The amendments passed on December 22/23 by the Parliament to the eight year
old ITA 2000, has
been watched keenly by IT and ITES companies. Many are happy since the
resulting ITA 2000 -Version 2008 which we prefer to call ITA 2008 has tried
to address the demand for "Data Protection".
The earlier version of ITA 2000 did provide that data vandalism would be
treated as an offence under Section 66 of the Act with three year's
imprisonment and eligible for claiming compensation of upto Rs 1 crore
under Section 43. However, since there was no specific indication that this
was a measure to protect data in the hands of BPOs, many in the industry
were expressing an opinion that India does not have data protection laws.
Though the Government introduced a separate bill called "Personal Data
Protection Act 2006" to meet this demand, the Bill is still pending in
the parliament and is likely to lapse. Now ITA 2008 has tried to
address the demand of the IT industry by specifically introducing two
sections namely Section 43A and Section 72 A which specify that they are
measures towards "Data Protection". This may make the Personal
Data Protection Act 2006 redundant and superfluous at least to the extent
of punishing breaches in data protection responsibilities of BPOs.
It must be remembered that even now India does not have a separate "Privacy
Protection Law" which means that no law has so far guaranteed the Citizens
a right to protect his or her Privacy except for the constitutional rights.
There is no definition of what is "Sensitive Personal Information", there
is no authority such as the "Data Commissioner" to whom complaints can be
taken by a victim. There is also no obligation for countries other than
India to whom India sends sensitive personal information for processing to
have an acceptable data protection mechanism etc.
It is not enough if we simply declare compensation and offence related to
Data Protection. These were already there in law and ITA 2008 may make it
little more clarified and little more stringent. But does ITA 2008 have
provisions that can be considered cardinal for "Privacy
Protection"?... Let's explore.
1.
Our first stop at exploring the Data Protection related provisions in ITA
2008 will be Section 43A which is reproduced here:
Section 43A:
Compensation
for
failure
to
protect
data
Where a body
corporate, possessing, dealing or handling any sensitive personal data
or information in a computer resource which it owns, controls or
operates, is negligent in implementing and maintaining reasonable
security practices and procedures and thereby causes wrongful loss or
wrongful gain to any person, such body corporate shall be liable to pay
damages by way of compensation, to the person so affected.
Explanation: For
the purposes of this section
(i) "body
corporate" means any company and includes a firm, sole proprietorship
or other association of individuals engaged in commercial or
professional activities
(ii) "reasonable
security practices and procedures" means security practices and
procedures designed to protect such information from unauthorised
access, damage, use, modification, disclosure or impairment, as may
be specified in an agreement between the parties or as may be
specified in any law for the time being in force and in the absence
of such agreement or any law, such reasonable security practices and
procedures, as may be prescribed by the Central Government in
consultation with such professional bodies or associations as it may
deem fit.
(iii) "sensitive
personal data or information" means such personal information as may
be prescribed by the Central Government in consultation with such
professional bodies or associations as it may deem fit.
The first observation that we need to make here is that the limit for compensation
which was Rs 1 Crore under the Section 43 of ITA 2000 has been removed. In
other words, there is no upper limit for damages that can be claimed.
The Government is expected to define "Sensitive Personal Information"
and it is the responsibility of "Body Corporates" to ensure that reasonable
security practices are followed.
The definition of Reasonable Security Practice is to be determined in the
following order.
1. As defined in a mutual contract between the vendor and the processor of
data or a data subject and the data processor.
2. As specified in any law for the time being in force
3. To be specified by the Central Government in consultation with such
professional bodies or associations as it may deem fit.
The IT and ITES industry should therefore first examine their SLA and in
its absence examine if there is any law that directly affects their
activities. If neither are there, then the security practices to be
specified by the Government as a follow up of ITA 2000 would be followed.
In the event SLA makes a mention of security practices as defined in Data
Protection Act or HIPAA or GLBA etc, then that will take precedence over
any other security practice.
Industry may be happy with this clarification but they should be now
concerned about the possibility of large liabilities to which they would be
exposed as well as the need to follow compliance of international laws.
