SlideShare a Scribd company logo
1 of 21
Privileged & Confidential 1
India:
an up-date on Data Protection Legislation
by
Tejas Karia
(BSL, LLM (LSE), Advocate, Solicitor
Associate, Amarchand & Mangaldas)
Amarchand & Mangaldas & Suresh A. Shroff & Co.
Solicitors & Advocates
Amarchand Towers, 216 Okhla Industrial Estate, Phase - III
New Delhi-110 020 India
Tel: + (91 11) 2692 0500, 5159 0700 Fax: + (91 11) 2692 4900
e-mail: tejas.karia@amarchand.com
9th February 2006
Privileged & Confidential 2
Status of Data Protection
Legislation in India
• The existing legal framework for protecting
sensitive personal data.
• Overview of the investment in India by other
countries for handling personal data.
• Need of Data Protection legislation in India.
• Attempts for passing the legislation.
• Present status.
• Way forward …
Privileged & Confidential 3
Existing Legal Framework
• Information Technology Act, 2000
– Section 43: Penalty for download, copy or extract of data
without permission of the owner of a computer etc. – not
exceeding rupees ten million to the person affected.
– Section 65: Punishment for tempering with Computer Source
Code – imprisonment up to 3 years, or fine up to rupees
200,000, or both.
Privileged & Confidential 4
Existing Legal Framework
• Information Technology Act, 2000
– Section 66: Hacking - imprisonment up to three years, fine
up to rupees 200,000, or both.
– Section 72: Penalty for breach of confidentiality and privacy:
unauthorised access to any electronic record, book, register,
correspondence, information, document and disclosure of the
same – imprisonment up to 2 years, or fine up to rupees
100,000, or both.
Privileged & Confidential 5
Existing Legal Framework
• Indian Contract Act, 1872:
– Breach of Contract: Violation of terms of the contract or non-
performance of the obligations.
– Remedies:
• Damages
• Specific Performance
Privileged & Confidential 6
Existing Legal Framework
• Indian Penal Code, 1860:
– Section 406: Criminal Breach of Trust: Imprisonment, which
may extend to 3 years, or fine, or with both.
– Section 420: Cheating: Imprisonment, which may extend to
7 years and a fine.
Privileged & Confidential 7
Existing Legal Framework
• Consumer Protection Act, 1986:
– “Deficiency in Service”: complaint before consumer
forum / commission.
• Specific Relief Act, 1963:
– Temporary and permanent injunctions against
unauthorised disclosure of confidential information.
Privileged & Confidential 8
Overview of Investment in India
• India controls 65% of of the global market in software-
code outsourcing and 46% in back-office outsourcing.
• Indian software and services export was approximately
$ 17.2 billion in 2004-05, as compared to $ 12.8 billion
(an increase of 34%)
• Outsourcing revenues are expected to reach $ 60
billion by 2010.
• As per the Nasscom-Mckinsey survey, the export
revenue from IT sector would add 7% to India’s GDP
by 2010 along with creation of 8.8 million new jobs.
Privileged & Confidential 9
Overview of Investment in India
• IT solutions business in India is expected to grow at
25% to touch $ 35 billion in export revenues.
• The BPO business would witness a CAGR of 37% to
account $ 25 billion of the projected $ 60 billion.
• According to Indian IT body – National Association of
Software and Service Companies (“NASSCOM”),
India could potentially accelerate the overall IT export
by almost $ 15-20 billion by 2010 if it focuses on
multi-dimensional innovation.
Privileged & Confidential 10
Need for Data Protection
Legislation in India
• Absence of data protection and privacy law in India
often cited as a strong reason for stopping the
movement of call center and BPO work in India
• Necessity for creating appropriate confidence among
investors and foreign companies about safety and
protection of personal data.
• Adequate level of protection for allowing Safe Harbor
for transfer of data from EU countries.
• Unenforceability of contractual provisions regarding
protection of data.
Privileged & Confidential 11
Various attempts for passing
Data Protection Legislation
• Drafting of separate legislation.
• Amendments to existing Information
Technology Act.
• Expert Committee on Cyber Law
Privileged & Confidential 12
Various attempts for passing
Data Protection Legislation
• Drafting of separate legislation:
– A separate and exclusive legislation embodying the Data
Protection principles like other Countries.
– EU model vs. US model
• Stringent legislative protection vs. Self-Regulatory Organizations
• Enforcement: statutory rights v. contractual rights
• Safe Harbor Principles
– Failure to enact separate legislation
Privileged & Confidential 13
Various attempts for passing
Data Protection Legislation
• Amendments to existing Information Technology Act,
