Data Protection Act 2023 Presentation
Data Protection Act 2023 Presentation
Page 2
The Digital Personal Data Protection Act, 2023
What’s the buzz- Recent data breaches
Nov 2023
Oct
2023
May
2023
April
2023
March 2023
Building strong privacy governance programs is not only a reputational and business risk requirement but is also an integral part of building a
transparent and long-term sustainable organization of the future.
Taj Hotels Suffer Data Breach, Personal Data Of 15 Lakh People At Risk - News18
ICMR data leak reveals personal info of 81.5 cr Indians: Report, ET HealthWorld (indiatimes.com
RentoMojo security breach exposes user data; hackers claim financial details leaked - The Hindu
Zivame data breach: Personal info of thousands of Indian women customers up for sale online - India Today
RailYatri penalised for data leak, app restored after security measures (business-standard.com)
Page 3
The DigitalPersonal
The Digital Personal Data
Data Protection
Protection Act, Act,
20232023
- An Overview
An overview
Journey so far
Ministry of Electronics and India's Digital Personal Data
Right to Privacy recognized The PDP Bill 2019 was introduced in
Information Technology (MeitY) Protection Act, 2023
as a fundamental right in the Lok Sabha and was referred to
releases draft (DPDPB) 2023 for
Puttaswamy judgement Joint Parliamentary Committee (JPC)
public consultation
Justice
JPC releases a new version of the Union Cabinet approves the draft
Srikrishna committee submits draft
bill as Data Protection Bill (DPB) DPDP Bill, 2023
PDP bill 2018
Applicability
Page
Page 4 4
The Digital Personal Data Protection Act, 2023
Key terminologies
12 34 5
Data
Principal
Data Principal
Data
Fiduciary
Data Fiduciary
Consent
Consent means
any freely given,
specific, informed
Processing
Processing means a
wholly or partly
automated
Certain
Legitimate
uses
• Data voluntarily
means the means any person provided by data
individual to and unambiguous operation or set of principal.
who alone or in
whom the indication given operations • To provide any
conjunction with performed on
personal data other persons by Data Principal subsidy, benefit,
of their wishes by digital personal
relates and where determines the service, certificate,
way of a clear data, and includes
such individual is : purpose and licence or permit.
affirmative action, operations such as
means of collection, • Performance of
• a child, includes signifying
processing of recording, any law.
the parents or agreement to the • Comply with any
personal data. organisation,
lawful guardian processing of their judgement or
of such child structuring,
personal data for decree.
storage, adaptation,
• A person with the specified • In case of any
retrieval, use,
disability, purpose. alignment or epidemic,
includes the combination, pandemic, disaster
lawful guardian indexing, sharing, or threat to public
acting on their disclosure by health.
behalf transmission, • Responding to
dissemination or medical
otherwise making emergency.
available,
Page 5
restriction, erasure
or destruction.
The Digital Personal Data Protection Act, 2023
Key requirements
Grievance Redressal
Data Fiduciary or Consent Manager shall respond to the grievances of Data Principals within such period as may be specified. In case of any
failure, Data principal may approach the Board and further file an appeal with the Appellate Tribunal.
Page 6
Snapshot of indicative touchpoints for KKR
KKR is a global investment firm that has invested in a variety of businesses in India, including healthcare, life sciences,
Overview technology, and consumer-focused sectors
Investor Portfolio
information companies
Page 7
The Digital Personal Data Protection Act, 2023
Industry Impact
Policies and procedures Significant data fiduciary (‘SDF’)
Draft and implement policies and procedures regarding Certain companies may qualify as SDF due to large volume and
processing of personal data, consent management, data nature of processing of data. Additional obligations such as
breach management, grievance redressal etc. performing audit, appointment of Data Protection officer (‘DPO’)
will be appliable
Cross-border transfers Periodic Assessments
The Act restricts cross border transfer of personal sensitive Periodic assessment and management of personal data to
data to country or territory outside India that the maintain high-quality standards in order to achieve the
government will notify. objectives of the Act.
