Trusted Data Sharing Framework
Trusted Data Sharing Framework
SHARING
FRAMEWORK
CONTENTS
INTRODUCTION 6
CONTENTS
APPENDICES 52
OTHERS 86
APPENDIX X : Data Sharing Checklist – Questions to Consider 87
APPENDIX XI : Common Resources Used in This Framework 89
ACKNOWLEDGEMENT 90
TRUSTED DATA SHARING FRAMEWORK 5
b gain clarity from the information and illustrations presented in this Framework;
d kick-start their data sharing journeys or possibly develop their own ideas around data
sharing.
This Framework is presented from the perspectives of data providers or data consumers who
are interested or have decided to embark on data sharing journeys. Data service providers
may also find this Framework useful in understanding the considerations of data providers or
consumers.
For the purpose of this Framework, “data” refers to both personal and business data. This
Framework is intended for use in the commercial and non-governmental sectors but excludes
data sharing in or with the public sector. Users should note that personal data requires additional
safeguards, and that they can find information and references to specific guides or tools
throughout this document.
For avoidance of doubt, this Framework is just a guide for industry and not for compliance.
The content should not be read as nor constitute as legal advice, nor construed as a tool for
compliance to the Personal Data Protection Act 2012 (“PDPA”) or any law and regulations.
Users of this Framework should assess the need to seek legal advice before finalising any legal
agreements.
6
INTRODUCTION
TRUSTED DATA SHARING FRAMEWORK 7
Bank Telco
• A bank and telco (both a Data Provider and Data Consumer) were looking
to engage in two-way bilateral data sharing to improve customer experience
and advance business outcomes across both entities.
• The data exchanged was used to better understand customer needs and
deliver more relevant solutions, experience and offers to a combined
customer base.
• The partnership enabled both parties and their partners to anticipate and
better respond to customers’ evolving motivations and preferences, and
offer customers value that went beyond a single entity or industry.
1
International Data Corporation (30 October 2018) ‘By 2023 Nearly Every Enterprise
Will Be “Digital Native” in an Increasingly Digitized Global Economy’
2
World Economic Forum (December 2018) ‘Our Shared Digital future: Building an
Inclusive, Trustworthy and Sustainable Digital Society’
3
Brynjolfsson E, et al. (22 April 2011) ‘Strength in numbers: How does data-driven
decision making affect firm performance?’
8
Supply Customer
Chain (e.g
Service company
Provider A)
Bank A
Credit
Bank B Bureau
(Singapore)
(“CBS”)
Bank C
Real estate
company
Property
Service
Property Provider
company
• Data shared is free of charge, in return the real estate/ property companies
are able to then access and obtain data from the data service. Consumers
can also use the information to make informed decisions on their property.
This creates a more efficient real estate market overall.
TRUSTED
DATA SHARING
FRAMEWORK
TRUSTED DATA SHARING FRAMEWORK 11
KEY CONSIDERATIONS IN
DATA SHARING
The motivation to share data typically stems from business needs
such as the creation of new services, lowering business costs,
detection of fraud, regulatory compliance, etc. The business
motivations will, in turn, help data partners agree on the intended
outcomes of their data sharing activities. Once established,
organisations may consider using the Framework to kick-start their
data sharing journeys. The Framework is organised into four parts
which are not sequential. Organisations may choose to use them
in any sequence, depending on their needs, but should not omit
any part:
1.1 Establish Data 2.1 Determine 3.1 Prepare Data 4.1 Ensure
Sharing Potential if Data Can Be for Data Sharing Transparency and
and Value of Own Shared Accountability
Data 3.2 Understand
2.2 Establish Data Technical 4.2 Monitor
1.2 Understand Sharing Agreement Considerations for Ongoing Legal and
Potential Data Data Sharing Regulatory
Sharing Models Obligations
AUTHORITY
4
Referring to an organisation that processes personal data on behalf of and for the
purposes of an organisation pursuant to a written contract is subject only to the Data
Protection Provisions relating to protection and retention of personal data, and not any
other Data Protection Provisions. An organisation that engages a data intermediary has
the same obligations under the PDPA for personal data processed on its behalf by the
data intermediary as if the personal data was processed by the organisation itself.
