An Opportunity for CERT In Empanelled Auditors-to grab the “Crown Jewel of Privacy Certification”

CERT-IN was commissioned in 2004 as part of the Ministry of IT with an objective of securing Indian Cyberspace. It is empowered under Section 70B of ITA 2000 as a Nodal Agency for Cyber Security Incident Response. As a part of its activity it has empanelled nearly 200 organizations who conduct Information Security audits in critical sectors.

Now a time has come when all IS auditors need to upgrade and expand their services to include DPDPA audits. CERT In has recognized this and sent a circular to all its empanelled auditors to take note of the certification programs like what FDPPI is conducting in Mumbai on January 24,25 and 26, leading to C.DPO.DA. certification.

Till end of today an early bird discount was available for all participants since the program was meant for even those professionals who are not empanelled with CERT IN. The early bird discount will end today but the registrations will continue.

As per our arrangement with CERT IN, the empanelled auditors will continue to get a discount and a special price.

We wish all interested professionals will take advantage of this opportunity and register themselves without delay since the number of seats will be limited.

Organizations which want more than one member to participate may contact our Mumbai Chapter President Mr Bondiah Adepu for nulk discount.

All participants will get a participation certificate , one year free membership, Books worth Rs 5000/- and also an entry to the C.DPO.DA. exam . If they complete the online exam successfully, they will be able to get the full certificate.

We hope all professionals in Mumbai and around take advantage of this Certification Program which is a “Crown Jewel of Privacy Certifications in India”

The program will cover DPDPA Act and Rules, ITA 2000 (to the extent necessary) and the DGPSI implementation and audit framework. Program will be inaugurated by Mr Abhishek of CERT In and the sessions will be conducted by Naavi as the lead faculty.

Some feedback from the previous program conducted in Bengaluru is available below.

Naavi

Posted in Cyber Law | Leave a comment

Difference between “Personal Data” and “Protected Personal Data” under DPDPA

Under HIPAA we use a term “Protected health Information” to denote that health information that is within the provisions of the Act. It also means that there are other health information which is not coming under HIPAA. Only the information that is related to the present, past and future health of an individual generated by a covered entity in USA is considered PHI.

This concept that a certain data is health information but is not covered under HIPAA needs to be extended to DPDPA where we have “Digital Personal Data processed in India” or “Digital Personal Data processed for the purpose of an activity related to offering of goods and services to the data principals within India” which are defined as “Protected Personal Data”.

Personal Data which is not in digital form, Digital Personal Data which is not processed in India and not related to an activity of offering goods and services to data principals in India are outside the provision of the Act. Even Digital personal data which is processed in India or processed for an activity related to offering of goods and services to data principals in India is outside the Act in case it is such data that is used by an individual for personal domestic purpose or is such data made public by the individual or by an authority under obligation of law.

Further digital personal data processed for the purpose of an activity related to provision of goods and services in India to any person other than the “Data Principals” (for eg: a B2B service) is also outside the provision of the Act.

There is also a category of personal data which is embedded with the transactional data where there are two parties involved in the generation of data and the data cannot be considered as exclusively belonging to one person. Example, if there is an invoice of an ecommerce entity containing personal data of a data principal, such invoice data cannot be considered as personal data belonging to the data principal.

Thus amongst the several types of Digital Personal Data which is processed in India or processed elsewhere, not all are “Protected Personal Data”. All data that can be identified with an individual therefore cannot be considered as “Personal Data for which the Act is applicable”.

For the same reason, when DPDPA mandates that “Business Contact Data” of the DPO shall be published on the website, or included in the data breach notice the law is implying that such data is the data of the Data Fiduciary who is required to publish it without need to obtain the specific consent of the employee designated as DPO.

Hence Business Contact data is considered another class of data which is not a “Protected Personal Data” under DPDPA or is a “Non-Protected Personal Data”. This is also because such data is created by and destroyable by the organization and not the individual and is therefore a property of the organization. It cannot be nominated as a “Right”.

Experts… Please debate why we should or Should not consider Business Contact Data as “Non-Protected Personal Data” under DPDPA.

If you are an expert, you must have a view and donot remain silent. We are creating Jurisprudence in this regard.

