Guide To Developing A Data Protection Management Programme (Aug 2023)
Guide To Developing A Data Protection Management Programme (Aug 2023)
DEVELOPING A
DATA PROTECTION
MANAGEMENT
PROGRAMME
CONTENTS
INTRODUCTION .................................................................................................... 4
What is a DPMP? ..................................................................................................... 5
Why Do You Need a DPMP? .................................................................................. 6
INTRODUCTION
GUIDE TO DEVELOPING A DATA PROTECTION MANAGEMENT PROGRAMME 5
WHAT IS A DPMP?
The DPMP is a four-step programme to establish a robust data
protection infrastructure:
1
STEP 1:
GOVERNANCE AND
RISK ASSESSMENT
Establishing a governance
structure to define values and
STEP 4: MAINTENANCE identify risks with
Detailing steps to keep organisational leadership
data protection policy and
processes up to date
4 2
STEP 2:
POLICY AND PRACTICES
Developing a data
protection policy and
STEP 3: PROCESSES
3
data protection practices
Designing processes to
operationalise policy
1
Organisations should note that adopting the suggestions in this guide does not mean that it would be in compliance with
the PDPA. An organisation should consider whether the suggestions in this guide could be adapted for its specific circumstances.
6 GUIDE TO DEVELOPING A DATA PROTECTION MANAGEMENT PROGRAMME
PART I:
GOVERNANCE AND
RISK ASSESSMENT
8 GUIDE TO DEVELOPING A DATA PROTECTION MANAGEMENT PROGRAMME
Data protection is a topic that should have board and senior management
level oversight. An appropriate governance structure should be established
at both board and senior management levels. It is perfectly fine to
integrate data protection into existing governance structures within
2
Refer to the DPO Competency Framework and Training Roadmap.
10 GUIDE TO DEVELOPING A DATA PROTECTION MANAGEMENT PROGRAMME
In particular, staff that handle personal data (e.g. sales), or are responsible
for implementing personal data protection measures (e.g. IT), would
need to be diligent in adhering to the organisation’s data protection
policies and processes. It would thus be important for them to receive
and undergo more thorough data protection training.
RISK ASSESSMENT
Understanding Risks
3
Refer to Board Risk Committee Guide developed by the Singapore Institute of Directors for more information on the Enterprise
Risk Management framework.
4
Refer to Case Study 3B-5 in the Board Risk Committee Guide developed by the Singapore Institute of Directors on how
organisations can mitigate data protection risks.
GUIDE TO DEVELOPING A DATA PROTECTION MANAGEMENT PROGRAMME 13
PART II:
POLICY AND
PRACTICES
GUIDE TO DEVELOPING A DATA PROTECTION MANAGEMENT PROGRAMME 15
Applicable to
Questions Internal External
Stakeholders Parties
General
a. What personal dataset does this policy apply to?
• •
b. What is the purpose of the policy?
c. How often is this policy reviewed? •
d. How is the policy aligned with my organisation’s values
and business code of conduct? • •
e. Is this policy transparent?
People
f. Who is the intended audience of the policy?
g. Who does the policy apply to? Are their roles and
responsibilities clear and comprehensive? • •
h. Who is the policy owner?
i. Who approves the policy?
16 GUIDE TO DEVELOPING A DATA PROTECTION MANAGEMENT PROGRAMME
Applicable To
Question Internal External
Stakeholders Parties
Process
j. Whose personal data is handled?
k. What is the purpose of collecting the personal data?
l. What types of personal data are handled (e.g. name,
NRIC, birth date, health details)?
m. How are queries, feedback, disputes and requests handled?
n. Which third party organisations is the personal data
shared with, if any? • •
o. How does the organisation ensure that third party
organisations protect data in accordance with the
PDPA requirements?
p. How are the data protection and Do Not Call ("DNC")
provisions of the PDPA complied with throughout the
data life cycle?5
q. How is the personal data protected? •
r. How long should the personal data be kept and how
should it be disposed at the end of its life cycle?
s. How should data incidents6 and data breaches be handled, • •
including mandatory data breach notifications to the PDPC
and affected individuals?
t. When are DPIAs conducted, and on which systems or
for which processes? •
u. How should policy exceptions be handled?
5
This segment may be expanded to elaborate on how the organisation complies with the PDPA.
6
Data incidents refer to a potential, but unconfirmed, breach of the Protection Obligation under the PDPA.
GUIDE TO DEVELOPING A DATA PROTECTION MANAGEMENT PROGRAMME 17
Example:
Organisation ABC wishes to establish an internal policy on handling access requests and
considers the following points when developing the policy:
Establishing and • How does ABC intend to receive all access requests7? (e.g. Is there
making access a standard access request form that the applicant may use? In the
request channels absence of any access request forms provided by the organisation,
available what information is required from the applicant for ABC to proceed
with the access request?)
