Announcing Agent Commander - The First Integrated solution from Veeam + Securiti.ai enabling the scaling of safe AI agents

View

Veeamon Tour'26 - Data & AI Trust CONVERGE for the Agentic Era

View

Privacy Regulation Roundup: Top Stories of February 2025

Contributors

Aswah Javed

Associate Data Privacy Analyst at Securiti

Rohma Fatima Qayyum

Associate Data Privacy Analyst at Securiti

Asaad Ahmad Qureshy

Associate Data Privacy Analyst at Securiti

Yasir Nawaz

Digital Content Producer at Securiti

Published March 2, 2025 / Updated May 6, 2025

Securiti has started a Privacy Regulation Roundup summarizing the latest significant global privacy regulatory developments, announcements, and changes. These developments will be added to our website monthly. You can find a link to related resources at the bottom for each relevant regulatory activity.

North and South America Jurisdiction

1. Hawaii Releases Seven Guidelines On Various Data Protection Issues

Date: February 18, 2025
Summary: The Hawaii State Data Office has released seven sets of guidelines on data protection issues relevant to state agencies, including using GenAI technology. The guidelines cover the following topics:

  • Data Quality Guidelines: Proactively monitor, manage, and improve data quality, including increased accuracy, completeness, consistency, timeliness, uniqueness, and validity.
  • Data Privacy Guidelines: Ensure personally identifiable information is identified and protected during data collection, processing, storage, usage, and sharing processes.
  • Data Catalog Guidelines: Instruct agencies on how to identify and inventory all existing assets with a summary of each data set, who owns each set, and how the set can be used.
  • Data Classification Guidelines: Instruct agencies on classifying data based on sensitivity for proper protection, including data access control.
  • Data Retention Guidelines: Define how long agencies must store data sets to ensure compliance and to prevent data loss by ensuring data backups.
  • Open Data Guidelines: Handle publicly accessible data to ensure that it is consistently shared and updated, outlining how to identify open data according to applicable policies.
  • GenAI Assistant Technologies Usage Guidelines: Advise agencies on safe and responsible use of AI technologies, including dos and don'ts, best practices, and key features of specific GenAI tools. Read More.

2. Judge Rejects EPIC's Request To Stop DOGE's Access To US Treasury & OPM Personal Data

Date: February 24, 2025
Summary: EPIC's request for a temporary injunction to stop the Department of Government Efficiency (DOGE) from accessing personal data from the U.S. Treasury and OPM has been rejected by a federal court in Virginia.

Per the complaint, DOGE has forced an unlawful disclosure of vast amounts of government workers and average American' data to unauthorized personnel, violating the Privacy Act, Internal Revenue Code, and Fifth Amendment rights. The judge, Rossie Alston of the Eastern District of Virginia ruled that EPIC and the government worker were not entitled to an injunction, based on the plaintiffs' inability to demonstrate irreparable harm. Read More.

EMEA Jurisdiction

3. European Banking Authority’s New Guidelines Narrow The Scope Of ICT & Security Risk Management After DORA Comes Into Effect

Date: February 11, 2025
Summary: The European Banking Authority has narrowed the scope of its Guidelines on ICT and security risk management owing to the harmonized ICT risk management requirements under the Digital Operational Resilience Act, effective from 17 January 2025. The new amendments simplify the framework and provide legal clarity. The revised Guidelines will now apply to only entities covered by DORA, including credit institutions, payment institutions, account information service providers, and certain exempted institutions. Additionally, the Guidelines now focus solely on relationship management requirements for payment service users. Read More.

4. Eurosystem Updates Its Framework For TIBER-EU Framework

Date: February 12, 2025
Summary: The Eurosystem has updated the European framework for threat intelligence-based ethical red-teaming (TIBER-EU). Per the latest additions, the framework now aligns with the Digital Operational Resilience Act (DORA) regulatory technical standards on threat-led penetration testing (TLPT) and provides comprehensive guidance for authorities, entities, threat intelligence providers, and red-team testers on conducting controlled cyberattacks to enhance cyber resilience. Additionally, it outlines a standardized approach for performing DORA TLPT in a qualitative, controlled, and safe manner across the EU. The updated framework includes steps for conducting threat intelligence-based red-team testing by designated financial entities compliant with DORA. Read More.

