Data Protection Hexagon.. An Approach to being compliant

To Be compliant with Data protection or Privacy Protection through Personal Data Protection, an organization needs to implement a systematic approach like a project implementation.  The “Privacy By Design” is a term used in the industry to indicate the approach.

In implementing an effective Personal Data Protection Program (PDPP),  we need to consider that the most important part is to

a) Involve the entire work force in the compliance plan as a Team Effort

b) Keep the workforce motivated to implement the plan and maintain it as a continuing requirement.

Naavi recommends a Six step process to motivate the workforce to collectively implement the Privacy Program for an organization.

The six steps shown in the diagram as six elements of a Hexagon are

    1. Awareness
    2. Acceptance
    3. Role Identification
    4. Tools
    5. Incentives
    6. Sanctions

Awareness building is the common implementation step which is easily understood as conducting necessary trainings so that target audience (Employees) understand the requirements of the Data Protection Laws. This can be done at two levels, namely one at the Management Level and another at the workforce level.

Acceptance Building is a process where the workforce agree from the bottom of their heart the learnings of the awareness building exercise. A commitment from the member of the workforce to be compliant is always a good strategy to ensure that trainings donot remain only matters for ticking the check boxes.

Role Identification is a process where from the knowledge of what is required for data protection compliance built over the awareness building, is applied to an individual’s work responsibilities so that they can identify whether they do access personal data and if so how within their sphere of influence they need to implement the compliance requirements.

Tools provision is the responsibility of the organization and consists of Policy documents (properly explained to the workforce) and technical tools required for discovery of personal data, consent tagging, Encryption, data leak prevention etc.

Incentives are an important aspect of positive motivation so that good compliance culture exhibited by the workforce is rewarded in some manner whether financially or otherwise.

Sanctions are also essential since non conformance need to have a consequence without which the value of Incentivisation also will be less and complacency will set in.

This Hexagonal Approach to Data Protection Motivation is inspired by the Theory of Information Security Motivation and the Pentagon model that Naavi had published several years back.

As had been indicated in the Pentagon model, where five elements of motivations were considered as five walls of a pentagon rather than a hierarchical model of one after another, the Hexagonal Model of Data Protection Compliance should also be considered as a “Compact Hexagon” where each of the elements are walls of the Hexagon and are closed.

As a Closed Hexagon, all six elements are expected to be present simultaneously and not built on a hierarchical model where some elements like Training are provided with Policy documents and expect the workforce to maintain a compliance culture.

FDPPI’s framework of Data Protection Compliance Standard of India (DPCSI) is geared towards implementing a compliance program in conformity with this Hexagonal motivational model.

The “Distributed Responsibility” concept used in DPCSI is a unique binding factor that enhances the efficiency of the Compliance program and to make it work, this Hexagonal Model of motivation would be useful.

Comments welcome.

Naavi

Posted in Cyber Law | Leave a comment

Naavi responding to the UNESCO call for AI Regulation

Naavi has been advocating a Neuro Rights Act for India for some time now. The website www.neurorights.in  captures the developments in Neuro Technology building a logic for Neuro Rights legislation.

In the meantime, the advent of GPT3/GPT4/DALL-E etc have opened up new doors of excitement in the AI world and simultaneously triggered the concerns of one section of civil society whether AI taking over of Human race is nearer than we think.

Most experts watching the development of AGI (Artificial General Intelligence) and ASI (Artificial Super Intelligence) as against the ANI (Artificial Narrow Intelligence) that may be common, suggest that in the next 30-40 years, there is a potential risk of ASI s taking over decision making in the creation and development of AI devices/algorithms.

30-40 years is within the lifespan of today’s youth and looks much more dangerous than any other risk to human mankind other than an alien attack. Alternatively the ASI robots may themselves represent the aliens who will wipe out the mankind. An Astroid hit risk today is manageable and a Nuclear war may only affect parts of our planet. But a rogue army of ASI robots could enslave the human kind the way the “Raise of the Planet of Apes” suggest and this could happen sooner than we think.

