Data Protection and Cybersecurity 2022
Data Protection and Cybersecurity 2022
and
Cybersecurity
1
Laws and Regulations on Data Protection
Provisions of Personal Data (Privacy) Ordinance (“PDPO”), Cap
486《個人資料(私隱)條例》
Personal Identifiers
Work
2
History of the PDPO
3
Objectives of PDPO
4
Office of the Privacy Commissioner for Personal Data
個人資料私隱專員公署
To promote the protection and respect for personal data privacy through
and enhancement, taking into account global standards for the protection of
personal data privacy.
5 Source: http://www.pcpd.org.hk
Definition - Personal Data
Personal data means any data:-
(a) relating directly or indirectly to an individual ;
(b) from which it is practicable to ascertain directly or indirectly the identity
of an individual; and
(c) in a form in which access to or processing of the data is practicable.
Examples - Name, age, HKID card number, telephone number, address, sex,
salary, occupation, nationality, photos, medical records, employment records
of an individual, etc.
(Case : Chow Kei Leung and The Privacy Commissioner of Personal Data (2010))
6
Data subjects’ rights under PDPO
Six Data Protection Principles (DPP) give data subjects certain
rights, including certain rights:
to be informed of whether a data user holds their personal data;
to access their personal information;
to object to certain processing causing substantial damage or distress;
to rectify their personal data they consider to be inaccurate;
any charge for providing a copy of personal data to a data subject should not
be excessive;
data subjects may complain to the Privacy Commissioner for Personal Data
for any breach and claim for damages through civil proceeding;
To inform the data subject at the time of collection of his data whether the
data will be used for direct marketing; and
When using data for direct marketing for the first time, to inform the
individual of his “opt-out” right free of charge and stop using data for direct
7
marketing if he opts out.
Exemptions to PDPO
A general exemption for personal data held for domestic or
recreational purposes;
9
Six Data Protection Principles (“DPP”) of PDPO - Schedule 1
(收集目的及方式)
(準確性及保留期間)
10
Principle 1 – Purpose and Manner of Collection of
Personal Data
Purpose : lawful
15
Examples of Principle 4
1. Ensure staff processing the data are trained
2. Take reasonable steps to ensure reliability of employees who get access to
personal data
3. Only authorized personnel should lock files in a secured cabinet
4. Use sealed envelop for transmission of personal data
5. Use dedicated fax machine to fax confidential documents
6. Confidential documents should be shredded before disposal
7. Use encryption, confidential mailbox and passwords for electronic storage
and transmission
6. If data processing are outsourced to third parties need the data
processor to offer guarantee
7. Devise an action plan to deal with security breaches
8. High security measures on sensitivity data such as identity card number,
bank account data, health data, credit card data, etc.
16
Principle 5 – Information to be Generally Available
the kinds of personal data they hold and the purpose for
17
Examples of Principle 5
• Privacy Policy Statement
• A general statement of an organisation’s privacy policy and
practices that applies to the organisation’s collection,
holding and use of recorded information about individuals as
a whole.
• It encompasses information such as accuracy, retention
period and security of the data as well as measures in
relation to data access and data correction requests.
• Right of Access
• an individual can ask a credit reference agency to provide a copy of his credit
records,
• patients requesting copies of their medical records,
• employees requesting copies of their employment-related records, such as
performance appraisal reports.
• Access and correction requests – the company should accede to the access and
correction requests within a statutory period of 40 days. If the company fails to
process such requests, it has to provide a reply and state the reasons within 40
days.
• Excessive fee – the company should not charge more than the direct cost of
19 complying with the access requests.
Best Practice – Policy Guideline
Data are obtained and processed fairly and lawfully, for specified purposes
Personal data shall be obtained only for one or more specified purpose
Personal data shall be adequate, relevant and not excessive in relation to
the purpose for which it is processed
Ensure that they are accurate & up-to-date
Erase personal data which are no longer necessary
Kept for not longer than necessary
In accordance with the individuals’ rights
Process data in a secure environment
Take all reasonable steps to ensure that personal data are protected
against unauthorized or accidental access
Allow data subject to access and correct personal data
Take all reasonable steps to ensure that a person can be informed of the
kind of personal data and the main purpose of which the company are to
20 be used
Direct marketing
Under the PDPO, “direct marketing” means
Offering of goods, facilities or services;
Advertising of the availability of goods, facilities or services;
Solicitation of donations or contributions or other purposes, by
means of information or goods sent to any person by mail,
facsimile transmission, electronic mail, or other similar means
of communication where the
information or goods are addressed to a specific person or
specific persons by name; or
telephone calls made to specific persons.
