Data Privacy Law - Slides - Association of Corporate Counsel

advertisement
India Data Privacy Law –
Its impact on Business Ecosystem
Shivaji Rao,
Regional General Counsel,
Asia PAC and Sub-Saharan Africa,
John Deere.
Data Privacy & Data Security Law in India
Information Technology Act (2000) & (2008)
Information Technology (Reasonable Security Practices and Procedures and
Sensitive Personal Data or Information) Rules, 2011
Press Note Technology (Clarification on Privacy Rules) August 2011
Credit Information Companies (regulation) Act, 2005
Credit Information Companies Regulations, 2006
Credit Information Companies Rules, 2006
Information Technology Act (2000), (2008) & 2011 Rules
any information that relates to a natural person, which either directly or
indirectly, in combination with other information available or likely to be
available with a corporate entity, is capable of identifying such person.
Personal
information
(i)
(ii)
Important
Definitions
(iii)
(iv)
(v)
(vi)
(vii)
Sensitive
(viii)
personal data
password;
financial information e.g. bank account/credit or debit card or other payment
instrument details;
physical, physiological and mental health condition;
sexual orientation;
medical records and history;
biometric information;
any detail relating to the above clauses as provided to a corporate entity
for providing services; and
any of the information received under the above clauses for storing or
processing under lawful contract or otherwise (a business entity cannot
collect SPD unless it obtains the prior consent of the provider of the
information. Consent must be provided by letter, fax or email).
Information Technology Act (2000), (2008) & 2011 Rules
Consent
Rule 5 provides that a body corporate or any person on its behalf must obtain
consent in writing through letter or fax or email from the provider of sensitive
personal data or information regarding purpose of usage before collection.
Lawful
Purpose
Important
Provisions
Retention,
and Opt Out
Disclosure to
3rd Parties
May not collect sensitive personal data or information unless collected for a
lawful purpose connected with a function/activity of the body corporate or
a person on its behalf and the collection is considered necessary for that
purpose.
Not to retain sensitive information for longer than is required for the purposes
for which the information may lawfully be used. Providers of information have a
right of review to ensure accuracy.
disclosure of sensitive personal data or information by body corporate to any third
party requires prior permission from the provider who has provided such
information under lawful contract or otherwise, unless such disclosure has been
agreed in the contract between the body corporate and provider of information
(Rule 6).
Information Technology Act (2000), (2008) & 2011 Rules
Privacy
Policy
Required
Important
Provisions
Contents of
Privacy Policy
Data
Protection
any entity or person on behalf of an entity that collects, receives, possesses,
stores, deals or handles information of a provider of information, must provide a
privacy policy for handling of or dealing in personal information (including
sensitive personal data or information) and ensure that the same are available
for view by such providers of information who has provided such information
under lawful contract. Such policy must be published on the website of the
body corporate or any person on its behalf.
Privacy Policy must contain:
(a) clear and easily accessible statements of its practices and policies;
(b) type of personal/sensitive personal data or information collected under
Rule 3;
(c) purpose of collection and usage of such information;
(d) disclosure of information, including sensitive personal data or information
as provided in Rule 6;
(e) reasonable security practices and procedures as provided under Rule 8.
Information collected must be protected pursuant to Rule 8.
Information Technology Act (2000), (2008) & 2011 Rules
Data
Transfer
Rule 7 clearly indicate that ‘…may transfer sensitive personal data or information
including any information …’ if any of the following conditions are satisfied:
(a) the recipient entity maintains same level of security as mentioned under these
Rules;
(b) transfer may be allowed to perform the obligations of lawful contract; or
(c) such person has been consented for data transfer.
(i)
Important
Provisions
Security
Practices &
Procedures
Body corporate or a person shall be considered to have complied with reasonable security
practices and procedures, if they have implemented such security practices and procedures
and standards and have a comprehensive documented information security programme
and information security policies that contain managerial, technical, operational and
physical security control that are adequate to protect the nature of the business;
(ii) Implementation of International Standard IEC 27001 may also fall under the compliance of
this rule;
(iii) The Body corporate or a person who have implemented either IEC 27001 Standard or the
codes of the best practices for data protection as approved and notified shall be deemed to have
been complied with reasonable security practices and procedures provided that the same have
been certified or audited on regular basis by entities through independent auditor, duly approved
by the Central Government.
