SlideShare a Scribd company logo
State of
Cybersecurity, Data
Protection Policy,
and Cloud Adoption
in Asia Pacific
Ms LIM May-Ann @eilonwy mayann@trpc.biz
Executive Director, Asia Cloud Computing Association (ACCA) and
Managing Director, TRPC Pte Ltd
https://www.nist.gov/cyberframework
Part I: Cybersecurity
Cybersecurity in Asia Pacific
https://www.kearney.com/web/southeast-asia/article?/a/cybersecurity-in-asean-an-urgent-call-to-action
Cybersecurity in Asia Pacific
Part II: Data Protection Policy
ASEAN Framework on Personal Data
Protection 2016: Principles of Personal Data
Protection
1. Consent, Notification, and Purpose
2. Accuracy of Personal Data
3. Security Safeguards
4. Access and Correction
5. Transfers to another country or territory
6. Retention
7. Accountability
https://trpc.biz/the-trpc-data-protection-index-2020/
Assessing the State of Data Privacy in Asia Pacific
The DPI 2020 questions are as follows:
1. Does the economy have a personal data protection law?
2. Does the economy have a privacy enforcement authority (PEA)?
3. [ASEAN Principle 1. Consent, Notification and Purpose] Does the
personal data protection law require that organisations obtain
consent from individuals, and notify them of the purposes of
collection, use, and disclosure of their personal information by the
organization?
4. [ASEAN Principle 1. Consent, Notification and Purpose] Does the
personal data protection law have clear instructions on exemption
circumstances by which consent from individuals for the collection,
use, and disclosure of their personal information, is NOT required?
E.g. where collection of personal information is authorised or
required under domestic laws and regulations?
5. [ASEAN Principle 2. Accuracy of Personal Data] Does the personal
data protection law require organisations to ensure that personal
data be accurate and complete for the extent necessary for the
purpose(s) for which the personal data is to be used or disclosed?
6. [ASEAN Principle 3. Security Safeguards] Does the personal data
protection law require that personal data be appropriately
protected against loss and unauthorised access, collection, use,
disclosure, copying, modification, destruction or similar risks?
7. [ASEAN Principle 4. Access and Correction] Does the personal data
protection law require organisations to, upon request from
individuals, provide the individual access to his/her personal data
which is in the possession or under the control of the organisation
within a reasonable period of time, and correct an error or
omission in his personal data, unless domestic laws and regulations
require or authorise the organisation not to provide access or
correct the personal data in the particular circumstances?
8. [ASEAN Principle 5. Transfers to Another Country or Territory] Does
the law require that, before transferring personal data to another
country or territory, the organisation should obtain the consent of
the individual for the overseas transfer?
9. [ASEAN Principle 6. Retention] Does the personal data protection
law require that an organisation cease to retain documents
containing personal data, or remove the means by which the
personal data can be associated with particular individuals as soon
as it is reasonable to assume that the retention is no longer
necessary for legal or business purposes, or after a certain period of
time (e.g. 5 yrs)?
10. [ASEAN Principle 7. Accountability] Does the personal data
protection law require an organisation to, on request, provide clear
and easily accessible information, such as how to contact the
organisation, about its data protection policies and practices with
respect to personal data in its possession or under its control?
11. Is the economy a participant of the EU’s GDPR regime, or meets
GDPR adequacy requirements?
12. Is the economy a participant of the APEC CBPR or similar regional
system (promoting an accountability rather than an adequacy
system)?
Part III: Cloud Stance and Adoption
• The TRPC DCSI 2020 is a composite statistical measure of the different
risks that can impact data centres’ activities.
• Comprising 32 indicators, TRPC DCSI 2020 provides a snapshot of data
centres’ exposure to elements that can threaten their integrity,
disrupt their activities, and jeopardise their reputation when they
operate in a given country.
• The indicators are grouped under six major types of risk –
Infrastructure Risk, Energy Risk, Natural Risk, Business Risk, Political
Risk, and Legal Risk – providing a holistic assessment of an economy’s
risk profile.
https://trpc.biz/the-trpc-data-center-security-index-2020/
Source: https://trpc.biz/the-trpc-data-
center-security-index-2020/
Coming out soon on
Friday 29 May 2020
https://asiacloudcomputing.org/
State of
Cybersecurity, Data
Protection Policy,
and Cloud Adoption
in Asia Pacific
Ms LIM May-Ann @eilonwy mayann@trpc.biz
Executive Director, Asia Cloud Computing Association (ACCA) and
Managing Director, TRPC Pte Ltd
https://www.nist.gov/cyberframework

