Lessons from RCB tragedy

The stampede that occurred in Bengaluru during the celebrations of RCB’s IPL victory was very tragic both from the point of view of the losses suffered by the victims and also the scar it left on a sweet moment. In 24 hours the fortunes of RCB came down from the top of the world to the depths of the ocean.

It is now time to reflect what went wrong and how did the Police officers and RCB officials were made immediate scapegoats with further risk hanging against KSCA officials.

It must be remembered that the as per the reports, Police had denied the permission for the event. Whoever went ahead with the event had over ruled the official police denial of permission with their oral instructions. I heard some where that there was an oral permission to continue with the event. But this cannot be accepted since it was a “Deemed Permission” by the CM/DyCM/Home Minister who all participated in the event and the DyCM even went around the city with the RCB flag and lifted the trophy as if he was the manager of the team.

While everybody knows that when the political leaders want to conduct the event, neither the Police was in a position to put their foot down nor RCB/KSCA was in a position to refuse. It would have been considered as insubordination and consequences would have followed.

We the Corporate managers are in such situation many times and we need to draw lessons that we can apply in our work environment.

Lessons for the Police

Police force consists of educated IPS officers but often they are spineless followers of the instructions of the political bosses.

We know how a BJP leader was treated by the Police recently in Belagavi. We know how police withdraw cases against terrorists because the political establishment wants it. This tendency of so called professional IPS officers to toe the line of the political bosses without any respect for their profession is well known.

Public therefore will consider that even in this case, the police officers who were suspended for no fault of theirs deserve the punishment.

Police could have requested the CM office to send a fax/email confirmation granting permission before proceeding with further arrangements. Until such time, the team should have been confined at the HAL airport and if necessary should have been sent back to Ahmedabad. But they did not have the guts to stand on their earlier decision and capitulated to the political will. This is the lesson for the professionals not to trust the political bosses and always insist on written instructions in such cases.

Lessons for the RCB/KSCA

If we consider RCB/KSCA as corporate entities, the denial of police permission was critical and they should have refused permission for the use of the stadium. At best they could have attended the Vidhana Soudha event as guests and went home. KSCA is not obliged to RCB to provide its ground and should have refused to allow the event without payment and without police permission in writing with one of the office bearers of KSCA.

RCB is a marketing driven organization and marketing personnel often have no respect for law and compliance.

The RCB legal compliance team should have intervened and said that the risk of holding the event without police permission is possible arrest of its executives and prosecution. I can imagine that no body in RCB would even consult or listen to the legal counsel and hence they had no hand in approving the conduct of event over ruling the non compliance of the legal requirements.

Both Police as well as RCB/KSCA should realize that their trust in politicians was misplaced and they are paying the price for the same. The Courts have come in now and would consider the concept of “Deemed Permission” when the Home Minister/DyCM/CM are themselves participants of an event for which written permission was not available.

If the High Court takes the right decision, this should at least embolden the future police officers to remain more professional than they otherwise are.

As regard the public, we are all aware that RCB has Bengaluru only in name. In its character or composition, there is no “Bengaluru” or “Karnataka” . They have never encouraged local talent and have specifically avoided bidding for eligible local players in the auction. Our stars like K L Rahul, Karun Nair, Prasidh Krishna are in other teams. There was therefore no reason to celebrate its victory in Bengaluru with such fervour.

However, our deep condolences to the family members of the victims who are the real losers in this episode, having lost their loved children. May God give them the strength to bear the loss.

Naavi

Posted in Cyber Law | Leave a comment

Consent Management..NeGD view

While every body is waiting for the notification of the DPDPA 2023, the Government has released a document titled “Business Requirement Document for Consent Management under DPDPA 2023” under the banner of NeGD.

It appears that this is an advisory issued by the MeitY to the industry on how they can approach the Consent Management for compliance of DPDPA 2023. It is not clear why the Government is coming up with such an advisory].. [Ed:.refer PS below]

The document outlines the objectives and functionalities of a platform designed to align with DPDPA 2023. Perhaps the Ministry wants to host the platform itself to be of assistance to not only the data fiduciaries in the Government sector but also to the private sector. Perhaps this is an attempt by the Government to become a software solutions provider.

