An Overview of The Changing Data Privacy Landscape in India With Regard To The Role of Data Controllers
An Overview of The Changing Data Privacy Landscape in India With Regard To The Role of Data Controllers
919
International Journal of Pure and Applied Mathematics Special Issue
1. Introduction
The world has progressed from the Industrial Revolution, which came about
with the advent of rapid industrialisation, to the age of the Information
Revolution, which is distinguished by an economy based on information,
computerisation and digitalisation. However, increasing globalisation and
digitalisation have brought a lot of challenges. There has been an alarming rise
in cyber crimes on a global scale. With India also moving towards a digital
economy with the adoption of Aadhaar and an ever-increasing dependency on
information, the concerns over cyber security, data protection and privacy are
justified.
Further, in the wake of the Supreme Court ruling that privacy is a fundamental
right, there is a growing sense of urgency in India to have in place a proper
legislative framework to address the concerns over cyber security, data
protection and privacy. Given the growing concerns, the Central Government of
India had set up a Committee of Experts, headed by Justice B. N. Srikrishna, to
study the challenges surrounding data protection in India and provided their
valuable suggestions and principles on which to base the data privacy legislative
framework. The objective is to ‘ensure growth of the digital economy while
keeping personal data of citizens secured and protected’.(Cate & Cate 2012)
The paper identifies seven key principles on which the data protection
framework must be built:
Technology agnosticism: The law must be technology agnostic. It must
be flexible enough to take into account changing technologies and
standards of compliance.(Nettleton 2014)
Holistic application: The law must apply to both private sector entities
and the government.
Informed consent: Consent is an expression of human autonomy. For
such expression to be genuine, it must be informed and meaningful.
Data minimisation: Data that is processed ought to be minimal and
necessary for the purposes for which such data is sought and other
compatible purposes beneficial for the data subject.
Controller accountability: The data controller shall be held accountable
for any processing of data, whether by itself or by entities with whom it
may have shared the data for processing.
Structured enforcement: Enforcement of the data protection framework
must be by a high-powered statutory authority with sufficient capacity.
Deterrent penalties: Penalties on wrongful processing of data must be
adequate to ensure deterrence.
920
International Journal of Pure and Applied Mathematics Special Issue
Active data-handling corporates in India are not up to date with the evolved
structure of the new Global Data Privacy Regime Regulations and are in dire
need to update their policies in order to continue functioning securely in India.
Research Methodology
The paper recognises the need to extend the applicability of the data protection
framework to any entity that processes the personal data of Indian citizens or
residents irrespective of where they may be located. However, the extent of its
applicability is still under discussion.
921
International Journal of Pure and Applied Mathematics Special Issue
Natural/Juristic Persons
At its heart, any data privacy law has a person (data subject) and that person’s
right to privacy is what the data privacy law intends to safeguard.
In the eyes of the law, two kinds of person exist, a natural person and juristic
person.
The framework provides that the data protection legislation would apply to
only to a natural person and not a juristic person.(ITGP Privacy Team 2017)
Personal Data
‘Such types of data are termed as sensitive, and may include religious beliefs,
physical or mental health, sexual orientation, biometric and genetic data, racial
or ethnic origin and health information.’(Blume 2015)
Public Sector vs Private Sector
The paper recognises that both public and private sector entities process
personal data about data subjects. It further identifies the need to protect an
individual’s informational privacy rights through a comprehensive data
protection framework which covers both public sector and private sector
entities.(Friedewald & Pohoryles 2016)
What about Past Processing–Retrospective Application
Compliance with any law becomes mandatory after it comes into effect. The
white paper suggests that, ordinarily, the regulation will impact the processing
activities performed on data (e.g. collection, use, storage, disclosure, retention)
after the legislation comes into force. This means that all processing activities
carried out once the legislation is active will come under the ambit of the law.
922
International Journal of Pure and Applied Mathematics Special Issue
However, ensuring that the past processing activities are carried out and meet
the standards and requirements laid out under the new law remains a challenge.