21
Use of Personal Data for Direct Marketing
Written Notification to data subject to obtain consent in writing
and provide the data subject with the written notice on:
intended use for direct marketing
the kind of data to be used for direct marketing
product/services
cannot use for direct marketing without written consent or no
objection;
It is prudent to provide such information by way of Personal
Information Collection Statement.
22
Use of Personal Data for Direct Marketing
Use easily understandable and readable wording.
Example
• Do not use vague and loose terms like “marketing goods and/or
services by us, our agent, our subsidiaries, or our partners”, or
• Bury the information in small print which is difficult to read with
normal eyesight.
• For Personal Information Collection Statement (PICS) 收集個
人資料聲明, it should be written in language that is easy to
understand, presented in a conspicuous manner and printed in a
font size that is easy to read with normal eyesight.
(Case : Wing Lung Bank Limited and The Privacy Commissioner for
Personal Data (2009))
• If oral consent, the data user should send a written confirmation
to the individual within 14 days.
23
Use of Personal Data for Direct Marketing
Example
when sending marketing information to a data subject for the first
time, the data user should highlight this opt-out right and provide
a link for the data subject to make the request. (In practice, data
users often include the opt-out clause in all marketing. A data
subject has the right to opt out from direct marketing at any time
notwithstanding consent given previously)
• Data user should keep and update the list of individuals who
have opted out from direct marketing and refrain from using
their data for direct marketing.
25
Provision of Personal Data to Another for Direct Marketing
• Data user should consider whether it will provide personal data of its
customers and other individuals to another person for use of that other
person in direct marketing.
• If a data user is unable to meet the written notification and written consent
requirements, it should not provide an individual’s personal data to another
person for use in direct marketing.
• Data user should keep and update the list of individuals who do not consent
or have revoked.
• Data user should review and update its internal policies and procedures and
to provide appropriate training to its staff, agents and representatives.
27
Disclosure of Personal Data Obtained without Consent
28
The Personal Data (Privacy) (Amendment) Ordinance
2021
Objectives
A person who (i) discloses any personal data of a data subject without the relevant
consent of the data subject; and (ii) has an intent to or is being reckless as to whether any
specified harm would be, or would likely be, caused to the data subject or any family
member of the data subject, is liable on summary conviction to a maximum penalty of a
fine at level 6 (i.e. HK$100,000) and to imprisonment for 2 years.
A person who (i) discloses any personal data of a data subject without the relevant
consent of the data subject; (ii) has an intent to or is being reckless as to whether any
specified harm would be, or would likely be, caused to the data subject or any family
member of the data subject; and (iii) the disclosure causes any specified harm to the data
subject or any family member of the data subject, is liable on conviction on indictment to
30 a maximum penalty of a fine of HK$1,000,000 and to imprisonment for 5 years.
The Personal Data (Privacy) (Amendment) Ordinance
2021
31
Code of Practice on Human Resource Management
Effective on 1 April 2001
employees’ matters.
Recruitment
Adequate but not excessive
Cannot collect a copy of HKID of job applicant
Integrity checking should be for the purpose of suitability or relevant to
the job
Health condition should be an inherent requirement of a job / medical
exam
Unsuccessful applications may be retained for a period of 2 years from the
date of rejecting applicant
32
Code of Practice on Human Resource Management –
Current employment
Collect additional personal data for employment purpose
PICS Example: staff benefits, payroll, performance appraisal,
promotion, career development.
Disciplinary proceedings
Obtain employee’s consent for disclosing personal data to third parties
(avoid excessive disclosure)
Monitor the third parties to protect personal data
34
Code of Practice on the Identity Card Number and other
Personal Identifiers
35
Identity Card Number
As a general rule, no right to compel an individual to provide an ID card
number unless authorised by law. Before you collect and retain ID number,
should:
1. Consider alternatives to collecting ID card numbers.
2. Check whether your collection of ID card numbers comes under one or other of the
circumstances where this is permitted in the code (e.g. keeping ID numbers of
employees).
