Announcing Agent Commander - The First Integrated solution from Veeam + Securiti.ai enabling the scaling of safe AI agents

View

Veeamon Tour'26 - Data & AI Trust CONVERGE for the Agentic Era

View

Thailand Data Protection Framework’s Consent Requirements

Download: Consent Report Q1 2026
Published November 19, 2022
Contributors

Semra Islam

Sr. Data Privacy Analyst

CIPM, CIPP/Europe

Maria Khan

Data Privacy Legal Manager at Securiti

FIP, CIPT, CIPM, CIPP/E

Listen to the content

On 7 September 2022, the Personal Data Protection Committee of Thailand (the “Data Protection Committee”) released Guidelines for Obtaining Consent from Data Subjects (the “Guidelines”). These Guidelines must be read together with Thailand’s Personal Data Protection Act (the “PDPA”) to understand consent requirements under Thailand’s data protection framework.

Under Thailand’s data protection framework, the data subject’s consent is considered a primary lawful basis for processing personal data. The data subject’s consent must be obtained prior to or at the time of the collection, use and disclosure of personal data unless any other legal basis is relied upon.

Data controllers may be required to use a prescribed consent form for obtaining the data subject’s consent specified by a regulatory body under an enforceable law to which the controller is subject to. However, where no such form is prescribed under any applicable law, data controllers must ensure that the consent of data subjects is as per the requirements of the PDPA and the Guidelines issued by the Data Protection Committee.

The following sections will help you understand consent legal requirements in Thailand and ensure compliance:

The data subject’s consent must be freely given. This means the data subject must be able to freely, independently, and voluntarily give consent without any threat, fraud, deception, coercion, intimidation, or misrepresentation on the part of the data controller.

Data controllers should not make consent requests part of contractual arrangements or terms and conditions of a service - the request for consent must be clearly distinguishable from any other matters.

  • Securiti’s Consent Management Solution allows you to create consent forms with unchecked consent by default to obtain freely given consent from website users.

Affirmative Action

Under the PDPA, the data subject’s consent cannot be implied. For obtaining consent, data subjects may be asked to perform actions such as clicking on an unchecked consent checkbox, pressing a mobile phone button twice in a row to show confirmation intent, or swiping across the screen to grant consent only where there is a conspicuous notification that such actions constitute an agreement or consent to the collection, use or disclosure of personal data.

The request for consent to a data subject may be made in a written statement or via electronic means unless that is not possible due to the nature of the request. Consent may also be obtained verbally in limited circumstances.

For obtaining consent from data subjects, data controllers should use means by which the data subject can be identified and their express intent can be demonstrated. Electronic means such as emails or electronic documents may be used in conjunction with other evidence according to the electronic transaction law. This includes giving consent using a password, digital signature, electronic signature in form, or biometrics (such as iris, fingerprints, faces, voices, or any other identifier that can be verified).

  • Securiti’s Cookie Consent Solution automatically scans cookies and similar tracking technologies and allows you to create opt-in cookie consent banners with equally prominent accept and reject fields.

While obtaining consent from data subjects, data subjects must be informed of the following information:

  • The information about the data controller,
  • The specific purpose of the collection, use, or disclosure of personal data,
  • The types of personal data to be collected, used, or disclosed, and
  • The right of the data subject to withdraw consent and the mechanism of doing so.

The data subject’s consent must be granular with respect to its processing purposes. This means the data subject must be able to provide separate consent for separate processing purposes rather than consenting to a bundle of processing purposes.

Moreover, personal data may be processed only for a purpose that has been communicated to the data subject. If the controller wishes to process data for a purpose different than what was originally communicated to the data subject, it must obtain fresh consent from the data subject unless an exception applies.

  • Securiti’s Preference Center within Consent Management allows users to opt-in and opt-out of granular consent purposes and processing purposes.

The data subject must be able to withdraw their consent at any time and as easily as they provided their consent. The controller must ensure that the consent withdrawal mechanism is easily accessible, prominent and visible to the data subject, and it does not require data subjects to undertake any additional steps for withdrawing consent.

On consent withdrawal, the controller must stop the data processing for which consent was relied upon. In addition, the consent withdrawal should not impact the quality of the website service offered to the data subject. The data subject must be informed of any consequences of consent withdrawal.

