In November 2019, the Singapore Personal Data Protection Commission (PDPC) found eight organisations to be in breach of the Personal Data Protection Act 2012 (PDPA). Of those eight, the highest quantum of financial penalties were imposed on Ninja Logistics Pte Ltd (Ninja Van) and Singapore Telecommunications Limited (Singtel) for breaching the Protection Obligation of the PDPA.
Logistics start-up Ninja Van provides packaging, delivery and tracking services. Ninja Van commenced a delivery order tracking function in December 2014 which uses a “Tracking ID” as the sole means of allowing customers to enquire on their delivery statuses and to confirm the identity of individuals who collect parcels on behalf of customers. The PDPC received a complaint that the tracking function page could potentially be used to harvest personal data. By changing a few digits of a Tracking ID or using a random set of any nine digits that happened to match a valid Tracking ID, the personal data of another customer could be accessed. Almost 1.3 million individuals were exposed to a risk of disclosure or unauthorised access to data including their name, address, the Tracking ID, and/or the name and signature of the person who had accepted the delivery.
The PDPC found that Ninja Van breached the PDPA and failed to put in place reasonable security arrangements to protect the personal data in its possession or control for two main reasons.
Ninja Van was ordered to pay a S$90,000 penalty and implement a reasonable validity period for the Tracking IDs in compliance with the Protection Obligation.
Major local telco Singtel developed a mobile application (My Singtel) to enable customers to track their account information and manage add-on services. Communications between My Singtel and Singtel’s servers were conducted through Application Programming Interfaces (API). An anonymous informant informed the PDPC of a vulnerability in My Singtel which facilitated unauthorised access to customers’ account details by using specialised tools to manipulate the API on the server. This was caused by a design issue in the API where the application input was not validated against login credentials used to access My Singtel before performing a requested operation (the Vulnerability). The validation of parameters could have prevented unauthorised access to customers’ personal data. As a result, the informant was able to access four billing accounts and extracted details including account number, address, contact number, and customer service plans. It was noted that an estimated 330,000 customers were put at risk of unauthorised disclosure of personal data.
Despite having engaged a third-party security vendor to conduct regular penetration tests on My Singtel and backend systems, the PDPC found that Singtel failed to put in place reasonable security arrangements and subjected its customers to the risk of actual and potential unauthorised access of their personal data.
The PDPC held that Singtel ought to have been more diligent and examined all other functions thoroughly to determine the security posture of the API and the server and implement the relevant fixes. Given that the exploitation of the Vulnerability required some form of technical expertise, a reduced penalty of S$25,000 was imposed on Singtel.
Organisations must be prudent in the handling of customers’ personal data and implement regular in-depth testing and review of the relevant security posture. Such assessments should cover a wider scope of testing and include references to guides on common vulnerabilities to minimise the risk of unauthorised exposure of personal data. Any vulnerabilities discovered should be resolved in a timely and proper manner.
Disclaimer: This article is for general information only and does not constitute legal advice.