If the Government comes up with its own platform, other private sector solutions providers will face a significant competition in terms of pricing and perceived “Deemed Compliance benefit” if they host their consent management system on this platform.

It is also not clear if this platform can be adopted by “Consent Managers” who accredit themselves with the DPB. If so, the Consent Managers may provide the platform as a service and either let the users manage the data by themselves or provide the service as a complete service along with data management by itself.

Now that Government has owned a document of this nature, the architecture provided here becomes a Government’s own suggestion and any body who is using the platform as suggested will be “Deemed” to be in compliance of DPDPA 2023. It is difficult to argue that MeitY is different and NeGD is different and hence this is CMS system cannot be considered as a “Deemed” compliance. Only time will tell if Courts accept such artificial division.

Through this document, the Government is itself owning the responsibility to drive the community towards compliance. In case there is any deficiency in compliance arising from an improper implementation of the Business Requirement Document (BRD), the data fiduciaries will argue that this is the approved process by the Government. Whether this was desirable or not is a matter for discussion at some point of time in the future.

It is expected that this platform would be considered as a standard platform for Consent Manager accreditation and all those who are likely to take up the responsibility as a Consent Manager will adopt it for easy clearance of their application with DPB. CERT-IN itself would be the auditor for the platform as presented and other auditors need only to make some peripheral checks.

The BRD defines the functional requirements of a platform for managing the “Consent” for Personal Data under DPDPA 2023. It includes a detailed breakdown of core modules such as Consent Lifecycle Management, User Dashboard, Notifications and Grievance Redressal Mechanisms. Additionally, the document outlines administrative capabilities, including user role management and data retention policy configuration, to ensure operational efficiency and compliance.

Three objectives have been defined for the CMS namely

  1. Enable Comprehensive Consent Lifecycle Management
  2. Empower Data Principals
  3. Ensure Compliance with DPDP Act and Rules

The document recognizes three stakeholders namely the Data Principal, Data Fiduciary and the Data Processor. Surprisingly the document states that the fourth stake holder is the DPO who acts as the primary compliance authority to oversee the adherence to the DPDPA 2023.

Judging the words used in the DPDPA draft Rules of January 2025, there was a doubt whether the DPO’s role would be limited to “Answering questions from the Data Principals”. This document clarifies that DPO is responsible to oversee the Compliance in an organization.

Six functional requirements have been identified namely,

1.Consent Collection

2.Storing Consent

3.Managing Consent

4.Consent Validation

5. Consent Renewal and

6. Audit Logs

The DGPSI system with its “Process based approach” is well suited for the requirements listed in the para 4.1.1. on consent collection. The suggestion specifically mentions that there should e no “Bundled Consent” and consent request has to be triggered when the service request is initiated. (Not earlier). It also specifies that “Consent Notice” specific to the purpose shall be displayed. The need to have multiple notices has been a bone of contention with organizations who are today accustomed to one comprehensive Privacy declaration for all present and future purposes anticipated.

The BRD ignores the need for Digital signature for the consent to be treated as an enforceable agreement. The BRD seems to be validating the “Click Agreement” which is ulra-vires the ITA 2000.

The document also seems to have ignored the parental consent requirement in case of minors or request for nomination.

The use cases referred to has not considered the “Consent Manager” as a stake holder and there would be a use case where consent is provided to the Data Fiduciary not by the Data Principal but by the Consent Manager though the request is triggered by the Data Principal.

The Consent Validation system as suggested is interesting as it prescribes a validation every time a certain data set is processed. When the same data is processed over a period multiple times, it means that validation is required repeatedly. This would introduce some complications.

The Consent update system needs to take note of disagreement if any between the Data Fiduciary and the Data Principal regarding the update.

Consent Expiry and Consent Withdrawal needs to take into account the validation and archival if required.

There is a special mention of the Cookie Consent which has not recognized the possibility that cookie information may actually be not an “Identifiable Personal Data” or “Personal Data to which DPDPA is applicable”.

A Consent notification and user notification module has been indicated which may require some elaboration.

A mention has been made on the Grievance Redressal Mechanism which is a system outside the core Consent collection, storage and retrieval system.

A mention has also been made about the Data Retention system which also is an additional sub system to be managed.

Overall, the document is a good starting point for the technical developers who were completely clueless on how to proceed. But there will be requirement of many improvements which needs to be configured.

It is interesting to observe the reaction of the community to this document and whether this will be considered as a template for architecting the consent management system.

Naavi

P.S: This is to clarify that the above document is being released as part of the initiative of NeGD to develop an open source platform for Consent Management. NeGD is in the process of organizing a “Coding Challenge” to develop the architecture and an operative platform code that can be shared on open source basis with MSMEs. Consequently the above post may kindly be read in this context. The document is not as an “Advisory” but a working document for the coding challenge. We regret the mis-understanding.

Also refer MeitY Startup hub for more details

7th June 2025

Posted in Cyber Law | Leave a comment

Marketing under a Brand and DPDPA compliance

Organizations use “Brand Building” for two purposes.

The first is to inculcate a “Brand personality” within the network of organizations associated with a brand. When a company states that it is a “Godrej” or “Tata” or “Birla” Company, or belonging to “Apollo”, “Reliance” group, it reflects certain personalities associated with the philosophy of the brand. This is for internal structuring of a company and development of internal policies of management.

The second purpose is to derive benefits of the brand association in marketing of the products. Here the brand will influence the purchase decisions of the consumer since he associates the prominent brand personality perception with the product. It could be related to the reliability of the product, quality, integrity etc.

Whether the brand architecture is constructed as “House of Brands”, “Endorsed Brand”, “Sub Brand” etc the consumer is expected to infer the product benefits from the qualities perceived in the associated brand.

Marketing as a profession always tries to take positive aspects of the brand association and use it as a promotion. In the process it does not give much consideration to the possibility of “Mis-representation”. In many of the consumer product companies, “Marketing” is the most powerful division and every other department whether it is Finance or Information Security or Privacy, it has to toe the line set by the Marketing division.

In such a context, the DPOs trying to remain compliant with DPDPA will face a huge challenge.

Many times Brands are shared with competing downstream entities with their own service capabilities. Some sub brands may be better than others and unless the consumer has the clarity that he is taking the service from the sub brand and not from the main umbrella brand, there is an open invitation for litigation if things go wrong.

There are some extreme situations such as when an Indigo passenger finds a cockroach in his food, or a Zomato employee is found earing into the parcels, or a Zepto warehouse is found unhygienic, or an RCB event results in a stampede, the stigma getting attached to Indigo or Zomato or Zepto or RCB as a brand. Some of this may be a result of negligence in imparting the brand values and some may not involve any such negligence. The damage in terms of perception is however real.

When there is a positive rub off of the brand on the product sales, every one is happy. But when there is a negative impact, litigations will follow and most of the time, litigation is on the main brand for their negligence.

When it comes to collection of personal data and processing under different data protection laws, a question will arise about the responsibilities of the Umbrella brand owner and the sub brand user.

DPDPA presents a tough challenge in this context compared to other laws like GDPR.

The reason is that DPDPA expects the “Personal Data Collector” as a “Data Fiduciary” with a duty to take care of the Privacy rights of the data principal. Under GDPR, the “Data Controller” has a lower responsibility since his compliance ends with presenting a “Transparent” privacy policy. The Data Fiduciary under DPDPA however is required to ensure that there is no misrepresentation and there has to be a privacy notice and associated consent forming a valid “Contract” which can be used in future litigation.

