<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 41 to 54.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/raw/unpacking-algorithmic-infrastructures"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/medianama-namaprivacy-the-future-of-user-data-delhi-sep-6"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/comparison-of-general-data-protection-regulation-and-data-protection-directive"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/quint-shweta-mohandas-and-pallavi-bedi-june-19-2023-cowin-data-breach-health-sensitive-details-policies-solution"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-fundamental-right-to-privacy-a-visual-guide"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/a-series-of-op-eds-on-data-protection"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/does-the-safe-harbor-program-adequately-address-third-parties-online"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/it-act-and-commerce"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/privacy-policy-framework-for-indian-metal-health-apps"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cis-submission-to-the-committee-of-experts-on-a-data-protection-framework-for-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/submission-to-the-committee-of-experts-on-a-data-protection-framework-for-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/rbi-consultation-paper-on-p2p-lending"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/comments-on-the-rbi-consultation-paper-on-peer-to-peer-lending"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/tpp-and-d2-implications-for-data-protection-and-digital-privacy"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/raw/unpacking-algorithmic-infrastructures">
    <title>Unpacking Algorithmic Infrastructures: Mapping the Data Supply Chain in the Healthcare Industry in India </title>
    <link>https://cis-india.org/raw/unpacking-algorithmic-infrastructures</link>
    <description>
        &lt;b&gt;The Unpacking Algorithmic Infrastructures project, supported by a grant from the Notre Dame-IBM Tech Ethics Lab, aims to study the Al data supply chain infrastructure in healthcare in India, and aims to critically analyse auditing frameworks that are utilised to develop and deploy AI systems in healthcare. It will map the prevalence of Al auditing practices within the sector to arrive at an understanding of frameworks that may be developed to check for ethical considerations - such as algorithmic bias and harm within healthcare systems, especially against marginalised and vulnerable populations. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;There has been an increased interest in health data  in India over the recent years, where health data policies encourage  sharing of data with different entities, at the same time, there has  been a growing interest in deployment of Al in healthcare from startups,  hospitals, as well as multinational technology companies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Given the invisibility of  algorithmic infrastructures that underlie the digital economy and the  important decisions these technologies can make about patients' health,  it's important to look at how these systems are developed, how data  flows within them, how these systems are tested and verified and what  ethical considerations inform their deployment.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/ResearchersWork.png/@@images/00a848c7-b7f7-41b4-8bd9-45f2928fd44e.png" alt="Researchers at Work" class="image-inline" title="Researchers at Work" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;The &lt;/strong&gt;&lt;strong&gt;Unpacking Algorithmic Infrastructures&lt;/strong&gt; project,  supported by a grant from the Notre Dame-IBM Tech Ethics Lab, aims to  study the Al data supply chain infrastructure in healthcare in India,  and aims to critically analyse auditing frameworks that are utilised to  develop and deploy AI systems in healthcare. It will map the prevalence  of Al auditing practices within the sector to arrive at an understanding  of frameworks that may be developed to check for ethical considerations  - such as algorithmic bias and harm within healthcare systems,  especially against marginalised and vulnerable populations.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Research Questions&lt;/h3&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;To what extent organisations take      ethical principles into  account when developing AI , managing the training      and testing  dataset, and while deploying the AI in the healthcare sector.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;What best practices for auditing can be      put in place based on  our critical understanding of AI data supply chains      and auditing  frameworks being employed in the healthcare sector.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;What is a possible auditing framework      that is best suited to organisations in the majority world.&lt;/li&gt;
&lt;/ol&gt;
&lt;h3&gt;Research Design and Methods&lt;/h3&gt;
&lt;p&gt;For this study, we will use a  comprehensive mixed methods approach. We will survey professionals  working towards designing, developing and deploying AI systems for  healthcare in India, across technology and healthcare organizations. We  will also undertake in-depth interviews with experts who are part of key  stakeholder groups.&lt;/p&gt;
&lt;p&gt;We hereby invite researchers,  technologists, healthcare professionals, and others working at the  intersection of Artificial Intelligence and Healthcare to speak to us  and help us inform the study. You may contact Shweta Monhandas at &lt;a href="mailto:shweta@cis-india.org"&gt;shweta@cis-india.org&lt;/a&gt;&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt; 
&lt;hr /&gt;
&lt;p&gt;Research Team: Amrita Sengupta, Chetna V. M.,  Pallavi Bedi, Puthiya Purayil Sneha, Shweta Mohandas and Yatharth.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/unpacking-algorithmic-infrastructures'&gt;https://cis-india.org/raw/unpacking-algorithmic-infrastructures&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Amrita Sengupta, Chetna V. M., Pallavi Bedi, Puthiya Purayil Sneha, Shweta Mohandas and Yatharth</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Health Tech</dc:subject>
    
    
        <dc:subject>RAW Blog</dc:subject>
    
    
        <dc:subject>Research</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Healthcare</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Artificial Intelligence</dc:subject>
    

   <dc:date>2024-01-05T02:38:22Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/medianama-namaprivacy-the-future-of-user-data-delhi-sep-6">
    <title>MediaNama - #NAMAprivacy: The Future of User Data (Delhi, Sep 6)</title>
    <link>https://cis-india.org/internet-governance/news/medianama-namaprivacy-the-future-of-user-data-delhi-sep-6</link>
    <description>
        &lt;b&gt;MediaNama is hosting a full day conference on "the future of user data in India", on the 6th of September 2017, which is particularly significant given the recent Supreme Court ruling on the fundamental right to privacy, and two government consultations: one at the TRAI, and another at MEITY. This discussion is supported by Facebook, Google, and Microsoft. Sumandro Chattapadhyay, Research Director, will participate as a speaker in the session titled "regulating storage, sharing and transfer of data."&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;Details&lt;/h4&gt;
&lt;p&gt;Time: September 6th 2017, 9 am to 4:30 pm&lt;/p&gt;
&lt;p&gt;Venue: Gulmohar Hall, India Habitat Centre, Lodhi Road (please enter from Gate #3)&lt;/p&gt;
&lt;p&gt;Agenda: &lt;a href="https://www.medianama.com/2017/08/223-agenda-namaprivacy-future-of-user-data/"&gt;https://www.medianama.com/2017/08/223-agenda-namaprivacy-future-of-user-data/&lt;/a&gt;&lt;/p&gt;
&lt;h4&gt;Announced Speakers&lt;/h4&gt;
&lt;ul&gt;&lt;li&gt;Chinmayi Arun, Centre for Communication Governance at NLU Delhi&lt;/li&gt;
&lt;li&gt;Malavika Raghavan, IFMR Finance Foundation&lt;/li&gt;
&lt;li&gt;Renuka Sane, NIPFP&lt;/li&gt;
&lt;li&gt;Smitha Krishna Prasad, Centre for Communication Governance at NLU Delhi&lt;/li&gt;
&lt;li&gt;Ananth Padmanabhan, Carnegie India&lt;/li&gt;
&lt;li&gt;Avinash Ramachandra, Amazon&lt;/li&gt;
&lt;li&gt;Hitesh Oberoi, Naukri&lt;/li&gt;
&lt;li&gt;Jochai Ben-Avie, Mozilla&lt;/li&gt;
&lt;li&gt;Mrinal Sinha, Mobikwik&lt;/li&gt;
&lt;li&gt;Murari Sreedharan, Bankbazaar&lt;/li&gt;
&lt;li&gt;Sumandro Chattapadhyay, Centre for Internet and Society&lt;/li&gt;&lt;/ul&gt;
&lt;h4&gt;Facilitators&lt;/h4&gt;
&lt;ul&gt;&lt;li&gt;Saikat Datta, Asia Times Online&lt;/li&gt;
&lt;li&gt;Shashidar KJ, MediaNama&lt;/li&gt;
&lt;li&gt;Nikhil Pahwa, MediaNama&lt;/li&gt;&lt;/ul&gt;
&lt;h4&gt;Attendees&lt;/h4&gt;
&lt;p&gt;We have confirmed 140+ attendees from: Adobe, Amber Health, Amazon, APCO Worldwide, Bank Bazaar, Bloomberg-Quint, Blume Ventures, Broadband India Forum, Business Standard, BuzzFeed News, CCOAI, CEIP, Change Alliance, Chase India, CIS, CNN News18, DEF, Deloitte, DNA, DSCI, E2E Networks, British High Commission, Eurus Network Services, FICCI, Firefly Networks, Flipkart, Forrester Research, Fortumo, DoT, MEITY, IAMAI, IBM, ICRIER, IFMR Finance Foundation, IIMC, Indian Law Institute, Indic Project, Info Edge, ISPAI, IT for Change, ITU-APT, Jamia Millia Islamia, Jindal Global Law School, Mimir Technologies, Mozilla, Newslaundry, NIPFP, Nishith Desai Associates, NIXI, NLU-Delhi, ORF, Paytm, PLR Chambers, PRS Legislative Research, Publicis Groupe, Quartz India, Reliance Jio, Reuters, Saikrishna &amp;amp; Associates, Scroll.in, SFLC.in, Spectranet, The Economics Times, The Indian Express, The Times of India, The Wire, Times Internet, Twitter, and more.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/medianama-namaprivacy-the-future-of-user-data-delhi-sep-6'&gt;https://cis-india.org/internet-governance/news/medianama-namaprivacy-the-future-of-user-data-delhi-sep-6&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Digital Economy</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Data Governance</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Digital Rights</dc:subject>
    

   <dc:date>2017-09-05T10:22:12Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/comparison-of-general-data-protection-regulation-and-data-protection-directive">
    <title>Comparison of General Data Protection Regulation and Data Protection Directive</title>
    <link>https://cis-india.org/internet-governance/blog/comparison-of-general-data-protection-regulation-and-data-protection-directive</link>
    <description>
        &lt;b&gt;Recently, the General Data Protection Regulation (REGULATION (EU) 2016/679) was passed. It shall replace the present Data Protection Directive (DPD 95/46/EC), which is a step that is likely to impact the workings of many organizations. This document intends to offer a clear comparison between the General Data Protection Regulation (GDPR) a the Data Protection Direction (DPD).

