Securiti leads GigaOm's DSPM Vendor Evaluation with top ratings across technical capabilities & business value.

View

Privacy Regulation Roundup: Top Stories of February 2025

Contributors

Aswah Javed

Associate Data Privacy Analyst at Securiti

Rohma Fatima Qayyum

Associate Data Privacy Analyst at Securiti

Asaad Ahmad Qureshy

Associate Data Privacy Analyst at Securiti

Yasir Nawaz

Digital Content Producer at Securiti

Securiti has started a Privacy Regulation Roundup summarizing the latest significant global privacy regulatory developments, announcements, and changes. These developments will be added to our website monthly. You can find a link to related resources at the bottom for each relevant regulatory activity.

North and South America Jurisdiction

1. Hawaii Releases Seven Guidelines On Various Data Protection Issues

Date: February 18, 2025
Summary: The Hawaii State Data Office has released seven sets of guidelines on data protection issues relevant to state agencies, including using GenAI technology. The guidelines cover the following topics:

  • Data Quality Guidelines: Proactively monitor, manage, and improve data quality, including increased accuracy, completeness, consistency, timeliness, uniqueness, and validity.
  • Data Privacy Guidelines: Ensure personally identifiable information is identified and protected during data collection, processing, storage, usage, and sharing processes.
  • Data Catalog Guidelines: Instruct agencies on how to identify and inventory all existing assets with a summary of each data set, who owns each set, and how the set can be used.
  • Data Classification Guidelines: Instruct agencies on classifying data based on sensitivity for proper protection, including data access control.
  • Data Retention Guidelines: Define how long agencies must store data sets to ensure compliance and to prevent data loss by ensuring data backups.
  • Open Data Guidelines: Handle publicly accessible data to ensure that it is consistently shared and updated, outlining how to identify open data according to applicable policies.
  • GenAI Assistant Technologies Usage Guidelines: Advise agencies on safe and responsible use of AI technologies, including dos and don'ts, best practices, and key features of specific GenAI tools. Read More.

2. Judge Rejects EPIC's Request To Stop DOGE's Access To US Treasury & OPM Personal Data

Date: February 24, 2025
Summary: EPIC's request for a temporary injunction to stop the Department of Government Efficiency (DOGE) from accessing personal data from the U.S. Treasury and OPM has been rejected by a federal court in Virginia.

Per the complaint, DOGE has forced an unlawful disclosure of vast amounts of government workers and average American' data to unauthorized personnel, violating the Privacy Act, Internal Revenue Code, and Fifth Amendment rights. The judge, Rossie Alston of the Eastern District of Virginia ruled that EPIC and the government worker were not entitled to an injunction, based on the plaintiffs' inability to demonstrate irreparable harm. Read More.

EMEA Jurisdiction

3. European Banking Authority’s New Guidelines Narrow The Scope Of ICT & Security Risk Management After DORA Comes Into Effect

Date: February 11, 2025
Summary: The European Banking Authority has narrowed the scope of its Guidelines on ICT and security risk management owing to the harmonized ICT risk management requirements under the Digital Operational Resilience Act, effective from 17 January 2025. The new amendments simplify the framework and provide legal clarity. The revised Guidelines will now apply to only entities covered by DORA, including credit institutions, payment institutions, account information service providers, and certain exempted institutions. Additionally, the Guidelines now focus solely on relationship management requirements for payment service users. Read More.

4. Eurosystem Updates Its Framework For TIBER-EU Framework

Date: February 12, 2025
Summary: The Eurosystem has updated the European framework for threat intelligence-based ethical red-teaming (TIBER-EU). Per the latest additions, the framework now aligns with the Digital Operational Resilience Act (DORA) regulatory technical standards on threat-led penetration testing (TLPT) and provides comprehensive guidance for authorities, entities, threat intelligence providers, and red-team testers on conducting controlled cyberattacks to enhance cyber resilience. Additionally, it outlines a standardized approach for performing DORA TLPT in a qualitative, controlled, and safe manner across the EU. The updated framework includes steps for conducting threat intelligence-based red-team testing by designated financial entities compliant with DORA. Read More.