TRUSTED DATA SHARING FRAMEWORK 15
TRUST PRINCIPLES
Embedded throughout the Framework is the concept of trust. As
data sharing often involves the movement of data assets, it is
important to establish that each party would be able to handle and
manage the data asset responsibly. This Framework introduces 6
Trust Principles: Transparency, Accessibility, Standardisation,
Fairness and Ethics, Accountability and Security and Data
Integrity as foundations to forming a trusted data sharing partnership.
How these principles can be applied at different data sharing areas
are explained in the Appendix.
Transparency
Refers to the openness of all parties involved in data
sharing to make available all information that is
necessary for the successful delivery of the data
sharing partnership.
Accessibility
Refers to the ability of parties to access the data they
need, when they need it.
Standardisation
Refers to applying consistent legal, technical and
other measures to data sharing partnerships.
16
Accountability
Refers to demonstrating compliance with data
protection laws and other rules specific to the data
sharing partnership, and that each party has robust
governance structures in place, and a corporate
culture that encourages employees to take
responsibility for the handling of data.
PART 1:
DATA SHARING
STRATEGY
18
Organisations will identify what data can be shared, how this data
can be valued, and the various arrangements or models that can be
used for the sharing the data.
In the event where there is a need to assess the value of data on its
own (e.g. when approached by business partners for data),
organisations may consider the following three key actions:
a
a. are identifiable and definable - data assets may be made up
of specific files or specific tables or records within a database;
b.
b promise probable future economic benefits - have value, the
data asset must have a useful application. Identifying productive
uses for data is often necessary to assign value to the asset; and
c.
c are under the organisation’s control - the organisation must
also have rights to use the data in a way consistent with its rights
under applicable law and any contractual licensing arrangements,
while also protecting the data and restricting access to it by
others.
When assessing potential use cases and data partners for the data,
an organisation should consider all potential stakeholders in the
whole value chain or ecosystem that the organisation operates in.
This is in view that potential use cases could be generated from new
insights derived from combining data with stakeholders across the
value chain, beyond the immediate key suppliers and consumers.
For example, credit card providers could share data on purchasing
patterns with goods manufacturers and not just retailers.
There are three general approaches that could be applied to the valuation of data assets:
What is the value of a similar What is the minimum value to cover What incremental value can the data
data asset on the market? costs and generate margin? consumer generate with the data asset?
If market value for identical or similar If the data can be reproduced or If the net cash flow benefits of the data can
data is available replaced be reasonably quantified
Final value
Organisations should note that the data valuation approaches provide a hypothetical market
value of the data asset based on general valuation approaches and principles. The data
valuation approaches do not necessarily reflect the specific value of the data to the data
consumer and can only serve as a foundation when such needs arise.
For details on the methodologies, as well as some case studies and worked examples on data valuation, please
refer to “Guide to Data Valuation for Data Sharing”.
24
For examples of data sharing models, refer to APPENDIX II: Data Sharing Models
– Example Scenarios & Case Studies.
TRUSTED DATA SHARING FRAMEWORK 25
PART 2:
LEGAL AND
REGULATORY
CONSIDERATIONS
28
Organisations will need to ensure that the data can be shared in a legally-
compliant manner, as well as structure a data sharing agreement for the
data sharing partnership. This should be done with an idea of the potential
use case, data partners and potential data for sharing.
• This refers to the Data Provider having the rights to share the
Rights to data with the Data Consumer for the intended purpose and
share data commonly refers to intellectual property rights.
• Copyright and database rights are the most commonly
recognised data-related intellectual property rights and are
distinct from contractual rights agreed between data partners.
Refer to APPENDIX III : Restrictions and Rules on Data Sharing for details on how rules
and restrictions on data sharing can apply, and APPENDIX IV : Useful Sources of Worldwide
Data Rules and Guidance for some sources of data-related laws, regulations and guidelines.
30
While data protection policies and practices are intended for internal
use and compliance, they can help to engender trust in the data sharing
partnerships by establishing that parties involved are responsible parties
with similar data management, data protection and data use standards.
