India Data Privacy Law – Its impact on Business Ecosystem Shivaji Rao, Regional General Counsel, Asia PAC and Sub-Saharan Africa, John Deere.

Slides:



Advertisements
Similar presentations
Data Protection Law In India iPleaders and Intelligent Legal Risk management LLP.
Advertisements

University Data Classification Table* Level 5Level 4 Information that would cause severe harm to individuals or the University if disclosed. Level 5 information.
Information Privacy and Data Protection Lexpert Seminar David YoungDecember 9, 2013 Breach Prevention – Due Diligence and Risk Reduction.
The Data Protection (Jersey) Law 2005.
The Financial Modernization Act of 1999, also known as the Gramm-Leach-Bliley Act (GLBA) UNDERSTANDING AND DEVELOPING A STRATEGIC PLAN TO BECOME COMPLIANT.
Data Protection.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
Copyright © 2014 Merck Sharp & Dohme Corp., a subsidiary of Merck & Co., Inc. All rights reserved. In practice, how do we recognize a potential Privacy.
1 PRIVACY ISSUES IN THE U.S. – CANADA CROSS BORDER BUSINESS CONTEXT Presented by: Anneli LeGault ACC Greater New York Chapter Compliance Seminar May 19,
What does the Data Protection Act do? It sets standards which must be satisfied when obtaining, recording, holding, using, disclosing or disposing of.
Hong Kong Privacy Code on Human Resource Management
Insights on the Legal Landscape for Data Privacy in Higher Education Rodney Petersen, J.D. Government Relations Officer and Security Task Force Coordinator.
Introduction to the APPs and the OAIC’s regulatory approach Presented by: Este Darin-Cooper Director, Regulation and Strategy May 2015.
Version 6.0 Approved by HIPAA Implementation Team April 14, HIPAA Learning Module The following is an educational Powerpoint presentation on the.
The role of the Office of the Privacy Commissioner in telecommunications Andrew Solomon Director, Policy.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Session 3 – Information Security Policies
Property of Common Sense Privacy - all rights reserved THE DATA PROTECTION ACT 1998 A QUESTION OF PRINCIPLES Sheelagh F M.
Network security policy: best practices
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
Information Asset Classification
© 2009 IDBI Intech, Inc. All rights reserved.IDBI Intech Confidential 1 Information (Data) Security & Risk Mitigation.
Outsourcing Louis P. Piergeti VP, IIROC March 29, 2011.
Privacy Law for Network Administrators Steven Penney Faculty of Law University of New Brunswick.
HIPAA PRIVACY AND SECURITY AWARENESS.
Privacy and Security Laws for Health Care Organizations Presented by Robert J. Scott Scott & Scott, LLP
Computerized Networking of HIV Providers Workshop Data Security, Privacy and HIPAA: Focus on Privacy Joy L. Pritts, J.D. Assistant Research Professor Health.
Florida Information Protection Act of 2014 (FIPA).
Part 6 – Special Legal Rights and Relationships Chapter 35 – Privacy Law Prepared by Michael Bozzo, Mohawk College © 2015 McGraw-Hill Ryerson Limited 34-1.
Data Protection Act AS Module Heathcote Ch. 12.
DATA PROTECTION & FREEDOM OF INFORMATION. What is the difference between Data Protection & Freedom of Information? The Data Protection Act allows you.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
Health Insurance Portability and Accountability Act (HIPAA) CCAC.
Singapore data protection compliance 13 September 2012.
The Data Protection Act What Data is Held on Individuals? By institutions: –Criminal information, –Educational information; –Medical Information;
FleetBoston Financial HIPAA Privacy Compliance Agnes Bundy Scanlan Managing Director and Chief Privacy Officer FleetBoston Financial.
Information Asset Classification Community of Practicerev. 10/24/2007 Information Asset Classification What it means to employees.
Guide - Recordkeeping for business activities carried out by contractors Natalie Dewson Senior Advisor Government Recordkeeping Programme Archives New.
Data Governance 101. Agenda  Purpose  Presentation (Elijah J. Bell) Data Governance Data Policy Security Privacy Contracts  FERPA—The Law  Q & A.
PROTECTION OF PERSONAL DATA. OECD GUIDELINES: BASIC PRINCIPLES OF NATIONAL APPLICATION Collection Limitation Principle There should be limits to the collection.
An Introduction to the Privacy Act Privacy Act 1993 Promotes and protects individual privacy Is concerned with the privacy of information about people.
Serving the Public. Regulating the Profession. CANADA’S ANTI-SPAM LEGISLATION (CASL) Training for Chapters Based on Guidelines for Chapters First published.
© University of Reading Lee Shailer 06 June 2016 Data Protection the basics.
Introduction to the Australian Privacy Principles & the OAIC’s regulatory approach Privacy Awareness Week 2016.
Data protection—training materials [Name and details of speaker]
Presented by Ms. Teki Akuetteh LLM (IT and Telecom Law) 16/07/2013Data Protection Act, 2012: A call for Action1.
Clark Holt Limited (Co. No ), Hardwick House, Prospect Place, Swindon, SN1 3LJ Authorised and regulated by the Solicitors Regulation.
Office of Management and Enterprise Services Central Purchasing Division Keith Gentry Contract Manager
Legal Aspects in IT Security Is Your Organisation Up-to-Date?? (Ref : IT Act, 2008 & IT Rules 2011) Adv Prashant Mali [BSc(Phy),MSc(Comp. Sci.),CNA,
Overview of Standards on Cost Auditing By: CMA Pradip H.Desai.
Nassau Association of School Technologists
Privacy principles Individual written policies
Florida Information Protection Act of 2014 (FIPA)
Privacy of Client Data.
Obligations of Educational Agencies: Parents’ Bill of Rights
Data Protection The Current Regime
Florida Information Protection Act of 2014 (FIPA)
PERSONAL DATA PROTECTION ACT 2010
Cyber Crime Laws and Mitigation of Cyber Crimes in Corporate Companies
Privacy & Access to Information
Cyber Issues Facing Medical Practice Managers
The General Data Protection Regulation (GDPR)
G.D.P.R General Data Protection Regulations
Data Protection principles
Mathew Norman, Policy & Public Affairs Officer, RLA Wales
General Data Protection Regulation “11 months in”
Colorado “Protections For Consumer Data Privacy” Law
Anatomy of a Common Cyber Attack
Presentation transcript:

India Data Privacy Law – Its impact on Business Ecosystem Shivaji Rao, Regional General Counsel, Asia PAC and Sub-Saharan Africa, John Deere.

Data Privacy & Data Security Law in India Information Technology Act (2000) & (2008) Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011 Press Note Technology (Clarification on Privacy Rules) August 2011 Credit Information Companies (regulation) Act, 2005 Credit Information Companies Regulations, 2006 Credit Information Companies Rules, 2006

Information Technology Act (2000), (2008) & 2011 Rules Important Definitions Personal information Sensitive personal data any information that relates to a natural person, which either directly or indirectly, in combination with other information available or likely to be available with a corporate entity, is capable of identifying such person. (i)password; (ii)financial information e.g. bank account/credit or debit card or other payment instrument details; (iii)physical, physiological and mental health condition; (iv)sexual orientation; (v)medical records and history; (vi)biometric information; (vii)any detail relating to the above clauses as provided to a corporate entity for providing services; and (viii) any of the information received under the above clauses for storing or processing under lawful contract or otherwise (a business entity cannot collect SPD unless it obtains the prior consent of the provider of the information. Consent must be provided by letter, fax or ).

Information Technology Act (2000), (2008) & 2011 Rules Important Provisions Consent Disclosure to 3 rd Parties Lawful Purpose Rule 5 provides that a body corporate or any person on its behalf must obtain consent in writing through letter or fax or from the provider of sensitive personal data or information regarding purpose of usage before collection. May not collect sensitive personal data or information unless collected for a lawful purpose connected with a function/activity of the body corporate or a person on its behalf and the collection is considered necessary for that purpose. Retention, and Opt Out Not to retain sensitive information for longer than is required for the purposes for which the information may lawfully be used. Providers of information have a right of review to ensure accuracy. disclosure of sensitive personal data or information by body corporate to any third party requires prior permission from the provider who has provided such information under lawful contract or otherwise, unless such disclosure has been agreed in the contract between the body corporate and provider of information (Rule 6).

Information Technology Act (2000), (2008) & 2011 Rules Important Provisions Privacy Policy Required Contents of Privacy Policy any entity or person on behalf of an entity that collects, receives, possesses, stores, deals or handles information of a provider of information, must provide a privacy policy for handling of or dealing in personal information (including sensitive personal data or information) and ensure that the same are available for view by such providers of information who has provided such information under lawful contract. Such policy must be published on the website of the body corporate or any person on its behalf. Privacy Policy must contain: (a)clear and easily accessible statements of its practices and policies; (b)type of personal/sensitive personal data or information collected under Rule 3; (c)purpose of collection and usage of such information; (d)disclosure of information, including sensitive personal data or information as provided in Rule 6; (e)reasonable security practices and procedures as provided under Rule 8. Data Protection Information collected must be protected pursuant to Rule 8.

