Data Protection & PDPA Compliance

PDPA Compliance Guide for Business in Thailand:
The C-Suite Legal Guide

In-depth analysis of the Personal Data Protection Act B.E. 2562 (2019) for B2B businesses in Thailand — Data Controller, DPA, Cross-Border Transfer, penalties, and a 30-item compliance checklist.

Thundthornthep Yamoutai, Ph.D. | April 4, 2026 | Legal Compliance Guide

Table of Contents

  1. Introduction — Why B2B Businesses Must Prioritize Thailand's PDPA
  2. Legal Framework — Personal Data Protection Act B.E. 2562 (2019)
  3. PDPA for B2B Businesses — Key Differences from B2C Compliance
  4. The 6-Step PDPA Compliance Roadmap
  5. Penalties — Administrative, Civil, and Criminal
  6. Case Studies — PDPA Enforcement Scenarios in Thailand
  7. B2B PDPA Compliance Checklist — 30 Action Items
  8. Conclusion
  9. References

1. Introduction — Why B2B Businesses Must Prioritize Thailand's PDPA The PDPA and its Implications for B2B Operations

When the Personal Data Protection Act B.E. 2562 (2019) (PDPA) came into full effect on 1 June 2022, most Thai businesses directed their compliance attention toward consumer-facing data practices — cookie banners on websites, marketing consent forms, and customer data registers. Business-to-Business (B2B) companies frequently underestimated their PDPA exposure, operating under the misconception that the law primarily governed retail and e-commerce contexts.

In reality, B2B companies process personal data at virtually every stage of their commercial operations. The names, email addresses, and identification details of client employees who are contact persons, the authorized signatories of counterparty companies, HR data obtained in outsourcing engagements, and user account data in Software-as-a-Service (SaaS) and Cloud Computing platforms — all of these fall squarely within the scope of the Personal Data Protection Act B.E. 2562 (2019).

Moreover, B2B businesses typically operate in more complex roles within the PDPA ecosystem than their B2C counterparts. A single company may simultaneously act as a Data Controller with respect to its own employees' data, while functioning as a Data Processor on behalf of its corporate clients who are Data Controllers. This dual-role complexity makes PDPA compliance for B2B significantly more technically demanding than for B2C and requires a higher degree of legal expertise to implement correctly.

C-Suite Insight

Since enforcement commenced in 2022, the Office of the Personal Data Protection Committee (PDPC) has seen a sustained increase in complaints filed and has begun issuing administrative orders in multiple cases. B2B companies that lack a clearly documented PDPA compliance framework are carrying unnecessary and quantifiable legal risk.

This guide is prepared for C-Suite executives and in-house legal teams who require a comprehensive understanding of the PDPA in the B2B business context. It covers key definitions, the seven lawful processing bases, the role of the Data Processing Agreement (DPA) in the supply chain, cross-border data transfer requirements, penalties, case studies, and a 30-item compliance checklist for immediate implementation.

2. Legal Framework — Personal Data Protection Act B.E. 2562 (2019) Scope, Key Definitions, Lawful Bases, and Data Subject Rights

The Personal Data Protection Act B.E. 2562 (2019) was published in the Royal Gazette on 27 May 2019 and entered into full force on 1 June 2022. The Act's purpose is to protect the rights of natural persons (data subjects) and to impose obligations on Data Controllers and Data Processors regarding the collection, use, and disclosure of personal data. The Act draws heavily on the structural framework of the European Union's General Data Protection Regulation (GDPR) while adapting it to the Thai legal context.

2.1 Key Definitions: Data Controller vs Data Processor

Understanding the distinction between Data Controller and Data Processor is the most fundamental prerequisite for PDPA compliance in the B2B context. The legal duties and liability exposure of the two roles differ substantially under the Act.

Data Controller

ผู้ควบคุมข้อมูลส่วนบุคคล

A person or juristic person with the authority to make decisions regarding the collection, use, or disclosure of personal data (Personal Data Protection Act B.E. 2562 (2019), Section 6). The Data Controller determines the purposes and means of processing and bears primary legal accountability toward data subjects.

