Data Protection Law In India iPleaders and Intelligent Legal Risk management LLP.

Slides:



Advertisements
Similar presentations
Mobile Payments and the FTC Manas Mohapatra Director of Mobile Policy Mobile Technology Unit Federal Trade Commission The views expressed are not necessarily.
Advertisements

University Data Classification Table* Level 5Level 4 Information that would cause severe harm to individuals or the University if disclosed. Level 5 information.
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
Red Flag Rules: What they are? & What you need to do
Introduction to basic principles of Regulation (EC) 45/2001 Sophie Louveaux María Verónica Pérez Asinari.
I.D. Theft Alaska’s New Protection of Personal Information Act Ed Sniffen Senior Assistant Attorney General Alaska Department of Law.
Data Protection.
RMG:Red Flags Rule 1 Regal Medical Group Red Flags Rule Identify Theft Training.
Identity Theft consumer.gov. What is identity theft? When someone uses information about you without your permission. The information can be your: – Name.
1 Credit card operation and the recent CardSystems incident HONG KONG MONETARY AUTHORITY 4 July 2005.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
Financial Data Protection and Consumer Notification of Data Security Breach Act of 2006 Sara Juster, JD Vice President/Corporate Compliance Officer Nebraska.
1 PRIVACY ISSUES IN THE U.S. – CANADA CROSS BORDER BUSINESS CONTEXT Presented by: Anneli LeGault ACC Greater New York Chapter Compliance Seminar May 19,
“MONITORING, EVALUATING AND REPORTING ON THE IMPLEMENTATION OF ANTI- TRAFFICKING LEGISLATION AND POLICIES.“ MAY 23-24, 2013 Ms. ANTOANETA VASSILEVA, BULGARIA.
FAMILY EDUCATIONAL RIGHTS AND PRIVACY ACT Electronic Signatures This work is the intellectual property of the author. Permission is granted for this material.
HIPAA Health Insurance Portability & Accountability Act of 1996.
Volunteers and the Law Riverland Community Legal Service Inc.
An overview of the Data Protection Act Legal framework The Data Protection Act 1998 came into force in March 2001, replacing the Data Protection.
Banks and the Privacy of Medical Information 8 th National HIPAA Summit March 8, 2004 Joy Pritts, JD Health Policy Institute Georgetown University
Teresa Macklin Information Security Officer 27 May, 2009 Campus-wide Information Security Activities.
2015 ANNUAL TRAINING By: Denise Goff
CLOUD AND SECURITY: A LEGISLATOR'S PERSPECTIVE 6/7/2013.
Enterprise data (decentralized control, data security and privacy) Incident Response: State and Federal Law Rodney Petersen Security Task Force Coordinator.
Privacy and Security Laws for Health Care Organizations Presented by Robert J. Scott Scott & Scott, LLP
Florida Information Protection Act of 2014 (FIPA).
IDENTITY THEFT. RHONDA L. ANDERSON, RHIA, PRESIDENT ANDERSON HEALTH INFORMATION SYSTEMS, INC.
Part 6 – Special Legal Rights and Relationships Chapter 35 – Privacy Law Prepared by Michael Bozzo, Mohawk College © 2015 McGraw-Hill Ryerson Limited 34-1.
New services offered by credit agencies The issue of transparency.
Technology Supervision Branch Interagency Identity Theft Red Flags Regulation Bank Compliance Association of CT Bristol, CT September 3, 2008.
Data Protection and Records Management. Key Responsibilities - Record Management Keep Information Accurate Disclose only if compatible with purpose for.
Privacy Challenges for Condominium Corporations and Condominium Managers presented to the Association of Condominium Managers of Alberta by Carmen Mann,
Data protection and European citizens’ initiatives
When Can You Redact Information Without Requesting an Attorney General Decision? Karen Hattaway Assistant Attorney General Open Records Division Views.
The Protection of Personal Information Bill 13 February
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Krysti Cox Dustin Hamilton Angela Pagenstecher Jeff Pike.
Safeguarding Sensitive Information. Agenda Overview Why are we here? Roles and responsibilities Information Security Guidelines Our Obligation Has This.
Legal, Regulations, Investigations, and Compliance Chapter 9 Part 2 Pages 1006 to 1022.
Taylor County Schools FERPA (Confidentiality) Training August 17, 2010.
Presented by Ms. Teki Akuetteh LLM (IT and Telecom Law) 16/07/2013Data Protection Act, 2012: A call for Action1.
Protection of Personal Information Act An Analysis on the impact.
TRANSBORDER DATA FLOWS INA MEIRING. THE PROTECTION OF PERSONAL INFORMATION ACT (“POPI”) > 'personal information' means information relating to an identifiable,
Legal Aspects in IT Security Is Your Organisation Up-to-Date?? (Ref : IT Act, 2008 & IT Rules 2011) Adv Prashant Mali [BSc(Phy),MSc(Comp. Sci.),CNA,
Framework of engagement : big data for official use Roy D. Ibay AVP Regulatory PLDT – Smart.
Data Breach ALICAP, the District Insurance Provider, is Now Offering Data Breach Coverage as Part of Our Blanket Coverage Package 1.
Students’ Unions 2011 Data Protection and Students’ Unions Mairead O’Reilly 19 July 2011.
Privacy and Debt Collection
Florida Information Protection Act of 2014 (FIPA)
General Data Protection Regulations Preparing for the upcoming changes in data protection law David Jones & Angharad Williams.
GDPR Overview Gydeline – October 2017
Data Protection Act 1988 and Data Protection (Amendment) Act 2003
Florida Information Protection Act of 2014 (FIPA)
GDPR Overview Gydeline – October 2017
GENERAL DATA PROTECTION REGULATION (GDPR)
SHARING CLINICAL DATA: Legal and Privacy Issues
Privacy & Access to Information
The General Data Protection Regulation (GDPR)
Internet Privacy and You
Red Flags Rule An Introduction County College of Morris
Are you processing personal data lawfully?
Employee Privacy and Privacy of Employee Information
Relocation CARNIVAL come one…come all
“MONITORING, EVALUATING AND REPORTING ON THE IMPLEMENTATION OF ANTI-TRAFFICKING LEGISLATION AND POLICIES.“ MAY 23-24, Ms. ANTOANETA.
Data Protection Act 1988 and Data Protection (Amendment) Act 2003
Mandatory Breach Reporting (isn’t *that* bad)
General Data Protection Regulation Q & A Session
General Data Protection Regulation (GDPR)
EU Data Protection Legislation
Colorado “Protections For Consumer Data Privacy” Law
Presentation transcript:

