Artifact GuideAPAC

Singapore PDPA Compliance Deadlines and Calendar

Every Singapore PDPA compliance deadline mapped to a practical calendar: the 3-calendar-day PDPC breach notification window, 30-day access request response, correction and consent withdrawal timelines, DNC registry check cadences, quarterly retention reviews, annual DPIA cycles, and vendor contract renewal milestones.

Use this Singapore PDPA calendar to build a repeatable compliance programme with defensible evidence for every statutory and recommended deadline.

Author
Sorena AI
Published
Feb 21, 2026
Updated
Feb 21, 2026
Sections
10

Structured answer sets in this page tree.

Primary sources
8

Cited legal and guidance references.

Publication metadata
Sorena AI
Published Feb 21, 2026
Updated Feb 21, 2026
Overview

This Singapore PDPA compliance deadlines page maps every time-bound obligation in the Personal Data Protection Act 2012 (PDPA) to a concrete calendar entry. The Singapore PDPA calendar covers statutory deadlines that carry direct enforcement risk -- including the 3-calendar-day breach notification to the PDPC, the 30-day access request response window, correction request timelines, and consent withdrawal handling periods -- as well as recommended cadences for activities the PDPC expects organisations to perform on a recurring basis, such as retention reviews, DNC registry checks, DPIA refreshes, and vendor contract audits. Whether you are a Data Protection Officer, compliance manager, legal counsel, or operations lead in Singapore, this page gives you a single reference for building an annual Singapore PDPA compliance calendar with provable deadlines, owners, and evidence trails. All dates and deadlines are grounded in the PDPA text (Act 26 of 2012, as amended by Act 40 of 2020 and Act 19 of 2025), the Personal Data Protection (Notification of Data Breaches) Regulations 2021, and PDPC advisory guidelines.

Section 1

Singapore PDPA Legislative Timeline: Key Effective Dates for Your Compliance Calendar

Building a Singapore PDPA compliance calendar starts with understanding when each part of the Act came into force, because different obligations have different effective dates. The Personal Data Protection Act 2012 (Act 26 of 2012) was enacted by Parliament but its provisions took effect in phases over several years. Organisations that processed personal data before a given effective date must still meet the Singapore PDPA compliance deadlines for that data if they continue to hold or use it today.

The Personal Data Protection Commission (PDPC) was established on 2 January 2013 as the regulator responsible for administering and enforcing the Singapore PDPA. The Do Not Call (DNC) Registry provisions came into force on 2 January 2014, while the main data protection obligations -- consent, purpose limitation, notification, access, correction, accuracy, protection, retention, and transfer limitation (Parts III to VII) -- took effect on 2 July 2014. This phased rollout gave organisations a transition window to prepare policies, notices, and consent mechanisms before enforcement began.

Major amendments to the Singapore PDPA were passed by Parliament on 2 November 2020 and took effect in phases from 1 February 2021. These amendments introduced the mandatory data breach notification regime (Part 6A, Sections 26A-26E), added new legal bases including the legitimate interests exception and the business improvement exception, introduced deemed consent by notification (Section 15A), and raised enforcement powers. On 1 October 2022, further enforcement amendments took effect, including the PDPC's power to accept voluntary undertakings (Section 48L) and the increased financial penalty cap of 10% of annual local turnover for organisations with annual turnover exceeding S$10 million, or S$1 million, whichever is higher (Section 48J). Most recently, Act 19 of 2025 introduced additional amendments effective from 5 December 2025.

Every compliance team maintaining a Singapore PDPA calendar should keep a legislative timeline register that records which provisions were in force at each point in time. This register serves as an audit trail when the PDPC reviews past processing activities and answers the question of whether a specific Singapore PDPA compliance deadline existed at the time a particular data-handling decision was made.

