Frame-14

Privacy Ninja

        • DATA PROTECTION

        • CYBERSECURITY

        • Secure your network against various threat points. VA starts at only S$1,000, while VAPT starts at S$4,000. With Price Beat Guarantee!

        • API Penetration Testing
        • Enhance your digital security posture with our approach that identifies and addresses vulnerabilities within your API framework, ensuring robust protection against cyber threats targeting your digital interfaces.

        • On-Prem & Cloud Network Penetration Testing
        • Boost your network’s resilience with our assessment that uncovers security gaps, so you can strengthen your defences against sophisticated cyber threats targeting your network

        • Web Penetration Testing
        • Fortify your web presence with our specialised web app penetration testing service, designed to uncover and address vulnerabilities, ensuring your website stands resilient against online threats

        • Mobile Penetration Testing
        • Strengthen your mobile ecosystem’s resilience with our in-depth penetration testing service. From applications to underlying systems, we meticulously probe for vulnerabilities

        • Cyber Hygiene Training
        • Empower your team with essential cybersecurity knowledge, covering the latest vulnerabilities, best practices, and proactive defence strategies

        • Thick Client Penetration Testing
        • Elevate your application’s security with our thorough thick client penetration testing service. From standalone desktop applications to complex client-server systems, we meticulously probe for vulnerabilities to fortify your software against potential cyber threats.

        • Source Code Review
        • Ensure the integrity and security of your codebase with our comprehensive service, meticulously analysing code quality, identifying vulnerabilities, and optimising performance for various types of applications, scripts, plugins, and more

        • Email Spoofing Prevention
        • Check if your organisation’s email is vulnerable to hackers and put a stop to it. Receive your free test today!

        • Email Phishing Excercise
        • Strengthen your defense against email threats via simulated attacks that test and educate your team on spotting malicious emails, reducing breach risks and boosting security.

        • Cyber Essentials Bundle
        • Equip your organisation with essential cyber protection through our packages, featuring quarterly breached accounts monitoring, email phishing campaigns, cyber hygiene training, and more. LAUNCHING SOON.

What it means to get a Data Protection Trustmark Certification

data protection trustmark
Data Protection Trustmark Certification in Singapore

What it means to get a Data Protection Trustmark certification

We put various personal information to organizations for many purposes, such as our names, contact numbers, and our home and business address. We do this to help us easily transact with our trusted organizations who provide us services or keep us updated with the latest news and trends. However, how can we make sure that our data is kept safe? The Data Protection Trustmark is the answer.

Data Protection Trustmark, defined

The Data Protection Trustmark is a certification developed by the PDPC and Info-Communications Media Authority (IMDA). It is a voluntary enterprise-wide certification for organizations to exhibit accountability over data protection practices.

Such certification helps these organizations to build trust with their shareholders and customers and build their competitive advantage. You can find the list of Data Protection Trustmark-certified organizations here.

According to the certification framework, organizations like Privacy Ninja, certified with Data Protection Trustmark, have sound protection policies and practices that protect and manage their consumer’s personal data.

Also Read: Compliance With Singapore Privacy Obligations; Made Easier!

How Data Protection Trustmark helps in better data protection

Organizations that are DPTM-certified have data protection policies and practices laid, which are assessed by an approved third-party assessment body.

Under the certification framework of DPTM, it is required for Organizations to pass a set of robust and comprehensive criteria. According to Infocomm Media Development Authority, the following practices must be put in place:

  • Trained Data Protection Officer and staff to handle your personal data;
  • Reasonable collection, use, and disclosure of data with consent obtained and purpose made known;
  • Appropriate measures for protection, retention, and disposal of data;
  • Provision of withdrawal of consent, access and correction of data; and
  • Appropriate measures to take in the event of the data breach.


Furthermore, according to Digital Guardian, the following criteria must first be met to achieve DPTM compliance:

PRINCIPLE 1: GOVERNANCE AND TRANSPARENCY

Appropriate Policies and Practices

  • Establish data protection policies and practices
  • Establish queries, complaints, and dispute resolution handling processes
  • Establish processes to identify, assess and address data protection risks
  • Establish a data breach management plan
  • Appoint Data Protection Officer (DPO)

Openness

  • Make available business contact information of the DPO to the public
  • Provide information on personal data protection policies to external stakeholders

Internal Communication and Training

  • Communicate data protection policies and practices to all employees
  • Implement data protection training for all relevant internal stakeholder


PRINCIPLE 2: MANAGEMENT OF PERSONAL DATA
Appropriate Purpose

  • Ensure collection of personal data is for purposes that are clear and appropriate in the circumstances

Appropriate Notification

  • Ensure notification of the purposes for the collection of personal data, on or before the collection of personal data
  • Ensure notification of new purposes before the use or disclosure of personal data

Appropriate Consent

  • Ensure that consent for the purposes has been obtained on or before collecting the personal data
  • Ensure that consent for personal data with special considerations has been obtained

Appropriate Use and Disclosure

  • Ensure the use of personal data is for purposes for which consent has been obtained
  • Ensure the disclosure of personal data is for purposes for which consent has been obtained

Compliant Overseas Transfer

  • Ensure appropriate personal data transfer policies are implemented as required under law

PRINCIPLE 3: CARE OF PERSONAL DATA

Appropriate Protection

  • Ensure reasonable security policies and practices are implemented
  • Ensure third parties make reasonable security arrangements to protect personal data
  • Ensure testing of security measures

Appropriate Retention and Disposal

  • Ensure personal data retention policies are implemented
  • Ensure appropriate implementation of processes and methods for the disposal, destruction, or anonymization of personal data when there are no longer legal or business purposes to retain the personal data

Accurate and Complete Records

  • Ensure personal data for use or disclosure is accurate and complete
  • Ensure personal data disclosed to a third party organization is accurate and complete

PRINCIPLE 4: INDIVIDUALS’ RIGHTS

Effect Withdrawal of Consent

  • Ensure provision for the withdrawal of consent for the collection, use or disclosure of ‘individuals’ personal data

Provide Access and Correction Rights

  • Ensure provision for individuals’ access to their personal data in the organization’s possession or under its control on request
  • Ensure provision for individuals’ correction of their personal data in the organization’s possession or under its control on request
  • Customers can rest assured that with these practices put in place and criteria to be followed, their personal data will be safeguarded.
Data Protection Trustmark
What it means to be Data Protection Trustmark certified

Why do Organizations need to get a Data Protection Trustmark?


The Data Protection Trustmark is a visible indicator for organizations that these organizations adopt sound data protection practices. Once an Organization, like Privacy Ninja, has a DPTM certification, customers can ease their worries about keeping their data safe. Such certification means these organizations can be trusted in handling customer’s personal data.

According to PDPC, having a DPTM certification benefits Organizations in the following ways:

  • DPTM may serve as a mitigating factor against enforcement action in the event of a data breach. In addition, under the PDPC’s Active Enforcement Framework, the PDPC and/or the Data Protection Trustmark-certified organization that is able to demonstrate accountable data protection practices, may initiate an undertaking process.
  • DPTM can be an accountability tool to demonstrate to your customers, business partners and regulator that your organization adopts responsible data protection practices to manage personal data.
  • Data intermediaries/third parties that are DPTM-certified can assure their clients of their responsible data protection policies and practices.

Also Read: What You Need to Know About Singapore’s Data Sharing Arrangements

0 Comments

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Data Privacy updates weekly!

Personal Data Protection

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
×

Hello!

Click one of our contacts below to chat on WhatsApp

× Chat with us