Data Processor

ผู้ประมวลผลข้อมูลส่วนบุคคล

A person or juristic person that collects, uses, or discloses personal data pursuant to the instructions of, or on behalf of, a Data Controller (Personal Data Protection Act B.E. 2562 (2019), Section 6). The Data Processor does not independently determine the purposes of processing.

⚠ Critical Warning for B2B

Many B2B service providers — such as payroll services, HR software platforms, cloud infrastructure providers, and outsourced accounting firms — act as Data Processors for their clients while simultaneously acting as Data Controllers for their own employees' data. Conflating these two roles without a clear Data Processing Agreement (DPA) in place constitutes a legal risk rated 🔴 High.

2.2 Seven Lawful Bases for Processing Personal Data

The Personal Data Protection Act B.E. 2562 (2019), Section 24 provides six lawful bases on which a Data Controller may process personal data without requiring the data subject's consent, in addition to the consent basis under Section 19, bringing the total to seven lawful processing bases:

Consent
ความยินยอม
The data subject has given explicit, informed, and freely given consent to the processing (Section 19).
Contract Performance
การปฏิบัติตามสัญญา
Necessary for the performance of a contract to which the data subject is a party (Section 24(1)).
Legal Obligation
หน้าที่ตามกฎหมาย
Necessary to comply with a legal obligation — e.g., tax reporting, labor law requirements (Section 24(2)).
Vital Interests
ประโยชน์สำคัญ
Necessary to prevent or suppress a danger to the life, body, or health of a person (Section 24(3)).
Public Task
ภารกิจสาธารณะ
Necessary for the performance of a task carried out in the public interest (Section 24(4)).
Legitimate Interests
ประโยชน์อันชอบธรรม
Necessary for legitimate interests pursued by the controller or a third party, not overriding the data subject's rights (Section 24(5)) — commonly relied on in B2B contexts.
Research & Statistics
การวิจัยและสถิติ
For academic research, statistical compilation, or public benefit purposes with appropriate safeguards (Section 24(6)).
B2B Practice Note

In the B2B context, Legitimate Interests and Contract Performance are the most frequently relied-upon lawful bases. Examples include storing contact person details of business partners for commercial communication, or processing employee data of client companies in HR outsourcing engagements. However, reliance on Legitimate Interests requires completion of a Legitimate Interests Assessment (LIA) to confirm that the processing is proportionate and does not unduly override the data subject's rights and freedoms.

2.3 Eight Data Subject Rights

Chapter 3 of the Personal Data Protection Act B.E. 2562 (2019) (Sections 30–43) establishes eight rights of data subjects that Data Controllers must have mechanisms in place to accommodate:

Right to be Informed
สิทธิรับทราบ
Right of Access
สิทธิเข้าถึง
Right to Rectification
สิทธิแก้ไข
Right to Erasure
สิทธิลบข้อมูล
Right to Restrict
สิทธิระงับ
Right to Portability
สิทธิพกพา
Right to Object
สิทธิคัดค้าน
Right to Withdraw Consent
สิทธิถอนความยินยอม
Key Sections: Right to Erasure — Personal Data Protection Act B.E. 2562 (2019), Section 33 | Right to Data Portability — Section 35 | Right to Object — Section 36 | Data Controllers must respond to data subject requests within 30 days of receipt — Section 41.

3. PDPA for B2B Businesses — Key Differences from B2C Compliance Structural Complexity, Cross-Border Transfer, and DPA Requirements

PDPA compliance for B2B businesses presents distinct challenges and unique legal issues that differ substantially from B2C compliance. The following analysis identifies the areas of greatest practical significance for B2B operators.

3.1 Client Employee Data vs Consumer Data

In the B2B environment, companies routinely collect and process personal data of individuals who are employees of other juristic persons — managing directors, departmental managers, procurement officers, and IT contacts of client companies. Each of these individuals is a "data subject" with full rights under the PDPA, regardless of the fact that the data was collected in a business-to-business commercial context rather than a consumer transaction.

