SlideShare a Scribd company logo
1
1
© 2022 TrustArc Inc. Proprietary and Confidential Information.
Preparing For India’s Data Protection Bill
January 25th, 2022
2
2
Speakers
K Royal, Ph.D.
Associate General Counsel,
Privacy Intel
TrustArc
Meaghan McCluskey
Associate General Counsel,
Research
TrustArc
3
3
Agenda
• The key components of the India’s Data Protection Bill
• The PDPB’s implications to your business
• The similarities and differences with the other global regulations (GDPR, PIPL, LGPD)
4
4
Key Components - Application
The bill applies to:
• Personal data collected, stored, disclosed, shared or
otherwise processed within India;
• Processing of personal data by any person under Indian law;
• Foreign data fiduciaries or data processors, if such
processing is in connection with:
○ any business carried on in India;
○ any systematic activity of offering goods or services to
data principals within India; or
○ any activity which involves profiling of data principals
within India.
• Processing of non-personal data including anonymised personal data.
5
5
Key Components - Definitions
Personal Data means data about or relating to a natural person who is directly or indirectly
identifiable, having regard to any characteristic, trait, attribute or any other feature of the
identity of such natural person, whether online or offline, or any combination of such
features with any other information, and shall include any inference drawn from such data
for the purpose of profiling;
Entities deciding the purposes and means of processing: Data Fiduciaries
Natural persons whose personal data is being processed: Data Principals
Sensitive Personal Data includes GDPR categories (except trade union membership) and
adds official identifiers, financial data, transgender and intersex status, caste or tribe.
6
6
Key Components - Obligations for All
• Fair and reasonable processing
• Purpose specification
• Data minimization
• Limited retention
• Transparency (notice in multiple languages,
• fairness of algorithms, data trust scores)
• Data quality (heightened accuracy for
decision-making and disclosures)
• Accountability
Data Privacy Principles
7
7
Key Components - Obligations for All
• Consent:
○ Free, informed, specific, clear, and capable of being withdrawn.
○ Explicitly obtained for sensitive data (cannot infer consent by conduct or context).
• If necessary under any law;
• For compliance with any judgment or order of any court, quasi-judicial authority or
Tribunal in India;
• For employment:
○ recruitment or termination, provision of benefits;
○ verify attendance, and performance assessment.
• Processing is necessary for “reasonable purposes” set out in Regs:
○ Examples: fraud detection, whistleblowing, mergers & acquisitions, credit scoring, network
and information security, debt collection, publicly available data, and search engines.
Legal Grounds for Processing (a selection…)
8
8
Key Components - Obligations for All
• Children & Minors:
○ Age verification - parental consent required for <18;
○ No profiling, tracking, behavioural monitoring or targeted advertising to children;
○ No processing of personal data that can cause “significant harm” to the child.
○ Explicitly obtained for sensitive data (cannot infer consent by conduct or context).
• Privacy by Design:
○ Policy required; can get certified.
• Security Safeguards
• Breach Notification:
○ Notify the DPA within 72 hours, DPA decides whether to notify data principals.
○ DPA shall take other necessary steps in case of breach of non-personal data.
9
9
Key Components - Obligations for All
• Data processors:
○ Contract necessary.
○ Data processors cannot involve a subprocessor w/o data fiduciary authorisation.
○ Only process personal data in accordance with instructions and treat as confidential.
• Grievance redressal mechanism:
○ DPO or other designated individual must resolve complaints within 30 days.
• Data Localization:
○ Must keep a copy of sensitive personal data in India (even if transferring abroad).
○ Critical personal data shall only be processed in India (to be defined).
• Cross Border Transfers:
○ Sensitive personal data transferred only with explicit consent and approved contract or
intra-group scheme, adequacy determination, otherwise allowed for a specific purpose.
10
10
Key Components - Data Principals’ Rights
• Confirmation & Access:
○ In a manner that is easily comprehensible to a
reasonable individual in a similar context;
○ Identify the identities of data fiduciaries with whom
personal data has been shared.
• Correction & Rectification
• Data Portability (unless not technically feasible)
• Right to be Forgotten & Restriction (only on order
of an Adjudicating Officer)
11
11
Key Components - Obligations for Some… Significant Fiduciaries