5. European Commission Adopts Regulatory Technical Standards For Penetration Testing Under DORA

Date: February 16, 2025
Summary: The European Commission adopted the Regulatory Technical Standard (RTS) for Threat-Led Penetration Testing (TLPT) under the Digital Operational Resilience Act (DORA) on February 13, 2025. This regulation supplements the existing rules by setting clear criteria for identifying financial entities required to conduct threat-led penetration testing (TLPT).

The regulation specifies the following:

  • Sets out the criteria for identifying financial entities required to perform threat-led penetration testing (TLPT);
  • Establishes the requirements regarding the testing scope, methodology, and results of TLPT, including the testing process;
  • Lays down the requirements and standards governing the use of internal testers;
  • Contains the rules on supervisory cooperation and mutual recognition of TLPT.

The regulation will take effect 20 days after it is published in the Official Journal of the European Union. Read More.

6. European Commission Publishes Regulation Implementing Technical Standards For Reporting Major ICT Incidents Under DORA

Date: February 20, 2025
Summary: The European Commission published a regulation on February 20, 2025, which implements the technical standards for the application of the Digital Operational Resilience Act to report major ICT incidents and notify significant cyber threats in financial entities (Regulation (EU) 2025/302), which will become effective on March 12, 2025. The regulation contains templates and procedures for such financial entities to report major ICT-related incidents and notify significant cyber threats. Read More.

7. European Commission Publishes Regulation Clarifying Content & Incident Notification Deadlines For Reporting Major ICT Incidents Under DORA

Date: February 20, 2025
Summary: The European Commission published regulatory technical standards on February 20, 2025, that supplement the Digital Operational Resilience Act on content and deadlines related to reporting major ICT incidents and voluntary notifications of significant cyber threats. (Regulation (EU) 2025/301), which will become effective on March 12, 2025. The regulation contains specific content and deadlines for incident notifications and reports while also requiring financial entities to use secure channels, reclassify incidents when needed, and disclose outsourcing arrangements. Read More.

Asia Jurisdiction

8. Chinese CAC Approves New Information Compliance Audit Measures

Date: February 12, 2025
Summary: The Personal Information Protection Compliance Audit Management Measures have been reviewed and approved by the Cyberspace Administration of China (CAC) and will come into effect on May 1, 2025. Per these measures, personal information handlers are required to conduct regular compliance audits, with organizations managing data of more than 10 million individuals being required to conduct such audits every two years. However, in case of significant risks or large-scale data breaches, specialized organizations can perform audits.

Handlers must cooperate with the audit, correct any identified deficiencies, and report to the authorities. Large internet platforms will be subject to enhanced oversight, and violations will be subject to relevant punitive actions per the PIPL and Network Data Security Management Regulations. Read More.

9. India’s TRAI Amends Regulations Against Unsolicited Commercial Messages

Date: February 12, 2025
Summary: TRAI has amended the ​​Telecom Commercial Communications Customer Preference (TCCCP) Regulations to enhance safeguards against unsolicited commercial communication (UCC).

Some of the updates in the amendment include:

  • Simplified spam reporting and faster action by access providers.
  • Standardized number series for telemarketing identification.
  • Easier opt-out options for consumers.
  • Escalating financial penalties for violations.

The amendments come into effect 30 days after their publication, with some provisions becoming applicable within 6 days. Read More.

10. Amendments To 1988 Communications & Multimedia Act Come Into Effect In Malaysia

Date: February 12, 2025
Summary: The Communications and Multimedia (Amendment) Act of 2025 revises major provisions of the Communications and Multimedia Act of 1988 and became effective from February 11, 2025. The amendments include the following:

  • Clarification of "communications data" and definition of "prohibited content";
  • Increases penalties, with fines up to MYR 1 million and imprisonment of up to 5 years for violations;
  • Bans unsolicited commercial electronic messages.