2000:
– Insertion of definitions of:
• Personal data, Data Controller, Data Processor, Data Subject,
Processing etc.
– Introduction of Chapter VIIIA for Data Protection
• Provisions for reciprocity and exemptions
– Guidelines on rights of Data Subjects and Minimum Security
and Organisational Standards to be adopted by Data
Controllers and Data Processors
Privileged & Confidential 14
Various attempts for passing
Data Protection Legislation
• Expert Committee on Cyber Laws:
– Appointed to suggest the amendments to Information
Technology Act, 2000
– Minimal changes suggested to existing law for introducing
the protection for handling sensitive personal data.
– Introduction of concept of ‘sensitive personal data’ in
existing Section 43:
• Any body corporate, that owns or handles sensitive personal data or
information in a computer resource, if found to be negligent in
implementing and maintaining reasonable security practices and
procedure – shall be liable to pay damages by way of compensation
not exceeding rupees ten million to the person so affected.
Privileged & Confidential 15
Various attempts for passing
Data Protection Legislation
• Expert Committee on Cyber Laws:
– What is “reasonable security practices and procedures” ?
• In the absence of a contract between the parties or any special law,
such security practices and procedures as appropriate to the nature of
the information to protect that information from unauthorised access,
damage, use, modification, disclosure or impairment, as may be
prescribed by the Central Government in consultation with self-
regulatory bodies of the industries, if any.
– “Sensitive personal data or information” – which is
prescribed as “sensitive” by the Central Government in
consultation with self-regulatory bodies of the industry, if
any.
Privileged & Confidential 16
Various attempts for passing
Data Protection Legislation
• Expert Committee on Cyber Laws:
– Section 66: Definition of Hacking replaced by Computer
related offences
– Computer related offences are defined as:
• If any person, dishonestly or fraudulently, without permission
 accesses or secures access to such computer resource
 Downloads, copies or extracts any data, computer data base or
information from such computer resource including information or data
held or stored in any removable storage medium
 Denies or causes the denial of access to any person authorised to access
any computer resource
shall be punishable with imprisonment up to 1 year or a fine which may
extend up to rupees 200,000 or with both.
Privileged & Confidential 17
Various attempts for passing
Data Protection Legislation
• Expert Committee on Cyber Laws:
– Computer related offences are defined as:
• If any person, dishonestly or fraudulently, without permission
 Introduces or causes to be introduced computer virus into computer
resource;
 Disrupts or causes disruption or impairment of electronic resources;
 Charges the services by tampering with or manipulating any computer
resources;
 Provides assistance to any person to facilitate access to a computer
resource in contravention of the provisions of the IT Act, 2000, rules,
regulations made thereunder;
 Damages or causes to be damaged any computer resource, date,
computer database, or other programmes residing in such computer
resource;
shall be punishable with imprisonment up to 2 years or a fine which may
extend up to rupees 500,000 or with both.
Privileged & Confidential 18
Various attempts for passing
Data Protection Legislation
• Expert Committee on Cyber Laws:
– Section 72: Breach of confidentiality and privacy:
• Penalty increased to rupees 500,000
• Additional provisions for intermediaries
• Intentional capturing and broadcasting images violating the privacy
• Bar on jurisdiction of courts to take congnizance except upon
complaint filed by the aggrieved person in writing before a
Magistrate
• Punishment: damages by way of compensation of rupees 2.5 million
to the person so affected
– Section 79: Exemption from liability of intermediary in
certain cases.
Privileged & Confidential 19
Present Status
• No clarity on form of legislation.
• Absence of any specific protection causes concern for
trans-border flow of personal data.
• Stray incidents of misuse of personal data by persons
handling personal data.
• The recommendations of Expert Committee likely to
be placed before Parliament in February 2006 for
amending the existing Information Technology Act,
2000.
• No certaninity of enforcement mechanism.
Privileged & Confidential 20
Way forward…
• Need for comprehensive legislation on data
protection in India.
• At least the proposed amendments should
capture all the aspects of data protection
principles.
Privileged & Confidential 21
THANK YOU