The dilemma of companies is to decide

a) Whether my company is a significant data fiduciary because I am part of the brand which is a significant data fiduciary?

b) Can I declare myself a “Data Processor” instead of a “Data Fiduciary”

c) What is the level of disclosure I have to maintain with the consumer if I am sharing the personal data with my brand owner for purposes not related to what I have collected it for.

d) How will a Consumer Activist react if there is a loss caused by me as a sub brand operator?… Will he litigate against the Brand owner because it is more useful in the Courts?

The difficulty lies both for the Brand owner as well as the Brand user since depending on the convenience, a litigant can proceed either against the Brand user or the Brand owner.

This is a matter of serious and in depth debate but under DGPSI, FDPPI adopts the principle of recognizing a “Super Data Fiduciary” who owns the brand and “Data Fiduciary” who operates under the brand as distinct from “Joint Data Fiduciary” and “Data Processor”.

The policies to be adopted, contracts to be drawn need to be tailored to the recognition of this “Status” of an organization. The DPO of the Super Data Fiduciary has to absorb certain vicarious responsibilities for managing the DPO responsibilities of individual sub brand user entities. In some cases the sub-brand entities may be “Group Companies” and amenable to oversight. But if the sub brand entities are independent companies and part of joint ventures with other super data fiduciaries, the task of the DPOs are more complicated.

FDPPI would be interested in getting the reactions of the professionals in this regard.

Naavi

Posted in Cyber Law | Leave a comment

Cyber Crime Complaints under 1930

A new initiative has been launched by the Central Government under “Cyber Secure Bharat” to automatically convert complaints filed under the National Crime Reporting Portal (www.cybercrime.gov.in) or under phone call to 1930 to a Zero FIR. A Zero FIR can be filed at any Police Station and once registered, they may be transferred to the jurisdictional Police Station.

Currently this will be implemented for complaints of over Rs 10 lakhs.

In the present system the complaints were forwarded to the Jurisdictional Police Station and the complainant had to again go to the local police station.

While this is a good initiative, it is necessary to extend this even to complaints involving small amounts. If the loss is large then it is possible for the victims to engage a lawyer and pursue the filing of the complaint in the normal course. It is the small victims who are in larger numbers who need the support of the web based system and hence it should be available for all.

Further, filing of a complaint is only the first step and what needs to be achieved is an effective follow up where the money is recovered through prompt action.

At present Police are completely ignoring the role of Banks who open accounts for the fraudsters without proper KYC and facilitate the crime. Also the Banks were the debits originate donot stop payment at the transferee Bank and insist that the victim should follow it up by themselves. This should stop.

In every cyber fraud complaint the primary responsibility for recovery should be with the Victim’s Bank who should invoke Cyber Insurance. Unless there is proof that the victim was an accomplice in the crime, it should be presumed that he/she is an innocent victim and money recovered through Cyber Insurance or by stopping payment at the transferee Bank. Where the money has already been withdrawn at the transferee Bank, the responsibility of that Bank for abetting the crime should be invoked.

Unless the negligence of the Bankers is reduced, Cyber Secure Bharat cannot be a reality.

Naavi

Press Release

Posted in Cyber Law | Leave a comment

Developments in Neuro Rights Legislation

Enclosed is a link to the Neuro Rights related news letter with some of the recent developments in efforts to bring “Neuro data” under suitable regulation.

Protection of “Neural Data” to protect “Privacy” is an ongoing discussion and under the leadership of Professor Rafael Yuste of Columbia University some seminal work is being undertaken in Spain and USA.

While a separate legislation to define “Neural Data”, “Rights related to external access of neural Data”, “Obligations to protect neural Rights”, “Punishments and deterrents” for non compliance can be part of a new regulation in due course, at present we can try to interpret ITA 2000 and DPDPA 2023 to include “Neural Data” as “Electronic Data”.

Since in India, the Supreme Court has a right to interpret the Constitution, it is possible to interpret that “Neural Data” which is in the nature of a “Binary” data created out of a “Chemical changes” within the neuro cells, can also be considered as “Data” for the purpose of ITA 2000.

