Articles

Data Breach Notification vs Cyber Security Incident Reporting A Definitive Guide

Data Breach Notification vs Cyber Security Incident Reporting: A Definitive Guide

With the Personal Data Protection (Amendment) Act 2024 (“PDPA”) and the new Cyber Security Act 2024 (“CSA 2024”) in force, organisations are now subject to complementary but distinct notification obligations under two legal regimes:   In this article, we break down the differences between Data Breach Notification (DBN) under the PDPA and Cyber Security Incident Reporting under the CSA 2024.  Quick comparison  Aspect  Personal Data Breach  Cyber Security Incident  Definition  Any event or incident that leads or is likely to lead to the breach, loss, misuse, or unauthorised access of personal data  An act or activity carried out on or through a computer or computer system, without lawful authority, that jeopardises or adversely affects its cyber security   Source of breach  Accidental or deliberate; can involve internal or external parties  Cyber threat actor(s) or unauthorised computer activity   Regulated under  Personal Data Protection Act (PDPA)   Cyber Security Act 2024 (CSA 2024)  Threshold  Likely to cause “significant harm” to individuals  Incident involving or affecting National Critical Information Infrastructure (NCII)   Regulator  Personal Data Protection Commissioner (“PDPC”)   National Cyber Security Agency (“NACSA”)  Mandatory by Law  Yes  Yes  Legal triggers and reporting thresholds  Data breach reporting  Under the PDPA (Section 12B), Circular of Personal Data Protection Commissioner No. 2/2025, and Data Breach Notification (DBN) Guideline, a data breach must be reported if it causes or is likely to cause “significant harm”.   If the organisation determines a breach does not cause or is not likely to cause significant harm, then notification is not mandatory.  However, for regulatory review purposes, it is strongly recommended to document the internal assessment process, including the basis for non-notification decision, risk evaluation findings, and any supporting documents or mitigation steps.   Cyber Security Incident reporting  Under the CSA 2024 (Section 23) and the Cyber Security (Notification of Cyber Security Incident) Regulations 2024, Cyber Security Incidents must be reported immediately when it comes to the knowledge of the NCII Entity that a cyber security incident in respect of the NCII has occurred or might have occurred.   Even suspected incidents must be reported within the prescribed time and manner (as set by regulations).  Under the CSA 2024, only entities classified as NCII are legally required to report cybersecurity incidents. However, non-NCII entities may also voluntarily report incidents.  Notification timeline and channels  Reporting Obligation  PDPA 2024 (Data Breach)  CSA 2024 (Cyber Security Incident)  Notified to  PDPC   The Chief Executive of NACSA and the relevant NCII sector lead    Notification   As soon as practicable (within 72 hours of becoming aware of the incident)  Immediate notification submit initial report within 6 hours of becoming aware of the incident    Method  By electronic means (i.e., email) or by hardcopy submission   By electronic means  Notification to Affected Individuals  Within 7 days of PDPC notification (if there is “significant harm”)  Currently no express obligation under the CSA 2024    Reporting Format  DBN Form    Via email to [email protected], submit necessary information via National Cyber Coordination and Command Center System    Supplementary Info  Update PDPC if more details become available    Within 14 days of the notification and further updates from time to time  Coordinating dual notifications  Incidents involving system compromise and personal data loss need dual notification, in which case:  To enhance coordination and minimise compliance risks, we recommend:  Enforcement and penalties  Failure to notify the relevant agency of an incident carries the following potential penalties.  PDPA   CSA 2024  Fine up to RM250,000, imprisonment up to 2 years, or both.     Fine up to RM500,000, imprisonment up to 10 years, or both.    Non-compliance may also trigger further investigations, compliance audits, and reputational harm.  Practical takeaways   Based on our experience assisting clients with breach response, we offer the following practical steps to manage the situation effectively:  Conclusion  With both the PDPA and the CSA 2024 in full effect, the distinction lies in the focus: PDPA protects individuals, while the CSA governs cybersecurity risks and incident response.   In practice, the lines often blur. That’s why we help clients build integrated response frameworks that account for both legal regimes, timelines, and regulators.  If you are unsure whether your organisation’s protocols are up to date, or whether you are designated as NCII, now is the time to review and reinforce your governance framework. 

