SingHealth Data Breach Case 2018

Maria Binte Belal

Chandigarh University

This Case Commentary is written by Maria Binte Belal, a Law Graduate of Chandigarh University

Case Details:

  • Court: The case was addressed by the Personal Data Protection Commission (PDPC) of Singapore, which is responsible for enforcing the Personal Data Protection Act (PDPA).

  • Equivalent Citation: 2019 SGPDPC 3.

  • Bench: The decision was made by the Personal Data Protection Commission.

  • Decided On: January 15, 2009

  • Case Type: This was an enforcement action under the PDPA, concerning the failure to protect personal data.

Parties:

  • Petitioner: Not applicable, as this was not a civil writ petition.

  • Respondents: Singapore Health Services Pte. Ltd. (SingHealth) and Integrated Health Information Systems Pte. Ltd. (IHiS).

Introduction

One of the most significant cyber security crises in Singapore is the SingHealth data breach in 2018. Around 1.5 million individual’s data was exposed, including the Prime Minister of Singapore Lee Hsien Loong through this security crisis. Over several days attackers had stolen sensitive personal and Medical Data through exploiting the health systems IT framework. The breach raised a nationwide discussion in terms of sufficient cyber security measures for protecting significant critical personal information and it led to reform of the system. This case commentary will examine the background of the case, facts, raised issues, the arguments from both sides, the final verdict, and an analysis of the outcome of the verdict.

Background of the Case

The largest healthcare provider in Singapore, SingHealth, is in charge of KK Women's and Children's Hospital and Singapore General Hospital, among other important facilities. Cybercriminals gained access to SingHealth's patient database between June 27 and July 4, 2018, exposing private data. The fact that Prime Minister Lee Hsien Loong's medical records were explicitly targeted makes this incident all the more concerning. This raised suspicions that the hack was the product of a state-sponsored organization or was driven by political motivations. The Integrated Health Information System (IHiS), which manages the IT services for Singapore's public healthcare sector, eventually detected the hack after noticing unusual behavior.

The Singaporean government launched a thorough inquiry after the incident, which included a Committee of Inquiry (COI) to ascertain how the breach happened, who was at fault, and how future occurrences of the same kind could be avoided. Serious concerns were raised by the hack regarding the robustness of Singapore's overall cyber security architecture and data protection policies.

Facts of the Case

  1. In this case the scope of the breach was widespread. Around 1.5 million patients’ personal information was stolen by attackers, including their names, addresses, National Registration Identity Cards (NRIC) numbers, and dates of birth. As well as the medical records of 1,60,000 patients, including dispensed medication records were also compromised.

  1. Specifically Prime Minister Lee Hsien's medical data was targeted. It had been suspected that behind the attack significant political or state-sponsored motivation was connected.

  2. The breach occurred from June 27 to July 4, 2018, but it had been found through investigation that Attackers started targeting the system as early as August 2017.

  3. On July 4, 2018, the breach was uncovered when staff observed unusual database queries and the system was subsequently suspended.

Issues Raised

1. Whether the level of cyber security framework was sufficient or not?

2. Whether the monitoring of Singhealth and IHiS was adequate for protecting sensitive medical and personal data or not?

3. Whether the SingHealth and IHis staff act negligently after getting early signs of the attack or not?

4. Whether SingHealth Comply with the Personal Data Protection Act and other related cyber security laws or not?

5. Whether targeting specifically the prime minister, was a threat to national security or not?

Legal Framework

1. The Personal Data Protection Act 2012, provides guidelines on how organizations should handle personal data. This Act ensures protect individuals’ personal information.

2. The Cyber Security Act 2018 also provides guidelines for developing critical infrastructure as like healthcare systems.

The Committee of Inquiry suggested reforming PDPA and Cyber security laws, especially in the case of those sectors, that are involved in handling sensitive data. As a result, amendments were made to strengthen the PDPC’s enforcement powers and initiate more extensive sector-specific guidelines.

Arguments from the Petitioner (SingHealth/IHiS)

  1. Petitioner claimed that the highly complex method adopted by attackers is connected with advanced persistent threats and that kind of threat is challenging to detect. They further claimed that they couldn't prevent that kind of attack which is by nature complex.

  2. Petitioner argued that their cyber security framework complied with existing regulations but some failure occurred and it was not enough to prevent the breach.