  • 2 January 2013: PDPC established as Singapore's data protection authority under Part 2 of the PDPA.
  • 2 January 2014: DNC Registry provisions (Part 9, Sections 36-48) came into force, requiring organisations to check the registry before sending marketing messages to Singapore telephone numbers.
  • 2 July 2014: main data protection obligations took effect (Parts III-VII), including consent, purpose limitation, notification, access, correction, accuracy, protection, retention, and transfer limitation.
  • 2 November 2020: Parliament passed amendments (Act 40 of 2020) adding mandatory breach notification, new legal bases, deemed consent by notification, and higher penalties.
  • 1 February 2021: first phase of amendments took effect, including mandatory data breach notification to PDPC and affected individuals under Part 6A (Sections 26A-26E).
  • 1 October 2022: enforcement amendments took effect, including voluntary undertakings (Section 48L) and the increased financial penalty cap -- 10% of annual local turnover or S$1 million, whichever is higher (Section 48J).
  • 5 December 2025: amendments under Act 19 of 2025 took effect, further updating the Singapore PDPA framework.
  • Maintain a legislative timeline register in your Singapore PDPA compliance calendar that records effective dates and maps each date to the obligations that commenced.
Recommended next step

Turn Singapore PDPA Compliance Deadlines and Calendar into an operational assessment

Assessment Autopilot can take Singapore PDPA Compliance Deadlines and Calendar from planning deadlines, owners, and milestones from this page to a reusable workflow inside Sorena. Teams working on Singapore PDPA can keep owners, evidence, and next steps aligned without copying this guide into separate documents.

Section 2

Singapore PDPA Breach Notification Deadline: 3 Calendar Days to PDPC

The most time-critical entry in any Singapore PDPA compliance calendar is the mandatory data breach notification deadline. Under Part 6A of the PDPA (Section 26D), organisations must notify the PDPC as soon as practicable, but in any case no later than 3 calendar days after the organisation determines that a notifiable data breach has occurred. This Singapore PDPA compliance deadline of 3 calendar days is absolute -- it runs from the date the organisation completes its assessment (under Section 26C), not from the date the breach was first discovered. The Personal Data Protection (Notification of Data Breaches) Regulations 2021 prescribe the detailed notification requirements.

A data breach is notifiable under the Singapore PDPA if it results in, or is likely to result in, significant harm to affected individuals, or if it involves 500 or more affected individuals (Section 26B), even where significant harm is unlikely. The PDPC's Guide to Managing and Notifying Data Breaches (updated 15 March 2021) provides detailed guidance on assessing whether a breach meets the notification threshold. Organisations must also notify affected individuals as soon as practicable, either at the same time as or after notifying the PDPC (Section 26D(4)).

To meet this 3-calendar-day Singapore PDPA compliance deadline, organisations need a pre-built breach assessment workflow. Without one, the time spent convening a response team, gathering facts, and debating whether the breach is notifiable can easily consume the entire window. The assessment must answer three questions: (1) what personal data was involved, (2) how many individuals were affected, and (3) whether significant harm is likely. If the answer to question 2 is 500 or more, or the answer to question 3 is yes, the breach is notifiable to the PDPC.

Evidence of the assessment and the full timeline of events must be preserved as part of your Singapore PDPA calendar records. The PDPC expects organisations to document when the breach was discovered, when the assessment was completed, when notification was sent, and what containment steps were taken. Late notification or failure to notify is itself a breach of the Data Breach Notification Obligation and can result in directions and financial penalties under Section 48I and Section 48J.

  • 3 calendar days: the Singapore PDPA compliance deadline to notify the PDPC after the organisation determines a breach is notifiable (Section 26D(1)).
  • As soon as practicable: the Singapore PDPA deadline to notify affected individuals, at the same time as or after PDPC notification (Section 26D(4)).
  • 500 or more affected individuals triggers mandatory notification regardless of whether significant harm is likely (Section 26B(1)(b)).
  • Significant harm to any number of individuals also triggers mandatory notification under Section 26B(1)(a).
  • Section 26C requires organisations to conduct an assessment of a suspected data breach as soon as practicable after becoming aware of it.
  • Maintain a pre-built breach response runbook with roles, escalation paths, and template notification forms aligned to this Singapore PDPA calendar entry.
  • Document the full timeline: discovery date, assessment completion date, PDPC notification date, individual notification date, and containment actions.
  • Conduct breach tabletop exercises at least twice per year to pressure-test the 3-calendar-day Singapore PDPA compliance deadline.
Section 3

Singapore PDPA Access Request Deadline: 30 Calendar Days to Respond

The Access Obligation under Section 21 of the Singapore PDPA requires organisations to respond to an individual's access request as soon as reasonably possible. The PDPC's Advisory Guidelines on Key Concepts in the PDPA indicate that organisations should respond within 30 calendar days from the date the request is received. This 30-day window is one of the most frequently tested Singapore PDPA compliance deadlines in PDPC enforcement decisions, making it a critical entry in every Singapore PDPA calendar.

