SlideShare a Scribd company logo
REASONABLE SECURITY PRACTICES AND PROCEDURES AND
 SENSITIVE PERSONAL DATA OR INFORMATION RULES, 2011
                                 Under
              The (Indian) Information Technology Act, 2000




                                         By
                      Vijay Pal Dalmia, Advocate
    Partner & Head of Intellectual Property & Information Technology Laws Practice
INFORMATION TECHNOLOGY ACT,
                2000
 Enacted in the year 2000 and was implemented w.e.f. 17th
  October, 2000.
 Important features of this Act :
   Recognition to e-transactions, digital signatures, electronic
    records etc. and also recognise their evidentiary value.
   Lists out various computer crimes which are technological in
    nature.
 However, this Act, originally, did not contain any provision for
  data protection.
THE INFORMATION TECHNOLOGY
       (AMENDMENT) ACT, 2008

 The   IT Act, 2002 was amended in the year 2008.
 Section
       43A and Section 72A were added by the
 amendment Act for protection of personal data
 and information.
 Boththese provisions are penal in nature, civil and
 criminal respectively.
REASONABLE SECURITY PRACTICES
     AND PROCEDURES AND SENSITIVE
    PERSONAL DATA OR INFORMATION)
              RULES , 2011
   Ministry Of Communications And Information Technology
    (Department Of Information Technology) promulgated these
    rules (IT Rules 2011), under Section 87 (2)(ob) read with
    Section 43A.
   IT Rules, 2011 came in force on 11th April, 2011.
   Non Compliance of these rules would lead to invocation of
    Section 43A of The IT Act, 2008 and liability to pay
    compensation, limits of which have not been fixed.
   SECTION 72A of IT Act 2008.
   In addition to the civil liabilities under Section 43 A
    ◦ Any person, or
    ◦ Intermediary
    ◦ Is liable for punishment
       Of imprisonment for term which may extend to
          *3 years
          Or fine up to INR 5,00,000
          Or both
    ◦ For disclosure of information
       In breach of lawful contract.
             *(Cognizable offence and Bailable) ( as per Section. 77B)
SECTION 43A: COMPENSATION FOR
   FAILURE TO PROTECT DATA
Where a BODY CORPORATE,
   possessing, dealing or handling any sensitive personal
    data or information
   in a computer resource which it owns, controls or
    operates
   is negligent in implementing and maintaining reasonable
    security practices and procedures
   and thereby causes wrongful loss or wrongful gain to any
    person
   such body corporate shall be liable to pay damages by
    way of compensation to the person so affected.
DEFINITION OF BODY CORPORATE
    SECTION 43 A –Explanation (i)

A body corporate would mean:
 any company and includes:
     a firm,
     sole proprietorship or
     other   association     of   individuals
      engaged in
      •commercial or
      •professional activities.
SENSITIVE PERSONAL DATA OR
           INFORMATION:
        RULE 3, IT RULES, 2011
   Sensitive personal data or information of a „person‟ means
   such „personal information‟ which consists of information
   relating to:
1. Password;
2. Financial information such as:
      Bank account or,
      Credit card or debit card or,
      Other payment instrument details
3. Physical, physiological and mental health condition;
4. Sexual orientation;
                                                      Contd…
SENSITIVE PERSONAL DATA OR
                INFORMATION
         RULE 3 OF THE IT RULES, 2011
5.   Biometric information;
6.   Any detail relating to the above clauses
         as provided to body corporate
         for providing service; and
7.   Any of the information received under above clauses by
     body corporate for
         processing,
         stored or
         processed
     under a lawful contract or otherwise
EXCEPTIONS:
     Following information is not regarded as sensitive personal
     data or information:
1.   Information freely available or accessible in public domain
     or,
2.   Information furnished under the Right to Information Act,
     2005 (RTI) or
3.   Information furnished under any other law for the time being
     in force.
PERSONAL INFORMATION:
            RULE 2 , IT RULES, 2011
   Any information that relates to a
   „natural person‟
   which either directly or indirectly, in combination with other
    information available or likely to be available with a body
    corporate,
   is capable of identifying such person.
MEANING OF REASONABLE SECURITY
   PRACTICES AND PROCEDURES
      Section 43, Explanation (ii)
   Security practices and procedure designed to
   protect such information from unauthorized
    • access,
    • damages,
    • use,
    • modification,
    • disclosure or
    • impairment,
                                                   Contd…
MEANING OF REASONABLE SECURITY
   PRACTICES AND PROCEDURES
      Section 43, Explanation (ii)
Contd…
as may be specified       in :
   an agreement between the parties or;
   any law for the time being in force; or
   in absence of such agreement or law,
     such   reasonable      security    practices     and
      procedures,
        as may be       prescribed     by    the   Central
         Government.
   Privacy Policy
   Consent for collection of data
   Collection of data
   Use and Retention
   Opt Out/Withdrawal
   Access and Review of Information
   Grievance Mechanism
   Limitation on Disclosure of Information
   Limitation on Transfer of Information
   Reasonable Security Practices and Procedures
PRIVACY POLICY: RULE 4

