An Overview of The Changing Data Privacy Landscape in India
An Overview of The Changing Data Privacy Landscape in India
An Overview of The Changing Data Privacy Landscape in India
in
[]
Introduction 5
1. Scope and exemptions 6
2.1. Consent 9
2.2. Other grounds for processing 9
2.3. Children’s personal data 9
2.4. Notice 10
2.5. Purpose specification and use limitation 10
2.6. Sensitive personal data 11
2.7. Storage limitation and data quality 11
2.8. Individual participation rights 12
2.9. Right to be forgotten 12
2.10. Cross-border transfer 13
2.11. Globalisation vs localisation 13
Conclusion 16
Executive Summary
Technology is one of the major forces transforming
our lives. However, its misuse causes detrimental Accountability
effects. The digital era has opened up a Pandora’s box In addition to policies, procedures and
of various concerns such as Data Theft, Scams, processes, a well configured and
Eavesdropping, Cyberbullying, to name a few, with comprehensive technology stack helps
the overarching concern on the intrusion to the an Organization to demonstrate how it
privacy of Individuals. protects and safeguards personal data. It
In an Indian context, various factors such as Nuclear is vital for Organizations to plan, assess
families and cultural views, have for ages, stifled the and evaluate its existing technology
need for personal space and privacy. However, stack so that it may be leveraged to
urbanization, digitization and changing lifestyles ensure and demonstrate compliance
have resulted in a growing demand amongst Indians with the Data protection law once it
for Privacy and protection of the Information they becomes effective.
share, specifically on digital platforms.
Data Lifecycle management
In the wake of recent developments and the Supreme
Court holding 'Right to privacy' as a fundamental Many Organizations are assessing
right lays the corner stone for a strong data privacy existing/ new technical systems to
regime in India. The data protection framework, effectively manage the lifecycle of
proposed by the Committee of Experts under personal data they process within their
the chairmanship of former Supreme Court judge environment, starting from data
Shri B N Srikrishna, is the first step in India's Data discovery to storage, transfer, retention
Privacy journey. and finally disposal. These systems help
Organizations have end-to-end visibility
While it is not possible to deter the growth and use of the personal data received from
of technology, it is important to strike the right multiple channels and have control over
balance between the digital economy and privacy it. This would go hand in hand in
protection which is the key objective of the Data ensuring compliance to some of the key
Privacy Framework. requirements, under the proposed data
privacy framework, such as 'Processing
Technology as an enabler
Sensitive Personal Data', 'Purpose
for compliance specification, use & limitation', 'Data
The key objective of the proposed data Retention & Quality' etc.,
privacy framework is “to ensure growth of the digital
economy while keeping personal data of citizens Case Management
secure and protected”. In the current scenario where Organizations should evaluate and
everything is moving into the digital space, it is implement technical systems for
important for us to move from manual processes to managing data subject requests,
more automation. In the arena of data protection complaints and communications
& privacy, technology serves as a key enabler surrounding emergencies
to ensure and demonstrate compliance. Listed below including personal data breaches as a
are 7 key ways that provide Organizations with step to plan ahead and demonstrate
practical assistance on how to build data protection compliance once the proposed
into technology. framework becomes effective
Breach Management
Organizations should evaluate
existing/new technologies which will in
real time detect, manage and resolve
breaches (e.g. identify breached data,
identify impacted users and notify all
relevant parties).
Introduction
The world has progressed from the Industrial The paper released by the committee is based on
Revolution, which came about with the advent of global best practices on data protection from the
rapid industrialisation, to the age of the Information European Union (EU), especially the upcoming
Revolution, which is distinguished by an economy General Data Protection Regulation (GDPR), the
based on information, computerisation United Kingdom, Canada and the United States.
and digitalisation.