More Related Content

What's hot

IRDAI Compliance & Data-Centric Security | Seclore
IRDAI Compliance & Data-Centric Security | SecloreIRDAI Compliance & Data-Centric Security | Seclore
IRDAI Compliance & Data-Centric Security | Seclore
Seclore
 
Information Security Lecture #1 ppt
Information Security Lecture #1 pptInformation Security Lecture #1 ppt
Information Security Lecture #1 ppt
vasanthimuniasamy
 
Mcafee CASB/DLP + Seclore Rights Management Solutions
Mcafee CASB/DLP + Seclore Rights Management Solutions Mcafee CASB/DLP + Seclore Rights Management Solutions
Mcafee CASB/DLP + Seclore Rights Management Solutions
Seclore
 
Amirudin bin Abdul Wahab
Amirudin bin Abdul WahabAmirudin bin Abdul Wahab
Amirudin bin Abdul Wahab
eletseditorial
 
Eight principles of consumer data privacy
Eight principles of consumer data privacyEight principles of consumer data privacy
Eight principles of consumer data privacy
Solix Technologies, Inc
 
Data Governance Solutions With Seclore and Stash
Data Governance Solutions With Seclore and StashData Governance Solutions With Seclore and Stash
Data Governance Solutions With Seclore and Stash
Seclore
 
National Cyber Security Policy-2013
National Cyber Security Policy-2013National Cyber Security Policy-2013
National Cyber Security Policy-2013
Vidushi Singh
 
IQProtector Suite
IQProtector SuiteIQProtector Suite
FCC Guidelines on Cyber Security
FCC Guidelines on Cyber SecurityFCC Guidelines on Cyber Security
FCC Guidelines on Cyber Security
Meg Weber
 
Data Security For Insurance Solutions
Data Security For Insurance SolutionsData Security For Insurance Solutions
Data Security For Insurance Solutions
Seclore
 
Emergency Services Sector Cybersecurity Initiative
 Emergency Services Sector Cybersecurity Initiative Emergency Services Sector Cybersecurity Initiative
Emergency Services Sector Cybersecurity Initiative
David Sweigert
 
Drivelock modern approach of it security & amp; encryption solution -whitep...
Drivelock   modern approach of it security & amp; encryption solution -whitep...Drivelock   modern approach of it security & amp; encryption solution -whitep...
Drivelock modern approach of it security & amp; encryption solution -whitep...
Arbp Worldwide
 
IT security
IT securityIT security
IT security
Aman Jain
 
Cybersecurity: Protection strategies from Cisco and Next Dimension
Cybersecurity: Protection strategies from Cisco and Next DimensionCybersecurity: Protection strategies from Cisco and Next Dimension
Cybersecurity: Protection strategies from Cisco and Next Dimension
Next Dimension Inc.
 
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
Santosh Khadsare
 
Data protection
Data protectionData protection
Data protection
RaviPrashant5
 
Customer Data Privacy & Protection | Seclore
Customer Data Privacy & Protection | SecloreCustomer Data Privacy & Protection | Seclore
Customer Data Privacy & Protection | Seclore
Seclore
 
Inbound Data Protection
Inbound Data ProtectionInbound Data Protection
Inbound Data Protection
Seclore
 
Two Become One Conference Keynote: When Two Become One: A New leader in Data ...
Two Become One Conference Keynote: When Two Become One: A New leader in Data ...Two Become One Conference Keynote: When Two Become One: A New leader in Data ...
Two Become One Conference Keynote: When Two Become One: A New leader in Data ...
Access Group
 
Data security
Data securityData security
Data security
AbdulBasit938
 

What's hot (20)

IRDAI Compliance & Data-Centric Security | Seclore
IRDAI Compliance & Data-Centric Security | SecloreIRDAI Compliance & Data-Centric Security | Seclore
IRDAI Compliance & Data-Centric Security | Seclore
 
Information Security Lecture #1 ppt
Information Security Lecture #1 pptInformation Security Lecture #1 ppt
Information Security Lecture #1 ppt
 
Mcafee CASB/DLP + Seclore Rights Management Solutions
Mcafee CASB/DLP + Seclore Rights Management Solutions Mcafee CASB/DLP + Seclore Rights Management Solutions
Mcafee CASB/DLP + Seclore Rights Management Solutions
 