   Body corporate or any person on its behalf
    ◦ collects, receives, possess,
    ◦ stores, deals or handles
   information of provider of information


 Shall provide a privacy policy for
     handling of or dealing in
       „personal information including sensitive personal data or
       information‟.
                                                         Contd…
PRIVACY POLICY: RULE 4
Privacy Policy shall be published on the website and provide:-
• Clear and easily accessible statements of its practices and
 policies;
• Type of personal or sensitive personal data or information
 collected;
• Purpose of collection and usage of such information;
• Disclosure of information including sensitive personal data
 or information;
• Reasonable security practices and procedures followed by
 the corporate.
CONSENT
                      RULE 5 (1)
o   Requires the corporate or any person on its
    behalf,
o   before collection of sensitive personal data or
    information,
o   to obtain consent in writing through letter or FAX
    or email from the „provider of the information‟
o   regarding purpose of usage of such information.
CONSENT
                              RULE 5(3)
Requirements in case of collection of information directly from
  the person concerned:
      Steps to ensure that the person concerned is having the
    knowledge of :
o   The fact that the information is being collected;
o   The purpose for which the information is being collected;
o   The intended recipients of the information; and
o   The name and address of –
    ◦ the agency that is collecting the information; and
    ◦ the agency that will retain the information
PURPOSE OF COLLECTION OF
               INFORMATION
                        RULE 5 (2)
     Sensitive personal data or information can be
      collected only under following two circumstances:
1.    For a „lawful purpose‟
      connected with a function or activity
     of the body corporate or any person on it behalf;
        and
2.    Considered „necessary‟ for that purpose
USE AND RETENTION OF INFORMATION
                       USE - RULE 5(5):
   The information collected shall be used
     only for the purpose for which it has been collected.


                   RETENTION - RULE 5(4)
   A body corporate or its representative
   must not retain such information for
   longer than is required for the purposes for which the
    information may lawfully be used. OR
   as required under any other law in force.
OPT OUT/WITHDRAWAL
                           RULE 5(7) :
     Requires the body corporate to give the provider of
     information, an option:
1.   prior to the collection of the information, to not provide the
     data or information sought to be collected
2.   of withdrawing his consent given earlier to the body
     corporate.


    Withdrawal shall be sent in writing to the body corporate.
    the body corporate shall have the option to not provide
     goods or services for which the said information was
     sought.
OPT OUT/WITHDRAWAL

   It is noteworthy that, none of the rules talk about
    obtaining the consent of the person to whom the
    information relates in case the provider the
    information is not the person concerned.
   For example, where the husband provides the
    medical information of the wife, consent of the wife
    is not required as per these rules as she is not the
    provider of the information. She also does not have
    the option of opting out as per Rule 5(7).
ACCESS & REVIEW OF INFORMATION
                       RULE 5(6)
o   Providers of information- permitted- to review the
    information provided by them- as and when
    requested by them;
o   Information- if found to be inaccurate or deficient
    shall be corrected or amended as feasible.
o   Body corporate NOT responsible for authenticity of
    the personal information or sensitive personal data
    or information as supplied by the provider to the
    body corporate.
GRIEVANCE REDRESSAL MECHANISM
                        RULE 5(9)
o   Time bound redressal of any discrepancies and
    grievances.
o   Grievance Officer shall be appointed.
    o Publication of name and contact details of
     Grievance Officer on website
o   Redressal of grievances: within one month from the
    date of receipt of grievance.
LIMITATION ON DISCLOSURE OF
             INFORMATION
                              RULE 6
     Permission of the provider of the information is required
     before disclosure of information