11. Saudi Arabia Introduces Risk Assessment Guidelines for Transferring Personal Data outside the Kingdom

Date: February 24, 2025
Summary: Saudi Arabia’s SDAIA issued the Risk Assessment Guideline for Transferring Personal Data Outside the Kingdom. The guideline establishes a structured approach for assessing risks related to cross-border personal data transfers. It includes:

  • Four-Phase Risk Assessment: Entities must follow a phased process—preparation, assessing negative impacts, evaluating transfer risks, and analyzing implications for Saudi Arabia’s vital interests.
  • Preparation Phase: Determines if a risk assessment is required based on factors such as processing sensitive data, large-scale operations, or continuous monitoring.
  • Negative Impacts & Risk Analysis: Identifies vulnerabilities, potential threats, probability of occurrence, and severity of impact, requiring controls to mitigate risks.
  • Risk Assessment for Data Transfers: Organizations must analyze the nature of the transfer, verify recipient compliance with PDPL, and evaluate mitigation measures.
  • Implications for National Interests: Assesses risks to Saudi Arabia’s vital interests, requiring alternative methods or enhanced safeguards for high-risk scenarios.Read more.

12. Malaysia's Personal Data Protection Department announces Data Protection Officer Appointment Guidelines and Data Breach Notification Guidelines

Date: February 25, 2025
Summary: The Data Protection Officer Appointment Guidelines and Data Breach Notification Guidelines are set to take effect on June 1, 2025. The guidelines outline requirements for appointing Data Protection Officers (DPOs) and handling data breaches. Key provisions include:

Breach Guidelines:

  • Notification to the Commissioner: Required if the breach causes significant harm or affects more than 1,000 individuals.
  • Notification Timeframe: Must be reported within 72 hours; delays require an explanation.
  • Affected Data Subjects: Must be reported within 7 days after initial notification to the Commissioner.
  • Record-Keeping: A breach register must be maintained for 2 years.

DPO Guidelines:

  • Appointment Requirement: DPOs must be appointed if processing exceeds 20,000 data subjects, or 10,000 for sensitive or financial data, or if regular monitoring is involved
  • Qualification Requirements: DPOs must be knowledgeable in data protection laws and security, and based in Malaysia or easily reachable.
  • Responsibilities: DPOs must ensure compliance, conduct impact assessments, and serve as the point of contact for both the Commissioner and data subjects.
  • DPO Notification: Must notify the Commissioner within 21 days of appointment. Read more.

Analyze this article with AI

Prompts open in third-party AI tools.
Join Our Newsletter

Get all the latest information, law updates and more delivered to your inbox



More Stories that May Interest You
Videos
View More
Rehan Jalil, Veeam on Agent Commander : theCUBE + NYSE Wired: Cyber Security Leaders
Following Veeam’s acquisition of Securiti, the launch of Agent Commander marks an important step toward helping enterprises adopt AI agents with greater confidence. In...
View More
Mitigating OWASP Top 10 for LLM Applications 2025
Generative AI (GenAI) has transformed how enterprises operate, scale, and grow. There’s an AI application for every purpose, from increasing employee productivity to streamlining...
View More
Top 6 DSPM Use Cases
With the advent of Generative AI (GenAI), data has become more dynamic. New data is generated faster than ever, transmitted to various systems, applications,...
View More
Colorado Privacy Act (CPA)
What is the Colorado Privacy Act? The CPA is a comprehensive privacy law signed on July 7, 2021. It established new standards for personal...
View More
Securiti for Copilot in SaaS
Accelerate Copilot Adoption Securely & Confidently Organizations are eager to adopt Microsoft 365 Copilot for increased productivity and efficiency. However, security concerns like data...
View More
Top 10 Considerations for Safely Using Unstructured Data with GenAI
A staggering 90% of an organization's data is unstructured. This data is rapidly being used to fuel GenAI applications like chatbots and AI search....
View More
Gencore AI: Building Safe, Enterprise-grade AI Systems in Minutes
As enterprises adopt generative AI, data and AI teams face numerous hurdles: securely connecting unstructured and structured data sources, maintaining proper controls and governance,...
View More
Navigating CPRA: Key Insights for Businesses
What is CPRA? The California Privacy Rights Act (CPRA) is California's state legislation aimed at protecting residents' digital privacy. It became effective on January...
View More
Navigating the Shift: Transitioning to PCI DSS v4.0
What is PCI DSS? PCI DSS (Payment Card Industry Data Security Standard) is a set of security standards to ensure safe processing, storage, and...
View More
Securing Data+AI : Playbook for Trust, Risk, and Security Management (TRiSM)
AI's growing security risks have 48% of global CISOs alarmed. Join this keynote to learn about a practical playbook for enabling AI Trust, Risk,...