Amirudin bin Abdul Wahab
Amirudin bin Abdul WahabAmirudin bin Abdul Wahab
Amirudin bin Abdul Wahab
 
Eight principles of consumer data privacy
Eight principles of consumer data privacyEight principles of consumer data privacy
Eight principles of consumer data privacy
 
Data Governance Solutions With Seclore and Stash
Data Governance Solutions With Seclore and StashData Governance Solutions With Seclore and Stash
Data Governance Solutions With Seclore and Stash
 
National Cyber Security Policy-2013
National Cyber Security Policy-2013National Cyber Security Policy-2013
National Cyber Security Policy-2013
 
IQProtector Suite
IQProtector SuiteIQProtector Suite
IQProtector Suite
 
FCC Guidelines on Cyber Security
FCC Guidelines on Cyber SecurityFCC Guidelines on Cyber Security
FCC Guidelines on Cyber Security
 
Data Security For Insurance Solutions
Data Security For Insurance SolutionsData Security For Insurance Solutions
Data Security For Insurance Solutions
 
Emergency Services Sector Cybersecurity Initiative
 Emergency Services Sector Cybersecurity Initiative Emergency Services Sector Cybersecurity Initiative
Emergency Services Sector Cybersecurity Initiative
 
Drivelock modern approach of it security & amp; encryption solution -whitep...
Drivelock   modern approach of it security & amp; encryption solution -whitep...Drivelock   modern approach of it security & amp; encryption solution -whitep...
Drivelock modern approach of it security & amp; encryption solution -whitep...
 
IT security
IT securityIT security
IT security
 
Cybersecurity: Protection strategies from Cisco and Next Dimension
Cybersecurity: Protection strategies from Cisco and Next DimensionCybersecurity: Protection strategies from Cisco and Next Dimension
Cybersecurity: Protection strategies from Cisco and Next Dimension
 
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
 
Data protection
Data protectionData protection
Data protection
 
Customer Data Privacy & Protection | Seclore
Customer Data Privacy & Protection | SecloreCustomer Data Privacy & Protection | Seclore
Customer Data Privacy & Protection | Seclore
 
Inbound Data Protection
Inbound Data ProtectionInbound Data Protection
Inbound Data Protection
 
Two Become One Conference Keynote: When Two Become One: A New leader in Data ...
Two Become One Conference Keynote: When Two Become One: A New leader in Data ...Two Become One Conference Keynote: When Two Become One: A New leader in Data ...
Two Become One Conference Keynote: When Two Become One: A New leader in Data ...
 
Data security
Data securityData security
Data security
 

Similar to State of Cybersecurity, Data Protection Policy, and Cloud Adoption in Asia Pacific

Compliance audit under the Information Technology Act, 2000
Compliance audit under the Information Technology Act, 2000Compliance audit under the Information Technology Act, 2000
Compliance audit under the Information Technology Act, 2000
Sagar Rahurkar
 
The ASEAN Data Protection Index 2020
The ASEAN Data Protection Index 2020The ASEAN Data Protection Index 2020
The ASEAN Data Protection Index 2020
FairTechInstitute
 
iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)
iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)
iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)
ProductNation/iSPIRT
 
Infosec Law (Feb 2006)
Infosec Law (Feb 2006)Infosec Law (Feb 2006)
Infosec Law (Feb 2006)
Lance Michalson
 
ISO/IEC 27001, ISO/IEC 27701, and Data Privacy Laws: Key threats in 2022
ISO/IEC 27001, ISO/IEC 27701, and Data Privacy Laws: Key threats in 2022ISO/IEC 27001, ISO/IEC 27701, and Data Privacy Laws: Key threats in 2022
ISO/IEC 27001, ISO/IEC 27701, and Data Privacy Laws: Key threats in 2022
PECB
 
Information System Security Policy Studies as a Form of Company Privacy Prote...
Information System Security Policy Studies as a Form of Company Privacy Prote...Information System Security Policy Studies as a Form of Company Privacy Prote...
Information System Security Policy Studies as a Form of Company Privacy Prote...
Editor IJCATR
 
Data privacy Legislation in India
Data privacy Legislation in IndiaData privacy Legislation in India
Data privacy Legislation in India
LATHA H C
 
