Securiti leads GigaOm's DSPM Vendor Evaluation with top ratings across technical capabilities & business value.

View

Malaysia’s 2025 Data Protection Guidelines: DPO Appointment and Breach Notification

Contributors

Salma Khan

Data Privacy Analyst

CIPP/Asia

Syeda Eimaan Gardezi

Associate Data Privacy Analyst at Securiti

Listen to the content

Introduction

On February 25, 2025, Malaysia's Department of Personal Data Protection (PDP) launched the Data Protection Officer Appointment Guidelines (DPO Guidelines) and Data Breach Notification Guidelines (Breach Guidelines), set to take effect on June 1, 2025.  These regulations fall under the Personal Data Protection Act (PDPA), a comprehensive data privacy law enacted to govern the processing of personal data, ensuring individuals' privacy rights while imposing compliance obligations on organizations. The PDPA also appoints the Personal Data Protection Commissioner (Commissioner) as the regulatory authority to enforce compliance.

The DPO and Breach Guidelines provide much-needed clarity on the PDPA regarding when DPOs must be appointed, their qualifications, and the procedural requirements for managing data breaches. While organizations may face challenges in implementing some of the requirements, the overall framework provides a clear and structured direction for improving data breach response. Thus, these guidelines serve as a strong foundation for enhancing data protection in Malaysia and helping businesses establish best practices.

In this blog, we will explore the key provisions of these circulars and discuss what organizations must do to comply with the latest regulatory requirements.

Summary: Key Compliance Measures for Businesses

  • Notify the Commissioner of a breach within 72 hours if it causes significant harm or affects more than 1,000 individuals.
  • Notify data subjects of a breach within 7 days after the initial notification to the Commissioner if it presents or is likely to present significant harm.
  • Maintain a breach register for a period of 2 years to ensure proper documentation and compliance with the guidelines.
  • Appoint a DPO if processing exceeds 20,000 data subjects, or 10,000 for sensitive or financial data, or if regular monitoring is involved.
  • Notify the Commissioner within 21 days of appointing the DPO.

Breach Guidelines

The Data Breach Guidelines define a personal data breach as unauthorized access, loss, or misuse of personal data, whether accidental or intentional. While data controllers are directly responsible for reporting breaches, processors are not. Instead, controllers must ensure that processors commit via contractual agreements to promptly report breaches and provide necessary support. This approach aligns with global best practices, reinforcing the principle that ultimate accountability lies with the entity determining data processing purposes.

The data controller must establish effective data breach management and response plans to promptly detect, contain, and mitigate breaches while ensuring compliance with notification obligations. The plan should include:

  • procedures for identifying and escalating breaches;
  • roles and responsibilities of key stakeholders;
  • steps to contain and reduce breach impact;
  • criteria for notifying the Commissioner and affected data subjects; and
  • post-incident review.

Regular training, awareness programs, and simulations are essential for the plan to be effective and ensure employees can respond effectively to data breaches. This helps minimize errors, but keeping employees engaged and retaining knowledge can be challenging.

Have a look at the following table to understand breach notification requirements under the PDPA:

Notification to Commissioner 

Notification to Data Subjects 

Threshold  Every data controller involved in a breach must separately notify the Commissioner if the personal data breach causes or is likely to cause “significant harm.”

A personal data breach poses "significant harm" if it risks physical harm, financial loss, credit damage, property loss, illegal misuse, involves sensitive data, enables identity fraud, or occurs on a significant scale (affects more than 1000 data subjects).

Data controllers must inform affected individuals of a personal data breach if it poses or likely poses "significant harm," regardless of the breach's scale.
Timeline  Within 72 hours, otherwise a written notice should be submitted explaining reasons for the delay with evidence. Without unnecessary delay, in any case within 7 days of notifying the Commissioner.
Manner of Notification Notification to the Commissioner can be made via the online form at www.pdp.gov.my.

