{"id":16809,"date":"2023-08-10T00:00:00","date_gmt":"2023-08-10T00:00:00","guid":{"rendered":"https:\/\/www.nextias.com\/current_affairs\/uncategorized\/10-08-2023\/digital-personal-data-protection-law\/"},"modified":"2023-08-10T00:00:00","modified_gmt":"2023-08-10T00:00:00","slug":"digital-personal-data-protection-law","status":"publish","type":"post","link":"https:\/\/www.nextias.com\/ca\/editorial-analysis\/10-08-2023\/digital-personal-data-protection-law","title":{"rendered":"Digital Personal Data Protection Law"},"content":{"rendered":"<p><!DOCTYPE html PUBLIC \"-\/\/W3C\/\/DTD HTML 4.0 Transitional\/\/EN\" \"http:\/\/www.w3.org\/TR\/REC-html40\/loose.dtd\"><br \/>\n<html><body><\/p>\n<h1 style=\"text-align:center\"><span style=\"font-size:20pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\"><u>Digital Personal Data Protection Law<\/u><\/span><\/span><\/span><\/h1>\n<p style=\"text-align:justify\"><span style=\"font-size:12pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\"><strong>Syllabus: GS2\/ Government Policies &#038; Interventions<\/strong><\/span><\/span><\/span><\/p>\n<p style=\"text-align:justify\"><span style=\"font-size:12pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\"><strong><u>In Context<\/u><\/strong><\/span><\/span><\/span><\/p>\n<ul>\n<li style=\"list-style-type:disc\"><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\">Recently the Lok Sabha has passed the<\/span><\/span><\/span><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\"><strong> Digital Personal Data Protection Bill, 2023<\/strong><\/span><\/span><\/span><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\">.<\/span><\/span><\/span><\/li>\n<\/ul>\n<p style=\"text-align:justify\"><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\"><strong><u>Need of Strong Data Protection Regime<\/u><\/strong><\/span><\/span><\/span><\/p>\n<ul>\n<li style=\"list-style-type:disc\"><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\"><strong>Data a new oil to Industry: <\/strong><\/span><\/span><\/span><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\">As India\u2019s data economy grows, it finds itself grappling with regulation in order to catch up with the rich data that Indians are sharing every day, as they log onto hundreds of platforms\u2014whether to bank electronically or to purchase groceries or to stay connected on social media.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type:disc\"><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\"><strong>Threats posed to Digital Economy:<\/strong><\/span><\/span><\/span><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\"> Risk exposure to the digital economy has increased manifolds amidst the pandemic. For example, Ransomware, the data breach at Mobikwik.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type:disc\"><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\"><strong>Internet Crime:<\/strong><\/span><\/span><\/span><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\"> Protection from several instances of internet crimes like cybercrime, cyberbullying and harassment.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type:disc\"><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\"><strong>National Security Concern:<\/strong><\/span><\/span><\/span><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\"> Data of security agencies could be at risk compromising national security and many private entities are against data localisation.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type:disc\"><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\"><strong>Surveillance state: <\/strong><\/span><\/span><\/span><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\">Inadequate data protection legislation &amp; unlimited government access can lead to a totalitarian regime<\/span><\/span><\/span><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\"><strong> (Aadhar Act).<\/strong><\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type:circle\"><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\">Currently, Personal data was regulated by IT Act, 2000. However, this Act was applicable only to foreign companies &amp; corporates working in India.<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"list-style-type:disc\"><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\"><strong>Puttaswamy v India (2017):<\/strong><\/span><\/span><\/span><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\"> Supreme Court has declared Data Privacy as a Fundamental Right under Article 21.<\/span><\/span><\/span><\/li>\n<\/ul>\n<p style=\"text-align:justify\"><a href=\"https:\/\/www.nextias.com\/current-affairs\/09-03-2021\/personal-data-protection-pdp-bill#:~:text=Personal%20Data%20Protection%20Bill&#038;text=The%20Bill%20derives%20its%20inspiration,by%20retired%20Justice%20B%20N%20Srikrishna.&#038;text=Personal%20data%3A%20Data%20from%20which,Individual%20consent%20will%20suffice.\" style=\"text-decoration:none\"><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#1155cc\"><strong><u>Key Provisions of the Bill<\/u><\/strong><\/span><\/span><\/span><\/a><\/p>\n<ul>\n<li style=\"list-style-type:disc\"><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\"><strong>Applicability: <\/strong><\/span><\/span><\/span><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\">The Bill applies to the processing of digital personal data within India where such data is: (i) collected online, or (ii) collected offline and is digitised.\u00a0 It will also apply to the processing of personal data outside India if it is for offering goods or services in India.\u00a0<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type:disc\"><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\"><strong>Consent:\u00a0 <\/strong><\/span><\/span><\/span><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\">Personal data may be processed only for a lawful purpose after obtaining the consent of the individual. A notice must be given before seeking consent.