&lt;/b&gt;
        &lt;p&gt;Download the &lt;a class="external-link" href="http://cis-india.org/internet-governance/files/comparison-table-gdpr-dpd"&gt;file here&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h1 style="text-align: justify; "&gt;INTRODUCTION&lt;/h1&gt;
&lt;p style="text-align: justify; "&gt;The GDPR i.e. General Data Protection Regulation (REGULATION (EU) 2016/679) 	was adopted on May 27th, 2016. It will come into force after a two-year 	transition period on May 25th, 2018 and will replace the Data Protection 	Directive (DPD 95/46/EC). The Regulation intends to empower data subjects 	in the European Union by giving them control over the processing of their 	personal data. This is not an enabling legislation. Unlike the previous 	regime under the DPD (Data Protection Directive), wherein different member 	States legislated their own data protection laws, the new regulation 	intends uniformity in application with some room for individual member 	states to legislate on procedural mechanisms. While this will ensure a 	predictable environment for doing business, a number of obligations will 	have to be undertaken by organizations, which might initially burden them 	financially and administratively.&lt;/p&gt;
&lt;h1 style="text-align: justify; "&gt;&lt;a name="_s6hlmorxmhjt"&gt;&lt;/a&gt; 2. SUMMARY&lt;/h1&gt;
&lt;p style="text-align: justify; "&gt;The Regulation contains a number of new provisions as well as modified 	provisions that were under DPD and has removed certain requirements under 	the DPD. Some significant changes mentioned in the document have been 	summarized in this section.. These changes suggest that GDPR is a 	comprehensive law with detailed substantive and procedural provisions. Yet, 	some ambiguities remain with respect to its workability and interpretation. 	Clarifications will be required.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a name="_bx6wcm39fme2"&gt;&lt;/a&gt; 2.1 Provisions from the DPD that were retained but altered in the GDPR 	include:&lt;/h2&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_dgj5eiqdp6rg"&gt;&lt;/a&gt; 2.1.1 Scope:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;GDPR has an expanded territorial scope and is applicable under two 	scenarios; 1) when processor or controller is established in the Union, and 	2) when processor or controller is not established in the Union. The 	conditions for applicability of the GDPR under the two are much wider than 	those provided for DPD. Also, the criteria under GDPR are more specific and 	clearer to demonstrate application.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_xkff9yuwpdhu"&gt;&lt;/a&gt; 2.1.2 Definitions:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Six definitions have remained the same while those of personal data and 	consent have been expanded.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_ubv6cbv0v00"&gt;&lt;/a&gt; 2.1.3 Consent:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;GDPR mentions "unambiguous" consent and spells out in detail what 	constitutes a valid consent. Demonstration of valid consent is an important 	obligation of the controller. Further, the GDPR also explains situations in 	which child's consent will be valid. Such provisions are absent in DPD.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_uqvt1qhmvy2p"&gt;&lt;/a&gt; 2.1.4 Special categories of data:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Two new categories, biometric and genetic data have been added under GDPR.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_ap4k8hvlnia"&gt;&lt;/a&gt; 2.1.5 Rights:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The GDPR strengthens certain rights granted under the DPD. These include:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Right to restrict processing: &lt;/b&gt;Under DPD the data 	subject can block processing of data on the grounds of data inaccuracy or 	incomplete nature of data. GDPR, on the other hand , is more elaborate and 	defined in this respect. Many more grounds are listed together with 	consequences of enforcement of this right and obligations on controller.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b. &lt;b&gt;Right to erasure: &lt;/b&gt; This is known as the "right to be 	forgotten". Here, the DPD merely mentions that the data subject has the 	right to request erasure of data on grounds of data inaccuracy or 	incomplete nature of data or in case of unlawful processing. The GDPR has 	strengthened this right by laying out 7 conditions for enforcing this right 	including 5 grounds on which the request for erasure shall not be 	processed. This means that the "right to erasure" is not an absolute right. 	GDPR provides that if data has been made public, controllers are under an 	obligation to inform other controllers processing the data about the 	request.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;c. &lt;b&gt;Right to rectification: &lt;/b&gt;This right is similar under 	GDPR and DPD.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;d. &lt;b&gt;Right to access: &lt;/b&gt;GDPR has broadened the amount of 	information data subject can have regarding his/her own data. For example, 	under the DPD the data subject could know about the purpose of processing, 	categories of processing, recipients or categories to whom data are 	disclosed and extent of automated decision involved. Now under GDPR, the 	data subject can also know about retention period, existence of certain 	rights, about source of data and consequences of processing. It 	specifically states controllers obligations in this regard.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;e.	&lt;b&gt;Automated individual decision making including profiling: &lt;/b&gt; This is an interesting provision that applies solely to automate 	decision-making. This includes profiling, which is a process by which 	personal data is evaluated solely by automated means for the purpose of 	analyzing a person's personal aspect such as performance at work, health, 	location etc. The intent is that data subjects should have the right to 	obtain human intervention into their personal data. This upholds philosophy 	of data safeguard as the subject can get an opportunity to express himself, 	obtain explanation and challenge the decision. Under GDPR, such 	decision-making excludes data concerning a child.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_mirhfotxo6sy"&gt;&lt;/a&gt; 2.1.6 Code of conduct:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;A voluntary self-regulating mechanism has been provided under both GDPR and 	DPD.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_7bkgvf7abyyr"&gt;&lt;/a&gt; 2.1.7 Supervisory Authority:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;As compared to the DPD, the GDPR lays down detailed and elaborate 	provisions on Supervisory Authority.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_khb6zs50ya84"&gt;&lt;/a&gt; 2.1.8 Compensation and Liability:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Although compensation and liability provisions under GDPR and DPD are 	similar, the GDPR specifically mentions this as a right with a wider scope. 	While the Directive enforces liability on the controller only, under the 	GDPR, compensation can be claimed from both, processor and controller.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_bovy1ju2u8iv"&gt;&lt;/a&gt; 2.1.9 Effective judicial remedies:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Provisions in this area are also quite similar between the DPD and GDPR. 	The difference is that GDPR specifically mentions this as a "right" and the 	Directive does not. Use of such words is bound to bring legal clarity. It 	is interesting to note that in the DPD, recourse to remedy has been 	mentioned in the Recitals and it is the national law of individual member 	states, which shall regulate the enforceability. GDPR, on the other hand, 	mentions this under its Articles together with the jurisdiction of courts 	and exceptions to this right.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_xndzim3hdxxa"&gt;&lt;/a&gt; 2.1.10 Right to lodge complaint with supervisory authority:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The right conferred to the data subject to seek remedy under unlawful 	processing has been strengthened under GDPR. Again, as mentioned above, 	GDRP specifically words this as a "right" while the DPD does not.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a name="_68pmqs7h2gvp"&gt;&lt;/a&gt; 2.2 New provisions added to the GDPR include:&lt;/h2&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_pynrk1m03gga"&gt;&lt;/a&gt; 2.2.1 Data Transfer to third countries:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Provisions under Chapter V of GDPR regulate data transfers from EU to third 	countries and international organizations and data transfer onward. DPD 	only provides for data transfer to third countries without reference to 	international organizations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A mechanism called adequacy decisions for such transfers remains the same 	under both laws. However, in situations where Commission does not take 	adequacy decisions, alternate and elaborate provisions on "Effective 	Safeguards" and "Binding Corporate Rules" have been mentioned under the 	GDPR. Other certain situations have been envisaged under both GDPR and DPD 	for data transfers in absence of adequacy decision. These are more or less 	similar with a only few modifications.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Significantly, GDPR brings clarity with respect to enforceability of 	judgments and orders of authorities that are outside of EU over their 	decision on such data transfer. Additionally, it provides for international 	cooperation for protection of personal data. These are not mentioned in the 	DPD.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_ke5mhncq1f0n"&gt;&lt;/a&gt; 2.2.2 Certification mechanism:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Just like code of conduct, this is also a voluntary mechanism, which can 	aid in demonstrating compliance with Regulation.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_f6377ap0044"&gt;&lt;/a&gt; 2.2.3 Records of processing activities:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;This is a mandatory "compliance demonstration" mechanism under GDPR, which 	is not mentioned under DPD. Organizations are likely to face initial 	administrative and financial burdens in order to maintain records of 	processing activities.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_k6sqaxd28am7"&gt;&lt;/a&gt; 2.2.4 Obligations of processor:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;DPD fixes liability on controllers but leaves out processors. GDPR includes 	both. Consequently, GDPR specifies obligations of the processor, the kinds 	of processors the controller can use and what will govern processing.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_ggx4qdqpvwl1"&gt;&lt;/a&gt; 2.2.5 Data Protection officer:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;This finds no mention in the DPD. Under the GDPR, a data protection officer 	must be mandatorily appointed where the core business activity of the 	organization pertains to processing, which requires regular and systematic 	monitoring of data subjects on large scale, processing of large scale 	special categories of data and offences, or processing carried out by 	public authority or public body.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_vmyb0dlytf7z"&gt;&lt;/a&gt; 2.2.6 Data protection impact assessment:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;This is a Privacy Impact assessment for ensuring and demonstrating 	compliance with the Regulation. Such assessment can identify and minimize 	risks. GDPR mandates that such assessment must be carried out when 	processing is likely to result in high risk. The relevant Article mentions 	when to carry out processing, the type of information to be contained in 	assessment and a clause for prior consultation with supervisory authority 	prior to processing if assessment indicates high risk.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_jsw1owqhhya3"&gt;&lt;/a&gt; 2.2.7 Data Breach:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Under this provision, the controller is responsible for two things: 1) 	reporting personal data breach to supervisory authority no later than 72 	hours . Any delay in notifying the authority has to be accompanied by 	reasons for delay; and 2) communicating the breach to the data subject in 	case the breach is likely to cause high risk to right and freedoms of the 	person. As far as the processor is concerned, in the event of data breach, 	the processor must notify the controller. This provision is likely to push 	some major changes in the workings of various organizations. A number of 	detection and reporting mechanisms will have to be implemented. Above all, 	these mechanisms will have to be extremely efficient given the time limit.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_ccc1t8kwx628"&gt;&lt;/a&gt; 2.2.8 Data Protection by design and default:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;This entails a general obligation upon the controller to incorporate 	effective data protection in internal policies and implementation measures.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_w5imfuxpb2ys"&gt;&lt;/a&gt; 2.2.9 Rights:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Under the GDPR, a new right called the " Right to data portability " has 	been conferred upon the data subjects. This right empowers the data subject 	to receive personal data from one controller and transfer it to another.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_u0fpe4c3oxoo"&gt;&lt;/a&gt; 2.2.10 New Definitions:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Out of 26 definitions, 18 new definitions have been added. 	"Pseudonymisation" is one such new concept that can aid data privacy. This 	data processing technique encourages processing in a way that personal data 	can no longer be attributed to a specific data subject without using 	additional information. This additional information is to be stored 	separately in a way that it is not attributed to an identified or 	identifiable natural person.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_lh2v66dwa6g5"&gt;&lt;/a&gt; 2.2.11 Administrative fines:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Perhaps much concern about GDPR is due to provisions on high fines for 	non-compliance of certain provisions. Organizations simply cannot afford to 	ignore it. Non-compliance can lead to imposition of very heavy fines up to 	20,000,000 EUR or 4% of total worldwide turnover.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a name="_ad4hk9ac5g76"&gt;&lt;/a&gt; 2.3 Deleted provisions under DPD include :&lt;/h2&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_f7qp3wle6y52"&gt;&lt;/a&gt; 2.3.1 Working Party:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Working party under the DPD has been replaced by the European Data 	Protection Board provided by the GDPR. The purpose of the Board is to 	ensure consistent application of the Regulation.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_79qx7y3yed1o"&gt;&lt;/a&gt; 2.3.2 Notification Requirement:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The general obligation to notify processing supervisory authorities has 	been removed. It was observed that this requirement imposed unnecessary 	financial and administrative burden on organizations and was not successful 	in achieving the real purpose that is protection of personal data. Instead, 	now the GDPR focuses on procedures and mechanisms like Privacy Impact 	assessment to ensure compliance.&lt;/p&gt;
&lt;h1 style="text-align: justify; "&gt;&lt;a name="_mpysf7lokshn"&gt;&lt;/a&gt; 3. BRIEF OVERVIEW&lt;/h1&gt;
&lt;p style="text-align: justify; "&gt;The GDPR is the new uniform law, which will now replace older laws. A brief 	overview has been given below:&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Topic&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;GDPR&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;(General Data Protection Regulation)&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;DPD &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;(Data Protection Directive)&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Name&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;REGULATION (EU) 2016/679&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;DPD 95/46/EC&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Enforcement&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Adopted on 27 May 2016&lt;/p&gt;
&lt;p&gt;To be enforced on 25 May 2018&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Adopted on 24 October 1995&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Effect of legislation&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;It is a Regulation.&lt;/p&gt;
&lt;p&gt;Is directly applicable to all EU member states without 					requiring a separate national legislation.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;It is an enabling legislation.&lt;/p&gt;
&lt;p&gt;Countries have to pass their own separate legislations.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Objective&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;To protect "natural persons" with regard to processing of 					personal data and on free movement of such data.&lt;/p&gt;
&lt;p&gt;It repeals DPD 95/46/EC.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;To protect "individuals" with regard to processing of 					personal data and on free movement of such data.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p style="text-align: left; "&gt;Number of Chapters&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;XI&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;VII&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p style="text-align: left; "&gt;Number of Articles&lt;a name="_3znysh7"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;99&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;34&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p style="text-align: left; "&gt;Number of Recitals&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;173&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;72&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Applicability&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;To processors and controllers&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Same&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h1 style="text-align: justify; "&gt;&lt;a name="_rpg4m5a4zaod"&gt;&lt;/a&gt; 4. COMPARATIVE ANALYSIS OF GDPR AND DPD&lt;/h1&gt;
&lt;p style="text-align: justify; "&gt;This section offers a comparative analysis through a set of tables and text 	analysing and comparing the provisions of General Data Protection 	Regulation (GDPR) with those of the Data Protection Direction (DPD). Spaces 	left blank in the tables imply lack of similar provisions under the 	respective data regime.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a name="_2et92p0"&gt;&lt;/a&gt; 4.1 Territorial Scope&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;GDPR has expanded territorial scope. The application of Regulation is 	independent of the place where processing of personal data takes places 	under certain conditions. The focus is the data subject and not the 	location. The DPD made application of national law, a criterion for 	determining the applicability of the Directive. Under the GDPR, the 	following conditions need to be satisfied for application of Regulation.&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Sub-topics in the section&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;GDPR&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;DPD&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Given in Article&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;3&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;4&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;When processor or controller is established in the Union, 					the Regulation/ Directive will apply if:&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(DPD is silent on location of processors&lt;/i&gt; )&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;1. Processing is of personal data&lt;/p&gt;
&lt;p&gt;2. Processing is in "context of activities" of the 					establishment&lt;/p&gt;
&lt;p&gt;3. Processing may or may not take place in the Union&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Processing is of personal data.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;When processor or controller is not established in Union, 					the Regulation/Directive will apply if:&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(DPD is silent on location of processors&lt;/i&gt; )&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;1. Data subjects are in the Union; and&lt;/p&gt;
&lt;p&gt;2. Processing activity is related to:&lt;/p&gt;
&lt;p&gt;I. Offering of goods or services; or&lt;/p&gt;
&lt;p&gt;II. Monitoring their behavior within Union&lt;/p&gt;
&lt;p&gt;3. Will apply when Member State law is applicable to that 					place by the virtue of public international law&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;1. Like GDPR the DPD mentions that national law should be 					applicable to that place by virtue of public international 					law;&lt;/p&gt;
&lt;p&gt;Or&lt;/p&gt;
&lt;p&gt;2. If the equipment for processing is situated on Member 					state territory unless it is used only for purpose of 					transit.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a name="_tyjcwt"&gt;&lt;/a&gt; 4.2 Material Scope&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The Recital under GDPR explains that data protection is not an absolute 	right. Principle of proportionality has been adopted to respect other 	fundamental rights.&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p style="text-align: left; "&gt;Sub-topics in the section&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;GDPR&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;DPD&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Given in Article&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;3&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Applies to&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Processing of personal data&lt;/p&gt;
&lt;p&gt;Processing is by automated means, wholly or partially&lt;/p&gt;
&lt;p&gt;When processing is not by automated means, the personal 					data should form or are intended to form a part of filing 					system&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Same&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Does not apply to&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Processing of personal data:&lt;/p&gt;
&lt;p&gt;1. For activities which lie outside scope of Union law&lt;/p&gt;
&lt;p&gt;2. By Member State under Chapter 2 Title V of TEU&lt;/p&gt;
&lt;p&gt;3. By natural person in course of purely personal or 					household activity&lt;/p&gt;
&lt;p&gt;4. By competent authorities in relation to criminal 					offences and penalties and threats to public security&lt;/p&gt;
&lt;p&gt;5. Under Regulation (EC) No 45/2001. This needs to be 					adapted for consistency with GDPR&lt;/p&gt;
&lt;p&gt;6. Which should not prejudice the E commerce Directive 					2000/31/EC especially the liability rules of intermediary 					service providers&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;The provisions in DPD are similar to GDPR.&lt;/p&gt;
&lt;p&gt;In addition to Title V, the DPD did not apply to Title VI 					of TEU.&lt;/p&gt;
&lt;p&gt;DPD doesn't mention Regulation (EC) No 45/2001 or the E 					commerce Directive 2000/31/EC.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a name="_3dy6vkm"&gt;&lt;/a&gt; 4.3 Definitions&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;GDPR incorporates 26 definitions as compared to 8 definitions under DPD. 	There are 18 new definitions in GDPR. Some definitions have been expanded.&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Sub-topics in the section&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;GDPR&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;DPD&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Given in Article&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;4&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;New Definitions under GDPR&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;1. Restriction of processing&lt;/p&gt;
&lt;p&gt;2. Profiling&lt;/p&gt;
&lt;p&gt;3. Pseudonymisation&lt;/p&gt;
&lt;p&gt;4. Personal data breach&lt;/p&gt;
&lt;p&gt;5. Genetic data&lt;/p&gt;
&lt;p&gt;6. Biometric data&lt;/p&gt;
&lt;p&gt;7. Data concerning health&lt;/p&gt;
&lt;p&gt;8. Main establishment&lt;/p&gt;
&lt;p&gt;9. Representative&lt;/p&gt;
&lt;p&gt;10. Enterprise&lt;/p&gt;
&lt;p&gt;11. Group of undertakings&lt;/p&gt;
&lt;p&gt;12. Binding corporate rules&lt;/p&gt;
&lt;p&gt;13. Supervisory authority&lt;/p&gt;
&lt;p&gt;14. Supervisory authority concerned&lt;/p&gt;
&lt;p&gt;15. Cross border processing&lt;/p&gt;
&lt;p&gt;16. Relevant and reasoned objection&lt;/p&gt;
&lt;p&gt;17. Information society service&lt;/p&gt;
&lt;p&gt;18. International organizations&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;2 definitions that have been expanded under GDPR&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;1. Personal data&lt;/p&gt;
&lt;p&gt;2. Consent&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;6 Definitions which have remained same in GDPR and DPD&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;1. Processing of personal data&lt;/p&gt;
&lt;p&gt;2. Personal data filing system&lt;/p&gt;
&lt;p&gt;3. Controller&lt;/p&gt;
&lt;p&gt;4. Processor&lt;/p&gt;
&lt;p&gt;5. Third party recipient&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_1t3h5sf"&gt;&lt;/a&gt; 4.3.1 Expanded definition of personal data&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Both DPD and GDPR apply to 'personal data'. The GDPR gives an expanded 	definition of 'personal data'. Recital 30 gives example of an online 	identifier such as IP addresses.&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Sub-topics in the section&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;GDPR&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;DPD&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Given in Article&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;4(1)&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2(a)&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;New term added in the definition&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;A new term " online identifier" has been added.&lt;/p&gt;
&lt;p&gt;Example of online identifier is given under Recital 30. An 					IP address is one such example.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_tk0fv08fd3b8"&gt;&lt;/a&gt;&lt;/h3&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_4d34og8"&gt;&lt;/a&gt; 4.3.2 Expanded definition of consent&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Valid consent must be given by the data subject. The definition of valid 	consent has been added under GDPR.&lt;b&gt; &lt;/b&gt;Recital 32 further 	explains that consent can be given by "means of a written statement 	including electronic means or an oral statement". For example, ticking a 	box on websites signifies acceptance of processing while "pre ticked boxes, 	silence or inactivity" do not constitute consent.&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Sub-topics in the section&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;GDPR&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;DPD&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Given in Article&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;4(11)&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2(h)&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Term added in GDPR&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Consent must be unambiguous, freely given, specific and 					informed.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;The word "unambiguous" is not contained in DPD.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Means of signifying assent to processing own data&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Assent can be given by a					&lt;i&gt;statement or by clear affirmative action&lt;/i&gt; signifying assent to processing.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;DPD merely mentions that					&lt;i&gt;freely given, specific and informed consent &lt;/i&gt; signifies assent.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a name="_2s8eyo1"&gt;&lt;/a&gt; 4.4 Conditions for consent&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;GDPR lays down detailed provisions for valid consent. Such provisions are 	not given in DPD.&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Sub-topics in the section&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;GDPR&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;DPD&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Article&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;7&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Obligation of controller&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Must demonstrate consent has been given&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Presentation of written declaration of consent&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;It should be in a clearly distinguishable, intelligible and 					easily accessible form.&lt;/p&gt;
&lt;p&gt;Language should be clear and plain.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;If declaration or any part of it infringes on Regulation&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Declaration will be non-binding.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="2"&gt;
&lt;p&gt;Right of data subject&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;To withdraw consent at any time.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;If consent is withdrawn, it will not make processing done 					earlier unlawful.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;For assessing whether consent is freely given&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Must consider whether performance of contract or provision 					of service is made conditional on consent to processing of 					data not necessary for performance of contract.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a name="_17dp8vu"&gt;&lt;/a&gt; 4.5 Conditions applicable to child's consent in relation to information 	society services&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;This article prescribes an age limit for making processing lawful when 	information society services (direct online service) are offered directly 	to a child.&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Sub Topics in the Section&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;GDPR&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;DPD&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Given in Article&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;8&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Conditions for valid consent in this case&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;If child is at least 16 years old his consent is valid.&lt;/p&gt;
&lt;p&gt;If child is below 16 years consent must be obtained from 					holder of parental responsibility over the child.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Age relaxation can be given when&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Member States provides a law lowering the age.&lt;/p&gt;
&lt;p&gt;Age cannot be lowered below 13 years.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Controller's responsibility&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Verify who has given the consent&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Exceptions&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;This law will not affect:&lt;/p&gt;
&lt;p&gt;General contract law of member states;&lt;/p&gt;
&lt;p&gt;Effect of contract law on a child;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a name="_3rdcrjn"&gt;&lt;/a&gt; 4.6 Processing of special categories of personal data&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Like the DPD, the GDPR spells out the data that is considered sensitive and 	the conditions under which this data can be processed. Two new categories 	of special data, "genetic data" and "biometric data", have been added to 	the list in the GDPR.&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Sub Topics in the Section&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;GDPR&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;DPD&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Article&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;9&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;8&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="6"&gt;
&lt;p&gt;Categories of data considered sensitive&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Racial or ethnic origin&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Same&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Political opinions&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Same&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Religious or philosophical beliefs&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Same&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Trade union membership&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Same&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Health or sex life or sexual orientation&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Same&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Genetic data or&lt;/p&gt;
&lt;p&gt;Biometric data uniquely identifying natural person&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="9"&gt;
&lt;p&gt;Circumstances in which processing of personal data may take 					place&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;If there is explicit consent of data subject provided 					Member State laws do not prohibit such processing&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Necessary for carrying out specific rights of controller or 					data subject&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Under DPD these rights can be for employment.&lt;/p&gt;
&lt;p&gt;The GDPR adds social security and social protection to this 					list.&lt;/p&gt;
&lt;p&gt;These rights are to be authorized by Member state or Union. 					The GDPR adds "Collective agreements" to this.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;In the vital interest of data subject who cannot give 					consent due to physical or legal causes.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Same&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;In the vital interest of a Natural person physically or 					legally incapable of giving consent&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Same&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;For legitimate activities carried on by not-for 					profit-bodies for political, philosophical or trade union 					aims subject to certain conditions.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Same&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;When personal data is made public by data subject&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Same&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;For establishment, exercise of defense of legal claims or 					for courts&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Same&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;For substantial public interest in accordance with Member 					State or Union law&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Is necessary for:&lt;/p&gt;
&lt;p&gt;Preventive or occupational medicine&lt;/p&gt;
&lt;p&gt;Assessing working capacity of employee&lt;/p&gt;
&lt;p&gt;Medical diagnosis&lt;/p&gt;
&lt;p&gt;Healthcare or social care services&lt;/p&gt;
&lt;p&gt;Contract with health professional&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Is necessary in Public interest in the area of public 					health&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;For public interest, scientific or historical research or 					statistical purpose&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Data for preventive or occupational medicine, medical 					diagnosis etc. can be processed when:&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Data is processed by or under responsibility of a 					professional under obligation of professional secrecy as 					state in law&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Here the processing is done by health professional under 					obligation of professional secrecy&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a name="_26in1rg"&gt;&lt;/a&gt; 4.7 Principles relating to processing of personal data&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The principles set out in GDPR are similar to the ones under DPD. Some 	changes have been introduced. Accountability of the controller has been 	specifically given under GDPR.&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Sub-topics in this section&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;GDPR&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;DPD&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Given in Article&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;5&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;6&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p style="text-align: left; "&gt;Lawfulness, fairness, transparency&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Processing must be Lawful, fair and transparent&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Does not mention transparent&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="2"&gt;
&lt;p&gt;Purpose limitation&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Data must be specified, explicit and legitimate.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Same&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Processing for achieving public interest, scientific or 					historical research or statistical purpose is not to be 					considered incompatible with initial purpose.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Same&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Data minimization&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Processing is adequate, relevant and limited to what is 					necessary&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Same&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Accuracy&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Data is accurate, up to date, erased or rectified without 					delay&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Same&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="3"&gt;
&lt;p&gt;Storage limitation&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Data is to be stored in a way that data subject can be 					identified for no longer than is necessary for purpose of 					processing&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Same&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Data can be stored for longer periods when it is processed 					solely in public interest, scientific or historical 					research or statistical purpose&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Same&lt;/p&gt;
&lt;p&gt;However, public interest is not mentioned.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;There must be appropriate technical and organizational 					measures to safeguard rights and freedoms&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Same&lt;/p&gt;
&lt;p&gt;Additionally, it specifically states that Member States 					must lay down appropriate safeguards&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Integrity and confidentiality&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Manner of processing must:&lt;/p&gt;
&lt;p&gt;Ensure security of personal data,&lt;/p&gt;
&lt;p&gt;Protection against unlawful processing and accidental loss, 					destruction or damage&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Not mentioned&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Accountability&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Controller is responsible for and must demonstrate 					compliance with all of the above.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;DPD states it is for the controller to ensure compliance 					with this Article.&lt;/p&gt;
&lt;p&gt;Unlike GDPR, DPD doesn't specifically state the 					responsibility of controller for demonstrating compliance.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a name="_bezw6fia4pw1"&gt;&lt;/a&gt; 4.8 Lawfulness of processing&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The conditions for "lawfulness of processing" under DPD have been retained 	in the GDPR with certain modifications allowing flexibility for member 	states to introduce specific provisions in public interest or under a legal 	obligation. It should be noted that protection given to child's data and 	rights and freedoms of data subject should not be prejudiced. Additionally, 	a non-exhaustive list has been laid down in the GDPR for determining if 	processing is permissible in situations where the new purpose of processing 	is different from original purpose.&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Sub Topics in the Section&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;GDPR&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;DPD&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Given in Article&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;6&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;7&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Processing is lawful when :&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;If at least one of the principles applies:&lt;/p&gt;
&lt;p&gt;Data subject has given consent to processing for specific 					purpose(s).&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Same&lt;/p&gt;
&lt;p&gt;However it mentions "unambiguous" consent.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Processing is necessary for performance of contract to 					which data subject is party or at request of data subject 					before entering into a contract&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Same&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Processing is necessary for controller's compliance with 					legal obligation.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Same&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Is necessary for legitimate interests pursued by controller 					or by third party subject to exceptions (should not 					override rights and freedoms of data subject and 					protections given to child's data.)&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Same&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;It is necessary for performance of task carried out in 					public interest or for exercise of official authority 					vested in controller&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Same&lt;/p&gt;
&lt;p&gt;It additionally mentions third party:&lt;/p&gt;
&lt;p&gt;"…exercise of official authority vested in controller					&lt;i&gt;or in a third party to whom data are disclosed"&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;For protections of vital interest of data subject or 					another natural person&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Same&lt;/p&gt;
&lt;p&gt;Does not mention natural person.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Member States may introduce specific provisions when:&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;When processing is necessary for compliance with a legal 					obligation or to protect public interest&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Basis for processing for shall be laid down by: Union law 					or Member State law&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td colspan="3"&gt;
&lt;p&gt;&lt;b&gt; If processing is done for purpose other than for which 						data is collected and is without data subject's consent 						or is not collected under law: &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="6"&gt;
&lt;p&gt;To determine if processing for another purpose is 					compatible with the original purpose&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Controller shall take into account following factors:&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Link between purposes for which data was collected and the 					other purpose&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Context in which personal data have been collected&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Nature of personal data&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Possible consequences of other purpose&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Existence of appropriate safeguards&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a name="_2ke3ydyw8r1i"&gt;&lt;/a&gt; 4.9 Processing which does not require identification:&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;This article lays down the conditions under which the controller is 	exempted from gathering additional data in order to identify a data subject 	for the purpose of complying with this Regulation. If the controller is 	able to demonstrate that identification is not possible, the data subject 	is to be informed if possible.&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Sub Topics in the Section&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;GDPR&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;DPD&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Given in Article&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;11&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Conditions under which the controller is not obliged to 					maintain process or acquire additional information to 					identify data subject&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;If purpose for processing doesn't not require 					identification of data subject by the controller&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Consequence of not maintaining the data&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Art 15 to 20 shall not apply provided controller is able to 					demonstrate its inability to identify the data subject&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Exception to above consequence will apply when :&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Data subject provides additional information enabling 					identification&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a name="_35nkun2"&gt;&lt;/a&gt; 4.10 Rights of the data subject&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The General Data Protection Rules (GDPR) confers 8 rights upon the data 	subject.These rights are to be honored by the controller:-&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1. Right to be informed&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2. Right of access&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3. Right to rectification&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;4. Right to erasure&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;5. Right to restrict processing&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;6. Right to data portability&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;7. Right to object&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;8. Rights in relation to automated decision making and profiling&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_4ln2v6w83qoy"&gt;&lt;/a&gt; 4.10.1 Right to be informed&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The controller must provide information to the data subject in cases where 	personal data has not been obtained from the data subject. A number of 	exemptions have been listed. Additionally, GDPR lays down the time period 	within which the information has to be provided.&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Sub Topics in the Section&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;GDPR&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;DPD&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Given in Article&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;14&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;10&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="5"&gt;
&lt;p align="left"&gt;Type of information to be provided&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="left"&gt;Identity and contact details of the controller or 					controller's representative&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="left"&gt;Same&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Contact details of the data protection officer&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Purpose and legal basis for processing&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="left"&gt;Purpose of processing&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Recipients or categories of recipients of personal data&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="left"&gt;Same&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Intention to transfer data to third country or 					international organization and Information regarding 					adequacy decision or suitable safeguards or Binding 					Corporate Rules or derogations. This includes means to 					obtain a copy of these as well as information on place of 					availability.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="4"&gt;
&lt;p align="left"&gt;Additional information to be provided by controller to 					ensure fair and transparent processing&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="left"&gt;Storage period of personal data and criteria for 					determining the period&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Legitimate interests pursued by controller or third party&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Existence of data subject's rights with regard to access or 					rectification or erasure of personal data, automated 					decision making&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Where applicable, existence of right to withdraw consent&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="4"&gt;
&lt;p align="left"&gt;Time period within which information is to be provided&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="left"&gt;Information to be given within a reasonable period, latest 					within one month.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;To be provided latest at the time of first communication to 					data subject, if personal data are to be used for 					communication with data subject&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;In case of intended disclosure to another recipient , at 					the latest when personal data are first disclosed.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;If processing is intended for a new purpose other than 					original purpose, information to be provided prior to 					processing on new purpose.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="4"&gt;
&lt;p align="left"&gt;Situations in which exceptions are applicable&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="left"&gt;Data subject already has information&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="left"&gt;Same&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Provision of information involves disproportionate effort 					or is impossible or renders impossible or seriously impairs 					achievement of objective of processing.&lt;/p&gt;
&lt;p align="left"&gt;This is particularly with respect to processing for 					archiving purposes in public interest, scientific or 					historical research or statistical purpose.&lt;/p&gt;
&lt;p align="left"&gt;However controller must take measures to protect data 					subject's rights and freedom and legitimate interests 					including make information public.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="left"&gt;Provision involves impossible or disproportionate effort, 					in particular where processing is for historical or 					scientific research.&lt;/p&gt;
&lt;p align="left"&gt;However, appropriate safeguards must be provided by Member 					States.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Obtaining or disclosure is mandatory under Union or member 					law and it provides protection to data subject's legitimate 					interests&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="left"&gt;Where law expressly lays down recording or disclosure 					provided appropriate safeguards are provided by Member 					States.&lt;/p&gt;
&lt;p align="left"&gt;This is particularly applicable to processing for 					scientific or historical research.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Confidentiality of data mandated by professional secrecy 					under Union or Member State law&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_unesl7gv52zg"&gt;&lt;/a&gt; 4.10.2 Right to access&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Both Data Protection Directive (DPD) and General Data Protection Rules 	(GDPR) confer right to access information regarding personal data on the 	data subject.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CJEU in YS V. Minister voor Immigrate Integratie en Asiel stated that it is 	the data subject's right "to be aware of and verify the lawfulness of the 	processing".&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Sub-topics in the section&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;GDPR &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;DPD&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Given in Article&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;15&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;12&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="9"&gt;
&lt;p&gt;Data subject has the right to know about:&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Purpose of processing&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Same&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Categories of processing the data&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Same&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Recipients or categories to whom data are disclosed&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Same&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Retention period of the data and criteria for this&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Existence of right to request erasure, rectification or 					restriction of processing&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Right to lodge complaint with supervisory authority&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Knowledge about source of data&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;To know about any significant and envisaged consequences of 					processing for the data subject&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Existence of automated decision making and logic involved&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Same&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;In case of data transfer to third country&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Right to be informed about the safeguards&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Controller's obligation&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;To provide a copy of data undergoing processing. Reasonable 					fee based on administrative costs can be charged for this.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_d0woi8tt0i24"&gt;&lt;/a&gt; 4.10.3 Right to rectification&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;GDPR and DPD both give the data subject the right to rectify their personal 	data. Under the GDPR the data subject can complete the incomplete data by 	giving a supplementary statement.&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Sub-topics in the section&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;GDPR&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;DPD&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Given in Article&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;16&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;12(b)&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="2"&gt;
&lt;p&gt;Right can be exercised when:&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Processing does not comply with the Directive i.e. damage 					is caused due to unlawful processing (Recital 55)&lt;/p&gt;
&lt;p&gt;OR&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;When data is incomplete&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;When data is incomplete or inaccurate&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Obligations of controller&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;To enforce the right without undue delay&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="2"&gt;
&lt;p&gt;Obligation of controller to give notification when data is 					disclosed to third party&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Given under Art 19&lt;/p&gt;
&lt;p&gt;Request of erasure of personal data to be communicated to 					each recipient of such data&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Given under Article 12(c)&lt;/p&gt;
&lt;p&gt;Request must be communicated to third parties&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;It should not involve an impossible or disproportionate 					effort&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Same&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_2jxsxqh"&gt;&lt;/a&gt; 4.10.4 Right to erasure&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;This is also referred to as the "right to be forgotten". It empowers the 	individual to erase personal data under certain circumstances. The data 	subject can request the controller to remove the data for attaining this 	purpose.&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Sub-topics in the section&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;GDPR&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;DPD&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Given in Article&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;17&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;12(b)&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Obligation of the controller&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;To erase the data without undue delay&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="8"&gt;
&lt;p&gt;Conditions under which the right can be exercised&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;When processing does not comply with the Directive i.e. 					damage is caused due to unlawful processing (Recital 55)&lt;/p&gt;
&lt;p&gt;OR&lt;/p&gt;
&lt;p&gt;When data is incomplete or inaccurate&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Personal data is no longer necessary for the purpose for 					which it was collected or processed&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Data Subject withdraws consent for processing&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Data subject objects to processing and there are no 					overriding legitimate grounds for processing&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Data subject objects to processing for direct marketing 					purpose&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Personal data has been unlawfully processed&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;When personal data has to be erased under a legal 					obligation of Union or member State law&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;When personal data has been collected in offer of 					information society services to a child&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="5"&gt;
&lt;p&gt;Condition of processing under which request to erasure 					shall not be granted&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;For exercising right of freedom of expression and 					information&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Processing is done under Union or Member State law in 					public interest or exercise of official authority vested in 					controller&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Done for public interest in public health&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;For public interest, scientific or historical research or 					statistical purpose.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;For establishment, exercise or defense of legal claims.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Controller's obligations when personal data has been made 					public&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Controller to take reasonable steps to inform controllers 					who are processing the data, of the request of erasure.&lt;/p&gt;
&lt;p&gt;All links, copy or replication of personal data to be 					erased.&lt;/p&gt;
&lt;p&gt;Technology available and cost of implementation to be taken 					into account.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="2"&gt;
&lt;p&gt;Notification when data is disclosed to third party&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Given under obligation of controller under Art 19:&lt;/p&gt;
&lt;p&gt;Request of erasure of personal data to be communicated to 					each recipient of such data&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Given under obligation of controller under 12(c) :&lt;/p&gt;
&lt;p&gt;Request must be communicated to third parties&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;It should not involve an impossible or disproportionate 					effort&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Same&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_z337ya"&gt;&lt;/a&gt; 4.10.5 Right to restrict processing&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;While DPD provided for "blocking", the GDPR strengthened this right by 	specifically conferring the " Right to Restrict Processing" upon the data 	subject. This Article gives data subject the right to restrict processing 	under certain conditions. Recital 67 explains that these methods could 	include steps like removing published data from website or temporarily 	moving the data to another processing system.&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Sub-topics in the section&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;GDPR&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;DPD&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Given in Article&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;18&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;12(b)&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;About this right&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Data subject can restrict processing of data&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Data subject is allowed to erase, rectify or block 					processing of personal data.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="4"&gt;
&lt;p&gt;Conditions under which the right can be exercised&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;When accuracy of personal data is contested&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Besides accuracy, the DPD also mentions "incomplete nature 					of data" as grounds for exercising this right.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;When processing is unlawful and data subject opposes 					erasure and requests restriction of data use&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;When data is no longer needed by controller but is required 					by data subject for establishment, exercise or defense of 					legal claims.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Data subject objects to processing and the verification by 					controller of compelling legitimate grounds for processing 					is ongoing&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="5"&gt;
&lt;p&gt;Consequences of this enforcement of this right&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Controller can store data but not process it&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Processing can be done only with the data subject's 					consent; or&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Processing can be done for establishment exercise or 					defense of legal claims; or&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Processing can be done for protecting rights of another 					natural or legal person ;or&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;It can be done in public interest of Union or Member State.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Obligations of controller under Art 18&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;The controller must inform the data subject before the 					restrictions are lifted.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="3"&gt;
&lt;p&gt;Obligations of controller under Art 19&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Inform each recipient of personal data about the 					restriction.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;This obligation need not be performed if it is impossible 					to do so or it involved disproportionate effort.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Inform data subject about the recipients when requested by 					the data subject.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_spxapzomj6tn"&gt;&lt;/a&gt; 4.10.6 Right to data portability&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;This right empowers the data subject to receive personal data from one 	controller and transfer it to another. This gives the data subject more 	control over his or her own data. The controller cannot hinder this right 	when the following conditions are met.&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Sub-topics in the section&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;GDPR&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;DPD&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Given in article&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;20&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="3"&gt;
&lt;p&gt;Conditions for data transmission&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;The data must have been provided to the controller by data 					subject himself; and&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Processing is based on:&lt;/p&gt;
&lt;p&gt;Consent; or&lt;/p&gt;
&lt;p&gt;For performance of contract; and is carried out by 					automated means&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Data transfer must be technically feasible&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Format of personal data&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;It should be in a:&lt;/p&gt;
&lt;p&gt;Structured&lt;/p&gt;
&lt;p&gt;Commonly-used&lt;/p&gt;
&lt;p&gt;Machine readable format&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Time and cost for data transfer&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Given in Art 12(3)&lt;/p&gt;
&lt;p&gt;Should be free of charge&lt;/p&gt;
&lt;p&gt;Information to be provided within one month. Further 					extension by two months permissible under certain 					circumstances.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="4"&gt;
&lt;p&gt;Circumstance under which this Right cannot be exercised&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;When the exercise of the Right prejudices rights and 					freedom of another individual&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;When processing is necessarily carried out in public 					interest&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;When processing is necessarily done in exercise of official 					authority vested in controller&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;When this Right adversely affects the "Right to be 					forgotten"&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_ksj4krgmokmt"&gt;&lt;/a&gt; 4.10.7 Right to Object&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Both DPD and GDPR confer upon the data subject the right to object to 	processing on a number of grounds. The GDPR strengthens this right . Under 	GDPR, there is a visible shift from the data subject to the controller as 	far as the burden of showing " compelling legitimate grounds" is concerned. 	Under the DPD, when processing is undertaken in public interest or in 	exercise of official authority or in legitimate interests of third party or 	controller, the data subject not only has to show existence of compelling 	legitimate grounds but also that objection is justified. On the other hand, 	GDPR spares the data subject from this exercise and instead places the onus 	on the controller of demonstrating that "compelling legitimate grounds" 	exist such that these grounds override the interests, rights and freedom of 	the data subject.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;GDPR also provides a new ground for objecting to processing. The data 	subject can object to processing when it is for scientific or historical 	research or statistical purpose unless such processing is necessary in 	public interest.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Under the GDPR the data subject must be informed of this right "clearly and 	separately" and "at the time of first communication with data subject" when 	processing is done in public interest/exercise of official 	authority/legitimate interest of third party or controller or for direct 	marketing purpose. This right can be exercised by automated means in case 	of information society service.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The DPD also provides that the data subject must be informed of this right 	if the controller anticipates processing for direct marketing or disclosure 	of data to third party. It specifically states that this right is to be 	offered "free of charge". Additionally, it places responsibility upon the 	Member States to ensure that data subjects are aware of this right.&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center"&gt;Sub-topics in the section&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;&lt;b&gt;GDPR&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;&lt;b&gt;DPD&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Given in Article&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="left"&gt;21&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="left"&gt;14&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="4"&gt;
&lt;p align="left"&gt;Conditions under which the right can be exercised during 					processing&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="left"&gt;When performance of task is carried out in public interest 					or in exercise of official authority vested in controller. 					(Art 6(1)(e))&lt;/p&gt;
&lt;p align="left"&gt;Exception:&lt;/p&gt;
&lt;p&gt;If controller demonstrates processing is for compelling 					legitimate grounds which override interests of data subject&lt;/p&gt;
&lt;p align="left"&gt;For establishment, exercise or defense of legal claims.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="left"&gt;Grounds are same but the data subject also has to show 					existence of compelling legitimate grounds. Processing will 					cease if objection is justified.&lt;/p&gt;
&lt;p align="left"&gt;Exceptions:&lt;/p&gt;
&lt;p align="left"&gt;Unless provided by national legislation the data subject 					can object on this ground.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;For legitimate interests of controller or third party (Art 					6(1)(f))&lt;/p&gt;
&lt;p align="left"&gt;Exception:&lt;/p&gt;
&lt;p&gt;1. If controller demonstrates processing is for compelling 					legitimate grounds that override interests of data subject.&lt;/p&gt;
&lt;p&gt;2. For establishment, exercise or defense of legal claims.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Same as above&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;When data is processed for scientific/historical research/ 					statistical purpose under Art 89(1)&lt;/p&gt;
&lt;p align="left"&gt;Exception:&lt;/p&gt;
&lt;p align="left"&gt;If processing is necessary for public interest&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;When personal data is used for marketing purpose.&lt;/p&gt;
&lt;p align="left"&gt;Can object at anytime.&lt;/p&gt;
&lt;p align="left"&gt;No exceptions&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Same&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_1y810tw"&gt;&lt;/a&gt; 4.10.8 Rights in relation to automated individual decision making including 	profiling&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;This Article empowers the data subject to challenge automated decisions 	under certain conditions. This is to protect individuals from decisions 	taken without human intervention.&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Sub-topics in the section&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;GDPR &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;DPD&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Given in Article&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;22&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;15&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;This right can be exercised when decisions are based:&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="2"&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Only on automated processing&lt;/p&gt;
&lt;p&gt;Including profiling; and&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Same&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Produce legal effects or have similarly significant effects 					on data subject&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Same&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Conditions under which this right will not be guaranteed&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="3"&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;For entering into or performance of contract;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Same&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;If Member State or Union law authorizes the decision 					provided it lays down suitable measures for safeguarding 					data subject's rights, freedoms and legitimate interests; 					Or&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Same&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;When decision is based on data subject's explicit consent.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="2"&gt;
&lt;p&gt;Controller's obligation&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Enforce measures to safeguard rights and freedom and 					interests&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Ensure data subject can obtain human intervention, express 					his point of view, challenge decisions&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="2"&gt;
&lt;p&gt;Automated decision making will not apply when:&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;"Special categories of personal data" are to be processed&lt;/p&gt;
&lt;p&gt;However, if the data subject gives his explicit consent or 					such processing serves substantial public interest then the 					restriction can be waived.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Concerns a child&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a name="_4i7ojhp"&gt;&lt;/a&gt; 4.11 Security and Accountability&lt;/h2&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_2xcytpi"&gt;&lt;/a&gt; 4.11.1 Data protection by design and default&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;This is another new concept under GDPR. It is a general obligation on the 	controller to incorporate effective data protection in internal policies 	and implementation measures. Measures include: minimization of processing, 	pseudonymisation, transparency while processing, allowing data subjects to 	monitor data processing etc. The implementation of organizational and 	technical measures is essential to demonstrate compliance with Regulation.&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Sub-topics in the section&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;GDPR&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;DPD&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Article&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;25&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="2"&gt;
&lt;p&gt;Responsibility of controller when determining means of 					processing and at the time of processing&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Implementation of appropriate technical and organizational 					measures for data protection&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Ensure that by default only personal data necessary for 					purpose of processing is processed&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Means of demonstrating compliance with this Article&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Approved certification mechanism may be used.&lt;/p&gt;
&lt;p&gt;Data minimization&lt;/p&gt;
&lt;p&gt;Transparency etc.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_1ci93xb"&gt;&lt;/a&gt; 4.11.2 Security of personal data&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Security of processing is mentioned in the GDPR under Article 32. The 	controller and processor must implement technical and organizational 	measures to ensure data security. These may include pseudonymisation, 	encryption, ensuring confidentiality, restoring availability and access to 	personal data, regularly testing etc. Compliance with the code may be 	demonstrated by adherence to Code of conduct and certification mechanism. 	Further, all processing which is done by a natural person acting under 	authority of controller or processor can be done only under instructions 	from the controller.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_tws6vuoa8tch"&gt;&lt;/a&gt; 4.11.3 Notification of personal data breach&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;This Article provides the procedure for communicating the personal data 	breach to supervisory authority. If the breach is not likely to result in 	risk to rights and freedoms of natural persons, then the controller is not 	required to notify the supervisory authority.&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Sub-topics in the section&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;GDPR&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;DPD&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Given in Article&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;33&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Responsibility of controller&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Report personal data breach to supervisory authority after 					being aware of it&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Time limit for reporting data breach&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Must be reported no later than 72 hours&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;In case of delay in reporting&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Reasons to be stated&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Responsibility of processor&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Notify the controller after being aware of breach&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="4"&gt;