Data Breach Notification vs Cyber Security Incident Reporting: A Definitive Guide Read More »

Data Protection Officer (DPO) vs Chief Security Officer (CSO) A Definitive Guide

Data Protection Officer (DPO) vs Chief Security Officer (CSO): A Definitive Guide

Ready to appoint a DPO in Malaysia? See our step-by-step DPO-as-a-Service process on dpomalaysia.my! Read Our Guide As Malaysia strengthens its legal framework for data privacy and cyber security with the Personal Data Protection (Amendment) Act 2024 (PDPA) and Cyber Security Act 2024 (CSA), Malaysian organisations assessing their compliance obligations may be unsure if they need both a Data Protection Officer (DPO) and a Cyber Security Officer (CSO).  Below, we have broken down the legal requirement, roles, responsibilities, and qualifications for both positions so you can determine which your organisation must appoint.  Legal requirement  As expressly outlined in Section 12A of the PDPA and supported by official DPO guideline, as of 2025, it is mandatory for organisations in Malaysia to appoint a DPO if they:   In contrast, the CSA 2024 does not expressly mandate the appointment of a Chief Security Officer (CSO) or Chief Information Security Officer (CISO). However, designated NCII entities are subject to a wide range of cybersecurity obligations and as a result, may benefit from appointing a designated CSO or similar role as a practical measure to ensure compliance with the CSA 2024.   Defining “NCII entity”: “NCII entity” means any government entity or person that owns or operates NCII. “NCII” means a computer or computer system in which if it is disrupted or destroyed, it will result to a detrimental effect to the delivery of service relating to the security, defence, foreign relations, economy, public health, public safety, public order or the ability of the government to carry out its functions effectively.   Roles and responsibilities  The table below summarises the key differences between the two roles:  Aspect  Data Protection Officer (DPO)  Chief Security Officer (CSO)   Primary Mandate  Oversee compliance with data protection laws including to ensure lawful processing of personal data and manage personal data breaches.   Develop and enforce cyber security strategies, ensure system security, manage cyber risks and respond to cyber threats.   Key Regulator  Personal Data Protection Commissioner (“PDPC”)  National Cyber Security Agency (“NACSA”)   Roles  Acts as liaison to PDPC, supports Data Protection Impact Assessments, monitors compliance, and manages breach notifications.   Leads the incident response for cyber security attacks and oversees compliance and reporting obligations under CSA 2024.   Focus Area  Personal Data & Privacy Risk  Information Systems & Cyber Threats   Mandatory by Law  Yes  No  Qualifications  While there is some overlap in competencies, each role demands specific expertise:  Data Protection Officer (DPO)  A DPO can be chosen from an internal member or outsourced, and in either case should:  What is a Data Protection Officer? A Data Protection Officer (DPO) is a company employee responsible for ensuring an organisation’s full compliance with the Personal Data Protection Act (PDPA). As of 2025, appointing one is a legal requirement for many businesses in Malaysia. To learn more, read our guides: Outsourcing a DPO in Malaysia In-house vs Outsourced DPO Chief Security Officer (CSO)  While the CSA 2024 does not expressly require organisations to appoint a Chief Security Officer (CSO), appointing such a role is considered a best practice for NCII entities as a CSO plays a key role in ensuring the organisation meets cybersecurity obligations under the CSA 2024.  What to look for in a CSO:  Note: CyberSecurity Malaysia has introduced the Certified Chief Information Security Officer (CCISO) programme. The certification is aligned with international standards and tailored to meet Malaysia’s compliance landscape under the CSA 2024.   Appointment Context: it is highly recommended for organisations designated as the NCII entity. These include sectors deemed essential to national security, economy, public health, or safety, such as banks, telcos, utilities, hospitals, and government-linked entities.  When to appoint both  An organisation can consider appointing both especially if:  Example of when to appoint a DPO and CSO: A Imagine a private hospital that runs a 24/7 emergency ward, stores thousands of electronic medical records (EMRs), and operates a telemedicine platform for remote consultations.  The DPO ensures patients are given proper privacy notices, handles consent for health data sharing, and manages requests for access or correction of patient records, all required under the PDPA.  Meanwhile, the CSO defends the hospital’s infrastructure against threats like ransomware locking critical systems, DDoS attacks on the teleconsultation portal, or unauthorised access to diagnostic devices connected to the network.  While the DPO covers personal data protection, the CSO focuses on cybersecurity, and together they provide the hospital with a truly comprehensive protection against threat actors and mistakes. Can a DPO also serve as CSO?  Technically yes, since there is no express prohibition under the acts against one person serving as both DPO and CSO. However, dual-role arrangements should only be considered if:  However, bear in mind that while both roles support security, they cover distinct subjects, and best practice would be to separate DPO and CSO functions for better oversight and risk management.  Conclusion  Appointing a DPO and a CSO is not a duplication, Where the DPO covers personal data protection, a CSO focuses on cybersecurity, and any organisation with both will enjoy better protection and ability to respond to regulatory expectations. 