To some, this may look like speculation and fear mongering. But there is no harm in guarding against the fear even if it does not materialize. Current generation is being urged to plant trees, reduce use of fossil fuels etc for preserving the planet for the future generation. A whole lot of activities are geared towards protecting Earth from the plundering through mining, deforestation etc.

We now need a movement in the IT domain to ensure that AI does not become a threat to the mankind and we need to start flagging this possibility and start working towards finding solutions.

UNESCO has already called for member nations to work on regulations the way UNCITRAL gave a call for E Commerce  laws in 1996 which gave birth to Information Technology Act 2000. Now India is in the verge of a new Digital India Act. It is the right time to consider Digital India Act (DIA) to include the requirements of Artificial Intelligence Act (AIA). More appropriately like the Telecom Regulatory Act, UIDAI Act, DPDPB2022 etc standing apart from ITA 2000, Artificial Intelligence Act can be a separate Act since it has many nuances to be considered before it becomes a full fledged law and combining it with the amendment to ITA 2000/8 would delay other amendments for which Government might be ready now.

Naavi.org will therefore start taking some action in mobilizing the experts into a task force for developing an Artificial Intelligence Act of India. At some point of time in the future, the MeitY may set up a similar committee. However, in order not to waste time, we have initiated some action immediately.

This year, India is presiding over the G 20 conference and G 20 has also adopted a preliminary resolution in 2020 about working on AI regulation. It is therefore suggested that this year G 20 work on taking the discussion on AI regulation in India further.

Naavi has tried to bring together like minded persons into a common message group and those interested in joining this group may contact Naavi. This group will work not only on AI Act but also on Neuro Rights Act and try to develop a draft legislation for both.

Naavi

 

 

Posted in Cyber Law | Leave a comment

Re-skilling from IT to Data Protection

“Disruption” is a word familiar to the technology world. Several technology developments have disrupted several industries in the past. At that time we welcomed the development as part of the innovation trend. Now Artificial intelligence, the Open-ai project is having its impact on making many jobs in IT redundant. In particular, Coding professionals are finding that their functions are being efficiently replaced by GPT3 tools.

As a consequence of these developments many IT professionals are being laid off. Those working in Amazon, Microsoft are the recent sufferers of this development though this is an industry wide disruption.

In a way the “Bhasmasura” effect of technology development is showing its uglier side effects.

While the debate on whether this is a short term phenomenon or whether the employees can re-skill themselves into new jobs that may be created in the AI itself is a debate for the future.

At present, we would like to provide some support to the community by providing opportunities to enable some of these IT professionals to gather additional knowledge and skills in the field of Data Protection.

Accordingly Cyber Law College will be planning a DPO training program at a concessional fee structure for a limited time. This will prepare IT aware professionals to be able to understand the requirements of data protection and move into the Data Audit domain. Initially they can team up with other legal professionals and later develop themselves into independent DPOs or Data Auditors. Some of them can also team up with audit firms and support them with technical skills.

We also expect that some of the Coding specialists may turn into “Code Auditors from Data Protection Perspective.

Please let me have your views in this regard.

Naavi

Posted in Cyber Law | Leave a comment

Take this Data Privacy Pledge as part of International Data Privacy Day 2023

FDPPI is embarking on celebration of the International Data Privacy Day 2023 with a unique project to obtain a “Data Privacy Pledge” from the community.

Those who take the pledge would be issued a certificate as below.

The pledge can be taken at this URL: https://forms.gle/o1jwDf1L3KuDDUd36

The pledge reads as follows:

Pledge of Data Privacy

On the occasion of International Data Privacy Day 2023,  I hereby take a voluntary pledge to uphold the cause of “Privacy as a Human Right” by taking all steps necessary for Protection and Privacy of Personal data which I shall come across in my Professional and Personal life with due regard to the Principles of Fairness and Lawfulness of processing.

In particular:

I shall adhere to the requirement of obtaining informed consent of the data principals whose personal information comes within my control and shall use, disclose such information only as per the choice of the data principal and in accordance with the applicable laws.

I shall adhere to the principle of Minimal and  purpose oriented Collection of personal data and shall ensure that it shall be shared only on a need to know basis.

