<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 31 to 45.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/electoral-databases-2013-privacy-and-security-concerns"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/does-the-safe-harbor-program-adequately-address-third-parties-online"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/divergence-between-the-general-data-protection-regulation-and-the-personal-data-protection-bill-2019"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/major-security-flaw-namo-app"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/demistifying-data-breaches-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/deccan-herald-january-20-2018-sunil-abraham-data-protection-we-can-innovate-leapfrog"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/danish-expert-group-on-data-ethics"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/quint-shweta-mohandas-and-pallavi-bedi-june-19-2023-cowin-data-breach-health-sensitive-details-policies-solution"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/contestations-of-data-ecj-safe-harbor-ruling-and-lessons-for-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/comparison-of-general-data-protection-regulation-and-data-protection-directive"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/comments-to-the-personal-data-protection-bill-2019"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/comments-on-the-statistical-disclosure-control-report"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/comments-on-the-rbi-consultation-paper-on-peer-to-peer-lending"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/comments-on-the-report-of-the-committee-on-digital-payments-dec-2016"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/medianama-february-21-2022-amber-sinha-data-protection-bill-digital-healthcare-case-study"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/electoral-databases-2013-privacy-and-security-concerns">
    <title>Electoral Databases – Privacy and Security Concerns</title>
    <link>https://cis-india.org/internet-governance/blog/electoral-databases-2013-privacy-and-security-concerns</link>
    <description>
        &lt;b&gt;In this blogpost, Snehashish Ghosh analyzes privacy and security concerns which have surfaced with the digitization, centralization and standardization of the electoral database and argues that even though the law provides the scope for protection of electoral databases, the State has not taken any steps to ensure its safety.&lt;/b&gt;
        &lt;p&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The recent move by the Election Commission of India (ECI) to tie-up with Google for providing electoral look-up services for citizens and electoral information services has faced heavy criticism on the grounds of data security and privacy.&lt;a href="#_edn1" name="_ednref1"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[i]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; After due consideration, the ECI has decided to drop the plan.&lt;a href="#_edn2" name="_ednref2"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[ii]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The plan to partner with Google has led to much apprehension regarding Google gaining access to the database of 790 million voters including, personal information such as age, place of birth and residence. It could have also gained access to cell phone numbers and email addresses had the voter chosen to enroll via the online portal on the ECI website.  Although, the plan has been cancelled, it does not necessarily mean that the largest database of citizens of India is safe from any kind of security breach or abuse. In fact, the personal information of each voter in a constituency can be accessed by anyone through the ECI website and the publication of electoral rolls is mandated by the law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Publication of Electoral Rolls&lt;/b&gt;&lt;br /&gt;The electoral roll essentially contains the name of the voter, name of the relationship (son of/wife of, etc.), age, sex, address and the photo identity card number. The main objective of creation and maintenance of electoral rolls and the issue of Electoral Photo Identity Card (EPIC) was to ensure a free and fair election where the voter would have been  able to cast his own vote as per his own choice. In other words, the main purpose of the exercise was to curtail bogus voting. This is achieved by cross referencing the EPIC with the electoral roll.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The process of creation and maintenance of electoral rolls is governed by the Registration of Electors Rules, 1960. Rule 22 requires the registration officer to publish the roll with list of amendments at his office for inspection and public information. Furthermore, ECI may direct the registration officer to send two copies of the electoral roll to every political party for which a symbol has exclusively been reserved by the ECI. It can be safely concluded that the electoral roll of a constituency is a public document&lt;a href="#_edn3" name="_ednref3"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[iii]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; given that the roll is published and can be circulated on the direction of the ECI.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With the computational turn, in 1998 the ECI took the decision to digitize the electoral databases. Furthermore, printed electoral rolls and compact discs containing the rolls are available for sale to general public.&lt;a href="#_edn4" name="_ednref4"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[iv]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; In addition to that, the electoral rolls for the entire country are available on the ECI website.&lt;a href="#_edn5" name="_ednref5"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[v]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; However, the current database is not uniform and standardized, and entries in some constituencies are available only in the local language. The ECI has taken steps to make the database uniform, standardized and centralized.&lt;a href="#_edn6" name="_ednref6"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[vi]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Security Concerns&lt;/b&gt;&lt;br /&gt;The Registration of Electoral Rules, 1960 is an archaic piece of delegated legislation which is still in force and casts a statutory duty on the ECI to publish the electoral rolls. The publication of electoral rolls is not a threat to security when it is distributed in hard copies and the availability of electoral rolls is limited. The security risks emerge only after the digitization of electoral database, which allows for uniformity, standardization and centralization of the database which in turn makes it vulnerable and subject to abuse. The law has failed to evolve with the change in technology.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In a recent article, Bill Davidow analyzes "the dark side of Moore’s Law" and argues that with the growth processing power there has been a growth in surveillance capabilities and on this note the article is titled, “&lt;i&gt;With Great Computing Power Comes Great Surveillance”&lt;/i&gt;&lt;a href="#_edn7" name="_ednref7"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[vii]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; Drawing from Davidow’s argument, with the exponential growth in computing power, search has become convenient, faster and cheap. A uniform, standardized and centralized database bearing the personal information of 790 million voters can be searched and categorized in accordance with the search terms. The personal information of the voters can be used for good, but it can be equally abused if it falls into the wrong hands. Big data analysis or the computing power makes it easier to target voters, as bits and pieces of personal information give a bigger picture of an individual, a community, etc. This can be considered intrusive on individual’s privacy since the personal information of every voter is made available in the public domain&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For example, the availability of a centralized, searchable database of voters along with their age would allow the appropriate authorities to identify wards or constituencies, which has a high population of voters above the age of 65. This would help the authority to set up polling booths at closer location with special amenities. However, the same database can be used to search for density of members of a particular community in a ward or constituency based on the name, age, sex of the voters. This information can be used to disrupt elections, target vulnerable communities during an election and rig elections.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Current IT Laws does not mandate the protection of the electoral database&lt;/b&gt;&lt;br /&gt;A centralized electoral database of the entire country can be considered as a critical information infrastructure (CII) given the impact it may have on the election which is the cornerstone of any democracy. Under Section 70 of the Information Technology Act, 2000 (IT Act) CII means “the computer resource, incapacitation or destruction of which, shall have debilitating impact on national security, economy.”&lt;a href="#_edn8" name="_ednref8"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[viii]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; However, the appropriate Government has not notified the electoral database as a protected system&lt;a href="#_edn9" name="_ednref9"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[ix]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;. Therefore, information security practices and procedures for a protected system are not applicable to the electoral database.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Information Technology Rules (IT Rules) are also not applicable to electoral databases, &lt;i&gt;per se&lt;/i&gt;. Since, ECI is not a body corporate, the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information), Rules, 2011 (&lt;i&gt;hereinafter &lt;/i&gt;Reasonable Security Practices Rules) do not apply to electoral databases. Ignoring that Reasonable Security Practices Rules only apply to a body corporate, the electoral database does fall within the ambit of definition of “personal information”&lt;a href="#_edn10" name="_ednref10"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[x]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; and should arguably be made subject to the Rules.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The intent of the ECI for hosting the entire country’s electoral database online &lt;i&gt;inter alia&lt;/i&gt; is to provide electronic service delivery to the citizens. It seeks to provide “electoral look up services for citizens ... for better electoral information services.”&lt;a href="#_edn11" name="_ednref11"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[xi]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; However, the Information Technology (Electronic Service Delivery) Rules, 2011 are not applicable to the electoral database given that it is not notified by the appropriate Government as a service to be delivered electronically. Hence, the encryption and security standards for electronic service delivery are not applicable to electoral rolls.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The IT Act and the IT Rules provide a reasonable scope for the appropriate Government to include electoral databases within the ambit of protected system and electronic service delivery. However, the appropriate government has not taken any steps to notify electoral database as protected system or a mode of electronic service delivery under the existing laws.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Conclusion&lt;/b&gt;&lt;br /&gt;Publication of electoral rolls is a necessary part of an election process. It ensures free and fair election and promotes transparency and accountability. But unfettered access to electronic electoral databases may have an adverse effect and would endanger the very goal it seeks to achieve because the electronic database may pose threat to privacy of the voters and also lead to security breach.  It may be argued that the ECI is mandated by the law to publish the electoral database and hence, it is beyond the operation of the IT Act. But Section 81 of the IT Act has an overriding effect on any law inconsistent, therewith. The appropriate Government should take necessary steps under the IT Act and notify electoral databases as a protected system.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is recommended that the Electors Registration Rules, 1960 should be amended, taking into account the advancement in technology. Therefore, the Rules should aim at restricting the unfettered electronic access to the electoral database and also introduce purposive limitation on the use of the electoral database. It should also be noted that more adequate and robust data protection and privacy laws should be put in place, which would regulate the collection, use, storage and processing of databases which are critical to national security.&lt;/p&gt;
&lt;div&gt;
&lt;hr align="left" size="1" width="100%" /&gt;
&lt;div id="edn1"&gt;
&lt;p class="MsoEndnoteText" style="text-align: justify; "&gt;&lt;a href="#_ednref1" name="_edn1"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[i]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; Pratap Vikram Singh, Post-uproar, EC’s Google tie-up plan may go for a toss, Governance Now, January 7, 2014 available at &lt;a class="external-link" href="http://www.governancenow.com/news/regular-story/post-uproar-ecs-google-tie-plan-may-go-toss"&gt;http://www.governancenow.com/news/regular-story/post-uproar-ecs-google-tie-plan-may-go-toss&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="edn2"&gt;
&lt;p class="MsoEndnoteText" style="text-align: justify; "&gt;&lt;a href="#_ednref2" name="_edn2"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[ii]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; Press Note No.ECI/PN/1/2014, Election Commission of India , January 9, 2014 available at &lt;a class="external-link" href="http://eci.nic.in/eci_main1/current/PN09012014.pdf"&gt;http://eci.nic.in/eci_main1/current/PN09012014.pdf&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="edn3"&gt;
&lt;p class="MsoEndnoteText" style="text-align: justify; "&gt;&lt;a href="#_ednref3" name="_edn3"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[iii]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; Section 74, Indian Evidence Act, 1872&lt;/p&gt;
&lt;/div&gt;
&lt;div id="edn4"&gt;
&lt;p class="MsoEndnoteText" style="text-align: justify; "&gt;&lt;a href="#_ednref4" name="_edn4"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[iv]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; &lt;a class="external-link" href="http://eci.nic.in/eci_main1/the_function.aspx"&gt;eci.nic.in/eci_main1/the_function.aspx&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="edn5"&gt;
&lt;p class="MsoEndnoteText" style="text-align: justify; "&gt;&lt;a href="#_ednref5" name="_edn5"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[v]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; &lt;a class="external-link" href="http://eci.nic.in/eci_main1/Linkto_erollpdf.aspx"&gt;http://eci.nic.in/eci_main1/Linkto_erollpdf.aspx&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="edn6"&gt;
&lt;p class="MsoEndnoteText" style="text-align: justify; "&gt;&lt;a href="#_ednref6" name="_edn6"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[vi]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; “At present, in most States and UTs the Electoral Database is kept at the district level. In some cases it is kept even with the vendors. In most States/UTs it is maintained in MS Access, while in some cases it is on a primitive technology like FoxPro and in some other cases on advanced RDBMS like Oracle or Sql Server. The database is not kept in bilingual form in some of the States/UTs, despite instructions of the Commission. In most cases Unicode fonts are not used. The database structure not being uniform in the country, makes it almost impossible for the different databases to talk to each other” –  Election Commission of India, Revision of Electoral Rolls with reference to 01-01-2010 as the qualifying date – Integration and Standardization of the database- reg., No. 23/2009-ERS, January 6, 2010 available at e&lt;a class="external-link" href="http://eci.nic.in/eci_main/eroll&amp;amp;epic/ins06012010.pdf"&gt;ci.nic.in/eci_main/eroll&amp;amp;epic/ins06012010.pdf&lt;/a&gt;&lt;span dir="RTL"&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="edn7"&gt;
&lt;p class="MsoEndnoteText"&gt;&lt;a href="#_ednref7" name="_edn7"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[vii]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;a class="external-link" href="http://eci.nic.in/eci_main1/current/PN09012014.pdf"&gt;&lt;span&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;http://www.theatlantic.com/technology/archive/2014/01/with-great-computing-power-comes-great-surveillance/282933/&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="edn8"&gt;
&lt;p class="MsoEndnoteText" style="text-align: justify; "&gt;&lt;a href="#_ednref8" name="_edn8"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[viii]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; Section 70, Information Technology Act, 2000&lt;/p&gt;
&lt;/div&gt;
&lt;div id="edn9"&gt;
&lt;p class="MsoEndnoteText" style="text-align: justify; "&gt;&lt;a href="#_ednref9" name="_edn9"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[ix]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; Computer resource which directly or indirectly affects the facility of Critical Information Infrastructure&lt;/p&gt;
&lt;/div&gt;
&lt;div id="edn10"&gt;
&lt;p class="MsoEndnoteText" style="text-align: justify; "&gt;&lt;a href="#_ednref10" name="_edn10"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[x]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; Rule 2(1)(i), Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011&lt;/p&gt;
&lt;/div&gt;
&lt;div id="edn11"&gt;
&lt;p class="MsoEndnoteText" style="text-align: justify; "&gt;&lt;a href="#_ednref11" name="_edn11"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[xi]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; Press Note No.ECI/PN/1/2014, Election Commission of India , January 9, 2014 available at &lt;a class="external-link" href="http://eci.nic.in/eci_main1/current/PN09012014.pdf"&gt;http://eci.nic.in/eci_main1/current/PN09012014.pdf&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/electoral-databases-2013-privacy-and-security-concerns'&gt;https://cis-india.org/internet-governance/blog/electoral-databases-2013-privacy-and-security-concerns&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>snehashish</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Cybersecurity</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Safety</dc:subject>
    