Data Protection Officer (DPO) vs Chief Security Officer (CSO): A Definitive Guide Read More »

A Step-By-Step Guide To Handling Data Breach Notifications In Malaysia 

A Step-By-Step Guide To Handling Data Breach Notifications In Malaysia 

With the enforcement of Malaysia’s Personal Data Protection (Amendment) Act 2024 (“PDPA”), Circular of Personal Data Protection Commissioner No. 2/2025, and the Data Breach Notification (DBN) Guideline, Malaysian organisations are now under a stricter legal framework to respond swiftly to personal data breaches.   Below, we explain how organisations can navigate data breach notification obligations with clarity.  Defining “personal data breach”  A personal data breach refers to any event that leads or is likely to lead to the breach, loss, misuse, or unauthorised access of personal data.   According to the DBN Guidelines, common examples include:  These can result from both accidental or deliberate actions and involve internal or external parties.  When a breach must be reported  A personal data breach must be reported only if it causes or is likely to cause “significant harm”.  “Significant harm” includes:  If there is a breach, the organisation should perform a prompt risk impact assessment to determine if the breach meets the threshold of “significant harm”.   Legal duty of Data Controllers to report breaches  Under the PDPA, the legal duty to report a personal data breach lies with the Data Controller (i.e., the party that ultimately uses the personal data), in this case, the organisation.  Even if the breach originates from a third-party who processes personal data on the Data Controller’s behalf (e.g. cloud service provider), the obligation to submit a data breach notification still rests solely with the Data Controller.  Crucially, failure by a third party to inform the Data Controller of a breach does not excuse the latter from notification duties.  To ensure compliance, the organisation should:  Notifying the Commissioner within 72 hours    Once a personal data breach that meets the “significant harm” threshold is discovered, the Data Controller must notify the Personal Data Protection Commissioner:  Complete the official Data Breach Notification (DBN) Form and submit it via:  As all three submission methods are treated the same, digital options are strongly encouraged to avoid missing the 72-hour deadline.  The notification to the Commissioner should also include:  If the 72-hour deadline is missed, a written justification for the delay and supporting documents must accompany the late submission.  Who is point of contact with the Commissioner?  The Data Protection Officer (DPO) will act as the main contact point for the Commissioner in relation to a data breach, but only where appointment is mandatory under Section 12A of the PDPA.   If no DPO is required, the organisation must instead assign a senior representative with sufficient authority and expertise to handle official communications and assist with investigations.  If you’re unsure if a DPO is mandatory for your organisation, we answer it in our full guide to DPO outsourcing in Malaysia. Notifying affected data subjects within 7 days  If there is a likelihood of significant harm to any individual, the affected individual must be notified within 7 days after notifying the Commissioner.   Acceptable notifying methods include:  Content of the notification must include:  Best practices  1. Establish a Data Breach Response Plan  2. Appoint a DPO (If required) or Designate a Responsible Person  3. Maintain a Data Breach Register  4. Conduct Staff Training  Train all employees to:  5. Prepare Notification Formats and Templates  Pre-approved templates help ensure consistency, legal accuracy, and faster response during high-pressure breach scenarios.   6. Review Vendor Agreements  Ensure third-party data processors are contractually bound to:  What is a Data Protection Officer? A Data Protection Officer (DPO) is a company employee responsible for ensuring an organisation’s full compliance with the Personal Data Protection Act (PDPA). As of 2025, appointing one is a legal requirement for many businesses in Malaysia. To learn more, read our guides: Outsourcing a DPO in Malaysia In-house vs Outsourced DPO Non-compliance penalties  Under Section 12B(3) of the PDPA, failure to notify may result in:  Non-compliance may also lead to reputational harm, regulatory scrutiny, and loss of customers’ trust.  Conclusion In our practice, we have seen that the organisations best equipped to manage personal data breaches are those that invest early in the right people, well-defined processes, and clear protocols. When a breach occurs, readiness makes all the difference, not just in compliance, but in preserving stakeholder trust and business continuity.  If you are unsure whether your organisation is truly prepared, now is the time to assess and strengthen your response framework. 

