SlideShare a Scribd company logo
24-11-2023 1
Agenda
1. Introduction to Data Privacy
- What is data privacy
- Privacy laws around the globe
- DPDPA Journey
2. Understanding the New Indian DPDPA 2023
- Objectives
- Principles of DPDPA
- Applicability
- Rights & Duties of Individuals
- Principals
- Legal implications/penalties
3. A practical approach to DPDPA compliance
- Personal data Inventory
- DPIA
- Risk treatment
24-11-2023 2
What are the 3 types of privacy?
physical privacy (for instance, being frisked at airport security or giving a
bodily sample for medical reasons)
surveillance (where your identity can't be proved or information isn't
recorded)
information privacy (how your personal information is handled).
Privacy is the right to be let alone, or freedom from interference or intrusion. It can also mean the ability to seclude oneself
or information about oneself.
24-11-2023 3
What is data privacy?
24-11-2023 4
All organizations collect, process, store, and share customer, vendor, and employee
data - and this data often contains sensitive information that must be protected from
unauthorized access.
💠 The term 𝗣𝗲𝗿𝘀𝗼𝗻𝗮𝗹 𝗶𝗻𝗳𝗼𝗿𝗺𝗮𝘁𝗶𝗼𝗻 (𝗣𝗜) encompasses any information about a
living individual, regardless of whether it allows them to be distinguished from
another individual. Ex- IP Address, Photographs etc.📷
💠The term 𝗣𝗲𝗿𝘀𝗼𝗻𝗮𝗹𝗹𝘆 𝗜𝗱𝗲𝗻𝘁𝗶𝗳𝗶𝗮𝗯𝗹𝗲 𝗜𝗻𝗳𝗼𝗿𝗺𝗮𝘁𝗶𝗼𝗻 (𝗣𝗜𝗜) refers to information that
can be used to identify a person, such as their name, social security number, and
biometrics. This information is used to identify an individual, either alone or in
combination with other identifying information linked to the individual, for Example
their date of birth, place of birth etc.⚡
💠In addition to PII, 𝗦𝗲𝗻𝘀𝗶𝘁𝗶𝘃𝗲 𝗽𝗲𝗿𝘀𝗼𝗻𝗮𝗹 𝗶𝗻𝗳𝗼𝗿𝗺𝗮𝘁𝗶𝗼𝗻 (𝗦𝗣𝗜) must also be handled
with greater care, as its exposure could result in considerable financial or personal
harm to the individual involved. 💥
💠A 𝗣𝗿𝗼𝘁𝗲𝗰𝘁𝗲𝗱 𝗵𝗲𝗮𝗹𝘁𝗵 𝗶𝗻𝗳𝗼𝗿𝗺𝗮𝘁𝗶𝗼𝗻 (𝗣𝗛𝗜) is PII that has been linked to a health
record. This is one type of sensitive information that is governed by US regulation, the
Health Insurance Portability and Accountability Act (HIPAA). Healthcare providers,
health plans and insurers, healthcare clearinghouses, or businesses associated with
health care organizations are required to comply with the law. Ex- health plan
beneficiary numbers. 🚑
24-11-2023 5
24-11-2023 6
Privacy laws
around the
globe
24-11-2023 7
24-11-2023 8
India Ranked Third Worst For Data Privacy In Global Surveillance Index. Only Russia and China ranked
worse than India in terms of privacy and online surveillance, according to a study conducted by UK-
based research firm Compritech.
24-11-2023 9
Switzerland. Switzerland has guaranteed its citizens the right to privacy under its
constitution and enacted regulations. The Swiss Federal Data Protection Act (DPA)
prohibits personal data processing without the individual's consent the data relates to.
GDPR and DPDPA -
the similarities between
Data Protection Laws
10
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
DPDP Journey
24-11-2023 13
The Bill is largely inspired by the European Union’s General Data Protection Regulation,
24-11-2023 14
Understanding
the new
DPDPA 2023
24-11-2023 15
**The Digital Personal Data Protection Act*
1. This law is creating a new regime.
2. The era of misuse, the era of exploitation, the era of believing
that Indian citizens don’t have rights comes to an end with
this law.
