Singapore Wealth Ranking

Privacy Policy

  1. 1. Information Sources

    For our wealth ranking, we research numerous publicly accessible sources such as annual reports, stock registers, and land registry entries. Additionally, insights from specialist publications, press releases, and media reports flow into our analysis. For validation, we conduct conversations with industry experts, economic researchers, and financial analysts. Each piece of information undergoes a multi-stage verification process before being included in our database. Quality assurance is carried out by a specialized team that continuously monitors the currency and reliability of all data.

  2. 2. Wealth Assessment

    Our assessment methodology is based on a complex model that weights different asset classes differently. Listed investments are recorded at current market value, while industry-standard multipliers are applied for private companies. For real estate, we consider regional price developments and individual property characteristics. Art collections, luxury goods, and other tangible assets are included based on expert estimates. To determine net worth, we deduct known liabilities. We update valuations quarterly to reflect market changes in a timely manner. An independent panel of experts annually reviews the appropriateness of our methodology.

  3. 3. Data Management

    All wealth data is stored in a highly secure cloud infrastructure with multi-layered encryption. Access is exclusively through a strict authorization concept with two-factor authentication. We archive historical datasets separately to analyze wealth developments over several years. Daily backups protect against data loss. Our data management practices fully comply with the requirements of Singapore's data protection legislation as well as the GDPR. Regular security audits by external specialists ensure compliance with current standards.

  4. 4. Discretion

    Despite the public nature of our ranking, we pay particular attention to protecting privacy. Family details, personal circumstances, or health-related information are generally not published. For confidential tips, we guarantee absolute confidentiality and use them exclusively for internal plausibility checks. Our editors sign comprehensive confidentiality agreements with substantial contractual penalties for violations. Before each publication, we carefully check whether legitimate private interests could be affected. We make appropriate adjustments in response to justified objections.

  5. 5. Publication Standards

    Each edition of our ranking undergoes an extensive editorial process with multiple control instances. Four weeks before publication, the listed individuals receive the opportunity to comment. We immediately consider factual corrections, while for assessment questions, we transparently explain our methodology. The final decision on inclusion and placement lies with our editor-in-chief in coordination with the expert advisory board. In principle, we refrain from sensationalist presentations and focus on factual wealth analyses. After publication, we transparently document all subsequent changes.

  6. 6. Correction Procedure

    We have established a standardized procedure for correction requests. Affected parties can request corrections via a special form on our website or in writing by registered mail. Required evidence must be submitted in certified form. Our review team processes each request within 14 working days and documents the decision process comprehensively. For complex cases, we consult external assessors. Confirmed corrections are implemented both in the online version and in the next print edition. We regularly inform applicants about the processing status via encrypted email.

  7. 7. License Provisions

    The use of individual data with correct source attribution is permitted for journalistic and scientific purposes. For more extensive uses, we offer various license models. Commercial exploitations require a written agreement with precise definition of the scope of use. In case of violations of our license provisions, we reserve the right to take legal action, starting with a warning up to a claim for damages. Our legal department typically processes license inquiries within three working days. We grant educational institutions special conditions under certain requirements. Each approved use receives a unique reference number for tracking.

  8. 8. Web Analysis

    To optimize our online offering, we use a data protection-compliant web analysis solution with server location in Singapore. IP addresses are fundamentally anonymized. The collection includes visit duration, page views, entry sources, and devices used, but no personally identifying characteristics. Visitors can object to data collection at any time by setting a special cookie. Alternatively, we offer the option to use our page in "Do Not Track" mode. We use aggregated analysis results exclusively to improve user-friendliness and content relevance. You can find detailed setting options in our cookie manager.

  9. 9. Contact Data Processing

    When using our contact form, we collect only the information necessary for processing. This data is processed in a separate system with enhanced security standards. After completion of the inquiry, automated deletion occurs within 90 days, unless legal retention obligations exist. Disclosure to third parties only takes place with explicit consent. We use contact data for marketing purposes only after prior, revocable consent. For spam prevention, we use an AI-based filter system that works without captchas. Telephone inquiries are not recorded.

  10. 10. Subscription Management

    For our newsletter, we use a double opt-in procedure with a time-limited confirmation link. Each issue contains a personalized unsubscribe link at the footer. We capture open rates anonymously for content optimization. Subscribers can manage their interest profile themselves and then receive tailored content. The sending frequency can be set individually – from daily updates to monthly summaries. After prolonged inactivity, we remind once of the existing subscription and then automatically deactivate it. Unsubscribed email addresses are kept on a blocklist to reliably prevent unwanted sending.

  11. 11. Technical Protection Measures

    Our IT infrastructure is protected by state-of-the-art security technologies. These include next-generation firewalls, intrusion detection systems, and continuous vulnerability scanning. All data transmissions are TLS-encrypted with Perfect Forward Secrecy. For particularly sensitive data, we use end-to-end encryption. Our security team regularly conducts penetration tests and simulates attack scenarios. A 24/7 monitoring system detects unusual activities and triggers automated defense measures if necessary. All employees undergo quarterly security training with subsequent certification. Physical access controls to our server rooms include biometric procedures.

  12. 12. Cross-Border Data Transfer

    As a Singapore company, we are subject to strict data protection regulations. For data transmissions outside Singapore or the EEA, we conclude standardized data protection contracts that have been approved by the Singapore Personal Data Protection Commission. For transfers to the US, we exclusively use certified providers with guarantees that correspond to Singapore's data protection level. Each international data transfer is reviewed and documented in advance by our data protection officer. Technically, we rely on geo-fencing to prevent unintended cross-border data flows. We promptly adapt our transfer mechanisms when legal framework conditions change.

  13. 13. Data Subject Rights

    Every person captured in our ranking enjoys comprehensive rights under Singapore's Personal Data Protection Act. This includes the right to complete information about stored data, its origin, and purpose of use. We process correction claims as a priority within 72 hours. Under certain circumstances, deletion or restriction of processing can be requested. There is a right to object to automated decisions with a claim to manual review. To exercise these rights, we provide a special form that requires no registration. Identity verification is done via a secure video identification procedure. For complex inquiries, we offer personal consultation appointments.

  14. 14. Policy Updates

    We continuously develop this privacy policy. For substantial changes, we inform through various channels: direct notification by email, prominent notice on the home page, and temporary pop-up upon first visit after the update. We archive previous versions in a publicly accessible directory with highlighting of the respective changes. At least 30 days before the entry into force of significant changes, we offer the opportunity for feedback. Suggestions flow into the final version. The revision is carried out in close coordination with our data protection advisory board, which consists of external experts.

  15. 15. Data Protection Coordination

    Our specialized team is available for all data protection-related concerns. Direct contact is possible through several secure channels: encrypted email, data protection-specific contact form, or by mail with the note "Confidential/Data Protection." Particularly sensitive inquiries can also be submitted via our anonymous communication channel. Our data protection officer is registered with the Singapore Personal Data Protection Commission and regularly certified. We answer complex data protection questions within a maximum of five working days. For complaints, we guarantee a transparent, three-stage procedure with independent mediation options.