Announcing Agent Commander - The First Integrated solution from Veeam + Securiti.ai enabling the scaling of safe AI agents

View

Malaysia’s Proposed Amendments to the Personal Data Protection Regulations 2013: What You Need to Know

Contributors

Faqiha Amjad

Associate Data Privacy Analyst at Securiti

Salma Khan

Data Privacy Analyst at Securiti

CIPP/Asia

Published September 15, 2025

Listen to the content

Introduction

Malaysia’s data protection regime is entering a new phase. On 22 August 2025, the Personal Data Protection Commissioner (JPDP) issued Public Consultation Paper No. 4/2025, proposing amendments to the Personal Data Protection Regulations 2013. Stakeholders have until 8 September 2025 to provide feedback.

These proposals build on recent amendments to the Personal Data Protection Act 2010, which introduced mandatory breach notifications, Data Protection Officers, and expanded processor obligations. Together, they signal Malaysia’s push to align with global standards like the GDPR while addressing the realities of a digital economy.

The proposed amendments mark a key step in modernizing Malaysia’s privacy framework. They introduce stricter consent rules (with exceptions), safeguards for minors, mandatory processor contracts, and compulsory breach management—moving the regime closer to global standards like the GDPR.

Implications for Businesses

For businesses operating in Malaysia, these proposed amendments are a wake-up call to review and strengthen compliance frameworks. Key action points include:

  • Review consent practices — Ensure all forms, contracts, and digital platforms obtain clear, explicit consent in line with the new requirements.
  • Update privacy notices — Incorporate the new requirements, including DPO contact information.
  • Audit third-party arrangements — Put in place formal contracts with all processors handling personal data.
  • Revise security policies — Include detailed data breach response procedures, covering detection, reporting, and recovery.
  • Strengthen governance — Appoint or empower your DPO to oversee the implementation of these changes and act as the point of contact for regulators and individuals.

Failure to adapt quickly may not only result in penalties but also reputational damage in an increasingly privacy-conscious market.

Implications for Individuals

For individuals, the proposed amendments are a win for privacy rights. The changes provide:

  • Greater transparency about how personal data is collected and used.
  • Better safeguards against misuse, especially for children and vulnerable groups.
  • Clearer avenues for redress, thanks to improved accessibility of DPO contact details and stronger enforcement powers for the JPDP.

In short, Malaysians can expect stronger protections and a more robust framework to hold organizations accountable.

Five Key Takeaways from the Proposed Amendments

The following are the five key takeaways from the proposed amendments issued in Public Consultation Paper No. 4/2025:

Consent has always been the cornerstone of Malaysia’s PDPA. Under the current framework, a data controller may only process personal data if the data subject has given consent. However, questions have persisted about what constitutes valid consent.

The proposed amendments provide clearer, stricter guidance:

  • Timing matters — consent must be obtained before any processing begins.
  • Transparency is key — data controllers must provide a personal data protection notice, explaining why the data is being collected, how it will be used, and the rights available to the individual.

This is an important development because it reduces ambiguity and aligns Malaysia’s approach with international standards. Organizations will no longer be able to rely on vague or implied consent; instead, they must establish clear processes and records to demonstrate compliance. For data subjects, this translates into stronger protection and greater confidence that their information won’t be misused.

While consent remains the rule, the amendments acknowledge that in certain cases, personal data can be processed without consent. This is consistent with exceptions already permitted under the PDPA, such as:

  • Where processing is necessary to comply with legal obligations.
  • Where it is needed to protect the vital interests of the data subject.
  • Where it is required for legitimate business functions, provided it does not override the rights of individuals.

By explicitly recognizing these exceptions in the regulations, the JPDP aims to strike a balance between practicality and protection. Businesses will have the legal certainty to act in situations where seeking consent is impractical or unnecessary, while data subjects will benefit from safeguards against abuse.

The amendments also introduce new verification obligations for situations where consent is given by parents, guardians, or individuals with responsibility over the data subject (such as minors). Data controllers will now be required to take reasonable verification steps to confirm the authenticity of such consent. Similarly, the amendment also requires the data controller to inform the data subject about the collection and processing of personal data through a personal data protection notice, consistent with the Notice and Choice Principle. This means organizations cannot simply rely on a box-tick exercise; they will need systems in place to ensure the person giving consent truly has the authority to do so.

This change addresses a growing concern in the digital space: the collection of children’s data by apps, platforms, and online services. With this amendment, Malaysia moves toward stronger protections for vulnerable groups, echoing similar measures seen in other jurisdictions.