3. It is an important marker to catalyze the innovation
ecosystem because it removes any ambiguity about what an
entity is supposed to do when privacy is declared as a
fundamental right.
4. The legislation specifically addresses citizens' privacy and
establishes guidelines on how individuals' data can be used
by private or government entities.
5. In case of a citizen's data breach, they simply need to visit
the website, provide the data protection board with details, and
the board will initiate an inquiry, imposing penalties on the
breaching platforms. We want the penalties to be punitive so that
it incentivizes platforms to be responsible.
24-11-2023 16
Objective of
DPDP
24-11-2023 17
24-11-2023 18
24-11-2023 19
Principle of
DPDP
24-11-2023 20
Seven Guiding Principles:
Consent, Lawfulness, and Transparency: Personal data
must be used with explicit consent, lawfully, and in a
transparent
manner.
Purpose Limitation: Data can only be used for the
specific purpose for which consent was obtained.
Data Minimization: Collection of only necessary
personal data to serve the designated purpose.
Data Accuracy: Ensuring data correctness and updates.
Storage Limitation: Storing data only for the required
period.
Reasonable Security Safeguards: Implementing
measures for data security.
Accountability: Holding entities responsible for data
breaches through adjudication and penalties.
24-11-2023 21
Structure of DPDP ACT
24-11-2023 22
24-11-2023 23
Applicability
24-11-2023 24
24-11-2023 25
Applicability of the Bill
The Bill is intended to apply to processing of
personal data within the territory of India by Indian
data fiduciaries and data processors.
Further, the Draft Bill is also intended to apply to
foreign data fiduciaries and data processors, where
personal data is processed by them in connection
with:
•any business carried on in India; or
•for systematic activity of offering goods or services
to data principals within the territory of India; or
•any activity which involves profiling of data
principals within India.
24-11-2023 26
Not Applicable/ Exempted
The Bill introduces an interesting prospect for startups in India. The
Central Government has the authority to identify and notify specific data
fiduciaries, including startups, that may be exempted from the Bill based
on the volume and nature of personal data they process. This opens up
avenues for building a culture for new age start ups in India. However,
necessary safeguards and guidelines for applicability of a start up needs to
be specified in the further iterations of the Bill.
24-11-2023 27
(i) non-digital data;
(ii) data processed for personal or domestic purposes; and
(iii) data made publicly available by a data principal or any other
person under a legal obligation.
24-11-2023 28
24-11-2023 29
24-11-2023 30
Key Terms
24-11-2023 31
24-11-2023 32
Roles
24-11-2023 33
Rights of Data Principals
24-11-2023 34
24-11-2023 35
24-11-2023 36
Penalties for
non-compliance
24-11-2023 37
24-11-2023 38
24-11-2023 39
Source
https://www.cpomagazine.com/data-
protection/tiktok-receives-e345-million-
gdpr-fine-in-years-old-childrens-privacy-
case/?utm_source=dlvr.it&utm_medium=li
nkedin
24-11-2023 40
24-11-2023 41
Compliance & Best Practices
8 Steps to DPDP Act
Compliance
1. Appoint a DPO
2. Create a Privacy Management Program
3. Conduct a Privacy Impact Assessment
4. Implement Data Protection Policies and
Procedures
5. Train Employees and Partners
6. Monitor and Review Compliance
7. Respond to Data Subject Requests
8. Report Data Breaches
5 Best Practices for Data
Protection
• Practice Data Minimization
• Securely Dispose of Data
• Encrypt Sensitive Data
• Implement Access Controls
• Regularly Update Security Measures
Way forward for
organizations
24-11-2023 43
24-11-2023 44
24-11-2023 45
24-11-2023 46
24-11-2023 47
24-11-2023 48
24-11-2023 49
24-11-2023 50
24-11-2023 51
24-11-2023 52
Findings and Remarks
Example checks
Focus areas
Privacy Controls
#
List all PII data types, like customer records and employee
information.
Ensure all data is identified and categorized.
Data Inventory
1
Review consent forms and tally records for its accuracy.
