Consumer Data Privacy
Consumer Data Privacy
Consumer Data Privacy
®
A NASSCOM Initiative
2. Introduction 5
9. Recommendations 20
Citations 22
References 22
The momentum of digitization witnessed among various business sectors has led to unprecedented amount of
collection, processing, sharing and exchanging of consumer information. While data is central to the process of
digitization, it is important to incorporate data privacy centric designs for security and privacy, especially keeping
in mind the growing regulatory interventions in this space. While organizations tend to take adequate measures
to protect consumer privacy, consumer data is increasingly crossing the organizational boundary due to the
ubiquitous nature of digitization. Regulatory requirements, obligations and liabilities are increasingly making
organizations accountable for consumer privacy. For successful digitization, garnering confidence of consumers
and satisfying increasing obligations, enterprises should look for extending their reach of privacy protection
beyond their organizational boundary. They should enable consumers with instruments, tools and alternatives to
protect their data in diverse operating environments.
Strong waves of digitization are being witnessed in almost all sectors like e-commerce, e-governance, retail,
telecom and even oil and energy, with the BFSI sector seems taking the lead in it. Expansion of communication
and Internet services remains as a key driver behind this revolution. As per the recent IAMAI KANTAR-IMRB
report[1], the number of mobile Internet users in India are expected to reach 478 million by June 2018. This surge
of digitization has made a significant impact on the digital payment ecosystem as well. For the financial year
2017-18, the transactions using the Unified Payment Interface (UPI) numbered INR 856.59 Billion in value and
737.18 Million in volume (NPCI, Digital Payments Statistics, 2017)[2].
Mobile
478 Million
Internet
by June 2018
Users
Value:
856.59 Billion Million Transactions
The principles and corresponding obligations and liabilities would ensure that
enterprises take due care to protect the information in their environment. The
information collected and processed is also exchanged and shared with the Consumers equipped
consumer. Because of increasing digitization, the quantum, complexity and with techniques to
frequency of the shared information is rising significantly. However, in the secure their personal
consumer environment, information is likely to lose the level of protection information would
seen in the enterprise environment. Information in the consumer environment unleash many new
is emerging as a key cause of concern. Although regulatory standards are not possibilities of
digitization.
fully evolved to take care of privacy issues in the consumer environment,
they have been hinting in that direction. Adoption of ‘accountability’ as a
privacy principle gives testimony of that. The paradigm of privacy protection
is changing to make enterprises accountable for the protection of privacy. The new General Data Protection
Regulation (GDPR), which would be enforced in the EU in May 2018, has already adopted ‘accountability’ as a
principle of privacy. It advocates enterprises to have proactive approach for protecting personal information. It
hints that the enterprises should walk extra miles to protect consumer data. Traces of this paradigm is also
witnessed in other parts of the world. In India, a RBI circular published in July 2017, limits the customer liability
when unauthorized transactions occur because of a fraud, where the deficiency is neither with the bank nor with
the customer. It is also important to note that the Justice Shri Krishna committee established to frame a data
protection legislation for India has balancing privacy of individuals in an ever-evolving digital economy as its
fundamental task.
The new paradigm of shifting the liability of security and privacy to the enterprises is likely to demand protection
of data irrespective of where it lies. Organizations may have to go beyond their boundaries to protect consumer
data. If organizations are inventing ways to secure the consumer data, even though it leaves organizational
boundary and equip consumers with tools to protect their data, it would certainly help them stand high in their
compliances. Moreover, these positive actions will certainly instill consumer confidence on digitization. The
confidence of customer would certainly unleash many new possibilities of digitization.
Enterprise Consumer
Environment Environment
Applications
Sharing
Sharing
Databases
Statements | Bills | Receipts
Transaction Notifications Endpoints
Networks
Processing
Accessing
Receiving
SMS
Messaging
Systems Web Access
Email System
Mobile App
Collection
Storing
Servers
Mobile App
Reports | Results | Returns
Endpoints Claims | Itineraries | Pay Slips
Consumer environment, on the other hand, typically involves endpoints, Internet connectivity, messaging systems
and possibly mobile applications. These systems receive documents delivered by the companies. Consumers
download and store these documents. The documents reside in the email box, local storages and mobiles of the
customer. They may share the document with third parties for various purposes.
i Banking
Disruptive penetration of web and mobile technologies has ushered the growth of online banking.