I shall take necessary steps to stop using personal information if the purpose for which it came into my possession has been completed.

I shall take necessary steps to ensure that the personal data is kept updated from time to time.

I shall not disclose the personal information except as provided under law or in the genuine interest of the individual or the community.

I shall at all times take steps to ensure the security of the personal data from unauthorized access or modification or denial of access for authorized purposes.

I shall take all necessary steps to comply with the data protection law with regard to reporting of data breach or any other requirement of compliance.

I shall endeavor to keep myself aware of the data protection laws and also spread awareness in my organization and with my professional and personal contacts.

CLICK HERE TO TAKE THE PLEDGE

Posted in Cyber Law | Leave a comment

Cross Border Transfer of Data as an International Property issue

“Data” is accepted as an “asset”. “Personal Data” is in practice considered as an “asset belonging to the data subject”, the limited use of which can be transferred to a Data Controller under a contractual arrangement.

In India we consider “Data Subject” as a “Data Principal” and “Data Controller” as a “Data Fiduciary”. We have not gone into defining whether Data is an “Asset belonging to an individual” or a “Right” that can be assigned.

However,  PDPB 2019 referred to “Nomination” of personal data. Though this did not become a law, there are some inferences that can be drawn from the draft provisions that the Government had an intention to consider “Personal Data” as a property that can be bequethed by a written instrument like a Will.

This was possible through a written document since ITA 2000 does not recognize the Will in electronic form. The drafting committee of PDPB 2019 over looked the ITA 2000 and introduced the element of “Nomination” without specifying that a normal “Notice for Consent” given in the form of Privacy Policy in electronic form cannot be used for “Nomination” of Personal data.

However since a written Will (An instruction that will become valid only on the death of the person and will survive the death unlike a normal contract) is possible, “Nomination of Personal Data through a paper based Will is a possibility”.

Naavi had proposed a detailed system for handling the accounts of deceased data principals (earlier articles in this regard are available in this site) in which “Personal Data” was considered as an “Asset” and just like we settle a claim of money lying in the Bank account of a deceased person or more appropriately in the Bank locker of a deceased person, a method was proposed to handle the personal data of the deceased.

In the process Naavi had also proposed that “Unclaimed Personal Data” should be considered as a sovereign property and taken over to the control of a Data Custodian of the Government and not allowed to be left with the Data Fiduciaries. (Again similar to unclaimed Bank accounts etc).

The Government already recognizes some parts of “Non Personal Data” as “Sovereign Asset” and this was part of the recommendations of the Kris Gopalakrishna Committee report. This is an acceptable thought which will be acceptable even in the global scenario though countries including EU have failed to recognize the problem of “Personal Data of Deceased Data Subjects”.

If we therefore consider that for practical purposes “Personal Data” is like any other “Personal Asset”, we come across another issue related to the International Relationship of different countries.

Our laws recognize that the legal response of the Government is dependent on the need to ensure “Sovereignty and Integrity of the country” and “Friendly relations with other countries”.  The data protection law does not however specify clearly the dealing with the “Personal Data” of foreign citizens particularly if it belongs to “Unfriendly countries” or “Enemy Countries”.

If Personal Data is property, then  the Country in which a data subject exercises citizenship rights should be considered as having sovereign rights on the personal data of its citizens.

In case of transfer of personal data for processing to foreign  countries, there could be an issue of the “Property” of a “Citizen” being transferred to the custody of a foreigner.

EU GDPR through the Schrems judgement established a right of EU data subjects (essentially the EU Citizens) to demand that their rights be protected against foreign data processors in the foreign jurisdiction and over ruling the local law. This is consistent with the thought that the Personal Data of a Citizen is indirectly the sovereign data of the Government.

The approach to be adopted by India in DPDPB 2022 to negotiate data transfer countries in the form of Mutual Assistance treaties between countries for determination of “Adequacy” is a pointer in this direction. The contracts like SCC also need to be considered under the International contract law.