• Register with the DPA.
• Appoint a DPO.
• DPIAs (DPOs to review and submit to DPA):
○ New tech, Large scale processing, Sensitive personal data;
○ Any processing that carries a risk of significant harm to
data principals.
• Maintain Records:
○ Important operations in the data life cycle;
○ Periodic reviews of security safeguards;
○ DPIAs.
• Annual Independent Audits.
12
12
Key Components - Others
• Social Media Platforms:
○ To be treated as significant data fiduciaries if they
have a certain number of users and their actions have
or are likely to have a significant impact on the
sovereignty and integrity of India, electoral
democracy, security of the State or public order.
○ Enable persons who register for their services to
voluntarily verify their account.
• Government Agencies & Data Processors:
○ May be exempted from the Act.
13
13
Key Components - Penalties & Fines
• DPA can:
○ Order suspension or discontinuation of processing activities;
○ Vary, suspend or cancel any granted registrations.
• Penalties to be set out in regulations, but where not
specified, subject to a maximum of ~$135,000 USD
in case of significant data fiduciaries and ~$33,500 in
other cases.
• Representative actions may be filed with the DPA on
behalf of a group of data principals.
14
14
PDPB’s Implications
15
15
Comparison against other Global Laws
Definition of
Personal Information
CCPA / CPRA GDPR PIPL PDPB
information that identifies,
relates to, describes, is
capable of being
associated with, or could
reasonably be linked,
directly or indirectly, with a
particular consumer or
household (followed by
specifics)
information relating to an
identified or identifiable
natural person (ʻdata
subjectʼ); an identifiable
natural person is one who
can be identified, directly
or indirectly, in particular
by reference to an identifier
such as a name, an
identification number,
location data, an online
identifier or to one or more
factors specific to the
physical, physiological,
genetic, mental, economic,
cultural or social identity of
that natural person;
all kinds of information,
recorded by electronic or
other means, related to
identified or identifiable
natural persons, not
including information after
anonymization handling
Personal data is data
about or relating to a
natural person who is
directly or indirectly
identifiable, having regard
to any characteristic, trait,
attribute or any other
feature of the identity of
such natural person,
whether online or
offline, or any
combination of such
features with any
other information, and
shall include any
inference drawn
from such data for the
purpose of profiling
16
16
Sensitive Data CCPA / CPRA GDPR PIPL PDPB
Racial or ethnic origin X X i X (adds caste & tribe)
Religious & Philosophical Belief X X i X
Political opinions X i X
Union membership X X
Mental or physical health X X X X
Sexual orientation or sex life X X i X (adds intersex &
transgender status)
Citizenship or immigration i
Genetic or biometric data X X X X
Precise geolocation X X
Govt-issued ID numbers X i X
Account access credentials X i X (financial accounts)
Financial Accounts /
Information
X X
17
17
CCPA / CPRA GDPR PIPL PDPB
Sensitive Data Consent No / CPRA - may limit Yes, explicit consent Yes, separate consent Yes, Explicit Consent
Minors, Age <13, 13-15 <16 (member states cannot
go <13)
<14 <18
Applies B2B No (CCPA moratorium) Yes Yes Yes
Applies to Employees No (CCPA moratorium) Yes Yes Yes
Sale / Sharing Data Expansive Expansive Expansive Expansive
Opt-outs Sell / CPRA Share Right to object Sensitive data, transfers,
ads
Right to Withdraw Consent
Vendor Contract
Requirements
Yes Yes Yes Yes
Security Audits No / CPRA Yes No No Yes
DPIA / PIAs Yes (CPRA) Yes Yes Yes
(significant data fiduciaries)
18
18
Legal Basis for
Processing
CCPA / CPRA GDPR PIPL PDPB
Consent Opt-in for minors
If financial incentives
X X X
Contract (as party) X X
Legal obligation X X X
HR purposes X X
Vital interests X X (incl. property)
Public interest X X X
Legitimate interests X X (reasonable purposes)
Lawfully disclosed X X (within rules) X
Other under law X (member states) X X
19
19
Individual Rights CCPA / CPRA GDPR PIPL PDPB
Know
(transparency, notice,
confirm)
X X X X
Access X X X X
Rectification X X X X
Erasure X X X X (only on order by
Adjudicating Officer)
Restriction X X (if cannot delete) X (only on order by
Adjudicating Officer)
Portability O X X X
Objection X (minors, sell / share) X X
Automated Decision-Making X X X
Non-discrimination X X X
20
20
Thank You!
See http://www.trustarc.com/insightseries for the
2021 Privacy Insight Series and past webinar recordings.
If you would like to learn more about how TrustArc can support you with
compliance, please reach out to sales@trustarc.com for a free demo.