    
        <dc:subject>Information Technology</dc:subject>
    
    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Security</dc:subject>
    
    
        <dc:subject>e-Governance</dc:subject>
    
    
        <dc:subject>Transparency, Politics</dc:subject>
    
    
        <dc:subject>E-Governance</dc:subject>
    

   <dc:date>2014-01-16T11:07:21Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/does-the-safe-harbor-program-adequately-address-third-parties-online">
    <title>Does the Safe-Harbor Program Adequately Address Third Parties Online?</title>
    <link>https://cis-india.org/internet-governance/blog/does-the-safe-harbor-program-adequately-address-third-parties-online</link>
    <description>
        &lt;b&gt;While many citizens outside of the US and EU benefit from the data privacy provisions the Safe Harbor Program, it remains unclear how successfully the program can govern privacy practices when third-parties continue to gain more rights over personal data.  Using Facebook as a site of analysis, I will attempt to shed light on the deficiencies of the framework for addressing the complexity of data flows in the online ecosystem. &lt;/b&gt;
        
&lt;p&gt;To date, the EU-US Safe Harbor Program leads in governing
the complex and multi-directional flows of personal information online. &amp;nbsp;&amp;nbsp;As commerce began to thrive in the online
context, the European Union was faced with the challenge of ensuring that personal
information exchanged through online services were granted
levels of protect on par with provisions set out in EU privacy law.&amp;nbsp; This was important, notably as the piecemeal
and sectoral approach to privacy legislation in the United states was deemed incompatible
with the EU approach.&amp;nbsp; While the Safe
Harbor program did not aim to protect the privacy of citizens outside of the
European Union per say, the program has in practice set minimum standards for
online data privacy due to the international success of American online
services.&lt;/p&gt;

&lt;p&gt;While many citizens outside of the US and EU benefit from
the Safe Harbor Program, it remains unclear how successful the program will be in an
online ecosystem where third-parties are being granted increasingly more rights
over the data they receive from first parties.&amp;nbsp;
Using Facebook as a site of analysis, I will attempt to shed light on
the deficiencies of the framework for addressing the complexity of data flows
in the online ecosystem.&amp;nbsp; First, I will argue
that the safe harbor program does not do enough to ensure that participants are
held reasonably responsible third party privacy practices.&amp;nbsp; Second, I will argue that the information
asymmetries created between first party sites, citizens, and governance bodies
vis-à-vis third parties obscures the application of the Safe Harbor Model.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;The EU-US
Safe-Harbor Agreement&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;In 1995, and based on earlier &lt;a href="http://www.oecd.org/document/18/0,3343,en_2649_34255_1815186_1_1_1_1,00.html"&gt;OECD
guidelines&lt;/a&gt;, the EU Data Directive on the “protection of individuals with
regard to the processing of personal data and the free movement of such data”
was passed&lt;a name="_ednref1" href="#_edn1"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; [1].&amp;nbsp; The original purpose of the EU Privacy
Directive was not only to increase privacy protection within the European
Union, but to also promote trade liberalization and a single integrated market
in the EU.&amp;nbsp; After the Data Directive was
passed, each member state of the EU incorporated the principles of
the directive into national laws accordingly.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;While the Directive was successful in harmonizing data
privacy in the European Union, it also embodied extraterritorial
provisions, giving in reach&lt;a name="_ednref2" href="#_edn2"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; beyond the EU.&amp;nbsp; Article 25 of the Directive states that the
EU commission may ban data transfers to third countries that do not ensure “an
adequate level of protect’ of data privacy rights&lt;a name="_ednref3" href="#_edn3"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; [2].&amp;nbsp; Also, Article 26 of the Directive, expanding
on Article 25, states that personal data cannot be &lt;em&gt;transferred &lt;/em&gt;to a country that “does not ensure an adequate level of
protection” if the data controller does not enter into a contract that adduces
adequate privacy safeguards&lt;a name="_ednref4" href="#_edn4"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; [3].
&amp;nbsp;&lt;/p&gt;
&lt;p&gt;In light of the increased occurrence of cross-border
information flows, the Data Directive itself was not effective enough to ensure that
privacy principles were enforced outside of the EU.&amp;nbsp; Articles 25 and 26 of the Directive had essentially deemed all cross-border data-flows to the US in contravention of EU privacy law.&amp;nbsp; Therefor, the EU-US Safe-Harbor was established by the
EU Council and the US Department of Commerce as a way of mending the variant
levels of privacy protection set out in these jurisdictions, while also promoting
online commerce.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Social Networking
Sites and the Safe-Harbor Principles&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The case of social networking sites exemplifies the ease
with which data is transferred, processed, and stored between jurisdictionas.&amp;nbsp; While many of the top social networking sites
are registered American entities, they continue to attract users not only from
the EU, but also internationally.&amp;nbsp; In agreement
to the EU law, many social networking sites, including LinkedIn, Facebook,
Myspace, and Bebo, now adhere to the principles of the program.&amp;nbsp; The enforcement of the Safe Harbor takes
place in the United States in accordance with U.S. law and relies, to a great
degree, on enforcement by the private sector.&amp;nbsp;
TRUSTe, an independent certification program and dispute mechanism, has become the most popular governance mechanism for the safe harbor program
among social networking sites.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Drawing broadly on the principles embodied within the EU
Data Directive and the OECD Guidelines, the seven principles of the Safe-Harbor
were developed.&amp;nbsp; These principles include
Notice, Choice, Onward Transfer, Access and Accuracy, Security, Data Integrity
and Enforcement.&amp;nbsp;&amp;nbsp; The principle of “Notice”
sets out that organizations must inform individuals about the purposes for
which it collects and uses information about them, how to contact the
organization with any inquiries or complaints, the types of third parties to
which it disclosures the information, and the choices and means the organization
offers individuals for limiting its use and disclosure.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;“Choice” ensures that individuals have the opportunity to
choose to opt out whether their personal information is disclosed to a third
party, and to ensure that information is not used for purposes incompatible with the purposes for
which it was originally collected.&amp;nbsp; The
“Onward Transfer” principle ensures that third parties receiving information
subscribes to the Safe Harbor principles, is subject to the Directive, or
enters into a written agreement which requires that the third party provide at
least the same level of privacy protection as is requires by the relevant
principles.&lt;/p&gt;
&lt;p&gt;The principles of “Security” and “Data Integrity” seek to
ensure that reasonable precautions are taken to protect the loss or misuse of
data, and that information is not used in a manner which is incompatible with
the purposes for it is has been collected—minimizing the risk that personal
information would be misused or abused.&amp;nbsp;&amp;nbsp;&amp;nbsp;
Individuals are also granted the right, through the access principle, to
view the personal information about them that an organization holds, and to
ensure that it is up-to-date and accurate.&amp;nbsp;
The “Enforcement” principle works to ensure that an effective mechanism
for assuring compliance with the principles, and that there are consequences
for the organization when the principles are not followed.&lt;/p&gt;
&lt;p&gt;The principles of the program are rather quite clear and
enforceable in the first party context, despite some prevailing ambiguities.&amp;nbsp; The privacy policies of most social
networking services have become increasingly clear and straightforward since
their inception.&amp;nbsp; Facebook, for example,
has revamped its &lt;a href="http://www.facebook.com/privacy/explanation.php"&gt;privacy
regime&lt;/a&gt; several times, and gives explicit notice to users how their
information is being used.&amp;nbsp; The privacy
policy also explains the relationship between third parties and your personal information—including
how it may be used by advertisers, search engines, and fellow members.&amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;With respect to third party advertisers, principles of
“choice” are clearly granted by most social networking services.&amp;nbsp; For example, the &lt;a href="http://www.networkadvertising.org/"&gt;Network Advertising Initiative&lt;/a&gt;, a
self-regulatory initiative of the online advertising industry, clearly lists
its member websites and allows individuals to opt out of any targeted
advertising conducted by its members.&amp;nbsp; In
Facebook’s description of “cookies” in their privacy policy, a direct link to NAI’s
opt out features is given, allowing individuals to make somewhat informed
choices about their participation in such programs.&amp;nbsp; This point is, of course, in light of the
fact that most users do not read or understand the privacy policies provided by
social networking sites&lt;a name="_ednref5" href="#_edn5"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; [4].
It is also important to note that Google—a major player in the online
advertising business, does not grant users of Buzz and Orkut the same “opt-out”
options as sites such as Facebook and Bebo.&lt;/p&gt;
&lt;p&gt;Under the auspices of the US Federal Trade Commission, the
Safe Harbor Program has also successfully investigated and settled several
privacy-related breaches which have taken place on social networking sites.&amp;nbsp; Of the most famous cases is &lt;a href="http://www.beaconclasssettlement.com/"&gt;Lane et al. v. Facebook et al.&lt;/a&gt;,
which was a class action suit brought against Facebook’s Beacon Advertising
program.&amp;nbsp; The US Federal Trade Commission
was quick to insight an investigation of the program after many privacy groups
and individuals became critical of its questionable advertising practices.&amp;nbsp; The Beacon program was designed to allow
Facebook users to share information with their friends about actions taken on
affiliated, third party sites.&amp;nbsp; This had included,
for example, the movie rentals a user had made through the Blockbuster website.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The Plaintiffs filed a suit, alleging that Facebook and its
affiliates did not give users adequate notice and choice about Beacon and the
collection and use of users’ personal information. &amp;nbsp;&amp;nbsp;&amp;nbsp;The Beacon program was ultimately found to
be in breach of US law, including the &lt;a href="http://epic.org/privacy/vppa/"&gt;Video
Privacy Protection Act&lt;/a&gt;, which bans the disclosure of personally identifiable
rental information.&amp;nbsp; Facebook has
announced the settlement of the lawsuit, not bringing individual settlements,
but a marked end to the program and the development of a 9.5 million dollar &lt;a href="http://www.p2pnet.net/story/37119"&gt;Facebook Privacy Fund&lt;/a&gt; dedicated to
privacy and data-related issues.&amp;nbsp; Other privacy
related investigations of social networking sites launched by the FTC under the
Safe Harbor Program include Facebook’s &lt;a href="http://www.eff.org/deeplinks/2009/12/facebooks-new-privacy-changes-good-bad-and-ugly"&gt;privacy
changes&lt;/a&gt; in late 2009, and the Google’s recently released &lt;a href="http://www.networkworld.com/news/2010/032910-lawmakers-ask-for-ftc-investigation.html"&gt;Buzz
application&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Despite the headway the Safe Harbor is making, many privacy
related questions remain ambiguous with respect to the responsibilities social networking
sites through the program.&amp;nbsp; For example,
Bebo &lt;a href="http://www.bebo.com/Privacy2.jsp"&gt;reserves the right&lt;/a&gt; to
supplement a social profile with addition information collected from publicly
available information and information from other companies.&amp;nbsp; Bebo’s does adhere to the “notice principle”—as
it makes know to users how their information will be used through their privacy
policy. However, it remains unclear if appropriate disclosures are given by Bebo
as required by Safe Harbor Framework, notably as the sources of “publicly
available information” as a concept remains broad and obscured in the privacy policy.&amp;nbsp; It is also unclear whether or not Bebo users
are able to, under the “Choice” principle, refuse to having their profiles from
being supplemented by other information sources.&amp;nbsp; Also, under the “access
principle”, do individuals have the right to review all information held about them as “Bebo
users”?&amp;nbsp; The right to review information
held by a social networking site is an important one that should be upheld.&amp;nbsp; This is most notable as supplementary information
from outside social networking services is employed &amp;nbsp;to profile individual users in ways which may
work to categorize individuals in undesirable ways.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;The Third Party Problem&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Cooperation between social networking sites and the Safe
Harbor has improved, and most of these sites now have privacy policies which
explicitly address the principles of the Program.&amp;nbsp;&amp;nbsp; It should also be noted that public interest
groups, such as Epic, the Center for Digital Democracy, and The Electronic
Frontier Foundation, have played a key role in ensuring that data privacy
breaches are brought to the attention of the FTC under the program.&amp;nbsp; While the program has somewhat adequately
addressed the privacy practices of first party participants, the number of
third parties on social networking sites calls into question the
comprehensiveness and effectiveness of the Safe Harbor program.&amp;nbsp; Facebook itself as a first party site may adhere
to the Safe Harbor Program.&amp;nbsp; However, its
growing number third party platform members may not always adhere to best practices
in the field, nor can Facebook or the Safe Harbor Program guarantee that they
do so.&lt;/p&gt;
&lt;p&gt;The Safe Harbor Program does require that all participants
take certain security measures when transferring data to a third party.&amp;nbsp; Third parties must either subscribe to the
safe harbor principles, or be subject to the EU Data Directive.&amp;nbsp; Alternatively, an organization can may also
enter into a written agreement with a third party requiring that they provide
at least the same level of privacy protection as is required by program
principles.&amp;nbsp; Therefore, third parties of
participating program sites are, de facto, bound by the safe harbor principles by
the way of entering into agreement with a first party participant of the
program. &amp;nbsp;This is the approach taken by
most social networking sites and their third parties.&lt;/p&gt;
&lt;p&gt;It is important to note, however, that third parties are not
governed directly by the regulatory bodies, such as the FTC.&amp;nbsp; The safe harbor website also &lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018476.asp"&gt;explicitly notes&lt;/a&gt;
that the program does not apply to third parties.&amp;nbsp; Therefore, as per these provisions, Facebook must
adhere to the principles of the program, while its third party platform members
(such as social gaming companies), only must do so indirectly as per a separate
contract with Facebook.&amp;nbsp; The
effectiveness of this indirect mode of governing of third party privacy
practices is questionable for numerous reasons.&lt;/p&gt;
&lt;p&gt;Firstly, while Facebook does take steps to ensure that
third parties use information from Facebook in a manner which is consistent to
the safe harbor principles, the company explicitly &lt;a href="http://www.facebook.com/policy.php"&gt;waives any guarantee&lt;/a&gt; that third
parties will “follow their rules”. &amp;nbsp;&amp;nbsp;Prior to allowing third parties to access any
information about users, Facebook requires third parties to &lt;a href="http://www.facebook.com/terms.php"&gt;agree to terms&lt;/a&gt; that limit their
use of information, and also use technical measures to ensure that they only
obtain authorized information.&amp;nbsp;&amp;nbsp; Facebook
also warns users to “always review the policies of third party applications and
websites to make sure you are comfortable with the ways in which they use
information”.&amp;nbsp; Not only are users
required to read the privacy policies of every third party application, but are
also expected to report applications which may be in violation of privacy
principles.&amp;nbsp; In this sense, Facebook not
only waives responsibility for third party privacy breaches, but also places further
regulatory onus upon the user.&lt;/p&gt;
&lt;p&gt;As the program guidelines express, the safe harbor relies to
a great degree on enforcement by the private sector.&amp;nbsp; However, it is likely that a self-regulatory
framework may lead the industry into a state of regulatory malaise.&amp;nbsp; Under the safe harbor program, Facebook must
ensure that the privacy practices of third parties are adequate.&amp;nbsp; However, at the same time, the company may
simultaneously waiver their responsibility for third party compliance with safe
harbor principles.&amp;nbsp; Therefore, it remains
questionable as to where responsibility for third parties exactly lies.&amp;nbsp; When third parties are not directly
answerable to the governing bodies of safe harbor program, and when first parties
can to waive responsibility for their practices, from where does the incentive to
effectively regulate third parties to come from?&amp;nbsp;&lt;/p&gt;
&lt;p&gt;While Facbeook may in fact take reasonable legal and technical
measures to ensure third party compliance, the room for potential dissonance
between speech and deed&amp;nbsp; is worrisome.&amp;nbsp; Facebook is required to ensure that third
parties provide “&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018476.asp"&gt;at least the same
level of privacy protection&lt;/a&gt;” as they do.&amp;nbsp;
However, in practice, this has yet to become the case.&amp;nbsp; A quick survey of twelve of the most popular
Platform Applications in the gaming category showed&lt;a name="_ednref6" href="#_edn6"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;
that third parties are not granting their users the “same level of privacy
protection”[5].&amp;nbsp; For example, section 9.2.3
of Facebooks “&lt;a href="http://www.facebook.com/terms.php"&gt;Rights and
Responsibilities&lt;/a&gt;” for Developers/Operators of applications/sites states
that they must “have a privacy policy or otherwise make it clear to users what
user data you are going to use and how you will use, display, or share that
data”.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;However, out of the 12 gaming applications surveyed, four
companies failed to make privacy policies available to users &lt;em&gt;before&lt;/em&gt; they granted the application
access to the personal information, including that of their friends&lt;a name="_ednref7" href="#_edn7"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; [6].&amp;nbsp; After searching for the privacy policies on
the websites of each of the four social gaming companies, two completely failed
to post privacy policies on their central websites. &amp;nbsp;&amp;nbsp;This practice is in direct breach of the
contract made between these companies and Facebook, as mentioned above.&amp;nbsp; In addition to many applications failing to clearly
post privacy policies, many of provisions set out in these policies were
questionable vis-à-vis safe harbor principles.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;For example Zynga, makes of popular games Mafia Wars and
Farmville, reserve the right to “maintain copies of your content
indefinitely”.&amp;nbsp; This practice remains contrary
to Safe Harbor principles which states that information should not be kept for
longer than required to run a service.&amp;nbsp;
Electronic Arts also maintains similar provisions for data retention in
its privacy policy.&amp;nbsp;&amp;nbsp; Such practices are
rather worrisome also in light of the fact that both companies also reserve the
right to collect information on users from other sources to supplement profiles
held.&amp;nbsp; This includes (but is not limited
to) newspapers and Internet sources such as blogs, instant messaging services, and
other games.&amp;nbsp;&amp;nbsp; It is also notable to
mention that only one of the twelve social gaming companies surveyed directly
participates in the safe harbor program.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;In addition to the difficulties of ensuring that safe harbor
principles are adhered to by third parties, the information asymmetries which
exist between first party sites, citizens, and governance bodies vis-à-vis
third parties complicate this model.&amp;nbsp; Foremost,
it is clear that Facebook, despite its resources, cannot keep tabs on the
practices of all of their applications.&amp;nbsp;&amp;nbsp;
This puts into question if industry self-regulation can really guarantee
that privacy is respected by third parties in this context.&amp;nbsp; Furthermore, the lack of knowledge or
understanding held by citizens about how third parties user their information
is particularly problematic when a system relies so heavily on users to report
suspected privacy breaches.&amp;nbsp; The same is
likely to be true for governments, too.&amp;nbsp; As
one legal scholar, promoting a more laisse-fair approach to third party
regulation, notes—multiple and invisible third party relationships presents
challenges to traditional forms of legal regulation&lt;a name="_ednref8" href="#_edn8"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; [7].&amp;nbsp;&lt;/p&gt;
&lt;p&gt;In an “open “social ecosystem, the sheer volume of data
flows between users of social networking sites and third party players appears
to have become increasingly difficult to effectively regulate.&amp;nbsp; While the safe harbor program has been
successful in establishing best practices and minimum standards for data
privacy, it is also clear that governance bodies, and public interest groups,
have focused most attention on large industry players such as Facebook.&amp;nbsp; This has left smaller third party players on
social networking sites in the shadows of any substantive regulatory concern.&amp;nbsp; &amp;nbsp;&amp;nbsp;If
one this has become clear, it is the fact that governments may no longer be
able to effectively govern the flows of data in the burgeoning context of “open
data”.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;As I have demonstrated, it remains questionable whether or
not Facebook can regulate third parties data collection practices
effectively.&amp;nbsp; Imposing more stringent
responsibilities on safe harbor participants could be a positive step.&amp;nbsp; It is reasonable to assume that it would be
undue to impose liability on social networking sites for the data breaches of
third parties.&amp;nbsp; However, it is not
unreasonable to require sites like Facebook go beyond setting “minimum
standards” for data privacy, towards taking a more active enforcement, if even
through TRUSTe or another regulatory body.&amp;nbsp;
If the safe harbor is to be effective, it cannot allow program participants
to simply wave the liability for third party privacy practices.&amp;nbsp; The indemnity granted to third parties on social
networking sites may deem the safe harbor program more effective in sustaining
the non-liability of third parties, rather than protecting the data privacy of
citizens.&lt;/p&gt;
&lt;div&gt;&lt;/div&gt;
&lt;div&gt;
&lt;hr align="left" size="1" width="33%" /&gt;