An access request asks the organisation to provide the individual with their personal data that is in the organisation's possession or control, and information about how that data has been used or disclosed in the preceding year (Section 21(1)). The organisation may charge a reasonable fee for responding but must not set a fee that is excessive or designed to discourage individuals from exercising their rights. If the organisation cannot respond within 30 days, it must inform the requestor of the expected timeline and the reasons for the delay.

Operational readiness for meeting this Singapore PDPA compliance deadline requires a documented intake process, a data inventory that maps where personal data is stored across all systems, and a workflow for compiling and reviewing the response before release. Organisations must also have a redaction process to remove third-party personal data or information protected by exceptions in the Fifth Schedule before providing the response to the individual.

Failure to respond within a reasonable time, or providing an incomplete response, can result in a complaint to the PDPC. The PDPC has the power under Part 9C to investigate, issue directions (Section 48I), and impose financial penalties (Section 48J). Tracking access requests in a register with dates, handler assignments, status updates, and response timelines is essential evidence of Singapore PDPA compliance calendar adherence.

  • 30 calendar days: the recommended Singapore PDPA compliance deadline to respond to an access request from date of receipt.
  • If unable to respond within 30 days, inform the requestor of the reason and the expected timeline for the response.
  • The response must include the individual's personal data held by the organisation and usage/disclosure information for the preceding year (Section 21(1)).
  • Organisations may charge a reasonable fee but must not set fees that discourage individuals from exercising access rights under the Singapore PDPA.
  • Build a documented intake workflow: log the request date, assign a handler, compile data from all systems, redact third-party data under Fifth Schedule exceptions, and send the response.
  • Maintain an access request register with columns for request date, assigned handler, response date, fee charged, and outcome as part of your Singapore PDPA calendar.
  • Review the Fifth Schedule (exceptions from access requirement) to identify categories of data that may be withheld from the response.
  • Audit the access request register quarterly to verify that all requests were closed within the 30-day Singapore PDPA compliance deadline.
Section 4

Singapore PDPA Correction Request Deadlines and Downstream Notification

Under the Correction Obligation (Section 22 of the Singapore PDPA), an individual may request that an organisation correct an error or omission in their personal data. The organisation must correct the data and send the corrected data to every other organisation to which the data was disclosed within a year before the correction was made, unless that other organisation does not need the corrected data for any legal or business purpose. This downstream notification requirement makes correction requests one of the more operationally complex Singapore PDPA compliance deadlines to manage.

The Singapore PDPA does not prescribe a specific number of days for correction, but PDPC advisory guidelines indicate that corrections should be made as soon as practicable. In practice, organisations should aim to complete corrections within 30 calendar days to align with the access request deadline and to demonstrate a consistent standard of responsiveness. This 30-day operational target should be recorded in your Singapore PDPA compliance calendar alongside the statutory access request deadline.

If the organisation decides not to make a correction, Section 22(5) requires it to inform the individual of the refusal, the reasons for it, and how the individual can escalate the matter. The organisation must also annotate the personal data with the individual's requested correction so that the disputed information is flagged in its records. This annotation must remain for as long as the data is retained.

Building a correction request workflow that mirrors the access request workflow reduces operational complexity and keeps your Singapore PDPA calendar consistent. Use the same intake form, tracking register, and escalation paths. Add a step for downstream notification to third parties who received the original data. Document each correction with the date it was completed, the fields corrected, and the list of third parties that were notified of the correction.

  • As soon as practicable: the statutory standard under Section 22 of the Singapore PDPA for completing a correction request.
  • Aim for 30 calendar days as an operational target in your Singapore PDPA compliance calendar to match the access request deadline.
  • Corrected data must be sent to every organisation to which it was disclosed in the preceding year, unless not needed for legal or business purposes (Section 22(3)).
  • If correction is refused, annotate the personal data with the individual's requested correction under Section 22(5).
  • Inform the individual of the refusal, the reasons, and available escalation options including complaint to the PDPC.
  • Use the same intake workflow and register as access requests to reduce process duplication across your Singapore PDPA calendar.
  • Log each correction with the completion date, corrected fields, and a list of third-party notifications sent.
Section 6

Singapore PDPA Annual Compliance Review Calendar and DPMP Refresh

The Accountability Obligation under Section 12 of the Singapore PDPA requires organisations to implement policies and practices necessary to meet their obligations under the Act, and to make information about those policies and practices available on request. The PDPC's Guide to Developing a Data Protection Management Programme (DPMP) describes the components of an effective programme. An annual compliance review is the anchor event in any Singapore PDPA compliance calendar, providing the structure for all other recurring deadlines.