More Related Content

Similar to 969_powerpoint_on_data_protection.ppt

ethcpp04-Unit 3.ppt
ethcpp04-Unit 3.pptethcpp04-Unit 3.ppt
ethcpp04-Unit 3.pptAnil Yadav
 
ethcpp04-Unit 3.ppt
ethcpp04-Unit 3.pptethcpp04-Unit 3.ppt
ethcpp04-Unit 3.pptAnil Yadav
 
The cyber law regime in India
The cyber law regime in IndiaThe cyber law regime in India
The cyber law regime in IndiaShankey Gupta
 
Draft Bill on the Protection of Personal Data
Draft Bill on the Protection of Personal DataDraft Bill on the Protection of Personal Data
Draft Bill on the Protection of Personal DataRenato Monteiro
 
Data Security Law and Management.pdf
Data Security Law and Management.pdfData Security Law and Management.pdf
Data Security Law and Management.pdfMeshalALshammari12
 
State regulation of information protection in the cloud - international and K...
State regulation of information protection in the cloud - international and K...State regulation of information protection in the cloud - international and K...
State regulation of information protection in the cloud - international and K...Vsevolod Shabad
 
Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)Lance Michalson
 
INFORMATION Communication Technology (ICT) ACT
INFORMATION Communication Technology (ICT) ACTINFORMATION Communication Technology (ICT) ACT
INFORMATION Communication Technology (ICT) ACTJahid Khan Rahat
 
The Cyber Law Regime in India
The Cyber Law Regime in IndiaThe Cyber Law Regime in India
The Cyber Law Regime in IndiaDr. Prashant Vats
 
What are the new laws under Canada Digital Privacy Act.pdf
What are the new laws under Canada Digital Privacy Act.pdfWhat are the new laws under Canada Digital Privacy Act.pdf
What are the new laws under Canada Digital Privacy Act.pdfRiley Claire
 
EU GDPR and you: requirements for marketing
EU GDPR and you: requirements for marketingEU GDPR and you: requirements for marketing
EU GDPR and you: requirements for marketingIT Governance Ltd
 
Cloud Computing: Legal Issues and Safety Risks by Brian Miller Solicitor
Cloud Computing:  Legal Issues and Safety Risks by Brian Miller SolicitorCloud Computing:  Legal Issues and Safety Risks by Brian Miller Solicitor
Cloud Computing: Legal Issues and Safety Risks by Brian Miller SolicitorBrian Miller, Solicitor
 
Information technology and law and trai
Information technology and law and traiInformation technology and law and trai
Information technology and law and traiHimanshu Jawa
 
Privacy issues in data analytics
Privacy issues in data analyticsPrivacy issues in data analytics
Privacy issues in data analyticsshekharkanodia
 
10. law invest & ethics
10. law invest & ethics10. law invest & ethics
10. law invest & ethics7wounders
 