They also need to implement "Compliance Audits" so that they would steer
clear of being termed "negligent". The judgement of what constitutes
"negligence" would be left to the wisdom of the "Adjudicator" in respect of
claims upto RS 5 crores and a "Civil Judge" in respect of claims beyond RS
5 crores.
The unlimited liability under Section 43 A is good for a Country which is a
net exporter of data for processing. But for a country like India which is
predominantly an importer of data for processing, the "unlimited liability"
is like a sword hanging on the head of every BPO. Any major calamity may
result in a huge international liability which may wipe out the BPO in one
single case of security breach.
The wisdom of IT industry to force the Government to impose a liability and
responsibility on them through changes to ITA 2000 instead of voluntary
code of ethics is perhaps questionable.
2. Our next stop exploring the Data Protection related provisions in ITA
2008 will be Section 72 A which is reproduced here:
Section 72 A: Punishment for Disclosure of
information in breach of lawful contract
Save as otherwise
provided in this Act or any other law for the time being in force,
-any person
including an intermediary who,
-while providing
services under the terms of lawful contract,
-has secured
access to any material containing personal information about another
person,
-with the intent
to cause or knowing that he is likely to cause wrongful loss or
wrongful gain
-discloses,
-without the
consent of the person concerned, or -in breach of a
lawful contract,
-such material to
any other person,
-shall be punished
with imprisonment for a term which may extend to three years,
or with a fine which may extend to five lakh rupees, or with both
Under this section, disclosure "without consent" or "in breach of lawful
contract" exposes a person including an "intermediary" to three year
imprisonment. The offence is cognizable but bailable.
The disclosure should be either intentional or with knowledge that it may
result in wrongful gain or loss (to somebody).
The subject material should contain "personal information". We may note
that this section does not use the term "sensitive personal information" as
used under Section 43A. Hence, "Any personal information" can invoke this
section if other conditions are satisfied. This applies only when the
information is obtained in pursuance to a service offered.
Further, under Section 85, the liabilities that fall on a company under
this section will extend to any officer in charge of business or director
etc unless "Due Diligence" is proved.
One concern about this section arises out of the use of the words " save as
otherwise provided ... under any other law for the time being in
force". This makes this section 72 A subordinate to any such laws if it
exists. This could be a source of nuisance litigation in the days to come.
Though there is no mention of a "Grievance Redressal Mechanism" separately
by victims of data security breaches in the form of "Data Commissioner",
the adjudication process with the Cyber Appellate tribunal must be
considered as adequate replacement. What is lacking however is a method of
proactive regulation such as "Compulsory registration of data processors"
along with "De registration as a means of penalizing a contravention".
The need to enforce security norms by data exporters from India has not
been specified. However the extra territorial jurisdiction of this Act as
per Section 75 may be interpreted as extending data protection obligations to any
external party who under a contract takes up processing of data from India.
Some Areas of Concern for IT Companies
While the two sections, Sec 43A and 72A directly impact IT Companies
dealing with data processing, some of the following sections also have a
significant impact on IT companies and could be source of irritation
as well.
For example, under Section 67C, every "Intermediary" has the following
obligation:
67C: Preservation
and Retention of information by intermediaries
(1) Intermediary
shall preserve and retain such information as may be specified for such
duration and in such manner and format as the Central Government may
prescribe.
(2) Any intermediary
who intentionally or knowingly contravenes the provisions of sub
section (1) shall be punished with an imprisonment for a term which may
extend to three years and shall also be liable to fine.
An Intermediary is also a member of the IT
industry and the definition in Section 2(w) is wide enough to include
many service providers.
The definition states:
"Intermediary" with
respect to any particular electronic records, means
any person who on
behalf of another person receives, stores or transmits that record or
provides any service with respect to that record and
includes telecom
service providers, network service providers, internet service
providers, web hosting service providers, search engines, online
payment sites, online-auction sites, online market places and cyber
cafes.
We may note that this definition includes "Telecom Companies" such as
AirTel or Reliance Infocomm or Tata Indicom. It includes Google, Rediff,
Sify, Ebay.in, cyber cafes etc. It includes many BPOs who operate as back
office service providers, Data Centers, HR service providers, etc.