A Step-By-Step Guide To Handling Data Breach Notifications In Malaysia  Read More »

A Practical PDPA Compliance Framework For Organisations In Malaysia

A Practical PDPA Compliance Framework For Organisations In Malaysia

With the 2024 and 2025 updates to the Personal Data Protection Act 2010 (PDPA), organisations in Malaysia now face stricter expectations of accountability and personal data governance.  To help, we have prepared a practical framework for implementing PDPA compliance.   7 core personal data protection principles  The foundation of PDPA compliance lies upon seven core principles that collectively govern how personal data is collected, used, stored, and disclosed.   Principle  What It Means  Example   General Principle    Only collect personal data when necessary and with consent  Don’t collect NRIC numbers if just names and emails will do  Notice and Choice Principle    Inform individuals of what personal data you collect and how it will be used.  Include a clear privacy notice on your website or registration form  Disclosure Principle    Don’t disclose personal data without consent, unless required by law or is necessary   Obtain written consent before sharing a client’s details with a third-party service provider (e.g., marketing agency)  Security Principle    Protect personal data from loss, misuse, or unauthorised access  Use password protection and encryption for databases storing customer details  Retention Principle    Don’t keep personal data longer than necessary  Delete job application forms and candidate records after a certain duration (such as 12 months after the hiring process concludes)    Data Integrity Principle    Ensure personal data is accurate, complete, and up to date  Regularly verify contact details for existing customers in your CRM  Access Principle  Individuals have the right to access and correct their personal data  Provide customers a way to view or update personal info    Organisations should apply these into their daily operations, policies, and data lifecycle processes.  A PDPA-compliant privacy notice  Whether on your website, registration form, or physical premises, a clear and accessible privacy notice is a great first step for organisations to demonstrate the above PDPA principles in action to individuals whose personal data they collect.  Ensure the notice is easy to find, written in both Bahasa Malaysia and English, and clearly explains:  Under the Notice and Choice Principle, this should be done as early as possible, ideally when someone is first asked for their data or when it’s collected.    Building a practical compliance framework  While privacy notices are a good first step, true compliance is only achieved when organisations have built a company-wide culture where personal data protection is embedded into every part of daily operations.  This means having the right systems, processes, and people in place, and here’s a practical framework to move towards it:  For a better understanding of who qualifies as DPO or how to appoint one, check out our guides on:  Scaling PDPA efforts to business size  Matching PDPA efforts to your organisation’s capacity, complexity, and data risk is key to sustainability.   Start with the most essential, reassess priorities and expand step-by-step.   Smaller / newer enterprises  Start with the essentials:  Larger / established businesses  At this stage, PDPA compliance should be embedded in your business functions:  Not every organisation needs to take the same path, but all paths should lead to the same outcome.  Conclusion Compliance with the PDPA is a continuous journey and embedding PDPA principles into your business practices lays the foundation for building trust, reducing risk, and staying compliant with changing regulatory expectations.  If you need help putting it into action, we are here to support you with reviewing your current setup, drafting policies, or building a full compliance framework tailored to your needs. 