     Exceptions:
1.   when disclosure is agreed upon in the contract;
2.   when disclosure is necessary for compliance of a legal
     obligation;
3.   when disclosure to Government agencies mandated under the
     law to obtain information.
4.   when disclosure to any third party by an order under the law
     for the time being in force.
LIMITATION ON DISCLOSURE OF
             INFORMATION
                     RULE 6
    Rule 6 also forbids the following:
1.   Publication of sensitive personal data or
     information by body corporate or its
     representative,
2.   Disclosure by third party receiving the
     sensitive personal data or information
     from the body corporate.
LIMITATION ON TRANSFER OF
              INFORMATION
                                RULE 7
Transfer allowed to:
   another body corporate or a person
   in India, or located in any other country.


Transfer is allowed only if :
1.   other body corporate or person ensures the same level of
     data protection that is adhered to by the body corporate as
     provided under these rules.
2.   it is necessary for the performance of the lawful contract
     between the provider of the information and the corporate
     receiving the information.
REASONABLE SECURITY PRACTICES
           AND PROCEDURES
                         RULE 8
   Prescribes standard to be adhered to
   by a body corporate, receiving the information,
    ◦ in the absence of an agreement between the
      parties;
    ◦ or any law for the time being in force.
   One such prescribed standard: The International
    Standard IS/ISO/IEC 27001 on “Information
    Technology – Security Techniques – Information
    Security Management System – Requirements”.
REASONABLE SECURITY PRACTICES
           AND PROCEDURES

   Any other Security code, if followed shall be :
    o Duly approved and Notified
    o by the Central Government
    o Audited annually by an independent auditor approved by
      the Central Government.


   In the event of an information security breach –
    demonstration of implementation of security
    control measures - by the body corporate.
REASONABLE SECURITY PRACTICES
       AND PROCEDURES
   A body corporate or a person on its behalf shall be deemed to
    have complied with reasonable security practices and
    procedures if:
         They have implemented such security practices and
          standards, and
         Have a
                comprehensive     documented         information
                 security programme; and
                information security policies for:
                   managerial, technical, operational and physical
                   security which are proportionate with the
                   information assets being protected with the
                   nature of business.
   IT       Act,       2000       is       available       at:
    http://www.mit.gov.in/sites/upload_files/dit/files/downloa
    ds/itact2000/itbill2000.pdf
   IT    (Amendment)     Act,   2008      is   available   at:
    http://www.mit.gov.in/sites/upload_files/dit/files/downloa
    ds/itact2000/it_amendment_act2008.pdf
   Information Technology (Reasonable security practices and
    procedures and sensitive personal data or information)
    Rules, 2011are available at:
    http://www.mit.gov.in/sites/upload_files/dit/files/GSR313
    E_10511(1).pdf
1.   What is the likelihood of active
     enforcement of the new rules?
2.   What are the penalties for violations
     of the new rules?
3.   Do the rules apply only to
     information collected from data
     subject in India, or do they also apply
     to information about data subjects
     located outside India?
   Do the rules apply to uses/disclosure of
    information that occur outside of India, if the
    information was originally collected in India?
   Do the rules apply to pseudonymized
    information?
   Is the “provider of the information” in Rule 5
    referring to the subject, or can this be
    interpreted as referring to a third party that
    provides information but who is not the data
    subject?
   Are     there   opportunities   for   further
    clarification/amendment of the new rules?
THANK YOU



            Intellectual Property & Information Technology Laws Division



New Delhi          Mumbai                   Bangalore               Gurgaon

    Flat # 5-7, 10 Hailey Road, New Delhi, 110001 (India)
                Phone: +91 11 42492532 (Direct)
                Phone: +91 11 42492525 Ext 532
                     Mobile :- 9810081079
                    Fax: +91 11 23320484
                email:- vpdalmia@vaishlaw.com