ITA 2000 defines the term “Data” under Section 2(o) as follows:

“Data” means a representation of information, knowledge, facts, concepts or instructions which are being prepared or have been prepared in a formalized   manner, and is intended to be processed, is being processed or has been   processed in a computer system or computer network. ,.and may be in any form   (including computer printouts magnetic or optical storage media, punched   cards, punched tapes) or stored internally in the memory of the computer;

Harnessing of Neural Data through either a Brain-computer interface or through manipulation of sensory inputs to the brain and then organizing individual neuro signals (zero or One) into a pattern that gets stored and can be accessed subsequently is nothing different from the activity of a “Computer” as we know. The laws created for the Computer can therefore be applied backward to the human brain which behaves like a computer.

In case we accept this theory of “Reverse Definition of Neural Data”, we will be creating a Neuro Rights law in India even before a more detailed law can be developed.

Naavi

Posted in Cyber Law | Leave a comment

AI in Information Management

The You tube and Internet is full of news about Burkina Faso and Captain Ibrahim Traore the leader of this small African country. The news is an indication of how “Synthetic Content” is dominating the narrative at present which is slowly getting into the information data base that would also modify the future outputs generated by the AI algorithms.

For information, Burkina Faso is a small land locked country in West Africa dominated by a Muslim population and considered rich in Gold reserves. The country has been controlled by France like a colony and since around 1983 there has been a huge uprising against the colonial powers. The country is showing signs of becoming a centre for consolidation of efforts to prevent economic policies being used to further the exploitative interests of colonial powers.

The history of the fight against colonial powers represented by Burkina Faso is a fascinating story by itself. However, our reference to this at present is in the context of the information narrative being created with the use of AI that is blurring the reality to an extent that after some time we will not know what to believe and what not in the Internet.

To some extent we are seeing efforts to create fake narratives in the Operation Sindoor context with pictures of aircrafts supposed to have been hit etc. But the Burkino Faso narrative seems to be at a completely different level with “Synthetic Content” dominating the Google Search and You Tube Content.

Essentially, Synthetic content is digital content created by AI partially using the real content. Since the AI content including audio, video and text is generated by the seeding of a real information, real person etc., the synthetic output looks very authentic. It cannot be entirely recognized as “Fake” but at the same time it is also entirely not “Reliable”. It could in the end become a “Misleading Content”.

In the process there is a possibility that “Synthetic Reality” may create content that alters the information available on the Internet which becomes accessible without devices as required to view Augmented Reality.

We the Netizens therefore need to develop an instinct of distinguishing the synthetic content from real content.

In India we have seen many fraudsters using the pictures of celebrities some time in the form of “Interviews” to promote Crypto Trading. Recently we saw a video of Sadguru Jaggi Vasudev being misused with synthetic content similar to the use of videos of Sudha Murthy, Narayana Murthy and film personalities in the past. (See public notice at isha foundation).

In order to counter this menacing trend, You Tube has introduced a new rule to state if any video is a result of an AI generated audio or video.

While this control may work to some extent for audios and videos published on You Tube, if the altered content is text or if it is published independently on other digital platforms, it may be difficult to prevent the public from being mislead.

We also have to ensure that this synthetic content does not poison the learning of other AI outputs in due course.

If this is not regulated properly, we may end up in a state of information where we cannot know what is right and what is wrong and the Internet which was once hailed as “Information High Way” may become a Jungle and a land of synthetic reality instead of truthful reality.

Currently in India we have only the ITA 2000 to counter “Misleading” information. Unfortunately our Courts often donot see the adverse impact of false content and are swayed by the favoured group of advocates whose only interest is to put obstacles in the country’s progress. Hence the Digital Media regulation through Intermediary Rules gets questioned and Courts sit on the case for years and waste public resources.

We hope that “Synthetic Content” is recognized as a “Risk to the Community” and handled accordingly under ITA 2000 and DPDPA 2023.

Posted in Cyber Law | Leave a comment