security risks for:
(i)
end-point security relating to SingHealth and IHiS issued end-point
devices (e.g. workstations), such as the prohibition from use of personal
devices on the SCM network, the use of anti-virus and anti-malware
software;
41
The current version of the IT-SPS was issued in 2014.
35
(ii)
network security, such as creating network firewalls to segregate each
network segment so as to ensure that only authorised network traffic is
permitted to cross segments or zones;
(iii)
H-Cloud security by implementing measures such as web application
firewalls, physical separation of Virtual Data Centres, and Privileged
Access Management;
(iv)
database security, such as by running automated scripts which closely
monitor the SCM database to detect and raise alerts for performance
abnormalities, and keeping detailed access and audit logs which include
information such as failed login attempts; and
(v)
email security, such as anti-virus, anti-spam and attachment blocking
technology;
(b)
policies and processes to manage or otherwise deal with cyber security risks,
which include:
(i)
building awareness and educating staff on cyber security risks and IHiS’
IT policies, such as by conducting IT security training, sending regular
security alerts and conducting regular phishing exercises to create
awareness and promote vigilance;
(ii)
developing policies for users, such as the IT-SPS, the SingHealth
Acceptable Use Policy, and the SingHealth End User Computing,
Equipment and Network Policy and monitoring the compliance of users
to these policies; and
(iii)
conducting periodic reviews of the risks, controls and other measures of
the security systems flagged by the GIA;
(c)
detection measures to identify and pinpoint cyber security risks, such as
continuous real-time monitoring and periodic testing; and
(d)
risk assessment exercises carried out at various levels. For example, enterprise
risk assessment and CII risk assessment exercises were conducted annually by the
SingHealth CISO and overseen by the SingHealth GCIO.
36
103
At the material time, IHiS also had the following incident reporting processes and
frameworks in place to ensure that cyber security incidents are appropriately escalated and
addressed:
(a)
the SIRF, which translates the requirements of the National Cyber Incident
Response Framework42 into the context of the PHIs; and
(b)
the IR-SOP, which is IHiS’ Cluster-level standard operating procedure for
responding to security incidents.
104
Internally, IHiS also maintains a security incident classification framework identical to
that used by CSA, and has developed internal reporting timelines for security incidents to be
escalated to the CSG within IHiS.
105
Cyber security incidents are investigated by the IHiS SIRT. This team is led by the
SIRM, and comprises of IHiS’ Computer Emergency Response Team (“CERT”) and lead
personnel from IHiS Infrastructure Services and Application Services teams. It is the SIRM’s
responsibility to coordinate input from the SIRT members and to report to the SingHealth
CISO. The SingHealth CISO’s responsibility is to escalate any issues to the SingHealth GCIO.
106
As mentioned at paragraph 127 below, IHiS represented that all IHiS staff have been
briefed to alert the SIRT or the SMD when a non-security IHiS staff encounters a suspicious
incident. This was communicated to all IHiS staff through regular emails, circulars, wallpapers
and intranet banners. IHiS also represented that insofar as the non-security IHiS staff are
concerned, the general expectation was for them to report suspicious incidents to the SIRT or
SMD. Such staff are not expected to be familiar with the details of the IT-SPS and SIRF, though
these policies were made available via IHiS’ intranet.
107
Given that IHiS regularly handles large volumes of sensitive personal data on behalf of
the PHIs, the Commissioner finds that it is insufficient for IHiS to have merely informed its
non-security staff to alert the relevant personnel through emails, circulars, wallpapers and
intranet banners. These are effective in creating awareness amongst staff, but ineffective as
policies for a number of reasons. Emails and circulars are disseminated and therefore
42
The National Cyber Incident Response Framework is the framework for the reporting and management of cyber
incidents affecting CIIs.