More Related Content

PPT
Reasonable security practices and procedures and sensitive personal data or i...
PDF
Regulatory Compliance under the Information Technology Act, 2000
PPT
Electronic contracts
PDF
By CA.Shweta Ajmera- TDS on payment made to Non residents u/s section 195,MLI...
PPSX
GST on sale of Digital Products & Services in India - OIDAR
PPTX
Law & Emerging Technology - The Model Law on E-Commerce (Unit 2).pptx
PPTX
Supply under gst
PPTX
Issues of electronic contracts
Reasonable security practices and procedures and sensitive personal data or i...
Regulatory Compliance under the Information Technology Act, 2000
Electronic contracts
By CA.Shweta Ajmera- TDS on payment made to Non residents u/s section 195,MLI...
GST on sale of Digital Products & Services in India - OIDAR
Law & Emerging Technology - The Model Law on E-Commerce (Unit 2).pptx
Supply under gst
Issues of electronic contracts

What's hot (20)

DOCX
International convention on cyber crime
PPTX
Privacy right under it act, 2000 and under other law
PPTX
Digital personal data protection act, 2023.pptx
PPTX
Privacy and Privacy Law in India By Prashant Mali
PPT
Information Technology Act 2000
PDF
Cyber law & information technology
PPTX
Schools of Muslim Law.pptx
PDF
Supply under gst
PPTX
Legal drafting
PPTX
E-filing of Income tax Return
PPTX
Digital signatures
PDF
Supply under GST (goods and services tax)
PPTX
Tds 195 final
PPT
IT Act 2000
PPTX
5 fema act 1999
PPTX
Presentation on Unjust Enrichment
PPTX
Money Laundering Prevention Act- 2012
PPTX
E commerce PPT
PDF
Taxation of Royalty and FTS
PPTX
Hague convention for inter country adoption by dr alka mukherjee nagpur ms india
International convention on cyber crime
Privacy right under it act, 2000 and under other law
Digital personal data protection act, 2023.pptx
Privacy and Privacy Law in India By Prashant Mali
Information Technology Act 2000
Cyber law & information technology
Schools of Muslim Law.pptx
Supply under gst
Legal drafting
E-filing of Income tax Return
Digital signatures
Supply under GST (goods and services tax)
Tds 195 final
IT Act 2000
5 fema act 1999
Presentation on Unjust Enrichment
Money Laundering Prevention Act- 2012
E commerce PPT
Taxation of Royalty and FTS
Hague convention for inter country adoption by dr alka mukherjee nagpur ms india
Ad

Viewers also liked (20)

PDF
Reasonable security practices and procedures and sensitive personal data or i...
PPTX
Log management
PPTX
IT Security Management -- People, Procedures and Tools
PPTX
Review of Information Security Concepts
PPTX
Intrusion Prevention Systems
PPTX
types of personal computer
PPT
Indian perspective of cyber security
PPTX
Leveraging Compliance for Security with SIEM and Log Management
PPTX
Types of personal computers
PDF
Selected Aspects of Software Development
ODP
Cisco ios-cont
PPTX
Ddd part 2 modelling qiscus
PPT
Culture, Economy, Community: A Cultural Plan for Chatham-Kent
PDF
Veselin word camp-romania-2014
PDF
Jim Crotty Photography Of Summer 2006
PPTX
More amazing photoshop tut
PPT
Cultural Asset Mapping in Niagara
PDF
Intellectual property rights in sports in india
PDF
Law of Tele-medicine in India
PDF
Guide for de mystifying law of trade mark litigation in India
Reasonable security practices and procedures and sensitive personal data or i...
Log management
IT Security Management -- People, Procedures and Tools
Review of Information Security Concepts
Intrusion Prevention Systems
types of personal computer
Indian perspective of cyber security
Leveraging Compliance for Security with SIEM and Log Management
Types of personal computers
Selected Aspects of Software Development
Cisco ios-cont
Ddd part 2 modelling qiscus
Culture, Economy, Community: A Cultural Plan for Chatham-Kent
Veselin word camp-romania-2014
Jim Crotty Photography Of Summer 2006
More amazing photoshop tut
Cultural Asset Mapping in Niagara
Intellectual property rights in sports in india
Law of Tele-medicine in India
Guide for de mystifying law of trade mark litigation in India
Ad

Similar to Reasonable Security Practices And Procedures And Sensitive Personala 24 06 2011 Avantha (20)

PPT
Compliance audit under the Information Technology Act, 2000
PPTX
Privacy in India: Legal issues
PPTX
Right to privacy on internet and Data Protection
PPT
Data Privacy in India and data theft
PPTX
3A – DATA PROTECTION: ADVICE
 