To address this challenge, the paper briefly talks about the concept of a
transition period, which is provided to entities to comply with the regulation in a
consistent manner. An organisation that collects personal data from the
consumer and determines the purpose and manner in which the personal data is
to be used is a data controller. Personal data can be sent outside the boundaries
of the controller for further processing. Organisations that merely store, collect
and process data on behalf of a controller are data processors. (Friedewald &
Pohoryles 2016; Harbinja 2013)
Where does the Accountability Lie?
In such systems, control over data refers to the competence to take decisions
about the contents and use of data. An organisation that collects and processes
personal data for its business transactions can fall under two broad categories—
data controller and data processor. The framework recognises the concept of a
‘data controller’ to ensure accountability. However, the need to define ‘data
processors’, ‘third parties’ or ‘recipients’ is currently under discussion in order
to define the level of detail with which the law must allocate
responsibility.(Jackson 1997)
923
International Journal of Pure and Applied Mathematics Special Issue
The paper notes that there are certain categories of personal data which, if
compromised, may result in greater harm to an individual in the form of social,
financial and reputational repercussions. The paper recognises this requirement
as crucial to protect the interests of individuals when collecting and processing
critical data.(Iyengar 2011; Goel et al. 2017)
The paper notes that most of the comprehensive data privacy laws and
regulations have identified requirements for storage limitation and data quality
when handling personal data. However, the paper mentions that this
requirement would be identified in the Indian data protection laws at a later
stage of maturity.
Right to be Forgotten
924
International Journal of Pure and Applied Mathematics Special Issue
right to be forgotten in some form and manner. The paper also recognises the
need to incorporate this right. However, it also highlights the following areas for
discussion:
Organisations will need to have a defined and robust communication
channel (internally and externally) to be able to fulfil requests for right
to access, right to rectification, etc., within a reasonable time.
Organisations will have to completely map the capture, usage and
storage of personally identifiable information to enable the deletion of
data based on the request received from the data subject.(ITGP Privacy
Team 2017; Voigt & von dem Bussche 2017c)
The paper also touches upon the existing privacy framework in India. Rule 8 of
the SPDI Rules mentions the importance of having security controls in place in
order to safeguard sensitive personal information. This can only be achieved by
having a very comprehensive information security programme in alignment
with the current landscape of threats. (Bremmer 2018; Nicolaidou & Georgiades
2017)
Further, the importance of performing regular audits has been discussed in this
paper in order to maintain proof of compliance for data controllers. However,
the paper does not bring out the periodicity at which the audits are required to
be performed.(Giurgiu 2017; Kolah 2018)
Categorisation of Data Controllers
The paper also calls out various obligations of a data controller, including:
Registering with the supervisory authority,
Conducting data protection impact assessments before processing
personal data that could pose potential risks to individuals,
925
International Journal of Pure and Applied Mathematics Special Issue
However, the paper also understands and emphasises the fact that the above-
mentioned aspects can only be applicable in cases where the data controller
processes high volumes of data or performs high-risk processing activities.
With respect to data protection audits, the paper proposes that data protection
audits may be conducted by third parties or by the regulators themselves.
Importantly, the paper also highlights the need for external auditors who are
registered/empanelled with a data protection authority to maintain oversight in
companies.
Data breach notifications: The paper calls out the significance of defining a
personal data breach and has provided some guidance on it. There is also
reference to the EU GDPR and US laws to bring in a broader perspective on a
personal data breach, which is nothing but a subset of a security breach. For
example, all security breaches may not be data privacy related breaches. 1(Dixon
2017) However, every personal data breach is a security breach. Thus, it is
important to have a comprehensive information security programme, as
mentioned in the previous section.(Mittal et al. 2017)
Adjudicating Process
The paper stresses the importance of adjudication as an integral part of any law
enforcement and ascertains the rights and obligations of parties involved in a
dispute, prescribing corrective actions and remedies. Various geographies have
identified and granted powers to a commission or a supervising authority to
regulate and investigate complaints relating to the breach of any rights of a data
1
926
International Journal of Pure and Applied Mathematics Special Issue
subject.(Anon n.d.)
Penalties, Compensation and Offences
The paper highlights the shortcomings of the IT Act, 2000 (and subsequent
amendments to it in 2008 and 2011), in relation to data protection violations.
