Frame-14

Privacy Ninja

        • DATA PROTECTION

        • CYBERSECURITY

        • Secure your network against various threat points. VA starts at only S$1,000, while VAPT starts at S$4,000. With Price Beat Guarantee!

        • API Penetration Testing
        • Enhance your digital security posture with our approach that identifies and addresses vulnerabilities within your API framework, ensuring robust protection against cyber threats targeting your digital interfaces.

        • On-Prem & Cloud Network Penetration Testing
        • Boost your network’s resilience with our assessment that uncovers security gaps, so you can strengthen your defences against sophisticated cyber threats targeting your network

        • Web Penetration Testing
        • Fortify your web presence with our specialised web app penetration testing service, designed to uncover and address vulnerabilities, ensuring your website stands resilient against online threats

        • Mobile Penetration Testing
        • Strengthen your mobile ecosystem’s resilience with our in-depth penetration testing service. From applications to underlying systems, we meticulously probe for vulnerabilities

        • Cyber Hygiene Training
        • Empower your team with essential cybersecurity knowledge, covering the latest vulnerabilities, best practices, and proactive defence strategies

        • Thick Client Penetration Testing
        • Elevate your application’s security with our thorough thick client penetration testing service. From standalone desktop applications to complex client-server systems, we meticulously probe for vulnerabilities to fortify your software against potential cyber threats.

        • Source Code Review
        • Ensure the integrity and security of your codebase with our comprehensive service, meticulously analysing code quality, identifying vulnerabilities, and optimising performance for various types of applications, scripts, plugins, and more

        • Email Spoofing Prevention
        • Check if your organisation’s email is vulnerable to hackers and put a stop to it. Receive your free test today!

        • Email Phishing Excercise
        • Strengthen your defense against email threats via simulated attacks that test and educate your team on spotting malicious emails, reducing breach risks and boosting security.

        • Cyber Essentials Bundle
        • Equip your organisation with essential cyber protection through our packages, featuring quarterly breached accounts monitoring, email phishing campaigns, cyber hygiene training, and more. LAUNCHING SOON.

Free Privacy Policy Compliance Review

Importance of a Compliant Privacy Policy

Drafting Privacy Policy
Drafting a Privacy Policy with no knowledge or external help may be daunting.

A Privacy Policy is not only the legally required document to disclose your practices on protecting personal information, but it also allows you to show both your internal and external stakeholders, customers and regulators that you can be trusted, and that you have procedures in place to handle their personal information with care.

This article will discuss the PDPA and third-party requirements while showing examples of the necessary clauses that your Privacy Policy should have. By the end you’ll know why you need one and have a start on creating your own.

Mandatory Under the PDPA

Sections 11 and 12 of the Personal Data Protection Act (PDPA) form the Accountability obligation under the PDPA. Requirements include every organization needing to develop and implement policies for data protection, and making available to the public the Business Contact Information (BCI) of the Data Protection Officer (DPO)/any designated individuals ensuring the Organization’s PDPA compliance.

Privacy Policies Are Required by Third-party Services

Free Privacy Policy Compliance Review
Example of Apple App Store Privacy Policy requirements

What to Include in a Privacy Policy​

There is no standardized format, but it is logical to cover the 9 obligations of the PDPA. A recommended list of items to be included are as follows:

  1 – Introduction
  2 – How Personal Data is Collected
  3 – Types of Personal Data Collected
  4 – How Personal Data is Used
  5 – Parties that Personal Data are Disclosed to
  6 – Management of the Collection, Usage and Disclosure of Personal Data
  7 – Ensuring Accuracy of Personal Data
  8 – Protection of Personal Data
  9 – Retention of Personal Data
10 – Access and Correction Methods to Personal Data
11 – Transference of Personal Data Overseas
12 – Data Protection Officer Contact Information
13 – Last Updated On

You Don't Need to Start from Scratch

We don’t recommend grabbing the Privacy Policy from another website online, as every business has different data collection and handling processes. Furthermore you will need to have basic knowledge on how to edit the Privacy Policy content to fit your business. 

A good news for SMEs is that the Personal Data Protection Committee (PDPC) has made available a FREE Data Protection Notice Generator tool that you can use to create your base template by simply answering a series of questions. 

FREE Privacy Policy Compliance Review

If you find the above information too complicated, fret not! Privacy Ninja is performing a complimentary Privacy Policy review for companies for a limited time only.

All you need to do is contact us and ask for it!

0 Comments

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Data Privacy updates weekly!

Personal Data Protection

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
×

Hello!

Click one of our contacts below to chat on WhatsApp

× Chat with us