Data Protection Law In India iPleaders and Intelligent Legal Risk management LLP

Data Protection in India On 11 th April, 2011 Indian data protection law came into force. These laws are rules framed under the powers conferred by Section 87(2) read with 43A of the Information Technology Act. iPleaders and Intelligent Legal Risk management LLP

Salient Features oblige organizations to notify individuals when their personal information is collected via letter, fax, or , It requires covered organizations to make a privacy policy available, It requires organizations to take steps to secure personal information, It requires them to offer a dispute resolution process related to the collection and use of personal information, It applies to all companies in India getting any information from anywhere iPleaders and Intelligent Legal Risk management LLP

Nature of Protected Information sensitive personal data or information of a person consists of information related to password; financial information such as bank account, credit card or debit card; (Economic) physical, physiological and mental health condition; sexual orientation; medical records and history; biometric information. Any information that a service provider receives under these categories for processing or storing under a lawful contract is protected. iPleaders and Intelligent Legal Risk management LLP

Exception Information can be shared without the prior consent of the information provider for the following purpose verification of identity, or for prevention, detection, investigation including investigation of cyber incidents, prosecution, and punishment of offences with the government agencies. The Government agency needs to state the purpose for which it requires the information to the body corporate in order to get such information. The information can also be shared with the third party in compliance with an order under a law in force, and consequently, in compliance with a judgment. iPleaders and Intelligent Legal Risk management LLP

Thank You Thanks to all of you for watching the presentation. iPleaders and Intelligent Legal Risk management LLP