37
ineffective as a resource for future reference; while wallpapers and intranet banners are
temporary and replaced eventually. The necessity of a set of written policies that are centrally
stored (eg on the intranet) and which can be consulted cannot be replaced by these other means
of creating awareness. IHiS had admitted that while the SIRF and IT-SPS were made available
via IHiS’ intranet, it had not developed any written policy on IT security incident reporting for
its non-security staff. Furthermore, regular training sessions and staff exercises should have
been conducted to ensure that all IHiS staff are familiar with the IT security incident reporting
and their role in recognising and reporting suspected IT security incidents. These trio of
awareness, training and written resource have to be deployed collectively for an effective staff
training programme.
108
As the Commissioner observed in Re SLF Green Maid Agency [2018] SGPDPC 27 (at
[13]), it is insufficient for organisations that handle large volumes of sensitive personal data to
merely disseminate guidelines and instructions. It is necessary for the organisation to have a
system of staff training and awareness:
“For a company like the Organisation that handles personal data of foreign
domestic workers and clients on a daily basis (eg passport and income
information), it is necessary for it to put in place a better system of staff
training and awareness given the sensitive nature of personal data that it
handles, as well as the volume. Merely disseminating guidelines and verbal
instructions is insufficient. As noted in Re Aviva Ltd, whilst there is no specific
distinction in the PDPA based on the sensitivity of the data, organisations are
to ensure that there are appropriate levels of security for data of varying levels
of sensitivity: [2018] PDP Digest 245 at [17]-[18]. NRIC and passport numbers
and financial information would generally be considered more sensitive: Re
Aviva Ltd at [17]. Structured and periodic training could have been
implemented to protect personal data.”
[Emphasis added.]
109
Furthermore, the Commissioner finds that by IHiS’ own admission, there were a
number of vulnerabilities and gaps in SingHealth’s network and in IHiS’ systems and processes
which were exploited by the attacker.
110
First, there were gaps in how IHiS’ policies and practices were implemented and
enforced, particularly in the management of the SGH Citrix Servers. IHiS asserts that its
management gave clear directions and instructions to its Citrix Team Lead in July 2017 to turn
on software firewall on the SGH Citrix Servers to block remote desktop protocol traffic from
end-user workstations. However, firewall rules were not implemented on the SGH Citrix
38
Servers that were used by the attacker in the course of the attack. IHiS’ staff failed to discharge
their assigned responsibilities. IHiS had relied on its staff to follow through on instructions and
the Citrix Team Lead to ensure that the instructions were complied with. In this case, however,
both the team responsible for placing the firewalls and their supervisor, the Citrix Team Lead,
failed to discharge their assigned responsibilities. To compound matters, IHiS updated the
SingHealth CISO that the software firewall rules had been implemented without having
verified this.
111
Second, there were insufficient steps taken to ensure that technical measures to protect
personal data were carried out as intended and according to IHiS’ own policies and practices.
Such insufficiencies were exploited by the attacker.
112
Weak local administrator passwords: under the IT-SPS, administrator accounts were
required to have a 15-character password. Notwithstanding, the local administrator account
that the attacker relied on in the course of the attack had an easily deduced password
(“P@ssw0rd”) with only eight characters. The account also had the same password since 2012
despite the requirement for it to be changed every three to six months. Although IHiS had
pushed its password policy and requirements through a Group Policy Object (“GPO”), which
should apply to all servers by default, it did not apply to servers which had activated a setting
to prevent the GPO from applying, such as the SGH Citrix Servers.43
113
In Re Orchard Turn Developments Pte Ltd [2017] SGPDPC 12, the Commissioner
highlighted (at [35]) the importance of managing admin account credentials, and took the view
that the implementation of an effective password expiry mechanism would have reduced the
potential adverse impact of an unauthorised use of the admin account password:
“On the facts, the Organisation failed to put in place any formal policy or
practice for the management of the admin account passwords to the EDM
server. Additionally, in terms of the Organisation’s handling of the admin
account credentials, the Commission identified two main areas of concern as
follows:
…
(b)
second, the password of the admin account to access the EDM
Application had not been changed since the roll out of the EDM
43
GPOs automate the implementation and enforcement of policies. They should apply to all servers by default,
except for groups of servers which have the ‘block policy inheritance’ setting applied. Applying ‘block policy
inheritance’ prevents group policies from being inherited from these servers. The SGH Citrix Servers were part
of a group of servers which had group policy inheritance applied. As such, the GPOs implementing the complex
password policy and policy for the deactivating of dormant accounts were not applied.