&lt;/div&gt;
&lt;p class="discreet"&gt;&lt;a name="_edn1" href="#_ednref1"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;[1] Official Directive 95/46/EC&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="_edn2" href="#_ednref2"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="_edn3" href="#_ednref3"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;[2] 95/46/EC&lt;/p&gt;
&lt;p class="discreet"&gt;[3] Ibid&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="_edn4" href="#_ednref4"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;a name="_edn5" href="#_ednref5"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;/span&gt;&lt;/a&gt;[4] See Acquisit,
A. a. (n.d.). Imagined Communities: Awareness, Information Sharing, and Privacy
on Facebook. &lt;em&gt;PET 2006&lt;/em&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="_edn6" href="#_ednref6"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;[5] Of the Privacy Policy browsed include, Zynga, Rock
You!, Crowdstar, Mind Jolt, Electronic Arts, Pop Cap Games, Slash Key, Playdom,
Meteor Games, Broken Bulb Studios, Wooga, and American Global Network.&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="_edn7" href="#_ednref7"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;[6] By adding an application, users are also sharing with
third parties the information of their friends if they do not specifically &amp;nbsp;opt out of this practice.&lt;/p&gt;
&lt;p class="discreet"&gt;[7]See&lt;strong&gt;
&lt;/strong&gt;&amp;nbsp;Milina, S. (2003).
Let the Market Do its Job: Advocating an Integrated Laissez-Faire Approach to
Online Profiling. &lt;em&gt;Cardozo Arts and Entertainment Law Journal&lt;/em&gt; .&lt;/p&gt;
&lt;pre&gt;&lt;/pre&gt;
&lt;div&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;/div&gt;
&lt;h2&gt;&amp;nbsp;&lt;/h2&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/does-the-safe-harbor-program-adequately-address-third-parties-online'&gt;https://cis-india.org/internet-governance/blog/does-the-safe-harbor-program-adequately-address-third-parties-online&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>rebecca</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Facebook</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Social Networking</dc:subject>
    