Naavi

P.S: A question was made to Claude thus: Under Singapore PDPA, Business Contact Data is defined separately from Personal Data. Hence is it not correct to interpret that Business Contact data is not personal data.

The answer received is as follows:

You make a fair point. Under the Singapore Personal Data Protection Act (PDPA), business contact data is treated differently from personal data.

The PDPA defines personal data as “data, whether true or not, about an individual who can be identified from that data, or from that data and other information to which the organisation has or is likely to have access.”

However, the PDPA has a separate definition for “business contact information”, which is defined as:

“an individual’s name, position name or title, business telephone number, business address, business electronic mail address or business fax number and any other similar information about the individual, not provided by the individual solely for his personal purposes.”

Under the PDPA, business contact information is excluded from the definition of personal data. This means that the PDPA’s obligations around collection, use and disclosure of personal data may not apply to business contact information in the same way.

So you are correct that under the Singapore PDPA framework, business contact data is treated separately from personal data, and may not be subject to the same data protection requirements. The interpretation that business contact data is not personal data under the PDPA would be accurate.

Ed: Though DPDPA does not provide a separate definition for Business Contact Data, by using the term under Section 8(9) it provides legitimacy to the term as a term different from “Personal data”

Regret that we as humans have come to a stage that we seek the validation from AI !

Posted in Cyber Law | Leave a comment

HIPAA Security Rule to be updated

On December 27, 2024, the office of Civil rights (OCR) at the US department of Health and Human Services (HHS) issued a Notice for Proposed Rule Making (NPRM) to modify HIPAA Security Rule. Public comments can be submitted upto 7th March 2025.

According to HHS, the objective of NPRM is to strengthen the Security Rule’s standards and implementation specifications with new proposals and clarifications, including:

  • Remove the distinction between “required” and “addressable” implementation specifications and make all implementation specifications required with specific, limited exceptions.
  • Require written documentation of all Security Rule policies, procedures, plans, and analyses.
  • Update definitions and revise implementation specifications to reflect changes in technology and terminology.
  • Add specific compliance time periods for many existing requirements.
  • Require the development and revision of a technology asset inventory and a network map that illustrates the movement of ePHI throughout the regulated entity’s electronic information system(s) on an ongoing basis, but at least once every 12 months and in response to a change in the regulated entity’s environment or operations that may affect ePHI.
  • Require greater specificity for conducting a risk analysis. New express requirements would include a written assessment that contains, among other things:
    • A review of the technology asset inventory and network map.
    • Identification of all reasonably anticipated threats to the confidentiality, integrity, and availability of ePHI.
    • Identification of potential vulnerabilities and predisposing conditions to the regulated entity’s relevant electronic information systems
    • An assessment of the risk level for each identified threat and vulnerability, based on the likelihood that each identified threat will exploit the identified vulnerabilities.
  • Require notification of certain regulated entities within 24 hours when a workforce member’s access to ePHI or certain electronic information systems is changed or terminated.
  • Strengthen requirements for planning for contingencies and responding to security incidents. Specifically, regulated entities would be required to, for example:
    • Establish written procedures to restore the loss of certain relevant electronic information systems and data within 72 hours.
    • Perform an analysis of the relative criticality of their relevant electronic information systems and technology assets to determine the priority for restoration.
    • Establish written security incident response plans and procedures documenting how workforce members are to report suspected or known security incidents and how the regulated entity will respond to suspected or known security incidents.
    • Implement written procedures for testing and revising written security incident response plans.
  • Require regulated entities to conduct a compliance audit at least once every 12 months to ensure their compliance with the Security Rule requirements.
  • Require that business associates verify at least once every 12 months for covered entities (and that business associate contractors verify at least once every 12 months for business associates) that they have deployed technical safeguards required by the Security Rule to protect ePHI through a written analysis of the business associate’s relevant electronic information systems by a subject matter expert and a written certification that the analysis has been performed and is accurate.
  • Require encryption of ePHI at rest and in transit, with limited exceptions.
  • Require regulated entities to establish and deploy technical controls for configuring relevant electronic information systems, including workstations, in a consistent manner. New express requirements would include:
    • Deploying anti-malware protection.
    • Removing extraneous software from relevant electronic information systems.
    • Disabling network ports in accordance with the regulated entity’s risk analysis.
  • Require the use of multi-factor authentication, with limited exceptions.
  • Require vulnerability scanning at least every six months and penetration testing at least once every 12 months.
  • Require network segmentation.
  • Require separate technical controls for backup and recovery of ePHI and relevant electronic information systems.
  • Require regulated entities to review and test the effectiveness of certain security measures at least once every 12 months, in place of the current general requirement to maintain security measures.
  • Require business associates to notify covered entities (and subcontractors to notify business associates) upon activation of their contingency plans without unreasonable delay, but no later than 24 hours after activation.
  • Require group health plans to include in their plan documents requirements for their group health plan sponsors to: comply with the administrative, physical, and technical safeguards of the Security Rule; ensure that any agent to whom they provide ePHI agrees to implement the administrative, physical, and technical safeguards of the Security Rule; and notify their group health plans upon activation of their contingency plans without unreasonable delay, but no later than 24 hours after activation.