New opportunities and business risks with evolving privacy regulations
New opportunities and business risks with evolving privacy regulationsNew opportunities and business risks with evolving privacy regulations
New opportunities and business risks with evolving privacy regulations
Ulf Mattsson
 
Niche Konsult Limited Section By Section Analysis Of Cyber Security And Infor...
Niche Konsult Limited Section By Section Analysis Of Cyber Security And Infor...Niche Konsult Limited Section By Section Analysis Of Cyber Security And Infor...
Niche Konsult Limited Section By Section Analysis Of Cyber Security And Infor...
Niche Konsult Ltd
 
iSPIRT’s Response- White Paper on Data Protection Framework for India
iSPIRT’s Response- White Paper on Data Protection Framework for IndiaiSPIRT’s Response- White Paper on Data Protection Framework for India
iSPIRT’s Response- White Paper on Data Protection Framework for India
ProductNation/iSPIRT
 
Security Industry Association Privacy Framework
Security Industry Association Privacy FrameworkSecurity Industry Association Privacy Framework
Security Industry Association Privacy Framework
- Mark - Fullbright
 
Automatski - The Internet of Things - Security Standards
Automatski - The Internet of Things - Security StandardsAutomatski - The Internet of Things - Security Standards
Automatski - The Internet of Things - Security Standards
automatskicorporation
 
Asia Cloud Computing Association’s (ACCA) Response to India’s Draft Health Da...
Asia Cloud Computing Association’s (ACCA) Response to India’s Draft Health Da...Asia Cloud Computing Association’s (ACCA) Response to India’s Draft Health Da...
Asia Cloud Computing Association’s (ACCA) Response to India’s Draft Health Da...
accacloud
 
Outline for an Enterprise IT Security PolicyNo NameJanuary 24, 201.docx
Outline for an Enterprise IT Security PolicyNo NameJanuary 24, 201.docxOutline for an Enterprise IT Security PolicyNo NameJanuary 24, 201.docx
Outline for an Enterprise IT Security PolicyNo NameJanuary 24, 201.docx
alfred4lewis58146
 
Personal privacy and computer technologies
Personal privacy and computer technologiesPersonal privacy and computer technologies
Personal privacy and computer technologies
sidra batool
 
2017 cyber legislation in Singapore (v2) - case study and discussion of cybe...
2017 cyber legislation in Singapore  (v2) - case study and discussion of cybe...2017 cyber legislation in Singapore  (v2) - case study and discussion of cybe...
2017 cyber legislation in Singapore (v2) - case study and discussion of cybe...
Benjamin Ang
 
OVERVIEW OF NIGERIA DATA PROTECTION ACT 2014
OVERVIEW OF NIGERIA DATA PROTECTION ACT 2014OVERVIEW OF NIGERIA DATA PROTECTION ACT 2014
OVERVIEW OF NIGERIA DATA PROTECTION ACT 2014
UsmanMAmeer
 
Privacy in India: Legal issues
Privacy in India: Legal issuesPrivacy in India: Legal issues
Privacy in India: Legal issues
Sagar Rahurkar
 
Data Privacy Protection Competrency Guide by a Data Subject
Data Privacy Protection Competrency Guide by a Data SubjectData Privacy Protection Competrency Guide by a Data Subject
Data Privacy Protection Competrency Guide by a Data Subject
John Macasio
 
Automatski - The Internet of Things - Privacy Standards
Automatski - The Internet of Things - Privacy StandardsAutomatski - The Internet of Things - Privacy Standards
Automatski - The Internet of Things - Privacy Standards
automatskicorporation
 

Similar to State of Cybersecurity, Data Protection Policy, and Cloud Adoption in Asia Pacific (20)

Compliance audit under the Information Technology Act, 2000
Compliance audit under the Information Technology Act, 2000Compliance audit under the Information Technology Act, 2000
Compliance audit under the Information Technology Act, 2000
 
The ASEAN Data Protection Index 2020
The ASEAN Data Protection Index 2020The ASEAN Data Protection Index 2020
The ASEAN Data Protection Index 2020
 
iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)
iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)
iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)
 
Infosec Law (Feb 2006)
Infosec Law (Feb 2006)Infosec Law (Feb 2006)
Infosec Law (Feb 2006)
 
ISO/IEC 27001, ISO/IEC 27701, and Data Privacy Laws: Key threats in 2022
ISO/IEC 27001, ISO/IEC 27701, and Data Privacy Laws: Key threats in 2022ISO/IEC 27001, ISO/IEC 27701, and Data Privacy Laws: Key threats in 2022
ISO/IEC 27001, ISO/IEC 27701, and Data Privacy Laws: Key threats in 2022
 
Information System Security Policy Studies as a Form of Company Privacy Prote...
Information System Security Policy Studies as a Form of Company Privacy Prote...Information System Security Policy Studies as a Form of Company Privacy Prote...
Information System Security Policy Studies as a Form of Company Privacy Prote...
 
