Can I request to access my personal data?
Yes, TH will allow you to access your existing personal data in TH storage system.
Yes, TH will allow you to access your existing personal data in TH storage system.
There are several conditions that allow others to access your personal data, namely:
TH can only deny your request to access your personal data when there is insufficient information to confirm your identity.
Yes, if your personal data is processed in Malaysia, and it is transferred to a party outside Malaysia, it will be covered under PDPA. However, PDPA will not protect personal data processed outside Malaysia.
TH will only retain your personal data for as long as necessary to fulfill the purpose for which it was collected or to comply with legal requirements and regulations as well as TH internal requirements.
TH is taking comprehensive measures to ensure your personal data security and confidentiality is protected via physical security, technical and IT process requirement.
Your rights are as follows:
Failure to provide your personal data or withdraw your consent to allow TH to process your personal data, it may cause TH unable to provide the products and services which are related to you in an effectively and continuously manner. If you do not give consent to TH for marketing purposes, TH will stop sending you the marketing material for your products and services. However, TH may still use your personal data for purpose of providing the products or services that you have signed up for or fulfilling any other contractual obligations, and for legal or regulatory purposes.
PDPA is an act enacted by the Malaysia Government and was established on 15 November 2013 to protect individual personal data and sensitive personal data in commercial transaction. PDPA has seven principles of information management practices that must be adhered, namely: -
PDPA defines “processing” as the collection, recording, handling, storing, organizing, modifying, disclosing and destroying of personal data information. By only reading or accessing information is already considered as “processing”. Example of activities that is considered as “processing” include: