{"id":7448,"date":"2022-08-19T00:00:00","date_gmt":"2022-08-19T00:00:00","guid":{"rendered":"https:\/\/www.nextias.com\/current_affairs\/uncategorized\/19-08-2022\/data-localisation\/"},"modified":"2025-08-04T12:48:01","modified_gmt":"2025-08-04T07:18:01","slug":"data-localisation","status":"publish","type":"post","link":"https:\/\/www.nextias.com\/ca\/editorial-analysis\/19-08-2022\/data-localisation","title":{"rendered":"Data Localisation"},"content":{"rendered":"<h2><span style=\"font-size: 13pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong><u>In News\u00a0<\/u><\/strong><\/span><\/span><\/span><\/h2>\n<ul>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">The global politics of data is rapidly evolving as leading and emerging digital economies like the <\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>European Union (EU), the U.S,India, Indonesia, and South Africa strive to protect, monetise, and leverage dat<\/strong><\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">a collected within their <\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>territories for domestic purposes.\u00a0<\/strong><\/span><\/span><\/span><\/li>\n<\/ul>\n<h2><span style=\"font-size: 13pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong><u>Data localisation<\/u><\/strong><\/span><\/span><\/span><\/h2>\n<ul>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">It means <\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>restricting the flow of data <\/strong><\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">from one country to another. It means that the <\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>personal data of a country\u2019s<\/strong><\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> residents <\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>should be processed and stored in that country<\/strong><\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">.\u00a0<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>As of now, much of cross-border data transfer is governed by individual bilateral \u201cMutual Legal Assistance Treaties\u201d (MLATs).<\/strong><\/span><\/span><\/span><\/li>\n<\/ul>\n<div>\n<table style=\"border-collapse: collapse; border: none; table-layout: fixed; width: 624px;\" cellspacing=\"0\">\n<tbody>\n<tr>\n<td style=\"vertical-align: top; border: 1px solid #000000;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 13pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>Data centre<\/strong><\/span><\/span><\/span><\/p>\n<ul>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 13pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>What is a data centre? <\/strong><\/span><\/span><\/span><span style=\"font-size: 13pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">It is a specialised physical facility of networked computers, storages and other information technology equipment<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 13pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>Who uses data centres? <\/strong><\/span><\/span><\/span><span style=\"font-size: 13pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">Entities in online space use these to organise, process, store and disseminate large amounts of data.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 13pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">Such physical facilities are available all across the world and are not restricted by geographical borders.<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<h2><span style=\"font-size: 13pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong><u>Need of Data localisation<\/u><\/strong><\/span><\/span><\/span><\/h2>\n<ul>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>Accessibility: <\/strong><\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">If it is stored outside India, access to this data will be restricted by local laws and Indian agencies will be dependent on the whims and fancies of the host-country governments for access. It gives local governments and regulators the jurisdiction to call for the data when required.\u00a0<\/span><\/span><\/span><\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>Privacy and security concern: <\/strong><\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">It may also enable the better exercise of privacy rights by Indian citizens against any form of unauthorised access to data, including by foreign intelligence.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #333333;\"><span style=\"background-color: #ffffff;\"><strong>Avoiding foreign surveillance: <\/strong><\/span><\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">It aims to protect the personal and financial information of the country\u2019s citizens and residents from foreign surveillance. In the case of data being stored in countries hostile to India, say China, it can become a tool for mass surveillance.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>Law enforcement benefits: <\/strong><\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">This will be beneficial for law enforcement agencies in particular as they can scavenge it for proof in case of breach or threat.\u00a0<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>Economic benefits: <\/strong><\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">Increasing<\/span><\/span><\/span> <span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">economic interests have compelled governments to institute rules that restrict cross-border flows with implications for negotiations on global trade and commerce. The economic benefits will accrue to local industry in terms of creating local infrastructure, employment and contributions to the AI ecosystem.<\/span><\/span><\/span><\/li>\n<\/ul>\n<h2><span style=\"font-size: 13pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong><u>Issues\u00a0<\/u><\/strong><\/span><\/span><\/span><\/h2>\n<ul>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">Foreign firms are <\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>unwilling to comply as it would require<\/strong><\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> them to spend money <\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>\u00a0on compliance activities such as hiring data-protection officers or maintaining systems to get the government approvals to transfer data<\/strong><\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">Barriers to the free flow of data may hurt businesses by increasing delays and <\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>higher costs of collaborative research or partnerships outside India.\u00a0<\/strong><\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">Entities would need multiple separate processing centres if they serve consumers <\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>both within India and outside when a single centre would suffic<\/strong><\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">e.<\/span><\/span><\/span><\/li>\n<\/ul>\n<h2><span style=\"font-size: 13pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong><u>Global Efforts\u00a0<\/u><\/strong><\/span><\/span><\/span><\/h2>\n<ul>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">Indeed, the sheer amount of data being generated and shared globally has <\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>necessitated governments <\/strong><\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">to exert more <\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>control over the use, sharing, and cross-border flow of data.\u00a0<\/strong><\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">According to the Information Technology and Innovation Foundation (ITIF), <\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>data localisation laws have more than doubled from 2017 to 2021, <\/strong><\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">indicating that states seek and want i<\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>ncreasing levels of regulatory control over data.<\/strong><\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">The US administration recently issued an executive <\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>order on promoting competition<\/strong><\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> in the American economy that pushed for the use of <\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>antitrust policy<\/strong><\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> to meet the <\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>challenges posed by the rise of dominant platform<\/strong><\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">s, and surveillance.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>\u00a0European policymakers<\/strong><\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> have introduced a bevy of digital rules that place individual users centre-stage, and enhancing their data security.