Additionally, the Breach Guidelines also provide an annexed form. By emailing that to dbnpdp@pdp.gov.my, or by sending a hard copy to the Commissioner, notification can also be made.

Affected data subjects must be notified directly in clear, appropriate language to help them take protective measures. It should be separate from the regular communications

Moreover, if direct notification is impractical or overly burdensome, alternative methods like public announcements may be used.

Content of Notification  The annexed form includes categories such as breach details, data compromised, and recovery steps. The data controller also needs to provide:

  • date and time of breach detection;
  • type of personal data and nature of breach;
  • method of identification and suspected cause;
  • number of affected data subjects and records;
  • affected personal data systems;
  • potential consequences;
  • chronology of events leading to the breach;
  • mitigation measures taken or planned;
  • steps to assist affected individuals; and
  • contact details for further information.
The breach notification to affected data subjects must include:

  • details of the breach;
  • potential consequences;
  • actions taken or planned to mitigate risks;
  • steps individuals can take to reduce harm; and
  • contact details for further information.

 

Additionally, data controllers must maintain a breach register for at least two years, documenting key details like cause, impact, and actions taken. While this adds administrative burden, it enhances transparency, helps organizations improve their data protection practices, and demonstrates compliance.

Upon discovering a data breach, data controllers must:

  1. assess, contain, and minimize impact by isolating systems, suspending access, and stopping harmful practices;
  2. conduct a thorough investigation to determine the breach's scope, cause, and potential harm; and
  3. perform a post-breach evaluation to improve future prevention and response.

Compliance Steps for Organizations and How Securiti Can Help

  1. Create and implement a clear breach management plan.
  2. Identify breach criteria by understanding what constitutes a data breach and significant harm under the guidelines.
  3. Implement systems to quickly detect potential data breaches.
  4. Report the breach to the PDP within the specified time frame, detailing the breach.
  5. Inform affected data subjects if significant harm is possible.
  6. Keep detailed records of all breaches and actions taken.
  7. Evaluate the breach response and improve processes.
  8. Regularly reassess data processing risks and update the breach plan.

Securiti’s Breach Management automation provides incident response workflows that help organizations respond to privacy incidents promptly and effectively. This enables organizations to take reasonable steps to protect personal information from unauthorized access, disclosure, alteration, misuse, or deletion before processing it.

DPO Guidelines

Data controllers and processors must appoint one or more Data Protection Officers (DPOs) to ensure accountability and compliance with data protection laws. This obligation applies when personal data processing involves:

  • more than 20,000 data subjects,
  • sensitive personal data exceeding 10,000 data subjects, or
  • regular monitoring of personal data.

The threshold approach is similar to other data privacy laws, which oblige organizations of a certain scale and size to appoint a DPO.

When appointing a DPO or determining the qualifications needed, data controllers and processors should consider the nature of the personal data processing, its complexity and scale, the sensitivity of the data, and the level of protection required. However, appointing a DPO does not absolve data controllers or processors from their broader compliance obligations under PDPA. This stipulation emphasizes that the DPO’s role is to assist in achieving compliance, but it does not transfer full responsibility for legal compliance onto the DPO. Organizations must maintain oversight and ensure all regulatory requirements are met.

Organizations must also record the appointed DPO, register the DPO, submit their contact details to the Commissioner within 21 days, and ensure that the contact details are easily accessible through official channels. This maintains transparency and ensures effective communication between organizations and regulatory authorities. Moreover, the DPO must have a separate business email, which further strengthens the DPO’s independence and helps clearly distinguish their role in data protection matters from day-to-day operations.

DPO Eligibility Criteria

To ensure responsiveness, the DPO must be resident in Malaysia for at least 180 days annually, be easily contactable by any means, and be proficient in both Bahasa Melayu and English. Being easily contactable promotes quick communication with stakeholders, reinforcing the importance of responsiveness in compliance. Proficiency in both Bahasa Melayu and English is essential for effective communication with local authorities and data subjects, especially in Malaysia’s multilingual environment.