While treating “Personal Data” a property of the Citizen and subjecting it to the rules of “Property transfer across borders” is an acceptable proposition, in the context of free movement of data in the cloud storage situation, a doubt occurs if an Indian Cloud owner can store the data of a Pakistan citizen (Though Pakistan is not a declared enemy country, if a war breaks out, such a situation may arise), considering that Pakistan may  not a “Friendly country” under the acceptable definition of the term under the law in India.

Does this mean that an Indian cloud operator is taking on a responsibility to manage the assets that belongs to the Pakistan Government indirectly?

If tomorrow either the Indian Government or the Pakistani Government is unhappy with the way the data has been used, processed or disclosed, can there be a charge from either of the countries that the Company has acted against the sovereign interests of their country?

Suppose due to some negligence or cyber attack the data is destroyed, then can the owner country allege conspiracy to destroy its national asset? or the destination country allege conspiracy to assist a foreign power?

These questions may be in the realms of speculation today. However taking into account the hidden value of the personal data (or any other data), which may include a Crypto Currency or NFT it is difficult to ignore the possibilities of a war breaking out between two countries because the data assets of one country was destroyed or taken over by  another country.

What if a Pakistan or Chinese entrepreneur is managing a Crypto Exchange and its Government nationalizes the company and takes over the data?… The value may run into billions of rupees and more harmful than enemy army taking over some buildings inside our territory.

During the Ukraine conflict, the US Government did impose sanctions that extended to data assets and tried to arm twist foreign Governments to shut TV channels, stop IT services to Russia etc.

As we go forward and the value of data is more and more recognizable, the demand of sovereign rights over personal data will only grow.

Currently  our ITA 2000 nor the DPDPB 2022 does not address this situation.

I therefore request MeitY to consider through a CERT IN guideline to release a notification that

-Processing of Personal Data of citizens of designated countries shall be handled with care and under report to CERT In.

-Such data should be held in a separate custody as  “Foreign Properties of designated countries

-The possibility of a normal data breach becoming a trigger for International dispute needs to be flagged as a “Data Security Risk” with appropriate security measures.

-The  processing of such data of foreign citizens should be also reported to the data protection authority of the data exporting country in addition to the data protection authority/CERT-IN in India.

-If no exemption is provided for Data from being treated as “Property”, then laws applicable to properties of citizens in foreign countries will apply automatically and this has to be factored in as a Cyber Risk factor

I request MeitY/CERT-In to clarify in this matter.

In the current year when India is the Chairperson of G-20, we need to raise this “Handling of Data Transfer across Borders” as not a simple Section 17 -DPDPB 2022 issue or Article 44 of GDPR but as an issue involving transfer of property across borders and work out a resolution for such disputes.

Naavi

(Request for comments)

Posted in Cyber Law | Leave a comment

Kotak Bank Notified as Protected System and Obligations of a Protected System owner

Kotak Mahindra Bank became the Sixth Bank in India to be declared under Section 70 of Information Technology Act 2000 as a “Protected System”.

The Notification was issued on 11th January.

Earlier, following Banks namely ICICI Bank, HDFC Bank, Bank of Baroda, Punjab National Bank and Union Bank of India, have been notified similarly along with the Systems of NPCI. UIDAI and Tetra Secured Communication System Network of NCT Delhi had earlier been also notified.

These notifications are not notifications of a routine nature and will fundamentally change the Information Security Systems Management in these entities as indicated by the following.

Section 70 of ITA 2000 is reproduced here:

Protected system (Amended Vide ITAA-2008)

(1)The appropriate Government may, by notification in the Official Gazette, declare any computer resource which directly or indirectly affects the facility of Critical Information Infrastructure, to be a protected system.

Explanation: For the purposes of this section, “Critical Information Infrastructure” means the computer resource, the incapacitation or destruction of which , shall have debilitating impact on national security, economy, public health or safety.
(Substituted vide ITAA-2008)

(2)The appropriate Government may, by order in writing, authorize the persons who are authorized to access protected systems notified under sub-section (1)
(3)Any person who secures access or attempts to secure access to a protected system in contravention of the provisions of this section shall be punished with imprisonment of either description for a term which may extend to ten years and shall also be liable to fine.
(4) The Central Government shall prescribe the information security practices and procedures for such protected system. (Inserted vide ITAA 2008)

The rules for the Information security practices  to be followed by Protected Systems were notified vide Gazette Notification of  22nd May 2018  which will now apply to all these systems declared as “Protected”.