Information Technology Act (2000), (2008) & 2011 Rules Important Provisions Data Transfer Security Practices & Procedures Rule 7 clearly indicate that ‘…may transfer sensitive personal data or information including any information …’ if any of the following conditions are satisfied: (a)the recipient entity maintains same level of security as mentioned under these Rules; (b)transfer may be allowed to perform the obligations of lawful contract; or (c)such person has been consented for data transfer. (i)Body corporate or a person shall be considered to have complied with reasonable security practices and procedures, if they have implemented such security practices and procedures and standards and have a comprehensive documented information security programme and information security policies that contain managerial, technical, operational and physical security control that are adequate to protect the nature of the business; (ii) Implementation of International Standard IEC may also fall under the compliance of this rule; (iii) The Body corporate or a person who have implemented either IEC Standard or the codes of the best practices for data protection as approved and notified shall be deemed to have been complied with reasonable security practices and procedures provided that the same have been certified or audited on regular basis by entities through independent auditor, duly approved by the Central Government.

Information Technology Act (2000), (2008) & 2011 Rules Important Provisions Breach Notification Govt Audit Rights The Information Technology (the Indian Computer Emergency Response Team and manner of Performing Functions and Duties) Rules, 2013 denotes that the following Cyber Security incidents need to be notified to CERT-In: o Targeted scanning / probing of critical systems networks / Systems o Compromise of critical systems / information o Unauthorized access of IT systems / data o Defacement of website or intrusion into a website and unauthorized changes such as inserting malicious code, link of external website etc., o Malicious code attacks such as spreading of virus / worm / Trojan / Botnets / Spyware o Attacks on servers such as Database, Mail and DNS and network devices such as Routers o Identify theft, spoofing and phishing attacks o Denial of Service (DoS) and Distributed Denial of Services (DDoS) attacks o Attacks on critical infrastructure, SCADA systems and wireless networks o Attacks on applications such as E-Governance and E-Commerce etc. The appropriate government may cause an audit to be conducted of the affairs of the service providers and authorized agents in the State at such intervals as deemed necessary by nominating such audit agencies. The audit may include security, confidentiality, and privacy of information, as well as many other things.

Information Technology Act (2000), (2008) & 2011 Rules Important Provisions Sec 72 of the IT Act, 2000 denotes regarding penalty for breach of confidentiality and privacy - Save as otherwise provided in this Act or any other law for the time being in force, any person who, in pursuance of any of the powers conferred under this Act, rules or regulations made thereunder, has secured access to any electronic record, book, register, correspondence, information, document or other material without the consent of the person concerned discloses such electronic record, book. register, correspondence, information, document or other material to any other person shall be punished with imprisonment for a term which may extend to two years, or with fine which may extend to one lakh rupees (US$ 1600 approx.), or with both. Sec 72 A Punishment for Disclosure of information in breach of lawful contract - Save as otherwise provided in this Act or any other law for the time being in force, any person including an intermediary who, while providing services under the terms of lawful contract, has secured access to any material containing personal information about another person, with the intent to cause or knowing that he is likely to cause wrongful loss or wrongful gain discloses, without the consent of the person concerned, or in breach of a lawful contract, such material to any other person shall be punished with imprisonment for a term which may extend to three years, or with a fine which may extend to five lakh rupees (US$ 8000 approx.), or with both. Enforcement Mechanism

Information Technology Act (2000), (2008) & 2011 Rules, Ctd. Important Provisions Enforcement Mechanism Sec 43 A Compensation for failure to protect data - Where a body corporate, possessing, dealing or handling any sensitive personal data or information in a computer resource which it owns, controls or operates, is negligent in implementing and maintaining reasonable security practices and procedures and thereby causes wrongful loss or wrongful gain to any person, such body corporate shall be liable to pay damages by way of compensation, not exceeding five crore rupees (US$ approx.), to the person so affected. Sec 66C Punishment for identity theft - shall be punished with imprisonment of either description for a term which may extend to three years and shall also be liable to fine which may extend to rupees one lakh (US$ 1600 approx.)