39
Application, i.e. from November 2014 until the time of the data breach
incident in December 2015. The implementation of an effective
password expiry mechanism would have reduced the potential
adverse impact of an unauthorised use of the admin account
password.”
[Emphasis added.]
114
Passwords in cleartext was found in scripts: the password of one of the local
administrator accounts relied by the attacker in the course of the attack was found in cleartext
in scripts on a SGH Citrix Server. This script was created by a Citrix Administrator despite
specific instructions in March 2017 and June 2017 from his supervisors to clean up the scripts
and avoid storing any passwords in the scripts in cleartext. Under the IT-SPS, passwords must
not be stored as cleartext on storage systems, audit logs or when transmitted over the network
but should configured to be encrypted, prompted or hashed.
115
In Re The Cellar Door Pte Ltd, the fact that login credentials were being transferred in
clear and unencrypted text, which exposed the hosting environment to potential compromise
should the credentials be intercepted, was found to be indicative of a poor level of security in
the system design and implementation:44
“In this case, the Respondents have failed to put such an all-round security in
place. The Commission has found several significant gaps in the security
measures implemented as follow:
…
(c) Login credentials were transferred in clear and unencrypted text. With
regard to the Site’s functionality, the Commission found that login
credentials (ie user logins and passwords) were being transferred in clear
and unencrypted text, indicative of a poor level of security in the system
design and implementation. This security vulnerability exposed the
hosting environment to potential compromise should the credentials be
intercepted. Cellar Door, as the organisation having the overall responsibility
and control over the design and functionalities of the Site, has the obligation
to ensure that, as part of the design and functionalities of the Site, provisions
were made for the security of the transmission of the login credentials. In its
original design, the Site did not have such a security feature to protect the
transmission of the login credentials – but this was prior to Section 24 of the
PDPA coming into force on 2 July 2014. However, subsequently when the
PDPA came into full effect on 2 July 2014, Cellar Door had the obligation to
review the design and functionalities of the Site, and put in place the necessary
security arrangements to comply with Section 24 of the PDPA. Yet, Cellar
Door had failed to do so, and the Site still lacked in the necessary measures to
secure the transmission of the login credentials.”
44
Re The Cellar Door Pte Ltd at [30].
40
[Emphasis added.]
116
Dormant accounts were not disabled: although IHiS’ policies required a periodic
review of unused or dormant accounts, the dormant local administrator account and service
account relied on by the attacker in the course of the attack were not detected and disabled by
IHiS because the automated process to detect and disable unused or dormant accounts only
extended to “domain” accounts instead of local accounts.45
117
In Re K Box Entertainment Group Pte Ltd and another [2016] SGPDPC 1, the
Commissioner found (at [26]) that the organisation had weak control over unused accounts.
The organisation failed to make reasonable security arrangements to protect the personal data
in its possession or under its control as it could have easily removed the unused accounts but it
had failed to do so. As a result, the unused administrative account with a weak password
(“admin”) remained in the system and put the personal data of the organisation’s members at
risk:
“In particular, the Commission has identified the following vulnerabilities in K
Box’s security arrangements which show how K Box failed to make reasonable
security arrangements to protect the members’ personal data:
(b) K Box had weak control over unused accounts, specifically, unused
accounts were not removed:
(i)
As stated at paragraph 14 above, as many as 36 accounts were removed
from the CMS system on 17 September 2014, which suggests that K
Box may not have had the practice of deleting the accounts of staff that
had left the company until it conducted the review on 17 September
2014. This is despite the fact that K Box was able to remove the unused
accounts within a day after the List had been disclosed online which
shows that K Box could have easily removed the unused CMS
accounts earlier but it had failed to do so;
(ii)
As a result of K Box and/or Finantech’s failure to promptly remove
unused accounts from the CMS system, the unused administrative
CMS account with the user name ‘admin’ and a weak password of
‘admin’ remained in the CMS for about one year after Mrs G had
left Finantech. This had put the personal data of K Box’s members
at risk because as noted at paragraph 20 above, Finantech itself had
hypothesised that someone could have hacked into K Box’s CMS using
this ‘admin’ user account and planted a malware control and command
centre to retrieve and export the members’ data;”
45
Domain accounts exist in the Microsoft Active Directory and are used to centrally manage servers and
workstations within an enterprise when these computing resources join to a domain. In contrast, local accounts
exist within each server or workstation and are not managed centrally.