The annual Singapore PDPA compliance review should cover every obligation under the Act: consent mechanisms (Sections 13-17), purpose specifications (Sections 18-20), notification wording (Section 20), access and correction workflows (Sections 21-22), protection measures (Section 24), retention schedules (Section 25), transfer mechanisms (Section 26), data breach notification readiness (Part 6A), and accountability documentation (Section 12). The review should also assess whether the organisation's DPMP remains aligned with current PDPC advisory guidelines and enforcement trends.

Organisations subject to the Singapore PDPA should designate a Data Protection Officer (DPO) or equivalent role to own the annual review. The PDPC's Guide to Accountability recommends that the DPO produce a written report summarising findings, gaps, and remediation actions, with deadlines and owners assigned to each item. This report is a key piece of audit evidence on your Singapore PDPA compliance calendar and should be retained for at least 5 years to demonstrate ongoing accountability.

The annual review should include a training refresh for all employees who handle personal data. The PDPC has stated in enforcement decisions that lack of training is an aggravating factor when assessing penalties. Annual training ensures that staff are aware of current policies, know how to handle access and correction requests within the Singapore PDPA compliance deadlines, and understand breach escalation procedures within the 3-calendar-day window.

  • Conduct a full Data Protection Management Programme (DPMP) review once per year as the anchor event in your Singapore PDPA compliance calendar.
  • Review PDPC enforcement decisions published in the preceding year to identify emerging risk areas relevant to your Singapore PDPA compliance deadlines.
  • Produce a written annual review report with findings, gaps, remediation actions, owners, and deadlines.
  • Refresh data protection training for all staff who collect, use, or disclose personal data under the Singapore PDPA.
  • Update privacy notices and consent mechanisms to reflect any changes in processing activities since the last Singapore PDPA calendar review.
  • Review and update the data inventory and purpose register to ensure accuracy against Sections 18-20.
  • Retain the annual review report and training records for at least 5 years as audit evidence for Singapore PDPA compliance.
  • Schedule the annual review for the same month each year to establish a predictable Singapore PDPA compliance calendar rhythm.
Section 7

Singapore PDPA DNC Registry Check Frequency and Marketing Compliance Calendar

The Do Not Call (DNC) Registry provisions under Part 9 of the Singapore PDPA (in force since 2 January 2014) require organisations to check the DNC Registry before sending specified messages -- voice calls, text messages, or fax -- to Singapore telephone numbers. Section 43 imposes a duty to check the register, and an organisation that sends a marketing message to a number listed on the DNC Registry without a valid exemption commits an offence. The DNC check cadence is one of the most operationally demanding entries on any Singapore PDPA compliance calendar for marketing teams.

The Singapore PDPA does not prescribe a specific frequency for DNC checks, but the obligation is effectively continuous: an organisation must not send a marketing message to a registered number. In practice, organisations should check the DNC Registry immediately before each campaign or batch of outbound marketing messages. For organisations that send marketing messages on a recurring schedule, a monthly check is the minimum defensible frequency to record in the Singapore PDPA compliance calendar. The PDPC has taken enforcement action against organisations that relied on outdated DNC check results.

Results from DNC checks should be cached only for the duration of a specific campaign. Numbers may be added to or removed from the registry at any time, so relying on a stale check result creates enforcement risk. The PDPC's Advisory Guidelines on the DNC Provisions recommend that organisations treat each campaign as a fresh check event and record the results accordingly in their Singapore PDPA calendar.

Organisations should also maintain an internal do-not-contact list that combines DNC Registry results with individual opt-out requests received through other channels such as email, web forms, or customer service calls. This internal list should be updated in real time as new opt-out requests arrive. A quarterly audit of the DNC checking process should verify correct API or bulk-check usage, confirm that results are applied before messages are sent, and confirm that records of each check are retained as Singapore PDPA compliance evidence.

