In Singapore, the Personal Data Protection Act 2012 (PDPA) is the main legislation governing data protection and privacy. It establishes a baseline data protection framework which applies across all private-sector organisations. The PDPA is administered and enforced by Singapore’s data protection authority, the Personal Data Protection Commission (PDPC).
In 2020, the PDPA underwent its first comprehensive review since its enactment. The amendments are set out in the Personal Data Protection (Amendment) Act 2020 (the “Amendment Act”), which was passed by Parliament on 2 November 2020. Most of the significant amendments introduced by the Act came into force on 1 February 2021.
Parts 3 to 6A of the PDPA set out core data protection obligations, including those related to the collection, use, disclosure, access, correction, care, protection, retention, transfer of personal data and notification of data breaches (collectively, the “Data Protection Provisions”). Part 9 of the PDPA sets out provisions pertaining to Singapore’s national Do Not Call (DNC) Registry, regulating the sending of marketing messages to Singapore telephone numbers (the “DNC Provisions”).
Subsidiary regulations issued under the PDPA include the following:
In addition, the PDPC has issued several advisory guidelines which, while not legally binding on any party, provide greater clarity on how the PDPC may interpret the provisions of the PDPA. Some examples include:
The PDPC is the key regulator responsible for administering and enforcing the PDPA. It is part of the Info-communications Media Development Authority (IMDA), which is a statutory board under the purview of the Ministry of Communications and Information.
The PDPC’s jurisdiction covers private sector organisations. The main powers, duties and responsibilities of the PDPC are as follows:
In practice, the PDPC may initiate an investigation to determine whether an organisation complies with the PDPA upon receipt of a complaint or on its own motion. Its enforcement approach is guided by the Enforcement Guidelines, which outline several factors the PDPC considers when deciding whether to commence an investigation. These include:
In the course of its investigation, the PDPC’s powers include:
The PDPC is also empowered to review complaints concerning access and correction requests.
The PDPC is responsible for enforcing the PDPA. The PDPC’s approach to enforcement is detailed in its Guide to Active Enforcement (revised on 1 October 2022).
When considering whether to take enforcement action, the PDPC is guided by three key objectives:
When a potential personal data incident is surfaced to the PDPC (via complaint, self-notification or otherwise), the PDPC will first consider whether it should open an investigation into the matter. The Commissioner may not conduct an investigation into the matter if they are of the view that:
If the PDPC is of the view, however, that an investigation should be conducted, the PDPC will officially open a detailed investigation into the matter, and the investigation process will include the PDPC:
The organisation allegedly in breach will also be given the opportunity to make representations to the PDPC.
After having considered the facts of the case as well as the representations made, the PDPC will then issue its decision on whether the organisation has breached any of the data protection obligations under the PDPA, as well directions (if appropriate), which may include a financial penalty of up to a maximum of 10% of the organisation’s annual turnover in Singapore, or SGD1 million, whichever is higher.
Under the PDPA, the PDPC must, in determining the amount of a financial penalty imposed, have regard and give such weight as it considers appropriate to, all of the following factors:
In practice, financial penalties depend on the specific Data Protection Provision that was breached and the severity of the breach. A notable example of an egregious breach involving multiple aggravating factors is the case of Re Singapore Health Services Pte Ltd and Another [2019] SGPDPC 3. In that case, the Commissioner, noting that this was the “largest data breach suffered by any organisation in Singapore with the number of affected individuals amounting to almost 1.5 million unique individuals”, imposed financial penalties on the organisation and its data intermediary of SGD250,000 and SGD750,000 respectively, due to their failure to implement reasonable security measures to protect personal data.
To date, the highest financial penalties issued by the PDPC were SGD250,000 and SGD750,000, imposed on SingHealth Services Pte Ltd and Integrated Health Information Systems Pte Ltd in the same case respectively. These penalties were for violations of their data protection obligations under the PDPA (see Re Singapore Health Services Pte Ltd and Another [2019] SGPDPC 3). The case involved a major cyber-attack on SingHealth’s patient database system, which led to the personal data of approximately 1.5 million individuals being compromised.
