New Straits Times

MALAYSIA HAS LONG WAY TO GO

Existing data privacy laws are not specific enough to provide protection

- The writer is a researcher at the Institute of Strategic and Internatio­nal Studies (ISIS) Malaysia

THE promise of the Internet — as an accelerato­r of education, knowledge and growth — is being deliberate­ly exploited by certain quarters through the inappropri­ate use of data.

In an explosive exposé last March, political consulting firm Cambridge Analytica (CA) had harvested personal data from about 50 million Facebook users for micro-targeting political campaigns.

This event, among many others, had led to government­s debating the premise of the Internet itself, and whether it is flawed.

Finding themselves in the United States Congressio­nal hearing “firing line” are Facebook superstar Mark Zuckerberg and Google CEO Sundar Pichai.

Across the North Atlantic, the United Kingdom’s Parliament­ary Committee had also inquired on CA’s alleged dubious operations, with a similar process occurring closer to home in Singapore, specifical­ly by the Parliament­ary Select Committee on Deliberate Online Falsehoods.

This raises an important question: should government­s develop and devise national informatio­n privacy laws?

In Malaysia, the Personal Data Protection Act (PDPA) 2010 is meant to be the vanguard of protection for informatio­n collected of an individual.

Notably, the PDPA 2010 only protects against the inappropri­ate use of personal data for commercial purposes.

Even then, 2017 saw a massive data breach affecting the customer data of more than 46 million mobile subscriber­s in Malaysia to an online community forum.

This highlights that despite the PDPA 2010, severe gaps in data management and protection remain.

Besides, it is worth noting that PDPA has no provisions that specifical­ly address the issue of online privacy, which includes data such as geolocatio­n, and cookies, for example.

Making matters worse is that the PDPA 2010 is inapplicab­le if the personal data is processed outside Malaysia.

Relevantly, as things stand with technologi­cal advancemen­ts and an essentiall­y borderless cyber realm, Malaysia is unprepared to deal with data privacy matters and in danger of future data breaches happening on larger scales.

Since data is the currency of the 21st century, and with the mainstream­ing of the Internet of Things (IoT), which will make data even more personal (and intrusive), it should be the government’s priority to strengthen existing data privacy laws.

The government should also consider introducin­g other protection laws, drawing inspiratio­n from the approaches taken by other countries on the matter.

For example, Europe considers data privacy as a top priority, leading to the European Union’s adoption of the General Data Protection Regulation (GDPR) in May 2018. The GDPR, which supersedes the 20-year-old Data Protection Directive, establishe­s more stringent rules than before, and governs how companies harvest and manage data, and posing hefty penalties to violators.

In the US, regulation­s pertaining to the Internet are often probusines­s and loosely regulated. The primer legislatio­n for this is the Communicat­ions Decency Act 1996, which lays out provisions on the liability of online platforms, among other things. This legislatio­n essentiall­y absolves tech companies of any liability regarding the conduct of third parties on user data.

Meanwhile, government­s in Canada and Australia have specific laws for online individual privacy protection with their Digital Privacy Act and Privacy Act 1988 respective­ly.

On the other end of the spectrum is the cyber landscape in China. Case in point is China’s “Great Firewall” — the Chinese government’s efforts to assert data-sovereignt­y.

This is in part an attempt to ensure that the data remains within Chinese borders at all times, giving Beijing jurisdicti­on over the use and regulation of these data. Furthermor­e, under China’s 2017 Cybersecur­ity Law, authoritie­s have enshrined its jurisdicti­on to access data without due process.

Notwithsta­nding the “Great Firewall” which restricts access to foreign websites and platforms, there remain ways to bypass these restrictio­ns, including the use of Virtual Private Networks (VPNs) and proxy, among others.

Despite the rigid legal framework governing the Internet in China, it has not hindered the Chinese technology industry’s ability to spur and ultimately create local competitio­n to match Silicon Valley. The burgeoning tech industry is also in line with China’s aim of becoming a world leader in key technologi­cal industries through its “Made in China 2025” plan.

Yet, robust technologi­cal dependency in China also means that they too are vulnerable to data leakages. For instance, the Financial Times reported that a survey by the China Consumer Associatio­n showed 85 per cent of respondent­s have had their data leaked, phone numbers solicited illegally, or bank account informatio­n compromise­d.

To address these compoundin­g issues, the Chinese government is in the early stages of devising data management regulation­s. These include consent for data collection, data usage and sharing user-requested deletion of informatio­n they consider personal through their data protection system known as the Personal Informatio­n Security Specificat­ion.

It is quite obvious that the PDPA 2010 lags behind similar data protection and regulation initiative­s elsewhere. Moving forward, the Department of Personal Data Protection (DPDP) should at the very least devise specific guidelines on handling data breach incidents. This is to mitigate the negative consequenc­es of a data breach for individual­s and organisati­ons, be they public or private.

Recently, Communicat­ions and Multimedia Minister Gobind Singh Deo stated that the government is committed to a review of its data protection laws by mid2019 to prevent data breaches from happening. This renewed commitment is timely to fill the gaps with regard to data privacy and protection.

Such measures are needed not just to protect individual freedom and rights, but also for national security.

This is especially given how data around the world has been manipulate­d, influencin­g even local politics and illicit financial flows.

The ability to harvest personal data irresponsi­bly either by individual­s or organisati­ons may trigger the government to introduce more holistic data regulation­s.

While more measures can be considered, the matter has to be approached delicately without compromisi­ng public interests.

... the Department of Personal Data Protection (DPDP) should at the very least devise specific guidelines on handling data breach incidents ... to mitigate the negative consequenc­es of a data breach for individual­s and organisati­ons ...

 ?? REUTERS PIC ?? The government should consider other data protection and privacy regulation­s in addition to existing laws.
REUTERS PIC The government should consider other data protection and privacy regulation­s in addition to existing laws.
 ??  ??
 ??  ??

Newspapers in English

Newspapers from Malaysia