&lt;p&gt;Description of notification&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Describe nature of personal data&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Name contact details of data protection officer&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Likely consequences of personal data breach&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Measures to be taken or proposed to be taken by controller 					to address the breach or mitigate its possible effect&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;When information cannot be provided at same time&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Provide it in phases without further undue delay&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;For verification of compliance&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Controller has to document any personal data breach. It 					must contain Facts , effects and remedial action taken&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_2bn6wsx"&gt;&lt;/a&gt; 4.11.4 Communication of personal data breach to the data subject&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Not only is the supervisory authority to be notified, but data subjects are 	also to be informed about personal data breaches without undue delay under 	certain conditions.&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Sub-topics in the section&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;GDPR&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;DPD&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Given in Article&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;34&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Conditions under which controller is to communicate the 					breach to data subject&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;When breach is likely to cause high risk to rights and 					freedoms of natural persons&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Nature of communication&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Must be in a clear and plain language.&lt;/p&gt;
&lt;p&gt;Must describe the nature of breach.&lt;/p&gt;
&lt;p&gt;Must Contain at least:&lt;/p&gt;
&lt;p&gt;Name contact details of data protection officer&lt;/p&gt;
&lt;p&gt;Likely consequences of personal data breach&lt;/p&gt;
&lt;p&gt;Measures to be taken or proposed to be taken by controller 					to address the breach or mitigate its possible effect&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="3"&gt;
&lt;p&gt;Condition under which communication will not be required&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;If controller has implemented appropriate technical and 					organizational measures and these were applied to the 					affected data.&lt;/p&gt;
&lt;p&gt;E.g.: encryption&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Subsequent measures have been taken by controller to ensure 					there is no high risk&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;If communication involves disproportionate effort.&lt;/p&gt;
&lt;p&gt;Public communication or similar measures can be undertaken 					under such circumstances.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Role of supervisory authority&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;In case of likelihood of high risk, the authority may 					require the controller to communicate the breach if the 					controller has not already done so.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_qsh70q"&gt;&lt;/a&gt; 4.11.5 Data protection impact assessment&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;This is also known as Privacy Impact Assessment. While DPD provides general 	obligation to notify the processing to supervisory authorities, the GDPR, 	taking into account the need for more protection of personal data, has 	replaced the notification process by different set of mechanisms.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To serve the above purpose, the data protection impact assessment (DPIA) 	has been provided under this Article.&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Sub-topics in the section&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;GDPR&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;DPD&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Given in Article&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;35&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="4"&gt;
&lt;p&gt;When to carry out assessment&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;When new technology is used; and&lt;/p&gt;
&lt;p&gt;Processing is likely to result in high risk to rights and 					freedoms of natural persons&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Automated processing including profiling involving 					systematic and extensive evaluation of personal aspects of 					natural persons;&lt;/p&gt;
&lt;p&gt;and&lt;/p&gt;
&lt;p&gt;When decisions based on such processing produce legal 					effects&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Large scale processing of special categories of data or 					personal data relating to criminal convictions and offences&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Large scale systematic monitoring of publicly accessible 					area&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="4"&gt;
&lt;p&gt;Type of information contained in assessment&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Description of processing operations and purpose&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Assessment of necessity and proportionality of processing 					operations&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Assessment of risks to individuals&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Measures to address risks and demonstration of compliance 					with Regulation&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Sub-topics in the section&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;GDPR&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;DPD&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Topic&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Prior Consultation&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Given in Article&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;36&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;When should controller consult supervisory authority&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Prior to processing; and&lt;/p&gt;
&lt;p&gt;DPIA indicates high risk; and&lt;/p&gt;
&lt;p&gt;In absence of risk mitigation measures by controller&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Data protection officer&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;GDPR mandates that a person with expert knowledge of data protection law 	and practice is appointed for helping the controller or processor to comply 	with the data protections laws. A single data protection officer (DPO) may 	be appointed by a group of undertakings or where controller or processor is 	a public authority or body.The DPO must be accessible from each 	establishment.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;span&gt; &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Sub Topics in the Section&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;GDPR&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;DPD&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Article&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;37&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="3"&gt;
&lt;p&gt;Situations in which DPO must be appointed&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;When processing is carried out by public authority or body.&lt;/p&gt;
&lt;p&gt;Note: Courts acting in judicial capacity are excluded.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Core activity involves processing which requires regular 					and systematic monitoring of data subjects on large scale; 					or&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Core activity involves processing of large scale special 					categories of data and criminal convictions and offences&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h4 style="text-align: justify; "&gt;&lt;a name="_1pxezwc"&gt;&lt;/a&gt; Position of Data Protection Officer&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;The DPO must directly report to the highest management level of the 	controller or processor. Data subjects may contact the DPO in case of 	problems related to processing and exercise of rights.&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Sub Topics in the Section&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;GDPR&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;DPD&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Article&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;38&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="4"&gt;
&lt;p&gt;Responsibility of controller and processor&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Ensure DPO is involved properly and in timely manner&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Provide DPO with support, resources and access to personal 					data and processing operations&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Not dismiss or penalize DPO for performing his task.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Ensure independence of working and not give instruction to 					DPO&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h4 style="text-align: justify; "&gt;&lt;a name="_ewk2mxb1q2ei"&gt;&lt;/a&gt; Tasks of Data Protection officer&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;The DPO must be involved in all matters concerning data protection. He is 	expected to act independently and advice the controllers and processors to 	facilitate the establishment's compliance with Regulations.&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Sub Topics in the Section&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;GDPR&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;DPD&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Article&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;39&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="5"&gt;
&lt;p&gt;Tasks&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Inform and advise the controller or processor and employees 					over data protection laws&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Monitor compliance with data protection laws. Includes 					assigning responsibilities, awareness- raising, staff 					training and audits&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Advice and monitor performance&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Cooperate with supervisory authority&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Act as point of contact for supervisory authority for 					processing, prior consultation and consultation on other 					matter&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_2p2csry"&gt;&lt;/a&gt; 4.11.6 European Data Protection Board&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;For consistent application of the Regulation, the GDPR envisages a Board 	that would replace the Working Party on Protection of Individuals With 	Regard to Processing of Personal Data established under the DPD. This 	Regulation confers legal personality on the Board.&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Sub Topics in the Section&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;GDPR&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;DPD&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Article&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;68&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Represented by&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Chair&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Composition of the Board&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Head of one supervisory authority of each Member State and 					European Data Protection Supervisor or of their 					representatives.&lt;/p&gt;
&lt;p&gt;Joint representative can be appointed where Member State 					has more than one supervisory authority.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Role of Commission&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Right to participate in activities and meetings of the 					Board without voting rights.&lt;/p&gt;
&lt;p&gt;Commission to designate a representative for this.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="4"&gt;
&lt;p&gt;Functions of the Board&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Consistent application of Regulation&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Advise Commission of level of protection in third countries 					or international organizations&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Promote cooperation of supervisory authorities&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Board is to act independently&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_147n2zr"&gt;&lt;/a&gt; 4.11.7 Supervisory Authority&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;GDPR lays down detailed provisions on supervisory authorities, defining 	their functions, independence, appointment of members, establishment rules, 	competence, competence of lead supervisory authority, tasks, powers and 	activity reports. Such elaborate provisions are absent in DPD.&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Sub-topics in this section&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;GDPR&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;DPD&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Given in Article&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Chapter VI, Article 51 -59&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;28&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a name="_gdvxc914pgtx"&gt;&lt;/a&gt;&lt;/h2&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a name="_3o7alnk"&gt;&lt;/a&gt; 4.12 Processor&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The Article spells out the obligations of a processor and conditions under 	which other processors can be involved.&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Sub Topics in the Section&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;GDPR&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;DPD&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Article&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;28&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;What kind of processors can be used by controller&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;● Those which provide sufficient guarantees to 					implement appropriate technical and organizational measures&lt;/p&gt;
&lt;p&gt;● Those which comply with Regulation and Rights&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Obligations of processor in case of addition or replacement 					of processor&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;● Not engage another processor without controller's 					authorization&lt;/p&gt;
&lt;p&gt;● In case of general written authorization inform the 					controller&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Processing shall be governed by&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Contract or legal act under Union or Member State law.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Elements of Contract&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;● Is binding on processor&lt;/p&gt;
&lt;p&gt;● Sets out subject matter and duration of processing&lt;/p&gt;
&lt;p&gt;● Nature of processing&lt;/p&gt;
&lt;p&gt;● Type of personal data&lt;/p&gt;
&lt;p&gt;● Categories of data subjects&lt;/p&gt;
&lt;p&gt;● Obligations and Rights of the controller&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="8"&gt;
&lt;p&gt;Obligations of processor under contract or legal act&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Processor shall process under instructions from controller 					unless permitted under law itself.&lt;/p&gt;
&lt;p&gt;Controller is to be informed in the latter case.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Ensures that persons authorized to process have committed 					themselves to confidentiality&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Processor to undertake all data security measures 					(mentioned under Art 32)&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Enforces conditions on engaging another processor&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Assists the controller by appropriate technical and 					organizational measures&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Assists controller in compliance with Art 32 to 36&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Delete or return all personal data to controller at the 					choice of controller at the end of processing&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Make information available to controller for demonstrating 					compliance with obligations.&lt;/p&gt;
&lt;p&gt;Contribute to audits, inspections etc.&lt;/p&gt;
&lt;p&gt;Inform the controller if it believes that an instruction 					infringes the regulation or law.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Conditions under which a processor can engage another 					processor&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;● Same data protection obligations will be applicable 					to other processor.&lt;/p&gt;
&lt;p&gt;● If other processor fails to fulfill data protection 					obligations, initial processor shall remain fully liable to 					controller for such performance.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a name="_23ckvvd"&gt;&lt;/a&gt; 4.13 Records of processing activities&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The controller or processor must maintain records of processing activities 	to demonstrate compliance with the Regulation. They are obliged to 	cooperate with and make record available to the supervisory authority upon 	request. DPD does not contain similar obligations.&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Sub Topics in the Section&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;GDPR&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;DPD&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Article&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;30&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Obligation of controller or controller's representative&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Maintain a record of processing activities&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="7"&gt;
&lt;p&gt;Information to be contained in the record&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Name and contact details of:&lt;/p&gt;
&lt;p&gt;● Controller /joint controller / controller's 					representatives&lt;/p&gt;
&lt;p&gt;● Data protection officer&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Purpose of processing&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Categories of data subjects and categories of personal data&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Categories of recipients to whom data has been or will be 					disclosed&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Transfers of personal data to third party, identification 					of third party, documentation of suitable safeguards&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Expected time duration for erasure of different categories 					of data&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Technical and organizational security measures&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Obligation of processor&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Maintain a record of processing activities carried out on 					behalf of controller&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="4"&gt;
&lt;p&gt;Record maintained by processor shall contain information 					such as:&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Name and contact details of:&lt;/p&gt;
&lt;p&gt;● Processor /processor's representative&lt;/p&gt;
&lt;p&gt;● Controller /controller's representative&lt;/p&gt;
&lt;p&gt;● Data protection officer&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Categories of processing&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Data transfer to third party&lt;/p&gt;
&lt;p&gt;Identification of third party&lt;/p&gt;
&lt;p&gt;Documentation of safeguards&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Technical and organizational security measures&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Form in which record is to be maintained&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;In writing and electronic form&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Conditions under which exemption will apply&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;● Organizations employing fewer than 250 employees 					are exempted;&lt;/p&gt;
&lt;p&gt;● Processing should not cause risk to rights and 					freedoms of data subjects&lt;/p&gt;
&lt;p&gt;● Processing should not be occasional&lt;/p&gt;
&lt;p&gt;● Processing should not include special categories of 					data&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a name="_ihv636"&gt;&lt;/a&gt; 4.14 Code of Conduct&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;These mechanisms have been provided under GDPR to demonstrate compliance 	with the Regulation. This is important as the GDPR ( under Art 83 ) 	provides that adherence to code of conduct shall be one of the factors 	taken into account for calculating administrative fines. This is not an 	obligatory provision.&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Sub Topics in the Section&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;GDPR&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;DPD&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Article&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;40&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;27&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Who will encourage drawing up of code of conduct&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;● Member States&lt;/p&gt;
&lt;p&gt;● Supervisory Authorities&lt;/p&gt;
&lt;p&gt;● Commission.&lt;/p&gt;
&lt;p&gt;Specific needs of micro, small and medium enterprises to be 					taken into account.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;● Member States&lt;/p&gt;
&lt;p&gt;● Commissions&lt;/p&gt;
&lt;p&gt;Does not mention the rest&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Who may prepare amend or extend code of conduct&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Associations and other bodies representing categories of 					controller or processors&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="12"&gt;
&lt;p&gt;Information contained in the code&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Fair and transparent processing&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Legitimate interests of controller&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Collection of personal data&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Pseudonymisation&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Information to public and data subjects&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Exercise of rights of data subject&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Information provided to and protection of children and 					manner in which consent of holders of parental 					responsibility is obtained&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Measures under:&lt;/p&gt;
&lt;p&gt;● Data protection by design and default&lt;/p&gt;
&lt;p&gt;● Controller responsibilities&lt;/p&gt;
&lt;p&gt;● Security of processing&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Notification of data breach to authorities and 					communication of same to data subjects&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Data transfer to third party&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Dispute resolution procedures between controllers and data 					subjects&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Mechanisms for mandatory monitoring&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Mandatory monitoring&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Code of conduct containing the above information enables 					mandatory monitoring of compliance by body accredited by 					supervisory authority. (Art 41)&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a name="_32hioqz"&gt;&lt;/a&gt; 4.15 Certification&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Like the code of conduct, Certification is a voluntary mechanism that 	demonstrates compliance with the Regulation. Establishment of data 	protection certification mechanism and data protection seals and marks 	shall be encouraged by Member States, supervisory authorities, Boards and 	Commission. As in case of code of conduct, specific needs of micro, small 	and medium sized enterprise ought to be taken into account. DPD does not 	mention such mechanisms.&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Sub Topics in the Section&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;GDPR&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;DPD&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Article&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;42&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Who will issue the certificate&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Certification bodies or competent supervisory authority on 					basis of approved criteria.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Time period during which certification shall be issued&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Maximum period of three years.&lt;/p&gt;
&lt;p&gt;Can be renewed under same conditions.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Who accredits certification bodies&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Competent Supervisory bodies or National accreditation 					body.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;When can accreditation be revoked&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;When conditions of accreditation are not or no longer met.&lt;/p&gt;
&lt;p&gt;OR&lt;/p&gt;
&lt;p&gt;Where actions taken by certification body infringe this 					Regulation.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Who can revoke&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Competent supervisory authority or national accreditation 					body&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a name="_rmo0nrgdb8k6"&gt;&lt;/a&gt; 4.16 Data Transfer&lt;/h2&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_1hmsyys"&gt;&lt;/a&gt; 4.16.1 Transfers of personal data to third countries or international 	organizations&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Chapter V lays down the conditions with which the data controller must 	comply in order to transfer data for the purpose of processing outside of 	the EU to third countries or international organizations. The chapter also 	stipulates conditions that must be complied with for onward transfers from 	the third country or international organization.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_2grqrue"&gt;&lt;/a&gt; 4.16.2 Transfer on the basis of an adequacy decision&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Under GDPR, transfer of data can take place after the	&lt;i&gt;Commission decides&lt;/i&gt; whether the third country, territory, specified 	sector within that third country or international organization ensures 	adequate level of data protection. This is called adequacy decision. A list 	of countries or international organizations which ensure adequate data 	protection shall be published in the Official Journal of the European Union 	and on the website by the Commission. Once data transfer conditions are 	found to be compliant with the Regulation, no specific authorization would 	be required for data transfer from the supervisory authorities. The 	commission would decide this by means of an "Implementing Act" specifying a 	mechanism for periodic review, its territorial and sectoral application and 	identification of supervisory authorities. Decisions of Commission taken 	under Art 25(6) of DPD shall remain in force. DPD also provides parameters 	for the same.&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Sub-topics in this section&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;GDPR&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;DPD&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Given in article&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;45&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;25&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Conditions apply when transfers take place to&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Third country or international organization&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;International organization not mentioned.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="5"&gt;
&lt;p&gt;Functions of the commission&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Take adequacy decisions&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Same&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Review the decision periodically every four years&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Monitor developments on ongoing basis&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Repeal, amend or suspend decision&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Inform Member States if third country doesn't ensure 					adequate level of protection.&lt;/p&gt;
&lt;p&gt;Similarly, member state has to inform the Commission.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="3"&gt;
&lt;p&gt;Functions of Member State&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Inform Commission if third country doesn't ensure adequate 					level of protection.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Take measures to comply with Commission's decisions&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Prevent data transfer if Commission finds absence of 					adequate level of protection.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="3"&gt;
&lt;p&gt;Factors, with respect to third country or international 					organization, to be considered while deciding adequacy of 					safeguards&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Rule of law,&lt;/p&gt;
&lt;p&gt;human rights, fundamental freedoms, access of public 					authorities to personal data,&lt;/p&gt;
&lt;p&gt;data protection rules, rules for onward transfer of 					personal data to third country or international 					organization etc.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Circumstances surrounding data transfer operations: nature 					of data; purpose and duration of processing operation; rule 					of law, professional rules and security measures in third 					country; country of origin and final destination; 					professional rules and security measures;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Functioning of independent supervisory authorities, their 					powers of enforcing compliance with data protection rules 					and powers to assist and advise data subject to exercise 					their rights.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;International commitments entered into.&lt;/p&gt;
&lt;p&gt;Obligations under legally binding conventions.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Same&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="2"&gt;
&lt;p&gt;When adequate level of protection no longer ensues&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;The Commission, to the extent necessary: repeal, amend or 					suspend the decision.&lt;/p&gt;
&lt;p&gt;This is to be done by the means of an implementing act.&lt;/p&gt;
&lt;p&gt;No retroactive effect to take place&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;The member state will have to suspend data transfer if 					Commission finds absence of adequate level of protection.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Commission to enter into consultation with the third 					country or international organization to remedy the 					situation&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Same&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_vx1227"&gt;&lt;/a&gt; 4.16.3 Transfers subject to appropriate safeguards&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;This article provides for a situation when the Commission takes no decision. (Mentioned above under	&lt;b&gt;Transfer on the basis of an adequacy decision&lt;/b&gt;). In this 	case, the controller or processor can transfer data to third country or 	international organization subject to certain conditions. Specific 	authorization from supervisory authorities is not required in this context. 	Procedure for the same has been mentioned.&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Sub-topics in this section&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;GDPR&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;DPD&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Given in article&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;46&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;When can data transfer take place&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;When &lt;i&gt;appropriate safeguards&lt;/i&gt; are provided by the 					controller or processor;&lt;/p&gt;
&lt;p&gt;AND&lt;/p&gt;
&lt;p&gt;On condition that data subject enjoys enforceable rights 					and effective legal remedies for data safety.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="5"&gt;
&lt;p&gt;Conditions to be fulfilled for providing					&lt;i&gt;appropriate safeguards&lt;/i&gt; without specific 					authorization from supervisory authority&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Existence of legally binding and enforceable instrument 					between public bodies or authorities&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Existence of Binding Corporate Rules&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Adoption of Standard Protection Clauses adopted by the 					Commission&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Adoption of Standard data protection clauses by supervisory 					authorities and approved by Commission.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Approved code of conduct along with binding and enforceable 					commitments of controller or processor in third country to 					apply appropriate safeguards and data subject's rights&lt;/p&gt;
&lt;p&gt;OR&lt;/p&gt;
&lt;p&gt;Approved certification mechanism along with binding and 					enforceable commitments of controller or processor in third 					country to apply appropriate safeguards and data subject's 					rights.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="3"&gt;
&lt;p&gt;Conditions to be fulfilled for providing appropriate 					safeguards subject to authorization from competent 					authority&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Existence of contractual clauses between:&lt;/p&gt;
&lt;p&gt;Controller or Processor and&lt;/p&gt;
&lt;p&gt;Controller, Processor or recipient of personal data (third 					party)&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Provisions inserted in administrative arrangements between 					public authorities or bodies. Provisions to contain 					enforceable and effective data subject rights.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Consistency mechanism to be applied by supervisory 					authority&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Unless amended, replaced or repealed, authorization to 					transfer given under DPD will remain valid when:&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Third country doesn't ensure adequate level of protection 					but controller adduces adequate safeguards;&lt;/p&gt;
&lt;p&gt;or&lt;/p&gt;
&lt;p&gt;Commission decides that standard contractual clauses offer 					sufficient safeguards&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_3fwokq0"&gt;&lt;/a&gt; 4.16.4 Binding Corporate Rules&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;These are agreements that govern transfers between organizations within a 	corporate group&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Sub-topics in this section&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;GDPR&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;DPD&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Given in Article&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;47&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="3"&gt;
&lt;p&gt;Elements of Binding Corporate Rules&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Legally binding&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Apply to and are enforced by every member of group of 					undertakings or group of enterprises engaged in joint 					economic activity. Includes employees&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Expressly confer enforceable rights on data subject over 					processing of personal data&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="12"&gt;
&lt;p&gt;What do they specify&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Structure and contact details of group of undertakings&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Data transfers or set of transfers including categories of 					personal data , type of processing, type of data subjects 					affected, identification of third countries&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Legally binding nature&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Application of general data protection principles&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Rights of data subjects&lt;/p&gt;
&lt;p&gt;Means to exercise those right&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;How the information on BCR is provided to data subjects&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Tasks of data protection officer etc.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Complaint procedure&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Mechanisms within the group of undertakings, group of 					enterprises for ensuring verification of compliance with 					BCR.&lt;/p&gt;
&lt;p&gt;Eg. Data protection audits&lt;/p&gt;
&lt;p&gt;Results of verification to be available to person in charge 					of monitoring compliance with BCR and to board of 					undertaking or Group of enterprises.&lt;/p&gt;
&lt;p&gt;Should be available upon request to competent supervisory 					authority&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Mechanism for reporting and recording changes to rules and 					reporting changes to supervisory authority&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Cooperation mechanism with supervisory authority&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Data protection training to personnel having access to 					personal data&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Role of Commission&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;May specify format and procedures for exchange of 					information between controllers, processors and supervisory 					authorities for BCR&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_ior7p9ed8ake"&gt;&lt;/a&gt; 4.16.5 Transfers or disclosures not authorized by Union law&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;This Article lays down enforceability of decisions given by judicial and 	administrative authorities in third countries with regard to transfer or 	disclosure of personal data.&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Sub-topics in this section&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;GDPR&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;DPD&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Given in Article&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;48&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Article concerns&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Transfer of personal data under judgments of courts, 					tribunals, decision of administrative authorities in third 					countries.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;When can data be transferred or disclosed&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;International agreement between requesting third country 					and member state or union.&lt;/p&gt;
&lt;p&gt;E.g.: mutual legal assistance treaty&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_4f1mdlm"&gt;&lt;/a&gt; 4.16.6 Derogations for specific situations&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;This Article comes into play in the absence of adequacy decision or 	appropriate safeguards or of binding corporate rules. Conditions for data 	transfer to a third country or international organization under such 	situations have been laid down.&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Sub-topics in this section&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;GDPR&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;DPD&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Given in Article&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;49&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;26&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="6"&gt;
&lt;p&gt;Conditions under which data transfer can take place&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;On obtaining Explicit consent of data subject after being 					informed of possible risks&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;On obtaining unambiguous consent of data subject to the 					proposed transfer&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Transfer is necessary for conclusion or performance of 					contract.&lt;/p&gt;
&lt;p&gt;The contract should be in the interest of data subject.&lt;/p&gt;
&lt;p&gt;The contract is between the controller and another natural 					or legal person.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Contractual conditions are same.&lt;/p&gt;
&lt;p&gt;DPD also includes implementation of pre contractual 					measures taken upon data subject's request.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Transfer is necessary in public interest&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Same&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Is necessary for establishment, exercise or defense of 					legal claims&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Same&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;To protect vital interest of data subject or of other 					persons where data subject is physically or legally 					incapable of giving consent&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Includes vital interest of data subject but doesn't include 					"other person". Condition for consent is also not included.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Transfer made from register under Union or Member State law 					to provide information to public and is open to 					consultation by public or person demonstrating legitimate 					interest.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Same&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="8"&gt;
&lt;p&gt;Conditions for transfer when even the above specific 					situations are not applicable&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Transfer is not repetitive&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Concerns limited number of data subjects&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Necessary for compelling legitimate interests pursued by 					controller&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Legitimate interests are not overridden by interests or 					rights and freedoms of data subject&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Controller has provided suitable safeguards after assessing 					all circumstances surrounding data transfer&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Controller to inform supervisory authority about the 					transfer&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Controller to inform data subject of transfer and 					compelling legitimate interests pursued&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Member may authorize transfer personal data to third 					country where controller adduces adequate safeguards for 					protection of privacy and fundamental rights and freedoms 					of individuals&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a name="_2u6wntf"&gt;&lt;/a&gt; 4.17 International cooperation for protection of personal data&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;This Article lays down certain steps to be taken by Commissions and 	supervisory authorities for protection of personal data.&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Sub-topics in this section&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;GDPR&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;DPD&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Given in Article&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;50&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="4"&gt;
&lt;p&gt;Steps will include&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Development of international cooperation mechanisms to 					facilitate enforcement of legislation for protection of 					personal data&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Provide international mutual assistance in enforcement of 					legislation for protection of personal data&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Engage relevant stakeholders for furthering international 					cooperation&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Promote exchange and documentation of personal data 					protection legislation and practice&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a name="_pn5fviodvkzf"&gt;&lt;/a&gt; 4.18 Remedies, Liability and Compensation&lt;/h2&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_3tbugp1"&gt;&lt;/a&gt; 4.18.1 Right to lodge complaint with a supervisory authority&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;This article gives the data subject the right to seek remedy against 	unlawful processing of data. GDPR strengthens this right as compared to the 	one provided under DPD.&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Sub-topics in this section&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;GDPR&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;DPD&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Given in Article&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;77&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;28(4)&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Right given&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Right to lodge complaint&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Under GDPR the data subject has been conferred the "right" 					specifically. This is not so in DPD.&lt;/p&gt;
&lt;p&gt;DPD merely obliges the supervisory authority to hear claims 					concerning rights and freedoms.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Who can lodge complaint&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Data subject&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Any person or association representing that person&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Complaint to be lodged before&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Supervisory authority in the Member State of habitual 					residence, place of work or place of infringement&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Supervisory authority&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;When can the complaint be lodged&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;When processing of personal data relating to data subject 					allegedly infringes on Regulation&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;When rights and freedom are to be protected while 					processing.&lt;/p&gt;
&lt;p&gt;When national legislative measures to restrict scope of 					Regulations is adopted and processing is alleged to be 					unlawful.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Accountability&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Complainant to be informed by Supervisory authority on 					progress and outcome of complaint and judicial remedy to be 					taken up&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Complainant to be informed on outcome of claim or if check 					on unlawfulness has taken place&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_28h4qwu"&gt;&lt;/a&gt; 4.18.2 Right to an effective judicial remedy against supervisory authority&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The concerned Article seeks to make supervisory authorities accountable by 	bringing proceedings against the authority before the courts. GDPR gives a 	specific right to the individual. DPD under Article 28(3) merely provides 	for appeal against decisions of supervisory authority in the courts.&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Sub-topics in this section&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;GDPR&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;DPD&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Given in Article&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;78 (1)&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Who has the right&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Every natural or legal person&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;When can the right be exercised&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Against legally binding decision of supervisory authorities 					concerning the complainant&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Sub-topics in this section&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;GDPR&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;DPD&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Given in Article&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;78(2)&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Who has the right&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Data subject&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;When can the right be exercised&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;When the competent supervisory authority doesn't handle the 					complaint&lt;/p&gt;
&lt;p&gt;Or&lt;/p&gt;
&lt;p&gt;Doesn't inform data subject about progress / outcome of 					complaint within 3 months&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;The jurisdiction of court will extend to the territory of the Member State 	in which the supervisory authority is established (GDPR Art 78(3)). The 	supervisory authority is required to forward proceedings to the court if 	the decision was preceded by the Board's decision in the consistency 	mechanism. (GDPR 78(4))&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_nmf14n"&gt;&lt;/a&gt; 4.18.3 Right to effective judicial remedy against a controller or processor&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The data subject has been conferred with the right to approach the courts 	under certain circumstance. The GDPR confers the specific right while DPD 	provides for judicial remedy without using the word "right".&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Sub-topics in this section&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;GDPR&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;DPD&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Given in&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Art 79&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Recital 55&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Right can be exercised when:&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;1. Data has been processed; and&lt;/p&gt;
&lt;p&gt;2. Processing Results in infringement of rights; and&lt;/p&gt;
&lt;p&gt;3. Infringement is due to non compliance of Regulation&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Similar provisions provided under DPD:&lt;/p&gt;
&lt;p&gt;When controller fails to respect the rights of data 					subjects and national legislation provides a judicial 					remedy.&lt;/p&gt;
&lt;p&gt;Processors are not mentioned.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Jurisdiction of the courts&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Proceedings can be brought before the courts of Member 					States wherein:&lt;/p&gt;
&lt;p&gt;1. Controller or processor has an establishment&lt;/p&gt;
&lt;p&gt;Or&lt;/p&gt;
&lt;p&gt;2. Data Subject has habitual residence&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Right cannot be exercised when&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;1. The controller or processor is a public authority of 					Member State&lt;/p&gt;
&lt;p&gt;And&lt;/p&gt;
&lt;p&gt;2. Is exercising its public powers&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_37m2jsg"&gt;&lt;/a&gt; 4.18.4 Right to compensation and liability&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;GDPR enables a person who has suffered damages to claim compensation as a 	specific right. DPD merely entitles the person to receive compensation. 	Although Liability provisions under GDPR and DPD are similar, the liability 	under GDPR is stricter as compared to DPD. This is because DPD exempts the 	processor from liability but GDPR does not. For example, DPD imposes 	liability on controllers only.&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Sub-topics in this section&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;GDPR&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;DPD&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Given in Article&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;82&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;23&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Who can claim compensation&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Any person who has&lt;/p&gt;
&lt;p&gt;suffered material or non material damage&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Similar provisions.&lt;/p&gt;
&lt;p&gt;But DPD doesn't mention "material or non-material damage" 					specifically.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Right arises due to&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Infringement of Regulation&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Same&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Right granted&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Right to receive compensation&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Same&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Compensation has to be given by&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Controller or processor&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Compensation can be claimed only from controller&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Liability of controller arises when&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Damage is caused by processing due to infringement of 					regulation&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Same&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Liability of processor arises when&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;1. Processor has not complied with directions given to it 					under Regulation&lt;/p&gt;
&lt;p&gt;OR&lt;/p&gt;
&lt;p&gt;2. Processor has acted outside or contrary to lawful 					instructions of controller&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Exemptions to controller or processor from liability&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;If there is proof that they are not responsible&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Exemption for controller is same&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Liability when more than one controller or processor cause 					damage&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Each controller or processor to be held liable for entire 					damage&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a name="_1mrcu09"&gt;&lt;/a&gt; 4.19 General conditions for imposing administrative fines&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;GDPR makes provision for imposition of &lt;i&gt;administrative fines &lt;/i&gt;by 	supervisory authorities in case of infringement of Regulation. Such fines 	should be effective, proportionate and dissuasive. In case of minor infringement, "reprimand may be issued instead of a fine"	&lt;a href="#_ftn1" name="_ftnref1"&gt;&lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;. 	Means of enforcing accountability of supervisory authority have been 	provided. If Member state law does not provide for administrative fines, 	then the fine can be initiated by the supervisory authority and imposed by 	courts. However, by 25 May 2018, Member States have to adopt laws that 	comply with this Article.&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Sub-topics in this section&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;GDPR&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;DPD&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Given in Article&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;83&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Who can impose fines&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Supervisory Authority&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Fines to be issued against&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Controllers or Processors&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="11"&gt;
&lt;p&gt;Parameters to be taken into account while determining 					administrative fines&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Nature, gravity and duration of infringement&lt;/p&gt;
&lt;p&gt;and&lt;/p&gt;
&lt;p&gt;Nature scope or purpose of processing&lt;/p&gt;
&lt;p&gt;and&lt;/p&gt;
&lt;p&gt;Number of data subjects affected&lt;/p&gt;
&lt;p&gt;and&lt;/p&gt;
&lt;p&gt;Level of damage suffered&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Intentional or negligent character of infringement&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Action taken by controller or processor to mitigate damage 					suffered by data subjects&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Degree of responsibility of con controller or processor. 					Technical and organizational measures implemented to be 					taken into account.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Relevant previous infringement&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Degree of cooperation with supervisory authority&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Categories of personal data affected&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Manner in which supervisory authorities came to know of the 					infringement and&lt;/p&gt;
&lt;p&gt;Extent to which the controller or processor notified the 					infringement&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether corrective orders of supervisory authority under 					Art 58(2) have been issue before and complied with&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Adherence to approved code of conduct under Art 40 or 					approved certification mechanisms under Art 42&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Other aggravating or mitigating factors like financial 					benefits gained losses avoided etc.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;If infringement is intentional or due to negligence of 					processor or controller&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Total amount of administrative fine to not exceed amount 					specified for gravest infringement&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Means checking power of supervisory authority to impose 					fines&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Procedural safeguards under Member State or Union law.&lt;/p&gt;
&lt;p&gt;Including judicial remedy and due process&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Article 83 splits the amount of administrative fines according to 	obligations infringed by controllers, processors or undertakings. The first 	set of infringements may lead to imposition of fines up to 10,000,000 EUR 	or 2% of total worldwide turnover.&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Sub-topics in this section&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;GDPR&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;DPD&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Article&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;83(4)&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Fine imposed&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Up to 10,000,000 EUR&lt;/p&gt;
&lt;p&gt;or&lt;/p&gt;
&lt;p&gt;in case of undertaking,&lt;/p&gt;
&lt;p&gt;2% of total worldwide turnover of preceding financial year, 					whichever is higher&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="8"&gt;
&lt;p&gt;Infringement of these provisions will cause imposition of 					fine (Provisions infringed)&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Obligations of controller and processor under:&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Art 8&lt;/p&gt;
&lt;p&gt;Conditions applicable to child's consent in relation to 					information society services&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Art 11&lt;/p&gt;
&lt;p&gt;Processing which does not require identification&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Art 25 to 39&lt;/p&gt;
&lt;p&gt;General obligations , Security of personal data , Data 					Protection impact assessment and prior consultation&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Art 42&lt;/p&gt;
&lt;p&gt;Certification&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Art 43&lt;/p&gt;
&lt;p&gt;Certification bodies&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Obligations of certification body under:&lt;/p&gt;
&lt;p&gt;Art 42&lt;/p&gt;
&lt;p&gt;Art 43&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Obligations of monitoring body under:&lt;/p&gt;
&lt;p&gt;Art 41(4)&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Second set of infringements may cause the authority to impose higher fines 	up to 20,000,000 EUR or 4% of total worldwide turnover.&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Sub-topics in this section&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;GDPR&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;DPD&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Article&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;83(5)&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Fine imposed&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Up to 20,000,000 EUR&lt;/p&gt;
&lt;p&gt;or&lt;/p&gt;
&lt;p&gt;in case of undertaking,&lt;/p&gt;
&lt;p&gt;4% of total worldwide turnover of preceding financial year, 					whichever is higher&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="12"&gt;
&lt;p&gt;Infringement of provisions that will cause imposition of 					fine (Provisions infringed)&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Basic principles for processing and conditions for consent 					under:&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Art 5&lt;/p&gt;
&lt;p&gt;Principles relating to processing of personal data&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Art 6&lt;/p&gt;
&lt;p&gt;Lawfulness of processing&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Art 7&lt;/p&gt;
&lt;p&gt;Conditions for consent&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Art 9&lt;/p&gt;
&lt;p&gt;Processing of special categories of personal data&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Data subject's rights under:&lt;/p&gt;
&lt;p&gt;Art 12 to 22&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Transfer of personal data to third country or international 					organization under:&lt;/p&gt;
&lt;p&gt;Art 44 to 49&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Obligations under Member State law adopted under Chapter IX&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Non Compliance with supervisory authority's powers under 					provisions of Art 58:&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Imposition of temporary or definitive limitation including 					ban on processing&lt;/p&gt;
&lt;p&gt;(Art 58 (2)(f))&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Suspension of data flows to third countries or 					international organization&lt;/p&gt;
&lt;p&gt;(Art 58(2) (j))&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Provide access to premises or data processing equipment and 					means (Art 58 (1) (f))&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a name="_46r0co2"&gt;&lt;/a&gt; 4.20 Penalties&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Article 84 makes provision for penalties in case of infringement of 	Regulation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The penalties must be effective, proportionate and dissuasive.&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Sub-topics in this section&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;GDPR&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;DPD&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Given in Article&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;84&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;When will penalty be imposed&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;In case of infringements that are not subject to 					administrative fines&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Who imposes them&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Member State&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Responsibility of Member State&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;To lay down the law and ensure implementation.&lt;/p&gt;
&lt;p&gt;To notify to the Commission, the law adopted, by 25 May 					2018&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;div style="text-align: justify; "&gt;&lt;br clear="all" /&gt; 
&lt;hr /&gt;
&lt;div id="ftn1"&gt;
&lt;p&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt; &lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt; &lt;/a&gt; Recital 148 , GDPR&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/comparison-of-general-data-protection-regulation-and-data-protection-directive'&gt;https://cis-india.org/internet-governance/blog/comparison-of-general-data-protection-regulation-and-data-protection-directive&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Aditi Chaturvedi and Edited by Leilah Elmokadem</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-02-07T14:08:35Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/quint-shweta-mohandas-and-pallavi-bedi-june-19-2023-cowin-data-breach-health-sensitive-details-policies-solution">
    <title>CoWIN Breach: What Makes India's Health Data an Easy Target for Bad Actors?</title>
    <link>https://cis-india.org/internet-governance/blog/quint-shweta-mohandas-and-pallavi-bedi-june-19-2023-cowin-data-breach-health-sensitive-details-policies-solution</link>
    <description>
        &lt;b&gt;Recent health data policies have failed to even mention the CoWIN platform.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="https://www.thequint.com/opinion/cowin-data-breach-health-sensitive-details-policies-solution#read-more"&gt;originally published in the Quint&lt;/a&gt; on 19 June 2023.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Last week, it was reported that due to an alleged breach of &lt;a href="https://www.thequint.com/fit/cowin-data-breach-private-information-covid-vaccine-telegram-bot"&gt;the CoWIN platform&lt;/a&gt;, details such as Aadhaar and passport numbers of Indians were made public via a Telegram bot.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While Minister of State for Information Technology &lt;a href="https://www.thequint.com/fit/cowin-data-breach-telegram-bot-covid-19-vaccine-unanswered-questions"&gt;Rajeev Chandrashekar&lt;/a&gt; put out information acknowledging that there was some form of a data breach, there is no information on how the breach took place or when a past breach may have taken place.&lt;/p&gt;
&lt;blockquote class="quoted" style="text-align: justify; "&gt;This data leak is yet another example of &lt;a href="https://www.thequint.com/opinion/cowin-breach-shows-us-the-structural-problem-with-digital-indias-infrastructure"&gt;our health records&lt;/a&gt; being exposed in the recent past – during the pandemic, there were reports of COVID-19 test results being leaked online. The leaked information included patients’ full names, dates of birth, testing dates, and names of centres in which the tests were held.&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;In December last year, five servers of the &lt;a href="https://www.thequint.com/fit/aiims-ayushman-bharat-digital-mission-health-data"&gt;All India Institute of Medical Science&lt;/a&gt; (AIIMS) in Delhi were under a cyberattack, leaving sensitive personal data of around 3-4 crore patients compromised.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In such cases, the Indian Computer Emergency Response Team (CERT-In) is the agency responsible for looking into the vulnerabilities that may have led to them. However, till date, CERT-In has not made its technical findings into such attacks &lt;a href="https://www.thequint.com/topic/data-breach"&gt;publicly available&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The COVID-19 Pandemic Created Opportunity&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The pandemic saw a number of digitisation policies being rolled out in the health sector; the most notable one being the National Digital Health Mission (or NDHM, later re-branded as the Ayushman Bharat Digital Mission).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mobile phone apps and web portals launched by the central and state governments during the pandemic are also examples of this health digitisation push. The rollout of the COVID-19 vaccinations also saw the deployment of the CoWIN platform.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Initially, it was mandatory for individuals to register on CoWIN to get an appointment for vaccination, and there was no option for walk-in-registration or to book an appointment. But, the Centre subsequently modified this rule and walk-in appointments and registrations on CoWIN became permissible from June 2021.&lt;/p&gt;
&lt;blockquote&gt;However, a study conducted by the Centre for Internet and Society (CIS) found that states such as Jharkhand and Chhattisgarh, which have low internet penetration, permitted on-site registration for vaccinations from the beginning.&lt;/blockquote&gt;
&lt;p&gt;The rollout of the NDHM also saw Health IDs being generated for citizens.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In several reported cases across states, this rollout happened during the COVID-19 vaccination process – without the informed consent of the concerned person.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The &lt;b&gt;beneficiaries who have had their Health IDs created through the vaccination process had not been informed&lt;/b&gt; about the creation of such an ID or their right to opt out of the digital health ecosystem.&lt;/p&gt;
&lt;h3&gt;A Web of Health Data Policies&lt;/h3&gt;
&lt;p&gt;Even before the pandemic, India was working towards a Health ID and a health data management system.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The components of the umbrella National Digital Health Ecosystem (NDHE) are the National Digital Health Blueprint published in 2019 (NDHB) and the NDHM.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Blueprint was created to implement the National Health Stack (published in 2018) which facilitated the creation of Health IDs. Whereas the NDHM was drafted to drive the implementation of the Blueprint, and promote and facilitate the evolution of NDHE.&lt;/p&gt;
&lt;p&gt;The National Health Authority (NHA), established in 2018, has been given the responsibility of implementing the National Digital Health Mission.&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;2018 also saw the Digital Information Security in Healthcare Act (DISHA), which was to regulate the generation, collection, access, storage, transmission, and use of Digital Health Data ("DHD") and associated personal data.&lt;/blockquote&gt;
&lt;p&gt;However, since its call for public consultation, &lt;b&gt;no progress has been made&lt;/b&gt; on this front.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In addition to documents that chalk out the functioning and the ecosystem of a digitised healthcare system, the NHA has released policy documents such as:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;the Health Data Management Policy (which was revised three times; the latest version released in April 2022)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;the Health Data Retention Policy (released in April 2021)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Consultation paper on the Unified Health Interface (UHI) (released in December 2022)&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Along with these policies, in 2022, the NHA released the NHA Data Sharing Guidelines for the Pradhan Mantri Jan Aarogya Yojana (PM-JAY) – India’s state health insurance policy.&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;However these &lt;b&gt;draft guidelines repeat the pattern of earlier policies&lt;/b&gt; &lt;b&gt;on health data&lt;/b&gt;, wherein there is no reference to the policies that predated it; the PM-JAY’s Data Sharing Guidelines, published in August 2022, did not even refer to the draft National Digital Health Data Management Policy (published in April 2022).&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Interestingly, the recent health data policies do not mention CoWIN.&lt;/b&gt; Failing to cross-reference or mention preceding policies creates a lack of clarity on which documents are being used as guidelines by healthcare providers.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Can a Data Protection Bill Be the Solution?&lt;/h3&gt;
&lt;p&gt;The draft Data Protection Bill, 2021, defined health data as “…the data related to the state of physical or mental health of the data principal and &lt;b&gt;includes records regarding the past, present or future state of the health of such data principal&lt;/b&gt;, data collected in the course of registration for, or provision of health services, data associated with the data principal to the provision of specific health services.”&lt;/p&gt;
&lt;p&gt;However, this definition as well as the definition of sensitive personal data was removed from the current version of the Bill (Digital Personal Data Protection Bill, 2022).&lt;/p&gt;
&lt;blockquote&gt;Omitting these definitions from the Bill removes a set of data which, if collected, warrants increased responsibility and increased liability. Handling of health data, financial data, government identifiers, etc, need to come with a higher level of responsibility as they are a list of sensitive details of a person.&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;The threats posed as a result of this data being leaked are not limited to spam messages or fraud and impersonation, but also of companies that can get a hand on this coveted data and gather insights and train their systems and algorithms, without the need to seek consent from anyone, or without facing the consequences of harm caused.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the current version of the draft DPDP Bill states that the data fiduciary shall notify the data principal of any breach, the draft Bill also states that the Data Protection Board “may” direct the data fiduciary to adopt measures that remedy the breach or mitigate harm caused to the data principal.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Bill also prescribes penalties of upto Rs 250 crore if the data fiduciary fails to take reasonable security safeguards to prevent a personal data breach, and a penalty of upto Rs 200 crore if the fiduciary fails to notify the data protection board and the data principal of such breach.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While &lt;b&gt;these steps, if implemented through legislation, would make organisations processing data take their data security more seriously&lt;/b&gt;, the removal of sensitive personal data from the definition of the Bill, would mean that data fiduciaries processing health data will not have to take additional steps other than reasonable security safeguards.&lt;/p&gt;
&lt;p&gt;The &lt;b&gt;absence of a clear indication of security standards&lt;/b&gt; will affect data principals and fiduciaries.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Looking to bring more efficiency to governance systems, the Centre launched the Digital India Mission in 2015. The press release by the central government reporting the approval of the programme by the Cabinet of Ministers speaks of ‘cradle to grave’ digital identity as one of its vision areas.&lt;/p&gt;
&lt;p&gt;The ambitious Universal Health ID and health data management policies are an example of this digitisation mission.&lt;/p&gt;
&lt;blockquote&gt;However breaches like this are reminders that without proper data security measures, and a system for having a person responsible for data security, the data is always vulnerable to an attack.&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;While the UK and Australia have also seen massive data breaches in the past, India is at the start of its health data digitisation journey and has the ability to set up strong security measures, employ experienced professionals, and establish legal resources to ensure that data breaches are minimised and swift action can be taken in case of a breach.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The first step&lt;/b&gt; to understand the vulnerabilities would be to present the CERT-In reports of this breach, and guide other institutions to check for the same so that they are better prepared for future breaches and attacks.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/quint-shweta-mohandas-and-pallavi-bedi-june-19-2023-cowin-data-breach-health-sensitive-details-policies-solution'&gt;https://cis-india.org/internet-governance/blog/quint-shweta-mohandas-and-pallavi-bedi-june-19-2023-cowin-data-breach-health-sensitive-details-policies-solution&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Shweta Mohandas and Pallavi Bedi</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2023-07-04T09:39:03Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-fundamental-right-to-privacy-a-visual-guide">
    <title>The Fundamental Right to Privacy - A Visual Guide</title>
    <link>https://cis-india.org/internet-governance/blog/the-fundamental-right-to-privacy-a-visual-guide</link>
    <description>
        &lt;b&gt;Privacy is the ability of an individual or group to seclude themselves, or information about themselves, and thereby express themselves selectively. This visual guide to the story of privacy law in India and the recent judgement of the Puttaswamy v.
Union of India case is developed by Amber Sinha (research and content) and Pooja Saxena (design and conceptualisation).