More Related Content

What's hot

An overview of the Indian Data Privacy Bill
An overview of the Indian Data Privacy Bill An overview of the Indian Data Privacy Bill
An overview of the Indian Data Privacy Bill
Komal Gadia
 
Privacy in India: Legal issues
Privacy in India: Legal issuesPrivacy in India: Legal issues
Privacy in India: Legal issuesSagar Rahurkar
 
Data Protection in India
Data Protection in IndiaData Protection in India
Data Protection in India
Home
 
Personal data protection bill
Personal data protection bill Personal data protection bill
Personal data protection bill
Mathew Chacko
 
Privacy right under it act, 2000 and under other law
Privacy right under it act, 2000 and under other lawPrivacy right under it act, 2000 and under other law
Privacy right under it act, 2000 and under other law
Nitya Nand Pandey
 
Amendments to the Indian Evidence Act, 1872 with respect to IT ACT 2000
Amendments to the Indian Evidence Act, 1872 with respect to IT ACT 2000Amendments to the Indian Evidence Act, 1872 with respect to IT ACT 2000
Amendments to the Indian Evidence Act, 1872 with respect to IT ACT 2000
Dr. Prashant Vats
 
E contract
E  contractE  contract
E contract
Benita Ezeigbo
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protection
atuljaybhaye
 
Presentation on GDPR
Presentation on GDPRPresentation on GDPR
Presentation on GDPR
DipanjanDey12
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
Extentia Information Technology
 
Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptDiya Mirza
 
E contracting in india
E contracting in indiaE contracting in india
E contracting in india
atuljaybhaye
 
Privacy & Data Protection
Privacy & Data ProtectionPrivacy & Data Protection
Privacy & Data Protection
sp_krishna
 
Data Protection Predictions for 2023.pdf
Data Protection Predictions for 2023.pdfData Protection Predictions for 2023.pdf
Data Protection Predictions for 2023.pdf
DarylBallesteros3
 
The Data Protection Act
The Data Protection ActThe Data Protection Act
The Data Protection ActSaimaRafiq
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
Tushar Rajput
 
Cyber law
Cyber lawCyber law
Privacy & Data Protection in the Digital World
Privacy & Data Protection in the Digital WorldPrivacy & Data Protection in the Digital World
Privacy & Data Protection in the Digital World
Arab Federation for Digital Economy
 

What's hot (20)

An overview of the Indian Data Privacy Bill
An overview of the Indian Data Privacy Bill An overview of the Indian Data Privacy Bill
An overview of the Indian Data Privacy Bill
 
Privacy in India: Legal issues
Privacy in India: Legal issuesPrivacy in India: Legal issues
Privacy in India: Legal issues
 
Data Protection in India
Data Protection in IndiaData Protection in India
Data Protection in India
 
E contracts
E contractsE contracts
E contracts
 
Personal data protection bill
Personal data protection bill Personal data protection bill
Personal data protection bill
 
Privacy right under it act, 2000 and under other law
Privacy right under it act, 2000 and under other lawPrivacy right under it act, 2000 and under other law
Privacy right under it act, 2000 and under other law
 
Amendments to the Indian Evidence Act, 1872 with respect to IT ACT 2000
Amendments to the Indian Evidence Act, 1872 with respect to IT ACT 2000Amendments to the Indian Evidence Act, 1872 with respect to IT ACT 2000
Amendments to the Indian Evidence Act, 1872 with respect to IT ACT 2000
 
E contract
E  contractE  contract
E contract
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protection
 
Presentation on GDPR
Presentation on GDPRPresentation on GDPR
Presentation on GDPR
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
 
Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatesppt
 
E contracting in india
E contracting in indiaE contracting in india
E contracting in india
 
Privacy & Data Protection
Privacy & Data ProtectionPrivacy & Data Protection
Privacy & Data Protection
 
Data Protection Predictions for 2023.pdf
Data Protection Predictions for 2023.pdfData Protection Predictions for 2023.pdf
Data Protection Predictions for 2023.pdf
 
