Data Security Laws in India, the European Union & the United States India European Union United States Data Security Laws in India (A Growing BPO Destination) INDIA – THE OUTSOURCING DESTINATION Key destination to provide information technology (IT), and now information technology enabled services (ITES) to a number of Fortune 500 companies. Over the last decade, the average growth rate of India’s GDP has been five percent to seven percent, making it one of the better performers in the world economy. Purchasing power parity in India relatively high (the fourth largest in the world). India --- The Key Information Data Security Laws Indian IT Act Of 2000. Leakage of personal data by a service provider --- A Criminal Offense. Companies would be held responsible for protecting data. Defined Information breaches: Unauthorized access to a designated protected computer system. Accessing information without consent. Unauthorized copying of data Third parties such as internet service providers and website hosts would not be responsible if their services were misused by someone else without their knowledge. Data Security Laws Indian IT Act Of 2000 Cont… The information security issues under the IT Act are the following: Section 43:if a person without the permission of the person incharge of the computer system, accesses, downloads any data, introduces virus or causes denial of access, will be liable for a penalty of up to rupees 10 million, $250,000(Approx). Section 65: Tampering with Computer Source code Section 66: Hacking Section 72: Breach of Confidentiality and Privacy Security Environment in India: Indian Service providers agree to be subjected by global acts and ready to be litigated in the court of the user’s country. Companies sign Service Level Agreements (SLA), which have very strict confidentiality and security clauses built into them at the network and data level. Spending on security ranges from 5% to 15% of the IT budget. Companies dealing with US clients require compliance depending upon the industry served. E.g. Healthcare requires compliance with HIPAA, Financial services require compliance with GLBA. Security Environment in India: Cont… Many companies in India are undergoing/have undergone SAS 70 Audit to implement and improve internal controls. Implementation of international standards for information security management like the BS7799. Security safeguards are ensured in many ways like: Before appointing an employee, his/her background is checked. Employees don't have access to internet so as to avoid Trojan horses infecting systems and monitoring data. No pencils or mobile phones are permitted in the processing shop to prevent the data being copied. The machine gets locked in a minute, if it is left idle. Systems are protected by multiple-level firewalls, antivirus and encryption software Data Security Breaches: NoT EaSy Laws Relating to Data There are several laws applicable to data theft or misuse. The Indian Penal Code, 1860 (IPC) is equipped to deal with theft, cheating criminal breach of trust, dishonest misappropriation of data and/or Criminal Conspiracy while Information Technology Act, 2000 can deal with hacking. The offenders can be arrested without warrant and the arrest can be a non–bailable one. The punishment ranges from one year’s imprisonment to life imprisonment. In case of employees of a BPO, public servants, merchants, attorneys or agents the penalties are higher. For example, if any employee misuses the data for personal gains the punishment is seven year’s imprisonment and in case of public servants, merchants, etc., it can be life term. Lot to Improve………………. The Indian BPO Industry is expected to grow at a CAGR (Compound Annual Growth Rate) of 44.7 per cent. The size of the industry is expected to reach $ 16 billion by 2007. Data security and privacy, lack of product expertise and inability to deliver results are THREATS Companies would have to invest in building risk assessment systems and disaster recovery procedure and standard tests. to provide high standard of security and data protection. To build capacity to provide security certification. GAP analysis: Analyzing the existing standards and best practices adopted by the industry in India and industry at the international level. Carrying out research in the field of data privacy and protection in the context of Indian situation. And To create a WIN-WIN situation for outsourcing companies to start there setups in India. Data Security in the European Union The European Union (EU) 27 member states Common currency since 1999: €uro Generates estimated 31% of world’s GDP (’07) System of laws apply to all member states National courts are required to enforce EU treaties, even if doing so requires them to ignore national laws The European Directive 95/46/EC - Data Protection Directive Objective: remove obstacles to free movement of data without diminishing data protection within Member States of EU Applies to automated processing… Computer database of customers as well as non-automated processing Traditional paper files Not applicable to public security, defense or criminal law enforcement Principles of Data Controlling Data must… be processed fairly and lawfully be collected for explicit + legitimate purposes be relevant and not excessive to purpose be accurate and kept up-to-date