&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;The Fundamental Right to Privacy - A Visual Guide: &lt;a href="https://cis-india.org/internet-governance/files/amber-sinha-and-pooja-saxena-the-fundamental-right-to-privacy-a-visual-guide/at_download/file"&gt;Download&lt;/a&gt; (PDF)&lt;/h4&gt;
&lt;hr /&gt;
&lt;iframe src="//www.slideshare.net/slideshow/embed_code/key/1MMYCXyxa2YBip" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" height="485" width="595"&gt; &lt;/iframe&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-fundamental-right-to-privacy-a-visual-guide'&gt;https://cis-india.org/internet-governance/blog/the-fundamental-right-to-privacy-a-visual-guide&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>amber</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Data Governance</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    

   <dc:date>2018-02-16T05:31:37Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/a-series-of-op-eds-on-data-protection">
    <title>A Series of Op-eds on Data Protection</title>
    <link>https://cis-india.org/internet-governance/blog/a-series-of-op-eds-on-data-protection</link>
    <description>
        &lt;b&gt;I wrote a short series of three op-eds for Asia Times this week.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The first article "&lt;a class="external-link" href="http://www.atimes.com/user-consent-key-data-protection-india/"&gt;User consent is the key to data protection in India&lt;/a&gt;" examines the debate around consent and the arguments made to discard it. I question the premise of big data exceptionalism, particularly in the absence of any mature governance models which address use regulation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the second article "Robust economic argument for a sound Indian data protection law", I examine the substance of the argument of 'innovation' as a legitimate competing interest with respect to privacy, and questionthe economic arguments made in support of innovation enabled by unregulated access to data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the third article "&lt;a class="external-link" href="http://www.atimes.com/indias-data-protection-needs-graded-enforcement-mechanism/"&gt;India’s data protection law needs graded enforcement mechanism&lt;/a&gt;", I look at the two competing arms of regulation - enforcement and compliance, and how a balance of two is need in India,with an empowered regulator and drawing from the principles from responsive regulation theory.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/a-series-of-op-eds-on-data-protection'&gt;https://cis-india.org/internet-governance/blog/a-series-of-op-eds-on-data-protection&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>amber</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Data Governance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-02-19T02:08:28Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/does-the-safe-harbor-program-adequately-address-third-parties-online">
    <title>Does the Safe-Harbor Program Adequately Address Third Parties Online?</title>
    <link>https://cis-india.org/internet-governance/blog/does-the-safe-harbor-program-adequately-address-third-parties-online</link>
    <description>
        &lt;b&gt;While many citizens outside of the US and EU benefit from the data privacy provisions the Safe Harbor Program, it remains unclear how successfully the program can govern privacy practices when third-parties continue to gain more rights over personal data.  Using Facebook as a site of analysis, I will attempt to shed light on the deficiencies of the framework for addressing the complexity of data flows in the online ecosystem. &lt;/b&gt;
        