Data protection policies and practices also help to demonstrate
transparency relating to the use of data. Organisations can consider
certification schemes, such as IMDA’s Data Protection Trustmark, to accredit
themselves on their data management schemes.
For personal data, the PDPA sets out provisions to govern how organisations
collect, use and disclose personal data. Organisations should consider
the following factors:
Is the data sharing different from the original purpose for which
consent had been obtained?
Consider the
need to seek
fresh consent
Consider
adopting
dynamic and
iterative consent
Consent
• Obtain consent to collect, use or disclose individuals’
personal data.
• Allow individuals to withdraw consent.
Purpose
• Do not make customers consent to the collections, use or
disclosure of their personal data beyond what is reasonable
to provide the product or service.
• Collect, use or disclose personal data only for the purposes
for which consent was obtained.
Notification
• Notify individuals of the purposes for the collection, use or
disclosure of their personal data.
Accountability to individuals
Openness
• Appoint a Data Protection Officer and make his/her business
contact information readily available to the public.
• Publish information on the organisation’s data protection
policies, practices and complaint-handling process.
32
Protection
• Put in place reasonable security arrangements to protect
personal data from unauthorised access, collection, use,
disclosure and similar risks.
• Make reasonable effort to ensure that the personal data
collected is accurate and complete.
Accuracy
• Make reasonable effort to ensure that the personal data
collected is accurate and complete.
Retention
• Cease retention or anonymise personal data when it is no
longer necessary for any business or legal purposes.
Transfers
• Ensure that the standard of protection accorded to personal
data is comparable to the PDPA when it is transferred
overseas.
5
The exceptions from the consent requirement can be found in the Second Schedule
(collection of personal data without consent), Third Schedule (use of personal data
without consent), and Fourth Schedule (disclosure of personal data without consent)
of the PDPA. Examples of how some of these exceptions apply can be found in the
Key Concepts Guidelines, Advisory Guidelines for Healthcare Sector and Advisory
Guidelines for the Social Service Sector.
TRUSTED DATA SHARING FRAMEWORK 35
Database
Secured database containing key particulars of users who had previously used
or parked bicycles in an irresponsible manner.
Before allowing users to take the bicycles, bicycle sharing app companies may
query the database and users who had previously used or parked bicycles
irresponsibly would be flagged to the companies.
36
e confidentiality;
Grant of License: The permission to use the data for the intended purpose
provided by the Data Provider to the Data Consumer is typically granted
in the form of a license and may include ownership of derivative data. In
copyright law terms, ‘derivative work’ is copyrightable ‘work’ based on one
or more pre-existing ‘works’. An example may be a dataset which was
generated through analysis or compilation of other datasets. Where a Data
Consumer can generate derivative data from data provided by a Data
Provider, the licence may provide for the Data Consumer to obtain some
share of ownership in the derivative data.
Resolving Disputes: Disputes may arise between Data Providers and Data
Recipients. Common disputes between Data Providers and Data Recipients
are related to payment, breach of licence terms (e.g. unauthorised sharing
or use) or breach of other agreed terms. Within a data sharing agreement,
it is recommended for the parties to agree on simple escalation procedures
to ensure that within each organisation a dispute receives sufficiently senior
attention at the appropriate time and that the parties have processes in
place to respond to issues quickly to limit losses. Similarly, the parties should
agree on how to resolve disputes where amicable resolution is not achieved
after appropriate escalation.
PART 3:
TECHNICAL AND
ORGANISATION
CONSIDERATIONS
40
When sharing personal data, Data Providers should first consider if using
anonymised data can meet the data sharing objectives. Anonymisation or
other techniques can prevent unauthorised dissemination of data and
mitigate risks such as those posed by malicious third parties seeking to
reverse-engineer data from anonymised datasets. For data to be considered
anonymised, organisations have to ensure that there is no serious possibility
that an individual can be re-identified. If there is a need to share identifiable
data, PDPA compliance becomes relevant and Data Providers should
consider if the data sharing purpose is different from the original purpose
for which consent had been obtained, and consider the need to seek fresh
consent, rely on or seek exemptions.