Enforcement and Litigation Trends and Developments in Privacy and Data Security
Enforcement and Litigation Trends and Developments in Privacy and Data Security Enforcement and Litigation Trends and Developments in Privacy and Data Security
Enforcement and Litigation Trends and Developments in Privacy and Data Security Richik Sarkar
 
Accountability under the GDPR: What does it mean for Boards & Senior Management?
Accountability under the GDPR: What does it mean for Boards & Senior Management?Accountability under the GDPR: What does it mean for Boards & Senior Management?
Accountability under the GDPR: What does it mean for Boards & Senior Management?IT Governance Ltd
 

Similar to 969_powerpoint_on_data_protection.ppt (20)

ethcpp04-Unit 3.ppt
ethcpp04-Unit 3.pptethcpp04-Unit 3.ppt
ethcpp04-Unit 3.ppt
 
ethcpp04-Unit 3.ppt
ethcpp04-Unit 3.pptethcpp04-Unit 3.ppt
ethcpp04-Unit 3.ppt
 
The cyber law regime in India
The cyber law regime in IndiaThe cyber law regime in India
The cyber law regime in India
 
Draft Bill on the Protection of Personal Data
Draft Bill on the Protection of Personal DataDraft Bill on the Protection of Personal Data
Draft Bill on the Protection of Personal Data
 
Data Security Law and Management.pdf
Data Security Law and Management.pdfData Security Law and Management.pdf
Data Security Law and Management.pdf
 
State regulation of information protection in the cloud - international and K...
State regulation of information protection in the cloud - international and K...State regulation of information protection in the cloud - international and K...
State regulation of information protection in the cloud - international and K...
 
Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)
 
The Indian IT act.pptx
The Indian IT act.pptxThe Indian IT act.pptx
The Indian IT act.pptx
 
INFORMATION Communication Technology (ICT) ACT
INFORMATION Communication Technology (ICT) ACTINFORMATION Communication Technology (ICT) ACT
INFORMATION Communication Technology (ICT) ACT
 
The Cyber Law Regime in India
The Cyber Law Regime in IndiaThe Cyber Law Regime in India
The Cyber Law Regime in India
 
What are the new laws under Canada Digital Privacy Act.pdf
What are the new laws under Canada Digital Privacy Act.pdfWhat are the new laws under Canada Digital Privacy Act.pdf
What are the new laws under Canada Digital Privacy Act.pdf
 
EU GDPR and you: requirements for marketing
EU GDPR and you: requirements for marketingEU GDPR and you: requirements for marketing
EU GDPR and you: requirements for marketing
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cloud Computing: Legal Issues and Safety Risks by Brian Miller Solicitor
Cloud Computing:  Legal Issues and Safety Risks by Brian Miller SolicitorCloud Computing:  Legal Issues and Safety Risks by Brian Miller Solicitor
Cloud Computing: Legal Issues and Safety Risks by Brian Miller Solicitor
 
Information technology and law and trai
Information technology and law and traiInformation technology and law and trai
Information technology and law and trai
 
Cyber securitylaw
Cyber securitylawCyber securitylaw
Cyber securitylaw
 
Privacy issues in data analytics
Privacy issues in data analyticsPrivacy issues in data analytics
Privacy issues in data analytics
 
10. law invest & ethics
10. law invest & ethics10. law invest & ethics
10. law invest & ethics
 
Enforcement and Litigation Trends and Developments in Privacy and Data Security
Enforcement and Litigation Trends and Developments in Privacy and Data Security Enforcement and Litigation Trends and Developments in Privacy and Data Security
Enforcement and Litigation Trends and Developments in Privacy and Data Security
 
Accountability under the GDPR: What does it mean for Boards & Senior Management?
Accountability under the GDPR: What does it mean for Boards & Senior Management?Accountability under the GDPR: What does it mean for Boards & Senior Management?
Accountability under the GDPR: What does it mean for Boards & Senior Management?
 

