B IG D ATA : L EGAL I SSUES BY: P RANAV K UMAR M YSORE S ENIOR A SSOCIATE K&S P ARTNERS.

Slides:



Advertisements
Similar presentations
Data Protection Law In India iPleaders and Intelligent Legal Risk management LLP.
Advertisements

BUSINESS B2 Ethics.
CHAPTER Current Future Contract Law for E-Commerce Current Future Contract Law for E-Commerce 9.
Trade Secrets and Confidential Information
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Data Ownership Responsibilities & Procedures
1 PRIVACY ISSUES IN THE U.S. – CANADA CROSS BORDER BUSINESS CONTEXT Presented by: Anneli LeGault ACC Greater New York Chapter Compliance Seminar May 19,
Information Systems Unit 3 – Outcome 3 Legal Obligations of Programmers Student Lecture.
Chapter 16 Security. 2 Chapter 16 - Objectives u The scope of database security. u Why database security is a serious concern for an organization. u The.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
INTERNET and CODE OF CONDUCT
Big Data A big step towards innovation, competition and productivity.
Database Administration Chapter 16. Need for Databases  Data is used by different people, in different departments, for different reasons  Interpretation.
National Smartcard Project Work Package 8 – Security Issues Report.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Chapter Two Ethical & Legal Issues.
Legal Audits for E-Commerce Copyright (c) 2000 Montana Law Review Montana Law Review Winter, Mont. L. Rev. 77 by Richard C. Bulman, Jr., Esq. and.
Teresa Macklin Information Security Officer 27 May, 2009 Campus-wide Information Security Activities.
C4- Social, Legal, and Ethical Issues in the Digital Firm
Eric J. Pritchard One Liberty Place, 46 th Floor 1650 Market Street Philadelphia, Pennsylvania (215)
Information Systems Security Computer System Life Cycle Security.
7 - 1 Copyright  2003 Pearson Education Canada Inc. CHAPTER 7 Audit Planning and Documentation.
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web 1 Component 4/Unit 2Health IT Workforce Curriculum.
Florida Information Protection Act of 2014 (FIPA).
1 SIMPSONS SOLICITORS Get it on Google: Google Book Search A review of the US actions against Google Inc. and the implications in Australia.
E-COMMERCE AND PRIVACY LAWS IN THE UAE Rindala Beydoun Senior Legal Counsel Al Tamimi & Company.
TG7 – Business models and SLAs BEinGRID - Legal Issues ICRI – K.U. Leuven Davide M. Parrilli
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Digital Citizenship Created By: Kelli Stinson June 2011.
What is Copyright? Copyright is a form of intellectual property protection granted under Indian law to the creators of original works of authorship such.
Data Protection Act AS Module Heathcote Ch. 12.
IBT - Electronic Commerce Privacy Concerns Victor H. Bouganim WCL, American University.
CONFIDENTIAL © 2009 Barnes & Thornburg LLP. All Rights Reserved. This page, and all information on it, is confidential, proprietary and the property of.
PROTECTING YOUR IP RIGHTS Waldo Steyn, Senior Associate, Intellectual Property December 2012.
The Data Protection Act What Data is Held on Individuals? By institutions: –Criminal information, –Educational information; –Medical Information;
The Framework for Privacy Policies in the UK: Is telling people what information is gathered about them part of the framework? Does it need to be? Emma.
Intellectual Property Laws and Fair Use Guidelines for Educational Multimedia.
LEGAL ASPECTS OF DIGITAL LIBRARIES By TALWANT SINGH ADDL DISTT. & SESSIONS JUDGE; DELHI.
Trespass to Chattels: Spam Richard Warner. CompuServe v. Cyber Promotion  :“CompuServe has received many complaints from subscribers threatening to discontinue.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved. 2-1 BUSINESS DRIVEN TECHNOLOGY Business Plug-In B2 Ethics.
ADVANTAGES OF DATA BASE MANAGEMENT SYSTEM. TO BE DICUSSED... Advantages of Database Management System  Controlling Data RedundancyControlling Data Redundancy.
PROTECTION OF PERSONAL DATA. OECD GUIDELINES: BASIC PRINCIPLES OF NATIONAL APPLICATION Collection Limitation Principle There should be limits to the collection.
Copyright © 2007 Pearson Education Canada 23-1 Chapter 23: Using Advanced Skills.
Privacy & Confidentiality in Internet Research Jeffrey M. Cohen, Ph.D. Associate Dean, Responsible Conduct of Research Weill Medical College of Cornell.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Introduction to the Australian Privacy Principles & the OAIC’s regulatory approach Privacy Awareness Week 2016.
1 Information Governance (For Dental Practices) Norman Pottinger Information Governance Manager NHS Suffolk.
Protection of Personal Information Act An Analysis on the impact.
Electronic Records Management Alan Cameron Records Management Consultant.
PRIVACY AND DATA PROTECTION in THE BIG DATA AGE JONATHAN PRICE.
Legal Aspects in IT Security Is Your Organisation Up-to-Date?? (Ref : IT Act, 2008 & IT Rules 2011) Adv Prashant Mali [BSc(Phy),MSc(Comp. Sci.),CNA,
Article 4 [Obligations of Applicant] 4.1. As a sole and exclusive owner of the Application, Applicant warrants that.
Why Does The Site Need an SSL Certification?. Security should always be a high concern for your website, but do you need an SSL certificate? A secure.
The Protection of Confidential Commercial or Industrial Information in Environmental Law: Analysis and Call for a Graded Concept of Protection Prof. Dr.
Surveillance around the world
Add video notes to lecture
Credit Card Processing 101
Florida Information Protection Act of 2014 (FIPA)
Information Destruction; 2017 and beyond!
Florida Information Protection Act of 2014 (FIPA)
Data Protection Legislation
Cyber Issues Facing Medical Practice Managers
Spencer County Public Schools Responsible Use Policy for Technology and Related Devices Spencer County Public Schools has access to and use of the Internet.
Big Data.
Tools & Approaches for Ongoing Privacy Compliance
IP and legal issues Super-project.eu.
Colorado “Protections For Consumer Data Privacy” Law
Presentation transcript:

B IG D ATA : L EGAL I SSUES BY: P RANAV K UMAR M YSORE S ENIOR A SSOCIATE K&S P ARTNERS

What is Big Data? Big Data is a term that describes the large volume of data – both structured and unstructured- too difficult to process using traditional databases and software. It is a collection of data sets whose size is beyond the ability of typical database software tools to capture, store, manage, and analyse. Eg: Petabytes (1024 terabytes), Exabytes (1024 petabytes), etc. Volume vis-à-vis Technology. Big data can be analyzed for insights that lead to better decisions & strategic business moves. 2(C) K&S Partners, 2015.

Types of Big Data (C) K&S Partners, STRUCTURED Information with a high degree of organization, straightforward search engine algorithms or other search operations. For eg. Transactional data, created data like customer surveys UN-STRUCTURED Information which has no identifiable internal structure i.e. it can’t be gathered based on clicks, purchases or a barcode. It’s mostly human generated and not machine generated. For eg. s, Word & PDF files, Digital Images, Video, Audio, Social Media Posts

Legal Issues with Big Data Potential use and benefits of analysing Big Data also raise privacy related concerns. Data protection laws and confidentiality issues have to be in compliance with while using the Big Data. “The development of automatic data processing, which enables vast quantities of data to be transmitted within seconds across national frontiers, and indeed across continents, has made it necessary to consider privacy protection in relation to personal data” - OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data (C) K&S Partners,

Potential Legal Issues Data Protection Data Ownership Copyright Infringement Database Licensing Corporate Transactions Government use of Open Data Security Breaches (C) K&S Partners,

Data Protection The controversial areas of user sentiment and social data analysis, cross referencing and mixing of data obtained from diverse sources require a safe and secure legal framework that can protect both data users and suppliers. Presently, India does not have specific privacy legislations or data protection legislations. Indian judiciary has interpreted Article 21 includes right to privacy as a fundamental right. Information Technology Act, 2000 has attempted to address the issue of data protection. (C) K&S Partners,