Data privacy Legislation in India
Data privacy Legislation in IndiaData privacy Legislation in India
Data privacy Legislation in India
 
New opportunities and business risks with evolving privacy regulations
New opportunities and business risks with evolving privacy regulationsNew opportunities and business risks with evolving privacy regulations
New opportunities and business risks with evolving privacy regulations
 
Niche Konsult Limited Section By Section Analysis Of Cyber Security And Infor...
Niche Konsult Limited Section By Section Analysis Of Cyber Security And Infor...Niche Konsult Limited Section By Section Analysis Of Cyber Security And Infor...
Niche Konsult Limited Section By Section Analysis Of Cyber Security And Infor...
 
iSPIRT’s Response- White Paper on Data Protection Framework for India
iSPIRT’s Response- White Paper on Data Protection Framework for IndiaiSPIRT’s Response- White Paper on Data Protection Framework for India
iSPIRT’s Response- White Paper on Data Protection Framework for India
 
Security Industry Association Privacy Framework
Security Industry Association Privacy FrameworkSecurity Industry Association Privacy Framework
Security Industry Association Privacy Framework
 
Automatski - The Internet of Things - Security Standards
Automatski - The Internet of Things - Security StandardsAutomatski - The Internet of Things - Security Standards
Automatski - The Internet of Things - Security Standards
 
Asia Cloud Computing Association’s (ACCA) Response to India’s Draft Health Da...
Asia Cloud Computing Association’s (ACCA) Response to India’s Draft Health Da...Asia Cloud Computing Association’s (ACCA) Response to India’s Draft Health Da...
Asia Cloud Computing Association’s (ACCA) Response to India’s Draft Health Da...
 
Outline for an Enterprise IT Security PolicyNo NameJanuary 24, 201.docx
Outline for an Enterprise IT Security PolicyNo NameJanuary 24, 201.docxOutline for an Enterprise IT Security PolicyNo NameJanuary 24, 201.docx
Outline for an Enterprise IT Security PolicyNo NameJanuary 24, 201.docx
 
Personal privacy and computer technologies
Personal privacy and computer technologiesPersonal privacy and computer technologies
Personal privacy and computer technologies
 
2017 cyber legislation in Singapore (v2) - case study and discussion of cybe...
2017 cyber legislation in Singapore  (v2) - case study and discussion of cybe...2017 cyber legislation in Singapore  (v2) - case study and discussion of cybe...
2017 cyber legislation in Singapore (v2) - case study and discussion of cybe...
 
OVERVIEW OF NIGERIA DATA PROTECTION ACT 2014
OVERVIEW OF NIGERIA DATA PROTECTION ACT 2014OVERVIEW OF NIGERIA DATA PROTECTION ACT 2014
OVERVIEW OF NIGERIA DATA PROTECTION ACT 2014
 
Privacy in India: Legal issues
Privacy in India: Legal issuesPrivacy in India: Legal issues
Privacy in India: Legal issues
 
Data Privacy Protection Competrency Guide by a Data Subject
Data Privacy Protection Competrency Guide by a Data SubjectData Privacy Protection Competrency Guide by a Data Subject
Data Privacy Protection Competrency Guide by a Data Subject
 
Automatski - The Internet of Things - Privacy Standards
Automatski - The Internet of Things - Privacy StandardsAutomatski - The Internet of Things - Privacy Standards
Automatski - The Internet of Things - Privacy Standards
 

More from TRPC Pte Ltd

Inter-Modal Transport Data Sharing Programme
Inter-Modal Transport Data Sharing ProgrammeInter-Modal Transport Data Sharing Programme
Inter-Modal Transport Data Sharing Programme
TRPC Pte Ltd
 
TRPC Digital Bytes September 2020
 TRPC Digital Bytes September 2020 TRPC Digital Bytes September 2020
TRPC Digital Bytes September 2020
TRPC Pte Ltd
 