\u00a0<\/span><\/span><\/span><\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>\u00a0The Chinese<\/strong><\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> government mandates localisation for all \u201cimportant data\u201d held by \u201ccritical information infrastructure\u201d and any cross border personal data transfer must undergo a security assessment.<\/span><\/span><\/span><\/li>\n<\/ul>\n<div>\n<table style=\"border-collapse: collapse; border: none; table-layout: fixed; width: 624px;\" cellspacing=\"0\">\n<tbody>\n<tr>\n<td style=\"background-color: #fff2cc; vertical-align: top; border: 1px solid #000000;\"><span style=\"font-size: 13pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong><u>Role of G20\u00a0<\/u><\/strong><\/span><\/span><\/span><\/p>\n<ul>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">The<\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong> G20 appears as a viable platform to discuss data<\/strong><\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">, particularly sharing and transfer, given seemingly converging positions on data governance amongst major G-7 powers and <\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>emerging economies<\/strong><\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> as the state finds a<\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong> greater role in regulating data.\u00a0<\/strong><\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">Moreover, the G20\u2019s track record as the apex forum to discuss<\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong> global economic issues gives<\/strong><\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> it <\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>legitimacy and having the top (digital) economies<\/strong><\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> makes it an appropriate forum to discuss data.\u00a0<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">The G20 does not create binding rules but serves as a platform to catalyse and inject new thinking around critical current issues.<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<h2><span style=\"font-size: 13pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong><u>India\u2019s Efforts\u00a0<\/u><\/strong><\/span><\/span><\/span><\/h2>\n<ul>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">Since 2017, India has attempted to i<\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>ncubate governance of non-personal<\/strong><\/span><\/span><\/span> <span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>data, personal data, e-commerce regulation <\/strong><\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">and <\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>artificial intelligence (AI) <\/strong><\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">with a preference to <\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>harness \u201cIndia\u2019s data for India\u2019s development<\/strong><\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">.\u201d\u00a0<\/span><\/span><\/span><\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: circle;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">These policies, including the recently withdrawn<\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong> Personal Data Protection Bil<\/strong><\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">l, are works in progress but this does not take away from the <\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>vast ecosystem of actors<\/strong><\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> \u2014 including experts, civil society, and industry actively engaging with and attempting to shape digital policy-making.<\/span><\/span><\/span><\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">In 2018, based on the recommendations of the <\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>Justice Srikrishna Committee, the Reserve Bank of India (RBI) <\/strong><\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">\u00a0mandated companies to <\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>locally store and process sensitive data<\/strong><\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> belonging to Indian users of various digital payment services.\u00a0<\/span><\/span><\/span><\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: square;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">Until then, most data from<\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong> India was being stored on a cloud database outside the country<\/strong><\/span><\/span><\/span><\/li>\n<\/ul>\n<h2><span style=\"font-size: 13pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong><u>Conclusion and Way Forward\u00a0<\/u><\/strong><\/span><\/span><\/span><\/h2>\n<ul>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">To underscore political rhetoric and drive global data discussions at the G20, the Indian government s<\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>hould present a holistic agenda<\/strong><\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> that embeds data collection and sharing within a <\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>broader framework<\/strong><\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> that <\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>prioritises digital security, innovation, and citizen rights.<\/strong><\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">For instance, the Reserve Bank of India\u2019s data localisation directive has been in place for four years now.<\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type: circle;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">\u00a0An <\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>empirical assessment of how this has impacted both start-ups<\/strong><\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">, big <\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>technology companies, and users could serve as a useful exampl<\/strong><\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">e.<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>\u00a0India\u2019s digital economy stewardship<\/strong><\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> must transcend<\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong> data localisation<\/strong><\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> by highlighting best practices on data protection, competition law, data stewardship, and responsible artificial intelligence both in India and other G20 countries.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">The ongoing effort to redraft the<\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong> Personal Data Protection Bil<\/strong><\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">l and embed it within a \u2018more comprehensive framework\u2019 that<\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong> addresses related concerns<\/strong><\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> like <\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>cybersecurity must serve as an urgent domestic priority<\/strong><\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">, and<\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong> could lend weight to India\u2019s G20 data approach.<\/strong><\/span><\/span><\/span><\/li>\n<\/ul>\n<div>\n<table style=\"border-collapse: collapse; border: none; table-layout: fixed; width: 624px;\" cellspacing=\"0\">\n<tbody>\n<tr>\n<td style=\"background-color: #d9ead3; vertical-align: top; border: 1px solid #000000;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong><u>Mains Practise Question\u00a0<\/u><\/strong><\/span><\/span><\/span><\/p>\n<p><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>[Q]<\/strong><\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> The G20 appears as a viable platform to discuss data, particularly sharing and transfer.Comment\u00a0<\/span><\/span><\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>In News\u00a0 The global politics of data is rapidly evolving as leading and emerging digital economies like the European Union (EU), the U.S,India, Indonesia, and South Africa strive to protect, monetise, and leverage data collected within their territories for domestic purposes.\u00a0 Data localisation It means restricting the flow of data from one country to another. [&hellip;]<\/p>\n","protected":false},"author":15,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[22],"tags":[114,26],"class_list":["post-7448","post","type-post","status-publish","format-standard","hentry","category-editorial-analysis","tag-cyber-crime-security","tag-gs-3"],"acf":[],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/posts\/7448","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/comments?post=7448"}],"version-history":[{"count":0,"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/posts\/7448\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/media?parent=7448"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/categories?post=7448"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/tags?post=7448"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}