However, increasing globalisation and digitalisation The paper identifies seven key principles
have brought a lot of challenges. There has been an on which the data protection framework
alarming rise in cybercrimes on a global scale. With must be built:
India also moving towards a digital economy with the
adoption of Aadhaar and an ever-increasing 1. Technology agnosticism: The
dependency on information, the concerns over cyber law must be technology agnostic. It
security, data protection and privacy are justified. must be flexible enough to take into
account changing technologies and
Further, in the wake of the Supreme Court ruling that standards of compliance.
privacy is a fundamental right, there is a growing
sense of urgency in India to have in place a proper
legislative framework to address the concerns over 2. Holistic application: The law
cyber security, data protection and privacy. must apply to both private sector
entities and the government.
Given the growing concerns, the Central Government
of India had set up a Committee of Experts, headed 3. Informed consent: Consent is an
by Justice B. N. Srikrishna, to study the challenges expression of human autonomy. For
surrounding data protection in India and provide such expression to be genuine, it
their valuable suggestions and principles on which to must be informed and meaningful.
base the data privacy legislative framework. The
objective is to ‘ensure growth of the digital economy
while keeping personal data of citizens secured 4. Data minimisation: Data that is
and protected’. processed ought to be minimal and
necessary for the purposes for which
On 28 November 2017 the committee released a such data is sought and other
white paper seeking public comments on the compatible purposes beneficial for
recommendations made on the draft data the data subject.
protection framework.
The paper is divided into three major parts: 5. Controller accountability: The
data controller shall be held
Part II – Scope and exemptions; accountable for any processing of
Part III – Grounds of processing, obligations on data, whether by itself or by entities
entities and individual rights; and with whom it may have shared the
data for processing.
Part IV – Regulation and enforcement.
Each part consists of brief notes on various aspects 6. Structured enforcement:
envisioned to be a part of the data protection Enforcement of the data protection
framework. Each note, in turn, sets out the key issues framework must be by a high-
that need to be considered, international practices powered statutory authority with
relevant in this regard, provisional views of the sufficient capacity.
committee based on its research and deliberations,
and questions for public consultation. 7. Deterrent penalties: Penalties on
wrongful processing of data must be
Through this white paper, we have attempted to
provide a glimpse of the committee’s vision in the adequate to ensure deterrence.
data protection framework, along with our
perspective on the challenges that may be faced by an
organisation in complying with the framework.
1.6. What will processing under the 1.7. Where does the
new bill imply? accountability lie?
The paper broadly classifies the processing of Accountability is a central principle in data
personal or sensitive data about natural persons into protection. To translate data protection norms into
three categories: action, a widely used method is to identify the party
accountable for compliance with these norms. For
Collection, this purpose, the concept of control over data is used.
Use, In such systems, control over data refers to the
Disclosure. competence to take decisions about the contents and
use of data.
While the law may not attempt to exhaustively list
operations that constitute processing, the framework An organisation that collects and processes personal
recognises that: data for its business transactions can fall under two
broad categories—data controller and data processor.
Processing shall also cover operations/activities
incidental to the above operations. The framework recognises the concept of a ‘data
controller’ to ensure accountability. However, the
Processing would imply both manual and need to define ‘data processors’, ‘third parties’ or
automated processing. ‘recipients’ is currently under discussion in order to
define the level of detail with which the law must
allocate responsibility.
2.4. Notice
E-commerce websites, social networking Despite considerable discussion on and criticism of
platforms and travel portals, amongst other privacy notices, the paper recognises it as the means
businesses, would be specifically impacted by the of placing individuals in a position that allows them
outcome of this regulation. Specific requirements to make an informed decision about the collection
such as clearly differentiating a child from an and use of their personal data. Like various laws, the
adult, parental consent options and higher data paper provides that a privacy notice should be
protection standards could pose challenges with designed keeping the end user always in mind.
respect to operationalisation. Organisations Further, it also recognises the need for privacy
therefore need to relook at their current notices to be concise, intelligible and provided in
processing methods and tailor their methods to an easily accessible form. The paper has also put
ensure compliance. forth the following views that are currently
under discussion:
Define requirements on the form and substance
of the notice.