A Practical PDPA Compliance Framework For Organisations In Malaysia Read More »

In-House vs Outsourced DPO The ultimate Guide For Malaysian Businesses

In-House vs Outsourced DPO: A Definitive Guide For Malaysian Businesses

Ready to appoint a DPO in Malaysia? See our step-by-step DPO-as-a-Service process on dpomalaysia.my! Read Our Guide With recent amendments to the Personal Data Protection Act (PDPA) coming into force, Malaysian businesses that meet the threshold for appointing a DPO must now make a strategic decision:  “Should we appoint an internal DPO or outsource the role?”   This article breaks down the key considerations of both models, helping you choose an approach that aligns with your organisation’s structure, risk profile, and compliance obligations.  Clarifying the DPO’s role While there is no formal academic or professional qualification required under the DPO guideline at this moment, a DPO must fulfil certain requirements to qualify for the role:  Whether in-house or outsourced, this ensures they have sufficient competency in data protection law and governance.  Appointing an in-house DPO  Appointing an in‑house DPO means promoting one or more qualified team members to the position.  Why this approach works well:  What to watch out for:  Outsourcing the DPO role  Important note for businesses in Malaysia: Outsourcing the DPO role does not transfer legal responsibility. While tasks may be delegated to an external service provider, the organisation remains fully accountable for ensuring compliance with the PDPA. Outsourcing the DPO role means engaging an external professional firm or sole practitioner.  Why this approach works well:  What to watch out for:  You should ensure your service contracts clearly cover all requirements and scope, making sure both parties are aligned on roles, expectations, and deliverables from the start.    For a deeper dive, see our full guide to DPO outsourcing in Malaysia.  Conclusion  Whatever model you choose (outsourced or in-house), your DPO must be empowered to act, sufficiently resourced, independent in function, and properly registered with the Commissioner.  If you would like assistance, our team is here to help evaluate your position, draft service agreements, and ensure your appointment meets PDPA expectations. Reach out to get started. 

In-House vs Outsourced DPO: A Definitive Guide For Malaysian Businesses Read More »

