Home / Blog / Data Protection

Since February 2021, Singapore's amended Personal Data Protection Act (PDPA) has required organisations to notify the Personal Data Protection Commission (PDPC) of certain data breaches. The mandatory notification regime introduced strict timelines and assessment criteria that every organisation must understand and prepare for. Failure to notify when required can result in additional penalties on top of those imposed for the breach itself.

When Is Notification Mandatory?

Not every data breach triggers the notification obligation. Under the PDPA, an organisation must notify the PDPC if the data breach meets either of two thresholds:

  • Significant harm: The breach results in, or is likely to result in, significant harm to affected individuals. This includes financial loss, identity theft, physical harm or damage to reputation
  • Significant scale: The breach affects 500 or more individuals, regardless of whether significant harm is likely

If either threshold is met, notification to the PDPC is mandatory. If significant harm is likely, the organisation must also notify the affected individuals.

The Three-Day Notification Timeline

The PDPA requires organisations to notify the PDPC within three calendar days of completing their assessment that a breach is notifiable. This is a tight timeline that demands preparation. The clock starts not from when the breach occurred or was discovered, but from when the organisation has assessed that the breach is notifiable.

However, organisations cannot delay their assessment unreasonably. The PDPC expects organisations to conduct their assessment expeditiously and has indicated that an overall timeline of 30 days from discovery to notification is generally expected. Organisations that take longer to assess may face scrutiny.

Step 1: Contain the Breach

The immediate priority when a breach is discovered is containment. This means taking steps to stop the breach from continuing and prevent further unauthorised access or disclosure of personal data. Containment actions may include:

  • Disabling compromised user accounts or credentials
  • Isolating affected systems from the network
  • Patching the vulnerability that was exploited
  • Changing passwords and access keys
  • Engaging incident response specialists if needed

Document all containment actions taken, including the time and date of each action. This documentation will be required when notifying the PDPC.

Step 2: Assess the Breach

Once the breach is contained, conduct a thorough assessment to determine its scope and impact. Key questions to address include:

  • What types of personal data were affected?
  • How many individuals are affected?
  • Is the data encrypted or otherwise protected?
  • Who had or may have had unauthorised access?
  • Is there evidence that the data has been misused?
  • What is the likelihood and severity of harm to affected individuals?

The PDPC has published guidance on assessing significant harm. Factors include the nature of the personal data involved, the circumstances of the breach, whether the data is publicly available and whether the organisation has taken steps to mitigate harm.

Step 3: Notify the PDPC

If the breach is assessed as notifiable, the organisation must notify the PDPC within three calendar days. The notification should be submitted through the PDPC's data breach notification form and must include:

  1. A description of the breach, including how and when it occurred
  2. The types of personal data involved
  3. The number of affected individuals
  4. Steps taken to contain the breach and mitigate harm
  5. Whether affected individuals have been or will be notified
  6. Contact details of the organisation's Data Protection Officer

The notification does not need to be complete in every detail. If the investigation is ongoing, the organisation can provide the information available at the time and supplement it later. However, the initial notification must be timely.

Step 4: Notify Affected Individuals

If the breach is likely to result in significant harm to affected individuals, the organisation must also notify those individuals. The notification should be made as soon as practicable and should include:

  • A description of what happened in plain language
  • The types of personal data involved
  • What the organisation is doing to address the breach
  • Steps individuals can take to protect themselves
  • Contact details for further information

The notification method should be direct and effective. Email or letter is generally appropriate. Public announcements may be necessary if individual contact is not practicable.

Step 5: Remediate and Prevent Recurrence

After addressing the immediate breach, the organisation must take steps to prevent similar incidents in the future. The PDPC expects organisations to learn from breaches and implement meaningful improvements. Remediation measures may include:

  • Conducting a thorough root cause analysis
  • Implementing additional technical controls such as encryption, access restrictions or monitoring
  • Updating security policies and procedures
  • Providing additional employee training on data handling and security
  • Engaging external specialists for a security review or penetration test
  • Reviewing and updating the incident response plan based on lessons learned

Building Your Breach Response Capability

The three-day notification timeline leaves little room for improvisation. Organisations that have not prepared in advance will struggle to meet the deadline while managing the operational impact of a breach. Essential preparation includes:

Document Your Incident Response Plan

Maintain a written incident response plan that defines roles, responsibilities, escalation procedures and communication templates. The plan should address both PDPC notification requirements and any sector-specific obligations.

Establish a Response Team

Identify the individuals who will form your breach response team. This typically includes IT security, legal, communications, the DPO and senior management. Ensure contact details are current and accessible outside business hours.

Conduct Regular Exercises

Test your incident response plan through tabletop exercises at least annually. Simulated breach scenarios help identify gaps in the plan, improve coordination between team members and build confidence in the response process.

Use a Compliance Platform

A data protection management platform can streamline breach assessment and notification by providing templates, workflow automation and documentation capabilities. Having the right tools in place before a breach occurs saves critical time during the response.

Common Mistakes to Avoid

The PDPC's published enforcement decisions reveal several recurring mistakes that organisations make when responding to data breaches:

  • Delayed discovery: Organisations that lack monitoring capabilities may not discover breaches for weeks or months, by which time the damage has compounded
  • Inadequate assessment: Rushing through or insufficiently documenting the breach assessment can lead to incorrect conclusions about notifiability
  • Incomplete notification: Providing vague or incomplete information to the PDPC reflects poorly on the organisation's response capability
  • Ignoring root causes: Addressing symptoms without fixing underlying vulnerabilities invites repeat incidents

Conclusion

Singapore's mandatory data breach notification regime requires organisations to be prepared, systematic and transparent in their response to data breaches. The three-day notification timeline is achievable only with advance preparation, clear processes and the right tools. Organisations that invest in breach readiness not only meet their regulatory obligations but also demonstrate to customers, partners and regulators that they take data protection seriously. If you need support building or reviewing your breach response capability, consider engaging professional DPO support services to ensure your organisation is prepared.

Continue Reading

Related Articles

Stay Informed

Explore Our Compliance Solutions

Browse all our cyber compliance resources or learn how our platform and expert services can help your organisation achieve and maintain compliance.

All Articles Contact Us
Contact Form