PPT
Legal aspects of IT Security-at ISACA conference 2011
PPT
Legal aspects of IT security
PPT
Data protection in_india
PPTX
PRIVACY_SPI-Subject_3rdyear-BSITWeb.pptx
PPT
Gary Davis
PPTX
14-Computer Privacy and Security Principles.pptx
PDF
An Indian Outline on Database Protection
PDF
Blake lapthorn In House Lawyer forum - 11 Sept 2012
PDF
Startups - data protection
PPTX
POPI Seminar FINAL
PPTX
Lorson Resources Limited - Records & Information Presentation: Data Protectio...
PPT
969_powerpoint_on_data_protection.ppt
PPSX
Data Protection Act presentation
PPTX
Unit 6 Privacy and Data Protection 8 hr
Compliance audit under the Information Technology Act, 2000
Privacy in India: Legal issues
Right to privacy on internet and Data Protection
Data Privacy in India and data theft
3A – DATA PROTECTION: ADVICE
 
Legal aspects of IT Security-at ISACA conference 2011
Legal aspects of IT security
Data protection in_india
PRIVACY_SPI-Subject_3rdyear-BSITWeb.pptx
Gary Davis
14-Computer Privacy and Security Principles.pptx
An Indian Outline on Database Protection
Blake lapthorn In House Lawyer forum - 11 Sept 2012
Startups - data protection
POPI Seminar FINAL
Lorson Resources Limited - Records & Information Presentation: Data Protectio...
969_powerpoint_on_data_protection.ppt
Data Protection Act presentation
Unit 6 Privacy and Data Protection 8 hr

More from Vijay Dalmia (20)

PPTX
DIGITAL PERSONAL DATA PROTECTION ACT 2023-PPT-VPD.pptx
PPTX
Enforcement Of Intellectual Property Rights Through Customs
PPTX
White Collar Crime by Vijay Pal Dalmia.pptx
PPTX
Taxation of Cryptocurrencies – Virtual Digital Assets in India-VPDalmia.pptx
PPT
Indian Approach On Bitcoins-cryptocurrencies- Blockchain Legal Practical Pe...
PPTX
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
PPTX
Police Remand- Judicial Remand & Default Bail-Vijay Pal Dalmia Advocate.pptx
PPTX
Police Remand Judicial Remand & Default bail by Vijay Pal Dalmia Advocate
PPT
Indian approach on bitcoins, cryptocurrencies and blockchain – legal practica...
PDF
Sanction for prosecution of offences under chapter xii of the income tax act
PDF
Guide for de-mystifying law of trade mark enfocrement and litigation in india
PPT
IPR Enforcement in India through Criminal Measures - By Vijay Pal Dalmia
PDF
Process of criminal trial in india
PPT
LAW OF THE SEMICONDUCTOR INTEGRATED CIRCUITS IN INDIA By Vijay Pal Dalmia
PPT
Types of electronic contracts
PPT
Information Technology Policy for Corporates - Need of the Hour
PPT
Ipr enforcement in india
PPT
Patent law and Indian perspective
PPTX
Wills in the indian perspective
PDF
Law of nutritional and supplement food products in India-The Conflict
DIGITAL PERSONAL DATA PROTECTION ACT 2023-PPT-VPD.pptx
Enforcement Of Intellectual Property Rights Through Customs
White Collar Crime by Vijay Pal Dalmia.pptx
Taxation of Cryptocurrencies – Virtual Digital Assets in India-VPDalmia.pptx
Indian Approach On Bitcoins-cryptocurrencies- Blockchain Legal Practical Pe...
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
Police Remand- Judicial Remand & Default Bail-Vijay Pal Dalmia Advocate.pptx
Police Remand Judicial Remand & Default bail by Vijay Pal Dalmia Advocate
Indian approach on bitcoins, cryptocurrencies and blockchain – legal practica...
Sanction for prosecution of offences under chapter xii of the income tax act
Guide for de-mystifying law of trade mark enfocrement and litigation in india
IPR Enforcement in India through Criminal Measures - By Vijay Pal Dalmia
Process of criminal trial in india
LAW OF THE SEMICONDUCTOR INTEGRATED CIRCUITS IN INDIA By Vijay Pal Dalmia
Types of electronic contracts
Information Technology Policy for Corporates - Need of the Hour
Ipr enforcement in india
Patent law and Indian perspective
Wills in the indian perspective
Law of nutritional and supplement food products in India-The Conflict

