Announcing Agent Commander - The First Integrated solution from Veeam + Securiti.ai enabling the scaling of safe AI agents

View

Veeamon Tour'26 - Data & AI Trust CONVERGE for the Agentic Era

View

Malaysia’s 2025 Data Protection Guidelines: DPO Appointment and Breach Notification

Contributors

Salma Khan

Data Privacy Analyst at Securiti

CIPP/Asia

Syeda Eimaan Gardezi

Associate Data Privacy Analyst at Securiti

Published March 13, 2025

Listen to the content

Introduction

On February 25, 2025, Malaysia's Department of Personal Data Protection (PDP) launched the Data Protection Officer Appointment Guidelines (DPO Guidelines) and Data Breach Notification Guidelines (Breach Guidelines), set to take effect on June 1, 2025.  These regulations fall under the Personal Data Protection Act (PDPA), a comprehensive data privacy law enacted to govern the processing of personal data, ensuring individuals' privacy rights while imposing compliance obligations on organizations. The PDPA also appoints the Personal Data Protection Commissioner (Commissioner) as the regulatory authority to enforce compliance.

The DPO and Breach Guidelines provide much-needed clarity on the PDPA regarding when DPOs must be appointed, their qualifications, and the procedural requirements for managing data breaches. While organizations may face challenges in implementing some of the requirements, the overall framework provides a clear and structured direction for improving data breach response. Thus, these guidelines serve as a strong foundation for enhancing data protection in Malaysia and helping businesses establish best practices.

In this blog, we will explore the key provisions of these circulars and discuss what organizations must do to comply with the latest regulatory requirements.

Summary: Key Compliance Measures for Businesses

  • Notify the Commissioner of a breach within 72 hours if it causes significant harm or affects more than 1,000 individuals.
  • Notify data subjects of a breach within 7 days after the initial notification to the Commissioner if it presents or is likely to present significant harm.
  • Maintain a breach register for a period of 2 years to ensure proper documentation and compliance with the guidelines.
  • Appoint a DPO if processing exceeds 20,000 data subjects, or 10,000 for sensitive or financial data, or if regular monitoring is involved.
  • Notify the Commissioner within 21 days of appointing the DPO.

Breach Guidelines

The Data Breach Guidelines define a personal data breach as unauthorized access, loss, or misuse of personal data, whether accidental or intentional. While data controllers are directly responsible for reporting breaches, processors are not. Instead, controllers must ensure that processors commit via contractual agreements to promptly report breaches and provide necessary support. This approach aligns with global best practices, reinforcing the principle that ultimate accountability lies with the entity determining data processing purposes.

The data controller must establish effective data breach management and response plans to promptly detect, contain, and mitigate breaches while ensuring compliance with notification obligations. The plan should include:

  • procedures for identifying and escalating breaches;
  • roles and responsibilities of key stakeholders;
  • steps to contain and reduce breach impact;
  • criteria for notifying the Commissioner and affected data subjects; and
  • post-incident review.

Regular training, awareness programs, and simulations are essential for the plan to be effective and ensure employees can respond effectively to data breaches. This helps minimize errors, but keeping employees engaged and retaining knowledge can be challenging.

Have a look at the following table to understand breach notification requirements under the PDPA:

Notification to Commissioner 

Notification to Data Subjects 

Threshold  Every data controller involved in a breach must separately notify the Commissioner if the personal data breach causes or is likely to cause “significant harm.”

A personal data breach poses "significant harm" if it risks physical harm, financial loss, credit damage, property loss, illegal misuse, involves sensitive data, enables identity fraud, or occurs on a significant scale (affects more than 1000 data subjects).

Data controllers must inform affected individuals of a personal data breach if it poses or likely poses "significant harm," regardless of the breach's scale.
Timeline  Within 72 hours, otherwise a written notice should be submitted explaining reasons for the delay with evidence. Without unnecessary delay, in any case within 7 days of notifying the Commissioner.
Manner of Notification Notification to the Commissioner can be made via the online form at www.pdp.gov.my.