The Ultimate Business Guide To DPO Outsourcing In Malaysia

The Business Guide To DPO Outsourcing In Malaysia

Important note for businesses in Malaysia: Outsourcing the DPO role does not transfer legal responsibility. While tasks may be delegated to an external service provider, the organisation remains fully accountable for ensuring compliance with the PDPA. Starting 1 June 2025, Malaysian businesses that fall under the new Personal Data Protection Act 2025 thresholds must appoint a Data Protection Officer (DPO).   While the most established of organisations may prefer appointing an in‑house DPO, most businesses will find outsourcing this role to seasoned professionals as the more cost‑effective and strategic approach.  As a provider of outsourced DPO services ourselves, we have written this guide to help business decision makers:  Let’s begin.  Ready to appoint a DPO in Malaysia? See our step-by-step DPO-as-a-Service process on dpomalaysia.my! Read Our Guide Clarifying the role of a DPO  To paraphrase guidelines by the Malaysian Department of Personal Data Protection (PDP), a Data Protections Officer is responsible for ensuring the organisation’s total compliance with the PDPA, which means, among other duties:   By law, a DPO must:  In addition, PDPD strongly recommends that a DPO should:  It is a specialised role that demands technical expertise and ethical conduct, and with enforcement starting 1 June 2025, a critical hire for businesses.  Signs you need an outsourced DPO  The first step is to assess if the team has capacity to meet PDPA requirements without outside help. Our in-house vs external DPO comparison provides a deep dive into the subject, but for our readers’ convenience, here are five key indicators your organisation likely benefits from outsourcing the role:  If any of these applies to your organisation, there is a strong argument to outsource your DPO role.  Even if you intend to build in-house DPO capacity in the future, an outsourced DPO can ensure immediate compliance with the June 2025 deadline.  How to properly outsource your DPO role  PDP recommends a minimum DPO appointment term of two years to promote stability, and to effectively outsource this role, your organisation should:  The service contract should clearly define the DPO’s scope of work, service terms, responsibilities, and access to data.  Best practices when outsourcing  To make the most of your outsourced DPO, you can consider these operational best practices:  Best Practice  Explanation  Ensure access to key documents and systems  Provide the DPO with secure but full access to relevant policies, personal data flows, contracts, and the data register so they can perform their role effectively.   Establish clear escalation protocols  Define how and when the DPO will be alerted in the event of a personal data breach or incident.   Schedule regular executive‑level engagement  Hold regular briefings between the DPO and top management to review risk exposure, compliance gaps, and training needs.   Designate internal liaisons  Assign persons from legal, IT, HR, and security departments to coordinate with the DPO, ensuring smooth collaboration and issue resolution.   Conclusion  If your organisation lacks the people, structure, or independence needed to manage a compliant data protection programme internally, outsourcing your DPO is a strategic, risk-managed solution aligned with regulatory expectations.   We can help you draft compliant service agreements and ensure your appointment meets PDPA expectations. Reach out to get started. 

The Business Guide To DPO Outsourcing In Malaysia Read More »

ultimate guide to Share Subscription vs Purchase Agreements

Share Subscription vs Purchase Agreements: A Definitive Guide 

One question we often get when assisting clients with investment deals, exits, and restructuring is whether they need a Share Subscription or Purchase Agreement.  While both agreements deal with shares, they serve different purposes and are subsequently used in different scenarios.  Share Subscription Agreement  When a company issues new shares and sells them directly to an investor, a Share Subscription Agreement (SSA) is used to set out the:   Typical use cases include fundraising rounds, capital injection by existing shareholders, onboarding a strategic partner, or the formation of joint ventures.  The end result is that a company receives fresh capital, an investor becomes a new shareholder, and the SSA keeps both parties aligned and happy.  Share Purchase Agreement  A Share Purchase Agreement (SPA) is used when an existing shareholder sells their shares to another party and needs a document to set out the:  SPAs are used during the sale of a founder’s stake, buyouts, share transfers, and most times where share ownership changes but the company’s share capital remains.  Side-by-side comparison  Aspect  SSA  SPA  Source of shares  New shares issued by the company  Existing shares sold by a shareholder  Funds go to  The company  The selling shareholder  Share capital  Increases  Unchanged  Purpose  Capital raising  Change in ownership  Typical parties  Company & investor  Seller & buyer  Use case  Fundraising, capital injection  M&A, exits, secondary sales  Governing documents  Companies Act 2016,  Sections 75 & 76  Contract law (with Companies Act compliance for share transfer)  Final thoughts  Whether you are onboarding a new investor, transferring equity, or exiting a business, the right agreement ensures clarity, compliance, and alignment of expectations.   If you are planning a share transaction, we recommend ensuring that your documentation accurately reflects the nature of the deal.  