  • Check the DNC Registry (Section 43) before every marketing campaign or batch of outbound messages as a standing entry on your Singapore PDPA compliance calendar.
  • For recurring campaigns, check at least monthly as the minimum defensible frequency under Singapore PDPA compliance deadlines.
  • Do not cache DNC check results beyond the duration of a single campaign -- numbers can be added or removed at any time.
  • Maintain an internal do-not-contact list that merges DNC Registry results with direct opt-out requests from all channels.
  • Update the internal list in real time as new opt-out requests arrive to stay current with Singapore PDPA requirements.
  • Retain records of each DNC check (date, numbers checked, results) as compliance evidence in your Singapore PDPA calendar.
  • Conduct a quarterly audit of the DNC checking process to verify correct implementation and record-keeping.
  • Train all marketing staff on DNC requirements under Part 9 and the consequences of sending messages to registered numbers.
Section 8

Singapore PDPA Data Retention Review Schedule Under Section 25

The Retention Limitation Obligation under Section 25 of the Singapore PDPA requires organisations to cease retaining personal data, or remove the means by which the data can be associated with a particular individual, as soon as it is reasonable to assume that the purpose for which the data was collected is no longer being served and retention is no longer necessary for legal or business purposes. This obligation makes the data retention review a recurring entry on every Singapore PDPA compliance calendar.

Because the Singapore PDPA ties retention to purpose, organisations must maintain a retention schedule that maps each data category to its collection purpose and the maximum period for which retention is justified. When the purpose expires and no legal hold or regulatory requirement applies, the data must be deleted or anonymised. This is not a one-time exercise -- new data categories are introduced with every product release, and existing purposes may change or expire over time, requiring updates to the Singapore PDPA calendar.

A quarterly retention review is the recommended cadence for your Singapore PDPA compliance calendar. During each review, the compliance team should compare the data inventory against the retention schedule, identify any data that has exceeded its retention period, and initiate deletion or anonymisation workflows. The review should also flag any new data categories introduced since the last review and ensure they have been added to the retention schedule with a defined purpose and maximum retention period.

The PDPC has penalised organisations in enforcement decisions for retaining personal data longer than necessary in violation of Section 25. Common violations found in Singapore PDPA enforcement cases include keeping customer data after account closure without documented justification, storing backup tapes containing personal data beyond the retention period, and failing to delete test data that contains real personal information. Documenting each retention review -- including what was reviewed, what was deleted, and what was retained with justification -- creates the evidence trail the PDPC expects.

  • Maintain a data retention schedule mapping each data category to its collection purpose and maximum retention period under Section 25 of the Singapore PDPA.
  • Conduct a quarterly retention review as a recurring entry in your Singapore PDPA compliance calendar, comparing the data inventory to the retention schedule.
  • Identify and delete or anonymise any data that has exceeded its retention period with no ongoing legal or business justification.
  • Flag new data categories introduced since the last review and add them to the retention schedule with a defined purpose.
  • Include backup systems, archives, and test environments in the scope of every Singapore PDPA retention review.
  • Document each review cycle: date, reviewer, categories checked, deletions performed, and exceptions justified.
  • Retain deletion certificates or logs as evidence that data was destroyed in accordance with the Singapore PDPA calendar schedule.
  • Align the quarterly retention review with the quarterly vendor review to ensure third-party processors also comply with retention limits.
Section 9

Singapore PDPA DPIA and Risk Assessment Scheduling

Although the Singapore PDPA does not use the term 'Data Protection Impact Assessment' (DPIA), the Accountability Obligation (Section 12) and the PDPC's Guide to Data Protection Impact Assessments effectively require organisations to assess risks before undertaking new or significantly changed processing activities. A DPIA that evaluates the impact on individuals and identifies mitigating controls is a core component of a defensible Singapore PDPA compliance calendar and demonstrates proactive accountability to the PDPC.

Organisations should add a DPIA trigger to their Singapore PDPA compliance calendar for every new product, feature, or service that involves the collection, use, or disclosure of personal data. The assessment should also be triggered by material changes to existing processing, such as introducing a new data recipient, changing the purpose of processing, adopting new technology (such as AI, machine learning, or biometric systems), or expanding processing to new jurisdictions. The PDPC's Guide to Data Protection Impact Assessments provides a step-by-step methodology.