Internet banking or virtual banking enables customers of a bank or financial institution to conduct wide
range of financial transactions through their websites. Convenience and ease of use has ushered the wide
adoption of online banking.
˩˩ Many banking institutions deliver account statements, credit card bills, transaction statements,
bank balance, etc. to consumers through email attachments and downloadable links.
˩˩ The digitization push has increased the frequency and volume of transactions. The transaction
generated data reveals critical information of consumers, from his or her financial status to spending
behavior. Often such data is stored locally on the consumer’s devices.
˩˩ Consumers tend to share the data files with third parties like financial consultants, wealth
managers, etc. This data is also sought for various purposes such as availing loans or getting high
value financial products.
˩˩ Insurance sale is increasingly becoming digital; policies are delivered to the customers over
electronic channels. Various set of information is delivered to the consumer during the tenure of the
policy. Access is provided to the customer for viewing and downloading information. Customers use
downloaded policy documents for various purposes.
˩˩ Mutual fund houses or associated aggregation agencies deliver documents to its customers at a
regular interval, informing the status and performance of investment.
˩˩ In the consumer environment, these documents can be found either on consumer devices or in their
emails.
Many organizations have modernized their internal operations for better employee experience and care.
˩˩ Organizations share personal financial information of their employees like Pay slips, Income Tax
returns, Health Benefits related claims, etc.
˩˩ The information is delivered either as email attachments or downloaded from an internal portal.
˩˩ These documents would reside on the devices or in the emails of the employees. They would possibly
share these documents for various purposes, as any consumer would do.
IV Healthcare
Hospitals and health care organizations like diagnostic centers embrace digitization to provide better
patient care.
˩˩ Hospitals provide digitized copies of reports, diagnosis results, treatment schedules, etc. to patients.
˩˩ Rise of personal digital health technologies contribute towards generating health information. This
information is delivered through various forms.
˩˩ Continuous health monitoring requires collection, transmission, syncing and storing data on multiple
devices. Hospitals would either do it on their own platform or use third party platforms. Patients
are often given access to these platforms from where they would download these documents on
their devices. Health sensitive documents would reside on the consumer’s device or in their emails.
The platforms may provide them the facility of providing access to information to other hospital or
doctors as well.
V E-Governance
Governments and their affiliated organizations also embrace digitization to provide citizens better
Governance.
˩˩ Many government agencies collect consumer information for providing various services like:
˩˩ Digital locker services introduced by the central government provide a platform for storage, sharing
and verification of documents and certificates. DigiLocker platform already enlists 36 document
issuers. Government departments or agencies, educational institutions and financial institutions
registers themselves as an issuer on the platform. Central Board of Direct Taxes [CBDT], education
board like CBSE, driving license issuing authorities, vehicle registration, etc. are some examples of
issuers and verifiers on the DigiLocker.
˩˩ Citizens avail these services either by going to digital delivery channels of the individual publics
service providers, issuer and verifier or rely on public service aggregator applications like Umang.
˩˩ Mobile has emerged as a key channel for delivery of such services. The digital documents delivered
by public authorities are critical for the citizens. These documents are either delivered over the
email or available for download on the websites and mobile applications. These documents reside
on consumer devices and in their emails. These documents would be extensively shared by the
citizens.
VI Travel
Online travel booking has made it very easy to plan personal vacations or business trips. These services
are also mostly delivered digitally.
˩˩ Digital agencies that provide travel and hotel services collect personal information from their
consumers for travel booking and providing travel itineraries
˩˩ Travel itineraries and plans are delivered to the users over email, SMS and mobile applications
˩˩ Hospitality platforms also provide a whole new experience to the travelers by aggregating inventories
available for their stay. They exchange data with consumers on their bookings and bills.
