Veeam Completes Acquisition of Securiti AI to Create the Industry’s First Trusted Data Platform for Accelerating Safe AI at Scale

View

Thailand Cross Border Data Transfer Legislation

Contributors

Salma Khan

Data Privacy Analyst at Securiti

CIPP/Asia

Aman Rehan

Data Privacy Analyst

Published March 14, 2024

Listen to the content

1. Introduction

Thailand’s Personal Data Protection Act (“PDPA”) took effect on June 1st, 2022. The legislation aims to protect the personal information of data subjects. This brief specifically focuses on the cross-border transfers of personal data under the PDPA.

On December 25th, 2023, the Personal Data Protection Committee (“PDPC”) published notifications on cross-border transfers of personal data in Thailand’s royal gazette. These notifications include the Criteria on Protection of Personal Data transferred to third countries under Section 28 of the PDPA (2023) (the “Adequacy Notification”) and Criteria on Protection of Personal Data transferred to third countries under Section 29 of the PDPA (2023) (the “Non-adequate Countries Notification”). The Enforcement date of these notifications is March 24th, 2024.

2. Cross-Border Data Transfer Under the PDPA

The PDPA does not define the cross-border transfer of personal data. However, the PDPC’s Adequacy and Non-adequate Countries Notifications provide that cross-border data transfer comes into play when data is sent from Thailand to another country physically or through a computer system or network. For example, a cross-border transfer of data occurs when a server located in Thailand processes and transmits data to a cloud service provider based in another country for processing, use, or disclosure. Generally, there are certain legal requirements that a data controller or processor needs to comply with when sending or transferring data abroad.

The Adequacy Notification outlines that the following scenarios of data transfer do not qualify as cross-border data transfer and, therefore, the requirements of cross-border data transfer would not apply to them:

  • When personal data is passing through a system (such as an email server) without being accessed or altered.
  • When data is stored temporarily or permanently on a cloud server located abroad where no third party has access to it.

3. Requirements of Cross-Border Data Transfer

The key requirement for cross-border transfer of data, as per Section 28 of the PDPA, is that the destination country or the international organization that receives personal data from data controllers and processors in Thailand must have an adequate level of data protection. According to Section 5 of the Adequacy Notification, assessing the adequacy of protection standards involves careful consideration of the following factors:

  • Ensuring that the destination country or international organization has legal measures or mechanisms in place that mirror Thailand's personal data protection laws.
    • For instance, ensuring that the destination country has enacted comprehensive data protection legislation.
  • Assessing whether there is a designated agency or organization responsible for enforcing data protection laws in the destination country to ensure that the data protection framework is actively monitored and enforced.
    • For instance, the existence of a data protection authority with the power to investigate and penalize non-compliance would suffice.
  • Verify if there are legal remedies available for data owners in the destination country, providing individuals with recourse in case of data protection violations.
    • For instance, having a legal framework and legal avenues that allow individuals to file complaints and seek compensation in case of data breach.

The PDPC assesses the adequacy of data protection standards of destination countries or international organizations. In this regard, Section 28, Paragraph 3 of the PDPA enables the PDPC's office to review issues submitted by data controllers or independently gather relevant information. Additionally, the Adequacy Notification specifies that the PDPC may make decisions on a case-by-case basis or consider establishing a list of destination countries or international organizations with sufficient standards of personal data protection.

4. Exceptions to Key Requirements of Cross-Border Data Transfer

As per Section 28 of the PDPA, the adequate data protection standard requirement for cross-border transfer of data may be exempted in the following situations:

  • Where the cross-border data transfer is taking place for compliance with the law. It could include situations such as the disclosure of specific personal data for legal investigations mandated by the law.
  • Where the consent of the data subject has been obtained after he/she has been informed of the non-adequate personal data protection standards of the destination country or international organization. It could include instances where an organization transfers personal data to an international research institution located in a non-adequate country after informing the data subject about the destination country's insufficient data protection standards and obtaining explicit consent.
  • Where the transfer of personal data is essential to fulfilling contractual obligations on behalf of the data subject.
  • Where the transfer of personal data is essential for compliance with a contract between a person/entity based in Thailand making the cross-border data transfer effective, and another person/entity based abroad for the interests of the data subject. It could include a contract with an international organization to improve services for the benefit of data subjects.
  • Where sharing data abroad is necessary for a critical situation to prevent harm to the life, body, or health of the data subject or others, and the data subject is unable to provide consent.
  • Where it is necessary to carry out the activities concerning substantial public interest. It can include collaborating with an international organization for global health research or environmental protection activities.