4. Mandatory Contracts with Data Processors

One of the most significant proposed changes is the introduction of a mandatory written contract requirement between data controllers and data processors.

Currently, while data controllers bear ultimate responsibility for protecting personal data, the obligations of data processors (third parties who process data on behalf of controllers) are less clearly defined. The new rules aim to fix this by requiring contracts to include:

  • The purpose, duration, and nature of processing.
  • The types of personal data involved.
  • The security measures to be implemented.
  • The respective rights and obligations of both parties.

This amendment aligns with global best practices, ensuring processors are held to the same high standards as controllers. It also provides businesses with a structured framework to manage outsourcing arrangements, cloud service providers, and other third-party relationships.

5. Enhanced Security Policies and Mandatory Breach Management

Perhaps the most forward-looking amendment relates to the Security Principle. Under the new rules, every organization’s security policy must now include mandatory data breach management procedures.

This reflects the reality that breaches are no longer a matter of “if” but “when.” By requiring proactive planning, JPDP aims to ensure that organizations can:

  • Detects breaches quickly.
  • Respond promptly to mitigate harm.
  • Notify regulators and affected individuals as required by law.

The amendments also extend the obligation to develop and implement security policies to data processors, not just data controllers. This broadens accountability and strengthens Malaysia’s overall resilience against cyber threats.

Other Notable Amendments

Beyond the five major amendments, the consultation paper outlines several additional changes worth noting:

  • New Definitions Introduced — such as business contact information (to distinguish work-related details from personal data) and personal data protection notice.
  • Notice and Choice Principle Strengthened — requiring organizations to display the business contact details of their appointed DPO or the person responsible for data protection matters.
  • Retention and Integrity Principles — while the underlying provisions remain largely unchanged, compliance will now be ensured through a revised Personal Data Protection Standard 2025, covering data retention policies, secure disposal, and periodic monitoring.
  • Expanded Penalties — data processors, not just controllers, will now be directly liable for violations, particularly under the Security Principle. Penalties remain severe: fines of up to RM250,000, imprisonment up to two years, or both.
  • Inspection Powers Enhanced — the JPDP and its officers will have clearer and broader powers to request documents, records, and other information during inspections, ensuring more effective oversight.

Conclusion: A Step Towards Global Alignment

Malaysia’s proposed amendments to the Personal Data Protection Regulations 2013 mark a significant step toward stronger, more transparent, and globally aligned data protection. For businesses, they signal the need for proactive compliance; for individuals, they promise clearer rights and better safeguards. With the consultation period ending on 8 September 2025, now is the time to engage and help shape Malaysia’s privacy future.

How Securiti Helps You Comply with the Proposed Amendments

Securiti’s Data Command Center enables organizations to comply with Malaysia’s Proposed Amendments to the Personal Data Protection Regulations by securing the organization’s data and enabling organizations to maximize data value and fulfill an organization’s obligations around data security, data privacy, data governance, and compliance.

Organizations can overcome hyperscale data environment challenges by delivering unified intelligence and controls for data across public clouds, data clouds, and SaaS, enabling organizations to swiftly comply with privacy, security, governance, and compliance requirements.

To see Securiti in action, request a demo today.

Analyze this article with AI

Prompts open in third-party AI tools.
Join Our Newsletter

Get all the latest information, law updates and more delivered to your inbox



More Stories that May Interest You
Videos
View More
Rehan Jalil, Veeam on Agent Commander : theCUBE + NYSE Wired: Cyber Security Leaders
Following Veeam’s acquisition of Securiti, the launch of Agent Commander marks an important step toward helping enterprises adopt AI agents with greater confidence. In...
View More
Mitigating OWASP Top 10 for LLM Applications 2025
Generative AI (GenAI) has transformed how enterprises operate, scale, and grow. There’s an AI application for every purpose, from increasing employee productivity to streamlining...
View More
Top 6 DSPM Use Cases
With the advent of Generative AI (GenAI), data has become more dynamic. New data is generated faster than ever, transmitted to various systems, applications,...
View More
Colorado Privacy Act (CPA)
What is the Colorado Privacy Act? The CPA is a comprehensive privacy law signed on July 7, 2021. It established new standards for personal...
View More
Securiti for Copilot in SaaS
Accelerate Copilot Adoption Securely & Confidently Organizations are eager to adopt Microsoft 365 Copilot for increased productivity and efficiency. However, security concerns like data...
View More
Top 10 Considerations for Safely Using Unstructured Data with GenAI
A staggering 90% of an organization's data is unstructured. This data is rapidly being used to fuel GenAI applications like chatbots and AI search....
View More
Gencore AI: Building Safe, Enterprise-grade AI Systems in Minutes
As enterprises adopt generative AI, data and AI teams face numerous hurdles: securely connecting unstructured and structured data sources, maintaining proper controls and governance,...
View More
Navigating CPRA: Key Insights for Businesses
What is CPRA? The California Privacy Rights Act (CPRA) is California's state legislation aimed at protecting residents' digital privacy. It became effective on January...
View More
Navigating the Shift: Transitioning to PCI DSS v4.0
What is PCI DSS? PCI DSS (Payment Card Industry Data Security Standard) is a set of security standards to ensure safe processing, storage, and...
View More
Securing Data+AI : Playbook for Trust, Risk, and Security Management (TRiSM)
AI's growing security risks have 48% of global CISOs alarmed. Join this keynote to learn about a practical playbook for enabling AI Trust, Risk,...