More from sheryl90

competitive advantage (1).ppt
competitive advantage (1).pptcompetitive advantage (1).ppt
competitive advantage (1).pptsheryl90
 
StrategicInformationSystem_Assignment Template.pptx
StrategicInformationSystem_Assignment Template.pptxStrategicInformationSystem_Assignment Template.pptx
StrategicInformationSystem_Assignment Template.pptxsheryl90
 
Chapter10_mis.ppt
Chapter10_mis.pptChapter10_mis.ppt
Chapter10_mis.pptsheryl90
 
83172_pp7.ppt
83172_pp7.ppt83172_pp7.ppt
83172_pp7.pptsheryl90
 
wipo_smes_kul_06_www_68913 (1).ppt
wipo_smes_kul_06_www_68913 (1).pptwipo_smes_kul_06_www_68913 (1).ppt
wipo_smes_kul_06_www_68913 (1).pptsheryl90
 
kumar.pptx
kumar.pptxkumar.pptx
kumar.pptxsheryl90
 
OpenSourceLicensingPowerPointPresentation.ppt
OpenSourceLicensingPowerPointPresentation.pptOpenSourceLicensingPowerPointPresentation.ppt
OpenSourceLicensingPowerPointPresentation.pptsheryl90
 
1._pmc_2019_day_1_project_initiation_and_planning_final.pptx
1._pmc_2019_day_1_project_initiation_and_planning_final.pptx1._pmc_2019_day_1_project_initiation_and_planning_final.pptx
1._pmc_2019_day_1_project_initiation_and_planning_final.pptxsheryl90
 
competitive advantage.ppt
competitive advantage.pptcompetitive advantage.ppt
competitive advantage.pptsheryl90
 
shidiajisajiq-130116094406-phpapp02.pdf
shidiajisajiq-130116094406-phpapp02.pdfshidiajisajiq-130116094406-phpapp02.pdf
shidiajisajiq-130116094406-phpapp02.pdfsheryl90
 
con_mangt-lec4-project_costppt.ppt
con_mangt-lec4-project_costppt.pptcon_mangt-lec4-project_costppt.ppt
con_mangt-lec4-project_costppt.pptsheryl90
 
con_mangt-lec4-project_costppt.ppt
con_mangt-lec4-project_costppt.pptcon_mangt-lec4-project_costppt.ppt
con_mangt-lec4-project_costppt.pptsheryl90
 
Chapter 2 Types of Law applicable in Malaysia.pptx
Chapter 2 Types of Law applicable in Malaysia.pptxChapter 2 Types of Law applicable in Malaysia.pptx
Chapter 2 Types of Law applicable in Malaysia.pptxsheryl90
 
wipo_smes_kul_06_www_68913.ppt
wipo_smes_kul_06_www_68913.pptwipo_smes_kul_06_www_68913.ppt
wipo_smes_kul_06_www_68913.pptsheryl90
 
Technology technology.ppt
Technology technology.pptTechnology technology.ppt
Technology technology.pptsheryl90
 
typesofinformationsystems-121218091037-phpapp01.pdf
typesofinformationsystems-121218091037-phpapp01.pdftypesofinformationsystems-121218091037-phpapp01.pdf
typesofinformationsystems-121218091037-phpapp01.pdfsheryl90
 
IS-Overview.ppt
IS-Overview.pptIS-Overview.ppt
IS-Overview.pptsheryl90
 
ch01_02.ppt
ch01_02.pptch01_02.ppt
ch01_02.pptsheryl90
 

More from sheryl90 (19)

competitive advantage (1).ppt
competitive advantage (1).pptcompetitive advantage (1).ppt
competitive advantage (1).ppt
 
StrategicInformationSystem_Assignment Template.pptx
StrategicInformationSystem_Assignment Template.pptxStrategicInformationSystem_Assignment Template.pptx
StrategicInformationSystem_Assignment Template.pptx
 