   <dc:date>2011-08-02T07:19:34Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/divergence-between-the-general-data-protection-regulation-and-the-personal-data-protection-bill-2019">
    <title>Divergence between the General Data Protection Regulation and the Personal Data Protection Bill, 2019</title>
    <link>https://cis-india.org/internet-governance/blog/divergence-between-the-general-data-protection-regulation-and-the-personal-data-protection-bill-2019</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
&lt;p&gt;Our note on the divergence between the General Data Protection Regulation and the Personal Data Protection Bill can be downloaded as a PDF &lt;a href="https://cis-india.org/internet-governance/divergence-between-the-gdpr-and-pdp-bill-2019" class="internal-link" title="Divergence between the GDPR and PDP Bill 2019"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;The European Union’s General Data
Protection Regulation (GDPR), replacing the 1995 EU Data Protection Directive
came into effect in May 2018. It harmonises the data protection regulations
across the European Union. In India, the Ministry of Electronics and
Information Technology had constituted a Committee of Experts (chaired by
Justice Srikrishna) to frame recommendations for a data protection framework in
India. The Committee submitted its report and a draft Personal Data Protection
Bill in July 2018 (2018 Bill). Public comments were sought on the bill till
October 2018. The Central Government revised the Bill and introduced the
revised version of the Personal Data Protection Bill (PDP Bill) on December 11,
2019 in the Lok Sabha.&lt;/p&gt;
&lt;p&gt;The PDP Bill has incorporated certain
aspects of the GDPR, such as requirements for notice to be given to the data
principal, consent for processing of data, establishment of a data protection
authority, etc. However, there are some differences and in this note we have highlighted
the areas of divergence between the two. It only includes
provisions which are common to the GDPR and the PDP Bill. It does not include
the provisions on (i) Appellate Tribunal, (ii) Finance, Account and Audit; and
(iii) Non- Personal Data.&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/divergence-between-the-general-data-protection-regulation-and-the-personal-data-protection-bill-2019'&gt;https://cis-india.org/internet-governance/blog/divergence-between-the-general-data-protection-regulation-and-the-personal-data-protection-bill-2019&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Pallavi Bedi</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2020-02-21T11:08:50Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/major-security-flaw-namo-app">
    <title>Developer team fixed vulnerabilities in Honorable PM's app and API</title>
    <link>https://cis-india.org/internet-governance/blog/major-security-flaw-namo-app</link>
    <description>
        &lt;b&gt;The official app of Narendra Modi, the Indian Prime Minister, was found to contain a security flaw in 2015 that exposed millions of people's personal data.  A few days ago a very similar flaw was reported again.  This post by Bhavyanshu Parasher, who found the flaw and sought to get it fixed last year, explains the technical details behind the security vulnerability.&lt;/b&gt;
        &lt;p&gt;&lt;strong&gt;This blog post has been authored by Bhavyanshu Parasher&lt;/strong&gt;. The original post can be&lt;a class="external-link" href="https://bhavyanshu.me/major-security-flaw-pm-app/09/29/2015"&gt; read here&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;h2 style="text-align: justify; "&gt;What were the issues?&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The main issue was how the app was communicating with the API served by narendramodi.in.&lt;/span&gt;&lt;/p&gt;
&lt;div id="_mcePaste" style="text-align: justify; "&gt;&lt;ol&gt;
&lt;li&gt;I was able to extract private data, like email addresses, of each registered user just by iterating over user IDs.&lt;/li&gt;
&lt;li&gt;There was no authentication check for API endpoints. Like, I was able to comment as any xyz user just by hand-crafting the requests.&lt;/li&gt;
&lt;li&gt;The API was still being served over HTTP instead of HTTPS.&lt;/li&gt;
&lt;/ol&gt;&lt;/div&gt;
&lt;h3 style="text-align: justify; "&gt;Fixed&lt;/h3&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;The most important issue of all. Unauthorized access to personal info, like email addresses, is fixed. I have tested it and can confirm it.&lt;/li&gt;
&lt;li&gt;A check to verify if a valid user is making the request to API endpoint is fixed. I have tested it and can confirm it.&lt;/li&gt;
&lt;li&gt;Blocked HTTP. Every response is served over HTTPS. The people on older versions (which was serving over HTTP) will get a message regarding this. I have tested it. It says something like “Please update to the latest version of the Narendra Modi App to use this feature and access the latest news and exciting new features”. It’s good that they have figuered out a way to deal with people running older versions of the app. Atleast now they will update the app.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2 style="text-align: justify; "&gt;Detailed Vulnerability Disclosure&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Found major security loophole in how the app accesses the “api.narendramodi.in/api/” API. At the time of disclosure, API was being served over “HTTP” as well as “HTTPS”. People who were still using the older version of the app were accessing endpoints over HTTP. This was an issue because data (passwords, email addresses) was being transmitted as plain text. In simple terms, your login credentials could easily be intercepted. MITM attack could easily fetch passwords and email addresses. Also, if your ISP keeps log of data, which it probably does, then they might already have your email address, passwords etc in plain text. So if you were using this app,&lt;strong&gt; I would suggest you to change your password immediately&lt;/strong&gt;. Can’t leave out a possibility of it being compromised.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another major problem was that the token needed to access API was giving a false sense of security to developers. The access token could easily be fetched &amp;amp; anyone could send hand-crafted HTTP requests to the server. It would result in a valid JSON response without authenticating the user making the request. This included accessing user-data (primarily email address, fb profile pictures of those registered via fb) for any user and posting comments as any registered user of the app. There was no authentication check on the API endpoint. Let me explain you with a demo.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The API endpoint to fetch user profile information (email address) was getprofile. Before the vulnerability was fixed, the endpoint was accessible via “http://www.narendramodi.in/api/getprofile?userid=useridvalue&amp;amp;token=sometokenvalue”. As you can see, it only required two parameters. userid, which we could easily iterate on starting from 1 &amp;amp; token which was a fixed value. There was no authentication check on API access layer. Hand-crafting such requests resulted in a valid JSON response which exposed critical data like email addresses of each and every user. I quickly wrote a very simply script to fetch some data to demonstrate. Here is the sample output for xrange(1,10).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/App.png/@@images/7bec3ca6-0808-4d19-9711-bc084b507f61.png" alt="App" class="image-inline" title="App" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Not just email addresses, using this method you could spam on any article pretending to be any user of the app. There was no authentication check as to who was making what requests to the API. See,&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/copy_of_App.png/@@images/2e499adb-b621-4bc4-a490-f8957c9ac1d7.png" alt="App" class="image-inline" title="App" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;They have fixed all these vulnerabilities. I still believe it wouldn’t have taken so long if I would have been able to get in touch with team of engineers directly right from the beginning. In future, I hope they figure out an easier way to communicate. Such issues must be addressed as soon as they are found but the communication gap cost us lot of time. The team did a great job by fixing the issues and that’s what matters.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;h2 style="text-align: justify; "&gt;Disclosure to officials&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The email address provided on Google play store returned a response stating “The email account that you tried to reach is over quota”. Had to get in touch with authorities via twitter.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Vulnerability disclosed to authorities on 30th sep, 2015 around 5:30 AM&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/Tweet1.png" alt="Tweet 1" class="image-inline" title="Tweet 1" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;After about 30 hours of reporting the vulnerabillity&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/Tweet2.png" alt="Tweet 2" class="image-inline" title="Tweet 2" /&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Proposed Solution&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Consulted &lt;/span&gt;&lt;a href="https://twitter.com/pranesh_prakash"&gt;@pranesh_prakash&lt;/a&gt;&lt;span&gt; as well regarding the issue.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;img src="https://cis-india.org/home-images/Tweet3.png" alt="Tweet 3" class="image-inline" title="Tweet 3" /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;After this, I mailed them a solution regarding the issues.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;h2 style="text-align: justify; "&gt;Discussion with developer&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Received &lt;strong&gt;phone call&lt;/strong&gt; from a developer. Discussed possible solutions to fix it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;The solution that I proposed could not be implemented &lt;/strong&gt;since the vulnerability is caused by a design flaw that should have been thought about right from the beginning when they started developing the app. It just proved how difficult it is to fix such issues for mobile apps. For web apps, it’s lot easier. Why? Because for mobile apps, you need to consider backward compatibility. If they applied my proposed solution, it would crash app for people running the older versions. Main problem is that &lt;strong&gt;people don’t upgrade to latest versions leaving themselves vulnerable to security flaws&lt;/strong&gt;. The one I proposed is a better way of doing it I think but it will break for people using older versions as stated by the developer. Though, they (developers) have come up with solutions that I think would fix most of the issues and can be considered an alternative.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/Tweet4.png" alt="Tweet 4" class="image-inline" title="Tweet 4" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On Oct 3rd, I received mail from one of the developers who informed me they have fixed it. I could not check it out at that time as I was busy but I checked it around 5 PM. &lt;strong&gt;I can now confirm they have fixed all three issues&lt;/strong&gt;.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;h2 style="text-align: justify; "&gt;Update 12/02/2016&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="http://www.dailyo.in/variety/narendra-modi-namo-app-hacker-security-concerns-javed-khatri-demonetisation-survey-bjp-voter-data/story/1/14347.html"&gt;This vulnerability&lt;/a&gt; in NM app is similar to the one I got fixed last year. Like I said before also, the vulnerability is because of how the API has been designed. They released the same patch which they did back then. Removing email addresses from the JSON output is not really a patch. I wonder why would they introduce personal information in JSON output again if they knew that’s a privacy problem and has been reported by me a year back. He showed how he was able to follow any user being any user. Similarly, I was able to comment on any post using account of any user of the app. When I talked to the developer back then he mentioned it will be difficult to migrate users to a newer/secure version of the app so they are releasing this patch for the meantime. It was more of a backward compatibility issue because of how API was designed. The only solution to this problem is to rewrite the API from scratch and add standard auth methods for API. That should take care of most of vulnerabilities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Also read:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://www.newindianexpress.com/nation/2016/dec/02/narendra-modi-app-hacked-by-youngster-points-out-risk-to-7-million-users-data-1544933--1.html"&gt;Narendra Modi app hacked by youngster, points out risk to 7 million users’ data&lt;/a&gt; (New Indian Express; December 2, 2016)&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://indiatoday.intoday.in/story/security-22-year-old-hacks-modi-app-private-data-7-million/1/825661.html"&gt;Security flaw: 22-year-old hacks Modi app and accesses private data of 7 million people&lt;/a&gt; (India Today; December 2, 2016)&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://thewire.in/84148/tech-security-namo-api/"&gt;The NaMo App Non-Hack is Small Fry – the Tech Security on Government Apps Is Worse&lt;/a&gt; (The Wire; December 3, 2016)&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/major-security-flaw-namo-app'&gt;https://cis-india.org/internet-governance/blog/major-security-flaw-namo-app&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Hacking</dc:subject>
    
    
        <dc:subject>Mobile Apps</dc:subject>
    
    
        <dc:subject>Data Management</dc:subject>
    

   <dc:date>2016-12-04T19:08:56Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/demistifying-data-breaches-in-india">
    <title>Demystifying Data Breaches in India</title>
    <link>https://cis-india.org/internet-governance/blog/demistifying-data-breaches-in-india</link>
    <description>
        &lt;b&gt;Despite the rate at which data breaches occur and are reported in the media, there seems to be little information about how and when they are resolved. This post examines the discourse on data breaches in India with respect to their  historical forms, with a focus on how the specific terminology to describe data security incidents has evolved in mainstream news media reportage.