&lt;p&gt;To date, the EU-US Safe Harbor Program leads in governing
the complex and multi-directional flows of personal information online. &amp;nbsp;&amp;nbsp;As commerce began to thrive in the online
context, the European Union was faced with the challenge of ensuring that personal
information exchanged through online services were granted
levels of protect on par with provisions set out in EU privacy law.&amp;nbsp; This was important, notably as the piecemeal
and sectoral approach to privacy legislation in the United states was deemed incompatible
with the EU approach.&amp;nbsp; While the Safe
Harbor program did not aim to protect the privacy of citizens outside of the
European Union per say, the program has in practice set minimum standards for
online data privacy due to the international success of American online
services.&lt;/p&gt;

&lt;p&gt;While many citizens outside of the US and EU benefit from
the Safe Harbor Program, it remains unclear how successful the program will be in an
online ecosystem where third-parties are being granted increasingly more rights
over the data they receive from first parties.&amp;nbsp;
Using Facebook as a site of analysis, I will attempt to shed light on
the deficiencies of the framework for addressing the complexity of data flows
in the online ecosystem.&amp;nbsp; First, I will argue
that the safe harbor program does not do enough to ensure that participants are
held reasonably responsible third party privacy practices.&amp;nbsp; Second, I will argue that the information
asymmetries created between first party sites, citizens, and governance bodies
vis-à-vis third parties obscures the application of the Safe Harbor Model.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;The EU-US
Safe-Harbor Agreement&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;In 1995, and based on earlier &lt;a href="http://www.oecd.org/document/18/0,3343,en_2649_34255_1815186_1_1_1_1,00.html"&gt;OECD
guidelines&lt;/a&gt;, the EU Data Directive on the “protection of individuals with
regard to the processing of personal data and the free movement of such data”
was passed&lt;a name="_ednref1" href="#_edn1"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; [1].&amp;nbsp; The original purpose of the EU Privacy
Directive was not only to increase privacy protection within the European
Union, but to also promote trade liberalization and a single integrated market
in the EU.&amp;nbsp; After the Data Directive was
passed, each member state of the EU incorporated the principles of
the directive into national laws accordingly.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;While the Directive was successful in harmonizing data
privacy in the European Union, it also embodied extraterritorial
provisions, giving in reach&lt;a name="_ednref2" href="#_edn2"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; beyond the EU.&amp;nbsp; Article 25 of the Directive states that the
EU commission may ban data transfers to third countries that do not ensure “an
adequate level of protect’ of data privacy rights&lt;a name="_ednref3" href="#_edn3"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; [2].&amp;nbsp; Also, Article 26 of the Directive, expanding
on Article 25, states that personal data cannot be &lt;em&gt;transferred &lt;/em&gt;to a country that “does not ensure an adequate level of
protection” if the data controller does not enter into a contract that adduces
adequate privacy safeguards&lt;a name="_ednref4" href="#_edn4"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; [3].
&amp;nbsp;&lt;/p&gt;
&lt;p&gt;In light of the increased occurrence of cross-border
information flows, the Data Directive itself was not effective enough to ensure that
privacy principles were enforced outside of the EU.&amp;nbsp; Articles 25 and 26 of the Directive had essentially deemed all cross-border data-flows to the US in contravention of EU privacy law.&amp;nbsp; Therefor, the EU-US Safe-Harbor was established by the
EU Council and the US Department of Commerce as a way of mending the variant
levels of privacy protection set out in these jurisdictions, while also promoting
online commerce.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Social Networking
Sites and the Safe-Harbor Principles&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The case of social networking sites exemplifies the ease
with which data is transferred, processed, and stored between jurisdictionas.&amp;nbsp; While many of the top social networking sites
are registered American entities, they continue to attract users not only from
the EU, but also internationally.&amp;nbsp; In agreement
to the EU law, many social networking sites, including LinkedIn, Facebook,
Myspace, and Bebo, now adhere to the principles of the program.&amp;nbsp; The enforcement of the Safe Harbor takes
place in the United States in accordance with U.S. law and relies, to a great
degree, on enforcement by the private sector.&amp;nbsp;
TRUSTe, an independent certification program and dispute mechanism, has become the most popular governance mechanism for the safe harbor program
among social networking sites.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Drawing broadly on the principles embodied within the EU
Data Directive and the OECD Guidelines, the seven principles of the Safe-Harbor
were developed.&amp;nbsp; These principles include
Notice, Choice, Onward Transfer, Access and Accuracy, Security, Data Integrity
and Enforcement.&amp;nbsp;&amp;nbsp; The principle of “Notice”
sets out that organizations must inform individuals about the purposes for
which it collects and uses information about them, how to contact the
organization with any inquiries or complaints, the types of third parties to
which it disclosures the information, and the choices and means the organization
offers individuals for limiting its use and disclosure.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;“Choice” ensures that individuals have the opportunity to
choose to opt out whether their personal information is disclosed to a third
party, and to ensure that information is not used for purposes incompatible with the purposes for
which it was originally collected.&amp;nbsp; The
“Onward Transfer” principle ensures that third parties receiving information
subscribes to the Safe Harbor principles, is subject to the Directive, or
enters into a written agreement which requires that the third party provide at
least the same level of privacy protection as is requires by the relevant
principles.&lt;/p&gt;
&lt;p&gt;The principles of “Security” and “Data Integrity” seek to
ensure that reasonable precautions are taken to protect the loss or misuse of
data, and that information is not used in a manner which is incompatible with
the purposes for it is has been collected—minimizing the risk that personal
information would be misused or abused.&amp;nbsp;&amp;nbsp;&amp;nbsp;
Individuals are also granted the right, through the access principle, to
view the personal information about them that an organization holds, and to
ensure that it is up-to-date and accurate.&amp;nbsp;
The “Enforcement” principle works to ensure that an effective mechanism
for assuring compliance with the principles, and that there are consequences
for the organization when the principles are not followed.&lt;/p&gt;
&lt;p&gt;The principles of the program are rather quite clear and
enforceable in the first party context, despite some prevailing ambiguities.&amp;nbsp; The privacy policies of most social
networking services have become increasingly clear and straightforward since
their inception.&amp;nbsp; Facebook, for example,
has revamped its &lt;a href="http://www.facebook.com/privacy/explanation.php"&gt;privacy
regime&lt;/a&gt; several times, and gives explicit notice to users how their
information is being used.&amp;nbsp; The privacy
policy also explains the relationship between third parties and your personal information—including
how it may be used by advertisers, search engines, and fellow members.&amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;With respect to third party advertisers, principles of
“choice” are clearly granted by most social networking services.&amp;nbsp; For example, the &lt;a href="http://www.networkadvertising.org/"&gt;Network Advertising Initiative&lt;/a&gt;, a
self-regulatory initiative of the online advertising industry, clearly lists
its member websites and allows individuals to opt out of any targeted
advertising conducted by its members.&amp;nbsp; In
Facebook’s description of “cookies” in their privacy policy, a direct link to NAI’s
opt out features is given, allowing individuals to make somewhat informed
choices about their participation in such programs.&amp;nbsp; This point is, of course, in light of the
fact that most users do not read or understand the privacy policies provided by
social networking sites&lt;a name="_ednref5" href="#_edn5"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; [4].
It is also important to note that Google—a major player in the online
advertising business, does not grant users of Buzz and Orkut the same “opt-out”
options as sites such as Facebook and Bebo.&lt;/p&gt;
&lt;p&gt;Under the auspices of the US Federal Trade Commission, the
Safe Harbor Program has also successfully investigated and settled several
privacy-related breaches which have taken place on social networking sites.&amp;nbsp; Of the most famous cases is &lt;a href="http://www.beaconclasssettlement.com/"&gt;Lane et al. v. Facebook et al.&lt;/a&gt;,
which was a class action suit brought against Facebook’s Beacon Advertising
program.&amp;nbsp; The US Federal Trade Commission
was quick to insight an investigation of the program after many privacy groups
and individuals became critical of its questionable advertising practices.&amp;nbsp; The Beacon program was designed to allow
Facebook users to share information with their friends about actions taken on
affiliated, third party sites.&amp;nbsp; This had included,
for example, the movie rentals a user had made through the Blockbuster website.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The Plaintiffs filed a suit, alleging that Facebook and its
affiliates did not give users adequate notice and choice about Beacon and the
collection and use of users’ personal information. &amp;nbsp;&amp;nbsp;&amp;nbsp;The Beacon program was ultimately found to
be in breach of US law, including the &lt;a href="http://epic.org/privacy/vppa/"&gt;Video
Privacy Protection Act&lt;/a&gt;, which bans the disclosure of personally identifiable
rental information.&amp;nbsp; Facebook has
announced the settlement of the lawsuit, not bringing individual settlements,
but a marked end to the program and the development of a 9.5 million dollar &lt;a href="http://www.p2pnet.net/story/37119"&gt;Facebook Privacy Fund&lt;/a&gt; dedicated to
privacy and data-related issues.&amp;nbsp; Other privacy
related investigations of social networking sites launched by the FTC under the
Safe Harbor Program include Facebook’s &lt;a href="http://www.eff.org/deeplinks/2009/12/facebooks-new-privacy-changes-good-bad-and-ugly"&gt;privacy
changes&lt;/a&gt; in late 2009, and the Google’s recently released &lt;a href="http://www.networkworld.com/news/2010/032910-lawmakers-ask-for-ftc-investigation.html"&gt;Buzz
application&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Despite the headway the Safe Harbor is making, many privacy
related questions remain ambiguous with respect to the responsibilities social networking
sites through the program.&amp;nbsp; For example,
Bebo &lt;a href="http://www.bebo.com/Privacy2.jsp"&gt;reserves the right&lt;/a&gt; to
supplement a social profile with addition information collected from publicly
available information and information from other companies.&amp;nbsp; Bebo’s does adhere to the “notice principle”—as
it makes know to users how their information will be used through their privacy
policy. However, it remains unclear if appropriate disclosures are given by Bebo
as required by Safe Harbor Framework, notably as the sources of “publicly
available information” as a concept remains broad and obscured in the privacy policy.&amp;nbsp; It is also unclear whether or not Bebo users
are able to, under the “Choice” principle, refuse to having their profiles from
being supplemented by other information sources.&amp;nbsp; Also, under the “access
principle”, do individuals have the right to review all information held about them as “Bebo
users”?&amp;nbsp; The right to review information
held by a social networking site is an important one that should be upheld.&amp;nbsp; This is most notable as supplementary information
from outside social networking services is employed &amp;nbsp;to profile individual users in ways which may
work to categorize individuals in undesirable ways.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;The Third Party Problem&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Cooperation between social networking sites and the Safe
Harbor has improved, and most of these sites now have privacy policies which
explicitly address the principles of the Program.&amp;nbsp;&amp;nbsp; It should also be noted that public interest
groups, such as Epic, the Center for Digital Democracy, and The Electronic
Frontier Foundation, have played a key role in ensuring that data privacy
breaches are brought to the attention of the FTC under the program.&amp;nbsp; While the program has somewhat adequately
addressed the privacy practices of first party participants, the number of
third parties on social networking sites calls into question the
comprehensiveness and effectiveness of the Safe Harbor program.&amp;nbsp; Facebook itself as a first party site may adhere
to the Safe Harbor Program.&amp;nbsp; However, its
growing number third party platform members may not always adhere to best practices
in the field, nor can Facebook or the Safe Harbor Program guarantee that they
do so.&lt;/p&gt;
&lt;p&gt;The Safe Harbor Program does require that all participants
take certain security measures when transferring data to a third party.&amp;nbsp; Third parties must either subscribe to the
safe harbor principles, or be subject to the EU Data Directive.&amp;nbsp; Alternatively, an organization can may also
enter into a written agreement with a third party requiring that they provide
at least the same level of privacy protection as is required by program
principles.&amp;nbsp; Therefore, third parties of
participating program sites are, de facto, bound by the safe harbor principles by
the way of entering into agreement with a first party participant of the
program. &amp;nbsp;This is the approach taken by
most social networking sites and their third parties.&lt;/p&gt;
&lt;p&gt;It is important to note, however, that third parties are not
governed directly by the regulatory bodies, such as the FTC.&amp;nbsp; The safe harbor website also &lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018476.asp"&gt;explicitly notes&lt;/a&gt;
that the program does not apply to third parties.&amp;nbsp; Therefore, as per these provisions, Facebook must
adhere to the principles of the program, while its third party platform members
(such as social gaming companies), only must do so indirectly as per a separate
contract with Facebook.&amp;nbsp; The
effectiveness of this indirect mode of governing of third party privacy
practices is questionable for numerous reasons.&lt;/p&gt;
&lt;p&gt;Firstly, while Facebook does take steps to ensure that
third parties use information from Facebook in a manner which is consistent to
the safe harbor principles, the company explicitly &lt;a href="http://www.facebook.com/policy.php"&gt;waives any guarantee&lt;/a&gt; that third
parties will “follow their rules”. &amp;nbsp;&amp;nbsp;Prior to allowing third parties to access any
information about users, Facebook requires third parties to &lt;a href="http://www.facebook.com/terms.php"&gt;agree to terms&lt;/a&gt; that limit their
use of information, and also use technical measures to ensure that they only
obtain authorized information.&amp;nbsp;&amp;nbsp; Facebook
also warns users to “always review the policies of third party applications and
websites to make sure you are comfortable with the ways in which they use
information”.&amp;nbsp; Not only are users
required to read the privacy policies of every third party application, but are
also expected to report applications which may be in violation of privacy
principles.&amp;nbsp; In this sense, Facebook not
only waives responsibility for third party privacy breaches, but also places further
regulatory onus upon the user.&lt;/p&gt;
&lt;p&gt;As the program guidelines express, the safe harbor relies to
a great degree on enforcement by the private sector.&amp;nbsp; However, it is likely that a self-regulatory
framework may lead the industry into a state of regulatory malaise.&amp;nbsp; Under the safe harbor program, Facebook must
ensure that the privacy practices of third parties are adequate.&amp;nbsp; However, at the same time, the company may
simultaneously waiver their responsibility for third party compliance with safe
harbor principles.&amp;nbsp; Therefore, it remains
questionable as to where responsibility for third parties exactly lies.&amp;nbsp; When third parties are not directly
answerable to the governing bodies of safe harbor program, and when first parties
can to waive responsibility for their practices, from where does the incentive to
effectively regulate third parties to come from?&amp;nbsp;&lt;/p&gt;
&lt;p&gt;While Facbeook may in fact take reasonable legal and technical
measures to ensure third party compliance, the room for potential dissonance
between speech and deed&amp;nbsp; is worrisome.&amp;nbsp; Facebook is required to ensure that third
parties provide “&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018476.asp"&gt;at least the same
level of privacy protection&lt;/a&gt;” as they do.&amp;nbsp;
However, in practice, this has yet to become the case.&amp;nbsp; A quick survey of twelve of the most popular
Platform Applications in the gaming category showed&lt;a name="_ednref6" href="#_edn6"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;
that third parties are not granting their users the “same level of privacy
protection”[5].&amp;nbsp; For example, section 9.2.3
of Facebooks “&lt;a href="http://www.facebook.com/terms.php"&gt;Rights and
Responsibilities&lt;/a&gt;” for Developers/Operators of applications/sites states
that they must “have a privacy policy or otherwise make it clear to users what
user data you are going to use and how you will use, display, or share that
data”.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;However, out of the 12 gaming applications surveyed, four
companies failed to make privacy policies available to users &lt;em&gt;before&lt;/em&gt; they granted the application
access to the personal information, including that of their friends&lt;a name="_ednref7" href="#_edn7"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; [6].&amp;nbsp; After searching for the privacy policies on
the websites of each of the four social gaming companies, two completely failed
to post privacy policies on their central websites. &amp;nbsp;&amp;nbsp;This practice is in direct breach of the
contract made between these companies and Facebook, as mentioned above.&amp;nbsp; In addition to many applications failing to clearly
post privacy policies, many of provisions set out in these policies were
questionable vis-à-vis safe harbor principles.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;For example Zynga, makes of popular games Mafia Wars and
Farmville, reserve the right to “maintain copies of your content
indefinitely”.&amp;nbsp; This practice remains contrary
to Safe Harbor principles which states that information should not be kept for
longer than required to run a service.&amp;nbsp;
Electronic Arts also maintains similar provisions for data retention in
its privacy policy.&amp;nbsp;&amp;nbsp; Such practices are
rather worrisome also in light of the fact that both companies also reserve the
right to collect information on users from other sources to supplement profiles
held.&amp;nbsp; This includes (but is not limited
to) newspapers and Internet sources such as blogs, instant messaging services, and
other games.&amp;nbsp;&amp;nbsp; It is also notable to
mention that only one of the twelve social gaming companies surveyed directly
participates in the safe harbor program.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;In addition to the difficulties of ensuring that safe harbor
principles are adhered to by third parties, the information asymmetries which
exist between first party sites, citizens, and governance bodies vis-à-vis
third parties complicate this model.&amp;nbsp; Foremost,
it is clear that Facebook, despite its resources, cannot keep tabs on the
practices of all of their applications.&amp;nbsp;&amp;nbsp;
This puts into question if industry self-regulation can really guarantee
that privacy is respected by third parties in this context.&amp;nbsp; Furthermore, the lack of knowledge or
understanding held by citizens about how third parties user their information
is particularly problematic when a system relies so heavily on users to report
suspected privacy breaches.&amp;nbsp; The same is
likely to be true for governments, too.&amp;nbsp; As
one legal scholar, promoting a more laisse-fair approach to third party
regulation, notes—multiple and invisible third party relationships presents
challenges to traditional forms of legal regulation&lt;a name="_ednref8" href="#_edn8"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; [7].&amp;nbsp;&lt;/p&gt;
&lt;p&gt;In an “open “social ecosystem, the sheer volume of data
flows between users of social networking sites and third party players appears
to have become increasingly difficult to effectively regulate.&amp;nbsp; While the safe harbor program has been
successful in establishing best practices and minimum standards for data
privacy, it is also clear that governance bodies, and public interest groups,
have focused most attention on large industry players such as Facebook.&amp;nbsp; This has left smaller third party players on
social networking sites in the shadows of any substantive regulatory concern.&amp;nbsp; &amp;nbsp;&amp;nbsp;If
one this has become clear, it is the fact that governments may no longer be
able to effectively govern the flows of data in the burgeoning context of “open
data”.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;As I have demonstrated, it remains questionable whether or
not Facebook can regulate third parties data collection practices
effectively.&amp;nbsp; Imposing more stringent
responsibilities on safe harbor participants could be a positive step.&amp;nbsp; It is reasonable to assume that it would be
undue to impose liability on social networking sites for the data breaches of
third parties.&amp;nbsp; However, it is not
unreasonable to require sites like Facebook go beyond setting “minimum
standards” for data privacy, towards taking a more active enforcement, if even
through TRUSTe or another regulatory body.&amp;nbsp;
If the safe harbor is to be effective, it cannot allow program participants
to simply wave the liability for third party privacy practices.&amp;nbsp; The indemnity granted to third parties on social
networking sites may deem the safe harbor program more effective in sustaining
the non-liability of third parties, rather than protecting the data privacy of
citizens.&lt;/p&gt;
&lt;div&gt;&lt;/div&gt;
&lt;div&gt;
&lt;hr align="left" size="1" width="33%" /&gt;

&lt;/div&gt;
&lt;p class="discreet"&gt;&lt;a name="_edn1" href="#_ednref1"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;[1] Official Directive 95/46/EC&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="_edn2" href="#_ednref2"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="_edn3" href="#_ednref3"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;[2] 95/46/EC&lt;/p&gt;
&lt;p class="discreet"&gt;[3] Ibid&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="_edn4" href="#_ednref4"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;a name="_edn5" href="#_ednref5"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;/span&gt;&lt;/a&gt;[4] See Acquisit,
A. a. (n.d.). Imagined Communities: Awareness, Information Sharing, and Privacy
on Facebook. &lt;em&gt;PET 2006&lt;/em&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="_edn6" href="#_ednref6"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;[5] Of the Privacy Policy browsed include, Zynga, Rock
You!, Crowdstar, Mind Jolt, Electronic Arts, Pop Cap Games, Slash Key, Playdom,
Meteor Games, Broken Bulb Studios, Wooga, and American Global Network.&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="_edn7" href="#_ednref7"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;[6] By adding an application, users are also sharing with
third parties the information of their friends if they do not specifically &amp;nbsp;opt out of this practice.&lt;/p&gt;
&lt;p class="discreet"&gt;[7]See&lt;strong&gt;
&lt;/strong&gt;&amp;nbsp;Milina, S. (2003).
Let the Market Do its Job: Advocating an Integrated Laissez-Faire Approach to
Online Profiling. &lt;em&gt;Cardozo Arts and Entertainment Law Journal&lt;/em&gt; .&lt;/p&gt;
&lt;pre&gt;&lt;/pre&gt;
&lt;div&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;/div&gt;
&lt;h2&gt;&amp;nbsp;&lt;/h2&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/does-the-safe-harbor-program-adequately-address-third-parties-online'&gt;https://cis-india.org/internet-governance/blog/does-the-safe-harbor-program-adequately-address-third-parties-online&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>rebecca</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Facebook</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Social Networking</dc:subject>
    

   <dc:date>2011-08-02T07:19:34Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/it-act-and-commerce">
    <title>IT Act and Commerce</title>
    <link>https://cis-india.org/internet-governance/blog/it-act-and-commerce</link>
    <description>
        &lt;b&gt;This is a guest post by Rahul Matthan, partner in the law firm Trilegal, and widely regarded as one of the leading experts on information technology law in India.  In this post, Mr. Matthan looks at the provisions in the amended Information Technology Act of interest to commerce, namely electronic signatures and data protection.&lt;/b&gt;
        