5. Mechanisms for Transfer of Cross-Border Data to Non-adequate Countries

The Non-adequate Countries Notification prescribes, in further detail, two primary mechanisms available to data controllers or processors for the transfer of personal data to countries deemed non-adequate by the PDPC:

  • Binding Corporate Rules: Multinational corporations with subsidiaries in Thailand and a non-adequate country can transfer personal data across borders. This is permissible after a thorough review and certification of their personal data protection policy, known as Binding Corporate Rules (BCR) approved by the PDPC. These BCRs serve as an internal code of conduct, ensuring consistent and compliant handling of personal data within the corporate network.
  • Appropriate Safeguards: Data can be transferred to a non-adequate country from Thailand, if there are appropriate safeguards in place ensuring data subjects have effective legal remedies and their rights can be enforced. These appropriate safeguards include the following:
    • Model Contractual Clauses: Model Contractual Clauses allow both parties to agree on standardized terms that safeguard the personal data during the cross-border transfer. The Non-adequate Countries Notification outlines the following required elements for Model Contractual Clauses to qualify as appropriate safeguards:
        • It can be specific to regions or regulations (i.e., ASEAN, GDPR) and play a crucial role in standardizing and regulating cross-border data transfers.
        • It could also take the form of standard contractual terms for sending or transferring personal data abroad by agencies or international organizations as specified by the PDPC.

      It grants businesses the flexibility to tailor Model Contractual Clauses to their specific needs within certain boundaries, providing adaptability to diverse industries and operational contexts.

        • Model Contractual Clauses may be utilized in circumstances where a Thai e-commerce company wants to engage a cloud service provider located in a non-adequate country for data processing.
  • Certification Ensuring Appropriate Safeguards: As an appropriate safeguard, a certification can be obtained from the PDPC ensuring that the personal data transferred to a non-adequate country is handled in accordance with Thai law. The certification would reinforce the legal enforceability of the safeguards in place.
    • For example, these certifications might be employed when a Thai institution acquires certification from the PDPC to transfer personal data to a non-adequate country for specified purposes.
  • Legally Binding Instruments: Legally binding instruments may serve as appropriate safeguards for cross-border data transfer to non-adequate countries. It would ensure that data protection standards are maintained across borders.
    • A legally binding instrument may serve as an appropriate safeguard if the Thai government establishes a bilateral agreement with a non-adequate country to facilitate the secure exchange of personal data for law enforcement purposes.
  • Code of Conduct: A code of conduct, approved by the PDPC, for cross-border transfer of personal data may serve as an appropriate safeguard when sending personal data to non-adequate countries.
    • If a consortium of international businesses operating in Thailand adopts an approved code of conduct for cross-border data transfers it becomes a guiding framework for ensuring data protection compliance across diverse business operations.

Analyze this article with AI

Prompts open in third-party AI tools.
Join Our Newsletter

Get all the latest information, law updates and more delivered to your inbox



More Stories that May Interest You
Videos
View More
Mitigating OWASP Top 10 for LLM Applications 2025
Generative AI (GenAI) has transformed how enterprises operate, scale, and grow. There’s an AI application for every purpose, from increasing employee productivity to streamlining...
View More
Top 6 DSPM Use Cases
With the advent of Generative AI (GenAI), data has become more dynamic. New data is generated faster than ever, transmitted to various systems, applications,...
View More
Colorado Privacy Act (CPA)
What is the Colorado Privacy Act? The CPA is a comprehensive privacy law signed on July 7, 2021. It established new standards for personal...
View More
Securiti for Copilot in SaaS
Accelerate Copilot Adoption Securely & Confidently Organizations are eager to adopt Microsoft 365 Copilot for increased productivity and efficiency. However, security concerns like data...
View More
Top 10 Considerations for Safely Using Unstructured Data with GenAI
A staggering 90% of an organization's data is unstructured. This data is rapidly being used to fuel GenAI applications like chatbots and AI search....
View More
Gencore AI: Building Safe, Enterprise-grade AI Systems in Minutes
As enterprises adopt generative AI, data and AI teams face numerous hurdles: securely connecting unstructured and structured data sources, maintaining proper controls and governance,...
View More
Navigating CPRA: Key Insights for Businesses
What is CPRA? The California Privacy Rights Act (CPRA) is California's state legislation aimed at protecting residents' digital privacy. It became effective on January...
View More
Navigating the Shift: Transitioning to PCI DSS v4.0
What is PCI DSS? PCI DSS (Payment Card Industry Data Security Standard) is a set of security standards to ensure safe processing, storage, and...
View More
Securing Data+AI : Playbook for Trust, Risk, and Security Management (TRiSM)
AI's growing security risks have 48% of global CISOs alarmed. Join this keynote to learn about a practical playbook for enabling AI Trust, Risk,...
AWS Startup Showcase Cybersecurity Governance With Generative AI View More
AWS Startup Showcase Cybersecurity Governance With Generative AI
Balancing Innovation and Governance with Generative AI Generative AI has the potential to disrupt all aspects of business, with powerful new capabilities. However, with...