Information Technology Act (2000), (2008) & 2011 Rules
The Information Technology (the Indian Computer Emergency Response Team
and manner of Performing Functions and Duties) Rules, 2013 denotes that the
following Cyber Security incidents need to be notified to CERT-In:
Breach
Notification
o
o
o
o
o
Important
Provisions
o
o
o
o
o
Govt Audit
Rights
•
Targeted scanning / probing of critical systems networks / Systems
Compromise of critical systems / information
Unauthorized access of IT systems / data
Defacement of website or intrusion into a website and unauthorized changes
such as inserting malicious code, link of external website etc.,
Malicious code attacks such as spreading of virus / worm / Trojan / Botnets /
Spyware
Attacks on servers such as Database, Mail and DNS and network devices such
as Routers
Identify theft, spoofing and phishing attacks
Denial of Service (DoS) and Distributed Denial of Services (DDoS) attacks
Attacks on critical infrastructure, SCADA systems and wireless networks
Attacks on applications such as E-Governance and E-Commerce etc.
The appropriate government may cause an audit to be conducted of the
affairs of the service providers and authorized agents in the State at such
intervals as deemed necessary by nominating such audit agencies. The audit
may include security, confidentiality, and privacy of information, as well as
many other things.
Information Technology Act (2000), (2008) & 2011 Rules
Sec 72 of the IT Act, 2000 denotes regarding
penalty for breach of
confidentiality and privacy
Important
Provisions
- Save as otherwise provided in this Act or any other
law for the time being in force, any person who, in pursuance of any of the powers
conferred under this Act, rules or regulations made thereunder, has secured access to any
electronic record, book, register, correspondence, information, document or other material
without the consent of the person concerned discloses such electronic record, book.
register, correspondence, information, document or other material to any other person
shall be punished with imprisonment for a term which may extend to two years, or with
fine which may extend to one lakh rupees (US$ 1600 approx.), or with both.
Enforcement
Mechanism
Sec 72 A Punishment for
Disclosure of information in breach of lawful
contract - Save as otherwise provided in this Act or any other law for the time being in
force, any person including an intermediary who, while providing services under the terms
of lawful contract, has secured access to any material containing personal information
about another person, with the intent to cause or knowing that he is likely to cause
wrongful loss or wrongful gain discloses, without the consent of the person concerned, or in
breach of a lawful contract, such material to any other person shall be punished with
imprisonment for a term which may extend to three years, or with a fine which may extend
to five lakh rupees (US$ 8000 approx.), or with both.
Information Technology Act (2000), (2008) & 2011 Rules, Ctd.
Important
Provisions
Enforcement
Mechanism
Sec 43 A Compensation for failure to protect data - Where a
body corporate, possessing, dealing or handling any sensitive personal data
or information in a computer resource which it owns, controls or operates, is
negligent in implementing and maintaining reasonable security practices and
procedures and thereby causes wrongful loss or wrongful gain to any person,
such body corporate shall be liable to pay damages by way of compensation,
not exceeding five crore rupees (US$ 800000 approx.), to the person so
affected.
Sec 66C Punishment for identity theft - shall be punished with
imprisonment of either description for a term which may extend to three
years and shall also be liable to fine which may extend to rupees one lakh
(US$ 1600 approx.)
How it impacts on Business
Ecosystem in India
Data
collection
Breach
Notification
Consent
Organization
Data use,
storage and
Transfer
Privacy Policy
and Access
Data security
practices
Collection of
Personal
Data
Consent
Data use, storage
and Transfer
Data security
practices
Privacy Policy
and
Collection of ‘personal information’ and ‘sensitive
personal data’ in the course in the course of business:
• Procurement - Suppliers, OEMs,
• Sales - Dealers, distributors, Customers, consultants, etc
• HR process – employees
• Commercial Contracts
Breach
Notification
When collecting
personal data, do you
clearly inform the
individual the
purpose(s) for which it
will be collected, used
or disclosed and
obtain his/her
consent?
• Entity Management – BODs, Shareholders etc.
Are we legally allowed to extract the publicly available data?
How do we make sure that such data is legal?