3. Check whether the way you collect ID card numbers ensures that they are truly the
ID card numbers of the individuals providing them (e.g. ID card physically provided
in person).
4. Check that you use ID card numbers only for one or other of the purposes permitted
by the code (e.g. a bank may use the ID card number as a key to link the records
relating to a particular customer)
5. Check that you are NOT publicly displaying or disclosing ID card numbers with the
names of the ID card holders and that you are NOT issuing cards such as staff cards
with ID card numbers printed on them (e.g. lucky draw announcement in
newspaper).
6. Check that you do not keep records of ID card numbers for longer than is necessary
36 to fulfill the purpose for which they were collected.
Copy of Identity Card
As a general rule, no right to compel an individual to provide a copy of an ID card unless
authorised by law. Before you collect and retain ID copy, please:-
1. Check whether your collection of copies of ID cards comes under one or other of the
circumstances where this is permitted in the code (e.g. collect ID copy from employees).
2. Make sure that your collection of copies of ID cards does NOT come under one or other
of the circumstances where this is specifically NOT permitted in the code (e.g. collect ID
copy during job application status).
3. Check that you use ID card numbers only for one or other of the purposes permitted by
the code (e.g. a bank may use the ID card number as a key to link the records relating to
a particular customer)
4. Check that you are NOT publicly displaying or disclosing ID card numbers with the
names of the ID card holders and that you are NOT issuing cards such as staff cards with
ID card numbers printed on them (e.g. lucky draw announcement in newspaper).
5. Check that you do not keep records of ID card numbers for longer than is necessary to
fulfill the purpose for which they were collected.
37
Employee Monitoring at Workplace
38
Evaluating the Needs of Employee Monitoring
39
Managing Personal Data collected from Employee
Monitoring
employee monitoring
monitoring
monitoring records
40
Privacy Policy on Employee Monitoring
Purposes of monitoring
to facilitate efficient business operation, e.g. responding to
customers’ feedback/needs
to maintain a stable e-mail service environment for
communications
to provide information for management to ensure the proper
utilization of the company’s resources
in emergency situations
42
information, etc.
Privacy Policy on Employee Monitoring
PCPD also published the Guidance for Data Users on the Collection and Use of
Personal Data through the Internet (revised in April 2014)
Source:Yuet Ming Tham, ‘ The Privacy, Data Protection and Cybersecurity Law Review: Hong Kong’
44
Technology and data privacy
PCPD published the information leaflet 'Cloud Computing' in November 2012.
The revised information leaflet (July 2015) on Cloud Computing (i) advise
cloud users on privacy, assessment of benefits + risks of cloud services and
implications for safeguarding personal data privacy.; (ii) advise organisations on
types of assurances or support they should obtain from cloud service providers
to protect the personal data entrusted to them.
PCPD published ‘Tips for Using Fintech’ in March 2019 – advise users in
protecting their personal data privacy in the use of fintech and recommends
good practices for fintech providers or operators.
HKMA issued a circular in May 2019 on the Use of Personal Data in Fintech
Development to encourage authorised institutions to adopt and implement the
Ethical Accountability Framework (EAF) for the collection and use of personal
data issued by the PCPD
Source:Yuet Ming Tham, ‘ The Privacy, Data Protection and Cybersecurity Law Review: Hong Kong’
45
Technology and data protection
PCPD published ‘Guidance on the Ethical Development and Use of
Artificial Intelligence’ in August 2021 to facilitate healthy development and
use of AI in Hong Kong and assist corporations in complying with the
Personal Data (Privacy) Ordinance in the development and use of AI.