  • Securiti’s selective consent management allows data subjects to quickly revoke from and resubscribe to their consent preferences via the consent preference center.

In the case of personal data belonging to a minor of 10 years or less than 10 years of age, consent must be obtained from their holders of parental authority. Consent must also be obtained from holders of parental authority for minors who are between 10 and 20 years of age and are not sui juris by marriage or have no capacity as a sui juris person under Section 27 of the Civil Commercial Code.

However, the controller must obtain consent directly from the minor in any of the following instances:

  • where the minor is sui juris (independent and legally competent to manage their affairs) by marriage, or by way of legal capacity of carrying out a business or entering into a services contract as an employee;
  • where the minor is performing an act by virtue of which they acquire a right or are freed from a duty;
  • where the minor is performing a strictly personal act; or
  • where the minor is performing an act which is suitable to their condition in life, and required for their reasonable needs.

Data controllers are required to communicate with minors in easily understandable and intelligible language, employ appropriate measures for age verification and identification of minors and parental authorities, and maintain appropriate records.

  • Securiti’s Consent Management allows you to obtain minors’ consent, set preference centers for minors’ consent, and maintain updated consent records to help you demonstrate compliance.

Any collection of sensitive personal data, that is data pertaining to racial, ethnic origin, political opinions, cult, religious or philosophical beliefs, sexual behavior, criminal records, health data, disability, trade union information, genetic data, biometric data, or any data which may affect the data subject in such manner as prescribed by the Data Protection Committee, should be performed with the ‘explicit’ consent of the data subject, unless any other legal exception or ground is relied upon by the data controller for such collection as per Section 26 of the PDPA.

The legal grounds that permit the collection of sensitive personal data under the PDPA are generally stricter than those for the processing of other personal data. Under international jurisprudence, explicit consent refers to an express statement of consent made by the data subject.

  • Securiti’s Consent Management allows you to create consent forms that facilitate the capturing of explicit consent from data subjects and establishes and maintains updated and comprehensive consent audit trails by recording the exact text of the agreement and data categories to which the data subject consents.

Request a DEMO today to understand how Securiti can help you comply with Thailand’s consent requirements and other data privacy laws and regulations.

Analyze this article with AI

Prompts open in third-party AI tools.
Join Our Newsletter

Get all the latest information, law updates and more delivered to your inbox


Share

More Stories that May Interest You
Videos
View More
Rehan Jalil, Veeam on Agent Commander : theCUBE + NYSE Wired: Cyber Security Leaders
Following Veeam’s acquisition of Securiti, the launch of Agent Commander marks an important step toward helping enterprises adopt AI agents with greater confidence. In...
View More
Mitigating OWASP Top 10 for LLM Applications 2025
Generative AI (GenAI) has transformed how enterprises operate, scale, and grow. There’s an AI application for every purpose, from increasing employee productivity to streamlining...
View More
Top 6 DSPM Use Cases
With the advent of Generative AI (GenAI), data has become more dynamic. New data is generated faster than ever, transmitted to various systems, applications,...
View More
Colorado Privacy Act (CPA)
What is the Colorado Privacy Act? The CPA is a comprehensive privacy law signed on July 7, 2021. It established new standards for personal...
View More
Securiti for Copilot in SaaS
Accelerate Copilot Adoption Securely & Confidently Organizations are eager to adopt Microsoft 365 Copilot for increased productivity and efficiency. However, security concerns like data...
View More
Top 10 Considerations for Safely Using Unstructured Data with GenAI
A staggering 90% of an organization's data is unstructured. This data is rapidly being used to fuel GenAI applications like chatbots and AI search....
View More
Gencore AI: Building Safe, Enterprise-grade AI Systems in Minutes
As enterprises adopt generative AI, data and AI teams face numerous hurdles: securely connecting unstructured and structured data sources, maintaining proper controls and governance,...
View More
Navigating CPRA: Key Insights for Businesses
What is CPRA? The California Privacy Rights Act (CPRA) is California's state legislation aimed at protecting residents' digital privacy. It became effective on January...
View More
Navigating the Shift: Transitioning to PCI DSS v4.0
What is PCI DSS? PCI DSS (Payment Card Industry Data Security Standard) is a set of security standards to ensure safe processing, storage, and...
View More
Securing Data+AI : Playbook for Trust, Risk, and Security Management (TRiSM)
AI's growing security risks have 48% of global CISOs alarmed. Join this keynote to learn about a practical playbook for enabling AI Trust, Risk,...