Recommendation:
Have an enabling
covenant in the
contract w.r.t data
collection
Data
acquisition
Consent
Data use, storage
and Transfer
Data security
practices
Privacy Policy
and
• Consent in writing from the provider of sensitive
personal data before collection.;
• Collect sensitive personal data for a lawful
purpose and the collection is considered
necessary for that purpose.;
• shall not retain sensitive information for longer
than it is required for the purposes
Breach
Notification
Recommendation:
Have an enabling
covenant in the
contract w.r.t data
collection and its
purpose
Data
acquisition
Consent
Data use, storage
and Transfer
Data security
practices
• Consent before collection and use,
• For data transfer –
o the recipient entity maintains same level of
security;
o
o
transfer may be allowed to perform the
obligations of lawful contract; or
Such person has been consented for data
transfer.
• Reasonable security measures for data storage
Privacy Policy
and
Breach
Notification
Do you have full visibility &
control on –
(a) personal data and SPD is collected
and why?
(b) who collects it?
(c) how it is stored [ in country or
outside country] and
(d) sharing / disclosing (sales team,
analytics, service providers)
Recommendation:
Have an enabling
covenant in the
contract w.r.t data
use and transfer
Data
acquisition
Consent
Data use, storage
and Transfer
Data security
practices
Privacy Policy
and
• Comprehensive documented information security
programme and information security policies that
contain managerial, technical, operational and
physical security control ;
• No retention of data longer than needed
• IEC 27001 standards for data security
• Certified or audited on regular basis by entities
through independent auditor, duly approved by the
Central Government.
Breach
Notification
Have you reflected
on (a) assessed the
personal data
protection risks (b)
classified and
secured safely, and
span of access and
control within
your organization
and put in place
personal data
security policies?
Data
acquisition
Consent
Data use, storage
and Transfer
Data security
practices
Privacy Policy
and access
Breach
Notification
• Any entity or person that collects, receives, possesses,
stores, deals or handles information of a provider of
information, must provide a privacy policy;
Practical example:
• Privacy Policy must contain:
o clear and easily accessible statements of its
practices and policies;
o type of personal/sensitive personal data or
information collected
o purpose of collection and usage of such
information;
o disclosure of information, including sensitive
personal data
o reasonable security practices and procedures
Regarding drafting
and implementing
data privacy policy.
Training to internal
stakeholders is a
priority
Data
acquisition
Consent
Data use, storage
and Transfer
Data security
practices
Privacy Policy
and
Breach notification to Computer Emergency Response Team on
occurrence of –
• Targeted scanning of critical systems networks
• Unauthorized access of IT systems / data
• Defacement or intrusion into a website
• Malicious code attacks such as spreading of virus
• Attacks on servers
• Attacks on critical infrastructure
Breach
Notification
Checklist / FAQs
• How well does your organization protects personal data & sensitive personal data?
• What is the action plan you have?
• Do you have data inventory management in place?
• When collecting personal data, do you clearly inform the individual the purpose(s)
for which it will be collected, used or disclosed and obtain his/her consent?
• If you collect personal data from third parties, do you ensure that the third party
has obtained consent from the individuals to disclose the personal data to you for
your intended purposes?
•
• Do you limit the use of personal data collected to only purposes that you have
obtained consent for?
Reference:
Checklist / FAQs
• Do you put in place the appropriate contractual arrangements or binding corporate
rules to govern the transfer of personal data overseas?
• Do you limit the disclosure of personal data collected to only purposes that you have
obtained consent for?
• Have you established a formal procedure to handle requests for access to personal
data?
• Do you have a list of third party organizations to whom personal data was disclosed and
for what purposes?
• Have you assessed the personal data protection risks within your organization and put
in place personal data security policies?
• Is the personal data kept in a secure manner?
• Do you conduct or schedule regular audits on the data protection processes within
your organization?
Reference:
Checklist / FAQs
• Have you developed and implemented data protection policies for your organization to
meet its obligations under the IT Rules? Are your organization's data protection policies
made available to the public?
• Have the individuals on your marketing list given their clear and unambiguous consent,
evidenced in written or other accessible form, to being contacted by you by phone call,
text messages (e.g.. SMS/ MMS) or fax for your intended telemarketing purposes?
• In relation to individuals who have not given their clear and unambiguous consent for
telemarketing, have you established an internal process for checking with the DNC
registry prior to your telemarketing campaigns?
• If you purchase databases of contact information from third parties for your
telemarketing activities, do you ensure that the third party has obtained the necessary
consents for the collection, use and disclosure of the personal data by you?
Reference:
Thank You
Download