PDPA 2010:PDP in the Digital World

advertisement
PERSONAL DATA PROTECTION ACT 2010
TO COMPLY IS TO KNOW
Professor Abu Bakar Munir
Faculty of Law, University of Malaya
&
Associate Professor Siti Hajar Mohd Yasin
Faculty of Law, Universiti Teknologi MARA
SEMINAR KESEDARAN AKTA PERLINDUNGAN DATA PERIBADI
9 February 2012
Kuala Lumpur
1
Some of our books on ICT Law
In Print
Cyber Law:
Policies and
Challenges
Butterworths Asia
(1999)
Privacy and
Data Protection
Sweet & Maxwell
(2002)
Internet Banking:
Law and Practice
LexisNexis UK
(2004)
Information &
Communication
Technology Law
Legal & Regulatory
Challenges
Thomson Reuters
(2010)
2
Please
read this book.
THE WORLD’S GREATEST NEWSPAPER 1843-2011
4
Reality Check

The efficiency of computer network has caused more and more personal data be
stored in computers

The




Users globally send around 47 billion (non-spam) emails and submits 95 millions
tweets

Each month users share about 30 billion pieces of contents on facebook

Personal data is the new oil of the Internet and the new currency of the digital
world

Greater concerns about privacy invasion
world has reaped the benefits of the fast flow information and personal data:
Ten years ago – gigabytes of data,
Five years ago – terabytes of data,
Today, petabytes of data, are being transferred and stored on daily basis.
6
7
8
Types of Privacy





The right to be left alone
Bodily privacy
Privacy of communications
Territorial privacy
Informational privacy
Privacy as Human Rights
Article 12 Universal Declaration on Human Rights 1948
No one shall be subjected to arbitrary interference with his privacy,
family, home or correspondence, nor to attacks upon his honour and
reputation. Everyone has the right to the protection of the law against
such interference or attacks.
Some Other Instruments






Article 17, International Covenant on Civil and Political Rights 1966
Article 16, Conventions on the Rights of the Child 1989
Article 8, Convention for the Protection of Human Rights and
Fundamental Freedoms 1950
Article 18, OIC Cairo Declaration on Human Rights in Islam 1990
Article 4.3, Declaration of Principles on Freedom of Expression in Africa
2002
Article 5, American Declaration of the Rights and Duties of Man
Informational Privacy
The rights of an individual to have
control over his personal information
Informational Privacy = Personal
Data Protection
Why countries protect personal data?




International obligation
Competitiveness
Human right
International influence
12
Why Protect Personal Data?
What Customers Say…
 Nearly 90% of online consumers want the right to control
how their personal information is used after it is collected
(Forrester Research 2003)
 87 % of Americans are concern about the security of their
information on the Internet
(Zogby International 2010)
 61 % of adult Americans said that they were extremely
concerned about the privacy of their personal information
when buying online
(University of Southern California 2007)
Cont……..
 Our research shows that 80% of our customer would
walk away if we mishandled their information
(Royal Bank of Canada 2003)
 Concerns about the use of personal information led
64% of respondents to decide not to purchase from a
company
(Privacy and American 2005)
 67% respondents decided not to register at a website
or shop online because they found privacy policy to be
too complicated or unclear
(Privacy and American 2005)
Malaysian Consumers Say…..
 75.3% respondents say that they were “somehow
concerned” and “very concerned” with their personal
privacy even when not online
 94.2 % respondents felt that their personal privacy
might be threatened when using the Internet
 50.8 % of non Internet Banking customers have not
migrated to the online services mainly due to security,
trust and privacy concerns
(Muniruddeen Lallmahamood 2007/2008)
Therefore….
 Trust and risk are major determinants
towards purchasing and of intention to
purchase
 Trust is difficult to gain but easy to lose
 Consumers are concern about their privacy
 Consumers are very concern about privacy
when transact online
16
GOOD PRIVACY, GOOD BUSINESS
“Privacy is good for
business”
Harriet Pearson
IBM Chief Privacy Officer
17
How?
Potential Risks
 Breaches of data protection law
 Damage to organization’s reputation and brand
 Physical, psychological and economic harm to
customers
 Financial losses associated with deterioration in
quality and integrity of personal data due to
customers’ distrusts
 Loss of market share or a drop in stock prizes
due to negative publicity/ failure or delay in the
implementation of new product / service due to
privacy concern
18
Benefits
 More positive organizational image and
significant edge over the competition
 Business development via expansion into
jurisdiction requiring clear privacy standard
 Enhanced data quality and integrity
 Fostering better customer service and more
strategic business decision making
 Enhanced customer trusts and loyalty
19
20
21
(Reuters) - HSBC Holdings, Europe's biggest bank, was fined 3.2
million pounds on Wednesday for information security
breaches, the biggest fine the country's financial regulator has
ever imposed for data security lapses. (2007, 2008)
22
Insurance giant Norwich
Union has been fined
£1.26 million by the
Financial Services
Authority (FSA) for security
systems failures (2007)
23
DATA PROTECTION COMMISSIONER’S OFFICE
Press Release
For immediate release
Date: 13 November 2012
2007
XYZ SDN. BERHAD IS IN BREACH OF THE PERSONAL DATA
PROTECTION ACT 2010
The Data Protection Commissioner's Office (DPCO) has found that the XYZ SDN.
BERHAD is in beach of the Personal Data Protection Act 2010 following an
investigation into the complaint of ………………………………………………
………AB H………..
DATA PROTECTION COMMISSIONER
24
International Instruments