Chapter10_mis.ppt
Chapter10_mis.pptChapter10_mis.ppt
Chapter10_mis.ppt
 
83172_pp7.ppt
83172_pp7.ppt83172_pp7.ppt
83172_pp7.ppt
 
wipo_smes_kul_06_www_68913 (1).ppt
wipo_smes_kul_06_www_68913 (1).pptwipo_smes_kul_06_www_68913 (1).ppt
wipo_smes_kul_06_www_68913 (1).ppt
 
kumar.pptx
kumar.pptxkumar.pptx
kumar.pptx
 
OpenSourceLicensingPowerPointPresentation.ppt
OpenSourceLicensingPowerPointPresentation.pptOpenSourceLicensingPowerPointPresentation.ppt
OpenSourceLicensingPowerPointPresentation.ppt
 
1._pmc_2019_day_1_project_initiation_and_planning_final.pptx
1._pmc_2019_day_1_project_initiation_and_planning_final.pptx1._pmc_2019_day_1_project_initiation_and_planning_final.pptx
1._pmc_2019_day_1_project_initiation_and_planning_final.pptx
 
competitive advantage.ppt
competitive advantage.pptcompetitive advantage.ppt
competitive advantage.ppt
 
shidiajisajiq-130116094406-phpapp02.pdf
shidiajisajiq-130116094406-phpapp02.pdfshidiajisajiq-130116094406-phpapp02.pdf
shidiajisajiq-130116094406-phpapp02.pdf
 
con_mangt-lec4-project_costppt.ppt
con_mangt-lec4-project_costppt.pptcon_mangt-lec4-project_costppt.ppt
con_mangt-lec4-project_costppt.ppt
 
con_mangt-lec4-project_costppt.ppt
con_mangt-lec4-project_costppt.pptcon_mangt-lec4-project_costppt.ppt
con_mangt-lec4-project_costppt.ppt
 
Chapter 2 Types of Law applicable in Malaysia.pptx
Chapter 2 Types of Law applicable in Malaysia.pptxChapter 2 Types of Law applicable in Malaysia.pptx
Chapter 2 Types of Law applicable in Malaysia.pptx
 
wipo_smes_kul_06_www_68913.ppt
wipo_smes_kul_06_www_68913.pptwipo_smes_kul_06_www_68913.ppt
wipo_smes_kul_06_www_68913.ppt
 
Technology technology.ppt
Technology technology.pptTechnology technology.ppt
Technology technology.ppt
 
typesofinformationsystems-121218091037-phpapp01.pdf
typesofinformationsystems-121218091037-phpapp01.pdftypesofinformationsystems-121218091037-phpapp01.pdf
typesofinformationsystems-121218091037-phpapp01.pdf
 
IS-Overview.ppt
IS-Overview.pptIS-Overview.ppt
IS-Overview.ppt
 
ch03.ppt
ch03.pptch03.ppt
ch03.ppt
 
ch01_02.ppt
ch01_02.pptch01_02.ppt
ch01_02.ppt
 

Recently uploaded

AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Projectjordimapav
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmStan Meyer
 
Dust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSEDust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSEaurabinda banchhor
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationRosabel UA
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 

Recently uploaded (20)

AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Project
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and Film
 
Paradigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTAParadigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTA
 
Dust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSEDust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSE
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translation
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 