Additionally, the Breach Guidelines also provide an annexed form. By emailing that to dbnpdp@pdp.gov.my, or by sending a hard copy to the Commissioner, notification can also be made.

Affected data subjects must be notified directly in clear, appropriate language to help them take protective measures. It should be separate from the regular communications

Moreover, if direct notification is impractical or overly burdensome, alternative methods like public announcements may be used.

Content of Notification  The annexed form includes categories such as breach details, data compromised, and recovery steps. The data controller also needs to provide:

  • date and time of breach detection;
  • type of personal data and nature of breach;
  • method of identification and suspected cause;
  • number of affected data subjects and records;
  • affected personal data systems;
  • potential consequences;
  • chronology of events leading to the breach;
  • mitigation measures taken or planned;
  • steps to assist affected individuals; and
  • contact details for further information.
The breach notification to affected data subjects must include:

  • details of the breach;
  • potential consequences;
  • actions taken or planned to mitigate risks;
  • steps individuals can take to reduce harm; and
  • contact details for further information.

 

Additionally, data controllers must maintain a breach register for at least two years, documenting key details like cause, impact, and actions taken. While this adds administrative burden, it enhances transparency, helps organizations improve their data protection practices, and demonstrates compliance.

Upon discovering a data breach, data controllers must:

  1. assess, contain, and minimize impact by isolating systems, suspending access, and stopping harmful practices;
  2. conduct a thorough investigation to determine the breach's scope, cause, and potential harm; and
  3. perform a post-breach evaluation to improve future prevention and response.

Compliance Steps for Organizations and How Securiti Can Help

  1. Create and implement a clear breach management plan.
  2. Identify breach criteria by understanding what constitutes a data breach and significant harm under the guidelines.
  3. Implement systems to quickly detect potential data breaches.
  4. Report the breach to the PDP within the specified time frame, detailing the breach.
  5. Inform affected data subjects if significant harm is possible.
  6. Keep detailed records of all breaches and actions taken.
  7. Evaluate the breach response and improve processes.
  8. Regularly reassess data processing risks and update the breach plan.

Securiti’s Breach Management automation provides incident response workflows that help organizations respond to privacy incidents promptly and effectively. This enables organizations to take reasonable steps to protect personal information from unauthorized access, disclosure, alteration, misuse, or deletion before processing it.

DPO Guidelines

Data controllers and processors must appoint one or more Data Protection Officers (DPOs) to ensure accountability and compliance with data protection laws. This obligation applies when personal data processing involves:

  • more than 20,000 data subjects,
  • sensitive personal data exceeding 10,000 data subjects, or
  • regular monitoring of personal data.

The threshold approach is similar to other data privacy laws, which oblige organizations of a certain scale and size to appoint a DPO.

When appointing a DPO or determining the qualifications needed, data controllers and processors should consider the nature of the personal data processing, its complexity and scale, the sensitivity of the data, and the level of protection required. However, appointing a DPO does not absolve data controllers or processors from their broader compliance obligations under PDPA. This stipulation emphasizes that the DPO’s role is to assist in achieving compliance, but it does not transfer full responsibility for legal compliance onto the DPO. Organizations must maintain oversight and ensure all regulatory requirements are met.

Organizations must also record the appointed DPO, register the DPO, submit their contact details to the Commissioner within 21 days, and ensure that the contact details are easily accessible through official channels. This maintains transparency and ensures effective communication between organizations and regulatory authorities. Moreover, the DPO must have a separate business email, which further strengthens the DPO’s independence and helps clearly distinguish their role in data protection matters from day-to-day operations.

DPO Eligibility Criteria

To ensure responsiveness, the DPO must be resident in Malaysia for at least 180 days annually, be easily contactable by any means, and be proficient in both Bahasa Melayu and English. Being easily contactable promotes quick communication with stakeholders, reinforcing the importance of responsiveness in compliance. Proficiency in both Bahasa Melayu and English is essential for effective communication with local authorities and data subjects, especially in Malaysia’s multilingual environment.