Unlike B2C scenarios where the data subject is typically the end consumer and is aware of providing their data, in B2B supply chains the data subject — often a client's employee — may have no awareness that their personal data has been shared further down the service chain. A single dataset may pass from a parent company to an IT service provider, to an overseas data center, without the individual employee ever being informed. This creates significant Transparency and Notice compliance risk.

B2B-Specific Risk — Common Scenarios

Examples frequently encountered in B2B practice:

  1. A SaaS company storing user account data of a client's employees on its platform.
  2. A payroll outsourcing provider holding salary details, dates of birth, national ID numbers, and bank account data of a client company's workforce.
  3. A logistics company processing delivery records that include the names and addresses of the client's contact persons.
  4. A management consulting firm accessing HR data and employee performance assessments of a client organization.

3.2 Cross-Border Data Transfers

The Personal Data Protection Act B.E. 2562 (2019), Section 28 restricts the transfer or sending of personal data to foreign countries or international organizations. The destination country or organization must provide an adequate standard of personal data protection — a requirement of particular significance for B2B companies that rely on foreign-hosted Cloud or SaaS systems.

The Office of the Personal Data Protection Committee (PDPC) has issued notifications governing cross-border data transfers, establishing the following lawful transfer mechanisms:

  1. Adequacy Decision: The destination country has been formally recognized as providing an adequate level of data protection by the PDPC (the list of adequate countries is still being developed as of the date of this article).
  2. Standard Contractual Clauses (SCC): A data transfer agreement using standard clauses prescribed or recognized by the PDPC, ensuring a level of protection equivalent to Thai law.
  3. Binding Corporate Rules (BCR): For intra-group transfers within a corporate group, internal rules approved by the PDPC may substitute for bilateral SCC arrangements between each pair of group entities.
  4. Explicit Consent: In certain limited circumstances, the data subject's explicit consent may be relied upon, provided the data subject is informed in advance that the destination country may not provide an adequate standard of protection.
⚠ High Risk for B2B Operators

B2B companies that use AWS, Google Cloud, Microsoft Azure, Salesforce, Workday, SAP, or similar platforms with servers located outside Thailand may be transferring personal data of their clients' employees across borders without a lawful transfer mechanism in place. This constitutes a potential violation of the Personal Data Protection Act B.E. 2562 (2019), Section 28, rated 🔴 High Risk with administrative penalties up to THB 5,000,000.

3.3 Data Processing Agreement (DPA) Between Business Partners

A Data Processing Agreement (DPA) is a written contract that defines the duties, responsibilities, and security measures governing the relationship between a Data Controller (the client) and a Data Processor (the B2B service provider). The Personal Data Protection Act B.E. 2562 (2019), Section 40 requires Data Controllers to use Data Processors that provide sufficient data protection measures and mandates that the processing relationship be governed by a written contract.

A comprehensive DPA in the Thai B2B context should include the following essential provisions:

  1. Scope and Purpose of Processing: Precisely defines what personal data the Processor is authorized to process, for which purposes, with an express prohibition on processing for any other purpose.
  2. Categories of Personal Data and Data Subjects: Specifies the types of data (e.g., name, email, national ID) and the categories of data subjects (e.g., employees, customers).
  3. Technical and Organizational Security Measures: Establishes minimum security requirements including encryption, access controls, backup and recovery procedures, and incident logging.
  4. Sub-Processor Authorization: Defines the conditions and restrictions governing the Processor's engagement of sub-processors, typically requiring prior written consent from the Controller.
  5. Breach Notification: Sets out the timeframe and procedure for notifying the Controller of any personal data breach discovered by the Processor.
  6. Audit Rights: Grants the Data Controller the right to audit the Processor's compliance with the DPA and the PDPA.
  7. Data Return or Deletion: Requires the Processor to return or securely delete all personal data upon termination of the service agreement.
Strategic Recommendation

In the current B2B landscape, the DPA is rapidly becoming a standard exhibit in Master Service Agreements (MSAs) and service contracts. Large corporate clients — particularly those with GDPR exposure — routinely require execution of a DPA before commencing service relationships. B2B companies that do not have a ready-to-use DPA template face real competitive disadvantage and potential deal blockage.