The NPRM is now available for public comments within 60 days of the publications. As a result HIPAA Compliance in 2025 will undergo a major overhaul. This also means that every HIPAA compliance certification undertaken so far by organizations need to be revisited in 2025. Once the new rule is adopted and timelines set for compliance we will come to know of the requirements.

Indian Companies who are now looking at DPDPA compliance and are exposed to HIPAA Compliance requirements by way of their earlier contractual commitments with the covered entities in USA will now have to simultaneously work on both DPDPA and the HIPAA-2025.

Naavi is looking forward to interns in Bangalore and elsewhere who are interested in working in this field. They may contact Naavi at the earliest.

Naavi

Also Refer:

HIPAA Security Rule NPRM

Final Rule on Administrative Simplifications effective from 11th February 2025

Posted in Cyber Law | Leave a comment

DPDPA- Corporate Action before March 31 2025

The DPDPA as an act has been in place for now over 16 months. The excuse “Rules are not notified” has begun to fade with the notification of the “Draft Rules”. Habitual procrastinators may still find excuse that the draft rule is only for public consultation and there is time for its finalization and thereafter there would be time for setting up of the Board and there after for implementation upto perhaps 2 years.

Good luck to such all those “Optimistic Chronic Procrastinators” .

But for those corporate managers who are cautious and risk averse, it is time to start their journey towards DPDPA Compliance immediately.

In this context the following corporate actions are recommended immediately.

1.In the next Board meeting pass a resolution stating that the Company has taken note of the release of the draft DPDPA rules and the impending implementation in the coming year and need to initiate immediate steps for compliance

2.The first step for compliance is to formally designate a “DPDPA Compliance Officer” (who may be the current CRO or CISO or CIO or CCO or CDO or the DPO if that designation exists with an issue of a letter of designation from the Board with the immediate task of submitting a report on the DPDPA Risk of the Company and the further actions to be taken. (The Compliance officer may be promoted as DPO in future if required and if suitable)

3.Ensure that the Compliance officer is deputed to an appropriate training drill such as the C.DPO.DA. of FDPPI so that he is prepared to take up the challenge of doing a proper DPDPA Risk Assessment and recommend further actions.

    4.The above task is recommended to be completed before 31st March 2025 and developments recorded in the next Annual Report.

    In the immediate future a detailed audit needs to be undertaken under a framework like DGPSI and institute a Risk Mitigation plan along with appropriate Cyber Insurance coverage where required.

    Before committing purchase of any software for compliance, be sure to check if it is suitable for DPDPA Compliance or not.

    In order to assist such companies who want to take off, FDPPI will be providing the following services .

    1. Conduct C.DPO.DA. program for 3 days at Mumbai on January 24, 25 and 26 (Registration now open with Early Bird Discount available now).

    2.Conduct a similar physical program in Delhi if possible before March 2025. (To be Scheduled)

    3.Conduct at least one Virtual program before March 2025 (To Be Scheduled)

    4. Institute a quick Business Impact Assessment through a Virtual interaction with corporate Managements (on a short virtual session) on request. (At a Cost of Rs 10000-25000)

    (P.S: Considering the current assignments of FDPPI/Naavi booked with FDPPI, there could be scope for not more than 5 to six assessments before March 2025).