Spotlight Talks

Spotlight 50:52
From Data to Deployment: Safeguarding Enterprise AI with Security and Governance
Watch Now View
Spotlight 11:29
Not Hype — Dye & Durham’s Analytics Head Shows What AI at Work Really Looks Like
Not Hype — Dye & Durham’s Analytics Head Shows What AI at Work Really Looks Like
Watch Now View
Spotlight 11:18
Rewiring Real Estate Finance — How Walker & Dunlop Is Giving Its $135B Portfolio a Data-First Refresh
Watch Now View
Spotlight 13:38
Accelerating Miracles — How Sanofi is Embedding AI to Significantly Reduce Drug Development Timelines
Sanofi Thumbnail
Watch Now View
Spotlight 10:35
There’s Been a Material Shift in the Data Center of Gravity
Watch Now View
Spotlight 14:21
AI Governance Is Much More than Technology Risk Mitigation
AI Governance Is Much More than Technology Risk Mitigation
Watch Now View
Spotlight 12:!3
You Can’t Build Pipelines, Warehouses, or AI Platforms Without Business Knowledge
Watch Now View
Spotlight 47:42
Cybersecurity – Where Leaders are Buying, Building, and Partnering
Rehan Jalil
Watch Now View
Spotlight 27:29
Building Safe AI with Databricks and Gencore
Rehan Jalil
Watch Now View
Spotlight 46:02
Building Safe Enterprise AI: A Practical Roadmap
Watch Now View
Latest
View More
DataAI Security: Why Healthcare Organizations Choose Securiti
Discover why healthcare organizations trust Securiti for Data & AI Security. Learn key blockers, five proven advantages, and what safe data innovation makes possible.
View More
The Anthropic Exploit: Welcome to the Era of AI Agent Attacks
Explore the first AI agent attack, why it changes everything, and how DataAI Security pillars like Intelligence, CommandGraph, and Firewalls protect sensitive data.
Network Security: Definition, Challenges, & Best Practices View More
Network Security: Definition, Challenges, & Best Practices
Discover what network security is, how it works, types, benefits, and best practices. Learn why network security is core to having a strong data...
View More
What is Cybersecurity Management?
Discover what cybersecurity management is, its importance, the CISO’s role, types, and best practices for effective cybersecurity management. Learn more.
Montana Privacy Amendment on Notices: What to Change by Oct 1 View More
Montana Privacy Amendment on Notices: What to Change by Oct 1
Download the whitepaper to learn about the Montana Privacy Amendment on Notices and what to change by Oct 1. Learn how Securiti helps.
2026 Privacy Law Updates: Key Developments You Need to Know View More
2026 Privacy Law Updates: Key Developments You Need to Know
Access the whitepaper to learn about key privacy law updates in 2026. Discover key developments you need to know. Learn how Securiti can help.
View More
The Future of Privacy: Top Emerging Privacy Trends in 2026
Access the infographic to discover the top emerging privacy trends in 2026. Learn what organizations must do to thrive in 2026 and beyond.
India’s DPDPA Rules View More
India’s DPDPA Rules
Access the infographic to learn about India’s DPDPA 2025 basics. Discover phased timelines, what the rules require, when they apply, key obligations, and much...
View More
Navigating HITRUST: A Guide to Certification
Securiti's eBook is a practical guide to HITRUST certification, covering everything from choosing i1 vs r2 and scope systems to managing CAPs & planning...
The DSPM Architect’s Handbook View More
The DSPM Architect’s Handbook: Building an Enterprise-Ready Data+AI Security Program
Get certified in DSPM. Learn to architect a DSPM solution, operationalize data and AI security, apply enterprise best practices, and enable secure AI adoption...
What's
New