Responsibilities of DPO

The DPO serves as the primary liaison between data subjects and the data controller or processor for data processing and rights and also acts as the main point of contact between the controller or processor and the Commissioner.  It's also important to note that the DPO may hold additional roles and serve multiple entities. Flexibility is a practical approach, particularly for organizations with limited resources. However, it is essential to avoid any conflicts of interest that could compromise the DPO’s independence, as the DPO will be responsible for:

  • advising on personal data processing;
  • supporting compliance with PDPA and other data protection laws;
  • assisting in Data Protection Impact Assessments (DPIA);
  • monitoring personal data compliance;
  • ensuring proper breach and incident management;
  • handling reports and documents required by the Commissioner; and
  • taking on additional duties as needed.

It’s also important to note that data controllers and processors are responsible for ensuring their appointed DPO receives necessary resources and adequate training to enable them to perform their functions.

Compliance Steps for Organizations and How Securiti Can Help

  1. Assess DPO requirements and determine if your organization needs a DPO based on data processing activities.
  2. Appoint a qualified DPO and ensure the DPO has relevant qualifications and expertise in data protection laws.
  3. Ensure the DPO is registered with the PDP.
  4. Make the DPO accessible to all relevant parties, including external entities if applicable.
  5. Regularly update the DPO on evolving data protection regulations and provide relevant training.
  6. Ensure DPO operates independently, without conflicts of interest.

Securiti’s Data Mapping module can equip DPOs with tools to uphold stringent data security and governance protocols to catalog and map all data processing activities.

Conclusion

Securiti enables organizations to navigate and comply with Data Protection Officer Appointment Guidelines (DPO Guidelines) and Data Breach Notification Guidelines (Breach Guidelines), set to take effect on June 1, 2025.

Securiti is the pioneer of the Data Command Center, a centralized platform that enables the safe use of data and GenAI. Securiti provides unified data intelligence, controls, and orchestration across hybrid multi-cloud environments. Large global enterprises rely on Securiti's Data Command Center for data security, privacy, governance, and compliance.

Request a demo to learn more.

Analyze this article with AI

Prompts open in third-party AI tools.
Join Our Newsletter

Get all the latest information, law updates and more delivered to your inbox



More Stories that May Interest You
Videos
View More
Rehan Jalil, Veeam on Agent Commander : theCUBE + NYSE Wired: Cyber Security Leaders
Following Veeam’s acquisition of Securiti, the launch of Agent Commander marks an important step toward helping enterprises adopt AI agents with greater confidence. In...
View More
Mitigating OWASP Top 10 for LLM Applications 2025
Generative AI (GenAI) has transformed how enterprises operate, scale, and grow. There’s an AI application for every purpose, from increasing employee productivity to streamlining...
View More
Top 6 DSPM Use Cases
With the advent of Generative AI (GenAI), data has become more dynamic. New data is generated faster than ever, transmitted to various systems, applications,...
View More
Colorado Privacy Act (CPA)
What is the Colorado Privacy Act? The CPA is a comprehensive privacy law signed on July 7, 2021. It established new standards for personal...
View More
Securiti for Copilot in SaaS
Accelerate Copilot Adoption Securely & Confidently Organizations are eager to adopt Microsoft 365 Copilot for increased productivity and efficiency. However, security concerns like data...
View More
Top 10 Considerations for Safely Using Unstructured Data with GenAI
A staggering 90% of an organization's data is unstructured. This data is rapidly being used to fuel GenAI applications like chatbots and AI search....
View More
Gencore AI: Building Safe, Enterprise-grade AI Systems in Minutes
As enterprises adopt generative AI, data and AI teams face numerous hurdles: securely connecting unstructured and structured data sources, maintaining proper controls and governance,...
View More
Navigating CPRA: Key Insights for Businesses
What is CPRA? The California Privacy Rights Act (CPRA) is California's state legislation aimed at protecting residents' digital privacy. It became effective on January...
View More
Navigating the Shift: Transitioning to PCI DSS v4.0
What is PCI DSS? PCI DSS (Payment Card Industry Data Security Standard) is a set of security standards to ensure safe processing, storage, and...
View More
Securing Data+AI : Playbook for Trust, Risk, and Security Management (TRiSM)
AI's growing security risks have 48% of global CISOs alarmed. Join this keynote to learn about a practical playbook for enabling AI Trust, Risk,...