˩˩ Statement of bill is generated digitally and delivered to consumers over email and through links for
downloading the bills.
˩˩ Utility bills are also critical for consumers, as in many cases, they are treated as an address
verification proof.
˩˩ The digital copies of the bill often reside on the devices and in the emails of the consumer.
Disk Encryption
Full Disk Encryption (or Folder/File level encryption) is another promising technology for safeguarding consumer
files. Although such techniques offer good security locally, there is no guarantee that consumer would encrypt his
or her disk. Even if consumers encrypt their local disk, it would not work when files need to be shared with a third
party (ex: Tax Consultant). Files once shared; consumers do not have control over the data. The receiving party
may not enable necessary protection. Also, numerous challenges such as complicated user experience, tedious
key management and lack of necessary expertise among the consumers make usage of the current encryption
techniques very difficult.
Cloud Storage
Rapid explosion of Cloud Storage services like DropBox, Box, Google Drive, etc. make it very easy to share data
with others and ensure backups. While these platforms offer security capabilities, consumers lose control over
the offline copies made by third parties after sharing and syncing. Also, numerous breaches have been reported
in recent past where consumer’s data has been publicly exposed on the Internet.
Shared data files expose consumers to various security risks as mentioned below:
(i) Opening, storing and sharing document with one password jeopardize security of data within the
file
(ii) Data files shared with different entities often remain with them even when the purpose is over
(iii) Once shared, consumers would loose control over the security of data files
(iv) Tracking the files shared and stored over devices may not be easy for the consumer
(v) Assurance over security of the files shared on channels like email clients may not be easy
(ii) Malware
Modern malware is much more sophisticated in its ways, especially in data exfiltration. Malicious programs
like keyloggers once installed in consumer devices can steal critical data and upload to a remote server of
attacker’s choice.
(iii) Ransomware
Ransomware is another powerful form of Malware that can be destructive and devastating in nature as
seen in recent times. Consumer’s data could be held for a ransom amount and unlocking it may not be
always ensured despite paying the ransom. Further, data once destructed is hard to recover unless necessary
backups are maintained.
(iv) Cybercrime
Lack of adequate controls on private data also rises many forms of cybercrimes like cyber bullying, online
trolls, credential abuse, etc. If data is leaked, the consumer may experience much serious harm.
(i) Digitization opens organization to a variety of new possibilities and purposes, which would make access to
data quite liberal. It might require sharing data with new entities, providers and ecosystem partners. The
data would be moving out of the organization’s boundary quite often. It might move to an environment that
is not inherently secure or not equipped with tools to secure the data.
(ii) Continual and forceful drive for digitization would invent new channels and ways to share or deliver data.
Extending existing security and privacy controls to this channel may not be easy. However, without it,
consumer data may not get the necessary protection.
(iii) The regime of data centric digitization drive would generate volumes of data. The data set would be
increasingly complex and interdependent. Satisfying security and privacy expectations in increasing volume
and complexity of data would be difficult. Because of privacy liabilities, enterprises are likely to deploy
necessary safeguards for consumer data in their environment. However, once data leaves its boundaries, it
leaves behind the protection. Because of the quantum and complexity, if protection is not extended beyond
the boundaries of the enterprises, it would lead to serious consequences.
(iv) Ecosystem players in the drive of digitization would also be delivering data. Data files would be increasingly
exchanged with these players for various purposes like identification and verification. Data will be exchanged
between multiple environments; not only among the enterprise and consumer environments. If the desired
level of protection doesn’t travel along with data, it would raise many doubts on the extending ecosystem
and players innovating under it
“Banks, as owners of such data, should take appropriate steps in preserving the Confidentiality, Integrity
and Availability of the same, irrespective of whether the data is stored/in transit within themselves or with
customers or with the third-party vendors; the confidentiality of such custodial information should not be
compromised at any situation and to this end, suitable systems and processes across the data/information
lifecycle need to be put in place by banks.” [3]
Although it is commendable that the framework brings out the much-needed attention to protection of the
data with consumers off the network. The framework does not elaborate beyond on how such measures
could be achieved. RBI’s guidance on limiting liability of consumers is a welcome step. However, it may need
to evolve further to address specific issues of privacy in consumer environment.