Personal data is used in the development and use of AI
47Source: Guidance on the Ethical Development and Use of Artificial Intelligence (PCPD)
Technology and data protection
Ethics in the development and use of AI
• Organisations should embrace good data ethics in their operation, and in
Source: Guidance on the Ethical Development and Use of Artificial Intelligence (PCPD)
49
Technology and data protection
Guidance on the Ethical Development and Use of Artificial
Intelligence’
50
Source: Guidance on the Ethical Development and Use of Artificial Intelligence (PCPD)
Technology and data protection
Guidance on the Ethical Development and Use of Artificial
Intelligence’
Seven ethical principles for AI
Accountability – orgainisations should be responsible for what they do and
use of AI
stakeholders
Source: Guidance on the Ethical Development and Use of Artificial Intelligence (PCPD)
52
Technology and data protection
Source: Guidance on the Ethical Development and Use of Artificial Intelligence (PCPD)
53
Cybersecurity and data breaches
Cyberattack - data breaches and number of
individuals affected
2018 – Marriott Hotel (383m); Twitter (330m); Facebook (140m); Uber
(57m); Cathay Pacific (9.4m).
2019 – Capital One (Bank)(160m); Zynga (Online game developer)(218 m);
Facebook (419m).
2020 – Estee Lauder (440m); Microsoft (250m); Instagram, TikTok, Youtube
(235m); Marriott Hotel (5.2m).
2021 – Facebook (533m); LinkedIn (500m); Clubhouse (1.3m); Air India
(4.5m)
2022 – Harbor Plaza Hotel (>1.2m guests); Hong Kong Technology Venture
Company Limited (HKTV) (4.38m registered customers); Marriott Hotel in
Baltimore (confirmed data breach on 6 July 2022 – to notify 300-400
individuals)
54
Cybersecurity and data breaches
•Loss of customers
•Online vandalism
•Financial loss
•Ransoms
55
Cybersecurity and data breaches
Cyberattack
Source:Yuet Ming Tham, ‘ The Privacy, Data Protection and Cybersecurity Law Review: Hong Kong’
57
Cybersecurity and data protection
Security of personal data
1. Ensure staff processing the data are trained
2. Take reasonable steps to ensure reliability of employees who get access to
personal data
3. Only authorized personnel should lock files in a secured cabinet
4. Use sealed envelop for transmission of personal data
5. Use dedicated fax machine to fax confidential documents
6. Confidential documents should be shredded before disposal
7. Use encryption, confidential mailbox and passwords for electronic storage
and transmission
6. If data processing are outsourced to third parties need data processor
to offer guarantee
7. Devise an action plan to deal with security breaches
8. High security measures on sensitivity data such as identity card number,
58 bank account data, health data, credit card data, etc.
Cybersecurity
Cyber Security and Technology Crime Bureau – handle
Source: Cyber Defender of Cyber Security and Technology Crime Bureau (HK Police Force)
59
Cybersecurity
Cyberattack
Advanced Persistent Threat Attack (APT attack) – A common cyberattack
targeted on specific organisations for stealing their confidential information step by
step via phishing e-mails, phishing websites, watering hole attacks.
Source: Cyber Defender of Cyber Security and Technology Crime Bureau (HK Police Force)
60
Cybersecurity
Cyberattack
Rasomware attack – Ransomware is malicious software that prevents or
restricts a user from accessing a computer system by freezing the computer’s
screen or encrypting the computer files unless a ransom is paid.
Example: An overseas computer manufacturer in 2021was attacked by a hacker
using triple extortion, involving a ransom of nearly 400 million Hong Kong dollars.
The hacker stole the product design plans between the company and its partner.
The company refused to pay ransom, the hacker published its design plans online,
and even extorted payment directly from its partner.
Security measures: Perform regular backups on important data and keep the
backup copies disconnected from the computer; Install the latest patches for
operating systems and software in use; Keep your anti-malware program and
signatures up-to-date; Schedule a regular full scan to detect and guard against
malware attacks; Do not open any suspicious emails or instant messages, as well as
the attachments and hyperlinks inside; Refrain from visiting suspicious websites or
downloading any files from them.
Source: Cyber Defender of Cyber Security and Technology Crime Bureau (HK Police Force)
61
Cybersecurity
Cyberattack
Phishing attack – Hackers send phishing emails or text messages impersonating
organisations (e.g. financial institutions, public institutions, postage services, online
payment service providers, online retailers or business partners), with links (or QR
codes) directing to phishing websites, and trick recipients to input login passwords,
personal information, credit card details, etc. Hackers may also attach links (or QR
codes or files) in the messages. If the recipients click on the links or open
attachments, their devices may be infected by malware.