According to Rule 3 of the said notification, the following will be an obligation of all these protected systems:

3. Information Security Practices and Procedures for “Protected System”.

(1)(a) The organisation having “Protected System” shall constitute an Information Security Steering Committee under the chairmanship of Chief Executive Officer/Managing Director/Secretary of the organisation.

(b) The composition of Information Security Steering Committee(ISSC) shall be as under:

(i) IT Head or equivalent;
(ii) Chief Information Security Officer (CISO);
(iii) Financial Advisor or equivalent;
(iv) Representative of National Critical Information Infrastructure Protection Centre (NCIIPC);
(v) Any other expert(s) to be nominated by the organisation.

(2) The Information Security Steering Committee (ISSC) shall be the apex body with roles and responsibilities as follows: –

(a) All the Information Security Policies of the “Protected System “shall be approved by Information Security Steering Committee.
(b) Significant changes in network configuration impacting “Protected System” shall be approved by the Information Security Steering Committee.
(c) Each significant change in application(s) of the “Protected System” shall be approved by Information Security Steering Committee.
(d) A mechanism shall be established for timely communication of cyber incident(s) related to “Protected System” to Information Security Steering Committee.
(e) A mechanism shall be established to share the results of all information security audits and compliance of “Protected System” to Information Security Steering Committee.
(f) Assessment for validation of “Protected System” after every two years.

(3) The organisation having “Protected System” shall

(a) nominate an officer as Chief Information Security Officer (CISO) with roles and responsibilities as per latest “Guidelines for Protection of Critical Information Infrastructure” and “Roles and Responsibilities of Chief Information Security Officers (CISOs) of Critical Sectors in India” released by NCIIPC;
(b) plan, establish, implement, operate, monitor, review, maintain and continually improve Information Security Management System (ISMS) of the “Protected System” as per latest “Guidelines for Protection of Critical Information Infrastructure” released by the National Critical Information Infrastructure Protection Centre or an industry accepted standard duly approved by the said National Critical Information Infrastructure Protection Centre;
(c) ensure that the network architecture of “Protected System” shall be documented. Further, the organisation shall ensure that the “Protected System” is stable, resilient and scalable as per latest National Critical Information Infrastructure Protection Centre “Guidelines for Protection of Critical Information Infrastructure”. Any changes to network architecture shall be documented;
(d) plan, develop, maintain the documentation of authorised personnel having access to “Protected System” and the same shall be reviewed at least once a year, or whenever required, or according to the Information Security Management System(ISMS) as suggested in clause(b);
(e) plan, develop, maintain and review the documents of inventory of hardware and software related to “Protected System”;
(f) ensure that Vulnerability/Threat/Risk (V/T/R) Analysis for the cyber security architecture of “Protected System” shall be carried out at least once a year. Further, Vulnerability/Threat/Risk (V/T/R) Analysis shall be initiated whenever there is significant change or upgrade in the system, under intimation to Information Security Steering Committee;
(g) plan, establish, implement, operate, monitor, review, and continually improve Cyber Crisis Management Plan (CCMP) in close coordination with National Critical Information Infrastructure Protection Centre;
(h) ensure conduct of internal and external Information Security audits periodically according to Information Security Management System(ISMS) as suggested in clause (b). The Standard Operating Procedure (SOP) released by National Critical Information Infrastructure Protection Centre (NCIIPC) for “Auditing of CIIs/Protected Systems by Private/Government Organisation” shall be strictly followed;(i) plan, develop, maintain and review documented process for IT Security Service Level Agreements (SLAs). The same shall be strictly followed while designing the Service Level Agreements with service providers;
(j) establish a Cyber Security Operation Center (C-SOC) using tools and technologies to implement preventive, detective and corrective controls to secure against advanced and emerging cyber threats. In addition, Cyber Security Operation Center is to be utilised for identifying unauthorized access to “Protected System”, and unusual and malicious activities on the “Protected System”, by analyzing the logs on regular basis. The records of unauthorised access, unusual and malicious activity, if any, shall be documented;
(k) establish a Network Operation Center (NOC) using tools and techniques to manage control and monitor the network(s) of “Protected System” for ensuring continuous network availability and performance;
(l) plan, develop, maintain and review the process of taking regular backup of logs of networking devices, perimeter devices, communication devices, servers, systems and services supporting “Protected System” and the logs shall be handled as per the Information Security Management System(ISMS) as suggested in clause (b).