Key impacts
Require data protection authorities to
issue guidelines and codes or practice to
Children’s personal data guide organisations in designing effective
privacy notices.
Organisations processing children’s personal data,
either incidentally or for specific purposes, will be Use privacy impact assessments and other
required to: enforcement tools to evaluate the effectiveness of
privacy notices.
1. Implement appropriate measures to verify the
age of data subjects from whom they are Assign data trust scores to organisations.
collecting personal data.
Set up a consent dashboard to allow greater
2. Implement appropriate measures to obtain transparency and visibility to individuals.
valid parental consent prior to processing a
child’s personal data. 2.5. Purpose specification and
3. Implement appropriate organisational and
use limitation
technical measures to: The paper notes that there are several operational
issues in ensuring that personal information is only
Secure personal data.
obtained for a specific purpose and the use is limited
Ensure that children’s personal data is not in alignment with the purpose. It identifies three
utilised for purposes of tracking, major issues faced by companies that need to be
advertising and marketing. considered by regulators:
Notice Technical changes/advancements may result in
a new purpose.
Organisations will be required to:
Companies face operational hassles in
1. Issue privacy notices to all data subjects prior
assessing the delta between the original purpose
to the collection or use of their personal data.
and new purpose.
2. The notice should be designed in a manner
that is easily understood by the data subject. Purpose specification for companies is a
challenging activity as data may be used for
several related purposes.
Keep track of guidelines that may be issued by
data protection authorities.
The paper recognises this requirement as critical in 2.7. Storage limitation and
ensuring individuals rights while limiting the data quality
collection, use and disclosure of their personal data.
It suggests the use of a privacy notice which provides The paper notes that most of the comprehensive data
links to more detailed notice practices and prohibits privacy laws and regulations have identified
processing for other purposes. The paper highlights requirements for storage limitation and data quality
the need for discussion on the following: when handling personal data. However, the
paper mentions that this requirement would be
Need to define standards and guidance for identified in the Indian data protection laws at a later
data controllers. stage of maturity.
How to determine whether a subsequent use of In addition, the paper identifies the following topics
data is reasonably related to/compatible with the for discussion:
primary purpose.
Need to issue guidelines for clarity
2.6. Sensitive personal data of implementation;
The paper notes that there are certain categories of Exception requirements to be identified for data
personal data which, if compromised, may result in quality and accuracy.
greater harm to an individual in the form of social,
financial and reputational repercussions. The paper
recognises this requirement as crucial to protect the Key impacts
interests of individuals when collecting and
processing critical data.
Purpose specification and use limitation
However, the paper identifies the following topics
for discussion: 1. Organisations will need to define the
purpose of collection and processing of
Evaluation of personal types categorised as personal data and limit usage of data in line
sensitive under section 43 A of the IT Act (SPDI with the purpose.
Rules) in the context of the Indian socio-
2. Implement adequate organisational processes
economic environment;
and controls to assess that data is used in
Need to identify controls for protection while compliance with the original purpose and
processing sensitive personal data. identify any new purposes if applicable.
Processing sensitive personal data
1. Organisations will need to define a process to
Organisations processing sensitive data, such as identify and limit the collection of sensitive
medical/healthcare, behavioural, demographic personal data.
and financial data, will see additional 2. Implement adequate organisational processes
requirements being placed on them under the and security controls (e.g. pseudonymisation)
proposed framework. to ensure informed consent by individuals and
The penalties in case of any offences related to secure processing of sensitive data types.
sensitive personal data are also going to be higher. Storage limitation and data quality
1. Organisations will need to have a clear
understanding of the purpose(s) for the
collection and processing of personal data.
Based on the purpose, a retention schedule
and guidelines will have to be defined
and adhered to.
