1.1 Draft Digital Personal Data Protection Bill, 2022
India does not have one specific law on the protection of personal data law and a large part of the current regulatory framework relating to protection of personal data is derived from the Information Technology Act, 2000 (IT Act) and the IT (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011 (SPDI Rules).
On 18 November 2022, however, the Indian government released a draft of the Digital Personal Data Protection Bill, 2022 (Bill), to pass a comprehensive data protection law in India. The Bill governs data fiduciaries (i.e., data controllers), data processors and data principals (i.e., data subjects) and is set to regulate the processing of individual personal data which is either collected online or is digitised after it is collected offline. Such processing should be for a lawful purpose. Unlike the SPDI Rules, the Bill has done away with the categorisation of personal data into sensitive personal data or information (such as passwords, biometric and financial information, medical records and history etc.), and the hierarchisation of data fiduciary’s obligations basis the type of personal data processed.
Some key concepts introduced under the Bill include:
The Bill is proposed to be tabled before the Indian Parliament in 2023 and will have to be passed by both houses of the Indian Parliament and notified in the official gazette before it becomes the law. Even after enactment, the Bill is likely to be implemented in a phased manner over a certain time period. The Indian government will also subsequently make rules to carry out the provisions of the Bill.
1.2 India establishes a new, more onerous cyber security framework
The Indian Computer Emergency Response Team (CERT-In), appointed under Section 70B of the IT Act read with the Information Technology (The Indian Computer Emergency Response Team and Manner of Performing Functions and Duties) Rules, 2013 (CERT-In Rules), is the nodal agency for addressing various matters relating to cyber security incidents in India.
CERT-In is responsible for collecting, analysing and disseminating information on cyber security incidents and employing emergency measures to handle such incidents. In order to provide timely action, the CERT-In Rules require service providers, intermediaries, data centers and body corporates (Regulated Entities) to report cyber security incidents to CERT-In within a reasonable time of occurrence/ them noticing the incident.
On 28 April 2022, CERT-In released ‘Directions relating to information security practices, procedure, prevention, response and reporting of cyber incidents for Safe & Trusted Internet’ (Directions). This was followed by a 28-page FAQs, issued on 18 May 2022 (FAQs), to explain the nuances of the Directions.
The Directions mark a major shift from the current more relaxed reporting obligations under the CERT-In Rules and impose mandatory reporting obligations of cyber security incidents on Regulated Entities within a six-hour timeframe.
Cyber incidents listed in Annexure I of the Directions (which contains 20 such incidents as compared to the 11 incidents listed in the CERT-In Rules) have to be reported to CERT-In. These, inter alia, include incidents which are of a severe nature on any part of the public information infrastructure, data breaches or data leaks, large scale or frequent incidents such as intrusion into computer resources, websites etc., and cyber incidents impacting the safety of human beings.
The FAQs have clarified that Regulated Entities can (i) provide information then available in relation to a cyber security incident within the six-hour timeframe and any additional information subsequently within a reasonable time; and (ii) report incidents that have not been reported for a long time within six hours of them noticing the incident/ the incident being brought to their notice.
Some other obligations of Regulated Entities include:
Failure to furnish information to CERT-In, or failure to comply with the Directions, is punishable with up to one year in prison and/or a fine of up to INR 1,00,000 (approximately Euro 1120), as per Section 70B(7) of the IT Act.
Author: Deepa Christopher – Partner has contributed to the India Chapter of APAC Privacy News 2023, published by Global Privacy Law Review with Wolters Kluwer
Disclaimer: This publication highlights only key issues and is not intended to be comprehensive. The contents of this publication do not constitute any opinion or determination on, or certification in respect of, the application of Indian law by Talwar Thakore & Associates (“TT&A”). No part of this publication should be considered an advertisement or solicitation of TT&A’s professional services.
By browsing this website you agree that you are, of your own accord, seeking further information regarding TT&A. No part of this website should be construed as an advertisement of or solicitation for our professional services. No information provided on this shall be construed as legal advice.
Agree Disagree