Security measures
•Do not open unknown e-mails or messages
•Check sender’s details
•Do not click on hyperlinks
•Do not log into unverified websites
•Pay extra attention if you were asked for personal or credit card details
•If case of suspected scam, save relevant e-mails or messages and report to police
62Source: Cyber Defender of Cyber Security and Technology Crime Bureau (HK Police Force)
Cybersecurity
• Cyber incidents have increased in frequency and magnitude. Complex
cyberthreats due to the use of sophisticated techniques.
• Financial risks
• Loss of confidentiality, integrity, critical business processes, and
information assets.
• Operational impacts e.g., inability to produce goods and services,
system downtime, missed opportunities, and an outsized focus on
incident or breach management impacts can be significant.
• Loss of customers’ trust
• Company’s brand damaged
63Source: Deloitte Center for Financial Services and the Deloitte Centre for Board Effectiveness
Cybersecurity
Cyber incidents and cyber risks threats to corporations
Cybersecurity top priority to corporate boards
Securities and Exchange Commission’s proposal on
‘Cybersecurity Risk Management, Strategy, Governance, and
Incident Disclosure’ (March 2022)
Policies and procedures to identify and manage cybersecurity risks
65
Source: Deloitte Center for Financial Services and the Deloitte Centre for Board Effectiveness
Cybersecurity law
No single law deals with cyber crime currently in HK
The following organisations, which are supported by HKSAR, respond to cyber
threats and incidents:
Hong Kong Emergency Response Team Coordination Centre
(managed by HK Productivity Council) for coordinating responses for local
enterprises and internet users
Government Computer Emergency Response Team Hong Kong
a work unit under the Office of the Government Chief Information Officer
for coordinating and handling incidents relating to both the private and
public sectors.
Hong Kong Police Force Cyber Security and Technology Crime
Bureau, which is responsible for handling cybersecurity issues and
combating computer crime.
Source:Yuet Ming Tham, ‘ The Privacy, Data Protection and Cybersecurity Law Review: Hong Kong’
66
Cybersecurity law
Consultation Paper on Cyber-Dependent Crimes and Jurisdictional
Issues dated 20 July 2022
‘The Cybercrime Sub-committee of the Law Reform Commission published the
Source: HKSAR Press Release 20 July 2022/The Law Reform Commission of Hong Kong
67
Cybersecurity law
Recommendations from the Law Reform Commission
Five cyber-dependent offences:
• illegal access to a programme or data;
• illegal interception of computer data;
• illegal interference of computer data;
• Illegal interference of computer system; and
• possessing a device or data for committing a crime.
•Hong Kong courts may assume jurisdiction if the
perpetrator's act has caused or may cause serious damage to Hong
Kong.
•Offenders of the proposed offences could be jailed for up to 14
years, and could get life imprisonment if their acts involve
endangering people's lives.
Source: HKSAR Press Release 20 July 2022/The Law Reform Commission of Hong Kong
68
Cybersecurity
Corporations to focus on cyber risk governance Boards to
oversee strategies, policies and procedures to mitigate
cyber risk.
Measures to promote increased focus
• Cyber risk assessment;
• Response plan – practiced through scenario or wargaming exercises to
improve corporation’s ability to respond and recover in case of cyberattack;
evaluation of the plan;
• Recovery plan;
• A review team includes senior management and each line of business and
corporate function;
• Annual review of cybersecurity budgets by board or audit committee;
69
Source: Deloitte Center for Financial Services and the Deloitte Centre for Board Effectiveness
Cybersecurity
Measures to promote increased focus
• Create a culture of awareness and accountability and promote a
culture of cyber risk consciousness as part of the overall enterprise risk
management structure in enhancing cybersecurity;
• External review of cyber risk programs (including governance structure
for cyber risk and strategy and implementation of mitigation controls;
• Review reports on risk assessments at third parties, e.g. vendors and
suppliers in cloud, mobile, hosing and software-as-a service arrangements (to
confirm these organisations are complying with the corporation’s cyber risk
programs and standards).
70Source: Deloitte Center for Financial Services and the Deloitte Centre for Board Effectiveness
Cybersecurity
National Association of Corporate Directors (NACD)
• Suggests boards to consider 5 cybersecurity principles in
enhancing their oversight of cyber risk.