For securing data sharing activities, the recommended practices are drawn
from existing risk assurance standards, guidelines and certifications. The
extent of adoption or application to data sharing activities should be scaled
according to organisations’ requirements and the data sharing use case.
Data exchange, whether physical or virtual, can occur either directly between
a Data Provider and a Data Consumer, or through a Data Service Provider
who might provide platform accessible by both the Data Provider and
Data Consumer. Regardless, it usually involves the migration of data from
one source to another and organisations can consider protecting the data
using cryptographic measures.
The most common delivery modes for data exchange, along with their
key characteristics, benefits, and challenges are summarised in the table
below.
Continuous
Access
High
Volume of
Data
High Speed
of Transfer
Highly
Sensitive
Data
Affordability
Secure by
Design
Organisations can also explore other ways to protect data integrity. There
are various methods to secure data, cryptographic or otherwise. Cryptography
refers to a range of techniques used to scramble or disguise data such that
it is only available to an authorised person to restore the data to its original
form.
PART 4:
OPERATIONALISING
DATA SHARING
50
Organisations can choose to proceed to share data after all legal and
technical modalities have been negotiated and agreed upon, or use this
section to think through how they want to share data.
The organisation may use the data received for secondary purposes, based
on the agreed terms of use, governance structure, rules and restrictions
between the data sharing partners. However, if the organisation intends
to use the shared data for purposes that had not been stated upfront in
the Data Sharing Agreement or beyond the restrictions on use that was
agreed on, it should then engage their data sharing partners and negotiate
or request for the new use of data.
4.4 UNDERSTAND
CONSIDERATIONS FOR RETENTION
AND DISPOSAL OF DATA
For business data, organisations should retain or dispose of the data received
according to the policies and procedures as agreed with the data sharing
partners and/or Data Service Providers. If these were not set out in the
Data Sharing Agreement, organisations should follow policies and
procedures based on the applicable laws and/or internal data management
policies based on classification of the received data.
APPENDICES
TRUSTED DATA SHARING FRAMEWORK 53
DATA SHARING
STRATEGY
54
APPENDIX I : APPLICATION OF
TRUST PRINCIPLES
This Appendix explains how the 6 Trust Principles Transparency, Accessibility,
Standardisation, Fairness and Ethics, Accountability and Security &
Data Integrity can be applied in different parts of the Framework.
Each Trust Principle would be first explained, followed by how it can help
engender trust in the partnership and lastly, examples of how it can be
applied at different parts of the Framework.
Transparency
For example, it is important for Data Consumers to clearly state, for example,
how they will be using the data provided to them by the Data Provider.
This can help data sharing partners build trust, and establish their integrity
at the outset of their data sharing journey.
Accessibility
This is typically related to technical accessibility but can also refer to accessing
other information such as metadata to find and identify data sets initially,
to assess their quality and fitness for purpose before the data sharing
partnership itself. This can help partners agree on the appropriate data
sharing mechanisms and restrictions based on the data type and their data
sharing model, establishing mutual trust and understanding that the data
shared will be accessed by the right people at the right time.
TRUSTED DATA SHARING FRAMEWORK 55
For example, at the outset of the data sharing partnership, partners can
decide what data sets (including metadata) should be accessible throughout
the life cycle of that data partnership. For technical accessibility, organisations
can consider the frequency of access, volume of data, exclusivity of access;
and sensitivity of the data. Organisations can also ensure that each data
partner’s obligations relating to data access are clearly set out in the legal
agreements for the data sharing partnership.
Accountability
With each organisation taking responsibility for the shared data, the Data
Provider is assured that the data shared would continue to be compliant
with the relevant laws and regulations. Within an organisation, a robust
culture of accountability within the organisation across business units,
departments and territories, can also help to build trusted data sharing
partnerships with other organisations as it provides a sense of confidence
that the data would be handled by individual(s) who are familiar with
responsible data management practices.
Standardisation
Legal standards
Organisations operating internationally must comply with a range of
data protection laws and other rules and restrictions at a country or
industry level. Data sharing partners should therefore agree on the
appropriate legal standards that apply to their partnership and refer to
this in their data sharing agreements, as there may be less commonality
in the legal standards, especially where they are from different industry
sectors or jurisdictions.