TRPC Digital Bytes July 2020
TRPC Digital Bytes July 2020TRPC Digital Bytes July 2020
TRPC Digital Bytes July 2020
TRPC Pte Ltd
 
TRPC Digital Bytes August 2020
TRPC Digital Bytes August 2020TRPC Digital Bytes August 2020
TRPC Digital Bytes August 2020
TRPC Pte Ltd
 
TRPC Digital Bytes May 2020
TRPC Digital Bytes May 2020TRPC Digital Bytes May 2020
TRPC Digital Bytes May 2020
TRPC Pte Ltd
 
Planning the Next Lap of ASEAN’s Digital Masterplan 2025 (Lim May-Ann)
Planning the Next Lap of ASEAN’s Digital Masterplan 2025 (Lim May-Ann)Planning the Next Lap of ASEAN’s Digital Masterplan 2025 (Lim May-Ann)
Planning the Next Lap of ASEAN’s Digital Masterplan 2025 (Lim May-Ann)
TRPC Pte Ltd
 
Singapore: Strong regulatory foundations for effective crisis management (Jon...
Singapore: Strong regulatory foundations for effective crisis management (Jon...Singapore: Strong regulatory foundations for effective crisis management (Jon...
Singapore: Strong regulatory foundations for effective crisis management (Jon...
TRPC Pte Ltd
 
TRPC Digital Bytes April 2020
TRPC Digital Bytes April 2020TRPC Digital Bytes April 2020
TRPC Digital Bytes April 2020
TRPC Pte Ltd
 
Inter-modal Transport Data Sharing in Hong Kong: Use Case Development Workshop
Inter-modal Transport Data Sharing in Hong Kong: Use Case Development WorkshopInter-modal Transport Data Sharing in Hong Kong: Use Case Development Workshop
Inter-modal Transport Data Sharing in Hong Kong: Use Case Development Workshop
TRPC Pte Ltd
 
Presentation 24 june 2019 r6 - public distribution copy
Presentation 24 june 2019 r6 - public distribution copyPresentation 24 june 2019 r6 - public distribution copy
Presentation 24 june 2019 r6 - public distribution copy
TRPC Pte Ltd
 
APCICT M&E Framework Initiative (Part 2)
 APCICT M&E Framework Initiative (Part 2) APCICT M&E Framework Initiative (Part 2)
APCICT M&E Framework Initiative (Part 2)
TRPC Pte Ltd
 
APCICT M&E Framework Initiative (Part 1)
APCICT M&E Framework Initiative (Part 1)APCICT M&E Framework Initiative (Part 1)
APCICT M&E Framework Initiative (Part 1)
TRPC Pte Ltd
 
Economic Regulation, Cost Methodologies and Tariff Regulation in the Asia Pac...
Economic Regulation, Cost Methodologies and Tariff Regulation in the Asia Pac...Economic Regulation, Cost Methodologies and Tariff Regulation in the Asia Pac...
Economic Regulation, Cost Methodologies and Tariff Regulation in the Asia Pac...
TRPC Pte Ltd
 
Digital Thailand
Digital ThailandDigital Thailand
Digital Thailand
TRPC Pte Ltd
 
Government cloud computing-2015
Government cloud computing-2015Government cloud computing-2015
Government cloud computing-2015
TRPC Pte Ltd
 
Session 2 ure_changingrules_final
Session 2 ure_changingrules_finalSession 2 ure_changingrules_final
Session 2 ure_changingrules_final
TRPC Pte Ltd
 
Digital Finance Ecosystem: Regional, National and Household Level Snapshots
Digital Finance Ecosystem: Regional, National and Household Level Snapshots Digital Finance Ecosystem: Regional, National and Household Level Snapshots
Digital Finance Ecosystem: Regional, National and Household Level Snapshots
TRPC Pte Ltd
 
Improving the Thai Television Sector in the face of ASEAN Economic Community
Improving the Thai Television Sector in the face of ASEAN Economic CommunityImproving the Thai Television Sector in the face of ASEAN Economic Community
Improving the Thai Television Sector in the face of ASEAN Economic Community
TRPC Pte Ltd
 

More from TRPC Pte Ltd (18)

Inter-Modal Transport Data Sharing Programme
Inter-Modal Transport Data Sharing ProgrammeInter-Modal Transport Data Sharing Programme
Inter-Modal Transport Data Sharing Programme
 