At present, Singapore does not have legislation specifically addressing the use of AI and is not currently looking to enact regulations for AI. However, the government has enacted laws in relation to specific applications of AI technology (eg, the Computer Misuse Act, Online Criminal Harms Act, Protection from Online Falsehoods and Manipulation Act, Elections (Integrity of Online Advertising) (Amendment) Bill and the PDPA), which, together with existing laws that are technology-agnostic and voluntary guidelines issued by sectoral regulators, make up the legal and regulatory framework around AI and GenAI.
Model Artificial Intelligence Governance Framework
The Model AI Governance Framework was published by the IMDA and PDPC as a set of voluntary, non-binding guidelines that set out ethical and governance principles for the use of AI and translate them into practical recommendations for organisations to adopt. To support adoption, the Implementation and Self-Assessment Guide for Organisations (ISAGO) was also introduced, offering guiding questions and examples to help organisations self-evaluate their AI governance practices.
On 25 May 2022, the AI Verify framework was launched as part of an international pilot. Developed by the IMDA and the PDPC, AI Verify is a toolkit for assessing AI systems against 11 AI ethics principles which are consistent with internationally recognised AI frameworks. Organisations may validate the performance of their AI systems through standardised tests. The international piloting was completed on 7 June 2023.
Building on the success of the Model AI Governance Framework, the Model Framework for GenAI sets out actions to be taken across nine dimensions to address the risks posed by GenAI, while supporting innovation. These include the following.
The former aims to help organisations assess the alignment of their AI governance practices with the Model AI Framework, while the latter provides case studies as to how local and international organisations across different sectors and sizes have implemented or aligned their AI governance practices with all sections of the Model AI Framework.
New PDPC Guides Concerning AI
On 1 March 2024, the PDPC published its AI Guidelines. The guidelines provide guidance on how the PDPA applies when personal data is used to train or develop AI systems and offer best practices for service providers (eg, systems integrators) that support the implementation of AI solutions. Although the Guidelines released by the PDPC are not binding, the PDPC has often cited them in their decisions, therefore, it would be prudent to adopt the Guidelines on the use of personal data in AI recommendation and decision systems.
Under these guidelines, the PDPC encourages the use of anonymised data, as far as possible, in relation to AI systems. Once data is properly anonymised, the data is no longer personal data (and therefore not governed by the PDPA). According to the PDPC’s Advisory Guidelines on the PDPA for Selected Topics, data would be considered anonymised if there is no serious possibility that an individual could be re-identified, taking into consideration both: (i) the data itself, or the data combined with other information to which the organisation has or is likely to have access; and (ii) the measures and safeguards implemented by the organisation to mitigate the risk of re-identification.
In this regard, the PDPA makes unauthorised re-identification of anonymised information a criminal offence. Under Section 48F of the PDPA, an individual that takes any unauthorised action to re-identify or cause re-identification of the person to whom anonymised information in the possession or under the control of an organisation or a public agency relates shall be guilty of an offence and shall be liable on conviction to a fine not exceeding SGD5,000, imprisonment for a term not exceeding two years, or both.
To further reduce the risk of data leakage in certain use cases, the use of synthetic data is being encouraged by both academia and the government as an alternative to using anonymised data. For example, in July 2024, the PDPC released the Proposed Guide on Synthetic Data Generation, which aims to help organisations understand the methods and potential applications of synthetic data generation in AI systems.
Please see 1.5 AI Regulation.
In Singapore, privacy litigation remains relatively nascent, with most enforcement of data protection obligations taking place through administrative action by PDPC rather than through civil proceedings in the courts.
On 19 February 2019, the State Courts of Singapore dismissed a claim brought against the Singapore Swimming Club for defamation and breach of the PDPA. Although written grounds of judgment are unavailable, this case is noteworthy as it appears to mark the first instance in which the Singapore courts were invited to consider an alleged breach of the PDPA, absent any prior finding by the PDPC.
Subsequently, in IP Investment Management Pte Ltd and Others v Alex Bellingham [2019] SGDC 207, the District Court considered a claim brought under the right of private action available to individuals previously found in Section 32 of the PDPA (now Section 48O of the PDPA). See 2.2 Recent Case Law.
While supranational and international developments continue to shape Singapore’s broader approach to privacy and data protection, their direct influence on domestic litigation remains relatively limited.