It is clear that a very large number of IT companies come under the scope
of the section 67C.
We are awaiting the notification regarding the time for which specified
information needs to be preserved under this section. It could be one year
in the minimum and six to seven years at the outer end.
What is important to note is that any alleged non compliance could expose the
Company and its executives to the penal provisions of this section as well
as section 65. Since this is a "Cognizable" offence, any "Inspector" of
Police can now start questioning the CEO of a BPO if he is preserving the
information in tact etc.
Will a Police Inspector consider it necessary to enter a BPO office and
demand such information?. ..May be initially, this will happen with Cyber Cafes. Next it will happen at
ISPs and Small Portal owners. But we never know if the larger Companies are
immune to such intrusion.
No discussion on ITA 2008 on Privacy issues is complete without a reference to Sections 69,
69A and 69B which enable the Government to exert a huge influence on the
Information Security industry.
While the powers which the Government has gained through these three
sections are justified in the context of the Cyber Security requirements,
in the event appropriate safeguards are not enshrined in the rules and
regulations, these three sections will become the most oppressive clauses
of the new Act.
To understand the reasons for coming to such conclusion, let us explore
these three sections in depth.
For immediate reference of the readers, the three sections are first
reproduced here.
Sec 69: Powers to issue directions for
interception or monitoring or decryption of any information through any
computer resource.
(1) Where the central Government or a State
Government or any of its officer specially authorized by the Central
Government or the State Government, as the case may be, in this behalf may,
if satisfied that it is necessary or expedient to do in the interest
of the sovereignty or integrity of India, defense of India, security of the
State, friendly relations with foreign States or public order or for
preventing incitement to the commission of any cognizable offence
relating to above or for investigation of any offence, it may,
subject to the provisions of sub-section (2), for reasons to be recorded in
writing, by order,
direct any agency of the appropriate Government
to intercept, monitor or decrypt or cause to be
intercepted or monitored or decrypted any information transmitted received
or stored through any computer resource
(2) The Procedure and safeguards subject to which
such interception or monitoring or decryption may be carried out, shall be
such as may be prescribed
(3) The subscriber or intermediary or any person in
charge of the computer resource shall, when called upon by any agency which
has been directed under sub section (1), extend all facilities and
technical assistance to -
(a) provide access to or secure access to the
computer resource generating, transmitting, receiving or storing such
information; or
(b) intercept or
monitor or decrypt the information, as the case may be; or
(c) provide
information stored in computer resource.
(4) The subscriber or
intermediary or any person who fails to assist the agency referred to
in sub-section (3) shall be punished with an imprisonment for a term
which may extend to seven years and shall also be liable to
fine.
We may note that this section provides access to a designated agency of the
Central or State Government to any information stored in any Computer
Resource whether in a public place or a private place, whether at home or
at office with the excuse that it is required for prevention of or required
for the investigation of any offence. The power is not restricted to
information in transit such as e-mails but also other information that may
be stored.
This means that any Police officer (or such other agency that may be
designated under this section) under the excuse of investigating an offence
(whether in the interest of national integrity or otherwise) can walk into
any IT company and demand that he may intercept (access) information.
It is to be noted that non cooperation by the company can result in
imprisonment upto seven years.
The powers under the Section 69 which are quite oppressive enough to sit up
and take notice. Sections 69A and 69 B extend the powers further.
These sections state as follows:
Sec 69A: Power
to issue directions for blocking for public access of any information
through any computer resource
(1) Where the
Central Government or any of its officer specially authorized by it
in this behalf is satisfied that it is necessary or expedient so to
do in the interest of sovereignty and integrity of India, defense of
India, security of the State, friendly relations with foreign states
or public order or for preventing incitement to the commission of any
cognizable offence relating to above, it may subject to the
provisions of sub-sections (2) for reasons to be recorded in writing,
by order
direct any agency
of the Government or intermediary to
block access by the
public or cause to be blocked for access by public any information
generated, transmitted, received, stored or hosted in any computer
resource.
(2) The procedure
and safeguards subject to which such blocking for access by the
public may be carried out shall be such as may be prescribed.