OECD Guidelines 1980
Council of Europe Convention 1981
European Directive 1995
APEC Privacy Framework 2004
Madrid Resolution 2009
EU Proposed Directive (25 Jan 2012)
25
OECD Guidelines 1980 (8 Principles)








Collection limitation
Data Quality
Purpose Specification
Use Limitation
Security
Openness
Individual Participation
Accountability
26
Council of Europe Convention 1981
Personal Data shall be:
 obtained fairly and lawfully
 stored for specified and legitimate purposes and not
used in a way incompatible with those purposes
 adequate, relevant and not excessive
 accurate and, where necessary kept up to date
 preserved in a form which permits identification of the
data subjects for no longer than is required for the
purpose for which those data are stored
27
European Directive 1995
Personal data must be;
 Processed fairly and lawfully
 Collected for specified, explicit and legitimate purposes
and not further processed in a way incompatible with
those purposes
 adequate, relevant and not excessive
 accurate and, where necessary kept up to date
28
APEC Privacy Framework 2004 (9 Principles)









Preventing harm
Notice
Collection Limitation
Uses of personal information
Choice
Integrity
Security safeguards
Access and correction
accountability
29
Madrid Resolution 2009 (6 Principles)






Lawfulness and fairness
Purpose specification
Proportionality
Data quality
Openness
Accountability
30
EU Proposed Directive
On Data Protection with regard to the processing of
personal data by competent authorities for the
purposes of prevention, investigation, detection or
prosecution of criminal offences or the executions of
criminal penalties, and the fee movement of such
data.


Known as The Police and Criminal Justice Data
Protection Directive
January 25, 2012, the European Commission
released a proposed data protection regulation to
replace the current EU Data Protection Directive
(95/46/EC).
The
proposed
regulation
would
drastically alter the data protection landscape for
companies
31
National Approaches




Comprehensive Legislation
Legislation + Self-Regulatory
Self–Regulatory
Doing Nothing
32
Comprehensive Legislation
 All EU countries, including the 10 new
member states (Cyprus, Czech Republic,
Estonia, Hungary, Latvia, Lithuania, Malta,
Poland, Slovakia and Slovenia)
 Japan, Korea, New Zealand, Australia, Hong
Kong, Macao, Taiwan, Philippines, Singapore
 Chile, Argentina, Brazil, Mexico, etc.
 In Middle East, only Israel and Dubai
Financial Centre
33
Legislation + Self-Regulatory
 USA – Privacy Act 1974 + 12 federal
sectoral based legislation + State Laws
+ Safe Harbour
Self-Regulatory
 Singapore - Does not work – To have a
data protection law by 2012
34
Doing Nothing so far