Spotlight Talks

Spotlight
Future-Proofing for the Privacy Professional
Watch Now View
Spotlight 50:52
From Data to Deployment: Safeguarding Enterprise AI with Security and Governance
Watch Now View
Spotlight 11:29
Not Hype — Dye & Durham’s Analytics Head Shows What AI at Work Really Looks Like
Not Hype — Dye & Durham’s Analytics Head Shows What AI at Work Really Looks Like
Watch Now View
Spotlight 11:18
Rewiring Real Estate Finance — How Walker & Dunlop Is Giving Its $135B Portfolio a Data-First Refresh
Watch Now View
Spotlight 13:38
Accelerating Miracles — How Sanofi is Embedding AI to Significantly Reduce Drug Development Timelines
Sanofi Thumbnail
Watch Now View
Spotlight 10:35
There’s Been a Material Shift in the Data Center of Gravity
Watch Now View
Spotlight 14:21
AI Governance Is Much More than Technology Risk Mitigation
AI Governance Is Much More than Technology Risk Mitigation
Watch Now View
Spotlight 12:!3
You Can’t Build Pipelines, Warehouses, or AI Platforms Without Business Knowledge
Watch Now View
Spotlight 47:42
Cybersecurity – Where Leaders are Buying, Building, and Partnering
Rehan Jalil
Watch Now View
Spotlight 27:29
Building Safe AI with Databricks and Gencore
Rehan Jalil
Watch Now View
Latest
View More
Building Sovereign AI with HPE Private Cloud AI and Veeam Securiti Gencore AI
How HPE Private Cloud AI, NVIDIA acceleration, and Veeam Securiti Gencore AI support secure, governed enterprise AI with policy enforcement across RAG, assistant, and agentic workflows.
View More
Securiti.ai Names Accenture as 2025 Partner of the Year
In a continued celebration of impactful collaboration in DataAI Security, Securiti.ai, a Veeam company, has honored Accenture as its 2025 Partner of the Year....
Largest Fine In CCPA History_ What The Latest CCPA Enforcement Action Teaches Businesses View More
Largest Fine In CCPA History: What The Latest CCPA Enforcement Action Teaches Businesses
Businesses can take some vital lessons from the recent biggest enforcement action in CCPA history. Securiti’s blog covers all the important details to know.
View More
AI & HIPAA: What It Means and How to Automate Compliance
Explore how the Health Insurance Portability and Accountability Act (HIPAA) applies to Artificial Intelligence (AI) in securing Protected Health Information (PHI). Learn how to...
View More
Minimize What You Expose: Privacy Guardrails for AI Agents and Copilots
Minimize data exposure in AI agents and copilots. Apply privacy guardrails like data minimization, access controls, masking, and policy enforcement to prevent leakage and...
View More
From Data Visibility to AI Velocity
Access the whitepaper and discover how unified DataAI security turns data governance into a business enabler, boosting AI innovation with visibility, compliance, and risk...
View More
Agent Commander: Solution Brief
Learn how Agent Commander detects AI agents, protects enterprise data with runtime guardrails, and undoes AI errors - enabling secure, compliant AI adoption at...
Compliance with CCPA Amendments with Securiti View More
Compliance with CCPA Amendments with Securiti
Stay compliant with 2026 CCPA amendments using Securiti, covering updated consent requirements, expanded sensitive data definitions, enhanced consumer rights, and readiness assessments.
View More
Take the Data Risk Out of AI
Learn how to prepare enterprise data for safe Gemini Enterprise adoption with upstream governance, sensitive data discovery, and pre-index policy controls.
View More
Navigating HITRUST: A Guide to Certification
Securiti's eBook is a practical guide to HITRUST certification, covering everything from choosing i1 vs r2 and scope systems to managing CAPs & planning...
What's
New