For example, when entering into data sharing agreements, data sharing
partners from different jurisdictions may manage the risks associated
with the application of different laws and regulations by agreeing upon
a governing law that they are both comfortable with, in the context of
the planned partnership.
TRUSTED DATA SHARING FRAMEWORK 57
Technical standards
Similarly, from a technical standards perspective, terms used to describe
the data and services have to be universally understood. This involves
references to industry glossaries. Some examples are applicable
International Organisation for Standards (“ISO”) standards, the FIBO
standard in the finance sector, or Preservation Metadata Implementation
Strategies (“PREMIS”) for metadata profiling.
Other measures
Beyond technical and legal standards, data sharing partners may discuss
their preferred data quality standards, to ensure that data offerings
meet a minimum level of quality assurance. While these standards may
not have the force of law, for example, if they are specific to a particular
industry or group of companies, they may be included in data sharing
agreements to help build trust between the data sharing partners by
ensuring that the data being shared is suitable for the project.
The simplest form of direct data sharing between a Data Provider and Data
Consumer is illustrated in the figure below. The parties may engage directly
with Data Service Providers throughout the lifecycle of the data, for example,
to manipulate, cleanse or organise the data. However, the data sharing
partnership remains directly between Data Provider and Data Consumer
as the Data Service Provider is not contributing data.
A bilateral data sharing model is also possible in the scenario where the
Data Service Provider facilitates the data sharing by matching the Data
Provider and Data Consumer’s data sharing requirements. In this scenario,
this is considered bilateral data sharing as the Data Service Provider does
not contribute data for sharing.
60
Multilateral
Insurer Bank
The parties each take on the role of Data Provider and Data Consumer to share data for
the purpose of fraud prevention.
To ensure that the parties are able to share data in a secure and legally-compliant manner,
the Data Service Provider facilitates the exchange by:
• defining the scope of data partnership and collaboration between the parties;
• implementing a common legal framework for the data exchange which defines the
data licence terms, including the type/category of data that may be extracted, the
permitted use and commercialisation of the data, and the enforceability of the licence;
and
• implementing a governed exchange workflow to facilitate data sharing and analysis,
utilising risk assessment and control mechanisms to manage risk and a flexible data
asset licensing framework to provide access to agreed subsets of data and algorithms.
The sharing of data in this example does not always require data to be exchanged, as it
may also be accessed virtually without any movement of data taking place.
In this example, the Data Service Provider continues to use audit features and egress
checks to monitor the conditions under which data is being shared to ensure that the
insight and output is consistent with the agreed data license. At no point is a copy of the
data created, nor retained. Data collaboration is enabled with no loss of control, under
a flexible framework of control.
TRUSTED DATA SHARING FRAMEWORK 61
Decentralised
Data Service
Provider
LEGAL AND
REGULATORY
CONSIDERATIONS
TRUSTED DATA SHARING FRAMEWORK 63
For business data, other legislations may also contain provisions which
impact organisations’ data sharing activities.
Guidelines
Legal Agreements
Data Providers should clearly state their rights in the data that is being
shared along with any related materials and to consider including intellectual
property ownership and licensing clauses in their data sharing agreements.
For example, a Data Provider may have the right to share data as a result
of having developed that data itself (e.g. in the creation of a database) or
obtained a licence from a third-party owner to re-distribute the data to the
Data Consumer.