Spotlight Talks

Spotlight
Future-Proofing for the Privacy Professional
Watch Now View
Spotlight 50:52
From Data to Deployment: Safeguarding Enterprise AI with Security and Governance
Watch Now View
Spotlight 11:29
Not Hype — Dye & Durham’s Analytics Head Shows What AI at Work Really Looks Like
Not Hype — Dye & Durham’s Analytics Head Shows What AI at Work Really Looks Like
Watch Now View
Spotlight 11:18
Rewiring Real Estate Finance — How Walker & Dunlop Is Giving Its $135B Portfolio a Data-First Refresh
Watch Now View
Spotlight 13:38
Accelerating Miracles — How Sanofi is Embedding AI to Significantly Reduce Drug Development Timelines
Sanofi Thumbnail
Watch Now View
Spotlight 10:35
There’s Been a Material Shift in the Data Center of Gravity
Watch Now View
Spotlight 14:21
AI Governance Is Much More than Technology Risk Mitigation
AI Governance Is Much More than Technology Risk Mitigation
Watch Now View
Spotlight 12:!3
You Can’t Build Pipelines, Warehouses, or AI Platforms Without Business Knowledge
Watch Now View
Spotlight 47:42
Cybersecurity – Where Leaders are Buying, Building, and Partnering
Rehan Jalil
Watch Now View
Spotlight 27:29
Building Safe AI with Databricks and Gencore
Rehan Jalil
Watch Now View
Latest
View More
Building Sovereign AI with HPE Private Cloud AI and Veeam Securiti Gencore AI
How HPE Private Cloud AI, NVIDIA acceleration, and Veeam Securiti Gencore AI support secure, governed enterprise AI with policy enforcement across RAG, assistant, and agentic workflows.
View More
Securiti.ai Names Accenture as 2025 Partner of the Year
In a continued celebration of impactful collaboration in DataAI Security, Securiti.ai, a Veeam company, has honored Accenture as its 2025 Partner of the Year....
Largest Fine In CCPA History_ What The Latest CCPA Enforcement Action Teaches Businesses View More
Largest Fine In CCPA History: What The Latest CCPA Enforcement Action Teaches Businesses
Businesses can take some vital lessons from the recent biggest enforcement action in CCPA history. Securiti’s blog covers all the important details to know.
View More
AI & HIPAA: What It Means and How to Automate Compliance
Explore how the Health Insurance Portability and Accountability Act (HIPAA) applies to Artificial Intelligence (AI) in securing Protected Health Information (PHI). Learn how to...
View More
Opt-Outs That Stick: Consent Withdrawal Across Marketing, SaaS & GenAI
Securiti's whitepaper provides a detailed overview of various consent withdrawal requirements across marketing, SaaS, and GenAI. Read now to learn more.
View More
The Hidden Privacy Cost of Shadow AI & Shadow Data
Download the whitepaper to discover the risks of Shadow AI and Shadow Data, why traditional controls fail, and how to build proactive, scalable AI...
View More
Agent Commander: Solution Brief
Learn how Agent Commander detects AI agents, protects enterprise data with runtime guardrails, and undoes AI errors - enabling secure, compliant AI adoption at...
Compliance with CCPA Amendments with Securiti View More
Compliance with CCPA Amendments with Securiti
Stay compliant with 2026 CCPA amendments using Securiti, covering updated consent requirements, expanded sensitive data definitions, enhanced consumer rights, and readiness assessments.
View More
Take the Data Risk Out of AI
Learn how to prepare enterprise data for safe Gemini Enterprise adoption with upstream governance, sensitive data discovery, and pre-index policy controls.
View More
Navigating HITRUST: A Guide to Certification
Securiti's eBook is a practical guide to HITRUST certification, covering everything from choosing i1 vs r2 and scope systems to managing CAPs & planning...
What's
New