    Interested company officials need to contact FDPPI immediately by visiting the website www.fdppi.in or contact Naavi through www.naavi.org.

    The detailed coverage of Mumbai Program for C.DPO.DA. is as followsNaavi

    All participants of the program would be eligible to get participation certificates with CPE credits for 18 hours and may also take the online examination to get the complete certificate as “Certified Data Protection Officer and Data Auditor”.

    Necessary reading materials in the form of two books, worth Rs 3000/- would be provided to the participants. The registrants would also be eligible for one year free membership of FDPPI.

    Posted in Cyber Law | Leave a comment

    Comments on DPDPA Rules-5: Business Contact Address

    We have already discussed the status of Business Contact Address under DPDPA 2023 earlier and categorically held the view that

    a) We cannot determine the nature of an email as personal or business with reference to the domain name attached to the email address. Accordingly Vijay@ujvala.com can be a personal email while Vijay@gmail.com can be a business email depending on the choice of “Vijay”.

    b) We need to collect the choice of the data principal himself while collecting the email as to whether it is personal or business email.

    c)By default and in the absence of information to the contrary, name@companyname.com can be considered a business contact address while name@gmail.com can be considered as a personal address while Designation@companyname.com can be considered as non-personal data.

    The recognition of “Business Contact Data” being different from personal data is seen from DPDPA 2023 requiring the publication of business contact address of the Compliance official/DPO under Section 8 of DPDPA 2023 and Rule 9 of the DPDPA Rules.

    Naavi

    Reference articles:

    Business Contact address and DPDPA 2023

    Is Business Contact Data, Personal Data under GDPR?

    Posted in Cyber Law | Leave a comment

    Comments on DPDPA Rules-4: Verifiable Guardian Consent

    One of the most discussed provisions of the DPDPA Rules is the rule 10 and 11 related to the handling of personal data of a minor.

    As per the Act, a data fiduciary intending to process the personal data of a minor or a person with a disability who has a lawful guardian needs to obtain the consent from the parent or guardian. Additionally the law requires that the processing shall not harm the child and there shall be no behavioural monitoring or targeted advertisements to the children.

    The issues involved here are

    1. How do we know if a data principal is a minor or a disabled person?
    2. How do we know who is the guardian who is legally authorized to provide consent on behalf of the minor or the disabled person
    3. How do we know at what future date the consent given by the guardian as expired?
    4. How do we know if the parent/guardian is not having conflicts of guardianship?
    5. Does a “Verifiable” consent include verification of disability, verification of guardianship and verification of age

    Under Rule 10 of the rules it is mandated that the Data Fiduciary shall observe “Due Diligence” and adopt “appropriate” technical and organizational measures to ensue

    a) That the identity and age available with the data fiduciary is reliable

    b) The claimed guardian is an “adult” himself

    The words “Due Diligence” and “Appropriate” read with “Fiduciary” means that it is the responsibility of the data fiduciary to find such technology and procedure that satisfies compliance.

    The compliance to this section requires that every data principal has to be verified that he is not a minor. If the person is a minor, the age should be collected and verified. Also the data fiduciary needs to collect the identity of the guardian and check if he is the authorized guardian.

    There is at present no proper solution available to meet this requirement. There are some views that this section leads to denial of some internet services to persons with digitally illiterate parents. There is every possibilities that “Andolan Jeevies” will latch onto such comments and try to stall the implementation of the rules.

    It is our view, if in an attempt to protect Children from the adverse impact of the Internet and the Social Media, some minors or disabled persons are unable to open Face Book accounts or Instagram accounts, it would be a blessing in disguise.

    In the era of Artificial Intelligence, I donot see how the technology can accept defeat in not being able to protect the interest of the children. We had already discussed in an earlier article titled “Is there no solution for Age-gating?” some solutions in this direction.

    Now we can look forward to a workable technical solution that is “DGPSI Compliant”.

    As we are aware, Australia has been the first country to ban access to social media for children below the age of 16. The tech companies will face a penalty of Australian Dollars 49.5 million for violation. The Indian provision for “Parental Consent” is therefore not as stringent as the Australian provision. If the rule is challenged in a Court, it is necessary to defend the rule citing the Australian approach.

    Naavi

    Posted in Cyber Law | Leave a comment