&lt;p&gt;This post analyses the amendments brought about to the Information Technology Act, 2000 (“IT Act 2000”) through the recent 2008 amendments (“IT Act 2008”).&lt;/p&gt;
&lt;h2&gt;Definitions&lt;/h2&gt;
&lt;p&gt;The IT Act 2008 has introduced a few additional definitions to the list of definitions originally included in the IT Act 2000. These definitions have either amplified the existing provisions or been introduced in order to address new issues required to be defined in the context of the newly introduced provisions in the statute. Some of the significant definitions have been discussed below:&lt;/p&gt;
&lt;h3&gt;Computer Network&lt;/h3&gt;
&lt;p&gt;The definition of “computer network” has been amended to specifically include the wireless interconnection of computers. While wireless technology did fall within the scope of the IT Act under the rather generic head of “other communication media”, the Amendment Act clarifies the scope of the IT Act by expressly including the term “wireless”.&lt;/p&gt;
&lt;h3&gt;Communication Devices&lt;/h3&gt;
&lt;p&gt;The IT Amendment Bill, 2006, had provided an explanation for “communication devices” under Section 66A. This definition has been moved into the definition section and now applies across all sections of the IT Act 2008. “Communication devices” is defined to mean “a cell phone, personal digital assistance (PDA) device or combination of both or any device used to communicate, send or transmit any text, video, audio or image”.&lt;/p&gt;
&lt;p&gt;There has been case law even under the IT Act that has held mobile phones to fall within the ambit of the IT Act, as a result of which all the provisions of the Act that apply to computers are equally applicable to mobile phones. This amendment only makes that position more explicit.&lt;/p&gt;
&lt;h2&gt;Electronic Signatures&lt;br /&gt;&lt;/h2&gt;
&lt;p&gt;One of the major criticisms of the IT Act 2000 was the fact that it was not a technology neutral legislation. This was specifically so in relation to the provisions in the IT Act 2000 relating to the use of digital signatures for the purpose of authentication of electronic records. The statute made specific reference to the use of asymmetric cryptosystem technologies in the context of digital signatures, and, in effect, any authentication method that did not use this technology was not recognised under the IT Act 2000.&lt;/p&gt;
&lt;p&gt;The IT Act 2008 has attempted to make this more technology neutral. In doing so, the attempt has been to bring the law in line with the United Nations Commission on International Trade Law Model Law on Electronic Signatures (“Model Law”).&lt;/p&gt;
&lt;h3&gt;Replacement of Digital Signatures&lt;/h3&gt;
&lt;p&gt;The first significant change in the IT Act 2008 is the replacement of the term “digital signatures” with “electronic signatures” in almost all the provisions in the IT Act 2000. In some provisions, reference continues to be made to digital signatures, but the net effect of the amendments is to treat digital signatures as a subset (or an example of one type) of electronic signatures.&lt;/p&gt;
&lt;p&gt;Electronic signatures have been defined as the authentication of an electronic record using the authentication techniques specified in the 2nd Schedule to the Act, provided they are reliable. &amp;nbsp;&lt;/p&gt;
&lt;p&gt;The reliability criterion has been introduced, very much along the lines of the Model Law. However, the contents of the 2nd Schedule are yet to be stipulated, which means that despite the existence of a reliability standard, the only authentication method available at this point in time is the digital signature regime.&lt;/p&gt;
&lt;h3&gt;Dual Requirement&lt;/h3&gt;
&lt;p&gt;One significant implication of this amendment is the introduction of a dual requirement – to meet the reliability standard as well as to be included in the 2nd Schedule. However, structuring the authentication procedures in this manner offsets the objective tests of neutrality borrowed from the Model Law, since an authentication method may meet the reliability test but will not be deemed to be legally enforceable unless it is notified in the 2nd Schedule.&lt;/p&gt;
&lt;p&gt;Additionally, there will be grounds for challenging electronic signatures that are notified to the 2nd Schedule, if it can be shown that the signature so notified is not reliable under the terms of the reliability criteria. This can act as an impediment to the recognition of electronic signatures by notification.&lt;/p&gt;
&lt;h3&gt;Emphasis on Digital Signatures&lt;/h3&gt;
&lt;p&gt;Another concern is the treatment of digital signatures in the post amendment statute. The IT Act 2008 continues to retain all the provisions relating to digital signatures within the main body of the statute. The term “digital signature” has not been uniformly substituted with “electronic signature” throughout the statute. In certain provisions this leads to a certain amount of absurdity, such as in those relating to representations made as to the issuance, suspension or revocation of digital signature certificates; due to the lack of uniformity, these principles now apply only to digital signatures and not to all types of electronic signatures. &amp;nbsp;&lt;/p&gt;
&lt;p&gt;It would have been preferable if the provisions relating to digital signatures had been moved in their entirety to the 2nd Schedule. Then, digital signatures would have become just another class of electronic signatures listed in the Schedule. By omitting to do this, the authors ensure that digital signature-specific provisions remaining in the main body of the statute challenge the technology neutrality of the statute.&lt;/p&gt;
&lt;h3&gt;Certifying Authorities&lt;/h3&gt;
&lt;p&gt;The IT Act 2008 has made the certifying authority the repository of all electronic signatures issued under the statute. Given that there are, at present, multiple certifying authorities, this provision is impractical. Instead, the statute should have either referred to the Controller of Certifying Authorities or should have been worded to state that each certifying authority would be the repository for all electronic signature certificates issued by it.&lt;/p&gt;
&lt;h3&gt;Impact on Other Statutes&lt;/h3&gt;
&lt;p&gt;Since the enactment of the IT Act 2000, amendments have been carried out in other statutes, relying on the concept of digital signatures. For instance, the Negotiable Instruments Act, 1881, makes the use of a digital signature essential for an electronic cheque.1 While the IT Act 2008 has expanded the scope of the available authentication measures, by introducing the technologically neutral concept of electronic signatures, corresponding amendments in other statutes like the Negotiable Instruments Act, 1881, will need to be carried out, so that they are not limited in their application to digital signatures.&lt;/p&gt;
&lt;h2&gt;Data Protection&lt;br /&gt;&lt;/h2&gt;
&lt;p&gt;Prior to the passing of the IT Act 2008, the concept of 'data protection' was not recognised in India. The amendments have now introduced some amount of legal protection for data stored in the electronic medium. This chapter analyses the changes sought to be introduced and their impact on data protection law in India.&lt;/p&gt;
&lt;h3&gt;Data under the IT Act 2000&lt;/h3&gt;
&lt;p&gt;The only provision under the IT Act 2000, which dealt with unauthorised access and damage to data, was Section 43. Under that section, penalties were prescribed in respect of any person who downloads copies or extracts data from a computer system, introduces computer contaminants or computer viruses into a computer system or damages any data residing in a computer system.&lt;/p&gt;
&lt;h3&gt;Data under the IT Act 2008&lt;/h3&gt;
&lt;p&gt;Under the IT Act 2008, far-reaching changes have been made in relation to data. Two sections have been inserted specifically for that purpose – Sections 43-A and 72-A, one dealing with the civil and the other with the criminal remedies in relation to the breach of data related obligations.&lt;/p&gt;
&lt;h3&gt;The Civil Remedies for Data Protection&lt;/h3&gt;
&lt;p&gt;The newly introduced Section 43-A reads as follows:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Compensation for failure to protect data - Where a body corporate, possessing, dealing or handling any sensitive personal data or information in a computer resource which it owns, controls or operates, is negligent in implementing and maintaining reasonable security practices and procedures and thereby causes wrongful loss or wrongful gain to any person, such body corporate shall be liable to pay damages by way of compensation, to the person so affected.&lt;/p&gt;
&lt;p&gt; Explanation - For the purposes of this section:&lt;/p&gt;
&lt;p&gt; (i)&amp;nbsp; “Body Corporate” means any company and includes a firm, sole proprietorship or other association of individuals engaged in commercial or professional activities;&lt;/p&gt;
&lt;p&gt;(ii) “Reasonable Security Practices and Procedures” means security practices and procedures designed to protect such information from unauthorised access, damage, use, modification, disclosure or impairment, as may be specified in an agreement between the parties or as may be specified in any law for the time being in force and in the absence of such agreement or any law, such reasonable security practices and procedures, as may be prescribed by the Central Government in consultation with such professional bodies or associations as it may deem fit; and&lt;/p&gt;
&lt;p&gt;(iii)&amp;nbsp; “Sensitive Personal Data or Information” means such personal information as may be prescribed by the Central Government in consultation with such professional bodies or associations as it may deem fit.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;While at first this provision appears to address several long standing concerns relating to data protection in India, there are several insidious flaws that could affect the development of a data protection jurisprudence in the country.&lt;/p&gt;
&lt;h3&gt;Non-Electronic Data&lt;/h3&gt;
&lt;p&gt;In the first instance, there is no mention, under this provision, of non-electronic data. Most international data protection statutes recognise and protect data stored in any electronic medium or a relevant filing system (including, for instance, a salesperson's diary). The newly introduced provisions of the IT Act 2008 do not provide any protection for data stored in a non-electronic medium.&lt;/p&gt;
&lt;p&gt;It could be argued that given the legislative focus of this statute (it has been called the Information Technology Act with a reason), it would be inappropriate to include within this statute protection for forms of data that do not relate to the digital or electronic medium. While that argument is valid to many who look to the new provisions introduced in the IT Act 2008 as the answer to the data protection concerns that the country has been facing all these years, their enthusiasm must be tempered as these new provisions merely provide solutions for electronic data.&lt;/p&gt;
&lt;h3&gt;Classification of Data&lt;/h3&gt;
&lt;p&gt;Most international data protection statutes distinguish between different levels of personal data – specifying difference levels of protection for personal information and sensitive personal information. Depending on whether the data can be classified as one or the other, they have different levels of protection, as loss, unauthorised access or disclosure of sensitive personal information is considered to have a deeper impact on the data subject. &amp;nbsp;&lt;/p&gt;
&lt;p&gt;The new provisions of the IT Act 2008 make no such distinction. Section 43-A applies to all “sensitive personal data or information” but does not specify how personal data not deemed to be sensitive is to be treated. In essence, personal information and sensitive personal information do not appear to be differentially treated in the context of data protection.&lt;/p&gt;
&lt;h3&gt;Consequences&lt;/h3&gt;
&lt;p&gt;Under most international data protection statutes, the person in “control” of the data is liable for the consequences of disclosure, loss or unauthorised access to such information. This ensures that liability is restricted to those who actually have the ability to control the manner in which the data is treated. &amp;nbsp;&lt;/p&gt;
&lt;p&gt;However, under the new provisions of the IT Act 2008, the mere possession of information and its subsequent misuse would render any person who possesses this data liable to damages. While there is likely to be a debate on what constitutes possession and how this differs from control, there can be little doubt that by referring to “possession” in addition to “operation” and “control”, the IT Act 2008 appears to have widened the net considerably.&lt;/p&gt;
&lt;h3&gt;Negligence in Implementing Security Practices&lt;/h3&gt;
&lt;p&gt;Section 43-A specifically places liability on a body corporate only if such body corporate has been negligent in implementing its security practices and procedures in relation to the data possessed, controlled or handled by it. The choice of language here is significant. The statute specifically refers to the term “negligence” in relation to the security practices and procedures as opposed to stipulating a clear, pass-fail type obligation to conform.&lt;/p&gt;
&lt;p&gt;There is a significant difference between the terms “negligence to implement” and “failure to implement”. The former can only result in a breach if the body corporate that was required to follow reasonable security practices with regard to the data in its possession or control does not perform the required action and it can be proved that a reasonable man in the same circumstances would have performed the required action. If a body corporate is to be made liable under the provisions of this Section, it is not enough to demonstrate that security procedures were not followed; it has to be proved in addition that the body corporate was negligent.&lt;/p&gt;
&lt;h3&gt;Wrongful Loss and Gain&lt;/h3&gt;
&lt;p&gt;The Section appears to have been constructed on the basis that a breach has occurred in the event that any “wrongful gain” or “wrongful loss” was suffered. These terms have not been defined either under statutes or through any judicial precedents in the civil context. However, these terms do have a definition under criminal law in India. The Indian Penal Code, 1860 (“IPC”), defines “Wrongful Gain” to mean gain, by unlawful means, of property to which the person gaining is not legally entitled; and “Wrongful Loss” to mean the loss by unlawful means of property to which the person losing it is legally entitled.&lt;/p&gt;
&lt;p&gt;There does not appear to be any greater significance in the use of these terms even though they are typically found in criminal statutes. Therefore, apart from the slight ambiguity as to purpose, their use in the IT Act does not appear to have any great significance.&lt;/p&gt;
&lt;h3&gt;Limitation on Liability&lt;/h3&gt;
&lt;p&gt;The provisions of Section 43 originally had the total liability for a breach capped at Rs. 5,00,00,000 (five crore rupees). The original text of Section 43-A had the same limitation of liability in respect of its data protection provisions. Before the bill was passed into law, this limitation was removed and now a breach of Section 43-A is not subject to any limitation of liabilities.&lt;/p&gt;
&lt;h3&gt;Reasonable Security Practices and Procedures&lt;/h3&gt;
&lt;p&gt;Section 43-A makes a reference to “reasonable security practices and procedures” and stipulates that a breach has been caused only if such practices and procedures have not been followed. There are three methods by which reasonable security practices and procedures can be established:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt; By agreement;&lt;/li&gt;&lt;li&gt;By law; and&lt;/li&gt;&lt;li&gt;By prescription by the Central Government.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;br /&gt;As there is no law in India which sets out an appropriate definition for the term and since it will be some time before which the Central Government comes out with necessary regulations, it would appear that the only option available is for the parties to arrive at an agreement as to how the sensitive personal data and information exchanged under their contract is to be handled.&lt;/p&gt;
&lt;p&gt;As a corollary, till such time as the government establishes the necessary rules in relation to these security practices and procedures, if a body corporate does not enter into an agreement with the person providing the information as to the reasonable security practices and procedures that would apply, the body corporate cannot be brought within the purview of this section for any loss or damage to data.&lt;/p&gt;
&lt;h3&gt;The Criminal Remedies for Unlawful Disclosure of Information&lt;/h3&gt;
&lt;p&gt;In addition to the civil remedies spelled out in such detail in Section 43-A, the newly introduced provisions of Section 72-A of the IT Act 2008 could be used to impose criminal sanctions against any person who discloses information in breach of a contract for services. While not exactly a data protection provision in the same way that Section 43-A is, there are enough similarities in purpose to achieve the same result.&lt;/p&gt;
&lt;p&gt;Section 72-A reads:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt; Punishment for Disclosure of information in breach of lawful contract - Save as otherwise provided in this Act or any other law for the time being in force, any person including an intermediary who, while providing services under the terms of lawful contract, has secured access to any material containing personal information about another person, with the intent to cause or knowing that he is likely to cause wrongful loss or wrongful gain discloses, without the consent of the person concerned, or in breach of a lawful contract, such&amp;nbsp; material to any other person shall be punished with imprisonment for a term which may extend to three years, or with a fine which may extend to Rupees five lakh, or with both.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;In substance, this provision appears to be focused on providing criminal remedies in the context of breach of confidentiality obligations under service contracts; given that the section specifically refers to the disclosure of personal information obtained under that service contract, it is fair to classify this as a provision that addresses data protection issues.&lt;/p&gt;
&lt;h3&gt;Personal Information&lt;/h3&gt;
&lt;p&gt;The IT Act 2008 does not define “personal information”. Equally, there are no judicial precedents that provide any clarity on the term. The Right to Information Act, 2005 does provide a definition for “personal information”, but that definition is inappropriate in the context of the IT Act 2008. In the absence of a useable definition for the term “personal information”, it becomes difficult to assess the scope and ambit of the provision and in particular to understand the extent to which it is enforceable.&lt;/p&gt;
&lt;h3&gt;"Willful"&lt;/h3&gt;
&lt;p&gt;The section would only apply to persons who willfully disclose personal information and cause wrongful loss or gain. Hence, in order to make a person liable it has to be proved that the person disclosing the personal information did so with an intention to cause wrongful loss or gain. It would be a valid defense to claim that any loss caused was unintentional.&lt;/p&gt;
&lt;h3&gt;Service Contracts&lt;/h3&gt;
&lt;p&gt;The section appears to be particular about the fact that it only applies in the context of personal information obtained under a contract for services. This appears to rule out confidential information (that is not of a personal nature) that has been received under any other form of agreement (including, for example, a technology license agreement). The section is clearly intended to protect against the misuse of personal information and cannot be adapted to provide a wider level of protection against all breaches of confidential information. That said, employers now have a much stronger weapon against employees who leave with the personal records of other fellow employees.&lt;/p&gt;
&lt;h3&gt;Consent&lt;/h3&gt;
&lt;p&gt;This section also clearly applies only to those disclosures of personal information with the intent to cause wrongful loss or gain which have taken place without the consent of the person whose personal information is being disclosed. What remains to be seen is how the law will deal with situations where a general consent for disclosures has been obtained at the time of recruitment.&lt;/p&gt;
&lt;p&gt;Such clauses are made effective around the world by including opt in and opt out clauses, to allow the employee to either expressly agree to the disclosure of his personal information or to specifically exclude himself from the ambit of any such disclosures.&lt;/p&gt;
&lt;h3&gt;Media of Material&lt;/h3&gt;
&lt;p&gt;This section, unlike several other provisions of the IT Act 2008, deals with all manner of materials without requiring them to be digital. However, while disclosure of information stored in the non-electronic medium has been recognised, in the absence of a clear definition of personal information, it is difficult to ascertain the application and enforcement of this section.&lt;/p&gt;
&lt;h3&gt;What’s Missing&lt;/h3&gt;
&lt;p&gt;In order to be a truly effective data protection statute, the IT Act 2008 must include provisions relating to the collection, circumstances of collection, control, utilisation and proper disposal of data. At present the statute is silent about these aspects. In many ways, the statute addresses the particular concerns of companies or corporate entities looking for protection in relation to data outsourced to any other corporate entity for processing. Within these specific parameters the statute works well. However it does little to protect the average citizen of the country from the theft of personal data. Until we have statutory recognition of these issues, we will not be able to say that we have an effective data protection law in India.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/it-act-and-commerce'&gt;https://cis-india.org/internet-governance/blog/it-act-and-commerce&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Digital Governance</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Authentication</dc:subject>
    
    
        <dc:subject>Security</dc:subject>
    

   <dc:date>2011-08-02T07:41:45Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/privacy-policy-framework-for-indian-metal-health-apps">
    <title>Privacy Policy Framework for Indian Mental Health Apps </title>
    <link>https://cis-india.org/internet-governance/blog/privacy-policy-framework-for-indian-metal-health-apps</link>
    <description>
        &lt;b&gt;This report analyses the privacy policies of mental health apps in India and provides recommendations for making the policies not only legally compliant but also user-centric&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The report’s findings indicate a significant gap in the structure and content of privacy policies in Indian mental health apps. This highlights the need to develop a framework that can guide organisations in developing their privacy policies. Therefore, this report proposes a holistic framework to guide the development of privacy policies for mental health apps in India. It focuses on three key segments that are an essential part of the privacy policy of any mental health app. First, it must include factors considered essential by the Digital Personal Data Protection Act 2023 (DPDPA) such as consent mechanisms, rights of the data principal, provision to withdraw consent etc. Second, the privacy policy must state how the data provided by them to these apps will be used. Finally, developers must include key elements, such as provisions for third-party integrations and data retention policies.”&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Click to download the full research paper &lt;a class="external-link" href="https://cis-india.org/internet-governance/files/privacy-policy-framework.pdf"&gt;here&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/privacy-policy-framework-for-indian-metal-health-apps'&gt;https://cis-india.org/internet-governance/blog/privacy-policy-framework-for-indian-metal-health-apps&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Chakshu Sang and Shweta Mohandas</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2025-01-10T00:11:24Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cis-submission-to-the-committee-of-experts-on-a-data-protection-framework-for-india">
    <title>CIS Submission to the Committee of Experts on a Data Protection Framework for India</title>
    <link>https://cis-india.org/internet-governance/blog/cis-submission-to-the-committee-of-experts-on-a-data-protection-framework-for-india</link>
    <description>
        &lt;b&gt;This submission presents comments by the Centre for Internet and Society, India (“CIS”) on the ‘White Paper of the Committee of Experts on a Data Protection Framework for India’ (“White Paper”) released by the Ministry of Electronics and Information Technology. The White paper was drafted by a Committee of Expert (“Committee”) constituted by the Ministry. CIS has conducted research on the issues of privacy, data protection and data security since 2010 and is thankful for the opportunity to put forth its views. The submission was made on January 31, 2018.&lt;/b&gt;
        &lt;p&gt;&lt;span&gt;The submission is divided into four parts — I. Preliminary, II. Scope and Exemption, III. Grounds of Processing, Obligations of Entities and Individual Rights and IV. Regulation and Enforcement. The submission follows the same the order as adopted by the White Paper.&lt;/span&gt;&lt;/p&gt;
&lt;h4&gt;&lt;/h4&gt;
&lt;p&gt;&lt;b&gt;Please access the &lt;a class="external-link" href="http://cis-india.org/internet-governance/files/data-protection-submission"&gt;full submission here&lt;/a&gt;.&lt;/b&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cis-submission-to-the-committee-of-experts-on-a-data-protection-framework-for-india'&gt;https://cis-india.org/internet-governance/blog/cis-submission-to-the-committee-of-experts-on-a-data-protection-framework-for-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>amber</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-04-18T16:39:11Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/submission-to-the-committee-of-experts-on-a-data-protection-framework-for-india">
    <title>Submission to the Committee of Experts on a Data Protection Framework for India</title>
    <link>https://cis-india.org/internet-governance/submission-to-the-committee-of-experts-on-a-data-protection-framework-for-india</link>
    <description>
        &lt;b&gt;This submission presents comments by the Centre for Internet and Society, India (“CIS”) on the ‘White Paper of the Committee of Experts on a Data Protection Framework for India’ (“White Paper”) released by the Ministry of Electronics and Information Technology. The White paper was drafted by a Committee of Expert (“Committee”) constituted by the Ministry. CIS has conducted research on the issues of privacy, data protection and data security since 2010 and is thankful for the opportunity to put forth its views. The submission was made on January 31, 2018.&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/submission-to-the-committee-of-experts-on-a-data-protection-framework-for-india'&gt;https://cis-india.org/internet-governance/submission-to-the-committee-of-experts-on-a-data-protection-framework-for-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>amber</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Data Governance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-02-05T13:39:00Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/rbi-consultation-paper-on-p2p-lending">
    <title>RBI Consultation Paper on P2P Lending: Data Security and Privacy Concerns</title>
    <link>https://cis-india.org/raw/rbi-consultation-paper-on-p2p-lending</link>
    <description>
        &lt;b&gt;On April 28, 2016 the Reserve Bank of India published a consultation paper on P2P Lending and invited comments from the public on the same. The Paper discusses what P2P lending is, the various regulatory practices that govern P2P lending in different jurisdictions and lists our arguments for and against regulating P2P lending platforms.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Arguments against Regulation&lt;/h2&gt;
&lt;p&gt;The arguments against regulation of P2p lending companies as set out in the paper are (briefly):&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;Regulating an exempt or nascent sector may be perceived as rubber stamping the industry through regulation, thus lending credibility to the P2P lending which could attract ill informed lenders to the sector who may not understand all the risks associated with the industry. In this way Regulation may cause more harm than good.&lt;/li&gt;
&lt;li&gt;Regulations may also be perceived as too stringent, thus stifling the growth of an innovative, efficient and accessible industry.&lt;/li&gt;
&lt;li&gt;The P2P lending market is currently in a nascent stage and does not pose an immediate systemic risk meriting regulation.&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Arguments in favour of Regulation&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;The arguments for regulating the market on the other hand are:&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;Considering the significance of the online industry and the impact which it can have on the traditional banking channels/NBFC sector, it would be prudent to regulate this emerging industry.&lt;/li&gt;
&lt;li&gt;The, the importance of these methods of financing, specially in sectors where formal lending cannot reach, needs to be acknowledged.&lt;/li&gt;
&lt;li&gt;If the sector is left unregulated altogether, there is the risk of unhealthy practices being adopted by one or more players, which may have deleterious consequences.&lt;/li&gt;
&lt;li&gt;Section 45S of RBI Act prohibits an individual or a firm or an unincorporated association of individuals from accepting deposits “if its business wholly or partly includes any of the activities specified in clause (c) of section 45-I (i.e. activities of a financial institution); or if his or its principal business is that of receiving of deposits under any scheme or arrangement or in any other manner, or lending in any manner. Contravention of Section 45S is an offence punishable under section 58B (5A) of RBI Act. As per the Act, ‘‘deposit’’ includes and shall be deemed always to have included any receipt of money by way of deposit or loan or in any other form, but does not include any amount received from an individual or a firm or an association of individuals not being a body corporate, registered under any enactment relating to money lending which is for the time being in force in any State. Since the borrowers and lenders brought together by a P2P platform could fall within these prohibitions, absence of regulation may lead to perpetrating an illegality.”&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;After listing out the arguments, the paper adopts the approach of regulating this industry and proposes to bring P2P lending platforms under the purview of RBI’s regulation by defining them as Non Banking Financial Companies (NBFCs) under section 45-I(f)(iii) of the RBI Act. Once notified as NBFCs, RBI can issue regulations under sections 45JA and 45L. Though there is scope to comment on many aspects of the consultation paper our comments here will be limited to the data security and privacy aspects of the recommendations.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Data Security and Privacy Concerns&lt;/h2&gt;
&lt;p&gt;While the understanding of potential borrowers, specially those who have had experiences with commercial financial institutions, is that the more amount of information they provide, the better their chances become of getting a loan. This perception emanates from the fact that any potential borrower is asked for a myriad of documents, including personally identifying documents before a request for a loan is considered, infact for almost all financial institutions it is part of their core prudential norms to ask for identity documents before disbursing a loan. Getting as much information as possible from the borrower is not just a quirk of the financial institutions but it makes business sense for them, since it is those institutions who bear the risk of recovery of their money. There is no reason why the same logic or allowing creditors all the information about the borrower should not be applicable to P2P lending platforms, as far as the principle of prudential business practices is concerned. However, the key difference between disclosing information to P2P lending platforms as opposed to financial institutions is that whilst the information supplied to financial institutions stays limited to the institution and its employees, a large amount of the information (though not necessarily all) given to P2P platforms is made available to all potential creditors, which in P2P lending translates to any internet user who registers as a potential creditor. In this way the potential for the information to reach a wider group of people is much higher and therefore privacy and data security risks require special attention in P2P lending.&lt;/p&gt;
&lt;p&gt;In section 5.3(v) of the Paper it is recommended that “Confidentiality of the customer data and data security would be the responsibility of the Platform. Transparency in operations, adequate measures for data confidentiality and minimum disclosures to borrowers and lenders would also be mandated through a fair practices code.” Whilst the fair practices code has not yet been developed or at least not yet made publicly available, as companies in the P2P lending industry are body corporates, these fair practice codes&amp;nbsp; should be in line with and satisfy the requirements of section 43A of the Information Technology Act, 2000 (“&lt;strong&gt;IT Act&lt;/strong&gt;”) as well as the Guidelines issued by the RBI’s Guidelines on Information security, Electronic Banking, Technology risk management and cyber frauds &lt;strong&gt;[1]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;The minimum standards for data protection in Indian law have been laid down by section 43A of the IT Act and the Information Technology (Reasonable security practices and procedures and sensitive personal data or information) Rules, 2011 (“&lt;strong&gt;Rules&lt;/strong&gt;”) issued under section 43A. As per Rule 4 of the Rules P2P platforms would be required to have a privacy policy to deal with sensitive personal data, which includes any details regarding financial information such bank account, credit/debit cards, etc &lt;strong&gt;[2]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;This policy would have to be published on the website of the platforms and would provide for a number of things such as (i) Clear and easily accessible statements of its practices and policies; (ii) type of personal or sensitive personal data or information collected; (iii) purpose of collection and usage of such information; (iv) disclosure of information including sensitive personal data or information; (v) reasonable security practices and procedures for the data. The other requirements of the Rules as regards consent before usage of the information, collection limitations, imparting information/notice to the consumer (information provider), retention limitation, purpose limitation, opt-out option, disclosure, etc. will also be applicable to P2P platforms and the fair practices code that the RBI would issue for this purpose will have to take all these issues into account.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The Rules also provide that body corporates will be considered to have complied with reasonable security practices if they have implemented such security practices and standards and have a comprehensive documented information security programme and information security policies that contain managerial, technical, operational and physical security control measures that are commensurate with the information assets being protected with the nature of business. Although there are no such practices which have been endorsed by any governmental body for P2P lending platforms, however the Department of Banking Supervision, Reserve Bank of India, has issued guidelines on “Information security, Electronic Banking, Technology risk management and cyber frauds" &lt;strong&gt;[3]&lt;/strong&gt;. which could be relied upon until a fair practices code is put into place. The major privacy and data security provisions of these guidelines are given below:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Security Baselines&lt;/strong&gt;: The guidelines require banks to be proactive in identifying and specifying the minimum security baselines to be adhered to by the service providers to ensure confidentiality and security of data;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Back up records&lt;/strong&gt;: A cloud computing system must ensure backup of all its clients' information;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Security steps&lt;/strong&gt;: An institution may take the following steps to ensure that risks with respect to confidentiality and security of data are adequately mitigated: (i) Address, agree, and document specific responsibilities of the respective parties in outsourcing; (ii) Discuss and agree on the instances where customer data shall be accessed; (iii) Ensure that service provider employees are adequately aware and informed on the security and privacy policies.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Confidentiality&lt;/strong&gt;: Agreements should provide for maintaining confidentiality of customer's information even after the contract expires or is terminated by either party and specify the liability in case of security breach or leakage.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Encryption&lt;/strong&gt;: Normally, a minimum of 128-bit SSL encryption is expected. Banks should only select encryption algorithms which are well established international standards.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Fraud Risk Management&lt;/strong&gt;: It is also necessary that customer confidential information and other data/information available with banks is secured adequately to ensure that fraudsters do not access it to perpetrate fraudulent transactions.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Although inclusion of the above principles in the fair practices code would be helpful, however since the workings of P2P platforms are quite unique, therefore it would be counterproductive to restrict the security and privacy protocols to only those applied to regular banking transactions and the fair practices code should take into account these unique problems of P2P lending rather than seek to apply the existing norms blindly.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Endnotes&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;[1]&lt;/strong&gt; See: &lt;a href="https://rbidocs.rbi.org.in/rdocs/content/PDFs/GBS300411F.pdf"&gt;https://rbidocs.rbi.org.in/rdocs/content/PDFs/GBS300411F.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[2]&lt;/strong&gt; The Rules define “sensitive personal data or information” as information relating to: "(i) password, (ii) financial information such as Bank account or credit card or debit card or other payment instrument details, (iii) physical, physiological and mental health condition, (iv) sexual orientation, (v) medical records and history, (vi) Biometric information, (vii) any detail relating to the above clauses as provided to body corporate for providing service, and (viii) any of the information received under above clauses by body corporate for processing, stored or processed under lawful contract or otherwise."&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[3]&lt;/strong&gt; See: &lt;a href="http://rbidocs.rbi.org.in/rdocs/content/PDFs/GBS300411F.pdf"&gt;http://rbidocs.rbi.org.in/rdocs/content/PDFs/GBS300411F.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/rbi-consultation-paper-on-p2p-lending'&gt;https://cis-india.org/raw/rbi-consultation-paper-on-p2p-lending&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vipul</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Reserve Bank of India</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Research</dc:subject>
    