5. European Commission Adopts Regulatory Technical Standards For Penetration Testing Under DORA

Date: February 16, 2025
Summary: The European Commission adopted the Regulatory Technical Standard (RTS) for Threat-Led Penetration Testing (TLPT) under the Digital Operational Resilience Act (DORA) on February 13, 2025. This regulation supplements the existing rules by setting clear criteria for identifying financial entities required to conduct threat-led penetration testing (TLPT).

The regulation specifies the following:

  • Sets out the criteria for identifying financial entities required to perform threat-led penetration testing (TLPT);
  • Establishes the requirements regarding the testing scope, methodology, and results of TLPT, including the testing process;
  • Lays down the requirements and standards governing the use of internal testers;
  • Contains the rules on supervisory cooperation and mutual recognition of TLPT.

The regulation will take effect 20 days after it is published in the Official Journal of the European Union. Read More.

6. European Commission Publishes Regulation Implementing Technical Standards For Reporting Major ICT Incidents Under DORA

Date: February 20, 2025
Summary: The European Commission published a regulation on February 20, 2025, which implements the technical standards for the application of the Digital Operational Resilience Act to report major ICT incidents and notify significant cyber threats in financial entities (Regulation (EU) 2025/302), which will become effective on March 12, 2025. The regulation contains templates and procedures for such financial entities to report major ICT-related incidents and notify significant cyber threats. Read More.

7. European Commission Publishes Regulation Clarifying Content & Incident Notification Deadlines For Reporting Major ICT Incidents Under DORA

Date: February 20, 2025
Summary: The European Commission published regulatory technical standards on February 20, 2025, that supplement the Digital Operational Resilience Act on content and deadlines related to reporting major ICT incidents and voluntary notifications of significant cyber threats. (Regulation (EU) 2025/301), which will become effective on March 12, 2025. The regulation contains specific content and deadlines for incident notifications and reports while also requiring financial entities to use secure channels, reclassify incidents when needed, and disclose outsourcing arrangements. Read More.

Asia Jurisdiction

8. Chinese CAC Approves New Information Compliance Audit Measures

Date: February 12, 2025
Summary: The Personal Information Protection Compliance Audit Management Measures have been reviewed and approved by the Cyberspace Administration of China (CAC) and will come into effect on May 1, 2025. Per these measures, personal information handlers are required to conduct regular compliance audits, with organizations managing data of more than 10 million individuals being required to conduct such audits every two years. However, in case of significant risks or large-scale data breaches, specialized organizations can perform audits.

Handlers must cooperate with the audit, correct any identified deficiencies, and report to the authorities. Large internet platforms will be subject to enhanced oversight, and violations will be subject to relevant punitive actions per the PIPL and Network Data Security Management Regulations. Read More.

9. India’s TRAI Amends Regulations Against Unsolicited Commercial Messages

Date: February 12, 2025
Summary: TRAI has amended the ​​Telecom Commercial Communications Customer Preference (TCCCP) Regulations to enhance safeguards against unsolicited commercial communication (UCC).

Some of the updates in the amendment include:

  • Simplified spam reporting and faster action by access providers.
  • Standardized number series for telemarketing identification.
  • Easier opt-out options for consumers.
  • Escalating financial penalties for violations.

The amendments come into effect 30 days after their publication, with some provisions becoming applicable within 6 days. Read More.

10. Amendments To 1988 Communications & Multimedia Act Come Into Effect In Malaysia

Date: February 12, 2025
Summary: The Communications and Multimedia (Amendment) Act of 2025 revises major provisions of the Communications and Multimedia Act of 1988 and became effective from February 11, 2025. The amendments include the following:

  • Clarification of "communications data" and definition of "prohibited content";
  • Increases penalties, with fines up to MYR 1 million and imprisonment of up to 5 years for violations;
  • Bans unsolicited commercial electronic messages.