  3. Petitioner acknowledged that some staff did not put enough focus on early alerts. Basically, it was human error not systemic negligence which led to a breach of significant personal sensitive data.

Arguments from the Respondent (Committee of Inquiry and Public)

  1.  The COI hinged that SingHealth and IHiS were casual about their cyber security practices. The deficiency in taking proper steps even though they got early warnings of doubtful activity proved negligence of authority, especially because of the high volume of data at risk.

  2. The respondent claimed that IHIiS failed to implication of significant cyber security frameworks, for example- identifying vulnerabilities of software and regular system audits. This negligence allowed the attackers to enter an already vulnerable system and attack it.


  3. The COI found that the organizations were getting along with existing cyber security regulations but they did not maintain the best practices of cyber security, especially in the healthcare sector.

Judgment

In January 2019, The COI released its findings. They said that the breach could have been significantly mitigated by taking more awareness and firm action. The COI got the following core findings:

  1.  In IHis’s cyber security framework, significant lapses were found. They failed to take necessary action after getting early alerts and late addressing vulnerabilities. These factors lead to significant breaches.

  1. More than one individual including senior management was responsible for taking necessary actions to prevent the breach. As a result of it, Key staff members and the chief information officer faced disciplinary actions.

  2. A total of 16 recommendations were made by the COI and all the recommendations were accepted by the Singapore government. These recommendations were developing staff training on cyber vigilance and strengthening cyber security framework as well as establishing a national healthcare cyber security strategy.

Critical Analysis

Even in a highly connected, technologically sophisticated nation like Singapore, the SingHealth hack demonstrated the vulnerability of vital data systems. Although there was no denying the attack's sophistication, the event also brought to light serious weaknesses in the healthcare industry's preparedness for cyber attacks. The absence of proactive monitoring and reaction methods was one of the main shortcomings. The fact that early warnings were minimized or disregarded suggests that institutional culture did not fully embrace cyber security procedures.
The hack also highlighted how susceptible the healthcare industry is to focused cyber attacks. As demonstrated by the targeting of Prime Minister Lee's medical records, health data, especially in an age of digital records, is extremely valuable for financial theft as well as for state-sponsored espionage or political manipulation. Legally speaking, the case highlights the drawbacks of just adhering to current data privacy regulations. Although SingHealth may have complied with the PDPA in theory, the hack demonstrated how inadequate the law is at requiring stronger security measures, especially for organizations that handle sensitive health data. Since then, the event has spurred conversations about bolstering cyber security procedures and data protection legislation for vital industries. The Singaporean government's prompt adoption and execution of these reforms demonstrated its dedication to enhancing cyber security, and the COI's recommendations were a positive step. These reforms must serve as the cornerstone of a strong, forward-thinking cybersecurity system rather than being purely reactive.

Conclusion

The incident of the SingHealth data breach indicates the insufficient existing cyber security practices in critical sectors and the serious nature of advanced and modern cyber threats in Singapore. This data breach incident was a crucial moment for Singapore. This breach raised an issue of institutional accountability, data protection, and legal compliance. This incident works as a reminder that cyber security is an evolving challenge and it requires attention and continuous innovation. As a result of this incident, COI’s judgment called for strengthening cyber security frameworks and increased attention. However, Singapore’s other critical sectors including the healthcare system need to be more aware to protect sensitive information and prevent future breaches on the same scale as well and they need to adopt more strict cyber security frameworks.

References

1. Committee of Inquiry, Report on the SingHealth Data Breach (2019) https://www.mci.gov.sg accessed 10 October 2024.

2. Cyber Security Agency of Singapore, SingHealth Cyber Attack Overview (2018) https://www.csa.gov.sg accessed 10 October 2024.

3. Personal Data Protection Act (PDPA), Overview of Data Protection Regulations in Singapore Personal Data Protection Commission https://www.pdpc.gov.sg accessed 11 October 2024.

4. Breach Highlights in Healthcare Cyber Security’, Cyber Security and Privacy Journal https://www.cybersecprivacyjournal.com accessed 11 October 2024.

5. Institute of Policy Studies (IPS), National University of Singapore, Singapore Government’s Response to Cyber Security: Policy Responses and Reforms Following the Breach https://www.ips.nus.edu.sg accessed 12 October 2024.