Brunei
Vietnam
Laos
Cambodia
Many more
35
36
Our Part of the World : What’s Happening ?
•
Macao enacted her Personal Data Protection Act in 2006
•
China has came out with several drafts of the law, and the latest in 2007
•
India amended her Information Technology Act in December 2008. Some new provisions are added
to protect privacy and personal data. In April 2011, the third draft of the Privacy Bill was issued.
•
Indonesia came out with an academic draft in 2009
•
Thailand has developed a draft Bill in 2010
•
Taiwan amended her old law and passed a more comprehensive Personal Data Protection Act in
April 2010
•
Malaysia has passed the Personal Data Protection Act in June 2010
•
Korea came out with a more comprehensive law in March 2011
•
The Philippines Congress has came out with the draft Act
•
Australia and Hong Kong are reviewing their Privacy Act and Privacy Ordinance respectively
•
Singapore is currently developing a law and is expected to be ready by 2012. On 13 Sept 2011, a
Consultation Paper was released
•
In April 2011, the EU Working Party decided that the New Zealand Privacy Act is adequate
Korea
Malaysia
Taiwan
Data Protection Act
2011
Personal Data
Protection Act 2010
Personal Data
Protection Act 2010
• Data Protection
Principles
• Rights of Data Subjects
• Organization to
designate someone to
take charge
• Special entity to enforce
the Act (Data Protection
Commission/DPC)
• Mandatory reporting of
significant breach to DPC
• Data breach notification
(to the Data Subject)
• Mediation to resolve
dispute.
• Differentiate personal
data & sensitive data
• PIAs are encouraged
• Data Protection
Principles
• Rights of Data
Subjects
• Special entity to
enforce the Act (Data
Protection
Commissioner)
• No mandatory data
breach notification.
• Differentiate personal
data & sensitive data.
• Does not apply to
Federal and States
Governments
• Data Protection
Principles
• Rights of Data
Subjects
• Mandatory data
Breach Notification
(to the Data Subject)
• Enforcement by
Ministries responsible
for each industry
sector
38
PDPA 2010: Applicability
Federal &
States
Govts
Credit
NonCommercial
Transactions
Reference
Agencies
NonApplication
Data
Processed
Outside
Malaysia
Personal,
Family,
Household
Affairs
39
General
Principle
Notice and
Choice
Principle
Access
Principle
DATA
PROTECTION
PRINCIPLES
Data
Integrity
Principle
Retention
Principle
Disclosure
Principle
Security
Principle
40
Exemptions
Partial
Total
•Crime Prevention/Detection
•Offenders Apprehension/Prosecution
•Tax/Duty Assessment/Collection
•Physical/Mental Health
•Statistics/Research
•Court Order/Judgment
•Regulatory Functions
•Journalistic/Literary/Artistic
•Personal
•Family
•Household
•Recreational
41
Purposes
General
Principle
Notice &
Choice
Principle
Disclosure
Principle
Security
Principle
Retention
Principle
Data
Integrity
Principle
Access
Principle
Crime
Prevention/
Detection
x
x
x
x
Offenders
Apprehension/
Prosecution
x
x
x
x
Tax/duty
Assessment/
Collection
x
x
x
x
Physical/
Mental Health
x
Statistics/
Research
x
x
x
x
Court Order/
Judgment
x
x
x
x
Regulatory
Functions
x
x
x
x
Journalistic/
Literary/Artistic
x
x
x
x
x
x
42
Right to be
Informed
Right to
Prevent
Processing for
Direct
Marketing
Purposes
Right to
Access
RIGHTS
OF DATA
SUBJECTS
Right to
Prevent
Processing
Likely to
Cause Distress
Right to
Correct
Right to
Withdraw
Consent
43
No.
1
2
3
4
5
6
7
Section
Processing without a certificate of registration
Fine <RM500,000.00/
Imprisonment < 3 years/ Both
S 18(5)
Processing after registration is revoked
Fine <RM500,000.00/
Imprisonment < 3 years/Both
Contravening Data Protection Principles
Fine <RM500,000.00/
Imprisonment < 2 years/Both
Non-Compliance with Code of Practice
Fine <RM100,000.00/
Imprisonment < 1 year/Both
S. 37(4)
Failure to Inform the Refusal to Comply with the Data
Correction Request
Fine <RM100,000.00/
Imprisonment < 1 year/Both
S. 38(4)
Processing after consent been withdrawn
Fine <RM100,000.00/
Imprisonment < 1 year/Both
S.40(3)
Processing of Sensitive Data
Fine <RM200,000.00/
Imprisonment < 2 years/Both
S.42(6)
Failure to Comply with the Commissioner’s
Requirement
(Processing likely to cause damage or distress)
Fine <RM200,000.00/
Imprisonment < 2 years/Both
S. 43(4)
Failure to Comply with the Commissioner’s
Requirement
(Direct Marketing)
Fine <RM200,000.00/
Imprisonment < 2 years/Both
S. 129(5)
Transfer of Data to Places Outside Malaysia without
any law or adequate protection
Fine <RM300,000.00/
Imprisonment < 2 years/Both
S. 130(3)
Collects, disclose or procure to disclose data without
consent of Data User
Fine <RM500,000.00/
Imprisonment < 3 years/Both
S. 130(4) and (5)
Selling or offer to sell
Fine <RM500,000.00/
Imprisonment < 3 years/Both
S. 131(1) and (2)
Abetment and Attempt to commit any of the offences
S.5
S. 29
9
11
12
13
Penalty
S. 16(4)
8.
10.
Offences
Half of the maximum term provided for
that offence
Offences by a body corporate
A director, chief executive officer, chief operating officer,
manager, secretary; or other similar officer of the body corporate
or was purporting to act in any such capacity or was in any
manner or to any extent responsible for the management of any
of the affairs of the body corporate or was assisting in such
management - may be charged severally or jointly in the same
proceeding with the body corporate; and
If the body corporate is found to have committed the offence, he
shall be deemed to have committed the offences unless, having
regard to the nature of his functions in that capacity and to all
circumstances, he proves :
that the offences was committed without his
knowledge, consent or connivance; and
that he had taken all reasonable precautions
and exercised due diligence to prevent
the commission of the offence. (s.133)
45
Abetment and Attempt to Commit Offence
A person who abets the data user in the commission of any
offence under this Act commits an offence, and shall, on
conviction, be liable to the punishment provided for that
offence.(s.132(1)
A person who attempts to commit an offence punishable
under this Act commits an offence and shall be liable to
imprisonment not exceeding one half of the maximum
term provided for that offence.
46
Transfer of Data to Outside Malaysia
What PDPA says…
 Sect 129
No transfer unless to such places specified by the Minister
 The Minister may specify if:
a) there is a law substantially similar to PDPA, or
b) there is a law that serves the same purpose as PDPA, or
c) that place ensures an adequate level of protection
equivalent to the protection afforded by PDPA
Enforcement Mechanisms