11. Saudi Arabia Introduces Risk Assessment Guidelines for Transferring Personal Data outside the Kingdom

Date: February 24, 2025
Summary: Saudi Arabia’s SDAIA issued the Risk Assessment Guideline for Transferring Personal Data Outside the Kingdom. The guideline establishes a structured approach for assessing risks related to cross-border personal data transfers. It includes:

  • Four-Phase Risk Assessment: Entities must follow a phased process—preparation, assessing negative impacts, evaluating transfer risks, and analyzing implications for Saudi Arabia’s vital interests.
  • Preparation Phase: Determines if a risk assessment is required based on factors such as processing sensitive data, large-scale operations, or continuous monitoring.
  • Negative Impacts & Risk Analysis: Identifies vulnerabilities, potential threats, probability of occurrence, and severity of impact, requiring controls to mitigate risks.
  • Risk Assessment for Data Transfers: Organizations must analyze the nature of the transfer, verify recipient compliance with PDPL, and evaluate mitigation measures.
  • Implications for National Interests: Assesses risks to Saudi Arabia’s vital interests, requiring alternative methods or enhanced safeguards for high-risk scenarios.Read more.

12. Malaysia's Personal Data Protection Department announces Data Protection Officer Appointment Guidelines and Data Breach Notification Guidelines

Date: February 25, 2025
Summary: The Data Protection Officer Appointment Guidelines and Data Breach Notification Guidelines are set to take effect on June 1, 2025. The guidelines outline requirements for appointing Data Protection Officers (DPOs) and handling data breaches. Key provisions include:

Breach Guidelines:

  • Notification to the Commissioner: Required if the breach causes significant harm or affects more than 1,000 individuals.
  • Notification Timeframe: Must be reported within 72 hours; delays require an explanation.
  • Affected Data Subjects: Must be reported within 7 days after initial notification to the Commissioner.
  • Record-Keeping: A breach register must be maintained for 2 years.

DPO Guidelines:

  • Appointment Requirement: DPOs must be appointed if processing exceeds 20,000 data subjects, or 10,000 for sensitive or financial data, or if regular monitoring is involved
  • Qualification Requirements: DPOs must be knowledgeable in data protection laws and security, and based in Malaysia or easily reachable.
  • Responsibilities: DPOs must ensure compliance, conduct impact assessments, and serve as the point of contact for both the Commissioner and data subjects.
  • DPO Notification: Must notify the Commissioner within 21 days of appointment. Read more.
Join Our Newsletter

Get all the latest information, law updates and more delivered to your inbox


Share

More Stories that May Interest You
Videos
View More
Mitigating OWASP Top 10 for LLM Applications 2025
Generative AI (GenAI) has transformed how enterprises operate, scale, and grow. There’s an AI application for every purpose, from increasing employee productivity to streamlining...
View More
Top 6 DSPM Use Cases
With the advent of Generative AI (GenAI), data has become more dynamic. New data is generated faster than ever, transmitted to various systems, applications,...
View More
Colorado Privacy Act (CPA)
What is the Colorado Privacy Act? The CPA is a comprehensive privacy law signed on July 7, 2021. It established new standards for personal...
View More
Securiti for Copilot in SaaS
Accelerate Copilot Adoption Securely & Confidently Organizations are eager to adopt Microsoft 365 Copilot for increased productivity and efficiency. However, security concerns like data...
View More
Top 10 Considerations for Safely Using Unstructured Data with GenAI
A staggering 90% of an organization's data is unstructured. This data is rapidly being used to fuel GenAI applications like chatbots and AI search....
View More
Gencore AI: Building Safe, Enterprise-grade AI Systems in Minutes
As enterprises adopt generative AI, data and AI teams face numerous hurdles: securely connecting unstructured and structured data sources, maintaining proper controls and governance,...
View More
Navigating CPRA: Key Insights for Businesses
What is CPRA? The California Privacy Rights Act (CPRA) is California's state legislation aimed at protecting residents' digital privacy. It became effective on January...
View More
Navigating the Shift: Transitioning to PCI DSS v4.0
What is PCI DSS? PCI DSS (Payment Card Industry Data Security Standard) is a set of security standards to ensure safe processing, storage, and...
View More
Securing Data+AI : Playbook for Trust, Risk, and Security Management (TRiSM)
AI's growing security risks have 48% of global CISOs alarmed. Join this keynote to learn about a practical playbook for enabling AI Trust, Risk,...
AWS Startup Showcase Cybersecurity Governance With Generative AI View More
AWS Startup Showcase Cybersecurity Governance With Generative AI
Balancing Innovation and Governance with Generative AI Generative AI has the potential to disrupt all aspects of business, with powerful new capabilities. However, with...