&lt;/b&gt;
        &lt;p&gt;Edited by Arindrajit Basu and Saumyaa Naidu&lt;/p&gt;
&lt;hr /&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;India saw a &lt;a href="https://theprint.in/india/despite-62-drop-in-data-breaches-india-among-top-5-nations-targeted-by-hackers-study-finds/917197/"&gt;62% drop in data breaches in the first quarter of 2022&lt;/a&gt;. Yet, it ranked fifth on the list of countries most hit by cyberattacks according to a 2022 &lt;a href="https://surfshark.com/blog/data-breach-statistics-by-country"&gt;report by Surfshark&lt;/a&gt;, a Netherlands-based VPN company. Another report &lt;a href="https://analyticsindiamag.com/the-ridiculous-17-5-cr-for-a-data-breach/"&gt;on the cost of data breaches researched by the Ponemon Institute and published by IBM&lt;/a&gt; reveals that the breach of about 29500 records between March 2021 and March 2022 resulted in a 25% increase in the average cost from INR 165 million in 2021 to INR 176 million in 2022.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;These statistics are certainly a cause for concern, especially in the context of India’s rapidly burgeoning digital economy shaped by the pervasive platformization of private and public services such as welfare, banking, finance, health, and shopping among others. Despite the rate at which data breaches occur and are reported in the media, there seems to be little information about how and when they are resolved. This post examines the discourse on data breaches in India with respect to their historical forms, with a focus on how the specific terminology to describe data security incidents has evolved in mainstream news media reportage.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;While expert articulations of cybersecurity in general and data breaches in particular tend to predominate the public discourse on data privacy, this post aims to situate broader understandings of data breaches within the historical context of India’s IT revolution and delve into specific concepts and terminology that have shaped the broader discourse on data protection. The late 1990s and early 2000s offer a useful point of entry into the genesis of the data security landscape in India.&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span&gt;&lt;/span&gt;&lt;span&gt;Data Breaches and their Predecessor Forms&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;/span&gt;&lt;span&gt;The articulation of data security concerns around the late 1990s and early 2000s isn’t always consistent in deploying the phrase, ‘data breach’ to signal cybersecurity concerns in India. The terms such as ‘data/ identity theft’ and ‘data leak’ figure prominently in the public articulation of concerns with the handling of personal information by IT systems, particularly in the context of business process outsourcing (BPO) and e-commerce activities. Other pertinent terms such as “security breach”, “data security”, and ‘“cyberfraud” also capture the specificity of growing concerns around outsourced data to India. At the time, i.e. around mid-2000s regulatory frameworks were still evolving to accommodate and address the complexities arising from a dynamic reconfiguration of the telecommunications and IT landscape in India.&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Some of the formative cases that instantiate the usage of the aforementioned terms are instructive to understand shifts in the reporting of such incidents over time. The earliest case during that period concerns&lt;a href="https://www.stop-source-code-theft.com/source-code-theft-cases-in-india/"&gt; a 2002 case concerning the theft and sale of source code&lt;/a&gt; by an IIT Kharagpur student who intended to sell the code to two undercover FBI agents who worked with the CBI to catch the thief. A straightforward case of data theft was framed by media stories around the time as a &lt;a href="https://timesofindia.indiatimes.com/iitian-held-for-stealing-software-source-code/articleshow/20389713.cms"&gt;cybercrime involving the illegal sale&lt;/a&gt; of the source code of a software package, as &lt;a href="https://economictimes.indiatimes.com/ip-laws-lax-but-us-firm-bets-on-india/articleshow/696197.cms?from=mdr"&gt;software theft of intellectual property in the context of outsourcing&lt;/a&gt; and as an instance of &lt;a href="https://www.computerworld.com/article/2573515/at-risk-offshore.html"&gt;industrial espionage in poor nations without laws protecting foreign companies&lt;/a&gt;. This case became the basis of the earliest calls for the protection of data privacy and security in the context of the Indian BPO sector. The Indian IT Act, 2000 at the time only covered &lt;a href="http://pavanduggal.com/wp-content/uploads/2016/01/India-Responds-to-Growing-Concerns-Over-Data-Security.pdf"&gt;unauthorized access and data theft from computers and networks without any provisions for data protection, interception or computer forgery&lt;/a&gt;. The BPO boom in India brought with it &lt;a href="https://blj.ucdavis.edu/archives/vol-6-no-2/offshore-outsourcing-to-india.html"&gt;employment opportunities for India’s English-speaking, educated youth but in the absence of concrete data privacy legislation&lt;/a&gt;, the country was regarded as an unsafe destination for outsourcing aside from the political ramifications concerning the loss of American jobs.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;In a major 2005 incident, employees of the Mphasis BFL call centre in Pune extracted sensitive bank account information of Citibank’s American customers to divert INR 1.90 crore into new accounts set up in India. The media coverage of this incident calls it &lt;a href="https://www.indiatoday.in/magazine/economy/story/20050502-pune-call-centre-fraud-rattles-india-booming-bpo-sector-787790-2005-05-01"&gt;India’s first outsourcing cyberfraud and a well planned scam&lt;/a&gt;, a &lt;a href="https://economictimes.indiatimes.com/mphasis-call-centre-fraud-net-widens/articleshow/1077097.cms"&gt;cybercrime in a globalized world&lt;/a&gt;, and a case of &lt;a href="https://timesofindia.indiatimes.com/home/sunday-times/deep-focus/indias-first-bpo-scam-unraveled/articleshow/1086438.cms"&gt;financial fraud and a scam&lt;/a&gt; that required no hacking skills, and a &lt;a href="https://www.infoworld.com/article/2668975/indian-call-center-workers-charged-with-citibank-fraud.html"&gt;case of data theft and misuse&lt;/a&gt;. Within the ambit of cybercrime, media reports of these incidents refer to them as cases of “fraud”, “scam” and “theft''.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Two other incidents in 2005 set the trend for a critical spotlight on data security practices in India. In a &lt;a href="http://news.bbc.co.uk/2/hi/south_asia/4619859.stm"&gt;June 2005 incident, an employee of a Delhi-based BPO firm, Infinity e-systems, sold the account numbers and passwords of 1000 bank customers &lt;/a&gt;to the British Tabloid, The Sun. The Indian newspaper, Telegraph India, carried an online story headlined, “&lt;a href="https://www.telegraphindia.com/india/bpo-blot-in-british-backlash-indian-sells-secret-data/cid/873737"&gt;BPO Blot in British Backlash: Indian Sells Secret Data&lt;/a&gt;,” which reported that the employee, Kkaran Bahree, 24, was set up by a British journalist, Oliver Harvey. Harvey filmed Bahree accepting wads of cash for the stolen data. Bahree’s theft of sensitive information is described both as a data fraud and a leak in the above 2005 BBC story by Soutik Biswar. Another story on the incident calls it a “&lt;a href="https://www.rediff.com/money/2005/jun/24bpo3.htm"&gt;scam” involving the leakage of credit card information&lt;/a&gt;. The use of the term ‘leak’ appears consistently across other media accounts such as a &lt;a href="https://timesofindia.indiatimes.com/city/delhi/esearch-bpo-employee-sacked-still-missing/articleshow/1153017.cms"&gt;2005 story on Karan Bahree in the Times of India&lt;/a&gt; and another story in the Economic Times about the Australian Broadcasting Corporation’s (ABC) sting operation similar to the one in Delhi, describing the scam by the &lt;a href="https://economictimes.indiatimes.com/hot-links/bpo/karan-bahree-part-ii-shot-in-australia/articleshow/1201347.cms?from=mdr"&gt;fraudsters as a leak&lt;/a&gt; of the online information of Australians. Another media account of the coverage describes the incident in more generic terms such as an “&lt;a href="https://www.tribuneindia.com/2005/20050625/edit.htm"&gt;outsourcing crime&lt;/a&gt;”.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;The other case concerned &lt;a href="https://www.taylorfrancis.com/chapters/mono/10.4324/9781315610689-16/political-economy-data-security-bpo-industry-india-alan-chong-faizal-bin-yahya"&gt;four former employees of Parsec technologies who stole classified information and diverted calls from potential customers&lt;/a&gt;, causing a sudden drop in the productivity of call centres managed by the company in November 2005. Another call centre &lt;a href="http://news.bbc.co.uk/1/hi/uk/7953401.stm"&gt;fraud came to light in 2009 through a BBC sting operation in which British reporters went to Delhi &lt;/a&gt;and secretly filmed a deal with a man selling credit card and debit card details obtained from Symantec call centres, which sold software made by Norton. This BBC story uses the term “breach” to refer to the incident.&lt;/p&gt;
&lt;p dir="ltr"&gt;In the broader framing of these cases generally understood as cybercrime, which received transnational media coverage, the terms “fraud”, “leak”, “scam”, and “theft” appear interchangeably. The term “data breach” does not seem to be a popular or common usage in these media accounts of the BPO-related incidents. A broader sense of breach (of confidentiality, privacy) figures in the media reportage in &lt;a href="https://economictimes.indiatimes.com/hot-links/bpo/cyber-crimes-can-the-west-trust-indian-bpos/articleshow/1157115.cms?from=mdr"&gt;implicitly racial terms of cultural trust&lt;/a&gt;, as a matter of &lt;a href="https://www.news18.com/news/business/bpo-staff-need-ethical-training-poll-248442.html"&gt;ethics and professionalism&lt;/a&gt; and in the &lt;a href="https://www.news18.com/news/business/sting-op-may-spell-doom-for-bpos-248260.html"&gt;language of scandal &lt;/a&gt;in some cases.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;These early cases typify a specific kind of cybercrime concerning the theft or misappropriation of outsourced personal data belonging to British or American residents. What’s remarkable about these cases is the utmost sensitivity of the stolen personal information including financial details, bank account and credit/debit card numbers, passwords, and in one case, source code. While these cases rang the alarm bells on the Indian BPO sector’s data security protocols, they also directed attention to concerns around &lt;a href="https://economictimes.indiatimes.com/hot-links/bpo/cyber-crimes-can-the-west-trust-indian-bpos/articleshow/1157115.cms?from=mdr"&gt;the training of Indian employees on the ethics of data confidentiality and vetting through psychometric tests&lt;/a&gt; for character assessment. In the wake of these incidents, the National Association of Software and Service Companies (NASSCOM), an Indian non-governmental trade and advocacy group,&lt;a href="https://www.computerworld.com/article/2547959/outsourcing-to-india--dealing-with-data-theft-and-misuse.html"&gt; launched a National Skills Registry for IT professionals to enable employers to conduct background checks&lt;/a&gt; in 2006.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;These data theft incidents earned India a global reputation of an unsafe destination for business process outsourcing, seen to be lacking both, a culture of maintaining data confidentiality and concrete legislation for data protection at the time. Importantly, the incidents of data theft or misappropriation were also traceable back to a known source, a BPO employee or a group of malefactors, who often sold sensitive data belonging to foreign nationals to others in India.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;The phrase “data leak” also caught on in another register in the context of the widespread use of camera-equipped mobile phones in India. The 2004 Delhi MMS case offers an instance of a date leak, recapitulating the language of scandal in moralistic terms.&lt;/p&gt;
&lt;h3 dir="ltr"&gt;The Delhi MMS Case&lt;/h3&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;The infamous 2004 incident involved two underage Delhi Public School (DPS) students who recorded themselves in a sexually explicit act on a cellular phone. After a fall out, the male student passed the low-resolution clip on to his friend in which his female friend’s face is seen. The clip, distributed far and wide in India, ended up on the famous e-shopping and auction website, bazee.com leading to &lt;a href="https://indiancaselaw.in/avnish-bajaj-vs-state-dps-mms-scandal-case/"&gt;the arrest of the website’s CEO Avinash Bajaj for hosting the listing for sale&lt;/a&gt;. Another similar case in 2004 mimicked the mechanics of visual capture through hand-held MMS-enabled mobile phones. A two-minute MMS of a top South-Indian actress &lt;a href="https://timesofindia.indiatimes.com/india/web-of-sleaze-now-nude-video-of-top-actress/articleshow/966048.cms"&gt;taking a shower went viral on the Internet in 2004, the year when another MMS of two prominent Bollywood actors kissing&lt;/a&gt; had already done the rounds. The &lt;a href="https://www.journals.upd.edu.ph/index.php/plaridel/article/view/2392"&gt;MMS case also marked the onset of a national moral panic around the amateur uses of mobile phone technologies&lt;/a&gt;, capable of corrupting young Indian minds under a sneaky regime of new media modernity. The MMS case, not strictly the classic case of a data breach - non-visual information generally stored in databases - became an iconic case of a data leak framed in the media as &lt;a href="https://www.telegraphindia.com/india/scandal-in-school-shakes-up-delhi/cid/1667531"&gt;a scandal that shocked the country&lt;/a&gt;, with calls for the regulation of mobile phone use in schools. The case continued its scandalous afterlife in a &lt;a href="https://www.heraldgoa.in/Edit/dev-ds-leni-has-a-dps-mms-scandal-connection-/21344"&gt;2009 Bollywood film, Dev D&lt;/a&gt; and another &lt;a href="https://indianexpress.com/article/entertainment/entertainment-others/delhi-mms-scandal-inspires-dibakars-love-sex-aur-dhoka/"&gt;2010 film, Love, Sex and Dhokha&lt;/a&gt;,&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Taken together, the BPO data thefts and frauds and the data leak scandals prefigure the contemporary discourse on data breaches in the second decade of the 21st century, or what may also be called the Decade of Datafication. The launch of the Indian biometric identity project, Aadhaar, in 2009, which linked access to public services and welfare delivery with biometric identification, resulted in large-scale data collection of the scheme’s subscribers. Such linking raised the spectre of state surveillance as alleged by the critics of Aadhaar, marking a watershed moment in the discourse on data privacy and protection.&lt;/p&gt;
