PRIVACY & THE CAVEMAN - PART II
Dhananjay Rokde
Perpetual Student of Technology & Security #Top40Under40 #AI #Fraud & #Investigation, #IncidentResponse, #DFIR and #CyberSecurity & #Risk Specialist - Multi-Industry and Domain professional
Firstly I am highly grateful for the tremendous response to my first article - Part- I of the series. I wish to thank all those who took the time to read it and send comments and feedback. I got so many DMs (excess of 200+), appreciations, and queries (Some of which I still can not answer).
The history of privacy is so interesting - I would have never thought ... It was a wonderful research exercise.
AGENDA
My humble attempt in this article is to educate myself and others on: -
Goes without saying ... There is going to a Part - II & IV. I sincerely request all my friends, colleagues and industry professionals to collaborate in this initiative. Not here for the credit - I am more than happy to post on your page - My name/credit is necessary.
BTW - Where is the Cave Man ??? Right! - He's coming - Hang on.
As a #Cyber & #Privacy (Up & Coming) professional in India’s evolving data protection framework, I have had the pleasure of -
This includes the Personal Data Protection Bill, 2019, the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011, and other applicable laws.
Under India's Digital Personal Data Protection Act (DPDP Act), Data Fiduciaries and Data Processors have distinct roles and responsibilities. Here are the main differences:
LET US LOOK AT THE "WHO"?
Data Fiduciaries:
Data Processors:
Key differences:
Examples:
To ensure compliance, Data Fiduciaries and Data Processors must:
NOW LET US UNDERSTAND THEIR RESPONSIBILITIES IN DETAIL
1. Data Processor Responsibilities:
Under the DPDP Act, Data Processors must:
2. Data Fiduciary Obligations:
Under the DPDP Act, Data Fiduciaries must:
3. DPIA Process:
DPIA is an extremely detailed process wherein each item has a detailed description in the Act; and has to be individually verified, certified and signed-off. A Data Protection Impact Assessment (DPIA) template typically includes:
I. Introduction
II. Data Collection and Processing
III. Data Principal Rights
IV. Data Security Measures
V. Risk Assessment
VI. Compliance
T
Here's a sample DPIA template:
DPIA Template
Processing Activity: [Insert activity]
Data Fiduciary: [Insert name]
Data Processor: [Insert name]
Purpose: [Insert purpose]
Data Collection:
Data Security Measures:
领英推荐
Risk Assessment:
Conclusion:
PLEASE NOTE THAT THERE IS NO FORMAL DPIA TEMPLATE YET, AND THIS IS A BEST-EFFORT FULL COVERAGE OF THE DPIA TEMPLATE I COULD PROVIDE. I HAVE TAKEN HELP FROM VARIOUS SOURCES - THERE ARE TOO MANY TO QUOTE, AND I AM THANKFUL TO ALL THOSE SOURCES.
ELECTRONIC EXAMPLES OF SEGREGATION OF DATA between FIDUCIARIES AND DATA PROCESSORS
Electronic Transaction Data Fiduciary:
A Data Fiduciary is responsible for collecting, processing, and storing electronic transaction data, such as:
Responsibilities:
Electronic Transaction Data Processor:
A Data Processor that processes electronic transaction data on behalf of the Data Fiduciary, such as:
Responsibilities:
E-Commerce Example:
Data Fiduciary: Online Shopping Platform (e.g., Amazon)
Data Processor: Payment Gateway (e.g., Paytm)
Scenario:
Data Fiduciary (Amazon) Responsibilities:
Data Processor (Paytm) Responsibilities:
By understanding these roles and responsibilities, organizations can ensure compliance with data protection regulations and protect customer data.
RIGHTS OF DATA PRINCIPLES (CONSUMERS/YOU/ME) IN ELECTRONIC TRANSACTIONS
1. Data Principal Rights in Electronic Transactions:
Under the DPDP Act, Data Principals (customers) have rights regarding their electronic transaction data:
2. Security Measures for Electronic Transaction Data:
To protect electronic transaction data, organizations should implement:
3. Guidance on DPIA for Electronic Transactions:
Conducting a DPIA for electronic transactions involves:
Example DPIA questions:
Cross-Border Data Transfer Implications:
Under the DPDP Act, cross-border data transfers require:
Considerations:
DATA BREACH NOTIFICATION PROCEDURE AND TEMPLATE (DRAFT)
Under the DPDP Act:
Data Breach Notification Template:
Subject: Data Breach Notification
Dear [Data Principal],
We regret to inform you of a data breach involving [data types]..
DATA PROTECTION OFFICER (DPO) RESPONSIBILITIES
Under the DPDP Act:
I specialize in advising organizations on developing and implementing comprehensive data protection strategies, conducting privacy impact assessments, and ensuring full compliance with Indian data protection regulations. My expertise also encompasses cross-border data transfers, data localization requirements, and integrating privacy-by-design principles into business processes.
If you're looking for insights on compliance, privacy-enhancing technologies, privacy impact assessments, or other related topics, I’d be happy to offer guidance. #DhananjayRokde