Further, the Roles and Responsibilities of “Protected Systems” towards National Critical Information Infrastructure Protection Center (NIIPC)  is defined as follows under Rule 4.

(1) The Chief Information Security Officer (CISO) shall maintain regular contact with the National Critical Information Infrastructure Protection Centre(NCIIPC) and will be responsible for implementing the security measures suggested by the said National Critical Information Infrastructure Protection Centre(NCIIPC) using all available or appropriate ways of communication.
(2) The Chief Information Security Officer (CISO) shall share the following, whenever there is any change, or as required by the National Critical Information Infrastructure Protection Centre (NCIIPC), and incorporate the inputs/feedbacks suggested by the said National Critical Information Infrastructure Protection Centre (NCIIPC):-
(a) Details of Critical Information Infrastructure (CII)declared as “Protected System”, including dependencies on and of the saidCritical Information Infrastructure.
(b) Details of Information Security Steering Committee (ISSC) of “Protected System”.
(c) Information Security Management System (ISMS) of “Protected System”.
(d) Network Architecture of “Protected System”.
(e) Authorised personnel having access to “Protected System”.
(f) Inventory of Hardware and Software related to “Protected System”.
(g) Details of Vulnerability/Threat/Risk (V/T/R) Analysis for the cyber security architecture of “Protected System”.
(h) Cyber Crisis Management Plan(CCMP).
(i) Information Security Audit Reports and post Audit Compliance Reports of “Protected System”.
(j) IT Security Service Level Agreements (SLAs) of “Protected System”.
(3) (a) The Chief Information Security Officer (CISO) shall establish a process, in consultation with the National Critical Information Infrastructure Protection Centre (NCIIPC), for sharing of logs of “Protected System” with National Critical Information Infrastructure Protection Centre (NCIIPC) to help detect anomalies and generate threat intelligence on real time basis.
(b) The Chief Information Security Officer shall also establish a process of sharing documented records of Cyber Security Operation Center (related to unauthorised access, unusual and malicious activity) of “Protected System” with National Critical Information Infrastructure Protection Centre(NCIIPC) to facilitate issue of guidelines, advisories and vulnerability, audit notes etc. relating to “Protected System”.
(4) (a) The Chief Information Security Officer (CISO) shall establish a process in consultation with National Critical Information Infrastructure Protection Centre (NCIIPC), for timely communication of cyber incident(s) on “Protected System” to the said National Critical Information Infrastructure Protection Centre (NCIIPC).
(b) In addition, National Critical Information Infrastructure Protection Centre’s latest Standard Operating Procedure (SOP) on Incident Response shall be strictly followed in case of cyber incident(s) on “Protected System”.

As a result of these notifications the infrastructure of major Banks in India will come under the direct supervision of the CERT In.

The other implication of these notification is that any “Attempt” to access these systems other than what is allowed under the notification (any designated employee or authorized team member of a contractual managed service provider etc) will invoke the offence under Section 70 with a possible imprisonment of upto 10 years.

In view of the above, all consultants working with such Banks has to ensure that they have a proper signed authorization letter from an appropriate official (CISO) before they access any CBS, RTGS, NEFT, SMS, systems.

We can presume that systems to be accessed by customers are excluded from the above.

It is still surprising why SBI is still not notified even though they are the largest Bank in India.

Naavi

Posted in Cyber Law | Leave a comment