TRPC Digital Bytes September 2020
 TRPC Digital Bytes September 2020 TRPC Digital Bytes September 2020
TRPC Digital Bytes September 2020
 
TRPC Digital Bytes July 2020
TRPC Digital Bytes July 2020TRPC Digital Bytes July 2020
TRPC Digital Bytes July 2020
 
TRPC Digital Bytes August 2020
TRPC Digital Bytes August 2020TRPC Digital Bytes August 2020
TRPC Digital Bytes August 2020
 
TRPC Digital Bytes May 2020
TRPC Digital Bytes May 2020TRPC Digital Bytes May 2020
TRPC Digital Bytes May 2020
 
Planning the Next Lap of ASEAN’s Digital Masterplan 2025 (Lim May-Ann)
Planning the Next Lap of ASEAN’s Digital Masterplan 2025 (Lim May-Ann)Planning the Next Lap of ASEAN’s Digital Masterplan 2025 (Lim May-Ann)
Planning the Next Lap of ASEAN’s Digital Masterplan 2025 (Lim May-Ann)
 
Singapore: Strong regulatory foundations for effective crisis management (Jon...
Singapore: Strong regulatory foundations for effective crisis management (Jon...Singapore: Strong regulatory foundations for effective crisis management (Jon...
Singapore: Strong regulatory foundations for effective crisis management (Jon...
 
TRPC Digital Bytes April 2020
TRPC Digital Bytes April 2020TRPC Digital Bytes April 2020
TRPC Digital Bytes April 2020
 
Inter-modal Transport Data Sharing in Hong Kong: Use Case Development Workshop
Inter-modal Transport Data Sharing in Hong Kong: Use Case Development WorkshopInter-modal Transport Data Sharing in Hong Kong: Use Case Development Workshop
Inter-modal Transport Data Sharing in Hong Kong: Use Case Development Workshop
 
Presentation 24 june 2019 r6 - public distribution copy
Presentation 24 june 2019 r6 - public distribution copyPresentation 24 june 2019 r6 - public distribution copy
Presentation 24 june 2019 r6 - public distribution copy
 
APCICT M&E Framework Initiative (Part 2)
 APCICT M&E Framework Initiative (Part 2) APCICT M&E Framework Initiative (Part 2)
APCICT M&E Framework Initiative (Part 2)
 
APCICT M&E Framework Initiative (Part 1)
APCICT M&E Framework Initiative (Part 1)APCICT M&E Framework Initiative (Part 1)
APCICT M&E Framework Initiative (Part 1)
 
Economic Regulation, Cost Methodologies and Tariff Regulation in the Asia Pac...
Economic Regulation, Cost Methodologies and Tariff Regulation in the Asia Pac...Economic Regulation, Cost Methodologies and Tariff Regulation in the Asia Pac...
Economic Regulation, Cost Methodologies and Tariff Regulation in the Asia Pac...
 
Digital Thailand
Digital ThailandDigital Thailand
Digital Thailand
 
Government cloud computing-2015
Government cloud computing-2015Government cloud computing-2015
Government cloud computing-2015
 
Session 2 ure_changingrules_final
Session 2 ure_changingrules_finalSession 2 ure_changingrules_final
Session 2 ure_changingrules_final
 
Digital Finance Ecosystem: Regional, National and Household Level Snapshots
Digital Finance Ecosystem: Regional, National and Household Level Snapshots Digital Finance Ecosystem: Regional, National and Household Level Snapshots
Digital Finance Ecosystem: Regional, National and Household Level Snapshots
 
Improving the Thai Television Sector in the face of ASEAN Economic Community
Improving the Thai Television Sector in the face of ASEAN Economic CommunityImproving the Thai Television Sector in the face of ASEAN Economic Community
Improving the Thai Television Sector in the face of ASEAN Economic Community
 

Recently uploaded

The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
operationspcvita
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Pitangent Analytics & Technology Solutions Pvt. Ltd
 
Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
christinelarrosa
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
Fwdays
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
Neo4j
 
High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024
Vadym Kazulkin
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Fwdays
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
ScyllaDB
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
ScyllaDB
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
Safe Software
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
Neo4j
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
DanBrown980551
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Neo4j
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo Gómez Abajo
 
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillinQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
LizaNolte
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 

Recently uploaded (20)

The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
 
Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
 
High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillinQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 

State of Cybersecurity, Data Protection Policy, and Cloud Adoption in Asia Pacific