Recently uploaded (20)

PPTX
A Presentation on Touch Screen Technology
PDF
Web App vs Mobile App What Should You Build First.pdf
PDF
DP Operators-handbook-extract for the Mautical Institute
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
project resource management chapter-09.pdf
PDF
A novel scalable deep ensemble learning framework for big data classification...
PDF
Mushroom cultivation and it's methods.pdf
PDF
Zenith AI: Advanced Artificial Intelligence
PPTX
Chapter 5: Probability Theory and Statistics
PPTX
A Presentation on Artificial Intelligence
PDF
August Patch Tuesday
PPTX
1. Introduction to Computer Programming.pptx
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PPTX
TLE Review Electricity (Electricity).pptx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
A Presentation on Touch Screen Technology
Web App vs Mobile App What Should You Build First.pdf
DP Operators-handbook-extract for the Mautical Institute
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
project resource management chapter-09.pdf
A novel scalable deep ensemble learning framework for big data classification...
Mushroom cultivation and it's methods.pdf
Zenith AI: Advanced Artificial Intelligence
Chapter 5: Probability Theory and Statistics
A Presentation on Artificial Intelligence
August Patch Tuesday
1. Introduction to Computer Programming.pptx
Encapsulation_ Review paper, used for researhc scholars
SOPHOS-XG Firewall Administrator PPT.pptx
TLE Review Electricity (Electricity).pptx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
NewMind AI Weekly Chronicles - August'25-Week II
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf

Reasonable Security Practices And Procedures And Sensitive Personala 24 06 2011 Avantha