In IP Investment Management Pte Ltd and Others v Alex Bellingham [2019] SGDC 207, the District Court, in a decision delivered on 3 October 2019, considered a claim brought under the right of private action available to individuals, previously found under Section 32 of the PDPA (now Section 48O of the PDPA). The District Court found that the defendant had breached certain Data Protection Provisions and that the third plaintiff had suffered loss and damage because of the defendant’s misuse of their personal information. Consequently, the District Court granted an injunction restraining the defendant from using, disclosing or communicating any personal data of the third plaintiff and ordered the defendant to destroy all such personal data in their possession.
The above decision was subsequently appealed against before the High Court in Bellingham, Alex v Reed, Michael [2021] SGHC 125. On appeal, the High Court held that the claim under Section 32 could not be sustained as the respondent had not suffered any “loss or damage” within the meaning of the previous Section 32 of the PDPA. Specifically, the High Court held that a loss of control over personal data does not constitute “loss or damage” for an actionable claim under the previous Section 32 of the PDPA. The court also addressed the scope of “publicly available information” exception under Section 17 read with Part 2(1) of the First Schedule to the PDPA. It held that organisations are not required to obtain consent for the collection, use and disclosure of publicly available personal data under the PDPA. However, the High Court clarified that organisations cannot rely on Section 17 of the PDPA where personal data that is publicly available is obtained only through the unlawful use of other personal data.
The High Court ruling was eventually partially reversed by the Court of Appeal in Reed Michael v Bellingham, Alex (Attorney-General, intervener) [2022] SGCA 60. The Court of Appeal held that “loss or damage” includes emotional distress, though it does not include mere loss of control over personal data. On the facts, the Court of Appeal found that the plaintiff had suffered emotional distress that was significant enough to be actionable. Additionally, the Court of Appeal clarified the application of Section 4(1)(b) of the PDPA, which provides that the data protection obligations in the PDPA do not impose obligations on an employee acting in the course of their employment with an organisation. The Court of Appeal clarified that this section serves as a defence for employees and that the burden lies on a defendant to prove on a balance of probabilities that they were “an employee acting in the course of employment”.
There are no collective redress mechanisms for the protection of the collective interest of individuals in Singapore.
In Singapore, the regulation of Internet of Things (IoT) services primarily falls within the broader legal framework governing the protection of personal data and cybersecurity. While there is no specific statute that regulates IoT technologies alone, key regulatory objectives are addressed through the PDPA, the Cybersecurity Act 2018, and sector-specific or industry guidelines issued by agencies such as the IMDA.
Similar to the objectives found under the PDPA, the main objective of regulating IoT services is to govern the collection, use and disclosure of personal data by organisations in a manner that recognises both the right of individuals to protect their personal data and the need of organisations to collect, use or disclose personal data for purposes that a reasonable person would consider appropriate in the circumstances.
Under the PDPA, organisations that deploy or manage IoT devices are collecting personal data. These data controllers are therefore subject to the following key obligations.
In addition, the Amendment Act will also further introduce one more data protection obligation (which has yet to come into effect).
Organisations that process personal data on behalf of an organisation (eg, data processing services) are known as data intermediaries under the PDPA. Data intermediaries are subject to a limited scope of obligations under the PDPA, specifically the following.
See 1.1 Overview of Data and Privacy-Related Laws.
There is currently no legislation in Singapore that specifically governs the use of IoT services, other than the PDPA, which regulates the collection, use and disclosure of personal data. Accordingly, there are no additional IoT specific statutory obligations, beyond those that already set out under the Data Protection Provisions discussed in 3.1 Objectives and Scope of Data Regulation.
Separately, the IMDA has published the Internet of Things Cyber Security Guide (published March 2020), which is targeted at IoT developers, providers and users. This is the only IoT specific guide issued by the IMDA to date. However, this guide also explicitly excludes privacy-related matters from its scope. The guide provides practical baseline recommendations, key security principles, and checklists for organisations – particularly enterprise users (and their vendors) – that intend to deploy IoT solutions. It provides baseline recommendations to ensure security aspects for the acquisition, development, operations and maintenance of IoT systems.
Data processing activities carried out by data intermediaries (the equivalent of data processors) are governed by the PDPA. Specifically, data intermediaries must ensure that they comply with their obligations under the PDPA. See 3.1 Objectives and Scope of Data Regulation for details of a data intermediary’s PDPA obligations.
See 1.2 Regulators.