1. Singapore Personal Data Protection Act 2012 (Act No. 26 of 2012) Singapore
2. Singapore Cybersecurity Act 2018 (Act No. 9 of 2018) Singapore
3. IMDA Data Protection Certification Trustmark Certification Criteria Singapore
4. Personal Data Protection Commission Guide to Anonymisation Singapore
5. Monetary Authority of Singapore Guidelines on Outsourcing Risk Management Singapore
6. Monetary Authority of Singapore Principles to Promote Fairness, Ethics, Accountability Singapore
and Transparency in the Use of Artificial Intelligence and Data Analytics in
Singapore’s Financial Sector
7. Association of Banks Singapore’s Outsourced Service Providers Guidelines Singapore
8. Bank Negara Malaysia Policy Document on Outsourcing Malaysia
9. Malaysia Personal Data Protection Act 2010 (Act 709) Malaysia
10. Vietnam Law on Cybersecurity 2019 (No. 24/2018/QH14) Vietnam
11. Thailand Cybersecurity Act 2019 Thailand
12. Government Regulation No. 82 of 2012 Concerning the Electronic System and Indonesia
Transaction Operation
13. Hong Kong Monetary Authority SA-2 Supervisory Policy Manual on Outsourcing HongKong
14. California Consumer Privacy Act of 2018 USA
15. Australian Computer Society Data Sharing Frameworks Technical White Paper Australia
16. Australia Privacy Act 1988 (Act No.119, 1988) Australia
17. EU General Data Protection Regulation (Regulation (EU) 2016/679) EU
18. European Commission Study on Data Sharing Between Companies in Europe EU
19. National Health Service General Data Protection Regulation Guidance UK
20. EU-U.S. Privacy Shield (2016) EU and USA
21. Asia-Pacific Economic Cooperation Privacy Framework (2005) APEC
22. Organisation for Economic Co-Operation and Development Revised Guidelines OECD
on the Protection of Privacy and Transborder Flows of Personal Data (2013)
23. The FAIR Guiding Principles for Scientific Data Management and Stewardship NA
66
SHARING
PERSONAL DATA
68
Under the PDPA, organisations must notify the individual of the purposes
of the collection, use and disclosure of his personal data, during or before
collecting the personal data, and obtain his or her consent. If an organisation
intends to share the personal data for a different purpose from the original
purpose for which consent had been obtained, the organisation must
inform the individual of the new purpose and obtain fresh consent from
the individual, unless an exception applies.
Example 1
Consent was obtained by ABC for the
purpose of product research and
development
Organisation Organisation
ABC XYZ
ABC wants to share the personal data
with XYZ for a new purpose of
marketing-related products and
services
• As Organisation ABC wants to share the data with Organisation XYZ for a new purpose,
ABC must notify the individuals of the new purpose and obtain their consent.6
• If there are any potential risks to the individuals as a result of sharing the personal
data, Organisation ABC should highlight these risks to the individuals when obtaining
their consent.
• Organisation ABC must allow the individuals to withdraw their consent if they no
longer want their personal data to be shared for this purpose.
In the context of data sharing, especially for activities like big data analytics,
it can sometimes be challenging for organisations to determine the purposes
for sharing data at the outset, and whether fresh consent is required for
the sharing. The following examples provide an illustration of when fresh
consent should be obtained.
6
If the organisation intends to send a message to a Singapore telephone number to
obtain consent for marketing purpose, this would constitute a specified message and
the organisation must also ensure compliance with the Do Not Call Provisions of the
PDPA.
TRUSTED DATA SHARING FRAMEWORK 69
Example 2
• Organisations A, B and C each wants to carry out its own data analytics on personal data in its
possession. Each organisation has obtained its customers’ consent to use the personal data for
its own data analytics.
• Activities such as storage and analytics of each organisation’s own data performed in the Data
Service Provider’s platform would likely fall within the purpose of data analytics, and no additional
consent is required for such activities.
70
Example 3
Anonymised Insights
Disclosure of personal data for the purpose of data analytics
• In addition, Data Service Provider, which is acting on behalf of A, B and C, conducts analytics on
datasets provided by A, B and C. Anonymised insights are then derived from the meshed data
pool and can be extracted by any organisation using the platform.
• In this example, only anonymised insights will be shared with C. A’s and B’s personal data stored
on Data Service Provider’s platform will not be disclosed to C.
• Since insights generated are anonymised, it is no longer personal data. Hence, additional consent
is not required for the sharing of anonymised datasets or insights with other organisations.
• For data to be considered anonymised, organisations have to ensure that there is no serious
possibility that an individual can be re-identified. For more information, please refer to the Advisory
Guidelines on Selected Topics, Chapter 3 on Anonymisation.
