![Insurance Foresight](https://www.nortonrosefulbright.com/-/media/images/nrf/hero/nrf-insurance-foresight---06.jpg?w=265&revision=2197b77d-e355-4a68-9e24-a72e5d9c2d40&revision=5250127931077387904&hash=C89E7CE2D226E64D1975BA2EE0E09A19)
Publication
Insurance M&A: On the cusp of a new era?
Early indications are that 2025 will see the start of a new phase in the cycle and it could be a busy year for M&A across the insurance sector.
Singapore | Publication | May 2024
(1.1) On 7 May 2024, the Singapore Parliament passed the Cybersecurity (Amendment) Bill (No. 15/2024) (CS Bill), which seeks to amend the Cybersecurity Act 2018 (CS Act).
(1.2) The changes introduced by the CS Act came after a review by the Cyber Security Agency of Singapore (CSA), which culminated in a public consultation on a draft CS Bill that took place between 15 December 2023 and 15 January 2024. Our earlier post discussing the proposed amendments to the draft CS Bill following its public consultation can be accessed here.
(1.3) We discuss the impact of the CS Bill and its changes below.
(2.1) The CS Act was first enacted in 2018. At the time, the focus of the CS Act was to regulate critical information infrastructure1 (CII) and establish a legal framework to oversee national cybersecurity in Singapore.
(2.2) Since then, there have been significant changes to the cybersecurity risk landscape and technology operating environment. Therefore, the objective of the CS Bill is to update the CS Act to keep pace with the evolving risks as well as reflect the increasing importance of ensuring the security of digital infrastructure and services powering Singapore’s digital economy, beyond just CIIs.
(3.1) In summary, the CS Bill introduces the following key changes to the CS Act:
Updating of CII-related provisions
(3.2) At present, the CS Act primarily imposes obligations on CII owners. This regulatory approach reflects the business norm when the CS Act was enacted in 2018 where providers of essential services (PES) owned and operated the CII necessary for the delivery of essential services.
(3.3) To account for changes in the technology operating environment, the CS Act has been updated with new definitions of “computer” and “computer system”, as well as a new Part 3A to regulate PES that rely on third-party owned CII.
Updating definitions of “computer” and “computer system”
(3.4) At present, the definitions of “computer” and “computer system” were based on the premise that such devices and systems were physical computers built out of dedicated hardware, such as hard disk drives, memory and processor chips.2 This is because the prevailing norm at the time of enactment of the CS Act envisaged CIIs as physical systems. However, the use of virtualisation and cloud computing technologies surged since 2018 and it is now possible for a CII to be based on a virtual computing system. Definitions of “computer” and “computing system” focused on regulating physical hardware (which could be easily replaced or shared in a virtual computing system) are therefore out of step with such virtual computing systems.
(3.5) Accordingly, the relevant definitions of “computer” and “computer system” in the CS Act will be updated to include “virtual computers” and “virtual computer systems”.3 Additionally, provisions clarifying what “ownership” means in relation to “virtual computers” and “virtual computing systems” have been included. These changes allow the CS Act to regulate both physical and virtual CIIs. This new definition also clarifies that a CII owner is responsible for the cybersecurity of their virtual CII, not third-party vendors that supply the underlying physical infrastructure.4
(3.6) In addition, the CS Act has been amended to designate and regulate CIIs located overseas that support an essential service in Singapore.5 This applies if its owner is in Singapore and the computer system would have been designated as a CII had it been located wholly or partly in Singapore.
New Part 3A – regulating PES that rely on third-party owned CII
(3.7) Part 3A of the CS Act will extend regulatory powers over PES that rely on third-party owned CII for the continuous delivery of a given essential service.6 This will allow PES to leverage efficiencies and effectiveness of such computer systems operated by third parties, who may have greater expertise or cost-effectiveness in operating such systems, due to demand aggregation.
(3.8) Under the new Part 3A, PES will remain responsible for the cybersecurity and cyber resilience of the computer systems relied upon to provide the essential services. This makes clear that PES cannot outsource their responsibility to third-party vendors in reliance of their computer systems.
(3.9) In this regard, the Senior Minister of State for Communications and Information, Janil Puthucheary, clarified during the Second Reading of the CS Bill that while the new Part 3A of the CS Act does not seek to regulate the third-party owners of these systems used by PES, such PES must ensure that the systems they rely on meet comparable cybersecurity standards and requirements of a CII through legally binding commitments, such as contractual provisions.7
Expanding the scope of cyber incidents reportable by CII owners to the CSA
(3.10) At present, a CII owner is generally required to report to the CSA cyber incidents relating to the CII, or computers or computer systems that are interconnected with or communicate with the CII.
(3.11) To counter the evolving tactics of threat actors targeting systems at the periphery or supply chains to attack CIIs, the CS Act will now require CII owners to additionally report incidents that affect: (a) other computers under the CII owner’s control; and (b) computers under the control of a supplier that are interconnected with or communicates with the CII.8
Expanding the scope of the CS Act to include STCC, ESCI and FDI
(3.12) Apart from regulatory changes in relation to CIIs, the CS Act has now been expanded to regulate STCC, ESCI and FDI.
Enhancing administrative powers and the penalty regime
(3.13) The administrative powers of the Commissioner of Cybersecurity (Commissioner) will be enhanced to address non-compliance of the CS Act. For instance, the Commissioner will be empowered to conduct on-site inspections of CII owners if it appears to the Commissioner that a CII owner failed to meet compliance requirements or has submitted false, misleading, inaccurate or incomplete information.11 The Commissioner can also grant a time extension to any person required to do any relevant action under the CS Act, provided there are good reasons to do so.12
(3.14) To improve CSA’s ability to monitor and supervise persons who provide licensable cybersecurity services under Part 5 of the CS Act, the CS Act will now provide monitoring powers for licensing officers under the provisions of a new section 29A. The new provisions give the CSA powers to enter and inspect premises, request records, and make inquiries to ensure compliance.
(3.15) Presently, non-compliance with the statutory obligations in relation to CII is enforced through criminal penalties. To provide the CSA with a wider toolkit to secure compliance with the CS Act (especially given the broader set of obligations introduced), sections 37A to 37D of the CS Act will give the Commissioner flexibility to, with the Public Prosecutor’s consent, bring a civil action in court for civil penalties instead of criminal enforcement.13 Depending on provisions contravened, such civil penalties could range from a sum not exceeding S$100,000 to 10% of the annual turnover of the person’s business in Singapore.14
(4.1) Changes to the CS Act have significant implications for Singapore’s evolving cybersecurity landscape. Among other things:
Publication
Early indications are that 2025 will see the start of a new phase in the cycle and it could be a busy year for M&A across the insurance sector.
Subscribe and stay up to date with the latest legal news, information and events . . .
© Norton Rose Fulbright LLP 2025