˩˩ PA-DSS is for software vendors and others who develop payment applications that store, process or
transmit cardholder data and/or sensitive authentication data as part of authorization or settlement,
when these applications are sold, distributed or licensed to third parties
(iii) HIPAA
Health Insurance Portability and Accountability Act (HIPAA) has been enacted by the United States Congress.
HIPAA allows use and/or disclosure of Protected Health Information(PHI) for treatment, payment and
health care operations by hospitals and healthcare organizations. HIPAA verbosely defines patient rights for
disclosure of PHI information. HIPAA does not provide recommendations on data protection once the PHI is
delivered to Consumers.
(iv) GLBA
The Financial Services Modernization Act of 1999 or GLBA addresses financial data privacy and security by
establishing standards for safeguarding customers’ ‘non-public personal information’ (NPI) or personally
identifiable financial information stored by ‘financial institutions’, and by requiring financial institutions to
provide notice of their information-sharing practices. In addition, financial institutions can disclose your
information to credit reporting agencies, financial regulatory agencies, as part of the sale of a business, to
comply with any other laws or regulations, or as necessary for a transaction requested by the consumer.
However, there is no specific mention of how security is guaranteed when the information is delivered to
other organizations.
An APP entity must take reasonable steps to protect personal information it holds from misuse, interference
and loss, as well as unauthorised access, modification or disclosure.
Steps and strategies which may be reasonable to take appropriate security safeguards and measures
for protecting personal information need to be fully considered in relation to all of the entity’s acts and
practices. The protection of data in the consumer environment might fall under reasonable and appropriate
security safeguards and measures.
(vi) Japan
The Act on the Protection of Personal Information (“APPI”) requires that business operators prevent the
leakage of personal data. The APPI does not set forth specific steps that must be taken. Ministry guidelines
impose specific steps that business operators should take to ensure that personal data is secure. The
guidelines on this point are under preparation. These guidelines might evolve in the future to incorporate
aspects of consumer environment.
Objectives of data privacy should be changed to include the requirements of protection in the consumer
environment. The digitization plans wouldn’t get materialized if consumer data is insecure, no matter it lies
within or beyond boundaries of enterprises. Utility of the data generated by processing consumer transactions is
increasingly becoming important for digitization. As the data provides insights of the consumers’ behavior and
their spending characteristics, new financial products would be increasingly designed to match the behavior and
characteristics. This would increase sharing of transaction generated data multi-fold. Public service authorities
are likely to add significant volume and complexity to the data that would be shared. In fact, the dream of one
trillion-dollar digital economy lies in the ability of sharing data in more elastic ways. However, it would have
to satisfy the condition of maintaining the desired level of security and privacy. Security of data in consumer
environment would play an important role. The figure below illustrates the data privacy objectives for providing
protection in the consumer environment.
ENTERPRISES REGULATOR
As key differentiator & to stand Digital Rights
Adoption of Accountability
high on privacy compaliances Management
principles for privacy implementation
To gain confidence of consumer
Promotion of evolving
for realizing digitization possibilities Customer
practices of consumer privacy
Centric File
Security Advocacy of positive actions:
privacy by design & privacy
enabling technologies
CONSUMER Handing over
the Controls Compliance recognition
Use tools, instruments & adopt to the Consumer of technologies promising better
best practices to secure data consumer privacy
Assess enterprises providing better
alternate to secure data
The role of regulator, enterprise and consumer in improving data privacy posture in the consumer environment is
illustrated in the figure below.
2. NPCI, Digital Payments Statistics, 2017) - Retail Payments Statistics on NPCI Platforms
https://www.npci.org.in/statistics
References
1. Payment Card Industry Data Security Standards (PCI-DSS)
https://www.pcisecuritystandards.org/documents/PCIDSS_QRGv3_2.pdf
2. Health Insurance Portability and Accountability Act – U.S. Dept. of Health Sciences.
https://www.hhs.gov/hipaa/for-professionals/security/laws-regulations/index.html