The PDPC has clarified that any personal data collected via cookies is subject to the same treatment as other forms of personal data, and organisations that collect personal data using cookies would equally be subject to the requirements of the PDPA. Accordingly, organisations using cookies to collect personal data must comply with the PDPA’s requirements. Organisations do not need to obtain consent for cookies that do not collect personal data (eg, session cookies may only collect and store technical data needed to play back a video on a website).
The Selected Topics Guidelines explain that consent may not be necessary where cookies are used to collect, use or disclose personal data for internet activities that the user has clearly requested, where the individual is aware of the purposes for such collection, use or disclosure and voluntarily provides their personal data for such purposes. Such activities include transmitting personal data for effecting online communications and storing information that the user enters in a web form to facilitate an online purchase.
Further, for activities that cannot take place without cookies that collect, use or disclose personal data, deemed consent may apply if the individual voluntarily provides the personal data for that purpose of the activity, and it is reasonable that they would do so.
In instances where the individual configures their browser to selectively accept or reject certain cookies, they may be deemed to have consented to the collection, use and disclosure of the personal data by the cookies that they have chosen to accept. However, the mere failure of an individual to actively manage their browser settings does not imply that they have consented to the collection, use and disclosure of personal data by all websites for their stated purpose.
Finally, the Selected Topics Guidelines make clear that where organisations use cookies for personalised advertisement targeting that involves the collection and use of an individual’s personal data, express consent from the individual is required.
The PDPA does not explicitly define or refer to the terms “targeted advertising” and “cross-contextual behavioural advertising”. However, where such advertising entails the collection or use of personal data, the individual’s express, opt-in consent should be obtained in accordance with the PDPA.
First, under Section 4(1)(a), (b) of the PDPA, the Data Protection Provisions do not apply to an employee acting in the course of their employment within an organisation.
Second, employers are generally required to provide suitable notices and obtain consent, before collecting, using or disclosing the personal data of their employees.
Employers may, however, rely on the concepts of deemed consent (as set out in Sections 15 and 15A of the PDPA) or process personal data without consent in specific situations under Section 17. The First and Second Schedules to the PDPA outline the circumstances under which consent is not required for the collection, use and disclosure of their personal data. In such cases, the requirement to notify the individual typically does not apply.
An exception to this general position is found in Section 20(4) of the PDPA. Where an organisation intends to collect, use or disclose personal data for the purpose of, or in relation to, the organisation:
the organisation must notify the individual of that purpose on or before such collection, use or disclosure (despite the fact that there is no requirement to seek consent).
Further, if the organisation relies on this exception, it must provide the individual with the purpose of processing and, upon request by the individual, the contact information of a person who can address any queries regarding the processing of the individual’s personal data.
The “legitimate interests” exception to consent may also apply in certain cases. However, similar notification requirements would apply, and the organisation must meet other conditions prescribed under the PDPA.
Under the PDPA, personal data may be collected, used and disclosed without consent in the context of a business asset transaction, subject to the following requirements under Part 4 of the First Schedule to the PDPA being fulfilled.
Applicability of the Exception
The exception applies where an organisation (X) is a party or a prospective party to a business asset transaction with another organisation (Y), and personal data about an applicable individual of Y:
Where the business asset transaction concerns any part of Y or Y’s business assets, the personal data mentioned above (Part 4, sub‑paragraph (1) of the First Schedule to the PDPA) must relate directly to that part of Y or Y’s business assets, as the case may be.
Requirements Where X is a Prospective Party
If X is a prospective party to the business asset transaction, the following conditions apply:
Requirements Where X Enters Into a Transaction
If X enters into the business asset transaction, the following conditions apply:
If the Transaction Does Not Proceed or Is Not Completed
If the business asset transaction does not proceed or is not completed, X must destroy, or return to Y, all personal data collected.
Transaction Involving Y’s Interest in a Third Organisation
Paragraph 2, Part 4 of the First Schedule to the PDPA details the situation if the transaction involves Y’s interest in a third organisation Z (eg, selling shares or an interest to Z) – similar principles apply.
Under Section 26 of the PDPA, organisations may only transfer personal data overseas in accordance with the requirements prescribed under the PDPA to ensure that the recipients provide the transferred personal data a standard of protection that is comparable to the PDPA.
In particular, under the PDP Regulations, the transferring organisation must, before transferring the personal data outside Singapore, take appropriate steps to ascertain whether, and to ensure that, the recipient is bound by legally enforceable obligations to provide the transferred personal data with a standard of protection comparable to that under the PDPA.