2. Implement adequate organisational processes
and controls to ensure the accuracy and quality
of personal data collected and processed.
Conducting data protection impact assessments Registering with the supervisory authority;
before processing personal data that could pose Conducting data protection impact
potential risks to individuals, assessments before processing personal data
Conducting data protection audits, that could pose potential risks to individuals;
Appointing data protection officers, etc. Conducting data protection audits; and
However, the paper also understands and emphasises Appointing data protection officers.
the fact that the above-mentioned aspects can only be
applicable in cases where the data controller
processes high volumes of data or performs high-risk
processing activities.
3.4. Various tools proposed With respect to compensation, the paper refers to
for enforcement section 43A of the IT Act, 2000, and clearly calls out
factors that are being used by adjudicating officers to
Data breach notifications: The paper calls out the arrive at compensation. However, it is very clear that
significance of defining a personal data breach and these aspects are only applicable to body corporates
has provided some guidance on it. There is also and not to government entities and public
reference to the EU GDPR and US laws to bring in a authorities. The proposed framework should look to
broader perspective on a personal data breach, which have more stringent models around this by adopting
is nothing but a subset of a security breach. For similar points from other regulations such as the EU
example, all security breaches may not be data GDPR and the UK Data Protection Act.
privacy related breaches. However, every personal
data breach is a security breach. Thus, it is important
to have a comprehensive information security Key impacts
programme, as mentioned in the previous section.
1. Penalties for non-compliances may be
calculated in a manner that ensures that the
The interpretation of the security framework quantum of civil penalty imposed acts not only
(such as ISO 27001, NIST) required to offer as a sanction but also a deterrent to data
adequate safeguards to its data subjects is left to controllers who have violated their obligations
the organisation. under a data protection law. The quantum of
penalty/compensation is not specified in
this whitepaper.
Conclusion
Given the proposed regulations in the white paper on As the paper is based on global best practices on data
ensuring the data privacy of individuals, it is very protection from the European Union, especially the
important that organizations start aligning their upcoming GDPR, the United Kingdom, Canada and
processes and IT investments in such a way that the the United States, organizations can start referring to
regulation, once enacted, does not affect them. business cases in these markets and understand how
Although the paper does not clearly outline anything they have defined processes and planned IT
on past processing activities or retrospective action, investments. In the new data protection regime,
CIOs/CISOs are advised to see how capable their timely planning/action will help them to continue
existing IT infrastructure is and what it requires to their business as usual, protect them from penalties
handle the changing data privacy landscape in India. and enhance business reputation, particularly in the
light of the proposed data trust scores that will be
assigned to organizations.
Contacts
All images in this presentation are protected by copyright, trademark, patent, trade secret and other intellectual
property laws and treaties. Any unauthorised use of these images may violate such laws and shall be punishable
under appropriate laws. Our sharing of this presentation along with such protected images with you does not
authorise you to copy, republish, frame, link to, download, transmit, modify, adapt, create derivative works based on,
rent, lease, loan, sell, assign, distribute, display, perform, license, sub-license or reverse engineer the images. In
addition, you should desist from employing any data mining, robots or similar data and/or image gathering and
extraction methods in connection with the presentation.
At PwC, our purpose is to build trust in society and solve important problems. We’re a network of firms in 158
countries with more than 2,36,000 people who are committed to delivering quality in assurance, advisory and tax
services. Find out more and tell us what matters to you by visiting us at www.pwc.com.
In India, PwC has offices in these cities: Ahmedabad, Bengaluru, Chennai, Delhi NCR, Hyderabad, Kolkata, Mumbai
and Pune. For more information about PwC India’s service offerings, visit www.pwc.com/in
PwC refers to the PwC International network and/or one or more of its member firms, each of which is a
separate, independent and distinct legal entity in separate lines of service. Please see www.pwc.com/structure for
further details.
©2018 PwC. All rights reserved.
GG/January 2018-11554