Data Protection under IT Act, 2000 Section 43A: "Compensation for failure to protect data“ which does not specify an upper limit for compensation. Section 72A: “Punishment for disclosure of information in breach of lawful contract” Section 69 empowers the Government to intercept, monitor or decrypt any information in any computer resource if necessary in the interest of sovereignty & integrity of India (C) K&S Partners,

Data Protection under IT Act, 2000 Information Technology (Reasonable security practices and procedures and sensitive personal data or information) Rules, 2011 – Rules defines security practices and procedures that a Body Corporate - possessing, dealing, or handling any sensitive personal data or information must implement. – Rules lay out 8 types of sensitive personal data including passwords, medical records, biometric information etc. – Rules give an option for individuals to withdraw consent to disclose personal data. – It is not clear, however, if the Body Corporate has an obligation to delete information if consent is withdrawn. (C) K&S Partners,

Copyright Infringement The new Big Data search and analysis tools that could result in an infringement of the copyright. In Shashank Shekar Mishra v. Ajay Gupta, 2011 various provisions of Indian Copyright Act, 1957 were referred : – Section 2(o) defines "literary works" to include computer programmes, tables and compilations including computer "literary data bases. – Section 14 of the Act means, the exclusive right, in case of computer programme, to reproduce the work in any material form including its storage in any medium. – Section 17 provides that the author of the work shall be the first owner of the copyright therein. (C) K&S Partners,

Shashank Shekar Mishra v. Ajay Gupta, 2011 Plaintiff was a web designer and stored his original web designing templates, designs and styles, software source code, computer programme etc. in his laptop, along with his personal data such as user IDs and passwords, credit card details. Plaintiff was an active user of website The defendant, who was known to him as a user of the website, stole his laptop and threatened to make public all the information stored. The plaintiff sought a suit for permanent injunction, rendition of accounts & delivery up of the infringing material and damages. (C) K&S Partners,

Shashank Shekar Mishra v. Ajay Gupta, 2011 Observation of the Court: – Plaintiff’s original web designing templates, software source code, and computer programs fall under “literary works” within the meaning of Section 2(o) of Copyright Act, – Section 14 gives an exclusive right to the Plaintiff, in case of Computer Program to reduce the work in any material form. – Section 17 provides that author of the work shall be the first owner of the copyright therein. – The privacy of the plaintiff granted under Article 21 has been invaded since defendant had access to plaintiff’s private information. (C) K&S Partners,

Shashank Shekar Mishra v. Ajay Gupta, 2011 Held : – A decree of permanent injunction restraining defendant from infringing Plaintiff’s copyright in the “literary works” – A decree of recovery of Laptop – A decree of damages amounting to Rs. 10 Lakh and pedente lite/future p.a. on Rs.10 Lakhs (C) K&S Partners,

Data Ownership: Whether and to what extent the companies using Big Data can claim ownership or proprietary rights. Evaluating and assessing ownership of data essential for determining the value of a company. In EU, the law of data ownership originates from the Data Protection Directive 95/46 and the Database Directive 96/9. It has been recently held in, Google Spain and Google Inc v Agencia Espanola de Proteccion de Datos of Mario Costeja Gonzalez that that the individual's right to data protection "will override the economic interest" (i.e. the property right) "of the operator of the search engine". (C) K&S Partners,

Database Licensing A database would systematically and methodically store the data. Collection of the Big Data for its use would require a sui generis database right. This would help prevent third parties to commercially exploit and transact with Big Data. (C) K&S Partners,

Corporate Transactions Big Data is turning into a key asset for data – driven business intelligence. The value of this data and its outcomes will be taken into consideration during liquidation or M&A transactions. Startups are using Big Data solutions to their advantage in gaining venture capital. More advanced companies using & analyzing Big Data are acquired by multi national players. (C) K&S Partners,

Other Legal Issues  Taxation of Big Data  Antitrust: access to third parties  Standardization of laws for Big Data (C) K&S Partners,

(C) K&S Partners,

. T HANK YOU 18(C) K&S Partners, 2015.