Confirm consent is obtained for data processing
Consent Management
2
Check user access permissions to personal data of data
subjects
Verify who has access to sensitive data.
Data Access Control
3
Confirm encryption of all PII in transit, at rest and on backups
Ensure data is encrypted when transmitted and stored
Data Encryption
4
Ensure DSRs and ensure data erasure solutions exist
Review policies for data retention and deletion
Data Retention & Erasure Policy
5
Review the steps to notify affected individuals per compliance
Check if a plan exists to respond to data breaches
Data Breach Response Plan
6
Confirm vendors comply with privacy requirements
Assess third-party data PII handling agreements
Third-Party Vendor privacy compliance
7
Verify completion of annual privacy training
Ensure staff is trained on data privacy
Employee awareness & Training
8
Review website privacy policy and notice
Check if privacy notices are provided to data subjects.
Privacy Policy and Notices
9
Track response time and completeness for access requests
Confirm processes for data subject rights requests
Data Subject Rights
10
Ensure EU data is transferred in line with GDPR
Verify compliance with cross-border data transfer rules
Cross-Border Data Transfers
11
Review DPIAs for new product launches and business
processes
Ensure DPIAs are conducted for high-risk processing.
Data Privacy Impact Assessments
(DPIAs)
12
Track and review incident report plans and procedures
Confirm procedures for reporting privacy incidents.
Incident Reporting
13
Eliminate unnecessary data fields in forms
Ensure data collected is minimal and necessary.
Data Minimization
14
Confirm customer contact details are up-to-date
Verify accuracy and update processes for data
Data Accuracy
15
Review results of the latest security audit
Check for regular data security audits
Data Security Audits
16
Confirm privacy impact assessments for new features
Ensure privacy is considered in product development
Privacy by Design
17
Keep a log of PII data processing for audit purposes
Maintain records of data processing activities
Records of Processing Activities
18
Ensure parental or guardian consent for children
Verify compliance with child data protection laws
Children's Data Protection
19
Use a dashboard to track data subject requests
Create a dashboard to monitor privacy compliance
Privacy Compliance Dashboard
20
Document dates and attendees of training sessions
Maintain logs of privacy training sessions
Privacy Training Logs
21
Set annual l vendor audit dates and maintain records
Schedule regular audits of third-party vendors
Vendor Privacy Audit Schedule
22
Maintain a log with PIA details signed off by management
Keep a register of all Privacy Impact Assessments
Privacy Impact Assessment Register
23
Simulate a data breach scenario and evaluate the response
Conduct data breach response drills /tabletop
Data Breach Response Exercises
24
DATAPRIVACY:1-Pager self-audit checklist
24-11-2023 53
24-11-2023 54
1. Consent: Organizations must obtain consent from individuals before processing their personal data. Consent
must be freely given, specific, informed, and unambiguous. Organizations must also provide individuals with
clear and concise information about how their personal data will be processed.
2. Lawful Purposes: Organizations may only process personal data for lawful purposes. These purposes include:
3. Providing goods or services to individuals
4. Complying with a legal obligation
5. Protecting the vital interests of an individual
6. Pursuing legitimate interests of the organization
7. Security: Organizations must take appropriate technical and organizational measures to protect personal data
from
8. unauthorized access, use, disclosure, alteration, or destruction.
9. Deletion: Organizations must delete personal data when it is no longer needed for the purpose for which it was
10. collected. Organizations may also delete personal data if an individual requests it.
11. Minor/Child Persona Data: The Act takes a proactive stance in protecting children's personal data. It allows the
12. processing of children's data only with parental consent and restricts harmful data practices like tracking,
behavioural
13. monitoring, and targeted advertising that could jeopardize their well-being.
14. Data Breaches: Organizations must report data breaches to the DPA within 72 hours of becoming aware of the
breach.
15. Data breaches must also be reported to individuals whose personal data has been compromised.
Organization Responsibility:
24-11-2023 55
How Can Businesses Comply With The Digital Personal Data Protection (DPDP) Law?