Responsibilities of DPO

The DPO serves as the primary liaison between data subjects and the data controller or processor for data processing and rights and also acts as the main point of contact between the controller or processor and the Commissioner.  It's also important to note that the DPO may hold additional roles and serve multiple entities. Flexibility is a practical approach, particularly for organizations with limited resources. However, it is essential to avoid any conflicts of interest that could compromise the DPO’s independence, as the DPO will be responsible for:

  • advising on personal data processing;
  • supporting compliance with PDPA and other data protection laws;
  • assisting in Data Protection Impact Assessments (DPIA);
  • monitoring personal data compliance;
  • ensuring proper breach and incident management;
  • handling reports and documents required by the Commissioner; and
  • taking on additional duties as needed.

It’s also important to note that data controllers and processors are responsible for ensuring their appointed DPO receives necessary resources and adequate training to enable them to perform their functions.

Compliance Steps for Organizations and How Securiti Can Help

  1. Assess DPO requirements and determine if your organization needs a DPO based on data processing activities.
  2. Appoint a qualified DPO and ensure the DPO has relevant qualifications and expertise in data protection laws.
  3. Ensure the DPO is registered with the PDP.
  4. Make the DPO accessible to all relevant parties, including external entities if applicable.
  5. Regularly update the DPO on evolving data protection regulations and provide relevant training.
  6. Ensure DPO operates independently, without conflicts of interest.

Securiti’s Data Mapping module can equip DPOs with tools to uphold stringent data security and governance protocols to catalog and map all data processing activities.

Conclusion

Securiti enables organizations to navigate and comply with Data Protection Officer Appointment Guidelines (DPO Guidelines) and Data Breach Notification Guidelines (Breach Guidelines), set to take effect on June 1, 2025.

Securiti is the pioneer of the Data Command Center, a centralized platform that enables the safe use of data and GenAI. Securiti provides unified data intelligence, controls, and orchestration across hybrid multi-cloud environments. Large global enterprises rely on Securiti's Data Command Center for data security, privacy, governance, and compliance.

Request a demo to learn more.

Join Our Newsletter

Get all the latest information, law updates and more delivered to your inbox


Share


More Stories that May Interest You

Videos

View More

Mitigating OWASP Top 10 for LLM Applications 2025

Generative AI (GenAI) has transformed how enterprises operate, scale, and grow. There’s an AI application for every purpose, from increasing employee productivity to streamlining...

View More

DSPM vs. CSPM – What’s the Difference?

While the cloud has offered the world immense growth opportunities, it has also introduced unprecedented challenges and risks. Solutions like Cloud Security Posture Management...

View More

Top 6 DSPM Use Cases

With the advent of Generative AI (GenAI), data has become more dynamic. New data is generated faster than ever, transmitted to various systems, applications,...

View More

Colorado Privacy Act (CPA)

What is the Colorado Privacy Act? The CPA is a comprehensive privacy law signed on July 7, 2021. It established new standards for personal...

View More

Securiti for Copilot in SaaS

Accelerate Copilot Adoption Securely & Confidently Organizations are eager to adopt Microsoft 365 Copilot for increased productivity and efficiency. However, security concerns like data...

View More

Top 10 Considerations for Safely Using Unstructured Data with GenAI

A staggering 90% of an organization's data is unstructured. This data is rapidly being used to fuel GenAI applications like chatbots and AI search....

View More

Gencore AI: Building Safe, Enterprise-grade AI Systems in Minutes

As enterprises adopt generative AI, data and AI teams face numerous hurdles: securely connecting unstructured and structured data sources, maintaining proper controls and governance,...

View More

Navigating CPRA: Key Insights for Businesses

What is CPRA? The California Privacy Rights Act (CPRA) is California's state legislation aimed at protecting residents' digital privacy. It became effective on January...