\u00a0\u00a0<\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type:circle\"><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\">The notice should contain details about the personal data to be collected and the purpose of processing.\u00a0<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"list-style-type:disc\"><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\"><strong>Lower age of consent: <\/strong><\/span><\/span><\/span><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\">The Bill <\/span><\/span><\/span><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\"><strong>gives powers to the central government<\/strong><\/span><\/span><\/span><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\"> to prescribe a <\/span><\/span><\/span><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\"><strong>lower age of consent than 18 years <\/strong><\/span><\/span><\/span><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\">for accessing Internet services without parental consent if the platform they are using can process their data in a \u201cverifiably safe manner\u201d.\u00a0<\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type:circle\"><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\">This would essentially mean a white-listing approach for companies in the edtech sector, and for medical purposes, among other things.<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"list-style-type:disc\"><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\"><strong>Ease of cross-border data flows: <\/strong><\/span><\/span><\/span><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\">The Centre has proposed to significantly ease cross-border data flows to international jurisdictions \u2013 by <\/span><\/span><\/span><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\"><strong>moving away from a whitelisting approach<\/strong><\/span><\/span><\/span><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\"> to a<\/span><\/span><\/span><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\"><strong> blacklisting mechanism<\/strong><\/span><\/span><\/span><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\">.\u00a0<\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type:circle\"><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\">Earlier, the government had said that it would issue a list of countries where data flows would be allowed.\u00a0<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"list-style-type:disc\"><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\"><strong>Impact on Social Media Companies: <\/strong><\/span><\/span><\/span><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\">Significant Data Fiduciaries (<\/span><\/span><\/span><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\"><strong>the fiduciaries with huge volume and processing sensitive data<\/strong><\/span><\/span><\/span><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\">) have to develop their <\/span><\/span><\/span><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\"><strong>own user verification mechanism<\/strong><\/span><\/span><\/span><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\">.<\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type:circle\"><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\">It will<\/span><\/span><\/span><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\"><strong> reduce the anonymity of users<\/strong><\/span><\/span><\/span><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\"> and decrease trolling, fake news and cyberbullying.<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"list-style-type:disc\"><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\"><strong>Exemptions: <\/strong><\/span><\/span><\/span><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\">Rights of the data principal and obligations of data fiduciaries (except data security) will not apply in specified cases.\u00a0\u00a0<\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type:circle\"><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\"><strong>These include:<\/strong><\/span><\/span><\/span><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\"> (i) prevention and investigation of offences, and (ii) enforcement of legal rights or claims.\u00a0\u00a0<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type:circle\"><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\">The central government may, by notification, exempt certain activities from the application of the Bill.\u00a0\u00a0<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type:circle\"><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\"><strong>These include:<\/strong><\/span><\/span><\/span><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\"> (i) processing by government entities in the interest of the security of the state and public order, and (ii) research, archiving, or statistical purposes.<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"list-style-type:disc\"><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\"><strong>Data Protection Board of India: <\/strong><\/span><\/span><\/span><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\">The central government will establish the Data Protection Board of India.\u00a0 Key functions of the Board include: (i) monitoring compliance and imposing penalties, (ii) directing data fiduciaries to take necessary measures in the event of a data breach, and (iii) hearing grievances made by affected persons.\u00a0\u00a0<\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type:circle\"><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\">Board members will be appointed for two years and will be eligible for re-appointment.