Some of the key steps that businesses need to take to comply with the Digital Personal Data Protectio
Law are:
1. Identify the personal data that they collect and process.
2. Obtain consent from individuals before collecting or processing their personal data.
3. Keep personal data secure.
4. Delete personal data when it is no longer needed.
5. Respond to individual requests for access, correction, or erasure of their personal data.
Why Do Businesses Need To Comply With The Digital Personal Data Protection (DPDP) Law?
Data Privacy Protection:
Legal Obligation:
Avoiding Fines and Penalties:
24-11-2023 56
Conclusion
Protect Your Privacy
The DPDP Act is a powerful tool to safeguard
your personal data and defend your privacy. It
requires organizations to be transparent,
accountable, and respectful of your rights.
Stay informed, stay vigilant, and stay in
control of your data.
Build Trust
The DPDP Act is also an opportunity for organizations
to build trust, credibility, and competitive advantage by
demonstrating their commitment to data protection and
privacy. By following best practices and going beyond
compliance, they can gain the trust and loyalty of their
customers and partners.
11/24/2023 58
GFL Internal document
24-11-2023 59

More Related Content

PDF
DPDP Act 2023.pdf
PPTX
ISO 27701
PDF
PPTX
Digital personal data protection act, 2023.pptx
PPTX
Gdpr presentation
PDF
GDPR Basics - General Data Protection Regulation
PPTX
DIGITAL PERSONAL DATA PROTECTION ACT 2023-PPT-VPD.pptx
PPTX
Privacy & Data Protection
DPDP Act 2023.pdf
ISO 27701
Digital personal data protection act, 2023.pptx
Gdpr presentation
GDPR Basics - General Data Protection Regulation
DIGITAL PERSONAL DATA PROTECTION ACT 2023-PPT-VPD.pptx
Privacy & Data Protection

What's hot (20)

PPTX
Presentation on GDPR
PPTX
Data Protection in India
PDF
An overview of the Indian Data Privacy Bill
PDF
GDPR Overview
PPTX
Data protection ppt
PDF
Data Protection and Privacy
PPT
Data protection
PPT
Data protection in_india
PPTX
Data protection and privacy
PPTX
GDPR: Training Materials by Qualsys
PDF
Data classification-policy
PPTX
General Data Protection Regulation (GDPR) | Privacy Law in India |
PPT
Data Privacy in India and data theft
PDF
Privacy and Data Security
PDF
What about GDPR?
PPTX
General Data Protection Regulation (GDPR)
PPTX
Right to privacy on internet and Data Protection
PPTX
GDPR
PDF
Privacy & Data Protection in the Digital World
Presentation on GDPR
Data Protection in India
An overview of the Indian Data Privacy Bill
GDPR Overview
Data protection ppt
Data Protection and Privacy
Data protection
Data protection in_india
Data protection and privacy
GDPR: Training Materials by Qualsys
Data classification-policy
General Data Protection Regulation (GDPR) | Privacy Law in India |
Data Privacy in India and data theft
Privacy and Data Security
What about GDPR?
General Data Protection Regulation (GDPR)
Right to privacy on internet and Data Protection
GDPR
Privacy & Data Protection in the Digital World
Ad

Similar to Digital Personal Data Protection (DPDP) Practical Approach For CISOs (20)

PDF
GDPR for Dummies
PPTX
New opportunities and business risks with evolving privacy regulations
PPTX
May 6 evolving international privacy regulations and cross border data tran...
PDF
GDPR: how IT works
PPTX
PERSONAL-DATA-PROTECTION-BILL-2018.pptx
PPTX
Managing Data Protection guide powerpoint presentation
PDF
DPIA step by step process approach and methodology
PPTX
My presentation- Ala about privacy and GDPR
PPTX
An Overview of GDPR
PDF
An Overview of GDPR by Pathway Group
PPTX
Understanding KSA’s PDPL in the Age of AI - Presentation from Pyxos - Feb 202...
PPTX
Unit 6 Privacy and Data Protection 8 hr
PPTX
DATA-PRIVACY-ACT.pptx
PPTX
GDPR Enforcement is here. Are you ready?
PPTX
Evolving international privacy regulations and cross border data transfer - g...