TRUSTED DATA SHARING FRAMEWORK 71
Example 4
Individual Insights
Disclosure of personal data for the purpose of data analytics
• In contrast, if A wants to share personal data with C for C’s data analytics purposes, A will have
to obtain fresh consent.
• This scenario is similar to the preceding scenario, except that individually identifiable insights
and analysis (instead of anonymised insights) would be derived.
• Consent obtained by Organisation A for the purposes of its own “data analytics” cannot extend
to the analytics activities of Organisation C. As such, initial consent obtained by Organisation A
would only apply to its own data analytics activities, and fresh consent must be obtained for
Organisation A to share the data in identifiable form to Organisation C.
72
Clear and specific consent obtained at the start of a relationship with the
individual may not always be able to cater for all future purposes, especially
in the current landscape where changing business models and new
technologies influence the way organisations collect, use or disclose personal
data.
If organisations need to obtain fresh consent for new purposes from time to
time, they should consider adopting innovative processes and methods to
comply with the consent requirement under the PDPA.
If there are any risks or implications for the individual as a result of sharing
the personal data (e.g. if the personal data contains sensitive information or
the sharing could adversely impact the individual), the individual should be
informed about the possible risks and implications. In general, organisations
should set the default as “not-to-share”, and allow individuals to opt in to
the data sharing.
Extracted from Singapore Design Jam (Nov 2018), co-hosted by IMDA and
TTC Labs
TRUSTED DATA SHARING FRAMEWORK 73
Exempted DSAs
This section sets out the considerations and criteria for applications to the
PDPC for organisations’ DSAs to be exempted from one or more obligations
under the PDPA on a case-by-case basis. The criteria for the PDPC to
consider a DSA exemption application are explained in the following
paragraphs.
Firstly, personal data shared under the DSA must be with a specified
group of organisations for a specified period of time. A specific
group of entities or individual entities which the DSA will apply to
must be specified in the application. After an exemption is granted,
if additional organisations need to be added to the DSA, approval
must be sought from the PDPC.
Thirdly, the sharing must not be likely to have any adverse impact
on the individuals, or there are legitimate interests and the benefits
to the public (or a section thereof) that outweigh any foreseeable
adverse impact to the individuals. The PDPC may consider exempting
the DSA if the arrangement falls under any of the following two
circumstances:
DSAs that are exempted from any PDPA obligation will be published
in the Gazette, as required under the PDPA.
b give effect to any requests to opt out within the time period
or any withdrawals of consent for the sharing of personal data
under the DSA; and/or
TECHNICAL AND
ORGANISATION
CONSIDERATIONS
TRUSTED DATA SHARING FRAMEWORK 77
Wire Transfer
Wireless
Object storage allows their users to store and retrieve data directly
from the Internet or from within a cloud platform, and access data
over an Internet connection and object storage endpoints. These
storage platforms are also typically elastic, allowing users to first
start small and then scale seamlessly. Vendors typically offer customers
a range of options to access data based on preferences and suitability
to certain tasks.
80
Data Providers may share their data with a Data Consumer through
Secure FTP (“SFTP”) or a customised URL using an object storage
platform. Alternatively, a cloud infrastructure may include a tool to
create a temporary long, difficult-to-guess URL that can be used for a
specified period to download objects without requiring further
authentication or giving full access to the storage account. A Data
Provider can share such a URL to a Data Consumer who can use the
URL to download data with any compatible HTTP clients such as Firefox,
or download the data via SFTP. Data sharing via object storage enables
transfer of large volume of data and usually includes access control
such as read-only access, Access Control List (“ACL”) defined access
and temporary access.
Data Service Providers which are able to secure the data pipeline from
the Data Provider to the Data Consumer can provide a cloud-supported
data exchange platform which enables the transfer of high volume data
at high speeds. For example, AWS and Azure are well-established
collaborative platforms where information is often shared between data
partners.
APIs are particularly useful for exchanges between smaller firms with
limited technical capabilities which are unable to invest in comprehensive
data management systems. Preliminary research by the EU Commission
has also certified the vastly interoperable nature of APIs, allowing
unrelated software applications to seamlessly exchange datasets and
data streams.