&lt;h3 dir="ltr"&gt;Aadhaar Data Security and Other Data Breaches&lt;/h3&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Aadhaar was challenged in the Indian Supreme Court in 2012 when &lt;a href="https://www.outlookindia.com/website/story/worries-about-the-aadhaar-monster/296790"&gt;it was made mandatory for welfare and other services such as banking, taxation and mobile telephony&lt;/a&gt;. The national debate on the status of privacy as a cultural practice in Indian society and a fundamental right in the Indian Constitution led to two landmark judgments - the &lt;a href="https://main.sci.gov.in/supremecourt/2012/35071/35071_2012_Judgement_24-Aug-2017.pdf"&gt;2017 Puttaswamy ruling&lt;/a&gt; holding privacy to be a constitutional right subject to limitations and &lt;a href="https://indiankanoon.org/doc/127517806/"&gt;the 2018 Supreme Court judgment holding mandatory Aadhaar to be constitutional only for welfare and taxation but no other service&lt;/a&gt;.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;While these judgments sought to rein in Aadhaar’s proliferating mandatory uses, biometric verification remained the most common mode of identity authentication with &lt;a href="https://www.businesstoday.in/latest/trends/story/aadhaar-not-mandatory-yet-organisations-pose-it-as-a-mandatory-document-335550-2022-05-29"&gt;most organizations claiming it to be mandatory for various purposes&lt;/a&gt;. During the same period from 2010 onwards, a range of data security events concerning Aadhaar came to light. These included &lt;a href="https://www.firstpost.com/tech/news-analysis/aadhaar-security-breaches-here-are-the-major-untoward-incidents-that-have-happened-with-aadhaar-and-what-was-actually-affected-4300349.html"&gt;app-based flaws, government websites publishing Aadhaar details of subscribers, third party leaks of demographic data, duplicate and forged Aadhaar cards and other misuses&lt;/a&gt;.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;In 2015, the Indian government launched its ambitious &lt;a href="https://indiancc.mygov.in/wp-content/uploads/2021/08/mygov-10000000001596725005.pdf"&gt;Digital India Campaign to provide government services to Indian citizens&lt;/a&gt; through online platforms. Yet, data security breach incidents continued to increase, particularly the trade in the sale and purchase of sensitive financial information related to bank accounts and credit card numbers. The online availability of &lt;a href="https://www.livemint.com/Industry/l5WlBjdIDXWehaoKiuAP9J/India-unprepared-to-tackle-online-data-security-report.html"&gt;a rich trove of data, accessible via a simple Google search without the use of any extractive software or hacking skills &lt;/a&gt;within a thriving shadow economy of data buyers and sellers makes India a particularly vulnerable digital economy, especially in the absence of robust legislation. The lack of awareness around digital crimes and low digital literacy further exacerbates the situation given that datafication via government portals, e-commerce, and online apps has outpaced the enforcement of legislative frameworks for data protection and cybersecurity.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;In the context of Aadhaar data security issues, the term “data leak” seems to have more traction in media stories followed by the term “security breach”. Given the complexity of the myriad ways in which Aadhaar data has been breached, terms such as &lt;a href="https://techcrunch.com/2022/06/13/aadhaar-leak-pm-kisan/?guccounter=1&amp;amp;guce_referrer=aHR0cHM6Ly93d3cuZ29vZ2xlLmNvbS8&amp;amp;guce_referrer_sig=AQAAADvQXtC19Gj80LSKVc5jLwnRsREalvM2f6dV3N9KmCs8be6_1Zbvu3J6abPmBxhLlUooLiOjg4JktYDDCXr0OYYvOZ5XFlXa6DfCJk97TvMXM-cs3uJbCJBA-ePqvAC5K4qGZSyDB4OykMEOIKXJpB0CTOourPRc5dBxFFq5JXlB"&gt;data leak and exposure&lt;/a&gt; (of &lt;a href="https://zeenews.india.com/personal-finance/aadhaar-data-breach-over-110-crore-indian-farmers-aadhaar-card-data-compromised-2473666.html"&gt;11 crore Indian farmers’ sensitive information&lt;/a&gt;) add to the specificity of the data security compromise. The term “fraud” also makes a comeback in the context of &lt;a href="https://www.business-standard.com/article/economy-policy/india-s-aadhaar-id-system-delivers-benefits-but-at-risk-of-widespread-fraud-122062400124_1.html"&gt;Aadhaar-related data security incidents&lt;/a&gt;. These cases represent a mix of data frauds involving&lt;a href="https://economictimes.indiatimes.com/news/india/alarm-over-fake-id-printing-websites-using-customer-data-for-cyber-fraud/articleshow/94742646.cms"&gt; fake identities&lt;/a&gt;, &lt;a href="https://indianexpress.com/article/cities/delhi/in-new-age-data-theft-fraudsters-steal-thumb-prints-from-land-registries-7914530/"&gt;theft of thumb prints &lt;/a&gt;for instance from land registries and inadvertent data leaks in numerous incidents involving &lt;a href="https://techcrunch.com/2019/01/31/aadhaar-data-leak/"&gt;government employees in Jharkhand&lt;/a&gt;, v&lt;a href="https://www.firstpost.com/india/aadhaar-data-leak-details-of-7-82-cr-indians-from-ap-and-telangana-found-on-it-grids-database-6448961.html"&gt;oter ID information of Indian citizens in Andhra Pradesh and Telangana&lt;/a&gt; and &lt;a href="https://www.thehindu.com/sci-tech/technology/major-aadhaar-data-leak-plugged-french-security-researcher/article26584981.ece"&gt;activist reports of Indian government websites leaking Aadhaar data&lt;/a&gt;.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Aadhaar-related data security events parallel the increase in corporate data breaches during the decade of datafication. The term “data leak” again alternates with the term “data breach” in most media accounts while other terms such as “theft” and “scam” all but disappear in the media coverage of corporate data breaches.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;From 2016 onwards, incidents of corporate data breaches in India continued to rise. A massive &lt;a href="https://thewire.in/banking/debit-card-breach-india-banking"&gt;debit card data breach involving the YES Bank ATMs and point-of-sale (PoS) machines &lt;/a&gt;compromised through malware between May and July of 2016 resulted in the exposure of ATM PINs and non-personal identifiable information of customers. It went &lt;a href="https://www.livemint.com/Industry/Ope7B0jpjoLkemwz6QXirN/SBI-Yes-Bank-MasterCard-deny-data-breach-of-own-systems.html"&gt;undetected for nearly three&lt;/a&gt; months. Another data leak in 2018 concerned a &lt;a href="https://www.zdnet.com/article/another-data-leak-hits-india-aadhaar-biometric-database/"&gt;system run by Indane, a state-owned utility company, which allowed anyone to download private information on all Aadhaar holders &lt;/a&gt;including their names, services they were connected to and the unique 12-digit Aadhaar number. Data breaches continued to be reported in India concurrent with the incidents of data mismanagement related to Aadhaar. Some &lt;a href="https://www.csoonline.com/article/3541148/the-biggest-data-breaches-in-india.html"&gt;prominent data breaches included &lt;/a&gt;a cyberattack on the systems of airline data service provider SITA resulting in the leak of Air India passenger data, leakage of the personal details of the Common Admission Test (CAT) applicants, details of credit card and order preferences of Domino’s pizza customers on the dark web, leakage of COVID-19 patients’ test results leaked by government websites, user data of Justpay and Big Basket for sale on the dark web and an SBI data breach among others between 2019 and 2021.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;The media reportage of these data breaches use the term “cyberattack” to describe the activities of hackers and cybercriminals operating within a&lt;a href="https://www.thehindu.com/sci-tech/technology/internet/most-damaging-cybercrime-services-are-cheap-on-the-dark-web/article37004587.ece"&gt; shadow economy or the dark web&lt;/a&gt;. Recent examples of cyberattacks by hackers who leak user data for sale on the dark web include &lt;a href="https://indianexpress.com/article/technology/tech-news-technology/mobikwik-database-leaked-on-dark-web-company-denies-any-data-breach-7251448/"&gt;8.2 terabytes of 110 million sensitive financial data (KYC details, Aadhaar, credit/debit cards and phone numbers) of the payments app MobiKwik users&lt;/a&gt;, &lt;a href="https://www.firstpost.com/tech/news-analysis/dominos-india-data-breach-name-location-mobile-number-email-of-18-crore-orders-up-for-sale-on-dark-web-9650591.html"&gt;180 million Domino’s pizza orders (name, location, emails, mobile numbers),&lt;/a&gt; and &lt;a href="https://techcrunch.com/2022/07/18/cleartrip-data-breach-dark-web/"&gt;Flipkart’s Cleartrip users’ data&lt;/a&gt;. In these incidents again, three terms appear prominently in the media reportage - cyberattack, data breach, and leak. The term “data breach” remains the most frequently used epithet in the media coverage of the lapses of data security. While it alternates with the term “leak” in the stories, the term “data breach” appears consistently across most headlines in the news stories.&lt;/p&gt;
&lt;p dir="ltr"&gt;The exposure of sensitive, personal, and non-personal data by public and private entities in India is certainly a cause for concern, given the ongoing data protection legislative vacuum.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;The media coverage of data breaches tends to emphasize the quantum of compromised user data aside from the types of data exposed. The media framing of these breaches in &lt;a href="https://www.livemint.com/technology/tech-news/indian-firms-lost-176-million-to-data-breaches-last-fiscal-11658914231530.html"&gt;quantitative terms of financial loss&lt;/a&gt; as well as the &lt;a href="https://www.indiatoday.in/technology/news/story/personal-data-of-3-4-million-paytm-mall-users-reportedly-exposed-in-2020-data-breach-1980690-2022-07-27"&gt;magnitude&lt;/a&gt; and the &lt;a href="https://www.moneycontrol.com/news/business/banks/indian-banks-reported-248-data-breaches-in-last-four-years-says-government-8940891.html"&gt;number of breaches&lt;/a&gt; certainly highlights the gravity of these incidents but harm to individual users is often not addressed.&lt;/p&gt;
&lt;h3 dir="ltr"&gt;Evolving Terminology and the Source of Data Harms&lt;/h3&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;The main difference in the media reportage of the BPO cybersecurity incidents during the early aughts and the contemporary context of datafication is the usage of the term, “data breach”, which figures prominently in contemporary reportage of data security incidents but not so much in the BPO-related cybercrimes.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;THe BPO incidents of data theft and the attendant fraud must be understood in the context of the anxieties brought on by a globalizing world of Internet-enabled systems and transnational communications. In most of these incidents regarded as cybercrimes, the language of fraud and scam ventures further to attribute such illegal actions of the identifiable malefactors to cultural factors such as lack of ethics and professionalism.The usage of the term “data leak” in these media reports functions more specifically to underscore a broader lapse in data security as well as a lack of robust cybersecurity laws. The broader term, “breach”, is occasionally used to refer to these incidents but the term, “data breach” doesn’t appear as such.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;The term “data breach” gains more prominence in media accounts from 2009 onwards in the context of Aadhaar and the online delivery of goods and services by public and private players. The term “data breach” is often used interchangeably with the term “leak” within the broader ambit of cyberattacks in the corporate sector. The media reportage frames Aadhaar-related security lapses as instances of security/data breaches, data leaks, fraud, and occasionally scam.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;In contrast to the handful of data security cases in the BPO sector, data breaches have abounded in the second decade of the twenty-first century. What further differentiates the BPO-related incidents to the contemporary data breaches is the source of the data security lapse. Most corporate data breaches remain attributable to the actions of hackers and cybercriminals while the BPO security lapses were traceable back to ex-employees or insiders with access to sensitive data. We also see in the coverage of the BPO-related incidents, the attribution of such data security lapses to cultural factors including a lack of ethics and professionalism often in racial overtones. The media reportage of the BBC and ABC sting operations suggests that the India BPOs lack of preparedness to handle and maintain personal data confidentiality of foreigners point to the absence of a privacy culture in India. Interestingly, this transnational attribution recurs in a different form in the national debate on &lt;a href="https://huffpost.netblogpro.com/archive/in/entry/indians-don-t-care-about-privacy-but-thankfully-the-law-will-teach-them-what-it-means_a_23179031"&gt;Aadhaar and how Indians don’t care about their privacy&lt;/a&gt;.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;The question of the harms of data breaches to individuals is also an important one. In the discourse on contemporary data breaches, the actual material harm to an individual user is rarely ever established in the media reportage and generally framed as potential harm that could be devastating given the sensitivity of the compromised data. The harm is reported to be predominantly a function of organizational cybersecurity weakness or attributed to hackers and cybercriminals.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;The reporting of harm in collective terms of the number of accounts breached, financial costs of a data breach, the sheer number of breaches and the global rankings of countries with the highest reported cases certainly suggests a problem with cybersecurity and the lack of organizational preparedness. However, this collective framing of a data breach’s impact usually elides an individual user’s experience of harm. Even in the case of Aadhaar-related breaches - a mix of leaking data on government websites and other online portals and breaches - the notion of harm owing to exposed data isn’t clearly established. This is, however, different from the &lt;a href="https://scroll.in/article/1013700/six-types-of-problems-aadhaar-is-causing-and-safeguards-needed-immediately"&gt;extensively documented cases of Aadhaar-related issues&lt;/a&gt; in which welfare benefits have been denied, identities stolen and legitimate beneficiaries erased from the system due to technological errors.&lt;/p&gt;
&lt;h3 dir="ltr"&gt;Future Directions of Research&lt;/h3&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;This brief, qualitative foray into the media coverage of data breaches over two decades has aimed to trace the usage of various terms in two different contexts - the Indian BPO-related incidents and the contemporary context of datafication. It would be worth exploring at length, the relationship between frequent reports of data breaches, and the language used to convey harm in the contemporary context of a concrete data protection legislation vacuum. It would be instructive to examine the specific uses of the terms such as “fraud”, “leak”, “scam”, “theft” and “breach” in media reporting of such data security incidents more exhaustively. Such analysis would elucidate how media reportage shapes public perception towards the safety of user data and an anticipation of attendant harm as data protection legislation continues to evolve.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Especially with Aadhaar, which represents a paradigm shift in identity verification through digital means, it would be useful to conduct a sentiment analysis of how biometric identity related frauds, scams, and leaks are reported by the mainstream news media. A study of user attitudes and behaviours in response to the specific terminology of data security lapses such as the terms “breach”, “leak”, “fraud”, “scam”, “cybercrime”, and “cyberattack” would further contribute to how lay users understand the gravity of a data security lapse. Such research would go beyond expert understandings of data security incidents that tend to dominate media reportage to elucidate the concerns of lay users and further clarify the cultural meanings of data privacy.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/demistifying-data-breaches-in-india'&gt;https://cis-india.org/internet-governance/blog/demistifying-data-breaches-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Pawan Singh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Data Governance</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Data Management</dc:subject>
    