PDF
Bahrain-Personal-Data-Protection-Law.pdf
PDF
All_you_need_to Know_About_the_Data_Privacy_Act.pdf
PPTX
Data Privacy and consent management .. .
PPTX
Data privacy and consent management (K.sailaja).pptx
PPTX
Are you GDPR ready?
GDPR for Dummies
New opportunities and business risks with evolving privacy regulations
May 6 evolving international privacy regulations and cross border data tran...
GDPR: how IT works
PERSONAL-DATA-PROTECTION-BILL-2018.pptx
Managing Data Protection guide powerpoint presentation
DPIA step by step process approach and methodology
My presentation- Ala about privacy and GDPR
An Overview of GDPR
An Overview of GDPR by Pathway Group
Understanding KSA’s PDPL in the Age of AI - Presentation from Pyxos - Feb 202...
Unit 6 Privacy and Data Protection 8 hr
DATA-PRIVACY-ACT.pptx
GDPR Enforcement is here. Are you ready?
Evolving international privacy regulations and cross border data transfer - g...
Bahrain-Personal-Data-Protection-Law.pdf
All_you_need_to Know_About_the_Data_Privacy_Act.pdf
Data Privacy and consent management .. .
Data privacy and consent management (K.sailaja).pptx
Are you GDPR ready?
Ad

More from Priyanka Aash (20)

PPTX
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
PDF
From Chatbot to Destroyer of Endpoints - Can ChatGPT Automate EDR Bypasses (1...
PDF
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
PDF
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
PDF
Lessons Learned from Developing Secure AI Workflows.pdf
PDF
Cyber Defense Matrix Workshop - RSA Conference
PDF
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
PDF
Securing AI - There Is No Try, Only Do!.pdf
PDF
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
PDF
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
PDF
10 Key Challenges for AI within the EU Data Protection Framework.pdf
PDF
Techniques for Automatic Device Identification and Network Assignment.pdf
PDF
Keynote : Presentation on SASE Technology
PDF
Keynote : AI & Future Of Offensive Security
PDF
Redefining Cybersecurity with AI Capabilities
PDF
Demystifying Neural Networks And Building Cybersecurity Applications
PDF
Finetuning GenAI For Hacking and Defending
PDF
(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf
PDF
(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf
PDF
(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
From Chatbot to Destroyer of Endpoints - Can ChatGPT Automate EDR Bypasses (1...
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Lessons Learned from Developing Secure AI Workflows.pdf
Cyber Defense Matrix Workshop - RSA Conference
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
Securing AI - There Is No Try, Only Do!.pdf
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
10 Key Challenges for AI within the EU Data Protection Framework.pdf
Techniques for Automatic Device Identification and Network Assignment.pdf
Keynote : Presentation on SASE Technology
Keynote : AI & Future Of Offensive Security
Redefining Cybersecurity with AI Capabilities
Demystifying Neural Networks And Building Cybersecurity Applications
Finetuning GenAI For Hacking and Defending
(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf
(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf
(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf

Recently uploaded (20)

PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Empathic Computing: Creating Shared Understanding
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Electronic commerce courselecture one. Pdf
PPTX
Cloud computing and distributed systems.
PPT
Teaching material agriculture food technology
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PPTX
Telecom Fraud Prevention Guide | Hyperlink InfoSystem
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Chapter 2 Digital Image Fundamentals.pdf
PDF
How Onsite IT Support Drives Business Efficiency, Security, and Growth.pdf
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
Comunidade Salesforce São Paulo - Desmistificando o Omnistudio (Vlocity)
PPTX
MYSQL Presentation for SQL database connectivity
PDF
madgavkar20181017ppt McKinsey Presentation.pdf
Per capita expenditure prediction using model stacking based on satellite ima...
Empathic Computing: Creating Shared Understanding
Review of recent advances in non-invasive hemoglobin estimation
Advanced methodologies resolving dimensionality complications for autism neur...
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Electronic commerce courselecture one. Pdf
Cloud computing and distributed systems.
Teaching material agriculture food technology
The Rise and Fall of 3GPP – Time for a Sabbatical?