Spotlight Talks

Spotlight
Future-Proofing for the Privacy Professional
Watch Now View
Spotlight 50:52
From Data to Deployment: Safeguarding Enterprise AI with Security and Governance
Watch Now View
Spotlight 11:29
Not Hype — Dye & Durham’s Analytics Head Shows What AI at Work Really Looks Like
Not Hype — Dye & Durham’s Analytics Head Shows What AI at Work Really Looks Like
Watch Now View
Spotlight 11:18
Rewiring Real Estate Finance — How Walker & Dunlop Is Giving Its $135B Portfolio a Data-First Refresh
Watch Now View
Spotlight 13:38
Accelerating Miracles — How Sanofi is Embedding AI to Significantly Reduce Drug Development Timelines
Sanofi Thumbnail
Watch Now View
Spotlight 10:35
There’s Been a Material Shift in the Data Center of Gravity
Watch Now View
Spotlight 14:21
AI Governance Is Much More than Technology Risk Mitigation
AI Governance Is Much More than Technology Risk Mitigation
Watch Now View
Spotlight 12:!3
You Can’t Build Pipelines, Warehouses, or AI Platforms Without Business Knowledge
Watch Now View
Spotlight 47:42
Cybersecurity – Where Leaders are Buying, Building, and Partnering
Rehan Jalil
Watch Now View
Spotlight 27:29
Building Safe AI with Databricks and Gencore
Rehan Jalil
Watch Now View
Latest
View More
Building Sovereign AI with HPE Private Cloud AI and Veeam Securiti Gencore AI
How HPE Private Cloud AI, NVIDIA acceleration, and Veeam Securiti Gencore AI support secure, governed enterprise AI with policy enforcement across RAG, assistant, and agentic workflows.
View More
Securiti.ai Names Accenture as 2025 Partner of the Year
In a continued celebration of impactful collaboration in DataAI Security, Securiti.ai, a Veeam company, has honored Accenture as its 2025 Partner of the Year....
Largest Fine In CCPA History_ What The Latest CCPA Enforcement Action Teaches Businesses View More
Largest Fine In CCPA History: What The Latest CCPA Enforcement Action Teaches Businesses
Businesses can take some vital lessons from the recent biggest enforcement action in CCPA history. Securiti’s blog covers all the important details to know.
View More
AI & HIPAA: What It Means and How to Automate Compliance
Explore how the Health Insurance Portability and Accountability Act (HIPAA) applies to Artificial Intelligence (AI) in securing Protected Health Information (PHI). Learn how to...
View More
Agentic AI & Privacy: Governing Autonomous AI Agents in the Enterprise
Learn how to govern agentic AI in the enterprise. Manage privacy risks, control data access, enforce policies and ensure compliance for autonomous AI agents.
View More
Opt-Outs That Stick: Consent Withdrawal Across Marketing, SaaS & GenAI
Securiti's whitepaper provides a detailed overview of various consent withdrawal requirements across marketing, SaaS, and GenAI. Read now to learn more.
View More
Agent Commander: Solution Brief
Learn how Agent Commander detects AI agents, protects enterprise data with runtime guardrails, and undoes AI errors - enabling secure, compliant AI adoption at...
Compliance with CCPA Amendments with Securiti View More
Compliance with CCPA Amendments with Securiti
Stay compliant with 2026 CCPA amendments using Securiti, covering updated consent requirements, expanded sensitive data definitions, enhanced consumer rights, and readiness assessments.
View More
Take the Data Risk Out of AI
Learn how to prepare enterprise data for safe Gemini Enterprise adoption with upstream governance, sensitive data discovery, and pre-index policy controls.
View More
Navigating HITRUST: A Guide to Certification
Securiti's eBook is a practical guide to HITRUST certification, covering everything from choosing i1 vs r2 and scope systems to managing CAPs & planning...
What's
New