LAS C&C

Personal Data Breach Risk Assessment Under Thailand PDPA

Thundthornthep Yamoutai, Ph.D. | Legal Advance Solution Co., Ltd. | 17 April 2026 | ภาษาไทย (Thai Version)

LAS C&C — Contract & Control #11

Contents
  1. What Is a Personal Data Breach — Why Thai Businesses Must Care
  2. Three Types of Personal Data Breach
  3. Legal Framework: Section 37(4) and PDPC Guidelines
  4. Risk Assessment Matrix — Systematic Risk Evaluation
  5. The 72-Hour Notification Timeline
  6. 10 Real-World Scenarios — Classification and Response
  7. DPO Checklist — Breach Response Action Items
  8. Penalties and Legal Consequences
  9. LAS Risk Methodology Applied to Data Breach
  10. Frequently Asked Questions

What Is a Personal Data Breach — Why Thai Businesses Must Care

Consider this scenario: on a Monday morning, Company A's IT team discovers that a database containing over 50,000 customer records has been accessed by an unauthorized external party. Names, addresses, national ID numbers, and order histories have been downloaded. The clock starts ticking — the company has 72 hours to assess the risk and notify the Office of the Personal Data Protection Committee (PDPC). Every hour that passes without action represents an escalating legal exposure.

A personal data breach is no longer merely an IT problem. It is a legal and business issue that directors, executives, and DPOs must understand thoroughly. Since the Personal Data Protection Act B.E. 2562 (2019) (PDPA) came into full force, organizations without clear breach assessment and notification procedures have exposed themselves to attacks on two fronts: legal liability and reputational damage.

The PDPC's Guidelines on Personal Data Breach Risk Assessment and Notification, Version 1.0 (published 15 December 2022), establish a clear operational framework for what organizations must do when a breach occurs. This article summarizes all key points in a format that business lawyers and C-Suite executives can apply immediately.

"When data leaks — what matters most is not what leaked, but how fast and how correctly you respond."

Three Types of Personal Data Breach

Under the PDPC Guidelines and consistent with international standards, personal data breaches are divided into three principal categories, which may occur simultaneously within a single incident.

1. Confidentiality Breach — Unauthorized Access or Disclosure

A Confidentiality Breach occurs when personal data is accessed or disclosed by a person who lacks authorization, or for a purpose not permitted. This is the most common type and typically causes the most serious harm.

2. Integrity Breach — Unauthorized Modification

An Integrity Breach occurs when personal data is modified, altered, or destroyed without authorization. The data remains in place but its content has been changed, which may affect decisions based on that data.

3. Availability Breach — Loss or Inaccessibility of Data

An Availability Breach occurs when personal data is lost or becomes inaccessible, whether temporarily or permanently. Even if data is not disclosed externally, the organization's inability to access it still constitutes a breach.

Key Point: One Incident, Multiple Breach Types

In practice, a single event often falls into multiple categories simultaneously. A Ransomware Attack may constitute a Confidentiality Breach (if the attacker copies data before encrypting), an Integrity Breach (if some data is altered), and an Availability Breach (if the data is encrypted and inaccessible). Risk assessment must address all dimensions — not just the most obvious type.

Type Nature Common Examples Risk Level
Confidentiality Unauthorized access or disclosure Hacking, misdirected email, data sale Very High
Integrity Unauthorized modification or alteration Ransomware data alteration, bug overwrite High
Availability Loss or inaccessibility Failed HDD, fire, accidental deletion Medium–High

Legal Framework: Section 37(4) and PDPC Guidelines

The foundation of the data breach notification obligation is Section 37(4) of the Personal Data Protection Act B.E. 2562 (2019), which requires the Data Controller to notify the PDPC of a personal data breach without delay and within 72 hours of becoming aware, unless the breach is unlikely to result in any risk to the rights and freedoms of individuals.

Personal Data Protection Act B.E. 2562 (2019), Section 37(4):
"Notify the Office of the breach of personal data without delay and within seventy-two hours from the time of becoming aware thereof as far as is possible, except where such breach is unlikely to result in any risk to the rights and freedoms of the individual. In cases where the breach is likely to result in a high risk to the rights and freedoms of the individual, the personal data controller shall also notify the data subject of the breach together with the remedial measures without delay."

This provision contains three critical components that every Data Controller must understand:

  1. Duty to notify PDPC: A general duty to notify within 72 hours, subject to the exception of "no risk" — but the burden of proving "no risk" falls on the Data Controller.
  2. Duty to notify data subjects: An additional duty that arises when the breach carries a "high risk" to rights and freedoms — notification must include recommended remedial actions.
  3. Exception: Notification is not required only where it can be demonstrated that there is "no risk" — in practice, this is nearly impossible to establish for Confidentiality Breaches involving sensitive data.