In addition to event-driven assessments, organisations should schedule a periodic review of existing processing activities on their Singapore PDPA compliance calendar. An annual DPIA review cycle ensures that assessments completed in prior years are still accurate and that controls identified as mitigations are still in place and effective. This annual review should be timed to coincide with the annual DPMP review described in the previous section to reduce duplication of effort while maintaining comprehensive Singapore PDPA compliance deadline coverage.

Each DPIA should produce a written record that includes the processing activity described, the categories of personal data involved, the risks identified, the mitigating controls, and the residual risk accepted by the accountable decision-maker. These records should be retained for at least 5 years as part of your Singapore PDPA calendar documentation. The PDPC considers the existence and quality of risk assessments when deciding enforcement outcomes, and organisations that can demonstrate a systematic DPIA process aligned to their Singapore PDPA compliance calendar are likely to receive more favourable treatment.

  • Conduct a DPIA before launching any new product, feature, or service that processes personal data, as a standing trigger in your Singapore PDPA compliance calendar.
  • Trigger a DPIA for material changes: new data recipients, new purposes, new technology (AI/ML/biometrics), or new jurisdictions.
  • Schedule an annual review of all existing DPIAs on your Singapore PDPA calendar to verify that assessments remain accurate and controls are effective.
  • Align the annual DPIA review with the DPMP review to reduce duplication while maintaining full Singapore PDPA compliance deadline coverage.
  • Each DPIA record should include: processing description, data categories, risks identified, mitigating controls, and residual risk acceptance.
  • Retain DPIA records for at least 5 years as audit and enforcement evidence under your Singapore PDPA compliance calendar.
  • Assign clear ownership for each DPIA to a named individual or team.
  • Track DPIA completion status in a register and report overdue assessments to the DPO monthly as part of Singapore PDPA calendar governance.
Section 10

Singapore PDPA Vendor Contract Review and Renewal Calendar

The Protection Obligation (Section 24) and the Transfer Limitation Obligation (Section 26) of the Singapore PDPA make the organisation that collected personal data responsible for ensuring that any receiving organisation provides a comparable standard of protection. This applies to data intermediaries, cloud service providers, marketing partners, and any other third party that processes personal data on behalf of the organisation. Vendor contract management is therefore one of the most operationally significant recurring entries on the Singapore PDPA compliance calendar.

The PDPC's Guide to Managing Data Intermediaries and the Guide on Data Protection Clauses for Agreements Relating to the Processing of Personal Data provide model clauses and best practices for vendor contracts under the Singapore PDPA. Vendor contracts should include data protection clauses that specify the purposes for which data may be processed, the security measures required, breach notification obligations aligned to the 3-calendar-day Singapore PDPA deadline, sub-processor restrictions, data return or deletion on termination, and audit rights. These clauses must be reviewed before each contract renewal to reflect current PDPC guidance.

A quarterly vendor review cadence is the recommended entry on your Singapore PDPA compliance calendar. Each quarter, the compliance team should review the vendor register, verify that all active vendors have current contracts with adequate data protection clauses, check that any new vendors onboarded since the last review have been assessed, and follow up on any open remediation items from prior reviews. For high-risk vendors processing large volumes of personal data or sensitive data, an annual audit or assessment questionnaire should supplement the quarterly contract review.

Contract renewal dates should be tracked in your Singapore PDPA calendar with alerts set at least 90 days before expiry. This gives sufficient time to renegotiate data protection clauses, conduct a fresh risk assessment if the vendor's scope has changed, and involve legal counsel in reviewing new terms. Letting a contract lapse or auto-renew without reviewing the data protection provisions creates a gap in Singapore PDPA compliance that the PDPC may scrutinise during an investigation. For cross-border data transfers, organisations must also verify that the vendor's jurisdiction provides adequate protection or that appropriate contractual safeguards (such as ASEAN Model Contractual Clauses) are in place under Section 26.