TRUSTED DATA SHARING FRAMEWORK 81
Data Providers and Data Consumers can exchange data quickly, easily,
and at no additional cost in the form of email attachments using third-
party email providers such as Gmail, Outlook, and Apple Mail. In addition
to built-in security measures, Data Providers, as email platform users,
may choose to adopt further protection measures such as password
protecting files and adding public key cryptography mechanisms. Apart
from security considerations around email theft, a critical limitation of
email exchange is its inability to support large files.
Encryption
Encryption refers to the process of encoding information to prevent
unauthorised access. Encryption can be used in data sharing activities to
protect stored or exchanged data from being accessed by an unauthorised
party. There are two primary types of encryption – symmetric key encryption
and public key encryption. Standards applicable to both forms of encryption
are:
Hashing
Hashing is a one-way digest function: it generates a string of a fixed length
from a text using algorithms such as the MD5, SHA and SHA-2. These vary in
sophistication with the SHA-2 as the current industry favourite as both an
algorithm and a standard. A hash generated from a body of text varies widely
with small variations in input and ideally makes it impossible to turn the hash
back into the original text.
While hashing does not apply directly to data sharing activities per se, it is
highly relevant in the secure storage of data. A worked example of a hash
would be the secure storage of customers’ email addresses. Once these email
addresses have been hashed, the resulting unreadable hashes can be stored
securely until they are “accessed” by running the hash again using the same
email addresses to check that the same hash is generated.
Salting
On top of conventional hashing, salting can be applied for an additional layer
of security. Salting refers to an environment where the output hash value is a
combination of the intended stored value and an additional salt value. Salting
is more relevant when the intended stored value is a common value such that
guesswork can enable a computer to decode the hash. Salt values can be
randomised and added to increase security around the hashed value.
Tokenisation
Tokenisation refers to the cryptographic process of substituting a sensitive data
element with a non-sensitive element referred to as a token. This token has
no exploitable or extrinsic value and simply serves as an identifying reference
to map the original data to the token. This form of cryptography secures data
in transit over the Internet as well as data at rest, and like encryption, is a form
of data obfuscation technology.
Homomorphic Encryption
While encryption and other cryptography methods can nevertheless expose
data to leaking and misuse once decrypted, recent developments in
homomorphic encryption and distributed ledger technology have allowed
data to be completely secured against misuse, leakage or theft.
OTHERS
TRUSTED DATA SHARING FRAMEWORK 87
Company Policies
10. Are there any rules of participation for data sharing groups or consortiums
that include onerous terms or which operate contrary to your corporate
practice or policy?
Considerations for Sharing Personal Data
11. Where personal data is involved, are the permissions, notices and consents
provided sufficient for the intended purpose?
Establishing Data Sharing Agreement
12. If the Data Service Provider is involved, do the applicable terms sufficiently
protect the exposure of the Data Provider and Data Consumer to losses
arising from participant breaches, general enforcement of contract and
intellectual property rights?
88
22. What additional data analysis is required after sharing has occurred?
23. What measures may be implemented to allow a Data Provider to monitor
the use and disclosure of its data after exchange?
24. How can a Data Provider ensure a Data Consumer complies with its ongoing
legal and regulatory obligations after the data exchange?
25. If the data sharing partnership is an ongoing relationship, is there any
commitment to ongoing improvement of technology safeguarding the
data and access to it?
26. Are there measures in place to implement the retention and disposal of
data according to what is set out in the Data Sharing Agreement?
TRUSTED DATA SHARING FRAMEWORK 89
ACKNOWLEDGEMENT
We would like to thank the members and companies of the following organisations and
workgroup who provided valuable inputs for the development of this Trusted Data Sharing
Framework:
BROUGHT TO YOU BY
This publication gives a framework for considerations related to data sharing. The
contents herein are not intended to be an authoritative statement of the law or a
substitute for legal or other professional advice. The IMDA, PDPC and their members,
officers and employees shall not be responsible for any inaccuracy, error or omission
in this publication or liable for any damage or loss of any kind as a result of any use
or reliance on this publication.