“Legally enforceable obligations” is defined in the PDP Regulations to include obligations imposed on the recipient under:
In relation to binding corporate rules, the PDP Regulations define a recipient as being related to the transferring organisation if:
For completeness, the PDP Regulations set out specific situations whereby the transfer limitation obligation is taken to be satisfied, and it is not necessary to impose legal enforcement obligations (eg, where the personal data is publicly available in Singapore or where the personal data is data in transit).
Additionally, the PDP Regulations recognise the certification systems under the Asia-Pacific Economic Cooperation (APEC) Cross-Border Privacy Rules (CBPR) System and the Privacy Recognition for Processors (PRP) System as a valid mechanism for cross-border data transfers. Where the recipient holds a recognised certification (ie, certification under the APEC CBPR or PRP) that is granted or recognised under the law of that country or territory to which the personal data is transferred, the recipient is taken to be bound by legally enforceable obligations to provide a standard of protection for the transferred personal data that is at least comparable to the protection under the PDPA.
There are no government notifications or approvals required to transfer data internationally.
There are no express data localisation requirements under the PDPA. Organisations are not required to retain personal data or copies of such data within Singapore, even if the data is transferred overseas or accessed from outside the jurisdiction.
Accordingly, personal data may be stored overseas, and the same data may also be transferred internationally, provided that the transfer complies with the PDPA’s transfer limitation obligation (see 5.1 Restrictions on International Data Transfers), including ensuring a comparable standard of protection in the receiving jurisdiction.
Section 26 of the PDPA provides that an organisation must not transfer any personal data to a country or territory outside Singapore except in accordance with requirements prescribed under the Act to ensure that organisations provide a standard of protection to personal data so transferred that is comparable to the protection under the Act. Apart from the foregoing, the Official Secrets Act and Statutory Bodies and Government Companies (Protection of Secrecy) Act 1983 prevent the disclosure of official government documents and information.
During the 5th ASEAN Digital Ministers Meeting (ADGMIN) held in Bangkok, Thailand on 16 and 17 January 2025, the following measures were announced to support the regulation and facilitation of cross-border data transfers.
10 Collyer Quay
10th Floor
Ocean Financial Centre
Singapore 049315
+65 6531 4110
+65 6535 4864
chongkin.lim@drewnapier.com www.drewnapier.comIntroduction
As data-driven technologies continue to transform the digital economy, businesses in Singapore must navigate an increasingly complex personal data protection landscape. This chapter of the guide discusses how businesses can navigate the evolving personal data protection regulatory landscape in Singapore, particularly in the following areas:
These changes reflect the broader shift towards more robust and accountable data protection frameworks both locally and internationally.
Cross-Border Data Transfers
In today’s global digital economy, personal data is central to key business functions, such as customer service, marketing analytics, supply chain management, and financial transactions. For companies operating across borders, the ability to transfer data seamlessly is not just operationally necessary but strategically vital. This need is further amplified by the growing use of AI tools, which often involve cross-border transfers of personal data, particularly where AI providers or their subcontractors host servers outside Singapore. Each jurisdiction enforces its own data protection standards, often with unique requirements for cross-border transfers.
In Singapore, cross-border data transfers are governed by Section 26 of the Personal Data Protection Act 2012 (PDPA) (the “Transfer Limitation Obligation”), which requires organisations to ensure that the overseas recipient provides a level of protection comparable to the PDPA. This can be done through imposing legally enforceable obligations on overseas recipients to provide the transferred personal data a standard of protection that is at least comparable to that under the PDPA (Regulation 10 of the Personal Data Protection Regulations 2021 (the “PDP Regulations”). This is typically done by way of contract or binding corporate rules.
Use of ASEAN Model Contractual Clauses
To help businesses operating in Singapore and in the region, the PDPC recognises and encourages the use of the Association of Southeast Asian Nations (ASEAN) Model Contractual Clauses (MCCs). The ASEAN MCCs are standard contractual terms that businesses can incorporate into binding legal agreements when transferring personal data between entities across ASEAN member states.