(3) The intermediary who
fails to comply with the direction issued under sub-section (1) shall
be punished with an imprisonment for a term which may extend to
seven years and also be liable to fine.
Sec 69B: Power
to authorize to monitor and collect traffic data or information through any
computer resource for Cyber Security
(1) The Central
Government may, to enhance Cyber Security and for identification,
analysis and prevention of any intrusion or spread of computer
contaminant in the country, by notification in the official Gazette,
authorize
any agency of the
Government to
monitor and
collect traffic data or information generated, transmitted, received
or stored in any computer resource
(2) The
Intermediary or any person in-charge of the Computer resource shall
when called upon by the agency which has been authorized under
sub-section (1), provide technical assistance and extend all
facilities to such agency to enable online access or to secure and
provide online access to the computer resource generating ,
transmitting, receiving or storing such traffic data or information
(3) The procedure
and safeguards for monitoring and collecting traffic data or
information, shall be such as may be prescribed
(4) Any intermediary who
intentionally or knowingly contravenes the provisions of sub-section
(2) shall be punished with an imprisonment for a term which may
extend to three years and shall also be liable to fine.
Explanation: For
the purposes of this section,
(i) "Computer
Contaminant" shall have the meaning assigned to it in section 43
(ii) "traffic
data" means any data identifying or purporting to identify any
person, computer system or computer network or location to or from
which the communication is or may be transmitted and includes
communications origin, destination, route, time, date, size,
duration or type of underlying service or any other information.
The two sections extend the powers of
interception and decryption in Section 69 to power to block access and
power to demand "traffic data" from any person who is in possession of
the relevant information. Refusal or non cooperation is a cognizable
offence.
These three sections therefore provide
what can be described as "brutal" powers to certain agencies.
It is not necessary that the designated
agency under these sections should be the "Police". However, it is
perhaps inevitable that Police will either be directly designated as
the "Designated agency" under this section or will be the authority
that will advise action under this section to any other agency
otherwise designated. (As is presently the case with CERT-In in respect
of blocking of websites with obscene content). It is possible that the
proposed "Nodal Agency" designated under Section 70 B (Which is called
the Indian Computer Emergency Team which position may be occupied by
the CERT-IN after due notification) may be entrusted with the
responsibility of implementing the powers under Sections 69, 69A and
69B. However the nodal agency may act on the basis of recommendations
received from the Police since it may not have direct capability for
investigations.
Has any IT industry representative thought
about the possible misuse of these sections and what would be the
consequences thereof? If not, it is time to do so so that adequate
safeguards can also be simultaneously introduced. It is time to think
what should be such safeguards, how they should be implemented and
which agency should monitor etc.
To repeat my earlier comment, in the
current scenario of threats prevailing in India, perhaps it is
difficult not to accept such draconian laws as necessary. However, it
is the responsibility of all of us to ensure that safeguards that
are expected to be in place to prevent abuse of the powers under these
three sections are adequate to ensure that the draconian powers are
properly reigned and any abuse is adequately punished.
In particular, I consider it absolutely
necessary that any agency which is given powers under these three
sections should be answerable to a monitoring body which should have
the powers to receive complaints from the public, conduct its own
investigation even against Police officers involved and also prosecute
them as necessary. There should be no immunity given to such officials
against being held accountable for breaches of propriety and law.
Such an agency should be like the "Human Rights Commission" and
should be an independent body devoted to the welfare of the netizens. It can be a new set up of a "Netizen
Rights Commission" with the necessary powers. It should not simply
be a judicial body with people who may not understand the technical
issues involved. It must have representation of private persons of
eminence who understand the technology issues and the human right
violations that may arise therefrom.
If there are legal hurdles to create such
a commission, then it is suggested that a "Netizen's Rights Advisory
Board" is created in every State which should receive complaints,
investigate, and give its recommendations. The recommendations may be
taken up for implementation by the Human Rights Commission or the
Courts to provide justice to the aggrieved.
In case appropriate safeguards and a
monitoring mechanism is not immediately set up, there is a grave danger
lurking ahead for IT companies and its executives who may become pawns
in the hands of law enforcement officers who know where the law pinches
and is able to tickle the sensitive spots in the IT industry.