• What are the available channels for the applicant to submit the
access request? (e.g. via email, post or any other avenue specified
by the organisation)
Obtaining • What specific information would ABC require to search for and
specific locate the requested personal data in a timely manner? (e.g.
information type of personal data requested, date and time the personal
data was collected)
Charging access • Would ABC be charging a fee8 to process the access request?
fees If so, are the fees provided in writing to the applicant9?
• If ABC intends to charge a fee for the access request that is
higher than originally estimated, how would ABC communicate
the higher fees in writing to the applicant?
• How would ABC compute the access fee10 in a way that
accurately reflects the time and effort required to respond to
the access request?
7
Under PDP Regulation 3(1), a request to an organisation must be made in writing and shall include sufficient detail to
enable the organisation, with a reasonable effort, to identify (a) the applicant making the request; (b) in relation to a
request under section 21(1) of the Act, the personal data and use and disclosure information requested by the applicant;
and (c) in relation to a request under section 22 of the Act, the correction requested by the applicant. (2) A request must
be sent to the organisation, (a) in accordance with section 48A of the Interpretation Act (Cap.1); (b) by sending it to the
organisation’s DPO in accordance with the business contact information provided under section 11(5) of the Act; or (c)
in such other manner as is acceptable to the organisation.
8
Under PDP Regulation 7(1) subject to section 28 of the Act, an organisation may charge an applicant who makes a
request to it under section 21(1) of the Act a reasonable fee for services provided to the applicant to enable the
organisation to respond to the applicant’s request. (2) An organisation must not charge a fee to respond to the applicant’s
request under section 21(1) of the Act unless the organisation has (a) provided the applicant with a written estimate of
the fee; and (b) if the organisation wishes to charge a fee that is higher than the written estimate provided under sub-
paragraph (a), notified the applicant in writing of the higher fee. Organisations may charge the individual a reasonable
fee to recover any incremental costs of responding to his access request. However, under the PDPA, on application of
a complainant, the Commission may review a fee required from the complainant by an organisation in relation to a
request by the complainant under section 21 or 22. Upon completion of the review, the Commission may confirm, reduce
or disallow a fee, or direct the organisation to make a refund to the complainant.
9
Organisations may refuse to provide access to the personal data requested until the individual agrees to pay the relevant fee.
10
The PDPA does not prescribe a standard fee or range of fees applicable to access request.
18 GUIDE TO DEVELOPING A DATA PROTECTION MANAGEMENT PROGRAMME
Determining • How long would ABC take to provide access to the requested
response personal data11? How would the individual be informed if ABC
timeframe is unable to provide access within 30 days?
Keeping records • What is ABC’s documentation process for recording all access
of access requests received and processed? Documentation may also
requests include all access requests received but not processed due to
an applicable exception14.
• What is ABC’s retention policy for keeping records of access
requests received?
These are some details that an organisation developing a specific policy should consider
and are not meant to be exhaustive. For more information on handling access requests,
please refer to the PDPC’s Advisory Guidelines on Key Concepts in the Personal Data
Protection Act (Chapter 15) and Guide to Handling Access Requests.
11
Organisations must provide access to the requested personal data as soon as reasonably possible.
12
Please refer to section 21 of the PDPA, Part II of the Personal Data Protection Regulations 2014 and Advisory Guidelines
on Key Concepts in the PDPA for more information on exceptions and prohibitions under the Access Obligation.
13
Organisations need not redact personal data of other individuals if the data is considered part of any user activity data
about, or any user-provided data from, the individual who made the request.
14
For more information, please refer to Chapter 15 of the Advisory Guidelines on Key Concepts in the PDPA.
GUIDE TO DEVELOPING A DATA PROTECTION MANAGEMENT PROGRAMME 19
Designing data protection from the start can help organisations to (a)
identify data protection issues early, (b) increase awareness of data protection
across the organisation and (c) meet the data protection obligations under
the PDPA. Organisations may wish to adapt the DPbD principles in the
PDPC’s Guide to Data Protection by Design for ICT Systems throughout
their project design, development and operational life cycle.