  • 1. REASONABLE SECURITY PRACTICES AND PROCEDURES AND SENSITIVE PERSONAL DATA OR INFORMATION RULES, 2011 Under The (Indian) Information Technology Act, 2000 By Vijay Pal Dalmia, Advocate Partner & Head of Intellectual Property & Information Technology Laws Practice
  • 2. INFORMATION TECHNOLOGY ACT, 2000  Enacted in the year 2000 and was implemented w.e.f. 17th October, 2000.  Important features of this Act :  Recognition to e-transactions, digital signatures, electronic records etc. and also recognise their evidentiary value.  Lists out various computer crimes which are technological in nature.  However, this Act, originally, did not contain any provision for data protection.
  • 3. THE INFORMATION TECHNOLOGY (AMENDMENT) ACT, 2008  The IT Act, 2002 was amended in the year 2008.  Section 43A and Section 72A were added by the amendment Act for protection of personal data and information.  Boththese provisions are penal in nature, civil and criminal respectively.
  • 4. REASONABLE SECURITY PRACTICES AND PROCEDURES AND SENSITIVE PERSONAL DATA OR INFORMATION) RULES , 2011  Ministry Of Communications And Information Technology (Department Of Information Technology) promulgated these rules (IT Rules 2011), under Section 87 (2)(ob) read with Section 43A.  IT Rules, 2011 came in force on 11th April, 2011.  Non Compliance of these rules would lead to invocation of Section 43A of The IT Act, 2008 and liability to pay compensation, limits of which have not been fixed.
  • 5. SECTION 72A of IT Act 2008.  In addition to the civil liabilities under Section 43 A ◦ Any person, or ◦ Intermediary ◦ Is liable for punishment  Of imprisonment for term which may extend to  *3 years  Or fine up to INR 5,00,000  Or both ◦ For disclosure of information  In breach of lawful contract.  *(Cognizable offence and Bailable) ( as per Section. 77B)
  • 6. SECTION 43A: COMPENSATION FOR FAILURE TO PROTECT DATA Where a BODY CORPORATE,  possessing, dealing or handling any sensitive personal data or information  in a computer resource which it owns, controls or operates  is negligent in implementing and maintaining reasonable security practices and procedures  and thereby causes wrongful loss or wrongful gain to any person  such body corporate shall be liable to pay damages by way of compensation to the person so affected.
  • 7. DEFINITION OF BODY CORPORATE SECTION 43 A –Explanation (i) A body corporate would mean: any company and includes:  a firm,  sole proprietorship or  other association of individuals engaged in •commercial or •professional activities.
  • 8. SENSITIVE PERSONAL DATA OR INFORMATION: RULE 3, IT RULES, 2011 Sensitive personal data or information of a „person‟ means such „personal information‟ which consists of information relating to: 1. Password; 2. Financial information such as:  Bank account or,  Credit card or debit card or,  Other payment instrument details 3. Physical, physiological and mental health condition; 4. Sexual orientation; Contd…
  • 9. SENSITIVE PERSONAL DATA OR INFORMATION RULE 3 OF THE IT RULES, 2011 5. Biometric information; 6. Any detail relating to the above clauses  as provided to body corporate  for providing service; and 7. Any of the information received under above clauses by body corporate for  processing,  stored or  processed under a lawful contract or otherwise
  • 10. EXCEPTIONS: Following information is not regarded as sensitive personal data or information: 1. Information freely available or accessible in public domain or, 2. Information furnished under the Right to Information Act, 2005 (RTI) or 3. Information furnished under any other law for the time being in force.
  • 11. PERSONAL INFORMATION: RULE 2 , IT RULES, 2011  Any information that relates to a  „natural person‟  which either directly or indirectly, in combination with other information available or likely to be available with a body corporate,  is capable of identifying such person.
  • 12. MEANING OF REASONABLE SECURITY PRACTICES AND PROCEDURES Section 43, Explanation (ii)  Security practices and procedure designed to  protect such information from unauthorized • access, • damages, • use, • modification, • disclosure or • impairment, Contd…
  • 13. MEANING OF REASONABLE SECURITY PRACTICES AND PROCEDURES Section 43, Explanation (ii) Contd… as may be specified in :  an agreement between the parties or;  any law for the time being in force; or  in absence of such agreement or law,  such reasonable security practices and procedures,  as may be prescribed by the Central Government.
  • 14. Privacy Policy  Consent for collection of data  Collection of data  Use and Retention  Opt Out/Withdrawal  Access and Review of Information  Grievance Mechanism  Limitation on Disclosure of Information  Limitation on Transfer of Information  Reasonable Security Practices and Procedures
  • 15. PRIVACY POLICY: RULE 4  Body corporate or any person on its behalf ◦ collects, receives, possess, ◦ stores, deals or handles  information of provider of information  Shall provide a privacy policy for  handling of or dealing in  „personal information including sensitive personal data or information‟. Contd…
  • 16. PRIVACY POLICY: RULE 4 Privacy Policy shall be published on the website and provide:- • Clear and easily accessible statements of its practices and policies; • Type of personal or sensitive personal data or information collected; • Purpose of collection and usage of such information; • Disclosure of information including sensitive personal data or information; • Reasonable security practices and procedures followed by the corporate.
  • 17. CONSENT RULE 5 (1) o Requires the corporate or any person on its behalf, o before collection of sensitive personal data or information, o to obtain consent in writing through letter or FAX or email from the „provider of the information‟ o regarding purpose of usage of such information.
  • 18. CONSENT RULE 5(3) Requirements in case of collection of information directly from the person concerned: Steps to ensure that the person concerned is having the knowledge of : o The fact that the information is being collected; o The purpose for which the information is being collected; o The intended recipients of the information; and o The name and address of – ◦ the agency that is collecting the information; and ◦ the agency that will retain the information