Data Protection Commissioner
Advisory Committee
Appeal Tribunal
Codes of Practice
Enforcement Notice
Prosecution
Revocation of Registration
48
Enough is Enough
49
The Star Malaysia 18 Sept 2011
50
Telco A
 “Personal information held by Telco A may include
your name, date of birth, current address,
telephone/mobile phone number, email address,
credit cards details, occupation, user ID or
password… as well as certain details about your
personal interest.”
 “Telco A complies with and is registered under the
data protection law in Malaysia and…”
51
Bank A
“Any information sent to Bank A Bhd through the use
of this site will be deemed not to be confidential and
be deemed to remain the property of Bank A Bhd who
shall be free to use, copy, publish, reproduce,
distribute and/or transmit all such information at
Bank A Bhd’s absolute discretion for any purpose
and…”
52
Bank C
“Bank C Group may also use your personal information
to market Bank C Group’s products, and services to you
based on your interest and…”
“Our use of your information may also extend to other
purposes… which may at our sole discretion be made
available to our third party vendors, advertisers,
affiliates or relevant third parties”
53
Bank Z
“… the Bank does not warrant the security of any
information transmitted by the Customer using the
Bank’s Internet Banking Services. Accordingly, the
Customer hereby accepts the risk that any
information transmitted or received using the Bank’s
Internet Banking Services may be accessed by
unauthorised third parties and the Customer agrees
not to hold the Bank liable for any such unauthorised
access or any loss or damage suffered as a result
thereof.”
54
The STAR headline 03 May 2009
55
56
57
58
abmunir@um.edu.my
http://profabm.blogspot.com
+60122185242
sitihajar425@salam.uitm.edu.my
+60123455537
59
Download