PDPC Guidelines Version 1.0 (15 December 2022)

This document is the primary reference issued by the PDPC to assist Data Controllers in understanding and complying with Section 37(4). Its key content covers:

Critical Distinction: "Becoming Aware" vs "When the Breach Occurred"

The 72-hour window begins when the Data Controller "becomes aware" of the breach — not from when it actually occurred. However, ignorance is not a valid defense. Section 37(1) of the PDPA requires Data Controllers to implement appropriate security measures, including effective detection systems. If poor detection causes delayed discovery, the organization may also be found in breach of Section 37(1) on a separate basis.

Risk Assessment Matrix — Systematic Risk Evaluation

Risk assessment is the cornerstone of the breach response process. The outcome determines what actions the organization must take. Under the PDPC Guidelines, the assessment uses two primary dimensions: Severity and Likelihood.

Dimension 1: Severity

Severity is assessed based on the following factors:

Factor Low Severity (1) Medium Severity (2) High Severity (3)
Data Type Basic data (name, business email) Personal data (address, phone, date of birth) Sensitive data (health, financial, biometric, criminal history)
Number of Data Subjects Fewer than 100 100 – 10,000 More than 10,000
Potential Impact Minor inconvenience Financial or reputational harm Serious harm (fraud, discrimination, harassment)
Data Subject Group General adults capable of self-protection Employees or regular customers Children, patients, or other vulnerable persons

Dimension 2: Likelihood

Likelihood is assessed based on the following factors:

Factor Low (1) Medium (2) High (3)
Nature of the Breach Lost within a controlled area / accidental deletion Misdirected to a trusted recipient Hacked / stolen / publicly disclosed
Evidence of Actual Use No evidence of exploitation Possible exploitation but requires effort Evidence of exploitation / published on Dark Web
Protective Measures in Place Data is fully encrypted Partial encryption in place Data is plaintext — no encryption

Risk Score Calculation

Formula: Risk Score = Severity × Likelihood

Risk Score Level Required Action
1–2 Low Internal Record only — notify PDPC not required, but documentation supporting the decision is mandatory
3–4 Medium Notify PDPC within 72 hours — direct notification to data subjects generally not required (unless specific circumstances apply)
6–9 High Notify PDPC within 72 hours and notify affected data subjects without delay, with recommended remedial actions

Important Observation: The Decision "Not to Notify" Carries Greater Risk Than You Think

In practice, data privacy legal experts consistently advise "when in doubt, notify." Deciding not to notify and later discovering notification was required is far more damaging than notifying unnecessarily. The former risks administrative fines and compounded reputational harm; the latter merely creates additional paperwork.

The 72-Hour Notification Timeline

The 72-hour window under Section 37(4) of the Personal Data Protection Act B.E. 2562 (2019) is tight — identical to the EU's GDPR standard. The practical time available for substantive work is even shorter because multiple tasks must occur simultaneously.

Incident Response Timeline

Hour Action Required Responsible Party
0–4 Detection + Confirm breach (not false alarm) + Notify DPO + Management + Begin Containment IT Security + DPO
4–12 Initial investigation: identify scope, data types, number of data subjects affected, cause IT + Legal + DPO
12–24 Conduct Risk Assessment per Matrix + Decide whether PDPC notification is required + Begin drafting report DPO + Legal
24–48 Draft notification report + Verify accuracy + Obtain management approval DPO + Management
48–72 Submit notification to PDPC + Notify data subjects (if High Risk) + Begin Remediation DPO + Communications
After 72 Submit supplemental information (if initial report was incomplete) + Post-Incident Review + Update measures DPO + All Teams
Personal Data Protection Act B.E. 2562 (2019), Section 37(4), paragraph one — and PDPC Notification on Personal Data Breach Risk Assessment and Notification B.E. 2565 (2022):
Where notification cannot be made within the 72-hour deadline, the Data Controller must prepare a documented explanation of the reasons for the delay. While Section 37(4) paragraph one establishes the 72-hour duty and the general notification framework, the specific requirement to document delayed notifications (including the form and content of such explanation) is elaborated in the PDPC Notification B.E. 2565. A clear written justification is mandatory in all cases.