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Telecom Fraud Prevention Guide | Hyperlink InfoSystem
20250228 LYD VKU AI Blended-Learning.pptx
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Chapter 2 Digital Image Fundamentals.pdf
How Onsite IT Support Drives Business Efficiency, Security, and Growth.pdf
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Comunidade Salesforce São Paulo - Desmistificando o Omnistudio (Vlocity)
MYSQL Presentation for SQL database connectivity
madgavkar20181017ppt McKinsey Presentation.pdf

Digital Personal Data Protection (DPDP) Practical Approach For CISOs

  • 2. Agenda 1. Introduction to Data Privacy - What is data privacy - Privacy laws around the globe - DPDPA Journey 2. Understanding the New Indian DPDPA 2023 - Objectives - Principles of DPDPA - Applicability - Rights & Duties of Individuals - Principals - Legal implications/penalties 3. A practical approach to DPDPA compliance - Personal data Inventory - DPIA - Risk treatment 24-11-2023 2
  • 3. What are the 3 types of privacy? physical privacy (for instance, being frisked at airport security or giving a bodily sample for medical reasons) surveillance (where your identity can't be proved or information isn't recorded) information privacy (how your personal information is handled). Privacy is the right to be let alone, or freedom from interference or intrusion. It can also mean the ability to seclude oneself or information about oneself. 24-11-2023 3
  • 4. What is data privacy? 24-11-2023 4
  • 5. All organizations collect, process, store, and share customer, vendor, and employee data - and this data often contains sensitive information that must be protected from unauthorized access. 💠 The term 𝗣𝗲𝗿𝘀𝗼𝗻𝗮𝗹 𝗶𝗻𝗳𝗼𝗿𝗺𝗮𝘁𝗶𝗼𝗻 (𝗣𝗜) encompasses any information about a living individual, regardless of whether it allows them to be distinguished from another individual. Ex- IP Address, Photographs etc.📷 💠The term 𝗣𝗲𝗿𝘀𝗼𝗻𝗮𝗹𝗹𝘆 𝗜𝗱𝗲𝗻𝘁𝗶𝗳𝗶𝗮𝗯𝗹𝗲 𝗜𝗻𝗳𝗼𝗿𝗺𝗮𝘁𝗶𝗼𝗻 (𝗣𝗜𝗜) refers to information that can be used to identify a person, such as their name, social security number, and biometrics. This information is used to identify an individual, either alone or in combination with other identifying information linked to the individual, for Example their date of birth, place of birth etc.⚡ 💠In addition to PII, 𝗦𝗲𝗻𝘀𝗶𝘁𝗶𝘃𝗲 𝗽𝗲𝗿𝘀𝗼𝗻𝗮𝗹 𝗶𝗻𝗳𝗼𝗿𝗺𝗮𝘁𝗶𝗼𝗻 (𝗦𝗣𝗜) must also be handled with greater care, as its exposure could result in considerable financial or personal harm to the individual involved. 💥 💠A 𝗣𝗿𝗼𝘁𝗲𝗰𝘁𝗲𝗱 𝗵𝗲𝗮𝗹𝘁𝗵 𝗶𝗻𝗳𝗼𝗿𝗺𝗮𝘁𝗶𝗼𝗻 (𝗣𝗛𝗜) is PII that has been linked to a health record. This is one type of sensitive information that is governed by US regulation, the Health Insurance Portability and Accountability Act (HIPAA). Healthcare providers, health plans and insurers, healthcare clearinghouses, or businesses associated with health care organizations are required to comply with the law. Ex- health plan beneficiary numbers. 🚑 24-11-2023 5
  • 9. India Ranked Third Worst For Data Privacy In Global Surveillance Index. Only Russia and China ranked worse than India in terms of privacy and online surveillance, according to a study conducted by UK- based research firm Compritech. 24-11-2023 9 Switzerland. Switzerland has guaranteed its citizens the right to privacy under its constitution and enacted regulations. The Swiss Federal Data Protection Act (DPA) prohibits personal data processing without the individual's consent the data relates to.