  • 19. PURPOSE OF COLLECTION OF INFORMATION RULE 5 (2) Sensitive personal data or information can be collected only under following two circumstances: 1. For a „lawful purpose‟  connected with a function or activity of the body corporate or any person on it behalf; and 2. Considered „necessary‟ for that purpose
  • 20. USE AND RETENTION OF INFORMATION USE - RULE 5(5):  The information collected shall be used  only for the purpose for which it has been collected. RETENTION - RULE 5(4)  A body corporate or its representative  must not retain such information for  longer than is required for the purposes for which the information may lawfully be used. OR  as required under any other law in force.
  • 21. OPT OUT/WITHDRAWAL RULE 5(7) : Requires the body corporate to give the provider of information, an option: 1. prior to the collection of the information, to not provide the data or information sought to be collected 2. of withdrawing his consent given earlier to the body corporate.  Withdrawal shall be sent in writing to the body corporate.  the body corporate shall have the option to not provide goods or services for which the said information was sought.
  • 22. OPT OUT/WITHDRAWAL  It is noteworthy that, none of the rules talk about obtaining the consent of the person to whom the information relates in case the provider the information is not the person concerned.  For example, where the husband provides the medical information of the wife, consent of the wife is not required as per these rules as she is not the provider of the information. She also does not have the option of opting out as per Rule 5(7).
  • 23. ACCESS & REVIEW OF INFORMATION RULE 5(6) o Providers of information- permitted- to review the information provided by them- as and when requested by them; o Information- if found to be inaccurate or deficient shall be corrected or amended as feasible. o Body corporate NOT responsible for authenticity of the personal information or sensitive personal data or information as supplied by the provider to the body corporate.
  • 24. GRIEVANCE REDRESSAL MECHANISM RULE 5(9) o Time bound redressal of any discrepancies and grievances. o Grievance Officer shall be appointed. o Publication of name and contact details of Grievance Officer on website o Redressal of grievances: within one month from the date of receipt of grievance.
  • 25. LIMITATION ON DISCLOSURE OF INFORMATION RULE 6 Permission of the provider of the information is required before disclosure of information Exceptions: 1. when disclosure is agreed upon in the contract; 2. when disclosure is necessary for compliance of a legal obligation; 3. when disclosure to Government agencies mandated under the law to obtain information. 4. when disclosure to any third party by an order under the law for the time being in force.
  • 26. LIMITATION ON DISCLOSURE OF INFORMATION RULE 6  Rule 6 also forbids the following: 1. Publication of sensitive personal data or information by body corporate or its representative, 2. Disclosure by third party receiving the sensitive personal data or information from the body corporate.
  • 27. LIMITATION ON TRANSFER OF INFORMATION RULE 7 Transfer allowed to:  another body corporate or a person  in India, or located in any other country. Transfer is allowed only if : 1. other body corporate or person ensures the same level of data protection that is adhered to by the body corporate as provided under these rules. 2. it is necessary for the performance of the lawful contract between the provider of the information and the corporate receiving the information.
  • 28. REASONABLE SECURITY PRACTICES AND PROCEDURES RULE 8  Prescribes standard to be adhered to  by a body corporate, receiving the information, ◦ in the absence of an agreement between the parties; ◦ or any law for the time being in force.  One such prescribed standard: The International Standard IS/ISO/IEC 27001 on “Information Technology – Security Techniques – Information Security Management System – Requirements”.
  • 29. REASONABLE SECURITY PRACTICES AND PROCEDURES  Any other Security code, if followed shall be : o Duly approved and Notified o by the Central Government o Audited annually by an independent auditor approved by the Central Government.  In the event of an information security breach – demonstration of implementation of security control measures - by the body corporate.
  • 30. REASONABLE SECURITY PRACTICES AND PROCEDURES  A body corporate or a person on its behalf shall be deemed to have complied with reasonable security practices and procedures if:  They have implemented such security practices and standards, and  Have a  comprehensive documented information security programme; and  information security policies for: managerial, technical, operational and physical security which are proportionate with the information assets being protected with the nature of business.
  • 31. IT Act, 2000 is available at: http://www.mit.gov.in/sites/upload_files/dit/files/downloa ds/itact2000/itbill2000.pdf  IT (Amendment) Act, 2008 is available at: http://www.mit.gov.in/sites/upload_files/dit/files/downloa ds/itact2000/it_amendment_act2008.pdf  Information Technology (Reasonable security practices and procedures and sensitive personal data or information) Rules, 2011are available at: http://www.mit.gov.in/sites/upload_files/dit/files/GSR313 E_10511(1).pdf
  • 32. 1. What is the likelihood of active enforcement of the new rules? 2. What are the penalties for violations of the new rules? 3. Do the rules apply only to information collected from data subject in India, or do they also apply to information about data subjects located outside India?
  • 33. Do the rules apply to uses/disclosure of information that occur outside of India, if the information was originally collected in India?  Do the rules apply to pseudonymized information?  Is the “provider of the information” in Rule 5 referring to the subject, or can this be interpreted as referring to a third party that provides information but who is not the data subject?
  • 34. Are there opportunities for further clarification/amendment of the new rules?
  • 35. THANK YOU Intellectual Property & Information Technology Laws Division New Delhi Mumbai Bangalore Gurgaon Flat # 5-7, 10 Hailey Road, New Delhi, 110001 (India) Phone: +91 11 42492532 (Direct) Phone: +91 11 42492525 Ext 532 Mobile :- 9810081079 Fax: +91 11 23320484 email:- vpdalmia@vaishlaw.com