Share Subscription vs Purchase Agreements: A Definitive Guide  Read More »

The employer's guide to mutual termination of employment in malaysia

The Employer’s Guide To Mutual Termination In Malaysia

Under Malaysian employment law, mutual termination simply means both employer and employee agree to end a working relationship. There is no dismissal or resignation, just a consensual parting of ways.  To support this process, employers often adopt two structured schemes:  If done properly, mutual termination offers clarity, fairness, and legal protection, especially for employers.  When to offer VSS or MSS  A VSS or MSS is most commonly used ahead of a restructuring or downsizing as a low-disruption alternative to selecting employees for retrenchment, for example due to the significant hike in salary requirements to apply for Employment Passes. In fact, these schemes are often used before a retrenchment, as stipulated in the Code of Conduct for Industrial Harmony (paragraph 22) and the Department of Labour’s Guidelines on Retrenchment Management (item 4.2).  They help achieve workforce reduction while reducing risks of unfair dismissal claims under Section 20 of the Industrial Relations Act 1967.  That said, the rationale behind the offer must be legally sound to hold up in court.  Ensuring legality of the agreement   A VSS or MSS agreement is legally valid provided that contract law requirements are met, and in practice contains three key elements:   If any of these elements are missing, the courts can rule against the employer, as seen in Teh Yet Poh v Tropicana Shared Services Sdn Bhd.  Teh Yet Poh v Tropicana Shared Services Sdn Bhd [2025] What the employer called a “mutual separation” was, in reality, a one-sided decision as the employee was told to resign or face retrenchment. Although the employee signed the MSS and received an initial payout of RM73,706.99, the court found that the agreement had been entered into under pressure and therefore amounted to an unlawful dismissal. The court subsequently awarded the employee an additional compensation of RM223,173.01. The most disheartening part of reading this judgment was the long list of case law from 1991 to 2024 that reflects how employers have continuously made the same mistake.  But it doesn’t have to be that way, and our next section walks you through how to handle a mutual separation scheme properly.  Steps in rolling out a VSS or MSS Here’s how employers can ensure both sides agree to the terms, benefits, and finality of the separation:  Step 1: Establish a genuine reason, be it redundancy, cost control, or restructuring.  Step 2: Choose a VSS if applying to a group and MSS for individuals.  Step 3: Define who is eligible and how the offer will be communicated.  Step 4: Draft clear, balanced, and enforceable documents to avoid problems later.  Step 5: Keep written records of all steps taken, especially around consent, communication, and payout calculations, which includes ensuring all statutory contributions like EPF and SOCSO are up to date before the separation takes effect. Missed payments can lead to serious legal consequences. For details on statutory entitlements, see step seven of our guide to retrenchment.  And if you’d like help drafting a legally sound VSS or MSS Agreement that protects your business while treating employees fairly, we are here to assist.  FAQs on mutual termination in Malaysia Q: Can an MSS or VSS be offered verbally? A: Preferably not. Although verbal contracts are legally recognised, for employment matters it is risky and opens the door to misunderstandings and disputes. A written agreement ensures both clarity and legal enforceability. Q: Who usually drafts the VSS or MSS document? A: It is typically prepared by the employer or their legal advisor. Q: Can the employee propose their own terms under MSS? A: Yes. Q: Can the employee challenge the agreement after signing? A: Yes. Q: Does the VSS/MSS need to offer more than the legal minimum? A: It’s preferable as if compensation is equal to or lower than the legal minimum, the court may view it as a disguised retrenchment and subject the employer to full statutory obligations. Q: How long should the employee be given to respond to a VSS or MSS offer? A: A few days to a week is generally reasonable. The key is not to pressure the employee into making a rushed decision. However, the response timeframe may also consider the company’s overall business conditions and urgency of the restructuring plan.

The Employer’s Guide To Mutual Termination In Malaysia Read More »

Responsibilities of Executor:

  • Apply for and extract the grant of probate.
  • Make arrangements for the funeral of the deceased.
  • Collect and make an accurate inventory of the deceased’s assets.
  • Settling the debts and obligations of the deceased.
  • Distributing the assets.

Note for Digital Executor:
If you wish to leave your digital assets to certain people in your Will, there are important steps that need to be taken to ensure that your wishes can be carried out:

  • Keep a note of specific instructions on how to access your username and password of your digital asset.
  • You are advised to store these private and confidential information in a USB stick, password management tool or write them down.
  • Please inform your executor or a trusted person of the whereabouts of the tools so that they will have access to your digital asset.