Penalty (in
S.No. Subject matter of the non-compliance Penalty (in INR)
USD)
Failure to take reasonable security safeguards to prevent personal data
1 Up to ₹250 crores Up to 30 Mn.
breach
Failure to notify the Board and affected Data Principals of a personal data
2 Up to ₹200 crores Up to 24 Mn.
breach
Non-fulfilment of additional obligations in relation to processing data of
3 Up to ₹200 crores Up to 24 Mn.
children
4 Non-fulfilment of additional obligations of Significant Data Fiduciary Up to ₹150 crores Up to 18 Mn.
5 Non-compliance with duties of Data Principal Up to ₹10,000 Up to 120
6 Breach of any term of voluntary undertaking accepted by the Board At the discretion of Board
Page 8
7 For all other non-compliances under this Act Up to ₹50 crores Up to 6 Mn.
Impact on business
Digital transformation in the recent years has enabled organizations to collect significant volume of
personal data.
The DPDP Act 2023 will significantly impact the industry as it is designed to regulate the processing of
personal data and establish rights and obligations for both individuals and organizations.
Page 9
How EY can help
EY India – Data Protection and Privacy Practice
How EY can help
BigID
Protection Regulations
Security.ai
* Enablers include toolkits, frameworks, templates,
and much more..
documents
Page
Page 1111
EY India – Data Protection and Privacy Practice
Compliance roadmap
Analyse and
determine
Review/ modify
existing privacy
policies, consent
Modifying customer
facing platforms to
Develop an inventory
of
assets processing
NOW
eligibility under comply with consent 0-2 MONTHS
mechanisms, and personal
the Act data-handling requirement information and list of
procedures suppliers
BEYO
compliance with the
by authorities of processing Act
ND
4-6 MONTHS
Page 12
Thank you!
Enforcement
Security and
breach Governance
Accountability
USA notifications
UK Encryption
Data localization
*The in-scope laws and regulations to be considered for the unified privacy framework will be based on region
of operations
Page 15
Consent considerations as per data lifecycle
Retention
Collectio Disclosur
Use Sharing and
n e
Disposal
• Privacy notice laying down • KKR will only be • KKR will only be able to • KKR will be permitted to • Personal data will need to
various personal data permitted to use share personal data of share personal data be archived after the
categories and related personal data for the individuals who have with third parties (e.g., consented purpose is
processing activities will need consented purposes provided consent for vendors) where the fulfilled
to be provided to customers (marketing, analytics, sharing within the group individuals have • In case an individual
• Purpose wise consent to sharing within the • Sharing of personal data provided consent or it is withdraws consent, the
be obtained group, etc.) only for consented needed for providing the processing activity that
purposes service relies on this consent will
have to be halted
Page 17
Data breach notification
Below is the use case for data breach notification and management for KKR’s existing SIEM & SOAR tools
Notification &
Integration of applications with existing SIEM and SOAR Monitoring & Analysis • Follow up
Reporting
report
• Incident
analysis,
containment
Build policies measures &
Identify
On-premise within existing KPIs
applications
tools as per in- • Lessons
storing personal
scope privacy learned
data
regulations
Compile
dashboard for
incident KPIs
Is the personal Provides incident
data stored: Integrate with SIEM logging,
• Acquire
• On prem? and SOAR monitoring &
evidence
• Cloud? response
• Contain
incident
• Recover from
incident
Identify Build compliance
applications policies for in- Analyse the Notify relevant
storing personal scope privacy potential impact authorities &
Cloud
data regulations & determine affected data
immediate action principals
Security Controls
1. VAPT for applications and components
2. Threat modelling for all integrations
3. Authentication function testing
Page 18
Personal data mapping and inventory
Conduct discussions to
identify systems and
business functions DATA
Manual Data processing personal INVENTORIES
data Compliance
discovery Security Controls reporting
• Process oriented Draft data flow diagrams
• Vendor assessments 1. Data at rest,
• PIA / DPIA & PbD data in motion
encryption
2. Data Loss Vendors Risk flagging
Prevention and