41
[Emphasis added.]
118
Lack of controls to detect bulk querying behaviour in the SCM database or queries
being run from illegitimate client applications: even though the SCM database contained
sensitive personal data of millions of patients, there were no controls to detect bulk querying
behaviour. However, IHiS represented that the use of such database access monitoring software
or tools are not common in the healthcare sector and are generally only used in the security and
banking/finance sector. The Public COI Report corroborates this.46 As such, the Commissioner
accepts that it was not unreasonable that IHiS did not have such controls in place at the material
time.
119
That said, according to the Guide to Securing Personal Information issued by the Office
of the Australian Information Commissioner (“OAIC”),47 the use of proactive monitoring to
identify possible unauthorised access or disclosure may be a reasonable step to take particularly
if the organisation uses many systems or databases which hold large amounts of personal
information:
“Audit logs, audit trails and monitoring access
Unauthorised access of personal information can be detected by reviewing a
record of system activities, such as an audit log. Maintaining a chronological
record of system activities (by both internal and external users) is often the best
way for reviewing activity on a computer system to detect and investigate
privacy incidents. Audit logs should also be named using a clear naming
convention.
Audit trails are used to reconstruct and examine a sequence of activities on a
system that lead to a specific event, such as a privacy incident.
Access monitoring software that provides real time (or close to real time)
dynamic review of access activity can also be useful for detecting
unauthorised access to personal information. Use of proactive monitoring
to identify possible unauthorised access or disclosure, including any breach
that might amount to an eligible data breach for the purposes of the NDB
scheme, may be a reasonable step for you to take particularly if you use
many systems or databases which hold large amounts of personal
information.”
[Emphasis added.]
46
Public COI Report at [221].
Australia, OAIC, Guide to securing personal information: ‘Reasonable steps’ to protect personal information,
June
2018
.
47
42
120
In future, organisations that hold large amounts of personal data should consider
implementation of database access monitoring as one of the security measures for early
detection of unauthorised access or disclosure.
121
Lack of controls to prevent or monitor communications between the SGH Citrix Servers
and the SCM database at HDC: such controls were only implemented after the unauthorised
access from the SGH Citrix Servers to the SCM database was discovered. Even if it was
necessary to keep a connection between the SGH Citrix Servers and the SCM database at HDC,
such a connection should have been a protected connection and the servers using the connection
should have been placed behind a firewall (which they were not). 48
122
As highlighted in Re The Cellar Door Pte Ltd, a firewall is a fundamental measure that
should be in place for servers to protect against an array of external cyber threats: 49
“In this case, the Respondents have failed to put such an all-round security in
place. The Commission has found several significant gaps in the security
measures implemented as follow:
(a)
No server firewall installed. While there was an alleged “software
firewall configuration”, there was no firewall installed to protect GIW’s server
itself at the material time. A firewall is fundamental to the security of the
server to protect against an array of external cyber threats, and GIW has
the responsibility of ensuring that such a fundamental measure is in place
for its server. In this case, a dedicated firewall (beyond the alleged software
firewall configuration) protecting the server itself was only installed after
the data breach incident had taken place.”
[Emphasis added.]
123
Unpatched Microsoft Outlook email client maintained in the SingHealth IT
environment: the attacker was able to gain access to an unpatched end-user workstation running
a version of Outlook by using a publicly available hacking tool. On this issue, IHiS submitted
that it did not assess if an urgent roll-out to deploy the patch outside its usual patching cycle
was required given that the patches released by Microsoft were not categorised as “Critical”.