  • 10. GDPR and DPDPA - the similarities between Data Protection Laws 10
  • 14. The Bill is largely inspired by the European Union’s General Data Protection Regulation, 24-11-2023 14
  • 16. **The Digital Personal Data Protection Act* 1. This law is creating a new regime. 2. The era of misuse, the era of exploitation, the era of believing that Indian citizens don’t have rights comes to an end with this law. 3. It is an important marker to catalyze the innovation ecosystem because it removes any ambiguity about what an entity is supposed to do when privacy is declared as a fundamental right. 4. The legislation specifically addresses citizens' privacy and establishes guidelines on how individuals' data can be used by private or government entities. 5. In case of a citizen's data breach, they simply need to visit the website, provide the data protection board with details, and the board will initiate an inquiry, imposing penalties on the breaching platforms. We want the penalties to be punitive so that it incentivizes platforms to be responsible. 24-11-2023 16
  • 21. Seven Guiding Principles: Consent, Lawfulness, and Transparency: Personal data must be used with explicit consent, lawfully, and in a transparent manner. Purpose Limitation: Data can only be used for the specific purpose for which consent was obtained. Data Minimization: Collection of only necessary personal data to serve the designated purpose. Data Accuracy: Ensuring data correctness and updates. Storage Limitation: Storing data only for the required period. Reasonable Security Safeguards: Implementing measures for data security. Accountability: Holding entities responsible for data breaches through adjudication and penalties. 24-11-2023 21
  • 22. Structure of DPDP ACT 24-11-2023 22
  • 26. Applicability of the Bill The Bill is intended to apply to processing of personal data within the territory of India by Indian data fiduciaries and data processors. Further, the Draft Bill is also intended to apply to foreign data fiduciaries and data processors, where personal data is processed by them in connection with: •any business carried on in India; or •for systematic activity of offering goods or services to data principals within the territory of India; or •any activity which involves profiling of data principals within India. 24-11-2023 26
  • 27. Not Applicable/ Exempted The Bill introduces an interesting prospect for startups in India. The Central Government has the authority to identify and notify specific data fiduciaries, including startups, that may be exempted from the Bill based on the volume and nature of personal data they process. This opens up avenues for building a culture for new age start ups in India. However, necessary safeguards and guidelines for applicability of a start up needs to be specified in the further iterations of the Bill. 24-11-2023 27
  • 28. (i) non-digital data; (ii) data processed for personal or domestic purposes; and (iii) data made publicly available by a data principal or any other person under a legal obligation. 24-11-2023 28
  • 34. Rights of Data Principals 24-11-2023 34
  • 42. Compliance & Best Practices 8 Steps to DPDP Act Compliance 1. Appoint a DPO 2. Create a Privacy Management Program 3. Conduct a Privacy Impact Assessment 4. Implement Data Protection Policies and Procedures 5. Train Employees and Partners 6. Monitor and Review Compliance 7. Respond to Data Subject Requests 8. Report Data Breaches 5 Best Practices for Data Protection • Practice Data Minimization • Securely Dispose of Data • Encrypt Sensitive Data • Implement Access Controls • Regularly Update Security Measures
  • 53. Findings and Remarks Example checks Focus areas Privacy Controls # List all PII data types, like customer records and employee information. Ensure all data is identified and categorized. Data Inventory 1 Review consent forms and tally records for its accuracy. Confirm consent is obtained for data processing Consent Management 2 Check user access permissions to personal data of data subjects Verify who has access to sensitive data. Data Access Control 3 Confirm encryption of all PII in transit, at rest and on backups Ensure data is encrypted when transmitted and stored Data Encryption 4 Ensure DSRs and ensure data erasure solutions exist Review policies for data retention and deletion Data Retention & Erasure Policy 5 Review the steps to notify affected individuals per compliance Check if a plan exists to respond to data breaches Data Breach Response Plan 6 Confirm vendors comply with privacy requirements Assess third-party data PII handling agreements Third-Party Vendor privacy compliance 7 Verify completion of annual privacy training Ensure staff is trained on data privacy Employee awareness & Training 8 Review website privacy policy and notice Check if privacy notices are provided to data