    
        <dc:subject>Network Economies</dc:subject>
    
    
        <dc:subject>P2P Lending</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2016-06-01T11:41:17Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/comments-on-the-rbi-consultation-paper-on-peer-to-peer-lending">
    <title>Comments on the RBI's Consultation Paper on Peer to Peer Lending</title>
    <link>https://cis-india.org/raw/comments-on-the-rbi-consultation-paper-on-peer-to-peer-lending</link>
    <description>
        &lt;b&gt;The Reserve Bank of India published a Consultation Paper on Peer to Peer Lending on April 28, 2016, and invited comments from the public. CIS submitted the following response, authored by Elonnai Hickok, Pavishka Mittal, Sumandro Chattapadhyay, Vidushi Marda, and Vipul Kharbanda.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;1. Preliminary&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;1.1.&lt;/strong&gt; This submission presents comments and recommendations by the Centre for Internet and Society (&lt;strong&gt;“CIS”&lt;/strong&gt;) on the Consultation Paper on Peer to Peer Lending (&lt;strong&gt;“the consultation paper”&lt;/strong&gt;) by the Reserve Bank of India (&lt;strong&gt;“RBI”&lt;/strong&gt;) &lt;strong&gt;[1]&lt;/strong&gt;.&lt;/p&gt;
&lt;h2&gt;2. The Centre for Internet and Society&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;2.1.&lt;/strong&gt; The Centre for Internet and Society, CIS &lt;strong&gt;[2]&lt;/strong&gt;, is a non-profit organisation that undertakes interdisciplinary research on internet and digital technologies from policy and academic perspectives. The areas of focus include digital accessibility for persons with diverse abilities, access to knowledge, intellectual property rights, openness (including open data, free and open source software, open standards, open access, open educational resources, and open video), internet governance, telecommunication reform, digital privacy, and cyber-security. The academic research at CIS seeks to understand the reconfiguration of social processes and structures through the internet and digital media technologies, and vice versa.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;2.2.&lt;/strong&gt; This submission is consistent with CIS’ commitment to safeguarding general public interest, and the interests and rights of various stakeholders involved. The comments in this submission aim to further the concerns of citizens’ and users’ rights in the context of products, services, and transactions facilitated by digital media technologies, the , the principle that regulation should be defined around functions of the acts concerned, and not the technologies of delivery. Our comments are limited to the clauses that most directly have an impact on these concerns.&lt;/p&gt;
&lt;h2&gt;3. Response&lt;/h2&gt;
&lt;h3&gt;3.1. Whether there is a felt need for regulating peer to peer lending platforms?&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.1.1.&lt;/strong&gt; Peer to peer (&lt;strong&gt;“P2P”&lt;/strong&gt;) lenders are platforms serving as marketplaces for the lenders and the borrowers of funds to connect. Their very business model does not render them as a provider of finance, as they aspire to function as pure intermediaries to enable lending and borrowing.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.1.2.&lt;/strong&gt; The Section 45I.(f)(iii) of the RBI Act, 1935 &lt;strong&gt;[3]&lt;/strong&gt;, provides RBI the authority to classify any financial institution as a non-banking financial company (&lt;strong&gt;“NBFC”&lt;/strong&gt;) “with the previous approval of the Central Government and by notification in the Official Gazette.” Since the P2P lending platforms do not provide any finance themselves, undertake acquisition of financial instruments, deliver financial and/or insurance services, or collect financial resources directly, the only ground for classifying such companies as “financial institutions” &lt;strong&gt;[4]&lt;/strong&gt; appears to be their involvement in “managing, conducting or supervising, as foreman, agent or in any other capacity, of chits or kuries as defined in any law which is for the time being in force in any State, or any business, which is similar thereto” &lt;strong&gt;[5]&lt;/strong&gt;. P2P lending platforms can be considered to be brokers and thus there are other aspects that merit scrutiny such as antitrust issues, obligations of either party, company activities and the transactional system involved, as we will discuss in this document.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.1.3.&lt;/strong&gt; The consultation paper itself states that the balance sheet of the platform cannot indicate any borrowing / lending activity, which entails that the platform cannot itself provide finance or receive any funds for the provision of loans to others. Platforms are not allowed to determine the interest rates as they are not a party to the transaction. Neither would they be liable in cases of default by the borrower. These rules, standard for P2P platforms in other jurisdictions as well, confirm the assumption that the platform itself is not providing finance and thus, cannot be entrusted with any liability, obligation from the transaction.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.1.4.&lt;/strong&gt; Further, with RBI raising the threshold asset size for an NBFC to be considered systemically important (NBFC-ND-SI) from Rs. 100 Crores to Rs. 500 Crores &lt;strong&gt;[6]&lt;/strong&gt;, and Economic Times reporting that one of the biggest Indian P2P lending platform’s enterprise valuation (which can be taken as indicative of its net assets) is Rs 50 Crores &lt;strong&gt;[7]&lt;/strong&gt;, we may assume that most P2P lending platforms will have net assets worth less than 500 crore, at least in the near future; although there is a possibility for exponential growth with some companies.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.1.5.&lt;/strong&gt; Given the limited sphere of operation, restricted ability (by design) of these platforms to shape interest rates and other features of financial instruments, and their generally non-systemically-important nature, we would submit that the regulation of such P2P lending platforms are kept to an absolute minimum, so that their economic viability is not undermined, and at the same time the key risks associated with their operations are addressed by RBI.&lt;/p&gt;
&lt;h3&gt;3.2. Is the assessment of P2P lending and risks associated with it adequate?&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.2.1.&lt;/strong&gt; CIS observes that the following are the key risks involved with the operations of the P2P lending platforms, and these are being respectively addressed by, or can be addressed by RBI in the following manners.&lt;/p&gt;
&lt;ol type="A"&gt;&lt;li&gt;&lt;strong&gt;Insufficient information about the conditions of lending, leading to defrauding of the borrower:&lt;/strong&gt; The borrower may not receive appropriate information about the terms of the loan, and/or the P2P lending platform may not act in a “fair” manner (say, in case of collusion between the P2P lending platform and the lender, or the lending platform and the borrower), which may lead to defrauding and/or economic loss of either party. By classifying P2P lending platforms as NBFCs, RBI will ensure that these companies follow the Guidelines on Fair Practices Code for NBFCs &lt;strong&gt;[8]&lt;/strong&gt;, which extensively addresses concerns related to this type of risks.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Insufficient information about the borrower, or her/his ability to repay the loan, may lead to non-repayment and economic loss of the lender:&lt;/strong&gt; If the P2P lending platform allows the lender to offer loans to borrowers without acquiring and/or providing sufficient information to the lender about the borrower’s credit history and/or ability to repay the loan, modes of formulating security for loans, this may heighten the risks of non-repayment of loans. By classifying P2P lending platforms as NBFCs, RBI will ensure that these companies follow the Master Circular – 'Know Your Customer' (KYC) Guidelines – Anti Money Laundering Standards (AML) - Prevention of Money Laundering Act, 2002 - Obligations of NBFCs &lt;strong&gt;[9]&lt;/strong&gt;, which extensively addresses concerns related to this type of risks.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Credit-related information of the lenders and the borrowers collected by P2P lending platforms may not be made available to other financial institutions and that will lead asymmetry in credit information available across various actors in the sector:&lt;/strong&gt; Credit information, related to both lending and borrowing practices of entities using the platform concerned, is a key asset of the P2P lending platforms. Lack of sharing of such information with Credit Information Companies, for economic reasons or otherwise, may however, lead to information asymmetry within the financial sector, which will structurally weaken the entire sector (with pieces of credit information being distributed across actors and not being shared internally). By classifying P2P lending platforms as NBFCs, RBI will ensure that these companies follow the Credit Information Companies (Regulation) Act, 2005 &lt;strong&gt;[10]&lt;/strong&gt;, which extensively addresses concerns related to this type of risks.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;P2P lending platforms diversifying their financial operations without informing RBI and hence without appropriate regulatory control:&lt;/strong&gt; It is possible that P2P lending platforms may decide to diversify their activities. There have been similar examples in other related sectors, say e-commerce marketplaces, that have started their own product re/selling companies that use the same online marketplace concerned. By classifying P2P lending platforms as NBFCs, RBI will ensure that these companies provide RBI with detailed and regular reports of their economic activities and investments, which is expected to address concerns related to this type of risks.&lt;/li&gt;&lt;/ol&gt;
&lt;h3&gt;3.3. Are there any other risks which ought to be addressed?&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.3.1.&lt;/strong&gt; CIS observes that as part of the usual transaction related activities of the P2P lending platforms, the companies will come into possession of what has been defined as “sensitive personal data or information” by the Information Technology (Reasonable security practices and procedures and sensitive personal data or information) Rules, 2011 &lt;strong&gt;[11]&lt;/strong&gt;. The concerns related to this type of risk is directly addressed by the Rules concerned, and may not require additional attention from the RBI.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.3.2.&lt;/strong&gt; CIS observes that as borrowers and lenders start using specific P2P lending platforms, the data regarding their credit histories and/or “financial reputation” will be owned by these companies. While such information might be shared internally within the financial sector through the Credit Information Companies, the borrowers and lenders themselves may not get direct access to such data. Hence, the borrowers and lenders will not be able to move easily and smoothly to a new P2P lending platform and make use of their existing credit information and/or “financial reputation” when accessing services offered via the new P2P lending platform. In other words, the borrowers and lenders may face a &lt;em&gt;service provider lock-in&lt;/em&gt;, and inability to move between P2P lending platforms easily, without explicit access to their own credit history/reputation, and will not have the ability to migrate such information from one P2P lending platform to another (or to any other agency, for that matter). CIS submits that RBI must provide a mechanism to allow users to migrate between platforms as it has not been discussed in the consultation paper.&lt;/p&gt;
&lt;h3&gt;3.4. Is the proposed approach to regulating these platforms adequate?&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.4.1.&lt;/strong&gt; CIS observes that while classification of P2P lending platforms will appropriately address key risks associated with their operations (as listed in 3.2.1. A-D), it will not address a major risk emerging out of their operations that is unique to the technological basis of the business concerned (as mentioned in 3.3.2.), and further, it will impose substantial financial and management obligations that have a very high probability of undermining the economic viability of this emerging and niche sector of intermediated direct lending and borrowing.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.4.2.&lt;/strong&gt; CIS observes that these financial and management obligations may involve the following topics among others discussed: 1) minimum net worth requirement for registration, 2) minimum investments required to be made government securities, 3) transferring of minimum percentage of net profits to RBI, 4) guidelines regarding corporate governance &lt;strong&gt;[12]&lt;/strong&gt;, etc.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.4.3.&lt;/strong&gt; Given this, CIS submits that instead of classifying P2P lending platforms as “Misc NBFCs,” a new sub-classification is created under the category of NBFC for such platforms, that directly addresses the key risks associated with businesses of P2P lending platforms, and protects lenders as well as borrowers while enhancing transparency in operations. This new sub-classification of P2P lending companies should also be divided into systemically-important and non-systemically-important like other NBFCs, and requirements regarding financial operations and corporate management should only be enforced for the former category of P2P lending companies.&lt;/p&gt;
&lt;h3&gt;3.5. Any other relevant issues pertaining to P2P lending&lt;/h3&gt;
&lt;p&gt;Beyond the issues already discussed above, CIS seek clarity from the RBI around the following aspects:&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;&lt;strong&gt;Transactional system pertaining to P2P lending:&lt;/strong&gt;
&lt;ol type="a"&gt;
&lt;li&gt;What are the requirements and prerequisites for mandating the collection of user identity?&lt;/li&gt;
&lt;li&gt;Establishing a maximum sum that can be transferred per transaction.&lt;/li&gt;&lt;/ol&gt;
&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Company activities:&lt;/strong&gt;
&lt;ol type="a"&gt;&lt;li&gt;Fees that can be charged by platforms.&lt;/li&gt;
&lt;li&gt;How data security can be best addressed.&lt;/li&gt;
&lt;li&gt;How the financial transactions are brokered.&lt;/li&gt;
&lt;li&gt;Modes of redressal.&lt;/li&gt;
&lt;li&gt;Restitution to users if something goes amiss in the transaction.&lt;/li&gt;
&lt;li&gt;Insurance that the company has to buy or capital on hand to support.&lt;/li&gt;&lt;/ol&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Endnotes&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;[1]&lt;/strong&gt; See: &lt;a href="https://www.rbi.org.in/scripts/bs_viewcontent.aspx?Id=3164"&gt;https://www.rbi.org.in/scripts/bs_viewcontent.aspx?Id=3164&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[2]&lt;/strong&gt; See: &lt;a href="http://cis-india.org/"&gt;http://cis-india.org/&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[3]&lt;/strong&gt; See: &lt;a href="https://rbidocs.rbi.org.in/rdocs/Publications/PDFs/RBIA1934170510.pdf"&gt;https://rbidocs.rbi.org.in/rdocs/Publications/PDFs/RBIA1934170510.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[4]&lt;/strong&gt;  See Section 45I.(c) of RBI Act, 1923, last amended on January 07, 2013.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[5]&lt;/strong&gt;  See Section 45I.(c)(v) of RBI Act, 1923, last amended on January 07, 2013.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[6]&lt;/strong&gt; See: &lt;a href="https://rbidocs.rbi.org.in/rdocs/content/pdfs/PNNBFC200315.pdf"&gt;https://rbidocs.rbi.org.in/rdocs/content/pdfs/PNNBFC200315.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[7]&lt;/strong&gt; See: &lt;a href="http://economictimes.indiatimes.com/small-biz/startups/faircent-com-raises-pre-series-a-funding-of-250k/articleshow/47630279.cms"&gt;http://economictimes.indiatimes.com/small-biz/startups/faircent-com-raises-pre-series-a-funding-of-250k/articleshow/47630279.cms&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[8]&lt;/strong&gt; See: &lt;a href="https://rbi.org.in/scripts/NotificationUser.aspx?Id=7866"&gt;https://rbi.org.in/scripts/NotificationUser.aspx?Id=7866&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[9]&lt;/strong&gt; See: &lt;a href="https://rbi.org.in/scripts/BS_ViewMasCirculardetails.aspx?id=8168"&gt;https://rbi.org.in/scripts/BS_ViewMasCirculardetails.aspx?id=8168&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[10]&lt;/strong&gt; See: &lt;a href="http://www.incometaxindia.gov.in/Pages/acts/credit-information-companies-act.aspx"&gt;http://www.incometaxindia.gov.in/Pages/acts/credit-information-companies-act.aspx&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[11]&lt;/strong&gt; See: &lt;a href="http://deity.gov.in/sites/upload_files/dit/files/GSR313E_10511%281%29.pdf"&gt;http://deity.gov.in/sites/upload_files/dit/files/GSR313E_10511%281%29.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[12]&lt;/strong&gt; See: &lt;a href="https://www.rbi.org.in/scripts/BS_NBFCNotificationView.aspx?Id=3706"&gt;https://www.rbi.org.in/scripts/BS_NBFCNotificationView.aspx?Id=3706&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/comments-on-the-rbi-consultation-paper-on-peer-to-peer-lending'&gt;https://cis-india.org/raw/comments-on-the-rbi-consultation-paper-on-peer-to-peer-lending&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Reserve Bank of India</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Research</dc:subject>
    