The Data Protection Act
The Data Protection ActThe Data Protection Act
The Data Protection Act
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 
Cyber law
Cyber lawCyber law
Cyber law
 
it act 2000
it act 2000it act 2000
it act 2000
 
Privacy & Data Protection in the Digital World
Privacy & Data Protection in the Digital WorldPrivacy & Data Protection in the Digital World
Privacy & Data Protection in the Digital World
 

Similar to WB-2022-01-25-India Data Protection Bill

WB-2022-01-25-India's Data Protection Bill
WB-2022-01-25-India's Data Protection BillWB-2022-01-25-India's Data Protection Bill
WB-2022-01-25-India's Data Protection Bill
TrustArc
 
Data Decoded: Understanding India's Draft Data Protection Bill
Data Decoded: Understanding India's Draft Data Protection BillData Decoded: Understanding India's Draft Data Protection Bill
Data Decoded: Understanding India's Draft Data Protection Bill
Antaraa Vasudev
 
China's PIPL: How to Comply in Under 60 Days
China's PIPL: How to Comply in Under 60 DaysChina's PIPL: How to Comply in Under 60 Days
China's PIPL: How to Comply in Under 60 Days
TrustArc
 
GDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business AdvisorsGDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business Advisors
Harrison Clark Rickerbys
 
GDPR Breakfast Briefing for Business Owners, IT Directors, HR Directors & Ops...
GDPR Breakfast Briefing for Business Owners, IT Directors, HR Directors & Ops...GDPR Breakfast Briefing for Business Owners, IT Directors, HR Directors & Ops...
GDPR Breakfast Briefing for Business Owners, IT Directors, HR Directors & Ops...
Harrison Clark Rickerbys
 
GDPR for your Payroll Bureau
GDPR for your Payroll BureauGDPR for your Payroll Bureau
GDPR for your Payroll Bureau
BrightPay Payroll and Auto Enrolment Software
 
Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...
Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...
Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...
Burton Lee
 
GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready? GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready?
SecurityScorecard
 
GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...
GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...
GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...
Harrison Clark Rickerbys
 
GDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business AdvisorsGDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business Advisors
Harrison Clark Rickerbys
 
Gdpr presentation
Gdpr presentationGdpr presentation
Gdpr presentation
Sudarsan Reddy
 
Game changing legislation
Game changing legislationGame changing legislation
Game changing legislation
IRIS
 
GDPR - Sink or Swim
GDPR - Sink or SwimGDPR - Sink or Swim
GDPR - Sink or Swim
Guy Griffiths
 
Data Privacy and Data Protection: Rotary’s Compliance with GDPR
Data Privacy and Data Protection: Rotary’s Compliance with GDPRData Privacy and Data Protection: Rotary’s Compliance with GDPR
Data Privacy and Data Protection: Rotary’s Compliance with GDPR
Rotary International
 
CCPA for CISOs: What You Need to Know
CCPA for CISOs: What You Need to KnowCCPA for CISOs: What You Need to Know
CCPA for CISOs: What You Need to Know
TrustArc
 
Public sector breakfast club - October 2017, Exeter
Public sector breakfast club - October 2017, ExeterPublic sector breakfast club - October 2017, Exeter
Public sector breakfast club - October 2017, Exeter
Browne Jacobson LLP
 
California Consumer Privacy Act and the Role of IAM
California Consumer Privacy Act and the Role of IAMCalifornia Consumer Privacy Act and the Role of IAM
California Consumer Privacy Act and the Role of IAM
WSO2
 
GDPR clinic - CloudWATCH at Cloud Security Expo 2017
GDPR clinic - CloudWATCH at Cloud Security Expo 2017GDPR clinic - CloudWATCH at Cloud Security Expo 2017
GDPR clinic - CloudWATCH at Cloud Security Expo 2017
CloudWATCH Consortium
 
Data Protection GDPR Basics
Data Protection GDPR BasicsData Protection GDPR Basics
Data Protection GDPR Basics
Elizabeth Dunne B.L. PC.dp
 
GDPR for your Payroll Bureau
GDPR for your Payroll BureauGDPR for your Payroll Bureau
GDPR for your Payroll Bureau
BrightPay Payroll and Auto Enrolment Software
 

Similar to WB-2022-01-25-India Data Protection Bill (20)