The adoption of the ASEAN MCCs allows businesses, which are operating across ASEAN and/or other countries with data protection regimes based on the Asia-Pacific Economic Cooperation (APEC) Privacy Framework or the Organisation for Economic Co-operation and Development (OECD) Privacy Guidelines, to meet cross-border data transfer obligations (including the Singapore Transfer Limitation Obligation) in a structured and consistent way. By implementing the clauses and adhering to the responsibilities they set out, such organisations can help ensure that personal data is transferred in a manner that aligns with the legal and regulatory requirements of each such jurisdiction (although organisations should still review the clauses to ensure that proper modifications are made for compliance with the requirements of applicable data protection laws).
To provide businesses with further clarity, the Personal Data Protection Commission (PDPC) has released its Guidance for Use of ASEAN Model Contractual Clauses for Cross-Border Data Flows in Singapore, on 22 January 2021. This guidance offers practical direction on how the ASEAN MCCs can be used for compliance with the PDPA. It clarifies how organisations can fulfil their legal obligation to ensure that overseas recipients of personal data are subject to legally enforceable obligations.
For businesses, the ASEAN MCCs offer practical advantages that go beyond regulatory compliance. As a voluntary, ready-to-use and flexible template, the ASEAN MCCs help reduce the time and effort required for contract negotiations, while remaining consistent with the principles of the ASEAN Framework on Personal Data Protection 2016 (which are derived from the APEC Privacy Framework and OECD Privacy Guidelines). This can be especially valuable for organisations managing many cross-border agreements involving multiple data protection laws. In addition, the ASEAN MCCs are designed for easy adoption across ASEAN especially without the need for new laws or complex regulatory approvals. Contractual disputes arising from their use can be resolved through civil courts, providing a clear legal framework for enforcement. The ASEAN MCCs are also accessible to all types of organisations, including SMEs, making them a practical and scalable solution for businesses of all sizes looking to facilitate compliant data transfers within ASEAN in particular.
ASEAN and the EU have also jointly issued a guide comparing the ASEAN MCCs and the EU SCCs. Companies already familiar with the ASEAN MCCs can use the joint guide as a reference in their contractual negotiations on data transfers with their EU business partners.
Use of APEC Cross-Border Privacy Rules
The PDP Regulations also recognise an alternative mechanism for the cross-border transfer of personal data. Under Regulation 12 of the PDP Regulations, an overseas recipient is taken to be bound by legally enforceable obligations to provide such standard of protection if it holds a specified certification that is granted or recognised under the law of that country or territory to which the personal data is transferred. These “specified certifications” are currently defined as certifications under the APEC Cross-Border Privacy Rules (CBPR) system and APEC Privacy Recognition for Processors (PRP) system.
Adopting APEC CBPR and PRP certifications streamlines cross-border data transfers, reduces legal complexity, and boosts trust among privacy-conscious clients. Though uptake in Singapore is still limited, certified companies have testified to the value of these certifications at enhancing data security credibility and supporting regional operations across key markets like Malaysia and Indonesia.
Launch of Global CBPR
On 2 June 2025, the Global CBPR Forum (the “Forum”) introduced the Global CBPR and Global PRP Systems as international certification frameworks, building on the foundation of the APEC CBPR and PRP Systems. These new systems aim to establish a global standard for data privacy that transcends regional boundaries. Currently, the Forum comprises nine member economies — Australia, Canada, Japan, Mexico, the Philippines, South Korea, Singapore, Chinese Taipei, and the United States — all of whom have previously participated in the APEC CBPR system. The Forum is actively committed to expanding beyond APEC. At the recent Global CBPR Forum workshop (26–28 May 2025), the Forum outlined its 2025–6 work programme. A key focus will be updating the Program Requirements for the Global CBPR and PRP certifications to include new provisions addressing sensitive personal data, children’s data, and breach notification.
At present, the PDP Regulations recognise only the APEC CBPR and PRP certifications. However, it is anticipated that there will be impetus to also recognise the Global CBPR and PRP certifications.
For completeness, the PDP Regulations provide for certain prescribed situations whereby the Transfer Limitation Obligation is taken to be satisfied, and therefore not necessary to impose legally enforceable obligations, eg, where the personal data is publicly available in Singapore or where the personal data is data in transit.