In the circumstances, the Commissioner accepts that it was not unreasonable for IHiS to not
have applied the patch at the material time. IHiS cannot be faulted for relying on the software
48
49
As found at paragraph 1100 above.
Re The Cellar Door Pte Ltd at [30].
43
provider’s assessment of the criticality and urgency for applying the steady stream of updates
and patches that are made available on a regular basis.
124
Notwithstanding, the Commissioner takes this opportunity to reiterate the importance
of putting in place maintenance processes to ensure regular security patching as a security
measure. Patching is one of the common tasks that all system owners are required to perform
in order to keep their security measures current against external threats:50
“First, the Organisation failed to ensure regular patching of the EDM
Application since its roll out in November 2014. The KPMG Reports
highlighted that the EDM Application was exposed to 24 known vulnerabilities
because it did not follow a regular patching cycle. The KPMG also noted that
the EDM server appeared to have been patched in an ad-hoc manner once
every two to four months. Patching is one of the common tasks that all
system owners have to perform in order to keep its security measures
current against external threats. The failure to patch the EDM Application
regularly was a failure to protect the EDM Application against known
system vulnerabilities.”
[Emphasis added.]
125
For completeness, even though the SingHealth GCIO had oversight over the IHiS
Delivery Group’s administration and implementation of policies, seeing as the above
vulnerabilities are basic operational tasks that fall within the type of day-to-day operations and
technical support, maintenance and monitoring, which is managed by the IHiS Delivery Group,
it was reasonable for SingHealth to have expected the IHiS Delivery Group to ensure that
reasonable security arrangements which were within the scope of IHiS’ responsibility were
carried out.
126
Third, vulnerabilities that had previously been flagged out to IHiS were either not
remediated or not addressed in time:
(a)
IHiS was aware of some vulnerabilities in the Citrix Servers and had required
its Citrix Team to fix the Citrix Servers to prevent exploitation. Although the Citrix
Servers in H-Cloud were fixed, the same fixes were not applied to the SGH Citrix
Servers, some of which were still in operation even though they were planned to be
decommissioned;
50
Re Orchard Turn Developments Pte Ltd at [38]. See also Re The Cellar Door Pte Ltd at [26].
44
(b)
the GIA Audit Report had flagged out most of the vulnerabilities highlighted in
paragraphs 110 to 123 above. Although IHiS had instructed its staff to address the
vulnerabilities stated in the report, IHiS staff responsible for the remediation did not
adequately track and ensure that all vulnerabilities were fully and properly remediated.
Remediation was stated to be done when it was not actually done or not done
thoroughly. No verification was conducted by IHiS line management. In particular,
there was evidence that both IHiS and the GIA thought the implementation of firewall
rules on the SGH Citrix Servers to block remote desktop protocol traffic from end-user
workstations as a remediation measure had been completed by 7 August 201751 even
though the team responsible for placing the firewall failed to discharge their assigned
responsibilities (as observed at paragraph 110 above); and
(c)
a coding vulnerability in the SCM application was flagged by a former IHiS
employee in 2014 in an email sent to a competitor of Allscripts. Although the fact that
there was a potential vulnerability in the SCM application was known to the
management at IHiS at the time, no action was taken to investigate or remedy the
vulnerability that he found. IHiS submitted that no action was taken at the time because
it took the view that the vulnerability was not an issue, especially in light of its existing
security measures and doubts over the credibility of their former employee. Allscripts
had also been alerted to the possibility of a vulnerability. Pertinently, the SCM
application is Allscripts’ product. Allscripts did not inform IHiS of this apparent coding
vulnerability and if this vulnerability will be remediated. It was not unreasonable for
IHiS to assume that Allscripts would have issued a patch as part of its regular software
support had they verified this apparent coding vulnerability. In view of this and the fact
that the attacker could have used a different method to exploit the coding vulnerability
in the SCM client application (that was likely also unknown to Allscripts at the time),
which allowed the attacker to retrieve the SCM database login credentials from the HCloud Citrix Server, the Commissioner accepts that it was not unreasonable for IHiS to
not have remedied the apparent coding vulnerability in the SCM application highlighted
in 2014.