20 GUIDE TO DEVELOPING A DATA PROTECTION MANAGEMENT PROGRAMME
COMMUNICATE POLICIES TO
CUSTOMERS (E.G. CLIENTS,
DONORS, OTHER ORGANISATIONS)
Customers’ trust is crucial and organisations should implement personal
data protection initiatives to demonstrate accountability. Organisations
should thus ensure that their data protection policies are communicated
clearly and upfront. Useful initiatives include:
PART III:
PROCESSES
GUIDE TO DEVELOPING A DATA PROTECTION MANAGEMENT PROGRAMME 23
The data inventory map and data flow diagram should also include
information on the business purposes for collection, use and disclosure
of personal data, the individuals and third parties who handle personal
data under the organisation’s possession or control, as well as the
classification of the data to manage user access. They should also deal
with when and how the organisation should dispose of or anonymise
the personal data for long-term archival. As good practice, it is important
that employees and third parties access personal data on a need-to-know
basis. Different sets of data may be accessed by different parties.
24 GUIDE TO DEVELOPING A DATA PROTECTION MANAGEMENT PROGRAMME
The tools described in this section will help with identification and management
of risks, and can be translated into controls. These tools may need to be
updated and reviewed periodically, and when conducting a DPIA.
Tool Description
Tool Description
Data Flow Illustration The Data Flow Illustration diagram helps organisations
visualise the flow of data within their organisation.
Personal Data Asset The Docukit Data Protection App helps DPOs track how
Inventory Tool (Docukit personal data is being managed within their organisations,
Data Protection App) and therefore manage the data protection risks in a more
effective and productive manner.
OneTrust Software for The OneTrust Software for PDPA Compliance provides
PDPA Compliance organisations with tools to build their Data Inventory Map
(“DIM”) and conduct DPIA to better manage their
compliance with the PDPA.
Based on the risks and gaps identified above, organisations can then
put in place relevant system-based and process controls and measures
to address the risks and gaps. For example, the data inventory map,
data flow diagram and risk register help organisations to identify where
sensitive data is stored in the systems. This helps organisations to
determine the level of IT security protection to put in place and the
types of users/applications (internal and external) which can access
such systems and data. Appropriate process controls can also be
implemented to approve, review and manage the access rights of these
users and applications. From the consent register, organisations will
be able to identify the types of personal data that can be used for
different purposes and put in place relevant approval processes for the
use of these data.
26 GUIDE TO DEVELOPING A DATA PROTECTION MANAGEMENT PROGRAMME
Controls adopted should correspond to the risk level and nature of the
data, and should include both digital and non-digital solutions (e.g.
encryption and access controls).
For more information, please refer to the the PDPC’s Guide to Data
Protection by Design for ICT Systems.
The organisation’s DPO may also document data incidents and data
breaches in an incident record log. Refer to the end of this chapter for
an example of an incident record log. As good practice, organisations
should also actively engage their data intermediaries and delineate the
responsibilities of reporting, investigating and taking remedial actions.
Organisations must also notify the PDPC and affected individuals when
they have credible grounds to believe that a data breach has occurred.
They should conduct this assessment on whether it is a notifiable data
breach within 30 calendar days. The steps taken in assessing the data
breach should be documented to demonstrate that the organisation
has been reasonable and expeditious in doing so.
For more information, please refer to the Guide on Managing and Notifying
Data Breaches Under the PDPA and Guide on Active Enforcement.
29
PART IV:
MAINTENANCE
30 GUIDE TO DEVELOPING A DATA PROTECTION MANAGEMENT PROGRAMME
FREQUENCY OF REVIEW
Changes in environment may require revisions to data protection
policies and processes. Organisations would have to decide whether
the revisions should be applied immediately (ad-hoc) or during a
periodic review of the DPMP. The table shows examples of circumstances
that may prompt either immediate or periodic changes.
Audit
Review by Getting the DPMP validated by an external party helps ensure that the
external organisation’s data protection policies and practices are robust and
party comparable to industry standards.
Senior Management
(B) A group of personnel appointed (with support from the Audit and Legal departments)
Senior Management
Supported by (optional)
Department Representative
Responsible for personal data protection measures and awareness in respective
departments
Communications
Responsible for external communications on matters relating to the PDPA
Incident Response
Responsible for handling complaints and incidents related to the PDPA
GUIDE TO DEVELOPING A DATA PROTECTION MANAGEMENT PROGRAMME 35
DPOs can refer to the suggested training types in the following table to develop their training
and communication initiatives.
14
A risk register is a tool for documenting risks and actions to manage each risk. It provides an organisation with a list of
identified risk to assist in risk management.
36 GUIDE TO DEVELOPING A DATA PROTECTION MANAGEMENT PROGRAMME
For more information on help for organisations, please refer to the PDPC’s website.
38 GUIDE TO DEVELOPING A DATA PROTECTION MANAGEMENT PROGRAMME
e
trativ
s
Illu
Pros Cons
ive
strat
Illu
Pros Cons
BROUGHT TO YOU BY
The contents of this publication are protected by copyright, trademark or other forms
of proprietary rights and may not be reproduced, republished or transmitted in any
form or by any means, in whole or in part, without written permission.