Personal Data of Minors
On 28 March 2024, the PDPC released its Advisory Guidelines on the PDPA for Children’s Personal Data in the Digital Environment (the “Children’s Personal Data Guidelines”), aimed at organisations offering online products or services likely to be accessed by children. As a general principle, businesses should endeavour to comply with PDPC advisory guidelines as they indicate how the PDPC will interpret the provisions of the PDPA. The PDPC has held organisations responsible for failure to comply with its guidelines without justification.
The Children’s Personal Data Guidelines clarify that children aged 13 to 17 may provide valid consent, provided that policies on data collection, use, disclosure and withdrawal are presented in a way that the child can clearly understand, including the implications of giving or withdrawing consent. If there is doubt about the child’s level of understanding, parental or guardian consent should be obtained.
Additionally, the Children’s Personal Data Guidelines highlight that using a child’s personal data or profile to target them with harmful or inappropriate content (as defined in the Code of Practice for Online Safety under the Broadcasting Act 1994) will be considered unreasonable. Children’s personal data is also generally treated as sensitive and must be protected with a higher standard of care under the PDPA. To meet their accountability obligation under the PDPA, organisations are also encouraged to carry out data protection impact assessments before launching products or services likely to attract child users.
Apart from the Children’s Personal Data Guidelines, the PDPC has addressed the issue of minors’ (ie, individuals below the age of 21) consent in its Advisory Guidelines on the PDPA for Selected Topics (revised 23 May 2024) (the “Selected Topics Guidelines”). The Selected Topics Guidelines should be read together with the Children’s Personal Data Guidelines. The Selected Topics Guidelines advise organisations to assess whether a minor understands the nature and implications of giving consent. As a general rule, minors aged 13 and above may usually be considered capable of providing valid consent. However, if an organisation has reason to believe a minor lacks sufficient understanding, it should obtain consent from the minor’s parent or legal guardian.
Deployment of AI
On 1 March 2024, the PDPC issued its Advisory Guidelines on the Use of Personal Data in AI Recommendation and Decision Systems (the “AI Guidelines”). These guidelines explain how the PDPA applies when organisations use personal data to develop and train AI technologies, and they also outline best practices for service providers, such as systems integrators, supporting the implementation of customised AI solutions.
The AI Guidelines explain how obligations under the PDPA apply in the context of the following stages of AI system implementation.
Enforcement Trends
Importantly, the PDPC appears to be taking a more proactive enforcement stance in recent years. Currently, there are over 250 published enforcement decisions and more than 80 voluntary undertakings. A significant number of the recent cases involve breaches of the Protection Obligation arising from cybersecurity incidents – in particular, ransomware attacks. In such situations, particularly those involving successful exfiltration of personal data, the PDPC is likely to closely examine whether an organisation had implemented adequate security measures to prevent unauthorised access, use, disclosure or other forms of compromise.
Financial penalty range and trends in recent years
Recently, the PDPC has appeared to be adopting a more stringent approach in meting out financial penalties, at least, for breaches of the Protection Obligation under the PDPA. By way of background, financial penalties imposed by the PDPC for breaches of the Protection Obligation are assessed based on various considerations set out in the PDPA. These include:
The PDPC expects organisations to implement security measures proportionate to the volume and sensitivity of the personal data they handle. Additional factors may include:
Notably, in a recent enforcement action, the PDPC has factored in an organisation’s annual turnover when determining the quantum of financial penalty.
The decision of Re Keppel Telecommunications & Transportation Ltd [2024] SGPDPC 3 involved a data breach incident involving a threat actor who had exploited the compromised account of one of the organisation’s vendors to access a legacy server and exfiltrate files and later posted nine encrypted files and one unencrypted file (listing file names) on the dark web. While the contents of the encrypted files could not be definitively verified, the listing confirmed that data from the server had been compromised. The PDPC concluded that personal data belonging to approximately 22,659 individuals was at risk, with data pertaining to around 7,184 individuals likely included in the exfiltrated content.
The organisation was found to have breached the Protection Obligation due to its failure to delete outdated personal data from the legacy server for over two years post-migration. In deciding the financial penalty, the PDPC explicitly considered the organisation’s substantial annual turnover and determined that a higher penalty was justified to achieve a deterrent effect. A fine of SGD120,000 was therefore imposed.
This decision reflects a shift towards penalties that are not only proportionate to the breach but also effective in deterring future non-compliance. Specifically, entities with significantly high turnover in Singapore (notably, those exceeding SGD10 million) may face steeper fines, in order for the PDPC to ensure that the sanction is consequential.