not be kept longer than necessary when it identifies an individual Each Member State must provide supervisory authority that must be notified when data is processed Data Processing… is any operation performed upon personal data Use Collection Disclosure Organization Combining Storage Erasure Alteration Personal data is any information relating to an identified or identifiable person such as Photo Name Fingerprints Telephone # Personal data can be processed if… unambiguous consent is given it is necessary for performance of contract involving data subject required by legal obligation it is necessary to protect interest that is essential for data subject’s life it is necessary for tasks carried out by official authorities Processing Sensitive Data Sensitive Data is data relating to Racial or ethnic origin Political opinions Religious or philosophical beliefs Trade union membership Data concerning health or sexual preference In principle such data cannot be processed Derogation is tolerated under very specific circumstances Data Transfers to non-EU countries Personal data can only be transferred to countries outside the EU that have ‘adequate’ level of protection. So far these are only: Switzerland Canada Argentina Save Harbor Privacy Principles of U.S. Department of Commerce Air Passenger Name record to U.S. Bureau of Customs and Border Protection EU - US Airline Passenger Data Disclosure By March 5. 2003 all international airlines must provide U.S. government full electronic access to detailed airline passenger data Collides with EU protection law which allows access to data only on case-to-case basis upon particular suspicion June 28, 2007 agreement Reduces collected data from 34 collected up to now to 19 data fields Data Security in the United States of America USA Data Security – The Early Years Who cares? Needed expensive equipment to work with data No way of really using it No way of tracking users taking data Hard drives were very expensive and small Along came Windows Working from home GUI allowed users to view, manage, and easily store data Led to VPN – Virtual Private Networks Firewalls Security focused on external attacks Started tracking users who access data ® USA Data Security – Early Legislation 1960s Proposal for Federal Data Center IRS information Census information Social Security Call out for security Thomas J. Watson Jr. – Chairman of the Board of IBM 1970s 1974 – Federal Privacy Act USA Data Security – More Early Legislation 1980s Legislation passed concerning Emails, personal records, etc. 1986 - Electronic Communications Privacy Act 1990s 1996 - International Conference on Privacy and Data Protection Sally Katzen – CIO? Not quite but close enough Administrator of the White Houses Office of Information and Regulatory Affairs of the Office of Management and Budget USA Data Security – Present Internal attacks Accountability – users can be monitored about what data they look at Audit trail Personal computing devices PDAs, laptops 60,000 lost globally in last six months of 2004 Lets be honest, most were probably in United States Have you heard about Ohio University? USA Data Security – Present CERT Carnegie Mellon University’s Software Engineering Institute Security experts Reports security incidents Mail messages Hotline messages Incident reports received ® USA Data Security – What should we do? Establish detailed policies for the security of data Assess value of data being protected Transparent security solutions View as process and not product Realize security is ongoing process USA Data Security - Future Known for 40 years that data security is important and we still can’t get it right Sources CERT Statistics: Historical. Apr. 30, 2007. CERT. Nov. 28, 2007. http://www.cert.org/stats/historical.html. Madsen, Wayne. “United States Remains Adamantly Opposed to Data Protection.” Computer Fraud & Security. December 1996. 6-10. Bigelow, Robert. “Legal Issues in Computer Security: Report from the United States – Part 2.” Computer Law & Security Report. Vol 13, no 2, 1997. 87-95. Levine, Richard. “Technology Evolution Drives Need for Greater Information Technology Security.” Computers & Security. Vol 24, 2005. 359-361. Page about data privacy in the EU: http://www.datenschutzberlin.de/ueber/europa.htm Lecture notes on 'Internetrecht' (Internet Law) from summer term class of Dr. Michael Schmidl at the University of Augsburg Website of the European Commission: http://ec.europa.eu/justice_home/fsj/privacy/index_de.htm Website of the German Federal Agency of Supervisory Authorities for Data Protection: http://www.bfdi.bund.de/cln_029/nn_532044/DE/GesetzeUndRechtsprechung/ Gesetze__node.html__nnn=true http://www.epic.org/privacy/intl/ Sources cont’d Indian BPO structure: http://www.bpoindia.org/knowledgeBase/ BPO – Destination India: A paper presented by Patni Computers. http://www.patni.com/resource-center/collateral/businessprocessoutsourcing/tp_bpodestination.pdf Introduction to BPO: http://www.indobase.com/bpo/competitors-of-india.html Source: U.S Department of Labour and Forrester Research, Inc. Data Security Laws: http://www.quality-web-solutions.com/offshoreoutsourcing-to-India-article.php Information Security in India’s IT Industry http://www.indembassyathens.gr/Business/IT%20industry/Information_securit y_in_Indias_IT_industry.htm THANK YOU