Spotlight Talks

Spotlight 11:29
Not Hype — Dye & Durham’s Analytics Head Shows What AI at Work Really Looks Like
Not Hype — Dye & Durham’s Analytics Head Shows What AI at Work Really Looks Like
Watch Now View
Spotlight 11:18
Rewiring Real Estate Finance — How Walker & Dunlop Is Giving Its $135B Portfolio a Data-First Refresh
Watch Now View
Spotlight 13:38
Accelerating Miracles — How Sanofi is Embedding AI to Significantly Reduce Drug Development Timelines
Sanofi Thumbnail
Watch Now View
Spotlight 10:35
There’s Been a Material Shift in the Data Center of Gravity
Watch Now View
Spotlight 14:21
AI Governance Is Much More than Technology Risk Mitigation
AI Governance Is Much More than Technology Risk Mitigation
Watch Now View
Spotlight 12:!3
You Can’t Build Pipelines, Warehouses, or AI Platforms Without Business Knowledge
Watch Now View
Spotlight 47:42
Cybersecurity – Where Leaders are Buying, Building, and Partnering
Rehan Jalil
Watch Now View
Spotlight 27:29
Building Safe AI with Databricks and Gencore
Rehan Jalil
Watch Now View
Spotlight 46:02
Building Safe Enterprise AI: A Practical Roadmap
Watch Now View
Spotlight 13:32
Ensuring Solid Governance Is Like Squeezing Jello
Watch Now View
Latest
Shrink The Blast Radius: Automate Data Minimization with DSPM View More
Shrink The Blast Radius:

Automate Data Minimization with DSPM

Recently, DaVita disclosed a ransomware incident that ultimately impacted about 2.7 million people, and it’s already booked $13.5M in related costs this quarter. Healthcare...
Why I Joined Securiti View More
Why I Joined Securiti
I’m beyond excited to join Securiti.ai as a sales leader at this pivotal moment in their journey. The decision was clear, driven by three...
Key Data Protection Reforms Introduced by the Data Use and Access Act View More
Key Data Protection Reforms Introduced by the Data Use and Access Act
UK DUAA 2025 updates UK GDPR, DPA and PECR. Changes cover research and broad consent, legitimate interests and SARs, automated decisions, transfers and cookies.
FTC's 2025 COPPA Final Rule Amendments View More
FTC’s 2025 COPPA Final Rule Amendments: What You Need to Know
Gain insights into FTC's 2025 COPPA Final Rule Amendments. Discover key definitions, notices, consent choices, methods, exceptions, requirements, etc.
View More
Is Your Business Ready for the EU AI Act August 2025 Deadline?
Download the whitepaper to learn where your business is ready for the EU AI Act. Discover who is impacted, prepare for compliance, and learn...
View More
Getting Ready for the EU AI Act: What You Should Know For Effective Compliance
Securiti's whitepaper provides a detailed overview of the three-phased approach to AI Act compliance, making it essential reading for businesses operating with AI.
Navigating the Minnesota Consumer Data Privacy Act (MCDPA) View More
Navigating the Minnesota Consumer Data Privacy Act (MCDPA): Key Details
Download the infographic to learn about the Minnesota Consumer Data Privacy Act (MCDPA) applicability, obligations, key features, definitions, exemptions, and penalties.
EU AI Act Mapping: A Step-by-Step Compliance Roadmap View More
EU AI Act Mapping: A Step-by-Step Compliance Roadmap
Explore the EU AI Act Mapping infographic—a step-by-step compliance roadmap to help organizations understand key requirements, assess risk, and align AI systems with EU...
The DSPM Architect’s Handbook View More
The DSPM Architect’s Handbook: Building an Enterprise-Ready Data+AI Security Program
Get certified in DSPM. Learn to architect a DSPM solution, operationalize data and AI security, apply enterprise best practices, and enable secure AI adoption...
Gencore AI and Amazon Bedrock View More
Building Enterprise-Grade AI with Gencore AI and Amazon Bedrock
Learn how to build secure enterprise AI copilots with Amazon Bedrock models, protect AI interactions with LLM Firewalls, and apply OWASP Top 10 LLM...
What's
New