Spotlight Talks

Spotlight
Future-Proofing for the Privacy Professional
Watch Now View
Spotlight 50:52
From Data to Deployment: Safeguarding Enterprise AI with Security and Governance
Watch Now View
Spotlight 11:29
Not Hype — Dye & Durham’s Analytics Head Shows What AI at Work Really Looks Like
Not Hype — Dye & Durham’s Analytics Head Shows What AI at Work Really Looks Like
Watch Now View
Spotlight 11:18
Rewiring Real Estate Finance — How Walker & Dunlop Is Giving Its $135B Portfolio a Data-First Refresh
Watch Now View
Spotlight 13:38
Accelerating Miracles — How Sanofi is Embedding AI to Significantly Reduce Drug Development Timelines
Sanofi Thumbnail
Watch Now View
Spotlight 10:35
There’s Been a Material Shift in the Data Center of Gravity
Watch Now View
Spotlight 14:21
AI Governance Is Much More than Technology Risk Mitigation
AI Governance Is Much More than Technology Risk Mitigation
Watch Now View
Spotlight 12:!3
You Can’t Build Pipelines, Warehouses, or AI Platforms Without Business Knowledge
Watch Now View
Spotlight 47:42
Cybersecurity – Where Leaders are Buying, Building, and Partnering
Rehan Jalil
Watch Now View
Spotlight 27:29
Building Safe AI with Databricks and Gencore
Rehan Jalil
Watch Now View
Latest
View More
Building Sovereign AI with HPE Private Cloud AI and Veeam Securiti Gencore AI
How HPE Private Cloud AI, NVIDIA acceleration, and Veeam Securiti Gencore AI support secure, governed enterprise AI with policy enforcement across RAG, assistant, and agentic workflows.
View More
Securiti.ai Names Accenture as 2025 Partner of the Year
In a continued celebration of impactful collaboration in DataAI Security, Securiti.ai, a Veeam company, has honored Accenture as its 2025 Partner of the Year....
View More
Vietnam’s Law on Artificial Intelligence: A Guide to Compliance
A practical guide to Vietnam’s AI Law, scope, risk-based obligations, provider and deployer duties, governance, timelines, and how businesses can prepare for compliance.
Largest Fine In CCPA History_ What The Latest CCPA Enforcement Action Teaches Businesses View More
Largest Fine In CCPA History: What The Latest CCPA Enforcement Action Teaches Businesses
Businesses can take some vital lessons from the recent biggest enforcement action in CCPA history. Securiti’s blog covers all the important details to know.
Surviving the DROP Platform: Rethinking Privacy Operations for Centralized, Large-Scale Deletion View More
Surviving the DROP Platform: Rethinking Privacy Operations for Centralized, Large-Scale Deletion
Access the whitepaper and explore how the DELETE Act and DROP are transforming privacy compliance, why legacy approaches fail, and how to build scalable,...
View More
Agentic AI & Privacy: Governing Autonomous AI Agents in the Enterprise
Learn how to govern agentic AI in the enterprise. Manage privacy risks, control data access, enforce policies and ensure compliance for autonomous AI agents.
View More
ROT Data Minimization
Eliminate redundant, obsolete, and trivial (ROT) data to improve AI accuracy, reduce storage costs, and minimize security and compliance risks at scale.
View More
Agent Commander: Solution Brief
Learn how Agent Commander detects AI agents, protects enterprise data with runtime guardrails, and undoes AI errors - enabling secure, compliant AI adoption at...
View More
Take the Data Risk Out of AI
Learn how to prepare enterprise data for safe Gemini Enterprise adoption with upstream governance, sensitive data discovery, and pre-index policy controls.
View More
Navigating HITRUST: A Guide to Certification
Securiti's eBook is a practical guide to HITRUST certification, covering everything from choosing i1 vs r2 and scope systems to managing CAPs & planning...
What's
New