WB-2022-01-25-India's Data Protection Bill
WB-2022-01-25-India's Data Protection BillWB-2022-01-25-India's Data Protection Bill
WB-2022-01-25-India's Data Protection Bill
 
Data Decoded: Understanding India's Draft Data Protection Bill
Data Decoded: Understanding India's Draft Data Protection BillData Decoded: Understanding India's Draft Data Protection Bill
Data Decoded: Understanding India's Draft Data Protection Bill
 
China's PIPL: How to Comply in Under 60 Days
China's PIPL: How to Comply in Under 60 DaysChina's PIPL: How to Comply in Under 60 Days
China's PIPL: How to Comply in Under 60 Days
 
GDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business AdvisorsGDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business Advisors
 
GDPR Breakfast Briefing for Business Owners, IT Directors, HR Directors & Ops...
GDPR Breakfast Briefing for Business Owners, IT Directors, HR Directors & Ops...GDPR Breakfast Briefing for Business Owners, IT Directors, HR Directors & Ops...
GDPR Breakfast Briefing for Business Owners, IT Directors, HR Directors & Ops...
 
GDPR for your Payroll Bureau
GDPR for your Payroll BureauGDPR for your Payroll Bureau
GDPR for your Payroll Bureau
 
Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...
Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...
Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...
 
GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready? GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready?
 
GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...
GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...
GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...
 
GDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business AdvisorsGDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business Advisors
 
Gdpr presentation
Gdpr presentationGdpr presentation
Gdpr presentation
 
Game changing legislation
Game changing legislationGame changing legislation
Game changing legislation
 
GDPR - Sink or Swim
GDPR - Sink or SwimGDPR - Sink or Swim
GDPR - Sink or Swim
 
Data Privacy and Data Protection: Rotary’s Compliance with GDPR
Data Privacy and Data Protection: Rotary’s Compliance with GDPRData Privacy and Data Protection: Rotary’s Compliance with GDPR
Data Privacy and Data Protection: Rotary’s Compliance with GDPR
 
CCPA for CISOs: What You Need to Know
CCPA for CISOs: What You Need to KnowCCPA for CISOs: What You Need to Know
CCPA for CISOs: What You Need to Know
 
Public sector breakfast club - October 2017, Exeter
Public sector breakfast club - October 2017, ExeterPublic sector breakfast club - October 2017, Exeter
Public sector breakfast club - October 2017, Exeter
 
California Consumer Privacy Act and the Role of IAM
California Consumer Privacy Act and the Role of IAMCalifornia Consumer Privacy Act and the Role of IAM
California Consumer Privacy Act and the Role of IAM
 
GDPR clinic - CloudWATCH at Cloud Security Expo 2017
GDPR clinic - CloudWATCH at Cloud Security Expo 2017GDPR clinic - CloudWATCH at Cloud Security Expo 2017
GDPR clinic - CloudWATCH at Cloud Security Expo 2017
 
Data Protection GDPR Basics
Data Protection GDPR BasicsData Protection GDPR Basics
Data Protection GDPR Basics
 
GDPR for your Payroll Bureau
GDPR for your Payroll BureauGDPR for your Payroll Bureau
GDPR for your Payroll Bureau
 

More from TrustArc

TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc
 
TrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie WorldTrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc
 
TrustArc Webinar - TrustArc's Latest AI Innovations
TrustArc Webinar - TrustArc's Latest AI InnovationsTrustArc Webinar - TrustArc's Latest AI Innovations
TrustArc Webinar - TrustArc's Latest AI Innovations
TrustArc
 
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc
 
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data SecurityTrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
TrustArc
 
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
TrustArc
 
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
TrustArc
 
Nymity Framework: Privacy & Data Protection Update in 7 States
Nymity Framework: Privacy & Data Protection Update in 7 StatesNymity Framework: Privacy & Data Protection Update in 7 States
Nymity Framework: Privacy & Data Protection Update in 7 States
TrustArc
 
CBPR - Navigating Cross-Border Data Privacy Compliance
CBPR - Navigating Cross-Border Data Privacy ComplianceCBPR - Navigating Cross-Border Data Privacy Compliance
CBPR - Navigating Cross-Border Data Privacy Compliance
TrustArc
 
Everything You Need to Know about DPF But Are Afraid to Ask.pdf
Everything You Need to Know about DPF But Are Afraid to Ask.pdfEverything You Need to Know about DPF But Are Afraid to Ask.pdf
Everything You Need to Know about DPF But Are Afraid to Ask.pdf
TrustArc
 