exfiltration of
Create test IT Systems
data controls
groups/targets for
servers, endpoints and 3. VAPT for
databases for initial Applications and Data flow
Processes
data discovery scans Infrastructure
and run the automated visualisations
scanning in batches of
test groups
Automated Data
Identify and remove
discovery false positives
Security Controls
• Structured data
1. TPRA and Remote access
discovery Security
• Unstructured data solution for vendors
discovery
2. VAPT, threat modelling & Controls
Extract reports for all assessment, source code Risk assessment
completed scans review, software
composition analysis
3. Risk assessment
Page 19 Page 19
Data principal rights management
Locate or retrieve
personal data
Yes Distribute
Can the Assign Stage response Distribution of requested Track
request as
Confirm consumer’s workflow in ServiceNow information and and
necessary
receipt identity be based on for legal review, confirmation of request report
to internal
authenticated request type if necessary completion DPR
teams
progress
IS team
Page 20 Page 20
Data principal rights deletion request
Security Controls
1. Risk assessment and infrastructure assessment
2. VAPT
3. Threat assessment and modelling for all integrations
Page 21 Page 21
* As per applicable agreement with the
Privacy engineering for data masking
Input Output
Credit Card No. 4415 1230 0000 0123 Credit Card No. XXXX XXXX XXXX 9876
Data Masking
Identity Number 9865 7894 9876 Identity Number @^$%!##&#$!
Security Controls
1. VAPT for applications and components
2. Threat modelling for all integrations
3. Authentication function testing
Page2222
Page
Comparison of GDPR and DPDPA
Please find below a summary of the principles of GDPR and DPDPA which EY will adhere to
Data breach
management Consent
Privacy by
Data retention Design and Consent
Privacy by Manager
Default
Appointment
of Data Categories of
Notice Policies and
Protection Personal
procedures
Officer Data
Records of
Processing
Applicable
Privacy Processing
Activities
child data
(RoPA) domains
Conditions for
Training and Significant
collection and Data processor
awareness Data
processing
Fiduciary
Data Appointment
Subject/Princip Security of
of Sub-
al Rights processing
Processors
Data
Protection
Cross border Impact
transfer Assessment
(DPIA)
The core principle remains the same, but the requirement is slightly modified as compared to GDPRCommon domains for GDPR Additional DPDPA domains
Requirement not currently present in DPDPA and may be included once the Rules for and DPDPA
implementation of the Act are released.
Page
Page 2323
Differences between GDPR and DPDPA
Consent Managers No concept of consent managers Data fiduciaries, who on behalf of data principals can collect and
manage the consent provided by them
Data Protection Impact Data Protection Impact Assessment (DPIA) is necessary to be DPIA is only necessary to be conducted by Significant Data
Assessment (DPIA) conducted by all data controllers Fiduciary (SDF )
GDPR mentions another key stakeholder - sub-processor which is
Sub-processor appointed by the data processor for support in processing of DPDPA does not mention sub-processor
personal information as per contract
ROPA GDPR mentions Records of Processing Activities (ROPA) as per DPDPA does not mention ROPA
article 30
Legitimate interest/use GDPR states that legitimate interest related lawful processing can DPDPA states that legitimate use related lawful processing is based
be personal, commercial or societal interest on a lack of objection for the processed personal data
Standard Contractual GDPR has defined standard contractual clauses for transfer of
Clauses personal data between different data controllers and data No standard contractual clauses
controllers and data processors
Cross border data As per adequacy decision, standard contractual clauses and No cross border data transfer restrictions
transfer restriction transfer impact assessments
Data subject request Data subject request timeline to be answered within 30 days Data subject request timeline not defined
timeline
Breach reporting 72 hours after identifying breach No timeline specified
timeline
Data Subject/Principal Data subject rights include right to data portability and right to DPDP does not specify the rights of data portability and right to
Page
Page 2424
Rights object to automated profiling object to automated profiling