Required Content of the Breach Notification Report

Under PDPC Guidelines v1.0, a notification to the PDPC must contain at minimum the following elements:

  1. Nature of the incident: What happened, when, when it was discovered, type of breach
  2. Data affected: Types of data, number of records, number of data subjects impacted
  3. Likely consequences: Potential impact on the rights and freedoms of data subjects
  4. Measures taken: Containment actions, corrections, impact mitigation steps
  5. Planned measures: Remediation roadmap and steps to prevent recurrence
  6. DPO contact information: Name and contact details of the DPO or designated contact person

10 Real-World Scenarios — Classification and Response

The following scenarios are based on common real-world incident patterns and PDPC guidance, designed to help DPOs and legal teams quickly classify and respond to breaches. All organization names are fictional.

SCENARIO 1 — RISK: HIGH

Ransomware Attack — Hospital

Incident: Hospital A's electronic medical record system is hit by ransomware. Records of 30,000 patients become inaccessible, and the attacker claims to have exfiltrated a copy of the data.

Breach Type: Confidentiality Breach + Availability Breach

Risk Score: Severity 3 (health data + vulnerable group) × Likelihood 3 (evidence of exfiltration) = 9 — Very High

Required Action: Notify PDPC within 72 hours + Notify all affected data subjects + Recommend password changes + Advise monitoring of financial transactions

SCENARIO 2 — RISK: MEDIUM

Misdirected Email — Consulting Firm

Incident: An employee of Company B accidentally sends a spreadsheet containing the salary data of 200 employees to an external recipient. The recipient confirms deletion but this cannot be independently verified.

Breach Type: Confidentiality Breach

Risk Score: Severity 2 (financial/salary data) × Likelihood 2 (recipient claims deletion but unverifiable) = 4 — Medium

Required Action: Notify PDPC within 72 hours + Consider notifying affected employees + Review email misdirection prevention controls

SCENARIO 3 — RISK: LOW

Lost Laptop — Sales Employee

Incident: A sales employee of Company C loses a laptop while travelling. It contains a database of 500 customers. However, the hard drive is protected by Full Disk Encryption (BitLocker) with a strong password.

Breach Type: Confidentiality Breach + Availability Breach (even with cloud backup)

Risk Score: Severity 2 (500 customer records) × Likelihood 1 (data encrypted — effectively inaccessible) = 2 — Low

Required Action: Internal record + Remote Wipe + Notification to PDPC not required (encryption makes risk negligible) — but written justification of the decision is mandatory

SCENARIO 4 — RISK: HIGH

Database Misconfiguration — E-Commerce

Incident: Company D's e-commerce website inadvertently exposes a database of 100,000 customers without authentication for over two weeks before discovery. The database contains names, emails, phone numbers, shipping addresses, and purchase history.

Breach Type: Confidentiality Breach

Risk Score: Severity 3 (personal data + over 10,000 subjects) × Likelihood 3 (exposed for 2 weeks — unknown who accessed) = 9 — High

Required Action: Notify PDPC + Notify all affected data subjects + Engage Forensic Audit + Close vulnerability immediately

SCENARIO 5 — RISK: HIGH

Departing Employee Data Theft — Real Estate Company

Incident: A sales employee of Company E resigns and copies a database of 3,000 customers to use at a competing firm. The breach is detected through USB access logs.

Breach Type: Confidentiality Breach

Risk Score: Severity 2 × Likelihood 3 (evidence that data is actively being used) = 6 — High

Required Action: Notify PDPC + Consider notifying affected data subjects + Initiate legal proceedings against the employee (civil and criminal)

SCENARIO 6 — RISK: LOW

Cloud Backup System Outage — Availability Breach

Incident: Company F's cloud provider suffers an outage for 48 hours, making data of 5,000 customers temporarily inaccessible. No external access to the data occurred.

Risk Score: Severity 1 × Likelihood 1 = 1 — Low (unless data is health data urgently needed for treatment)

Required Action: Internal record + Review SLA with cloud provider + Consider Multi-Cloud Strategy

SCENARIO 7 — RISK: HIGH

Successful Phishing Attack — Bank

Incident: A staff member of Bank G is phished, resulting in stolen credentials. The attacker gains access to account information of 800 customers, including account numbers and balances.

Risk Score: Severity 3 (financial data) × Likelihood 3 = 9 — Very High

Required Action: Notify PDPC + Notify Bank of Thailand (additional sector regulator) + Notify all affected customers + Reset credentials + Review historical transactions

SCENARIO 8 — RISK: HIGH

Lost Paper Records — Medical Clinic

Incident: Clinic H loses 50 patient record files during an office relocation.