51
At the SingHealth AC meeting held on 13 October 2017, GIA, which was in charge of ensuring that remediation
measures were implemented and checked upon, stated that the implementation status of past audit issues was
largely on track. According to the IHiS Delivery Group, the specific remediation measure of network segregation
enhancement had already been completed.
45
127
Fourth, even though IHiS represented that it had communicated to all IHiS non-security
staff through regular emails, circulars, wallpapers and intranet banners that the SIRT or SMD
should be alerted whenever they encounter a suspicious incident, the fact that IHiS employees
who first encountered the suspicious activity failed to escalate it to the SIRT, as opposed to
notifying an individual who happened to be part of the SIRT, suggests that the approach
adopted by IHiS (where there was no written IT security incident policy in place and no
training) was inadequate and IHiS non-security staff did not have a good understanding of the
importance and requirements for reporting IT security incidents. The SIRM also failed to
comply with the SIRF and IR-SOP.52
128
In January 2018, when the SIRM was alerted to call-backs to a suspicious foreign IP
address from the workstations compromised by the attacker, he did not take steps to block that
IP address for the entire SCM network, or initiate any investigations, which could have
identified and contained the compromised workstations before they were eventually used in
the attack, including a compromised workstation which was eventually used as a means of
exfiltration (“January 2018 incident”). The SIRM failed to escalate the January 2018 incident
as he took the position (which IHiS did not endorse) that this was not a reportable incident as
it pertained to a malware infection that had been detected and cleaned without network
propagation. In fact, the SIRM did not make any effort to determine whether there had been
any such network propagation.
129
From mid-June 2018, when IHiS staff had identified multiple failed login attempts to
the SCM database originating from the compromised SGH Citrix Servers, using invalid
credentials, or accounts that had insufficient privileges, the SIRM failed to escalate or take any
additional steps to manage the vulnerabilities, as he was labouring under the misapprehension
that a cybersecurity incident should only be escalated when it is “confirmed”. The SIRM failed
to appreciate that timely incident reporting, in accordance with the relevant IHiS policies and
standards on incident reporting, could enable more resources to be deployed to better
investigate and contain a cybersecurity incident.53
52
In this regard, the Public COI Report also highlighted (at [926] and [927]) that even within the IHiS SMD, the
processes for reporting observations were inconsistent and unclear. There was no established procedure for how
IHiS staff should escalate a matter internally or how to report a security incident to the SingHealth CISO or the
SingHealth GCIO. This resulted in confusion and consequent delays in response.
53
The COI also found at ([433] and [593]) that he had delayed reporting because he felt that additional pressure
would be put on him and his team once the situation became known to management. The evidence also suggested
46
130
As highlighted in Re National University of Singapore [2017] SGPDPC 5, data
protection policies and practices are only effective when staff understand and are familiar with
the policy and put its security procedures in practice:54
“In another case, the Office of the Privacy Commissioner of Canada (“OPC”)
explained that whilst security policies and procedures are essential, they are
not in themselves sufficient to protect personal information; the effectiveness
of security safeguards depends on the organisation’s:
“[d]iligent and consistent execution of security policies and
procedures [which] depends to a large extent on ongoing privacy
training of staff and management, so as to foster and maintain a
high organizational awareness of informational security concerns”.
In a separate investigation, the OPC further clarified its position and stated
that security policies and practices are only effective when “properly and
consistently implemented and followed by employees”.”
[Emphasis added.]
131
However, it was apparent from the response of a number of IHiS staff and in particular,
the SIRM’s response, that the communications and training provided to them was inadequate
for them to fully comprehend and internalise the existing framework and SOPs.