\u00a0<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"list-style-type:disc\"><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\"><strong>Penalties: <\/strong><\/span><\/span><\/span><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\">The schedule to the Bill specifies penalties for various offences such as up to:<\/span><\/span><\/span><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\"><strong> (i) Rs 200 crore for non-fulfilment of obligations for children, and (ii) Rs 250 crore for failure to take security measures to prevent data breaches<\/strong><\/span><\/span><\/span><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\">.\u00a0\u00a0<\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type:circle\"><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\">Penalties will be imposed by the Board after conducting an inquiry.<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p style=\"text-align:justify\"><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\"><strong><u>Significance<\/u><\/strong><\/span><\/span><\/span><\/p>\n<ul>\n<li style=\"list-style-type:disc\"><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\"><strong>Law Enforcement: <\/strong><\/span><\/span><\/span><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\">Data localisation can help law-enforcement agencies access data for investigations and enforcement.<\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type:circle\"><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\">Cross-border data transfer of data\u00a0 through individual bilateral \u201cmutual legal assistance treaties\u201d is a cumbersome process.<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"list-style-type:disc\"><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\"><strong>Cyber Security: <\/strong><\/span><\/span><\/span><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\">Recently, many WhatsApp accounts were hacked by an Israeli software called Pegasus.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type:disc\"><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\"><strong>Curbing Fake News: <\/strong><\/span><\/span><\/span><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\">Many instances like lynching, national security threats, etc can now be prevented in time.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type:disc\"><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\"><strong>Data Sovereignty: <\/strong><\/span><\/span><\/span><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\">Data localisation will also increase the ability of the Indian government to tax Internet giants.<\/span><\/span><\/span><\/li>\n<\/ul>\n<p style=\"text-align:justify\"><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\"><strong><u>Concerns\/ Challenges<\/u><\/strong><\/span><\/span><\/span><\/p>\n<ul>\n<li style=\"list-style-type:disc\"><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\"><strong>Exemptions to the State may have adverse implications for privacy:<\/strong><\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type:circle\"><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\">Personal data processing by the State has been given several exemptions under the Bill.\u00a0\u00a0<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type:circle\"><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\"><strong>As per Article 12 of the Constitution<\/strong><\/span><\/span><\/span><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\">, the State includes: central government, state government, local bodies, and authorities and companies set up by the government.\u00a0\u00a0<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type:circle\"><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\">There may be certain issues with such exemptions.<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"list-style-type:disc\"><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\"><strong>In conflict with the Right to privacy:<\/strong><\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type:circle\"><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\">By<\/span><\/span><\/span><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\"><strong> empowering the executive to draft rules on a range of issues<\/strong><\/span><\/span><\/span><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\">, the proposed Bill creates <\/span><\/span><\/span><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\"><strong>wide discretionary powers for the Central government <\/strong><\/span><\/span><\/span><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\">and thus <\/span><\/span><\/span><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\"><strong>fails to safeguard people\u2019s right to privacy<\/strong><\/span><\/span><\/span><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\">.\u00a0<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type:circle\"><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\">For instance, under Section 18, it empowers the Central government to exempt any government, or even private sector entities, from the provisions of the Bill by merely issuing a notification.<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"list-style-type:disc\"><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\"><strong>Overriding consent of an individual:\u00a0<\/strong><\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type:circle\"><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\">The Bill overrides consent of an individual where the State processes personal data for provision of benefit, service, license, permit, or certificate.\u00a0\u00a0<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type:circle\"><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\">It specifically allows use of data processed for one of these purposes for another. It also allows use of personal data already available with the State for any of these purposes.