PDPC’s jurisdiction over foreign businesses
The PDPC’s exercise of its enforcement powers over businesses based outside Singapore may be an area of concern for multinational corporations (MNCs) without a clear local presence.
To date, there has been no published PDPC decision where enforcement action has been taken against a foreign company without a physical presence or nexus to Singapore.
Nevertheless, in Re Cigna Europe Insurance Company SA-NV [2019] SGPDPC 18, it is noted that the PDPC had investigated a data breach involving an overseas entity with a registered branch office in Singapore and that had collected personal data of Singapore residents. While the data breach occurred abroad and involved a related UK entity, the PDPC evaluated the compliance of the Singapore branch with its data protection obligations under the PDPA, specifically in relation to cross-border transfers and the protection obligation under Section 24 of the PDPA (the “Protection Obligation”). This case suggests that the PDPC would investigate the conduct of foreign entities in Singapore, especially where there is some local presence.
Offshore entities are not necessarily shielded from the scrutiny of the PDPC and data collection or other data processing activities in Singapore could still trigger regulatory oversight. Organisations with physical presence or other operations/business in Singapore should therefore assess their cross-border data flows and implement appropriate safeguards to ensure compliance with PDPA standards.
Harnessing the Power of Data Anonymisation
More businesses are starting to recognise the value of data to drive innovation, improve services and gain competitive advantage. At the same time, organisations must ensure that all data processing remains in compliance with relevant laws, and data is used in a responsible manner. An increasingly recognised method of harnessing the power of data responsibly is through data anonymisation.
Under Singapore’s PDPA, data that is properly anonymised is no longer considered personal data. According to the Selected Topics Guidelines, data is considered anonymised when there is no serious possibility that an individual can be re-identified, either from the data itself or in combination with other data the organisation is likely to have access to (taking into account the measures and safeguards implemented by the organisation to mitigate the risks of re-identification).
The PDPC also issued a Guide to Basic Anonymisation in March 2022. This guide offers a simple, practical five-step process to help organisations anonymise and de-identify various datasets. It is especially relevant for businesses starting to explore anonymisation or dealing with relatively straightforward data formats. The guide breaks down technical concepts into accessible actions, making it ideal for in-house teams with limited data privacy expertise.
More recently, guides on anonymisation have also been developed at an ASEAN level.
ASEAN Guide on Data Anonymisation (January 2025)
Unveiled at the 5th ASEAN Digital Ministers’ Meeting, this guide offers foundational information and practical guidance on basic data anonymisation. It is intended as a reference for policymakers, regulators and industry organisations across ASEAN member states. As more member states implement data protection legislation, the guide can serve as a valuable starting point for tailoring anonymisation approaches to local legal and regulatory contexts. It introduces the anonymisation process and outlines commonly used techniques, with the broader aim of fostering a shared regional understanding of anonymisation and promoting its responsible application.
Guide to Getting Started with Anonymisation (APPA, June 2025)
Jointly developed by data protection authorities in the Asia-Pacific region, including Singapore’s PDPC, this recently issued guide is targeted at organisations looking to kick-start their anonymisation journey. It focuses on the anonymisation of structured, textual and non-complex datasets and offers:
Whether businesses are considering data anonymisation for compliance, innovation or secure data sharing, these guides provide trusted frameworks tailored to different business needs. Organisations should consider:
By applying the right anonymisation strategies, businesses can reduce regulatory risks, unlock new value from data, and demonstrate accountability in their data practices.
Conclusion
Singapore’s data protection framework is evolving in tandem with global shifts in technology, regulatory expectations and public trust. For businesses, this means more than just staying compliant. It calls for a strategic approach to data governance that anticipates risks, embraces innovation responsibly and demonstrates accountability. Whether managing cross-border data flows, deploying AI or handling children’s data, organisations must adopt robust internal processes and stay informed of legal developments. By understanding the latest PDPC guidance, leveraging frameworks like the ASEAN MCCs and CBPR and PRP systems, and implementing tools such as anonymisation, businesses can better navigate the evolving landscape and position themselves for sustainable growth in the digital economy.
10 Collyer Quay
10th Floor
Ocean Financial Centre
Singapore 049315
+65 6531 4110
+65 6535 4864
chongkin.lim@drewnapier.com www.drewnapier.com