Based on the inputs from other legislations, the paper has put forward three
different models for the calculation of civil penalties.
The first two models proposed in the paper mostly refer to the models followed
by other regulations. However, the most interesting model is to have penalties
per day, which could be the highest form of deterrence, with a major impact on
small and medium business (SMB). (Naqvi et al. 1992)With respect to
compensation, the paper refers to section 43A of the IT Act, 2000, and clearly
calls out factors that are being used by adjudicating officers to arrive at
compensation. However, it is very clear that these aspects are only applicable to
body corporates and not to government entities and public authorities. The
proposed framework should look to have more stringent models around this by
adopting similar points from other regulations such as the EU GDPR and the
UK Data Protection Act.(Voigt & von dem Bussche 2017a)
At the given point in time, there is no clarity on what activities could qualify as
criminal offences under the proposed data protection framework. The view is
that there should be more stringent penalties and compensation in cases where
sensitive personal information is recklessly disclosed or sold by
organisations.(Voigt & von dem Bussche 2017a; Voigt & von dem Bussche
2017b)
It remains to be seen how the enforcement model will be designed and how the
penalties will be enforced. However, we can reasonably assume that large
organisations, such as major telecom, banking, healthcare and IT/ITeS
organisations, will need to consider stringent data breach notification norms,
along with higher penalty limits in case of any offences.
5. Conclusion
Given the proposed regulations in the white paper on ensuring the data privacy
of individuals, it is very important that organizations start aligning their
processes and IT investments in such a way that the regulation, once enacted,
does not affect them. Although the paper does not clearly outline anything on
past processing activities or retrospective action, CIOs/CISOs are advised to see
how capable their existing IT infrastructure is and what it requires to handle the
changing data privacy landscape in India.(Mraznica 2017)
927
International Journal of Pure and Applied Mathematics Special Issue
dem Bussche 2017a). Different norms of privacy can exist in different spheres
of life. For example, an individual may be willing to disclose certain things to a
doctor or psychologist that she would not even tell her spouse or friends. Rules
of data protection and privacy are designed in such a way that they allow
individuals the freedom to determine how their personal information will be
collected, used and disclosed. This is because individuals themselves are best
equipped to understand how they will be benefited or harmed in the many
unique contexts which involve their personal information.(Voigt & von dem
Bussche 2017d)
As the paper is based on global best practices on data protection from the
European Union, especially the upcoming GDPR, the United Kingdom, Canada
and the United States, organizations can start referring to business cases in these
markets and understand how they have defined processes and planned IT
investments. In the new data protection regime, timely planning/action will help
them to continue their business as usual, protect them from penalties and
enhance business reputation, particularly in the light of the proposed data trust
scores that will be assigned to organizations.
References
[1] Abraham, S. & Hickok, E., 2012. Government access to private-
sector data in India. International Data Privacy Law, 2(4),
pp.302–315.
[2] Anon, GDPR ENFORCEMENT. In EU General Data Protection
Regulation (GDPR): An Implementation and Compliance Guide -
Second edition. pp. 280–292.
[3] Blume, P., 2015. An alternative model for data protection law:
changing the roles of controller and processor. International Data
Privacy Law, 5(4), pp.292–297.
[4] Bremmer, I., 2018. Us vs. Them: The Failure of Globalism,
Penguin UK.
[5] Cate, F.H. & Cate, B.E., 2012. The Supreme Court and
information privacy. International Data Privacy Law, 2(4),
pp.255–267.
[6] Dixon, P., 2017. A Failure to “Do No Harm” -- India’s Aadhaar
biometric ID program and its inability to protect privacy in relation
to measures in Europe and the U.S. Health and technology, 7(4),
pp.539–567.
[7] Friedewald, M. & Pohoryles, R.J., 2016. Privacy and Security in
the Digital Age: Privacy in the Age of Super-Technologies,
Routledge.
[8] Giurgiu, A., 2017. GDPR Implementation Series ∙ Luxembourg:
Reshaping the National Context to Adjust to the GDPR.
928
International Journal of Pure and Applied Mathematics Special Issue
929
International Journal of Pure and Applied Mathematics Special Issue
930
931
932