   <dc:date>2022-10-17T16:14:03Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/deccan-herald-january-20-2018-sunil-abraham-data-protection-we-can-innovate-leapfrog">
    <title>Data Protection: We can innovate, leapfrog</title>
    <link>https://cis-india.org/internet-governance/blog/deccan-herald-january-20-2018-sunil-abraham-data-protection-we-can-innovate-leapfrog</link>
    <description>
        &lt;b&gt;About 27% of India's population is still illiterate or barely literate. Most privacy policies and terms of services for web and mobile applications are in English and therefore it is only 10% of us who can actually read them before we provide our consent.&lt;/b&gt;
        &lt;p&gt;The article was published in the &lt;a class="external-link" href="http://www.deccanherald.com/content/655018/data-protection-we-can-innovate.html"&gt;Deccan Herald&lt;/a&gt; on January 20, 2018.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even if we can read them, we may not have the necessary legal training to understand them. According to a tweet thread by Pat Walshe (@privacymatters), the Tetris app, a popular video game, has a privacy policy that details the third-party advertising companies that they share data with. These third-parties include "123 Ad Networks; 13 Online Analytics companies; 62 Mobile Advertising Networks; 14 Mobile Analytics companies. The linked privacy policies for Tetris run to 407,000 words, compared to 450,000 words for the entire 'Lord of the Rings trilogy'." The child aged four and above that plays the game and her parents need an intermediary to deal with the corporations hiding behind Tetris.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Unlike the European Union, which has more than 37 years of history when it comes to data protection law, India is starting with a near blank slate after the Supreme Court confirmed that privacy is a constitutionally-guaranteed fundamental right in the Puttaswamy case judgement. While we would want to maintain adequacy and compatibility with the EU General Data Protection Regulation (GDPR) because it has become the global standard, we must realise that there is an opportunity for leapfrogging. This article attempts to introduce the reader to three different visions for intermediaries that have emerged within the Indian data protection debate around the accountability principle. I will also provide a brief sketch of an idea that we are developing at the Centre for Internet and Society. This is an incomplete list as there must be more proposals for regulatory innovation around the accountability principle that I am currently unaware of.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;n Account Aggregators: The 'India Stack' ecosystem that has been built around the Aadhaar programme first proposed intermediaries called Account Aggregators. Account Aggregators manage consent artifacts. India Stack has traditionally been described as having four layers -- presenceless, paperless, cashless and consent. The consent layer is supposed to feature Account Aggregators. If, for example, a data subject wanting an insurance policy visits an insurance portal, the portal would collect personal information and a consent artifact from her and pass it on to multiple insurance companies. These insurance companies would send personalised bids to the portal, which would be displayed on a comparative grid to enable empowered selection.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The data structure consent artifact has been provided in the Master Direction from RBI titled "Non-Banking Financial Company Account Aggregator Directions," published in September 2016. How does this work? The fields includes (i) identity and optional contact information; (ii) nature of the financial information requested; (iii) purpose; (iv) the identity of the recipients, if any; (v) URL/address for notifications when the consent artifact is used; (vi) consent artifact creation date, expiry date, identity and signature/digital signature of the Account Aggregator; and (vii) any other attribute as may be prescribed by the RBI. While Account Aggregators make it frictionless for the grant of consent and also for the harvesting of consent by data controllers, it does not make it easy for you to manage and revoke your consent.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;n Data Trusts: Most recently, Na.Vijayashankar, a Bengaluru-based cybersecurity and cyberlaw expert, has proposed intermediaries called 'Data Trusts' registered with the regulator and who (i) will work as escrow agents for the personal data (which would be classified by type for different degrees of protection); (ii) will make privacy notices accessible by translating them into accessible language and formats; (iii) disclose data minimally to different data controllers based on the purpose limitation; (iv) issue tokens or pseudonymous identifiers and monetise the data for the benefit of the data subject. To ensure that Data Trusts truly protect the interests of the data subject, Vijayashankar proposes three requirements: (a) public performance reviews (b) audits by the regulator and (c) "an arms-length relationship with the data collectors." In his proposal, Data Trusts are firms with "the ability to process a real-time request from the data subject to supply appropriate data to the data collector."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;n Learned Intermediaries: The Takshashila Institution published a paper titled Beyond Consent: A New Paradigm for Data Protection, authored by Rahul Matthan, partner at the law firm Trilegal. Learned Intermediaries would perform mandatory audits on all data controllers above a particular threshold. Like Vijayashankar, Matthan also requires these intermediaries to be certified by an appropriate authority. The main harm that he focuses on is, bias or discrimination. He proposes three stages of audit which are designed for the age of Big Data and Artificial Intelligence: "(i) Database Query Review; (ii) Black Box Audits; and (iii) Algorithm Review". Matthan also tentatively considers a rating system. Learned Intermediaries are a means to address information asymmetry in the market by making data subjects more aware. The impact of churn on their bottom-lines, it is hoped, will force data controllers to behave in an accountable manner, protecting rights and mitigating harms.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;n Consent Brokers: Finally, I have proposed the model of a 'Consent Broker' by modifying the concept of the Account Aggregator. Like the Account Aggregator proposal, we would want a competitive set of consent brokers who will manage consent artifacts for data subjects. However, I believe there should be a 1:1 relationship between data subjects and consent brokers so that the latter compete for the business of data subjects. Like Vijayashankar, I believe that the consent broker must have an "arms-length distance" from data controllers and must be prohibited from making any money from them. Consent brokers could also be trusted to take proactive actions for the data subjects, such as access and correction.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The need of the hour is the production of regulatory innovations and robust discussions around them for all the nine privacy principles in the Justice AP Shah committee report -- notice, choice and consent, collection limitation, purpose limitation, access and correction, disclosure of information, security, openness and accountability.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/deccan-herald-january-20-2018-sunil-abraham-data-protection-we-can-innovate-leapfrog'&gt;https://cis-india.org/internet-governance/blog/deccan-herald-january-20-2018-sunil-abraham-data-protection-we-can-innovate-leapfrog&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-01-22T01:45:46Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/danish-expert-group-on-data-ethics">
    <title>Danish Expert Group on Data Ethics</title>
    <link>https://cis-india.org/internet-governance/news/danish-expert-group-on-data-ethics</link>
    <description>
        &lt;b&gt;Amber Sinha was one of the stakeholders who provided inputs to the Danish Expert Group on Data Ethics in June 2018 during their visit to New Delhi. The Expert Group has prepared and submitted its final report.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;span&gt;In April the Danish             Expert Group on Data Ethics commenced work on developing             recommendations on Data Ethics for the Danish Government.             The expert group have now handed over their recommendations             to the Danish Minister of Industry, Business and Financial             Affairs. &lt;a class="external-link" href="http://cis-india.org/internet-governance/files/data-for-the-benefit-of-people"&gt;Read the report&lt;/a&gt;.&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/danish-expert-group-on-data-ethics'&gt;https://cis-india.org/internet-governance/news/danish-expert-group-on-data-ethics&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Data Management</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-12-01T04:42:42Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/quint-shweta-mohandas-and-pallavi-bedi-june-19-2023-cowin-data-breach-health-sensitive-details-policies-solution">
    <title>CoWIN Breach: What Makes India's Health Data an Easy Target for Bad Actors?</title>
    <link>https://cis-india.org/internet-governance/blog/quint-shweta-mohandas-and-pallavi-bedi-june-19-2023-cowin-data-breach-health-sensitive-details-policies-solution</link>
    <description>
        &lt;b&gt;Recent health data policies have failed to even mention the CoWIN platform.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="https://www.thequint.com/opinion/cowin-data-breach-health-sensitive-details-policies-solution#read-more"&gt;originally published in the Quint&lt;/a&gt; on 19 June 2023.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Last week, it was reported that due to an alleged breach of &lt;a href="https://www.thequint.com/fit/cowin-data-breach-private-information-covid-vaccine-telegram-bot"&gt;the CoWIN platform&lt;/a&gt;, details such as Aadhaar and passport numbers of Indians were made public via a Telegram bot.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While Minister of State for Information Technology &lt;a href="https://www.thequint.com/fit/cowin-data-breach-telegram-bot-covid-19-vaccine-unanswered-questions"&gt;Rajeev Chandrashekar&lt;/a&gt; put out information acknowledging that there was some form of a data breach, there is no information on how the breach took place or when a past breach may have taken place.&lt;/p&gt;
&lt;blockquote class="quoted" style="text-align: justify; "&gt;This data leak is yet another example of &lt;a href="https://www.thequint.com/opinion/cowin-breach-shows-us-the-structural-problem-with-digital-indias-infrastructure"&gt;our health records&lt;/a&gt; being exposed in the recent past – during the pandemic, there were reports of COVID-19 test results being leaked online. The leaked information included patients’ full names, dates of birth, testing dates, and names of centres in which the tests were held.&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;In December last year, five servers of the &lt;a href="https://www.thequint.com/fit/aiims-ayushman-bharat-digital-mission-health-data"&gt;All India Institute of Medical Science&lt;/a&gt; (AIIMS) in Delhi were under a cyberattack, leaving sensitive personal data of around 3-4 crore patients compromised.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In such cases, the Indian Computer Emergency Response Team (CERT-In) is the agency responsible for looking into the vulnerabilities that may have led to them. However, till date, CERT-In has not made its technical findings into such attacks &lt;a href="https://www.thequint.com/topic/data-breach"&gt;publicly available&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The COVID-19 Pandemic Created Opportunity&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The pandemic saw a number of digitisation policies being rolled out in the health sector; the most notable one being the National Digital Health Mission (or NDHM, later re-branded as the Ayushman Bharat Digital Mission).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mobile phone apps and web portals launched by the central and state governments during the pandemic are also examples of this health digitisation push. The rollout of the COVID-19 vaccinations also saw the deployment of the CoWIN platform.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Initially, it was mandatory for individuals to register on CoWIN to get an appointment for vaccination, and there was no option for walk-in-registration or to book an appointment. But, the Centre subsequently modified this rule and walk-in appointments and registrations on CoWIN became permissible from June 2021.&lt;/p&gt;
&lt;blockquote&gt;However, a study conducted by the Centre for Internet and Society (CIS) found that states such as Jharkhand and Chhattisgarh, which have low internet penetration, permitted on-site registration for vaccinations from the beginning.&lt;/blockquote&gt;
&lt;p&gt;The rollout of the NDHM also saw Health IDs being generated for citizens.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In several reported cases across states, this rollout happened during the COVID-19 vaccination process – without the informed consent of the concerned person.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The &lt;b&gt;beneficiaries who have had their Health IDs created through the vaccination process had not been informed&lt;/b&gt; about the creation of such an ID or their right to opt out of the digital health ecosystem.&lt;/p&gt;
&lt;h3&gt;A Web of Health Data Policies&lt;/h3&gt;
&lt;p&gt;Even before the pandemic, India was working towards a Health ID and a health data management system.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The components of the umbrella National Digital Health Ecosystem (NDHE) are the National Digital Health Blueprint published in 2019 (NDHB) and the NDHM.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Blueprint was created to implement the National Health Stack (published in 2018) which facilitated the creation of Health IDs. Whereas the NDHM was drafted to drive the implementation of the Blueprint, and promote and facilitate the evolution of NDHE.&lt;/p&gt;
&lt;p&gt;The National Health Authority (NHA), established in 2018, has been given the responsibility of implementing the National Digital Health Mission.&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;2018 also saw the Digital Information Security in Healthcare Act (DISHA), which was to regulate the generation, collection, access, storage, transmission, and use of Digital Health Data ("DHD") and associated personal data.&lt;/blockquote&gt;
&lt;p&gt;However, since its call for public consultation, &lt;b&gt;no progress has been made&lt;/b&gt; on this front.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In addition to documents that chalk out the functioning and the ecosystem of a digitised healthcare system, the NHA has released policy documents such as:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;the Health Data Management Policy (which was revised three times; the latest version released in April 2022)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;the Health Data Retention Policy (released in April 2021)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Consultation paper on the Unified Health Interface (UHI) (released in December 2022)&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Along with these policies, in 2022, the NHA released the NHA Data Sharing Guidelines for the Pradhan Mantri Jan Aarogya Yojana (PM-JAY) – India’s state health insurance policy.&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;However these &lt;b&gt;draft guidelines repeat the pattern of earlier policies&lt;/b&gt; &lt;b&gt;on health data&lt;/b&gt;, wherein there is no reference to the policies that predated it; the PM-JAY’s Data Sharing Guidelines, published in August 2022, did not even refer to the draft National Digital Health Data Management Policy (published in April 2022).&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Interestingly, the recent health data policies do not mention CoWIN.&lt;/b&gt; Failing to cross-reference or mention preceding policies creates a lack of clarity on which documents are being used as guidelines by healthcare providers.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Can a Data Protection Bill Be the Solution?&lt;/h3&gt;
&lt;p&gt;The draft Data Protection Bill, 2021, defined health data as “…the data related to the state of physical or mental health of the data principal and &lt;b&gt;includes records regarding the past, present or future state of the health of such data principal&lt;/b&gt;, data collected in the course of registration for, or provision of health services, data associated with the data principal to the provision of specific health services.”&lt;/p&gt;
&lt;p&gt;However, this definition as well as the definition of sensitive personal data was removed from the current version of the Bill (Digital Personal Data Protection Bill, 2022).&lt;/p&gt;
&lt;blockquote&gt;Omitting these definitions from the Bill removes a set of data which, if collected, warrants increased responsibility and increased liability. Handling of health data, financial data, government identifiers, etc, need to come with a higher level of responsibility as they are a list of sensitive details of a person.&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;The threats posed as a result of this data being leaked are not limited to spam messages or fraud and impersonation, but also of companies that can get a hand on this coveted data and gather insights and train their systems and algorithms, without the need to seek consent from anyone, or without facing the consequences of harm caused.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the current version of the draft DPDP Bill states that the data fiduciary shall notify the data principal of any breach, the draft Bill also states that the Data Protection Board “may” direct the data fiduciary to adopt measures that remedy the breach or mitigate harm caused to the data principal.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Bill also prescribes penalties of upto Rs 250 crore if the data fiduciary fails to take reasonable security safeguards to prevent a personal data breach, and a penalty of upto Rs 200 crore if the fiduciary fails to notify the data protection board and the data principal of such breach.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While &lt;b&gt;these steps, if implemented through legislation, would make organisations processing data take their data security more seriously&lt;/b&gt;, the removal of sensitive personal data from the definition of the Bill, would mean that data fiduciaries processing health data will not have to take additional steps other than reasonable security safeguards.&lt;/p&gt;
&lt;p&gt;The &lt;b&gt;absence of a clear indication of security standards&lt;/b&gt; will affect data principals and fiduciaries.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Looking to bring more efficiency to governance systems, the Centre launched the Digital India Mission in 2015. The press release by the central government reporting the approval of the programme by the Cabinet of Ministers speaks of ‘cradle to grave’ digital identity as one of its vision areas.&lt;/p&gt;
&lt;p&gt;The ambitious Universal Health ID and health data management policies are an example of this digitisation mission.&lt;/p&gt;
&lt;blockquote&gt;However breaches like this are reminders that without proper data security measures, and a system for having a person responsible for data security, the data is always vulnerable to an attack.&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;While the UK and Australia have also seen massive data breaches in the past, India is at the start of its health data digitisation journey and has the ability to set up strong security measures, employ experienced professionals, and establish legal resources to ensure that data breaches are minimised and swift action can be taken in case of a breach.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The first step&lt;/b&gt; to understand the vulnerabilities would be to present the CERT-In reports of this breach, and guide other institutions to check for the same so that they are better prepared for future breaches and attacks.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/quint-shweta-mohandas-and-pallavi-bedi-june-19-2023-cowin-data-breach-health-sensitive-details-policies-solution'&gt;https://cis-india.org/internet-governance/blog/quint-shweta-mohandas-and-pallavi-bedi-june-19-2023-cowin-data-breach-health-sensitive-details-policies-solution&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Shweta Mohandas and Pallavi Bedi</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2023-07-04T09:39:03Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/contestations-of-data-ecj-safe-harbor-ruling-and-lessons-for-india">
    <title>Contestations of Data, ECJ Safe Harbor Ruling and Lessons for India	</title>
    <link>https://cis-india.org/internet-governance/blog/contestations-of-data-ecj-safe-harbor-ruling-and-lessons-for-india</link>
    <description>
        &lt;b&gt;The European Court of Justice has invalidated a European Commission decision, which had previously concluded that the 'Safe Harbour Privacy Principles' provide adequate protections for European citizens’ privacy rights for the transfer of personal data between European Union and United States. The inadequacies of the framework is not news for the European Commission and action by ECJ has been a long time coming. The ruling raises important questions about how the claims of citizenship are being negotiated in the context of the internet, and how increasingly the contestations of personal data are being employed in the discourse. &lt;/b&gt;
        