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
TrustArc
 
Privacy Enhancing Technologies: Exploring the Benefits and Recommendations
Privacy Enhancing Technologies: Exploring the Benefits and RecommendationsPrivacy Enhancing Technologies: Exploring the Benefits and Recommendations
Privacy Enhancing Technologies: Exploring the Benefits and Recommendations
TrustArc
 
Building Trust and Competitive Advantage: The Value of Privacy Certifications
Building Trust and Competitive Advantage: The Value of Privacy CertificationsBuilding Trust and Competitive Advantage: The Value of Privacy Certifications
Building Trust and Competitive Advantage: The Value of Privacy Certifications
TrustArc
 
The California Age Appropriate Design Code Act Navigating the New Requirement...
The California Age Appropriate Design Code Act Navigating the New Requirement...The California Age Appropriate Design Code Act Navigating the New Requirement...
The California Age Appropriate Design Code Act Navigating the New Requirement...
TrustArc
 
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
TrustArc
 
Artificial Intelligence Bill of Rights: Impacts on AI Governance
Artificial Intelligence Bill of Rights: Impacts on AI GovernanceArtificial Intelligence Bill of Rights: Impacts on AI Governance
Artificial Intelligence Bill of Rights: Impacts on AI Governance
TrustArc
 
How To Do Data Transfers Between EU-US in 2023
How To Do Data Transfers Between EU-US in 2023How To Do Data Transfers Between EU-US in 2023
How To Do Data Transfers Between EU-US in 2023
TrustArc
 

More from TrustArc (20)

TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
TrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie WorldTrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie World
 
TrustArc Webinar - TrustArc's Latest AI Innovations
TrustArc Webinar - TrustArc's Latest AI InnovationsTrustArc Webinar - TrustArc's Latest AI Innovations
TrustArc Webinar - TrustArc's Latest AI Innovations
 
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
 
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data SecurityTrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
 
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
 
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
 
Nymity Framework: Privacy & Data Protection Update in 7 States
Nymity Framework: Privacy & Data Protection Update in 7 StatesNymity Framework: Privacy & Data Protection Update in 7 States
Nymity Framework: Privacy & Data Protection Update in 7 States
 
CBPR - Navigating Cross-Border Data Privacy Compliance
CBPR - Navigating Cross-Border Data Privacy ComplianceCBPR - Navigating Cross-Border Data Privacy Compliance
CBPR - Navigating Cross-Border Data Privacy Compliance
 
Everything You Need to Know about DPF But Are Afraid to Ask.pdf
Everything You Need to Know about DPF But Are Afraid to Ask.pdfEverything You Need to Know about DPF But Are Afraid to Ask.pdf
Everything You Need to Know about DPF But Are Afraid to Ask.pdf
 
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
 
Privacy Enhancing Technologies: Exploring the Benefits and Recommendations
Privacy Enhancing Technologies: Exploring the Benefits and RecommendationsPrivacy Enhancing Technologies: Exploring the Benefits and Recommendations
Privacy Enhancing Technologies: Exploring the Benefits and Recommendations
 
Building Trust and Competitive Advantage: The Value of Privacy Certifications
Building Trust and Competitive Advantage: The Value of Privacy CertificationsBuilding Trust and Competitive Advantage: The Value of Privacy Certifications
Building Trust and Competitive Advantage: The Value of Privacy Certifications
 
The California Age Appropriate Design Code Act Navigating the New Requirement...
The California Age Appropriate Design Code Act Navigating the New Requirement...The California Age Appropriate Design Code Act Navigating the New Requirement...
The California Age Appropriate Design Code Act Navigating the New Requirement...
 