4. The 6-Step PDPA Compliance Roadmap Building a Robust PDPA Framework for B2B Operations

Establishing a PDPA compliance framework for a B2B business should follow a structured six-step process. Each step has a clearly defined deliverable that allows progress to be measured and reported to senior management.

1

Data Mapping / Data Inventory

Record of Processing Activities (RoPA)

Survey and document all personal data processing activities in a Record of Processing Activities (RoPA) as required by the Personal Data Protection Act B.E. 2562 (2019), Section 39. Map data sources, categories, purposes, lawful bases, retention periods, and recipients.

2

Privacy Policy & Notice

Privacy Notice Design

Draft a Privacy Policy and Privacy Notices that satisfy the disclosure requirements under Section 23 of the Act. Prepare separate notices for employees, customers, and business partners, as each category involves different processing activities and lawful bases.

3

Consent Management

Lawful Basis Documentation

Identify the appropriate lawful basis for each processing activity and implement a consent management system for activities relying on the consent basis under Section 19. Document all lawful basis determinations in the RoPA.

4

DPIA Assessment

Data Protection Impact Assessment

Conduct a Data Protection Impact Assessment (DPIA) under Section 37 of the Act for high-risk processing activities — in particular, large-scale processing of sensitive personal data, automated profiling, or large-scale cross-border transfers.

5

Incident Response Plan

Data Breach Response SOP

Develop a Data Breach Incident Response Plan establishing procedures to detect, assess, and where required, notify the PDPC within 72 hours of a high-risk breach and notify affected data subjects without undue delay, under Section 37(4) of the Act.

6

DPO Appointment

Data Protection Officer

Assess whether appointment of a Data Protection Officer (DPO) is mandatory under Sections 41–43, and in all cases consider appointing a Privacy Officer to manage the ongoing compliance program. External DPO arrangements are expressly permitted under Section 41, paragraph 2.

4.1 Data Mapping — The Essential Starting Point

Data Mapping — the process of identifying and documenting all personal data flows within and out of the organization — is the indispensable first step of any PDPA compliance program. For B2B companies, data mapping should be organized into the following categories to reflect the multiple roles in which personal data arises:

  1. Employee Data: Name, address, national ID number, banking details, health information (where applicable) — the latter constituting sensitive personal data under Section 26, requiring an elevated standard of care.
  2. B2B Contact Data: Names, job titles, email addresses, and phone numbers of contact persons at client and partner companies — personal data of natural persons even when collected in a commercial context (Section 6).
  3. Data Processed as Processor: All personal data received from clients in the capacity as Data Processor, subject to the terms of the applicable DPA.
  4. Digital Systems Data: Log files, IP addresses, cookies, and user behavior data generated through the organization's digital infrastructure.

4.2 When Is a DPIA Required?

A Data Protection Impact Assessment (DPIA) is mandatory for processing activities that are likely to result in a high risk to the rights and freedoms of natural persons. In the B2B context, this includes:

  1. Large-scale processing of sensitive personal data under Section 26 — including health data, biometric data, and religious affiliation data.
  2. Automated processing (including profiling) that produces legal or similarly significant effects on individuals.
  3. Processing of personal data of vulnerable groups, including minors and elderly persons.
  4. Combining datasets from new sources in ways that may enable re-identification of data subjects.
  5. Large-scale cross-border transfers of personal data.

4.3 DPO — Role, Qualifications, and When Required

The Data Protection Officer (DPO) under the Personal Data Protection Act B.E. 2562 (2019), Section 41 has four core functions: advising the organization on PDPA compliance, monitoring compliance with the Act, coordinating with the PDPC, and serving as a point of contact for data subjects exercising their rights under the Act.

