Table of Contents Table of Contents
Previous Page  104 / 192 Next Page
Information
Show Menu
Previous Page 104 / 192 Next Page
Page Background

paragraphs (a) to (e). The word “loss” in DPP4(1) was added by the Amendment

Ordinance to clarify that a data user is required to take similar security measures to also

prevent loss of personal data.

8.3

Of the said paragraphs (a) to (e), the “harm test” covered by paragraph (a) is an

important consideration. The security measures to be undertaken by the data user with

respect to the data held should be proportionate to the degree of sensitivity of the data

and the harm that may result from accidental or unauthorised access to such data. For

example, in respect of the personal data held by a bank about its customers, DPP4

would require a higher degree of care in handling personal data such as the bank

statements of its customers as opposed to direct marketing or promotional materials sent

to customers.

8.4

With the increasing provision of online services for consumers, such as paying utility bills

online, e-banking and online shopping, coupled with the increasing use of online

services by data users to store or transmit personal data (e.g. cloud services), data users

should take extra care to ensure system security and protection of their customers’

personal data, which is stored and transmitted online, from unauthorised or accidental

access or alteration by, for example, computer hackers or unintended users.

8.5

Given the flexibility inherent in the drafting of “all reasonably practicable steps”, it is not

surprising that the steps required of a data user may vary widely from case to case.

Nevertheless, based on the Commissioner’s experience from cases he has handled

regarding the application of DPP4, the following precautionary steps (without in any

way limiting or affecting the Commissioner’s exercise of his powers according to the

particular circumstances of each case) are generally accepted as examples of the

appropriate measures that may be taken by data users in the situations listed below:

For paper documents containing personal data, data users may consider implementing the

following security measures:

Situation

Appropriate Steps

Storage of

data in

paper files

• keep files under lock and key or in a secure

area

• allow access only by authorised personnel on a

need-to-know basis

• shred files after use

• have a clear-desk policy requiring employees

to lock up sensitive papers when they are not

working on them

Transmission

of data by

fax or mail

• use sealed envelopes

• make sure no sensitive data (e.g. HKID number)

is visible through the envelope window