132
To be clear, the PDPA does not require organisations to provide an absolute guarantee
for the protection of the personal data in its possession or under its control. As the
Commissioner clarified in Re Tiger Airways & Ors. [2017] SGPDPC 6 (at [17]): 55
“In the context of section 24, this means that an organisation is not required
to provide an absolute guarantee for the protection of personal data in its
possession, but that it must make such security arrangements as a
reasonable person would consider appropriate, given the nature of the
personal data involved and the particular circumstances of that
organisation.”
[Emphasis added.]
133
Even so, in consideration of the facts and circumstances surrounding the Data Breach,
the Commissioner finds that IHiS had not done what a reasonable person would consider
appropriate to prevent the unauthorised exfiltration of the personal data in the SCM database.
that the reluctance to escalate potential security incidents may have come from a belief that it would not reflect
well in the eyes of the organisation if the matter turned out to be a false alarm.
54
Re National University of Singapore at [24] and [25].
55
See also Re BHG at [25].
47
In view of the very large volume of sensitive medical personal data managed and processed by
IHiS on behalf of SingHealth, it is reasonable to expect IHiS to accord SingHealth’s IT systems
and, in particular, the SCM database a higher standard of protection. However, by IHiS’ own
admission, the weaknesses, lapses and failures on the part of some IHiS personnel to comply
with IHiS’ security framework showed that the administrative or organisational security
measures that IHiS had in place at the time of the Data Breach were inadequate.
134
Accordingly, even though IHiS had in place a number of security arrangements to
protect the personal data in its possession or under its control, the Commissioner finds that
IHiS had not taken sufficient security steps or arrangements to protect the personal data in the
SCM database from unauthorised access, collection, use, disclosure and copying.
Directions
135
Having considered the evidence obtained by the Commission during its investigation
and the representations of the parties, the Commissioner is satisfied that both SingHealth and
IHiS have breached section 24 of the PDPA. The Commissioner is empowered under section
29 of the PDPA to give such directions as he deems fit to ensure compliance with the PDPA.
136
The Commissioner hereby directs SingHealth to pay a financial penalty of $250,000
within 30 days of the issuance of this direction, failing which interest at the rate specified in
the Rules of Court in respect of judgment debts shall accrue and be payable on the outstanding
amount of such financial penalty until the financial penalty is paid in full.
137
The Commissioner hereby directs IHiS to pay a financial penalty of $750,000 within
30 days of the issuance of this direction, failing which interest at the rate specified in the Rules
of Court in respect of judgment debts shall accrue and be payable on the outstanding amount
of such financial penalty until the financial penalty is paid in full.
138
The financial penalties imposed against the two Organisations are individually the
highest and second highest financial penalty amounts imposed by the Commission to date. This
is appropriate given the circumstances.
139
First, this is the largest data breach suffered by any organisation in Singapore with the
number of affected individuals amounting to almost 1.5 million unique individuals. Second,
48
while the attacker managed to exfiltrate the personal data of almost 1.5 million unique
individuals, the SCM database which was attacked contained patient data belonging to over
5.01 million unique individuals whose personal data was put at risk. This increases the
seriousness of IHiS and SingHealth’s data security inadequacies. The patient data held in the
SCM database contained highly sensitive and confidential personal data including clinical
episode information, clinical documentation, patient diagnosis and health issues and Dispensed
Medication Records. It is not difficult to imagine the potential embarrassment that a patient
may suffer if such sensitive information about the patient and the patient’s health concerns
were made known to all and sundry. As such, it is critical for the Organisations to protect the
security and confidentiality of such medical records. Third, the attacker exfiltrated the
Dispensed Medication Records of 159,000 unique individuals together with the Patient
Particulars. From the Dispensed Medication Records, one may be able to deduce the condition
for which a patient was being treated. This may include serious or socially embarrassing
illnesses.
SingHealth’s Representations
140
SingHealth made representations for a reduction in the quantum of the financial penalty
as set out in the preliminary Decision on the basis that the Commission should factor in the
principle of proportionality in deciding the appropriate financial quantum and the extent to
which SingHealth had failed to discharge its obligations. In this regard, SingHealth represented
that they did have in place various security measures which were reasonable to have oversight
of its data intermediary except in relation to the lapses of an individual.