A DPO is not required to be an internal employee — an external DPO arrangement is expressly authorized under Section 41, paragraph 2, making it a cost-effective option for mid-sized B2B companies that do not have the resources for a dedicated full-time compliance role. The DPO must have sufficient knowledge of applicable data protection law to fulfil the functions of the role effectively.

5. Penalties — Administrative, Civil, and Criminal Cumulative Penalty Exposure Under Thailand's PDPA

The Personal Data Protection Act B.E. 2562 (2019) establishes penalties across three distinct legal tracks — administrative, civil, and criminal — which may all apply concurrently to the same violation. The potential cumulative financial exposure is therefore substantially greater than any single penalty category suggests.

Penalty Type Offense Maximum Penalty Section
🔴 Criminal Collecting sensitive personal data without lawful basis or misusing it for personal gain Imprisonment up to 1 year and/or fine up to THB 1,000,000 Section 90
🔴 Criminal Intentional violation of data subject rights, disclosure of data known to be confidential Imprisonment up to 6 months and/or fine up to THB 500,000 Section 89
🟡 Civil Unlawful processing of personal data causing damage to a data subject Actual compensatory damages + punitive damages up to 2x actual loss Section 86
🟡 Administrative Failure to implement appropriate security measures to protect personal data Fine up to THB 1,000,000 Section 83
🟡 Administrative Failure to maintain a RoPA or to appoint a DPO where mandatory Fine up to THB 1,000,000 Section 82
🔴 Administrative Collecting, using, or disclosing sensitive personal data without a lawful basis Fine up to THB 5,000,000 Section 84
🔴 Administrative Unlawful cross-border transfer of personal data Fine up to THB 5,000,000 Section 85
⚠ Cumulative Risk Warning

A single incident may trigger all three penalty tracks simultaneously. For example, a B2B SaaS company that suffers a data breach due to inadequate security measures could face: administrative fines up to THB 1,000,000 for inadequate security (Section 83) + civil compensatory and punitive damages up to 3x actual loss (Section 86) + potential criminal liability if intent is established (Sections 89–90). Total financial exposure in a serious breach scenario can reach several tens of millions of Baht.

5.1 Personal Liability of Directors and Executives

The Personal Data Protection Act B.E. 2562 (2019), Section 91 provides that where a juristic person commits an offense under the Act and the cause is attributable to the direction, act, or omission of a director, manager, or person responsible for the management of the juristic person, that individual shall be subject to the same penalty as the juristic person.

This means that a CEO, CFO, or CTO of a B2B company may face personal criminal liability if a PDPA violation can be attributed to their direction or supervisory failure. This is the most compelling reason for C-Suite executives to take PDPA compliance seriously at the organizational governance level.

6. Case Studies — PDPA Enforcement Scenarios in Thailand Anonymized Composite Cases for Illustrative Purposes

In accordance with LAS client confidentiality standards, the following case studies are anonymized composite illustrations (companies designated A, B, C, D) and are presented for educational purposes only. They are not descriptions of any specific adjudicated case.

Case Study 1 — B2B SaaS Provider

Company A (SaaS HR Platform) Processing Client Employee Data Without a DPA

Facts: Company A provides an online HR management platform to corporate clients. Company B, a client, uses the platform to manage its workforce data. No Data Processing Agreement was executed between Company A and Company B. A data breach subsequently occurred, resulting in unauthorized access to personal data of over 3,000 of Company B's employees.

Legal Issues: Company A (as Data Processor) lacked adequate security measures and had no written DPA as required by the Personal Data Protection Act B.E. 2562 (2019), Section 40. Company B (as Data Controller) also faces regulatory and civil exposure to complaints from its own employees whose data was compromised.

Outcome: Administrative risk up to THB 1,000,000 + civil liability exposure
Lesson: Every B2B SaaS provider must maintain a DPA template and execute it with each client before service commencement, without exception.
Case Study 2 — Cross-Border Data Transfer

Company C (Importer/Exporter) Sending Procurement Contact Data to Foreign Servers Without SCC

Facts: Company C uses a foreign ERP system with servers hosted in the United States. Purchase order data and personal data of procurement contact persons at Thai business partners are stored and processed on those servers. No Standard Contractual Clauses (SCC) or other lawful cross-border transfer mechanism was put in place.