    
        <dc:subject>Network Economies</dc:subject>
    
    
        <dc:subject>P2P Lending</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2016-06-01T20:21:13Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/tpp-and-d2-implications-for-data-protection-and-digital-privacy">
    <title>Trans Pacific Partnership and Digital 2 Dozen: Implications for Data Protection and Digital Privacy</title>
    <link>https://cis-india.org/internet-governance/blog/tpp-and-d2-implications-for-data-protection-and-digital-privacy</link>
    <description>
        &lt;b&gt;In this essay, Shubhangi Heda explores the concerns related to data protection and digital privacy under the Trans Pacific Partnership (TPP) agreement signed recently between United States of America and eleven countries located around the pacific ocean region, across South America, Australia, and Asia. TPP  is a free trade agreement (FTA) that emphasises, among other things, the need for liberalising global digital economy. The essay also analyses the critical document titled ‘Digital 2 Dozen’ (D2D), which compiles the key action items within TPP addressing liberalisation of digital economy, and sets up the relevant goals for the member nations.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;1. &lt;strong&gt;&lt;a href="#1"&gt;Introduction&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;2. &lt;strong&gt;&lt;a href="#2"&gt;Analysis of TPP and D2D&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;2.1. &lt;strong&gt;&lt;a href="#2-1"&gt;Trans Pacific Partnership (TPP)&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;2.2. &lt;strong&gt;&lt;a href="#2-2"&gt;Digital 2 Dozen (D2D)&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;3. &lt;strong&gt;&lt;a href="#3"&gt;Major Criticisms of the Digital Agenda of TPP&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;3.1. &lt;strong&gt;&lt;a href="#3-1"&gt;Data Protection&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;3.2. &lt;strong&gt;&lt;a href="#3-2"&gt;Digital Privacy&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;4. &lt;strong&gt;&lt;a href="#4"&gt;Implications of TPP for RCEP&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;5. &lt;strong&gt;&lt;a href="#5"&gt;Implications of TPP in the Context of EU Safe Harbour Judgement&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;6. &lt;strong&gt;&lt;a href="#6"&gt;Implications of TPP for India after US-India Cyber Relationship Agreement&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;7. &lt;strong&gt;&lt;a href="#7"&gt;Conclusion&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;8. &lt;strong&gt;&lt;a href="#8"&gt;Endnotes&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;9. &lt;strong&gt;&lt;a href="#9"&gt;Author Profile&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h2 id="1"&gt;1. Introduction&lt;/h2&gt;
&lt;p&gt;This essay explores the concerns related to data protection and digital privacy under the Trans Pacific Partnership (TPP) agreement signed recently between United States of America and eleven countries located around the pacific ocean region, across South America, Australia, and Asia &lt;strong&gt;[1]&lt;/strong&gt;. TPP is a free trade agreement (FTA) that emphasises, among other things, the need for liberalising global digital economy. The essay also analyses the critical document titled ‘Digital 2 Dozen’ (D2D), which compiles the key action items within TPP addressing liberalisation of digital economy, and sets up the relevant goals for the member nations. TPP requires the member countries to facilitate unhindered digital data flow across nations, for commercial and governmental purposes, which evidently have major implications for national and regional data protection and privacy regimes. These implications must also be seen in the context the recent judgement by  the EU Court of Justice against the validity of the EU-USA data transfer agreement of 2000. Further, the essay discusses the potential impacts that TPP/D2D might have on India, in the context of the ongoing USA-India Cyber Relationship dialogue. If the privacy concerns are not raised right now TPP might act as a model framework for future FTAs which will fail to encompass proper data protection and digital privacy regime within it.&lt;/p&gt;
&lt;h2 id="2"&gt;2. Analysis of TPP and D2D&lt;/h2&gt;
&lt;h3 id="2-1"&gt;2.1. Trans Pacific Partnership (TPP)&lt;/h3&gt;
&lt;p&gt;Trans Pacific Partnership (TPP) is a large multi-partner free trade agreement amongst twelve Asia-Pacific countries, which is closely led by geo-political and economic strategies of the USA. Countries started the negotiation of TPP in 2008 when USA joined Pacific Four (P-4) negotiations and in 2015 negotiations of TPP was concluded  and text  was released. Ministers from the member countries signed the agreement on February 4, 2016 &lt;strong&gt;[2]&lt;/strong&gt;. The main aim of TPP is to liberalise trade and investment beyond what is provided for within the WTO. It is also considered to be a strategic move by the US to counter the trade linkages that are being established in the Asian region. TPP largely covers topics of market access, and rules on various related issues such as intellectual property rights, labour laws, and environment standards &lt;strong&gt;[3]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;Between 1992 -2012 there has been an upsurge in bilateral trade agreements being signed in Asia from 25 to 103 and the effect of these FTAs is called the ‘noodle bowl effect’. TPP is seen as framework which will replace these FTAs which  are causing the ‘noodle bowl effect’.While these FTAs are being replaced but with TPP being signed there are various bilateral arrangements signed along with TPP. USA has also stated that TPP will not affect the already existing NAFTA &lt;strong&gt;[4]&lt;/strong&gt;. While TPP is being concluded  there is another free trade agreement being negotiated between USA and EU , which is Trans Trade and Investment Partnership (TTIP). Both  TPP and TTIP  and are considered to be serving similar objective  which is to deal with new and modern trade issues. Also both the  agreements are US led and since negotiation for TPP are now finalised it may have a significant impact on TTIP &lt;strong&gt;[5]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;TPP is one of the first document which deals specifically with digital economy and applies across borders.  The main aims of TPP are to promote free flow of data across borders without data localisation. It aims to remove national clouts and regional internets. It also includes provisions to combat theft of trade secrets. It allows you to create transparent regulatory process with inputs from various stakeholders. It also aims to provide access to tools and procedures for conduct of e-commerce &lt;strong&gt;[6]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;Some of the major criticism to TPP were regarding the issues related to &lt;strong&gt;[7]&lt;/strong&gt;:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;environment, wherein it does not address the issue of climate change  and the language used in the agreement  is very weak;&lt;/li&gt;
&lt;li&gt;labour rights  provision mandates parties to adhere to the ILO provision  but it  does not seem to  provide for effective framework  and might not bring the desired change;&lt;/li&gt;
&lt;li&gt;investment chapter is seen to be controversial because of the investor state dispute settlement clause which will allow foreign investor to sue government over policies that might cause harm to them;&lt;/li&gt;
&lt;li&gt;e-commerce and telecommunication chapter raises major privacy concerns;&lt;/li&gt;
&lt;li&gt;intellectual property chapter wherein it includes controversial rules regarding pharmaceutical companies and data exclusivity apart from the privacy concerns.&lt;/li&gt;&lt;/ul&gt;
&lt;h3 id="2-2"&gt;2.2 Digital 2 Dozen (D2D)&lt;/h3&gt;
&lt;p&gt;D2D is set of rules and aims which is specifically drafted to be followed for the trade agreements related to open internet and digital economy. More specific aims of TPP as provided within the ‘Digital 2 Dozen,’ aiming for more liberalised trade in digital goods and services, are &lt;strong&gt;[8]&lt;/strong&gt;:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;promoting free and open internet,&lt;/li&gt;
&lt;li&gt;prohibiting digital custom duties,&lt;/li&gt;
&lt;li&gt;securing basic non-discrimination principles,&lt;/li&gt;
&lt;li&gt;enabling cross-border data flows,&lt;/li&gt;
&lt;li&gt;preventing localization barriers,&lt;/li&gt;
&lt;li&gt;barring forced technology transfers,&lt;/li&gt;
&lt;li&gt;advancing innovative authentication methods,&lt;/li&gt;
&lt;li&gt;delivering enforceable consumer protections,&lt;/li&gt;
&lt;li&gt;safeguarding network competition,&lt;/li&gt;
&lt;li&gt;fostering innovative encryption products, and&lt;/li&gt;
&lt;li&gt;building an adaptable framework.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Strategic goal of the US in introducing D2D as goals of TPP has been to set up a trend within Asian region for all the trade agreements. It is expected to ensure that if TPP is a success, similar goals and policy frameworks will be followed for other trade agreements as we. For example, the USA-India partnership also enshrines similar aims and so does the USA-Korea partnership. Hence while India is not part of TPP, USA is nonetheless trying to get India into a partnership which is similar to the TPP. The language proposed by the USA in TPP negotiations  has always been supportive for cross border data flows as it claims that companies have mechanism to keep a privacy check and privacy would not be undermined, but countries like New Zealand and Australia which have strong privacy protection laws nationally have raised concerns which will be discussed in further sections &lt;strong&gt;[9]&lt;/strong&gt;. Also not only in  privacy rights but Digital Dozen initiative also affects other digital rights related to - excessive copyright terms  TPP proposed to extend the term of copyright to hundred years which deprive access to knowledge; as in the U.S motive to give more power to private entities , the  ISP obligations enumerated within TPP which puts freedom of expression and privacy at risk as ISPs are allowed to check for copyright infringement and TPP does not put any privacy restriction in this regard; introduction of new fair use rules; ban on circumvention of digital locks or DRMs; no compulsory limitation for persons with disabilities; lack of fair use for journalistic right; while net neutrality is major issue is many developing nations in Asia no effective provision for net neutrality is  aimed at in the D2D initiative; prohibits open source mandates which puts barrier for countries which want to release any software as open source as a policy decision &lt;strong&gt;[10]&lt;/strong&gt;.&lt;/p&gt;
&lt;h2 id="3"&gt;3. Major Issues Related to Data Protection and Privacy in the TPP&lt;/h2&gt;
&lt;h3 id="3-1"&gt;3.1. Data Protection&lt;/h3&gt;
&lt;p&gt;One of the major concern raised against TPP is regarding data protection provisions that have been integrated within the E- Commerce chapter of the agreement. Article 14.11 and Article 14 .13 are the ones that deal with data flow related to consumer information.Article 14.11 in the agreement puts a requirement on the member states to allow transfer of data across border and  Article 14.13 does not allow the companies to host data on local servers.  Concerns were raised in few member states for instance, Australian Privacy Foundation raised concerns over Article 14.11 which requires transfers to be allowed in context of business activities of service suppliers. It claimed that exception to this provision is very narrow and the repercussion for not following the exception is that investor state dispute settlement proceedings can be initiated, which is not sufficient to protect privacy. Also, it highlighted the issue that with the narrow exception provided under Article 14.13 which relates to prohibition on data localisation, it might have adverse effect on the implementation of national privacy laws within Australia &lt;strong&gt;[11]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;Another provision which is of major concern is Article 14.13 which prohibit data localisation. It will raise problems for countries like Indonesia and China which will have to change their local laws to implement the provision &lt;strong&gt;[12]&lt;/strong&gt;. Since there already has been a major concern with regard to USA- EU Safe Harbour Agreement which was later  made subject to the ECJ’s ruling on data protection, which invalidated any arrangement which provides voluntary enterprises responsibility to enforce privacy. But both the USA and EU are in process of renegotiating the agreement.The major concern was that in EU data protection is a fundamental right while in USA data protection is more consumer centric. When similar concerns were raised in TPP negotiations, they were rebutted as USA claimed that FTA does not concern itself with data protection &lt;strong&gt;[13]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;In 2012 Australia proposed an alternative language to TPP which allowed countries to place restriction on data flow as long as it was not a barrier to trade. U.S responded to concerns raised by the Australia through a side letter which ensured Australia that U.S and Australia have a mutual understanding in relation to privacy and U.S will ensure the privacy of  data with regards to  Australia. While Australia’s concern was given acknowledgement other countries which raised similar issues were not given any assurances &lt;strong&gt;[14]&lt;/strong&gt;. US instead proposed ad- hoc strategy that gave private companies power to form privacy policy with implementation through state machinery &lt;strong&gt;[15]&lt;/strong&gt;.&lt;/p&gt;
&lt;h3 id="3-2"&gt;3.2. Digital Privacy&lt;/h3&gt;
&lt;p&gt;Article 14.8 in the E- Commerce chapter of the  agreement states that countries can form legal framework for the protection of rights but the kind of ‘legal framework’ is not defined. Also, nowhere it states that the privacy protection or data protection laws are expressly exempted, rather it states that any such policy implemented by member states will be put under review of TPP standards. The standards which TPP proposes to follow are based on the underlying idea that any such policy should not hinder free trade in any way. This test will be applied by tribunals which are experts in trade and investment and not on data protection or human rights &lt;strong&gt;[16]&lt;/strong&gt;. While Article 14.8 provides for protection of private information of consumers but the footnote to the provision renders it ineffective. The footnote states that member countries can adopt legal framework for the protection of data which can be done by self-regulation by industry and does not provide for any comprehensive data protection obligation upon the member states &lt;strong&gt;[17]&lt;/strong&gt;. Similar to this Article 13.4 of the telecommunications chapter under TPP also states that  the countries can apply regulation regarding confidentiality of the messages as long as it is not “a means of arbitrary or unjustifiable discrimination or a disguised restriction on trade in services" &lt;strong&gt;[18]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;Another chapter which raises major concerns about the privacy rights is intellectual property. It affects privacy  through the provisions related to technological protective measures and the provision that regulate ISP’s liability. Regarding the TPM provision, the TPP follows the DMCA model whereby the exception to anti- circumvention provision is very narrow and does not apply to anti- trafficking provision. The exception allows user to circumvent TPM if it affect the user's privacy in any way, although this provision does not apply to ant- trafficking of TPM. The provision regarding ISP’s liability states that there should be cooperation between ISPs and rights holders and it does not prohibit ISPs to monitor its users. Also TPP proposes the notice for takedown and  identification of the infringer  by the ISP  but this  provision is not in consonance with  laws of member states, like that of Peru which does not have any copyright law on ISP . Also many countries have tried to introduce proper privacy laws along with implementation of ISP liability but that is not done within the TPP &lt;strong&gt;[19]&lt;/strong&gt;. TPP as whole aims to give greater power to private regulators without providing for minimum standard for protection of privacy.&lt;/p&gt;
&lt;p&gt;Although TPP  is not a data protection agreement but it consequently deals with various aspects of data protection, hence it is prospective model for privacy and data protection practices in future trade agreements. If positive obligations are included within the free trade agreements it will have an advancing impact on the data protection regime.&lt;/p&gt;
&lt;h2 id="4"&gt;4.Implications of TPP for RCEP&lt;/h2&gt;
&lt;p&gt;While TPP has such lacunas similar provision are proposed in RCEP to which India is a party and which will have serious implication as many of the countries have inadequate data protection laws nationally and with the introduction of such an FTA the exploitation of privacy rights will be rampant &lt;strong&gt;[20]&lt;/strong&gt;. To avoid this EU directive on data protection should be taken into consideration in the negotiations of such FTAs. But for the RCEP negotiations are still going on and in India many companies like Flipkart, Snapdeal etc. have started preparing for the changing norms. The government claims that it is going to accept best practices in the region which indicates that it is going to have same policies as that of TPP. Although people from industry have raised concerns that while there are national laws but it is difficult to check third party involvement within the business and it is becoming increasingly difficult to keep the consumer data confidential &lt;strong&gt;[21]&lt;/strong&gt;.&lt;/p&gt;
&lt;h2 id="5"&gt;5. Implications of TPP in the Context of  EU Safe-Harbour Judgement&lt;/h2&gt;
&lt;p&gt;Mr. Maximillian Schrems, an Austrian National residing in Austria, has been a user of the Facebook social network since 2008. Any person residing in EU who wishes to use Facebook is required to conclude, at the time of his registration, a contract with Facebook Ireland (a subsidiary of Facebook Inc. which itself is established in Unites States). Some or all of the personal data of the Facebook Ireland’s users who residing in EU is transferred to servers belonging to Facebook Inc. that are located in United States, where it undergoes processing. On 25 June 2013 Mr Schrems made a complaint to the commissioner by which he in essence asked the latter to exercise his statutory powers by prohibiting Facebook Ireland from transferring his personal data to Unites States, and this led to the &lt;em&gt;Maximillian Schrems v Data Protection Commissioner&lt;/em&gt; case &lt;strong&gt;[22]&lt;/strong&gt;. He contended that in his complaint that the law and practice in force in that country did not ensure adequate protection of the personal data held in its territory against the surveillance activities that were engaged in thereby by the public authorities. Mr Schrems referred in this regard to the revelations made by Edward Snowden concerning the activities of the United States intelligence services, in particular those of the NSA.(para 26, 27, 28). The case came in  the court ruled that “that a third country which ensures an adequate level of protection, does not prevent a supervisory authority of a Member State, within the meaning of Article 28 of the EU 94/46 directive as amended, from examining the claim of a person concerning the protection of his rights and freedoms in regard to the processing of personal data relating to him which has been transferred from a Member State to that third country when that person contends that the law and practices in force in the third country do not ensure an adequate level of protection. The ruling implies that personal data cannot be transferred to third country which does not provide adequate level of protection.&lt;/p&gt;
&lt;p&gt;EU safe harbour judgment and EU directive on privacy provide contrasting rules related to privacy. While TPP gives power to private entities to formulate rules regarding privacy while the recent  ECJ judgment  invalidated giving such power to private entities  under EU-US Safe Harbour Agreement. Also in context of the same judgment Hamburg’s Commissioner for Data Privacy And Freedom of Information announced an investigation into the data transfer taking place through Facebook and Google to U.S. Hence in the light of the recent judgment member states within EU are not allowed to permit cross border data flow, in contrast to this one of the main goals of TPP is to maintain free flow of data across border &lt;strong&gt;[23]&lt;/strong&gt;. EU is this regard has also set forth the proposal to introduce General Data Protection Regulation. (GDPR). Although U.S and EU are trying to renegotiate the agreement but the privacy concerns raised cannot be ignored. Hence following the same model as was invalidate  under the ECJ judgment lets US exploit privacy of member states  under TPP. Similar concerns as raised within the judgment are also raised in India as it also following the same model within U.S-India Cyber Relationship Agreement and in RCEP negotiations.&lt;/p&gt;
&lt;h2 id="6"&gt;6. Implications of TPP in the context of USA-India Cyber Relationship&lt;/h2&gt;
&lt;p&gt;While India is not part of TPP  but it might have an effect on the  U.S India Cyber Relationship Agreement. In August 2015 there was re- initiation of the India-U.S cyber dialogue to address common concerns related to cybersecurity and to develop better partnerships between public and private sector for betterment of digital economy &lt;strong&gt;[24]&lt;/strong&gt;. One of the key aim of this agreement is free flow of information between two nations, which suffers from similar problem that it will put privacy of the citizens at risk. Also India does not have any bilateral treaty which ensures cyber data protection in such a scenario the only solution is data localisation, but this agreement will put data at risk &lt;strong&gt;[25]&lt;/strong&gt;. Hence while the TPP negotiations were going on and also RCEP is being discussed the concerns about privacy and data protection need to be raised as mention in earlier section regarding implications of TPP on RCEP, the USA-India Cyber Relationship also faces the same implications..Although  the aim of USA-India Cyber Relationship is to ensure cybersecurity. After the cases of Muzaffarnagar riots, upheaval in  North -Eastern states  and Gujarat riots, India has realised it is important to ensure compliance from the social media companies. India sees the USA-India Cyber Relationship as an opportunity to achieve this goal. The Google Transparency Report states that that India made around three thousand requests to Google for user data &lt;strong&gt;[26]&lt;/strong&gt;, which indicate at the country's interest in having a common data understanding with the major social media companies (almost all of which are located in USA) about requesting and sharing of user activity data. While this concern is being addressed through the agreement, it is difficult to ignore the clause related to free flow of information, and if the meaning of the term is extended and adopted from TPP itself will put digital privacy of Indian citizens at risk &lt;strong&gt;[27]&lt;/strong&gt;.&lt;/p&gt;
&lt;h2 id="7"&gt;7. Conclusion&lt;/h2&gt;
&lt;p&gt;Even though TPP negotiation are completed but the ratification of the agreement is still underway. TPP is  being seen as one of a kind trade agreement because  it is the first time that countries across the globe have come together as a whole to address concerns of modern trade. Although it fails to address some of the key concerns related to  privacy and data protection which are becoming increasingly important. Data protection and privacy issues cannot be seen in isolation  and needs to merged within the modern day trade agreements. The D2D component by the USA is strategic move to have trade dominance in Asia  and to compete with China’s growth . TPP has privacy and data protection lacunae within the e- commerce , telecommunications and intellectual property discussion.Although it might have serious implications on RCEP negotiation and  USA- India Cyber Relationship Dialogue.  Similar concern regarding data protection has already been  addressed by ECJ judgment invalidating USA-EU  Safe Harbour Agreement but the similar ad - hoc strategy has been incorporated within TPP.  Since TPP might be considered as best practice model for  future FTAs in the Asian region it is important to raise and address these privacy concerns now.&lt;/p&gt;
&lt;h2 id="8"&gt;8. Endnotes&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;[1]&lt;/strong&gt;  The signatory countries include Australia, Canada, Japan, Malaysia, Mexico, Peru, United States of America, Vietnam, Chile, Brunei, Singapore, New Zealand. "The Trans-Pacific Partnership,"
&lt;a href="http://www.ustr.gov/tpp"&gt;http://www.ustr.gov/tpp&lt;/a&gt; (last visited Jul 7, 2016).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[2]&lt;/strong&gt; "The Origins and Evolution of the Trans-Pacific Partnership (TPP)," Global Research, &lt;a href="http://www.globalresearch.ca/the-origins-and-evolution-of-the-trans-pacific-partnership-tpp/5357495"&gt;http://www.globalresearch.ca/the-origins-and-evolution-of-the-trans-pacific-partnership-tpp/5357495&lt;/a&gt; (last visited Jul 7, 2016).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[3]&lt;/strong&gt; Fergusson, Ian F., Mark A. McMinimy &amp;amp; Brock R. Williams, "The Trans-Pacific Partnership (TPP): In Brief," (2015), &lt;a href="http://digitalcommons.ilr.cornell.edu/key_workplace/1477/"&gt;http://digitalcommons.ilr.cornell.edu/key_workplace/1477/&lt;/a&gt; (last visited Jul 1, 2016).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[4]&lt;/strong&gt; Gajdos, Lukas, &lt;em&gt;The Trans-Pacific Partnership and its impact on EU trade&lt;/em&gt;, Policy Department, Directorate-General for External Policies, Policy Briefing (2013), &lt;a href="http://www.europarl.europa.eu/RegData/etudes/briefing_note/join/2013/491479/EXPO-INTA_SP(2013)491479_EN.pdf"&gt;http://www.europarl.europa.eu/RegData/etudes/briefing_note/join/2013/491479/EXPO-INTA_SP(2013)491479_EN.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[5]&lt;/strong&gt; Twining, Daniel, Hans Kundnani &amp;amp; Peter Sparding, &lt;em&gt;Trans-Pacific Partnership: geopolitical implications for EU-US relations&lt;/em&gt;, Policy Department, Directorate-General for External Policies, June 24 (2016), &lt;a href="http://www.europarl.europa.eu/RegData/etudes/STUD/2016/535008/EXPO_STU(2016)535008_EN.pdf"&gt;http://www.europarl.europa.eu/RegData/etudes/STUD/2016/535008/EXPO_STU(2016)535008_EN.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[6]&lt;/strong&gt; USTR, "Remarks by Deputy U.S. Trade Representative Robert Holleyman to the New Democrat Network," &lt;a href="https://ustr.gov/about-us/policy-offices/press-office/speechestranscripts/2015/may/remarks-deputy-us-trade"&gt;https://ustr.gov/about-us/policy-offices/press-office/speechestranscripts/2015/may/remarks-deputy-us-trade&lt;/a&gt; (last visited Jul 4, 2016).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[7]&lt;/strong&gt;  Murphy, Katharine, "Trans-Pacific Partnership: four key issues to watch out for," The Guardian, November 6, 2015, &lt;a href="https://www.theguardian.com/business/2015/nov/06/trans-pacific-partnership-four-key-issues-to-watch-out-for"&gt;https://www.theguardian.com/business/2015/nov/06/trans-pacific-partnership-four-key-issues-to-watch-out-for&lt;/a&gt; (last visited Jul 7, 2016).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[8]&lt;/strong&gt; USTR, "The Digital 2 Dozen" (2016), &lt;a href="https://ustr.gov/sites/default/files/Digital-2-Dozen-Final.pdf"&gt;https://ustr.gov/sites/default/files/Digital-2-Dozen-Final.pdf&lt;/a&gt; (last visited Jul 1, 2016).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[9]&lt;/strong&gt; Fergusson, Ian F.m Mark A. McMinimy &amp;amp; Brock R. Williams, "The Trans-Pacific Partnership (TPP) negotiations and issues for congress," (2015), &lt;a href="http://digitalcommons.ilr.cornell.edu/key_workplace/1412/"&gt;http://digitalcommons.ilr.cornell.edu/key_workplace/1412/&lt;/a&gt; (last visited Jul 8, 2016).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[10]&lt;/strong&gt; "How the TPP Will Affect You and Your Digital Rights," Electronic Frontier Foundation (2015), &lt;a href="https://www.eff.org/deeplinks/2015/12/how-tpp-will-affect-you-and-your-digital-rights"&gt;https://www.eff.org/deeplinks/2015/12/how-tpp-will-affect-you-and-your-digital-rights&lt;/a&gt; (last visited Jul 7, 2016).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[11]&lt;/strong&gt; Australian Privacy Foundation (APF), &lt;em&gt;Trans Pacific Partnership Agreement&lt;/em&gt; (2016), &lt;a href="https://www.privacy.org.au/Papers/Parlt-TPP-160310.pdf"&gt;https://www.privacy.org.au/Papers/Parlt-TPP-160310.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[12]&lt;/strong&gt; Greenleaf, Graham, "The TPP &amp;amp; Other Free Trade Agreements: Faustian Bargains for Privacy?," SSRN (2016), &lt;a href="http://papers.ssrn.com/sol3/Papers.cfm?abstract_id=2732386"&gt;http://papers.ssrn.com/sol3/Papers.cfm?abstract_id=2732386&lt;/a&gt; (last visited Jul 1, 2016).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[13]&lt;/strong&gt; "GED-Project: Transatlantic Data Flows and Data Protection," GED Blog (2015), &lt;a href="https://ged-project.de/topics/competitiveness/transatlantic-data-flows-and-data-protection-the-state-of-the-debate/"&gt;https://ged-project.de/topics/competitiveness/transatlantic-data-flows-and-data-protection-the-state-of-the-debate/&lt;/a&gt; (last visited Jul 1, 2016).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[14]&lt;/strong&gt; Geist, Michael, "The Trouble with the TPP, Day 14: No U.S. Assurances for Canada on Privacy," (2016), &lt;a href="http://www.michaelgeist.ca/2016/01/the-trouble-with-the-tpp-day-14-no-u-s-assurances-for-canada-on-privacy/"&gt;http://www.michaelgeist.ca/2016/01/the-trouble-with-the-tpp-day-14-no-u-s-assurances-for-canada-on-privacy/&lt;/a&gt; (last visited Jul 4, 2016).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[15]&lt;/strong&gt; Aaronson, Susan Ariel, "What does TPP mean for the Open Internet?" From &lt;em&gt;Policy Brief on Trade Agreements and Internet Governance Prepared for the Global Commission on Internet Governance&lt;/em&gt; (2015), &lt;a href="https://www.gwu.edu/~iiep/events/DigitalTrade2016/TPPPolicyBrief.pdf"&gt;https://www.gwu.edu/~iiep/events/DigitalTrade2016/TPPPolicyBrief.pdf&lt;/a&gt; (last visited Jul 5, 2016).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[16]&lt;/strong&gt; Lomas, Natasha, "TPP Trade Agreement Slammed For Eroding Online Rights," TechCrunch, &lt;a href="http://social.techcrunch.com/2015/11/05/tpp-vs-privacy/"&gt;http://social.techcrunch.com/2015/11/05/tpp-vs-privacy/&lt;/a&gt; (last visited Jun 30, 2016).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[17]&lt;/strong&gt; "Q&amp;amp;A: The Trans-Pacific Partnership," Human Rights Watch (2016), &lt;a href="https://www.hrw.org/news/2016/01/12/qa-trans-pacific-partnership"&gt;https://www.hrw.org/news/2016/01/12/qa-trans-pacific-partnership&lt;/a&gt; (last visited Jul 1, 2016).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[18]&lt;/strong&gt; "TPP Full Text Released," People Over Politics (2015), &lt;a href="http://peopleoverpolitics.org/2015/11/07/tpp-just-as-bad-as-you-thought/"&gt;http://peopleoverpolitics.org/2015/11/07/tpp-just-as-bad-as-you-thought/&lt;/a&gt; (last visited Jul 7, 2016).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[19]&lt;/strong&gt; "Right to Privacy in Trans-Pacific Partnership (TPP ) Negotiations," Knowledge Ecology International, &lt;a href="http://keionline.org/node/1164"&gt;http://keionline.org/node/1164&lt;/a&gt; (last visited Jul 1, 2016).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[20]&lt;/strong&gt; Asian Trade Centre, "E-Commerce and Digital Trade Proposals for RCEP (2016)," &lt;a href="http://static1.squarespace.com/static/5393d501e4b0643446abd228/t/575a654c86db438e86009fa1/1465541967821/RCEP+E-commerce+June+2016.pdf"&gt;http://static1.squarespace.com/static/5393d501e4b0643446abd228/t/575a654c86db438e86009fa1/1465541967821/RCEP+E-commerce+June+2016.pdf&lt;/a&gt; (last visited Jul 1, 2016).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[21]&lt;/strong&gt; "E-commerce companies like Flipkart, Snapdeal to beef up data security to meet RCEP norms," The Economic Times, &lt;a href="http://economictimes.indiatimes.com//articleshow/49068419.cms"&gt;http://economictimes.indiatimes.com//articleshow/49068419.cms&lt;/a&gt; (last visited Jul 1, 2016).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[22]&lt;/strong&gt; ECLI:EU:C:2015:650 (C -362/14)&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[23]&lt;/strong&gt; King et al., "Privacy law, cross-border data flows, and the Trans Pacific Partnership Agreement: what counsel need to know," Lexology, &lt;a href="http://www.lexology.com/library/detail.aspx?g=b5c0b400-8161-4439-a4b7-131552ad5209"&gt;http://www.lexology.com/library/detail.aspx?g=b5c0b400-8161-4439-a4b7-131552ad5209&lt;/a&gt; (last visited Jul 4, 2016).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[24]&lt;/strong&gt; "U.S.-India Business Council Applauds Resumption of Cybersecurity Dialogue," U.S.-India Business Council (2015), &lt;a href="http://www.usibc.com/press-release/us-india-business-council-applauds-resumption-cybersecurity-dialogue"&gt;http://www.usibc.com/press-release/us-india-business-council-applauds-resumption-cybersecurity-dialogue&lt;/a&gt; (last visited Jul 5, 2016).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[25]&lt;/strong&gt; Sukumar, Arun Mohan, "India Is Coming up Against the Limits of Its Strategic Partnership With the United States," The Wire (2016), &lt;a href="http://thewire.in/40403/india-is-coming-up-against-the-limits-of-its-strategic-partnership-with-the-united-states/"&gt;http://thewire.in/40403/india-is-coming-up-against-the-limits-of-its-strategic-partnership-with-the-united-states/&lt;/a&gt; (last visited Jul 4, 2016).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[26]&lt;/strong&gt;  Countries – Google Transparency Report, &lt;a href="https://www.google.com/transparencyreport/userdatarequests/countries/"&gt;https://www.google.com/transparencyreport/userdatarequests/countries/&lt;/a&gt; (last visited Jul 8, 2016).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[27]&lt;/strong&gt; Sukumar, Arun Mohan, "A case for the Net’s Ctrl+Alt+Del," The Hindu, September 5, 2015, &lt;a href="http://www.thehindu.com/opinion/op-ed/a-case-for-the-nets-ctrlaltdel/article7616355.ece"&gt;http://www.thehindu.com/opinion/op-ed/a-case-for-the-nets-ctrlaltdel/article7616355.ece&lt;/a&gt; (last visited Jul 5, 2016).&lt;/p&gt;
&lt;h2 id="9"&gt;9. Author Profile&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;Shubhangi Heda&lt;/strong&gt; is a Student of Jindal Global Law School, O.P Jindal Global University. She has completed her fourth year. She gives due importance to popular culture in her life and loves to read fiction and like to watch TV-shows, her favorite being 'White Collar'.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/tpp-and-d2-implications-for-data-protection-and-digital-privacy'&gt;https://cis-india.org/internet-governance/blog/tpp-and-d2-implications-for-data-protection-and-digital-privacy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Shubhangi Heda</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Trans Pacific Partnership</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Free Trade Agreement</dc:subject>
    
    
        <dc:subject>Digital Economy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    

   <dc:date>2016-07-12T07:56:24Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