Risk Score: Severity 3 (health data) × Likelihood 2 (lost — unknown if discovered by others) = 6 — High

Required Action: Notify PDPC + Notify affected patients + Search for documents + Review document retention procedures

SCENARIO 9 — RISK: HIGH

Data Processor Violating DPA — Outsourcing Company

Incident: An outsourcing company (Processor) engaged by Company I is found to have used customer data for purposes not agreed in the Data Processing Agreement (DPA).

Risk Score: Severity 2 × Likelihood 3 = 6 — High

Required Action: The Data Controller (Company I) must notify PDPC + Notify affected data subjects + Terminate the DPA + Pursue damages against the Processor + Review all Processor oversight arrangements

SCENARIO 10 — RISK: HIGH

Website Defacement + Data Scraping — University

Incident: University J's website is hacked, and data of 20,000 students (names, student IDs, grades) is published on the Dark Web.

Risk Score: Severity 2 (education data + over 10,000 subjects) × Likelihood 3 (already published on Dark Web) = 6 — High

Required Action: Notify PDPC + Notify all affected students + Coordinate with cyber police + Conduct Forensic investigation + Close vulnerability

DPO Checklist — Breach Response Action Items

When a personal data breach occurs, the Data Protection Officer (DPO) must act on the following items urgently.

Phase 1: Within the First 4 Hours (Detection & Containment)

Phase 2: Hours 4–24 (Investigation & Assessment)

Phase 3: Hours 24–72 (Notification & Remediation)

Phase 4: After 72 Hours (Post-Incident)

Important: ROPA and the Breach Register Are Separate Obligations

Section 39 of the Personal Data Protection Act B.E. 2562 (2019) requires Data Controllers to maintain Records of Processing Activities (ROPA) — a comprehensive register of all data processing operations. This is a distinct obligation from the Breach Register.

The requirement to maintain a Breach Register (recording every data breach event, including "Low Risk" incidents not requiring PDPC notification) derives from the PDPC Notification on Personal Data Breach Risk Assessment and Notification B.E. 2565 (2022), not directly from Section 39 of the Act. Even where PDPC notification is not required, all incidents must be recorded in the Breach Register, because the PDPC may request inspection at any time.

Penalties and Legal Consequences

Failure to comply with breach notification obligations carries legal consequences across three concurrent dimensions: administrative, civil, and criminal.

Administrative Penalties

Offense Provision Maximum Penalty
Failure to notify breach per Section 37(4) Personal Data Protection Act B.E. 2562 (2019), Section 83 Administrative fine not exceeding THB 3,000,000
Failure to implement appropriate security measures (Section 37(1)) Personal Data Protection Act B.E. 2562 (2019), Section 83 Administrative fine not exceeding THB 3,000,000
Failure to maintain records of processing activities — ROPA (Section 39) Personal Data Protection Act B.E. 2562 (2019), Section 82 Administrative fine not exceeding THB 1,000,000

Civil Liability

Under Section 77 of the Personal Data Protection Act B.E. 2562 (2019), a Data Controller or Data Processor that violates or fails to comply with the Act is liable to compensate for resulting damages, whether actual loss or reputational harm. Under Section 78, courts have the authority to order additional punitive damages of up to twice the actual loss (Punitive Damages).

Criminal Liability

Where the breach constitutes unlawful disclosure of personal data without consent, criminal penalties may apply: imprisonment not exceeding 6 months and/or a fine not exceeding THB 500,000 under Section 79 of the Personal Data Protection Act B.E. 2562 (2019). For disclosure of sensitive personal data, the penalty increases to imprisonment not exceeding 1 year and/or a fine not exceeding THB 1,000,000.

The Impact Money Cannot Repair: Reputational Damage

Beyond legal penalties, reputational damage often inflicts greater harm than any fine. Media coverage of a data breach, loss of customer trust, and impact on share price (for listed companies) represent costs that cannot be easily quantified. A rapid, transparent, and professional response is the only way to preserve confidence.

LAS Risk Methodology Applied to Data Breach

The LAS Risk Methodology applies the principle of Eliminate → Reduce → Distribute to risk management, and translates directly to data breach prevention and response.

LAS Risk Shield: 3 Levels for Data Breach

Level Principle Application to Data Breach
Eliminate Remove the risk Data Minimization — collect only what is necessary / delete data no longer needed / Pseudonymize sensitive data
Reduce Reduce the risk Encryption at every layer / Access Control / MFA / Network Segmentation / Incident Response Plan
Distribute Spread the risk Cyber Insurance / DPA with Processor (including Indemnity + Liability clauses) / Multi-location Backup

Key Contractual Provisions for a Data Processing Agreement (DPA)

From a LAS C&C Series perspective, a well-drafted DPA must include provisions that protect the organization in the event of a breach — at minimum:

Lesson for Business Lawyers:
A good DPA is not simply a copied template. It must "think ahead" — if a breach actually occurs, will each clause work as intended? Is the Processor's Notification Timeline short enough for the Controller to notify the PDPC in time? Does the Indemnity cover the 2x Punitive Damages exposure under Section 78? This is "C&C Thinking" that must be built into every DPA.