View More

Navigating the Shift: Transitioning to PCI DSS v4.0

What is PCI DSS? PCI DSS (Payment Card Industry Data Security Standard) is a set of security standards to ensure safe processing, storage, and...

View More

Securing Data+AI : Playbook for Trust, Risk, and Security Management (TRiSM)

AI's growing security risks have 48% of global CISOs alarmed. Join this keynote to learn about a practical playbook for enabling AI Trust, Risk,...

Spotlight Talks

Spotlight 12:!3

You Can’t Build Pipelines, Warehouses, or AI Platforms Without Business Knowledge

Watch Now View
Spotlight 47:42

Cybersecurity – Where Leaders are Buying, Building, and Partnering

Rehan Jalil
Watch Now View
Spotlight 27:29

Building Safe AI with Databricks and Gencore

Rehan Jalil
Watch Now View
Spotlight 46:02

Building Safe Enterprise AI: A Practical Roadmap

Watch Now View
Spotlight 13:32

Ensuring Solid Governance Is Like Squeezing Jello

Watch Now View
Spotlight 40:46

Securing Embedded AI: Accelerate SaaS AI Copilot Adoption Safely

Watch Now View
Spotlight 10:05

Unstructured Data: Analytics Goldmine or a Governance Minefield?

Viral Kamdar
Watch Now View
Spotlight 21:30

Companies Cannot Grow If CISOs Don’t Allow Experimentation

Watch Now View
Spotlight 2:48

Unlocking Gen AI For Enterprise With Rehan Jalil

Rehan Jalil
Watch Now View
Spotlight 13:35

The Better Organized We’re from the Beginning, the Easier it is to Use Data

Watch Now View

Latest

Accelerating Safe Enterprise AI View More

Accelerating Safe Enterprise AI: Securiti’s Gencore AI with Databricks and Anthropic Claude

Securiti AI collaborates with the largest firms in the world who are racing to adopt and deploy safe generative AI systems, leveraging their own...

View More

CAIO’s Guide to Building Safe Knowledge Agents

AI is rapidly moving from test cases to real-world implementation like internal knowledge agents and customer service chatbots, and a PwC report predicts 2025...

View More

What are Data Security Controls & Its Types

Learn what are data security controls, the types of data security controls, best practices for implementing them, and how Securiti can help.

View More

What is cloud Security? – Definition

Discover the ins and outs of cloud security, what it is, how it works, risks and challenges, benefits, tips to secure the cloud, and...

The Future of Privacy View More

The Future of Privacy: Top Emerging Privacy Trends in 2025

Download the whitepaper to gain insights into the top emerging privacy trends in 2025. Analyze trends and embed necessary measures to stay ahead.

View More

Personalization vs. Privacy: Data Privacy Challenges in Retail

Download the whitepaper to learn about the regulatory landscape and enforcement actions in the retail industry, data privacy challenges, practical recommendations, and how Securiti...

India’s Telecom Security & Privacy Regulations View More

India’s Telecom Security & Privacy Regulations: A High-Level Overview

Download the infographic to gain a high-level overview of India’s telecom security and privacy regulations. Learn how Securiti helps ensure swift compliance.

Nigeria's DPA View More

Navigating Nigeria’s DPA: A Step-by-Step Compliance Roadmap

Download the infographic to learn how Nigeria's Data Protection Act (DPA) mapping impacts your organization and compliance strategy.

Gencore AI and Amazon Bedrock View More

Building Enterprise-Grade AI with Gencore AI and Amazon Bedrock

Learn how to build secure enterprise AI copilots with Amazon Bedrock models, protect AI interactions with LLM Firewalls, and apply OWASP Top 10 LLM...

DSPM Vendor Due Diligence View More

DSPM Vendor Due Diligence

DSPM’s Buyer Guide ebook is designed to help CISOs and their teams ask the right questions and consider the right capabilities when looking for...

What's
New