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
 
Artificial Intelligence Bill of Rights: Impacts on AI Governance
Artificial Intelligence Bill of Rights: Impacts on AI GovernanceArtificial Intelligence Bill of Rights: Impacts on AI Governance
Artificial Intelligence Bill of Rights: Impacts on AI Governance
 
How To Do Data Transfers Between EU-US in 2023
How To Do Data Transfers Between EU-US in 2023How To Do Data Transfers Between EU-US in 2023
How To Do Data Transfers Between EU-US in 2023
 

Recently uploaded

Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 

Recently uploaded (20)

Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 

WB-2022-01-25-India Data Protection Bill

  • 1. 1 1 © 2022 TrustArc Inc. Proprietary and Confidential Information. Preparing For India’s Data Protection Bill January 25th, 2022
  • 2. 2 2 Speakers K Royal, Ph.D. Associate General Counsel, Privacy Intel TrustArc Meaghan McCluskey Associate General Counsel, Research TrustArc
  • 3. 3 3 Agenda • The key components of the India’s Data Protection Bill • The PDPB’s implications to your business • The similarities and differences with the other global regulations (GDPR, PIPL, LGPD)
  • 4. 4 4 Key Components - Application The bill applies to: • Personal data collected, stored, disclosed, shared or otherwise processed within India; • Processing of personal data by any person under Indian law; • Foreign data fiduciaries or data processors, if such processing is in connection with: ○ any business carried on in India; ○ any systematic activity of offering goods or services to data principals within India; or ○ any activity which involves profiling of data principals within India. • Processing of non-personal data including anonymised personal data.
  • 5. 5 5 Key Components - Definitions Personal Data means data about or relating to a natural person who is directly or indirectly identifiable, having regard to any characteristic, trait, attribute or any other feature of the identity of such natural person, whether online or offline, or any combination of such features with any other information, and shall include any inference drawn from such data for the purpose of profiling; Entities deciding the purposes and means of processing: Data Fiduciaries Natural persons whose personal data is being processed: Data Principals Sensitive Personal Data includes GDPR categories (except trade union membership) and adds official identifiers, financial data, transgender and intersex status, caste or tribe.
  • 6. 6 6 Key Components - Obligations for All • Fair and reasonable processing • Purpose specification • Data minimization • Limited retention • Transparency (notice in multiple languages, • fairness of algorithms, data trust scores) • Data quality (heightened accuracy for decision-making and disclosures) • Accountability Data Privacy Principles
  • 7. 7 7 Key Components - Obligations for All • Consent: ○ Free, informed, specific, clear, and capable of being withdrawn. ○ Explicitly obtained for sensitive data (cannot infer consent by conduct or context). • If necessary under any law; • For compliance with any judgment or order of any court, quasi-judicial authority or Tribunal in India; • For employment: ○ recruitment or termination, provision of benefits; ○ verify attendance, and performance assessment. • Processing is necessary for “reasonable purposes” set out in Regs: ○ Examples: fraud detection, whistleblowing, mergers & acquisitions, credit scoring, network and information security, debt collection, publicly available data, and search engines. Legal Grounds for Processing (a selection…)
  • 8. 8 8 Key Components - Obligations for All • Children & Minors: ○ Age verification - parental consent required for <18; ○ No profiling, tracking, behavioural monitoring or targeted advertising to children; ○ No processing of personal data that can cause “significant harm” to the child. ○ Explicitly obtained for sensitive data (cannot infer consent by conduct or context). • Privacy by Design: ○ Policy required; can get certified. • Security Safeguards • Breach Notification: ○ Notify the DPA within 72 hours, DPA decides whether to notify data principals. ○ DPA shall take other necessary steps in case of breach of non-personal data.
  • 9. 9 9 Key Components - Obligations for All • Data processors: ○ Contract necessary. ○ Data processors cannot involve a subprocessor w/o data fiduciary authorisation. ○ Only process personal data in accordance with instructions and treat as confidential. • Grievance redressal mechanism: ○ DPO or other designated individual must resolve complaints within 30 days. • Data Localization: ○ Must keep a copy of sensitive personal data in India (even if transferring abroad). ○ Critical personal data shall only be processed in India (to be defined). • Cross Border Transfers: ○ Sensitive personal data transferred only with explicit consent and approved contract or intra-group scheme, adequacy determination, otherwise allowed for a specific purpose.