Five principles
• Cybersecurity as a risk management issue for the entire enterprise and not just a
technology or IT issue;
• Boards should understand the legal aspects of cyber risks;
• Direct – metrics for monitoring cyber key performance indicators and controls
testing help to detect cyber incidents.
72
Source: Deloitte Center for Financial Services and the Deloitte Centre for Board Effectiveness
Cybersecurity
National Institute of Standard and Technology (NIST) framework
• Strategy of NIST framework focuses on 5 functions
• Respond – what actions to take in minimizing impacts of a cyber incident?
crisis response planning practicing response via scenario planning or wargaming.
Companies may consider when and how to engage local, national, and global law
enforcement resources.
Source: Deloitte Center for Financial Services and the Deloitte Centre for Board Effectiveness
73
Cybersecurity
Effective board in the oversight of cyber risk
• Cyber awareness from the top
• Participate in organizational awareness programs
• Demonstrate due diligence, ownership and effective governance of cyber risk
• Hold regular board and committee meetings to understand the threat
landscape, business-critical risks and metrics (of which may be developed with
respect to cyber risk management and mitigation, e.g. overdue security
assessments, third-party incidents and recovery testing, overdue access
reviews, deficient password requirements, asset threats, etc.)
• Evaluation of the impact of an incident and company’s existing cyber incident
response plan
• Review policies and cyber risk framework (to create a culture of awareness
and accountability) and discuss cybersecurity related issues with the relevant
people in the management.
Source: Deloitte Center for Financial Services and the Deloitte Centre for Board Effectiveness
74
References
Personal Data (Privacy) Ordinance (Chapter 486)
https://www.elegislation.gov.hk/hk/cap486
Personal Data (Privacy)(Amendment) Ordinance 2021 Implementation Guideline
https://www.pcpd.org.hk/english/doxxing/files/GN_PDPAO_e.pdf
Code of Practice on Human Resource Management (PCPD)
http://www.pcpd.org.hk/english/data_privacy_law/code_of_practices/files/hrdesp_e.pdf
Codes of Practice on Human Resource Management Compliance Guide for Employers
and HRM Practitioners (PCPD)
http://www.pcpd.org.hk/english/data_privacy_law/code_of_practices/files/ehrm_e.pdf
Frequently Asked Questions About Recruitment Advertisements (Nov 2014)
http://www.pcpd.org.hk/english/data_privacy_law/code_of_practices/files/faq_recruitment
_e.pdf
Code of Practice on Consumer Credit Data (PCPD)
http://www.pcpd.org.hk/english/ordinance/files/CCDCode_2013_e.pdf
Code of Practice on Code of Practice on the Identity Card Number and other Personal
Identifiers (PCPD)
http://www.pcpd.org.hk/english/ordinance/files/picode_e.pdf
75
References
Cyber Defender of Cyber Security and Technology Crime Bureau (HK Police Force)
30 Best Practices for Preventing a Data Breach, BestSecurityScorecard
https://securityscorecard.com
Yuet Ming Tham, ‘ The Privacy, Data Protection and Cybersecurity Law Review: Hong Kong’
https://thelawreviews.co.uk/title/the-privacy-data-protection-and-cybersecurity-law-review/hong-kong
HKSAR Press Releases
The Law Reform Commission of Hong Kong
Deloitte Center for Financial Services and the Deloitte Centre for Board Effectiveness
https://www2.deloitte.com/us/en/pages/center-for-board-effectiveness/articles/a-new-chapter-in-
cyber.html
Securities and Exchange Commission’s proposal on ‘Cybersecurity Risk Management, Strategy,
Governance, and Incident Disclosure’ (March 2022)
Guidance on the Ethical Development and Use of Artificial Intelligence (PCPD)
https://www.pcpd.org.hk
76
Written Notification Sample
77
Written Notification Sample
Classes of persons to whom the data will be sold
Banks and financial institutions
Credit card companies
Insurance companies
Telecommunication companies
Charities
Political parties
78
Written Notification Sample
RESPONSE FACILITY FOR WRITTEN CONSENT
You may consent or object to any or all of the above by completing, signing and
returning this form to us or otherwise notifying us in writing.
79
Written Notification Sample
When completed, this form may be returned to our Data Protection Office at
the address set out below.
Hong Kong
Signed Date
80