Frequently Asked Questions

Q1: What is the difference between a personal data breach under PDPA and a general cybersecurity incident?
A personal data breach under the Personal Data Protection Act B.E. 2562 (2019) specifically involves a breach of security measures that results in the loss, unauthorized access, use, modification, or disclosure of personal data. It is classified into three types: Confidentiality, Integrity, and Availability Breach. A cybersecurity incident may have nothing to do with personal data (e.g., a DDoS attack that does not involve any data leak). The determining question is: "Were personal data affected?" If yes, Section 37(4) obligations apply.
Q2: How must a data breach be reported to the PDPC, and within what timeframe?
Notification must be submitted to the Office of the Personal Data Protection Committee (PDPC) within 72 hours of becoming aware of the breach, under Section 37(4) of the Personal Data Protection Act B.E. 2562 (2019). The report must describe the nature of the incident, data affected, likely consequences, measures taken, and DPO contact details. If notification cannot be made within 72 hours, a written explanation of the delay must be prepared. Where the breach poses high risk, data subjects must also be directly notified with recommended remedial actions.
Q3: In what circumstances is PDPC notification not required?
Notification to the PDPC is not required only where it can be demonstrated that the breach is "unlikely to result in any risk to the rights and freedoms of individuals" — for example, where the lost data was strongly encrypted and practically inaccessible, or where the data disclosed was already public information. However, the burden of proof falls on the Data Controller, and written documentation supporting that decision must always be maintained. Even where notification is not required, the incident must be recorded in the Breach Register.
Q4: How is the Risk Assessment for a data breach conducted?
Under PDPC Guidelines v1.0, two dimensions are assessed: Severity (based on data type, number of data subjects, potential consequences, and vulnerability of the affected group) and Likelihood (based on the nature of the breach, evidence of actual exploitation, and encryption in place). These are multiplied to generate a Risk Score across three levels: Low (1–2: internal record only), Medium (3–4: notify PDPC), and High (6–9: notify both PDPC and data subjects).
Q5: What are the DPO's key duties when a data breach occurs?
The DPO has five primary duties: (1) coordinate with the Incident Response team immediately upon becoming aware; (2) conduct Risk Assessment according to the Risk Assessment Matrix; (3) prepare and submit the breach notification report to the PDPC within 72 hours; (4) determine and action notification to data subjects if the breach is High Risk; and (5) document the incident, remediation measures, and lessons learned in the Breach Register, including conducting a Post-Incident Review to prevent recurrence.
Q6: What are the penalties for failing to report a personal data breach?
Penalties operate across three concurrent dimensions: (1) Administrative fine of up to THB 3,000,000 under Section 83 of the Personal Data Protection Act B.E. 2562 (2019) for violation of the breach notification duty under Section 37(4); failure to maintain ROPA under Section 39 carries a separate fine of up to THB 1,000,000 under Section 82; (2) Civil liability — courts may order compensation plus punitive damages of up to twice the actual loss under Section 78; and (3) Where unlawful disclosure is involved, criminal penalties of imprisonment up to 1 year and/or a fine up to THB 1,000,000 under Section 79. Note: Section 90 grants the Expert Committee power to issue orders — it is not a penalty provision. Reputational damage is an additional consequence that cannot be quantified.

Legal References

Laws and References Cited in This Article
← LAS C&C Series LAS C&C #11 LAS English Hub →
Disclaimer:
This article is published for educational purposes only and does not constitute legal advice or a specific legal opinion. Readers should consult a qualified lawyer before taking any legal action. The author and Legal Advance Solution Co., Ltd. accept no liability for any loss or damage arising from reliance on this content.

ข้อสงวนสิทธิ์:
บทความนี้จัดทำขึ้นเพื่อเผยแพร่ความรู้ทางกฎหมายเท่านั้น ไม่ถือเป็นความเห็นทางกฎหมายหรือคำแนะนำเฉพาะเจาะจง ผู้อ่านควรปรึกษาทนายความก่อนดำเนินการใดๆ ผู้เขียนและ Legal Advance Solution Co., Ltd. ไม่รับผิดชอบต่อความเสียหายใดๆ ที่อาจเกิดจากการนำข้อมูลไปใช้