Legal Issues: Transfer of personal data to a country that may not meet the adequate protection standard, without any lawful transfer mechanism, potentially violates the Personal Data Protection Act B.E. 2562 (2019), Section 28.

Outcome: Administrative risk up to THB 5,000,000 under Section 85
Lesson: Before selecting any foreign Cloud or ERP vendor, verify that the vendor provides a DPA and a lawful cross-border transfer mechanism compatible with Thailand's PDPA requirements.
Case Study 3 — B2B Direct Marketing

Company D (B2B Marketing Agency) Sending Email Marketing Without a Lawful Basis

Facts: Company D compiled a contact list of Marketing Managers and Procurement Managers from various companies by searching corporate websites and LinkedIn profiles, and sent commercial marketing emails to promote its B2B services. No consent was obtained and no Legitimate Interests Assessment was conducted.

Legal Issues: Even in a B2B commercial context, the individual recipients remain data subjects with full PDPA rights. Collection and use of personal data for direct marketing requires either a Legitimate Interests basis with a properly conducted LIA and opt-out mechanism, or explicit consent. Neither was present.

Outcome: Administrative risk and potential complaint to the PDPC
Lesson: B2B email marketing requires a documented Legitimate Interests Assessment plus a clear and functional opt-out mechanism in every communication.

7. B2B PDPA Compliance Checklist — 30 Action Items Structured Across 5 Compliance Categories

The following 30-item checklist covers the essential actions B2B businesses should implement to build a robust PDPA compliance framework. Items are organized across five categories for ease of implementation planning.

Category A — Data Governance Foundation

Category B — Vendor & Partner Management

Category C — Technical Security Measures

Category D — People & Process

Category E — Monitoring & Governance

Compliance Level Self-Assessment

Use this scoring framework to benchmark your organization's PDPA compliance maturity:

  1. 🟢 Level 3 (Good): 25–30 items completed — PDPA compliant and audit-ready.
  2. 🟡 Level 2 (Developing): 15–24 items completed — priority remediation required, especially Categories B and C.
  3. 🔴 Level 1 (High Risk): Fewer than 15 items completed — material legal risk; engage a qualified PDPA consultant immediately.

8. Conclusion PDPA Compliance as a Competitive Advantage for B2B Businesses

The Personal Data Protection Act B.E. 2562 (2019) is not merely a legal compliance burden for B2B businesses — it is an opportunity to build demonstrable trust with clients and business partners. Companies with a mature, well-documented PDPA framework gain a tangible competitive advantage, particularly as corporate clients increasingly impose data governance requirements as a condition of contracting with service providers.

There are five core takeaways for B2B executives: (1) Understand your role — whether you are acting as Data Controller, Data Processor, or both — and structure your compliance program accordingly. (2) Execute DPAs with all vendors and clients before processing commences, without exception. (3) Address cross-border data transfer compliance before selecting any foreign-hosted platform or cloud service. (4) Maintain a documented and tested Data Breach Incident Response Plan. (5) Review and update your compliance program on a regular cadence, not just at implementation.

For B2B businesses at the early stages of PDPA compliance, the recommended starting point is Data Mapping and DPA template development. These two activities form the foundation upon which every other compliance measure is built. Investing in PDPA compliance today is an investment in long-term business sustainability and organizational reputation protection.

LAS B2B PDPA Services

Legal Advance Solution Co., Ltd. (LAS) provides end-to-end PDPA compliance advisory services for B2B businesses, including PDPA Gap Analysis, Data Mapping Workshops, DPA Templates (Thai and English), Privacy Policy Drafting, DPO-as-a-Service, and Annual PDPA Audits. Contact us at laslegal.co.th

Frequently Asked Questions

Q1: Do B2B companies that do not collect consumer data directly need to comply with Thailand's PDPA?