subjects. Privacy Policy and Notices 9 Track response time and completeness for access requests Confirm processes for data subject rights requests Data Subject Rights 10 Ensure EU data is transferred in line with GDPR Verify compliance with cross-border data transfer rules Cross-Border Data Transfers 11 Review DPIAs for new product launches and business processes Ensure DPIAs are conducted for high-risk processing. Data Privacy Impact Assessments (DPIAs) 12 Track and review incident report plans and procedures Confirm procedures for reporting privacy incidents. Incident Reporting 13 Eliminate unnecessary data fields in forms Ensure data collected is minimal and necessary. Data Minimization 14 Confirm customer contact details are up-to-date Verify accuracy and update processes for data Data Accuracy 15 Review results of the latest security audit Check for regular data security audits Data Security Audits 16 Confirm privacy impact assessments for new features Ensure privacy is considered in product development Privacy by Design 17 Keep a log of PII data processing for audit purposes Maintain records of data processing activities Records of Processing Activities 18 Ensure parental or guardian consent for children Verify compliance with child data protection laws Children's Data Protection 19 Use a dashboard to track data subject requests Create a dashboard to monitor privacy compliance Privacy Compliance Dashboard 20 Document dates and attendees of training sessions Maintain logs of privacy training sessions Privacy Training Logs 21 Set annual l vendor audit dates and maintain records Schedule regular audits of third-party vendors Vendor Privacy Audit Schedule 22 Maintain a log with PIA details signed off by management Keep a register of all Privacy Impact Assessments Privacy Impact Assessment Register 23 Simulate a data breach scenario and evaluate the response Conduct data breach response drills /tabletop Data Breach Response Exercises 24 DATAPRIVACY:1-Pager self-audit checklist 24-11-2023 53
  • 55. 1. Consent: Organizations must obtain consent from individuals before processing their personal data. Consent must be freely given, specific, informed, and unambiguous. Organizations must also provide individuals with clear and concise information about how their personal data will be processed. 2. Lawful Purposes: Organizations may only process personal data for lawful purposes. These purposes include: 3. Providing goods or services to individuals 4. Complying with a legal obligation 5. Protecting the vital interests of an individual 6. Pursuing legitimate interests of the organization 7. Security: Organizations must take appropriate technical and organizational measures to protect personal data from 8. unauthorized access, use, disclosure, alteration, or destruction. 9. Deletion: Organizations must delete personal data when it is no longer needed for the purpose for which it was 10. collected. Organizations may also delete personal data if an individual requests it. 11. Minor/Child Persona Data: The Act takes a proactive stance in protecting children's personal data. It allows the 12. processing of children's data only with parental consent and restricts harmful data practices like tracking, behavioural 13. monitoring, and targeted advertising that could jeopardize their well-being. 14. Data Breaches: Organizations must report data breaches to the DPA within 72 hours of becoming aware of the breach. 15. Data breaches must also be reported to individuals whose personal data has been compromised. Organization Responsibility: 24-11-2023 55
  • 56. How Can Businesses Comply With The Digital Personal Data Protection (DPDP) Law? Some of the key steps that businesses need to take to comply with the Digital Personal Data Protectio Law are: 1. Identify the personal data that they collect and process. 2. Obtain consent from individuals before collecting or processing their personal data. 3. Keep personal data secure. 4. Delete personal data when it is no longer needed. 5. Respond to individual requests for access, correction, or erasure of their personal data. Why Do Businesses Need To Comply With The Digital Personal Data Protection (DPDP) Law? Data Privacy Protection: Legal Obligation: Avoiding Fines and Penalties: 24-11-2023 56
  • 57. Conclusion Protect Your Privacy The DPDP Act is a powerful tool to safeguard your personal data and defend your privacy. It requires organizations to be transparent, accountable, and respectful of your rights. Stay informed, stay vigilant, and stay in control of your data. Build Trust The DPDP Act is also an opportunity for organizations to build trust, credibility, and competitive advantage by demonstrating their commitment to data protection and privacy. By following best practices and going beyond compliance, they can gain the trust and loyalty of their customers and partners.