141
The fact that an organisation has adequately implemented other protection policies will
not operate to absolve or mitigate liability for breaches. In Re Funding Societies Pte Ltd [2018]
SGPDPC 29, the organisation pleaded in mitigation that it had in place “a framework of
security arrangements, such as a risk management framework, an information security policy
and training and audits of its policies and procedures.” In response, the Commissioner stated:56
“Neither should the fact that the Organisation continuously assessed its
compliance with the obligations set out in the PDPA and that it had the
necessary frameworks in place mitigatory as these were the standard of
conduct expected for compliance. These are not activities or measures which
56
Re Funding Societies Pte Ltd at [32] and [33].
49
go beyond the standard of protection required by the PDPA and as such is not
a mitigating factor.”
[Emphasis added.]
142
Even in cases where both the organisation and data intermediary have been found to be
in breach of the PDPA, the Commissioner will assess each party’s breach on its own merits
and circumstances. In calculating the quantum of the financial penalty to be imposed, the
Commissioner takes an objective approach in assessing the facts and circumstances of the
contravention and how a reasonable organisation or data intermediary should have behaved in
the circumstances. In this regard, as explained in the Advisory Guidelines on Enforcement of
the Data Protection Provisions (issued 21 April 2016) (at [25.2]), one of the factors that the
Commission may consider to be an aggravating factor includes:
“the organisation is in the business of handling large volume of sensitive
personal data, the disclosure of which may cause exceptional damage,
injury or hardship to a person (such as medical or financial data), but
failed to put in place adequate safeguards proportional to the harm that
might be caused by disclosure of that personal data.”
[Emphasis added.]
143
Nevertheless, in assessing the breach and determining the directions to be imposed on
SingHealth, the Commissioner took into account the following mitigating factors:
(a)
SingHealth voluntarily and unequivocally admitted to the facts, accepted the
Commission’s findings set out in this Decision and had agreed to cooperate with the
Commission to expedite the Investigation and the determination of liability for each of
the parties and issue any directions that the Commission deems fit;
(b)
SingHealth was constrained, in that, as a matter of policy, all IT functions and
capabilities for the public healthcare sector (including the proposed structure and
resourcing for the SingHealth GCIO Office) are centralised in IHiS;
(c)
SingHealth was cooperative during the Investigation;
(d)
SingHealth took immediate effective remedial action following the Data
Breach; and
50
(e)
SingHealth was as much a victim of the malicious actions of a skilled and
sophisticated threat actor who used advanced methods that overcame enterprise security
measures as the individuals whose personal data was illegally accessed and copied.
144
Similarly, in assessing the breach and determining the directions to be imposed on IHiS,
the Commissioner took into account the following mitigating factors:
(a)
IHiS voluntarily and unequivocally admitted to liability and had agreed to
cooperate with the Commission to expedite the Investigation and the determination of
liability for each of the parties and issue any directions that the Commission deems fit;
(b)
IHiS was cooperative during the Investigation;
(c)
IHiS took immediate effective remedial action following the Data Breach; and
(d)
IHiS was as much a victim of the malicious actions of a skilled and sophisticated
threat actor who used advanced methods that overcame enterprise security measures as
the individuals whose personal data was illegally accessed and copied.
145
Without the above mitigating factors, the Commissioner would have imposed the
maximum financial penalty allowed under the PDPA against IHiS and a financial penalty at a
significantly higher quantum against SingHealth.
146
The Commissioner has not set out any further directions for IHiS and SingHealth given
the remediation measures already put in place.
YEONG ZEE KIN
DEPUTY COMMISSIONER
FOR COMMISSIONER FOR PERSONAL DATA PROTECTION
51
","Financial Penalty, Financial Penalty",529077b825a4378024230d1f85b9a927e210cc55,"[""pdf-content"",""timestamp"",""decision"",""pdf-url"",""tags"",""nature"",""url"",""title"",""date"",""description""]"