Table of Contents Table of Contents
Previous Page  121 / 192 Next Page
Information
Show Menu
Previous Page 121 / 192 Next Page
Page Background

security measures being taken by the data processors to protect the personal data

entrusted to them. This may cause substantial and irrecoverable damage to the data

subjects whose personal data was leaked online as a result.

27

8.35

The Amendment Ordinance seeks to tighten the control and supervision of data

processors through the data users by imposing a new obligation on data users under

DPP4(2) to enhance data security as follows:

(2) Without limiting subsection (1), if a data user engages a data processor, whether within

or outside Hong Kong, to process personal data on the data user’s behalf, the data user

must adopt contractual or other means to prevent unauthorised or accidental access,

processing, erasure, loss or use of the data transferred to the data processor for processing.

8.36

“Data processor” has the same meaning as that provided by DPP2(4),

28

i.e. “a person

who:

(a) processes personal data on behalf of another person; and

(b) does not process the data for any of the person’s own purposes”.

8.37

By virtue of this definition, data processors are not limited to providers of IT processing

service. They also include other contractors engaged to process personal data on

behalf of the data user, for example, a business services company engaged by an

organisation to administer its employee payroll function; a marketing company

appointed by the organisation to carry out customer opinion survey; or contractors

engaged by a data user to shred confidential documents which contain personal data.

8.38

Data users often define their rights and obligations and those of the data processers by

way of a contract. To discharge the obligations under DPP4(2), data users may consider

incorporating contractual clauses in the service contract, such as the following:

• specifying the security measures required to be taken by the data processor to

protect the personal data entrusted to it for processing;

• prohibiting use or disclosure of the personal data for other purposes;

• restricting further sub-contracting of the service that it is engaged to provide; where

sub-contracting is allowed by the data user, the data processor shall remain fully

liable to the data user for the discharge of its obligations;

• immediate reporting of any sign of abnormality or security breach by the data

processor; and

• data user’s right to audit and inspect how the data processor handles and stores

personal data.

27

For instance, see online personal data leakage caused by file-sharing software installed in the computer of the IT

contractor reported in Investigation Report No. R06-2599, available on the Website

( https://www.pcpd.org.hk/english/enforcement/commissioners_findings/investigation_reports/files/IPCC_e.pdf

). See also

paragraph 8.30 above for the personal data leakage through the travel assistant apps in mobile device (the

Investigation Report R14-6453)

28

DPP4(3)