How it impacts on Business Ecosystem in India Organization Data collection Consent Data use, storage and Transfer Data security practices Privacy Policy and Access Breach Notification

Collection of Personal Data Consent Data use, storage and Transfer Data security practices Privacy Policy and Breach Notification Collection of ‘personal information’ and ‘sensitive personal data’ in the course in the course of business: Procurement - Suppliers, OEMs, Sales - Dealers, distributors, Customers, consultants, etc HR process – employees Commercial Contracts Entity Management – BODs, Sha reholders etc. Are we legally allowed to extract the publicly available data? How do we make sure that such data is legal? When collecting personal data, do you clearly inform the individual the purpose(s) for which it will be collected, used or disclosed and obtain his/her consent? Recommendation: Have an enabling covenant in the contract w.r.t data collection

Data acquisition Consent Data use, storage and Transfer Data security practices Privacy Policy and Breach Notification Consent in writing from the provider of sensitive personal data before collection.; Collect sensitive personal data for a lawful purpose and the collection is considered necessary for that purpose.; shall not retain sensitive information for longer than it is required for the purposes Recommendation: Have an enabling covenant in the contract w.r.t data collection and its purpose

Data acquisition Consent Data use, storage and Transfer Data security practices Privacy Policy and Breach Notification Consent before collection and use, For data transfer – o the recipient entity maintains same level of security; o transfer may be allowed to perform the obligations of lawful contract; or o Such person has been consented for data transfer. Reasonable security measures for data storage Recommendation: Have an enabling covenant in the contract w.r.t data use and transfer Do you have full visibility & control on – (a) personal data and SPD is collected and why? (b) who collects it? (c) how it is stored [ in country or outside country] and (d) sharing / disclosing (sales team, analytics, service providers)

Data acquisition Consent Data use, storage and Transfer Data security practices Privacy Policy and Breach Notification Comprehensive documented information security programme and information security policies that contain managerial, technical, operational and physical security control ; No retention of data longer than needed IEC standards for data security Certified or audited on regular basis by entities through independent auditor, duly approved by the Central Government. Have you reflected on (a) assessed the personal data protection risks (b) classified and secured safely, and span of access and control within your organization and put in place personal data security policies?

Data acquisition Consent Data use, storage and Transfer Data security practices Privacy Policy and access Breach Notification Any entity or person that collects, receives, possesses, stores, deals or handles information of a provider of information, must provide a privacy policy; Privacy Policy must contain: o clear and easily accessible statements of its practices and policies; o type of personal/sensitive personal data or information collected o purpose of collection and usage of such information; o disclosure of information, including sensitive personal data o reasonable security practices and procedures Practical example: Regarding drafting and implementing data privacy policy. Training to internal stakeholders is a priority

Data acquisition Consent Data use, storage and Transfer Data security practices Privacy Policy and Breach Notification Breach notification to Computer Emergency Response Team on occurrence of – Targeted scanning of critical systems networks Unauthorized access of IT systems / data Defacement or intrusion into a website Malicious code attacks such as spreading of virus Attacks on servers Attacks on critical infrastructure

Checklist / FAQs How well does your organization protects personal data & sensitive personal data? What is the action plan you have? Do you have data inventory management in place? When collecting personal data, do you clearly inform the individual the purpose(s) for which it will be collected, used or disclosed and obtain his/her consent? If you collect personal data from third parties, do you ensure that the third party has obtained consent from the individuals to disclose the personal data to you for your intended purposes? Do you limit the use of personal data collected to only purposes that you have obtained consent for? Reference:

Checklist / FAQs Do you put in place the appropriate contractual arrangements or binding corporate rules to govern the transfer of personal data overseas? Do you limit the disclosure of personal data collected to only purposes that you have obtained consent for? Have you established a formal procedure to handle requests for access to personal data? Do you have a list of third party organizations to whom personal data was disclosed and for what purposes? Have you assessed the personal data protection risks within your organization and put in place personal data security policies? Is the personal data kept in a secure manner? Do you conduct or schedule regular audits on the data protection processes within your organization? Reference:

Checklist / FAQs Have you developed and implemented data protection policies for your organization to meet its obligations under the IT Rules? Are your organization's data protection policies made available to the public? Have the individuals on your marketing list given their clear and unambiguous consent, evidenced in written or other accessible form, to being contacted by you by phone call, text messages (e.g.. SMS/ MMS) or fax for your intended telemarketing purposes? In relation to individuals who have not given their clear and unambiguous consent for telemarketing, have you established an internal process for checking with the DNC registry prior to your telemarketing campaigns? If you purchase databases of contact information from third parties for your telemarketing activities, do you ensure that the third party has obtained the necessary consents for the collection, use and disclosure of the personal data by you? Reference:

Thank You