  • Include data protection clauses in every vendor contract: purpose limitation, security requirements, breach notification aligned to Singapore PDPA deadlines, sub-processor controls, data return/deletion, and audit rights.
  • Conduct a quarterly vendor register review as a recurring entry on your Singapore PDPA compliance calendar: verify current contracts, assess new vendors, and follow up on remediation items.
  • For high-risk vendors, supplement quarterly reviews with an annual audit or assessment questionnaire aligned to the PDPC's Guide to Managing Data Intermediaries.
  • Track contract renewal dates in your Singapore PDPA calendar with 90-day advance alerts to allow time for renegotiation.
  • Review and update data protection clauses at each renewal to reflect current PDPC guidance and any changes to Singapore PDPA compliance deadlines.
  • Conduct a fresh risk assessment if the vendor's processing scope has changed since the last review.
  • Retain vendor assessment records, contract copies, and audit reports for at least 5 years as Singapore PDPA compliance evidence.
  • For cross-border transfers, verify adequate protection or appropriate contractual safeguards under Section 26 as part of each vendor review on your Singapore PDPA calendar.
Primary sources

References and citations

pdpc.gov.sg
Referenced sections
  • Core interpretation guidance for consent, purposes, notification, access/correction, accuracy, protection, retention, transfers, and accountability -- including the 30-day access request response recommendation.
pdpc.gov.sg
Referenced sections
  • Official PDPC overview of Singapore PDPA obligations, legislative timeline, key concepts, and updates including the 2021 and 2022 amendments.
sso.agc.gov.sg
Referenced sections
  • Primary legislation (Act 26 of 2012, current version as at February 2026) governing collection, use, disclosure, protection, retention, transfer, breach notification, and accountability for personal data in Singapore.
Related guides

Explore more topics

Singapore PDPA Applicability Test | Does the PDPA Apply to Your Organisation?
Complete Singapore PDPA applicability test with step-by-step framework to determine if the Personal Data Protection Act applies to your organisation.
Singapore PDPA Breach Notification Playbook - Complete Guide
Singapore PDPA breach notification playbook with the 3-day PDPC reporting deadline.
Singapore PDPA Compliance Checklist - Audit-Ready Guide (2026)
Complete Singapore PDPA compliance checklist covering DPMP governance, consent management, purpose limitation, data protection controls, retention schedules.
Singapore PDPA Compliance Guide - Data Protection Management Programme, DPO, Consent, Protection, Retention, DPTM
Complete Singapore PDPA compliance guide for organisations.
Singapore PDPA Consent and Notification Obligations Guide
Complete Singapore PDPA consent and notification guide covering express consent, deemed consent by conduct and notification, legitimate interests exception.
Singapore PDPA Cross-Border Transfer Rules | Section 26 Data Transfer Compliance
Complete guide to Singapore PDPA cross-border transfer compliance under Section 26.
Singapore PDPA Do Not Call Registry and Marketing Messages Compliance Guide
Complete Singapore PDPA Do Not Call (DNC) Registry compliance guide for businesses.
Singapore PDPA FAQ | Frequently Asked Questions on Personal Data Protection Act Compliance
Singapore PDPA FAQ with detailed answers on scope, consent, deemed consent, legitimate interests, breach notification, DPO requirements.
Singapore PDPA Penalties and Enforcement Cases - PDPC Fines and Decisions
Singapore PDPA penalties and enforcement cases: PDPC financial penalties up to SGD 1 million or 10% turnover.
Singapore PDPA Penalties and Fines | SGD 1M or 10% Turnover Cap + PDPC Enforcement Guide
Complete guide to Singapore PDPA penalties and fines: maximum financial penalties up to SGD 1 million or 10% annual turnover, PDPC enforcement directions.
Singapore PDPA Privacy Policy Template - Clause-by-Clause Drafting Guide
Singapore PDPA privacy policy template with clause-by-clause drafting instructions for all 10 Data Protection Provisions.
Singapore PDPA Requirements -- All Obligations Explained (Consent, Protection, Breach Notification, DNC)
Complete guide to Singapore PDPA requirements covering all Data Protection Provisions: consent obligation (Sections 13-17), purpose limitation (Section 18).
Singapore PDPA Scope, Exclusions, and Data Intermediary Obligations
Complete guide to Singapore PDPA scope covering excluded organisations, the personal and domestic exception, business contact information exclusion.
Singapore PDPA Vendor Outsourcing and Contracts Guide
Singapore PDPA vendor outsourcing guide covering data intermediary contracts, Singapore PDPA outsourcing obligations, vendor due diligence.
Singapore PDPA vs GDPR: Full Comparison of Scope, Consent, Penalties
Singapore PDPA vs GDPR comparison covering scope, consent models, deemed consent, breach notification, cross-border transfers, penalties, DPO requirements.