969_powerpoint_on_data_protection.ppt

  • 1. Privileged & Confidential 1 India: an up-date on Data Protection Legislation by Tejas Karia (BSL, LLM (LSE), Advocate, Solicitor Associate, Amarchand & Mangaldas) Amarchand & Mangaldas & Suresh A. Shroff & Co. Solicitors & Advocates Amarchand Towers, 216 Okhla Industrial Estate, Phase - III New Delhi-110 020 India Tel: + (91 11) 2692 0500, 5159 0700 Fax: + (91 11) 2692 4900 e-mail: tejas.karia@amarchand.com 9th February 2006
  • 2. Privileged & Confidential 2 Status of Data Protection Legislation in India • The existing legal framework for protecting sensitive personal data. • Overview of the investment in India by other countries for handling personal data. • Need of Data Protection legislation in India. • Attempts for passing the legislation. • Present status. • Way forward …
  • 3. Privileged & Confidential 3 Existing Legal Framework • Information Technology Act, 2000 – Section 43: Penalty for download, copy or extract of data without permission of the owner of a computer etc. – not exceeding rupees ten million to the person affected. – Section 65: Punishment for tempering with Computer Source Code – imprisonment up to 3 years, or fine up to rupees 200,000, or both.
  • 4. Privileged & Confidential 4 Existing Legal Framework • Information Technology Act, 2000 – Section 66: Hacking - imprisonment up to three years, fine up to rupees 200,000, or both. – Section 72: Penalty for breach of confidentiality and privacy: unauthorised access to any electronic record, book, register, correspondence, information, document and disclosure of the same – imprisonment up to 2 years, or fine up to rupees 100,000, or both.
  • 5. Privileged & Confidential 5 Existing Legal Framework • Indian Contract Act, 1872: – Breach of Contract: Violation of terms of the contract or non- performance of the obligations. – Remedies: • Damages • Specific Performance
  • 6. Privileged & Confidential 6 Existing Legal Framework • Indian Penal Code, 1860: – Section 406: Criminal Breach of Trust: Imprisonment, which may extend to 3 years, or fine, or with both. – Section 420: Cheating: Imprisonment, which may extend to 7 years and a fine.
  • 7. Privileged & Confidential 7 Existing Legal Framework • Consumer Protection Act, 1986: – “Deficiency in Service”: complaint before consumer forum / commission. • Specific Relief Act, 1963: – Temporary and permanent injunctions against unauthorised disclosure of confidential information.
  • 8. Privileged & Confidential 8 Overview of Investment in India • India controls 65% of of the global market in software- code outsourcing and 46% in back-office outsourcing. • Indian software and services export was approximately $ 17.2 billion in 2004-05, as compared to $ 12.8 billion (an increase of 34%) • Outsourcing revenues are expected to reach $ 60 billion by 2010. • As per the Nasscom-Mckinsey survey, the export revenue from IT sector would add 7% to India’s GDP by 2010 along with creation of 8.8 million new jobs.
  • 9. Privileged & Confidential 9 Overview of Investment in India • IT solutions business in India is expected to grow at 25% to touch $ 35 billion in export revenues. • The BPO business would witness a CAGR of 37% to account $ 25 billion of the projected $ 60 billion. • According to Indian IT body – National Association of Software and Service Companies (“NASSCOM”), India could potentially accelerate the overall IT export by almost $ 15-20 billion by 2010 if it focuses on multi-dimensional innovation.
  • 10. Privileged & Confidential 10 Need for Data Protection Legislation in India • Absence of data protection and privacy law in India often cited as a strong reason for stopping the movement of call center and BPO work in India • Necessity for creating appropriate confidence among investors and foreign companies about safety and protection of personal data. • Adequate level of protection for allowing Safe Harbor for transfer of data from EU countries. • Unenforceability of contractual provisions regarding protection of data.
  • 11. Privileged & Confidential 11 Various attempts for passing Data Protection Legislation • Drafting of separate legislation. • Amendments to existing Information Technology Act. • Expert Committee on Cyber Law
  • 12. Privileged & Confidential 12 Various attempts for passing Data Protection Legislation • Drafting of separate legislation: – A separate and exclusive legislation embodying the Data Protection principles like other Countries. – EU model vs. US model • Stringent legislative protection vs. Self-Regulatory Organizations • Enforcement: statutory rights v. contractual rights • Safe Harbor Principles – Failure to enact separate legislation