  • 10. 10 10 Key Components - Data Principals’ Rights • Confirmation & Access: ○ In a manner that is easily comprehensible to a reasonable individual in a similar context; ○ Identify the identities of data fiduciaries with whom personal data has been shared. • Correction & Rectification • Data Portability (unless not technically feasible) • Right to be Forgotten & Restriction (only on order of an Adjudicating Officer)
  • 11. 11 11 Key Components - Obligations for Some… Significant Fiduciaries • Register with the DPA. • Appoint a DPO. • DPIAs (DPOs to review and submit to DPA): ○ New tech, Large scale processing, Sensitive personal data; ○ Any processing that carries a risk of significant harm to data principals. • Maintain Records: ○ Important operations in the data life cycle; ○ Periodic reviews of security safeguards; ○ DPIAs. • Annual Independent Audits.
  • 12. 12 12 Key Components - Others • Social Media Platforms: ○ To be treated as significant data fiduciaries if they have a certain number of users and their actions have or are likely to have a significant impact on the sovereignty and integrity of India, electoral democracy, security of the State or public order. ○ Enable persons who register for their services to voluntarily verify their account. • Government Agencies & Data Processors: ○ May be exempted from the Act.
  • 13. 13 13 Key Components - Penalties & Fines • DPA can: ○ Order suspension or discontinuation of processing activities; ○ Vary, suspend or cancel any granted registrations. • Penalties to be set out in regulations, but where not specified, subject to a maximum of ~$135,000 USD in case of significant data fiduciaries and ~$33,500 in other cases. • Representative actions may be filed with the DPA on behalf of a group of data principals.
  • 15. 15 15 Comparison against other Global Laws Definition of Personal Information CCPA / CPRA GDPR PIPL PDPB information that identifies, relates to, describes, is capable of being associated with, or could reasonably be linked, directly or indirectly, with a particular consumer or household (followed by specifics) information relating to an identified or identifiable natural person (ʻdata subjectʼ); an identifiable natural person is one who can be identified, directly or indirectly, in particular by reference to an identifier such as a name, an identification number, location data, an online identifier or to one or more factors specific to the physical, physiological, genetic, mental, economic, cultural or social identity of that natural person; all kinds of information, recorded by electronic or other means, related to identified or identifiable natural persons, not including information after anonymization handling Personal data is data about or relating to a natural person who is directly or indirectly identifiable, having regard to any characteristic, trait, attribute or any other feature of the identity of such natural person, whether online or offline, or any combination of such features with any other information, and shall include any inference drawn from such data for the purpose of profiling
  • 16. 16 16 Sensitive Data CCPA / CPRA GDPR PIPL PDPB Racial or ethnic origin X X i X (adds caste & tribe) Religious & Philosophical Belief X X i X Political opinions X i X Union membership X X Mental or physical health X X X X Sexual orientation or sex life X X i X (adds intersex & transgender status) Citizenship or immigration i Genetic or biometric data X X X X Precise geolocation X X Govt-issued ID numbers X i X Account access credentials X i X (financial accounts) Financial Accounts / Information X X
  • 17. 17 17 CCPA / CPRA GDPR PIPL PDPB Sensitive Data Consent No / CPRA - may limit Yes, explicit consent Yes, separate consent Yes, Explicit Consent Minors, Age <13, 13-15 <16 (member states cannot go <13) <14 <18 Applies B2B No (CCPA moratorium) Yes Yes Yes Applies to Employees No (CCPA moratorium) Yes Yes Yes Sale / Sharing Data Expansive Expansive Expansive Expansive Opt-outs Sell / CPRA Share Right to object Sensitive data, transfers, ads Right to Withdraw Consent Vendor Contract Requirements Yes Yes Yes Yes Security Audits No / CPRA Yes No No Yes DPIA / PIAs Yes (CPRA) Yes Yes Yes (significant data fiduciaries)
  • 18. 18 18 Legal Basis for Processing CCPA / CPRA GDPR PIPL PDPB Consent Opt-in for minors If financial incentives X X X Contract (as party) X X Legal obligation X X X HR purposes X X Vital interests X X (incl. property) Public interest X X X Legitimate interests X X (reasonable purposes) Lawfully disclosed X X (within rules) X Other under law X (member states) X X
  • 19. 19 19 Individual Rights CCPA / CPRA GDPR PIPL PDPB Know (transparency, notice, confirm) X X X X Access X X X X Rectification X X X X Erasure X X X X (only on order by Adjudicating Officer) Restriction X X (if cannot delete) X (only on order by Adjudicating Officer) Portability O X X X Objection X (minors, sell / share) X X Automated Decision-Making X X X Non-discrimination X X X
  • 20. 20 20 Thank You! See http://www.trustarc.com/insightseries for the 2021 Privacy Insight Series and past webinar recordings. If you would like to learn more about how TrustArc can support you with compliance, please reach out to sales@trustarc.com for a free demo.