<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"list-style-type:disc\"><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\"><strong>Bo regulation of risks:<\/strong><\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type:circle\"><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\">The Bill does not regulate risks of harms arising out of processing of personal data.<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"list-style-type:disc\"><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\"><strong>No right for data portability:<\/strong><\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type:circle\"><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\">The Bill does not grant the right to data portability and the right to be forgotten to the data principal.<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"list-style-type:disc\"><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\"><strong>Transfer of personal data outside India:<\/strong><\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type:circle\"><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\">The Bill allows transfer of personal data outside India, except to countries notified by the central government.\u00a0\u00a0<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type:circle\"><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\">This mechanism may not ensure adequate evaluation of data protection standards in the countries where transfer of personal data is allowed.<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"list-style-type:disc\"><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\"><strong>Issues with the Data Protection Board:<\/strong><\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type:circle\"><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\">The members of the Data Protection Board of India will be appointed for two years and will be eligible for re-appointment.\u00a0\u00a0<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type:circle\"><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\">The short term with scope for re-appointment may affect the independent functioning of the Board.<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p style=\"text-align:justify\"><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\"><strong><u>Way Ahead<\/u><\/strong><\/span><\/span><\/span><\/p>\n<ul>\n<li style=\"list-style-type:disc\"><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\">Responding to concerns raised on various accounts, IT Minister stated that exemptions to the Centre were needed to deal with cases like,<\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type:circle\"><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\">A natural disaster, wherein the government should not wither time to seek consent for processing their data as it has to act quickly to ensure safety.\u00a0<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type:circle\"><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\">If the police are conducting an investigation to catch an offender, should their consent be taken.<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"list-style-type:disc\"><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\">He also added that the European Union\u2019s General Data Protection Regulation (GDPR) has 16 exemptions, but India\u2019s Bill has four exemptions.<\/span><\/span><\/span><\/li>\n<\/ul>\n<div>\n<table cellspacing=\"0\" style=\"border-collapse:collapse; border:none; width:649px\">\n<tbody>\n<tr>\n<td style=\"background-color:#fff2cc; border-bottom:1px solid #000000; border-left:1px solid #000000; border-right:1px solid #000000; border-top:1px solid #000000; vertical-align:top; width:649px\">\n<p style=\"text-align:center\"><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\"><strong><u>Daily Mains Question<\/u><\/strong><\/span><\/span><\/span><\/p>\n<p style=\"text-align:justify\"><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\"><strong>[Q]<\/strong><\/span><\/span><\/span><span style=\"font-size:13pt\"><span style=\"font-family:Georgia,serif\"><span style=\"color:#000000\"> Discuss the need for a data protection regime in India. What are the issues &#038; criticisms surrounding the Digital Personal Data Protection Bill, 2023?<\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<p>\u00a0<\/p>\n<p><\/body><\/html><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Digital Personal Data Protection Law Syllabus: GS2\/ Government Policies &#038; Interventions In Context Recently the Lok Sabha has passed the Digital Personal Data Protection Bill, 2023. Need of Strong Data Protection Regime Data a new oil to Industry: As India\u2019s data economy grows, it finds itself grappling with regulation in order to catch up with [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":16810,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[22],"tags":[29],"class_list":["post-16809","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-editorial-analysis","tag-thehindu"],"acf":[],"jetpack_featured_media_url":"https:\/\/wp-images.nextias.com\/cdn-cgi\/image\/format=auto\/ca\/uploads\/2023\/09\/2685710Next-logo-1.jpeg","_links":{"self":[{"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/posts\/16809","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/comments?post=16809"}],"version-history":[{"count":0,"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/posts\/16809\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/media\/16810"}],"wp:attachment":[{"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/media?parent=16809"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/categories?post=16809"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/tags?post=16809"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}