  • 1. State of Cybersecurity, Data Protection Policy, and Cloud Adoption in Asia Pacific Ms LIM May-Ann @eilonwy mayann@trpc.biz Executive Director, Asia Cloud Computing Association (ACCA) and Managing Director, TRPC Pte Ltd https://www.nist.gov/cyberframework
  • 3. Cybersecurity in Asia Pacific https://www.kearney.com/web/southeast-asia/article?/a/cybersecurity-in-asean-an-urgent-call-to-action
  • 5. Part II: Data Protection Policy
  • 6. ASEAN Framework on Personal Data Protection 2016: Principles of Personal Data Protection 1. Consent, Notification, and Purpose 2. Accuracy of Personal Data 3. Security Safeguards 4. Access and Correction 5. Transfers to another country or territory 6. Retention 7. Accountability https://trpc.biz/the-trpc-data-protection-index-2020/
  • 7. Assessing the State of Data Privacy in Asia Pacific The DPI 2020 questions are as follows: 1. Does the economy have a personal data protection law? 2. Does the economy have a privacy enforcement authority (PEA)? 3. [ASEAN Principle 1. Consent, Notification and Purpose] Does the personal data protection law require that organisations obtain consent from individuals, and notify them of the purposes of collection, use, and disclosure of their personal information by the organization? 4. [ASEAN Principle 1. Consent, Notification and Purpose] Does the personal data protection law have clear instructions on exemption circumstances by which consent from individuals for the collection, use, and disclosure of their personal information, is NOT required? E.g. where collection of personal information is authorised or required under domestic laws and regulations? 5. [ASEAN Principle 2. Accuracy of Personal Data] Does the personal data protection law require organisations to ensure that personal data be accurate and complete for the extent necessary for the purpose(s) for which the personal data is to be used or disclosed? 6. [ASEAN Principle 3. Security Safeguards] Does the personal data protection law require that personal data be appropriately protected against loss and unauthorised access, collection, use, disclosure, copying, modification, destruction or similar risks? 7. [ASEAN Principle 4. Access and Correction] Does the personal data protection law require organisations to, upon request from individuals, provide the individual access to his/her personal data which is in the possession or under the control of the organisation within a reasonable period of time, and correct an error or omission in his personal data, unless domestic laws and regulations require or authorise the organisation not to provide access or correct the personal data in the particular circumstances? 8. [ASEAN Principle 5. Transfers to Another Country or Territory] Does the law require that, before transferring personal data to another country or territory, the organisation should obtain the consent of the individual for the overseas transfer? 9. [ASEAN Principle 6. Retention] Does the personal data protection law require that an organisation cease to retain documents containing personal data, or remove the means by which the personal data can be associated with particular individuals as soon as it is reasonable to assume that the retention is no longer necessary for legal or business purposes, or after a certain period of time (e.g. 5 yrs)? 10. [ASEAN Principle 7. Accountability] Does the personal data protection law require an organisation to, on request, provide clear and easily accessible information, such as how to contact the organisation, about its data protection policies and practices with respect to personal data in its possession or under its control? 11. Is the economy a participant of the EU’s GDPR regime, or meets GDPR adequacy requirements? 12. Is the economy a participant of the APEC CBPR or similar regional system (promoting an accountability rather than an adequacy system)?
  • 8.
  • 9. Part III: Cloud Stance and Adoption
  • 10. • The TRPC DCSI 2020 is a composite statistical measure of the different risks that can impact data centres’ activities. • Comprising 32 indicators, TRPC DCSI 2020 provides a snapshot of data centres’ exposure to elements that can threaten their integrity, disrupt their activities, and jeopardise their reputation when they operate in a given country. • The indicators are grouped under six major types of risk – Infrastructure Risk, Energy Risk, Natural Risk, Business Risk, Political Risk, and Legal Risk – providing a holistic assessment of an economy’s risk profile. https://trpc.biz/the-trpc-data-center-security-index-2020/
  • 11.
  • 13. Coming out soon on Friday 29 May 2020 https://asiacloudcomputing.org/
  • 14. State of Cybersecurity, Data Protection Policy, and Cloud Adoption in Asia Pacific Ms LIM May-Ann @eilonwy mayann@trpc.biz Executive Director, Asia Cloud Computing Association (ACCA) and Managing Director, TRPC Pte Ltd https://www.nist.gov/cyberframework