  • 13. Privileged & Confidential 13 Various attempts for passing Data Protection Legislation • Amendments to existing Information Technology Act, 2000: – Insertion of definitions of: • Personal data, Data Controller, Data Processor, Data Subject, Processing etc. – Introduction of Chapter VIIIA for Data Protection • Provisions for reciprocity and exemptions – Guidelines on rights of Data Subjects and Minimum Security and Organisational Standards to be adopted by Data Controllers and Data Processors
  • 14. Privileged & Confidential 14 Various attempts for passing Data Protection Legislation • Expert Committee on Cyber Laws: – Appointed to suggest the amendments to Information Technology Act, 2000 – Minimal changes suggested to existing law for introducing the protection for handling sensitive personal data. – Introduction of concept of ‘sensitive personal data’ in existing Section 43: • Any body corporate, that owns or handles sensitive personal data or information in a computer resource, if found to be negligent in implementing and maintaining reasonable security practices and procedure – shall be liable to pay damages by way of compensation not exceeding rupees ten million to the person so affected.
  • 15. Privileged & Confidential 15 Various attempts for passing Data Protection Legislation • Expert Committee on Cyber Laws: – What is “reasonable security practices and procedures” ? • In the absence of a contract between the parties or any special law, such security practices and procedures as appropriate to the nature of the information to protect that information from unauthorised access, damage, use, modification, disclosure or impairment, as may be prescribed by the Central Government in consultation with self- regulatory bodies of the industries, if any. – “Sensitive personal data or information” – which is prescribed as “sensitive” by the Central Government in consultation with self-regulatory bodies of the industry, if any.
  • 16. Privileged & Confidential 16 Various attempts for passing Data Protection Legislation • Expert Committee on Cyber Laws: – Section 66: Definition of Hacking replaced by Computer related offences – Computer related offences are defined as: • If any person, dishonestly or fraudulently, without permission  accesses or secures access to such computer resource  Downloads, copies or extracts any data, computer data base or information from such computer resource including information or data held or stored in any removable storage medium  Denies or causes the denial of access to any person authorised to access any computer resource shall be punishable with imprisonment up to 1 year or a fine which may extend up to rupees 200,000 or with both.
  • 17. Privileged & Confidential 17 Various attempts for passing Data Protection Legislation • Expert Committee on Cyber Laws: – Computer related offences are defined as: • If any person, dishonestly or fraudulently, without permission  Introduces or causes to be introduced computer virus into computer resource;  Disrupts or causes disruption or impairment of electronic resources;  Charges the services by tampering with or manipulating any computer resources;  Provides assistance to any person to facilitate access to a computer resource in contravention of the provisions of the IT Act, 2000, rules, regulations made thereunder;  Damages or causes to be damaged any computer resource, date, computer database, or other programmes residing in such computer resource; shall be punishable with imprisonment up to 2 years or a fine which may extend up to rupees 500,000 or with both.
  • 18. Privileged & Confidential 18 Various attempts for passing Data Protection Legislation • Expert Committee on Cyber Laws: – Section 72: Breach of confidentiality and privacy: • Penalty increased to rupees 500,000 • Additional provisions for intermediaries • Intentional capturing and broadcasting images violating the privacy • Bar on jurisdiction of courts to take congnizance except upon complaint filed by the aggrieved person in writing before a Magistrate • Punishment: damages by way of compensation of rupees 2.5 million to the person so affected – Section 79: Exemption from liability of intermediary in certain cases.
  • 19. Privileged & Confidential 19 Present Status • No clarity on form of legislation. • Absence of any specific protection causes concern for trans-border flow of personal data. • Stray incidents of misuse of personal data by persons handling personal data. • The recommendations of Expert Committee likely to be placed before Parliament in February 2006 for amending the existing Information Technology Act, 2000. • No certaninity of enforcement mechanism.
  • 20. Privileged & Confidential 20 Way forward… • Need for comprehensive legislation on data protection in India. • At least the proposed amendments should capture all the aspects of data protection principles.