Yes. B2B companies still process personal data of employees, directors, and contact persons of business partners, all of which constitute personal data under the Personal Data Protection Act B.E. 2562 (2019), Section 6. Many B2B companies also act as Data Processors for clients who are Data Controllers, which creates an additional layer of compliance obligations including the mandatory execution of a Data Processing Agreement under Section 40.

Q2: What is a Data Processing Agreement (DPA) and when is it required in Thailand?

A DPA is a written contract defining the obligations and responsibilities between a Data Controller and a Data Processor. It is required every time a B2B company is engaged to process personal data on behalf of a client — for example, SaaS providers, cloud services, payroll processing, and HR outsourcing. The requirement is set out in the Personal Data Protection Act B.E. 2562 (2019), Section 40.

Q3: What are the maximum penalties for PDPA violations in Thailand?

The PDPA imposes three concurrent penalty tracks: (1) Administrative: up to THB 5,000,000 per offense for unlawful processing of sensitive data (Section 84) or unlawful cross-border transfer (Section 85); (2) Civil: actual compensatory damages plus punitive damages up to 2x actual loss (Section 86); (3) Criminal: imprisonment up to 1 year and/or fine up to THB 1,000,000 for intentional misuse of personal data (Section 90). All three may apply to the same incident.

Q4: What must a B2B company do before transferring client employee data to servers abroad?

The company must comply with the Personal Data Protection Act B.E. 2562 (2019), Section 28 by verifying that the destination country provides an adequate standard of data protection. Where adequacy has not been established, a lawful transfer mechanism must be in place — Standard Contractual Clauses (SCC), Binding Corporate Rules (BCR) for intra-group transfers, or in limited cases explicit informed consent from the data subject.

Q5: Is a DPO mandatory for mid-sized B2B businesses in Thailand?

DPO appointment is mandatory only where: (1) the organization is a government body; (2) the core activities require large-scale, systematic monitoring of data subjects; or (3) the core activities involve large-scale processing of sensitive personal data under Section 26. Most mid-sized B2B companies are not legally required to appoint a DPO under Section 41. However, best practice recommends designating a Privacy Officer to manage the compliance program and reduce regulatory risk.

References

  1. Personal Data Protection Act B.E. 2562 (2019) (พระราชบัญญัติคุ้มครองข้อมูลส่วนบุคคล พ.ศ. 2562) — Royal Gazette, Volume 136, Part 69 Gor, dated 27 May 2019.
  2. Office of the Personal Data Protection Committee (PDPC) — www.pdpc.or.th
  3. PDPC Notification on the Transfer or Sending of Personal Data to Foreign Countries (issued pursuant to Section 28 of the Act).
  4. PDPC Notification on Appropriate Security Measures of Data Controllers.
  5. Ministerial Regulation on Personal Data Security Standards B.E. 2565 (2022).
  6. European Commission, General Data Protection Regulation (GDPR) — Regulation (EU) 2016/679.
  7. Electronic Transactions Development Agency (ETDA) — Personal Data Protection Practice Guidelines — www.etda.or.th
  8. International Association of Privacy Professionals (IAPP), APAC Privacy Guidance — Thailand PDPA Overview (2023).

Related Articles

Legal Disclaimer

This article is prepared solely for academic and general informational purposes. It does not constitute legal advice for any specific matter. The content reflects the state of Thai law and regulatory practice as of 4 April 2026 and may be subject to change as the PDPC issues new notifications and guidelines. Readers should consult qualified legal counsel or a certified PDPA specialist before acting on any information contained herein. The author, Thundthornthep Yamoutai, Ph.D., and Legal Advance Solution Co., Ltd. disclaim all liability for any loss or damage arising from reliance on the contents of this article without prior professional consultation.

© 2026 Thundthornthep Yamoutai, Ph.D. — Legal Advance Solution Co., Ltd. (LAS) — All Rights Reserved.

Back to Knowledge Hub
View All Articles →