&lt;p align="justify"&gt;The European Court of Justice
(ECJ) has invalidated a European Commission (EC) decision&lt;a class="sdfootnoteanc" name="sdfootnote1anc" href="#sdfootnote1sym"&gt;&lt;sup&gt;1&lt;/sup&gt;&lt;/a&gt;
which had previously concluded that the 'Safe Harbor Privacy
Principles'&lt;a class="sdfootnoteanc" name="sdfootnote2anc" href="#sdfootnote2sym"&gt;&lt;sup&gt;2&lt;/sup&gt;&lt;/a&gt;
provide adequate protections for European citizens’ privacy rights&lt;a class="sdfootnoteanc" name="sdfootnote3anc" href="#sdfootnote3sym"&gt;&lt;sup&gt;3&lt;/sup&gt;&lt;/a&gt;
for the transfer of personal data between European Union and United
States. This challenge stems from the claim that public law
enforcement authorities in America obtain personal data from
organisations in safe harbour for incompatible and disproportionate
purposes in violation of the Safe Harbour Privacy Principles. The
court's judgment follows the advice of the Advocate General of the
Court of Justice of the European Union (CJEU) who recently opined&lt;a class="sdfootnoteanc" name="sdfootnote4anc" href="#sdfootnote4sym"&gt;&lt;sup&gt;4&lt;/sup&gt;&lt;/a&gt;
that US practices allow for large-scale collection and transfer of
personal data belonging to EU citizens without them benefiting from
or having access to judicial protection under US privacy laws. The
inadequacies of the framework is not news for the Commission and
action by ECJ has been a long time coming. The ruling raises
important questions about how increasingly the contestations of
personal data are being employed in asserting claims of citizenship
in context of the internet.&lt;/p&gt;
&lt;p align="justify"&gt;
As the highest court in Europe,
the ECJ's decisions are binding on all member states. With this
ruling the ECJ has effectively restrained US firms from
indiscriminate collection and sharing of European citizens’ data on
American soil. The implications of the decision are significant,
because it shifts the onus of evaluating protections of personal data
for EU citizens from the 4,400 companies&lt;a class="sdfootnoteanc" name="sdfootnote5anc" href="#sdfootnote5sym"&gt;&lt;sup&gt;5&lt;/sup&gt;&lt;/a&gt;
subscribing to the system onto EU privacy watchdogs. Most
significantly, in addressing the rights of a citizen against an
established global brand, the judgement goes beyond political and
legal opinion to challenge the power imbalance that exists with
reference to US based firms.&lt;/p&gt;
&lt;p align="justify"&gt;
Today, the free movement of data
across borders is a critical factor in facilitating trade, financial
services, governance, manufacturing, health and development. However,
to consider the ruling as merely a clarification of transatlantic
mechanisms for data flows misstates the real issue. At the heart of
the judgment is the assessment whether US firms apply the tests of
‘necessity and proportionality’ in the collection and
surveillance of data for national security purposes. Application of
necessity and proportionality test to national security exceptions
under safe harbor has been a sticking point that has stalled the
renegotiation of the agreement that has been underway between the
Commission and the American data protection authorities.&lt;a class="sdfootnoteanc" name="sdfootnote6anc" href="#sdfootnote6sym"&gt;&lt;sup&gt;6&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
For EU citizens the stake in the
case are even higher, as while their right to privacy is enshrined
under EU law, they have no administrative or judicial means of
redress, if their data is used for reasons they did not intend. In
the EU, citizens accessing and agreeing to use of US based firms are
presented with a false choice between accessing benefits and giving
up on their fundamental right to privacy. In other words, by seeking
that governments and private companies provide better data protection
for the EU citizens and in restricting collection of personal data on
a generalised basis without objective criteria, the ruling is
effectively an assertion of ‘data sovereignty’. The term ‘data
sovereignty’, while lacking a firm definition, refers to a spectrum
of approaches adopted by different states to control data generated
in or passing through national internet infrastructure.&lt;a class="sdfootnoteanc" name="sdfootnote7anc" href="#sdfootnote7sym"&gt;&lt;sup&gt;7&lt;/sup&gt;&lt;/a&gt;
Underlying the ruling is the growing policy divide between the US and
EU privacy and data protection standards, which may lead to what is
referred to as the balkanization&lt;a class="sdfootnoteanc" name="sdfootnote8anc" href="#sdfootnote8sym"&gt;&lt;sup&gt;8&lt;/sup&gt;&lt;/a&gt;
of the internet in the future.&lt;/p&gt;
&lt;p align="justify"&gt;
&lt;em&gt;US-EU Data Protection Regime &lt;/em&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
The safe harbor pact between the
EU and US was negotiated in the late 1990s as an attempt to bridge
the different approaches to online privacy. Privacy is addressed in
the EU as a fundamental human right while in the US it is defined
under terms of consumer protection, which&lt;em&gt;&lt;strong&gt;
&lt;/strong&gt;&lt;/em&gt;allow trade-offs
and exceptions when national security seems to be under threat. In
order to address the lower standards of data protection prevalent in
the US, the pact facilitates data transfers from EU to US by
establishing certain safeguards equivalent to the requirements of the
EU data protection directive. The safe harbor provisions include
firms undertaking not to pass personal information to third parties
if the EU data protection standards are not met and giving users
right to opt out of data collection.&lt;a class="sdfootnoteanc" name="sdfootnote9anc" href="#sdfootnote9sym"&gt;&lt;sup&gt;9&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
The agreement was due to be
renewed by May 2015&lt;a class="sdfootnoteanc" name="sdfootnote10anc" href="#sdfootnote10sym"&gt;&lt;sup&gt;10&lt;/sup&gt;&lt;/a&gt;
and while negotiations have been ongoing for two years, EU discontent
on safe harbour came to the fore following the Edward Snowden
revelations of collection and monitoring facilitated by large private
companies for the PRISM program and after the announcement of the
TransAtlantic Trade and Investment Partnership (TTIP).&lt;a class="sdfootnoteanc" name="sdfootnote11anc" href="#sdfootnote11sym"&gt;&lt;sup&gt;11&lt;/sup&gt;&lt;/a&gt;
EU member states have mostly stayed silent as they run their own
surveillance programs often times, in cooperation with the NSA. EU
institutions cannot intervene in matters of national security
however, they do have authority on data protection matters. European
Union officials and Members of Parliament have expressed shock and
outrage at the surveillance programs unveiled by Snowden's 2013
revelations. Most recently, following the CJEU Advocate General’s
opinion, 50 Members of European Parliament (MEP) sent a strongly
worded letter the US Congress hitting back on claims of ‘digital
protectionism’ emanating from the US&lt;a class="sdfootnoteanc" name="sdfootnote12anc" href="#sdfootnote12sym"&gt;&lt;sup&gt;12&lt;/sup&gt;&lt;/a&gt;.
In no uncertain terms the letter clarified that the EU has different
ideas on privacy, platforms, net neutrality, encryption, Bitcoin,
zero-days, or copyright and will seek to improve and change any
proposal from the EC in the interest of our citizens and of all
people.&lt;/p&gt;
&lt;p align="justify"&gt;
&lt;em&gt;Towards Harmonization &lt;/em&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
In November 2013, as an attempt
to minimize the loss of trust following the Snowden revelations, the
European Commission (EC) published recommendations in its report on
'Rebuilding Trust is EU-US Data Flows'.&lt;a class="sdfootnoteanc" name="sdfootnote13anc" href="#sdfootnote13sym"&gt;&lt;sup&gt;13&lt;/sup&gt;&lt;/a&gt;
The recommendations revealed two critical initiatives at the EU
level—first was the revision of the EU-US safe harbor agreement&lt;a class="sdfootnoteanc" name="sdfootnote14anc" href="#sdfootnote14sym"&gt;&lt;sup&gt;14&lt;/sup&gt;&lt;/a&gt;
and second the adoption of the 'EU-US Umbrella Agreement&lt;a class="sdfootnoteanc" name="sdfootnote15anc" href="#sdfootnote15sym"&gt;&lt;sup&gt;15&lt;/sup&gt;&lt;/a&gt;'—a
framework for data transfer for the purpose of investigating,
detecting, or prosecuting a crime, including terrorism. The Umbrella
Agreement was recently initialed by EU and US negotiators and it only
addresses the exchange of personal data between law enforcement
agencies.&lt;a class="sdfootnoteanc" name="sdfootnote16anc" href="#sdfootnote16sym"&gt;&lt;sup&gt;16&lt;/sup&gt;&lt;/a&gt;
The Agreement has gained momentum in the wake of recent cases around
issues of territorial duties of providers, enforcement jurisdictions
and data localisation.&lt;a class="sdfootnoteanc" name="sdfootnote17anc" href="#sdfootnote17sym"&gt;&lt;sup&gt;17&lt;/sup&gt;&lt;/a&gt;
However, the adoption of the Umbrella Act depends on US Congress
adoption of the&lt;em&gt;&lt;strong&gt;
&lt;/strong&gt;&lt;/em&gt;Judicial Redress
Act (JRA) as law.&lt;a class="sdfootnoteanc" name="sdfootnote18anc" href="#sdfootnote18sym"&gt;&lt;sup&gt;18&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
&lt;em&gt;Judicial Redress Act &lt;/em&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
The JRA is a key reform that the
EC is pushing for in an attempt to address the gap between privacy
rights and remedies available to US citizens and those extended to EU
citizens, including allowing EU citizens to sue in American courts.
The JRA seeks to extend certain protections under the Privacy Act to
records shared by EU and other designated countries with US law
enforcement agencies for the purpose of investigating, detecting, or
prosecuting criminal offenses. The JRA protections would extend to
records shared under the Umbrella Agreement and while it does include
civil remedies for violation of data protection, as noted by the
Center for Democracy and Technology, the present framework  does not
provide citizens of EU countries with redress that is at par with
that which US persons enjoy under the Privacy Act.&lt;a class="sdfootnoteanc" name="sdfootnote19anc" href="#sdfootnote19sym"&gt;&lt;sup&gt;19&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
For example, the measures
outlined under the JRA would only be applicable to countries that
have outlined appropriate privacy protections agreements for data
sharing for investigations and ‘efficiently share’ such
information with the US. Countries that do not have agreements with
US cannot seek these protections leaving the personal data of their
citizens open for collection and misuse by US agencies. Further, the
arrangement leaves determination of 'efficiently sharing' in the
hands of US authorities and countries could lose protection if they
do not comply with information sharing requests promptly. Finally,
JRA protections do not apply to non-US persons nor to records shared
for purposes other than law enforcement such as intelligence
gathering. JRA is also weakened by allowing heads of agencies to
exercise their discretion to seek exemption from the Act and opt out
of compliance.&lt;/p&gt;
&lt;p align="justify"&gt;
Taken together the JRA, the
Umbrella Act and the renegotiation of the Safe Harbor Agreement need
considerable improvements. It is worth noting that EU’s acceptance
of the redundancy of existing agreements and in establishing the
independence of national data protection authorities in investigating
and enforcing national laws as demonstrated in the Schrems and in the
Weltimmo&lt;a class="sdfootnoteanc" name="sdfootnote20anc" href="#sdfootnote20sym"&gt;&lt;sup&gt;20&lt;/sup&gt;&lt;/a&gt;
case point to accelerated developments in the broader EU privacy
landscape.&lt;/p&gt;
&lt;p align="justify"&gt;
&lt;em&gt;Consequences  &lt;/em&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
The ECJ Safe Harbor ruling will
have far-reaching consequences for the online industry. Often, costly
government rulings solidify the market dominance of big companies. As
high regulatory costs restrict the entrance of small and medium
businesses the market, competition is gradually wiped out. Further,
complying with high standards of data protection means that US firms
handling European data will need to consider alternative legal means
of transfer of personal data. This could include evolving 'model
contracts' binding them to EU data protection standards. As Schrems
points out, “Big companies don’t only rely on safe harbour: they
also rely on binding corporate rules and standard contractual
clauses.”&lt;a class="sdfootnoteanc" name="sdfootnote21anc" href="#sdfootnote21sym"&gt;&lt;sup&gt;21&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
The ruling is good news for
European consumers, who can now approach a national regulator to
investigate suspicions of data mishandling. EU data protection
regulators may be be inundated with requests from companies seeking
authorization of new contracts and with consumer complaints. Some are
concerned that the ruling puts a dent in the globalized flow of
data&lt;a class="sdfootnoteanc" name="sdfootnote22anc" href="#sdfootnote22sym"&gt;&lt;sup&gt;22&lt;/sup&gt;&lt;/a&gt;,
effectively requiring data localization in Europe.&lt;a class="sdfootnoteanc" name="sdfootnote23anc" href="#sdfootnote23sym"&gt;&lt;sup&gt;23&lt;/sup&gt;&lt;/a&gt;
Others have pointed out that it is unclear how this decision sits
with other trade treaties such as the TPP that ban data
localisation.&lt;a class="sdfootnoteanc" name="sdfootnote24anc" href="#sdfootnote24sym"&gt;&lt;sup&gt;24&lt;/sup&gt;&lt;/a&gt;
While the implications of the decision will take some time in playing
out, what is certain is that US companies will be have  to
restructure management, storage and use of data. The ruling has
created the impetus for India to push for reforms to protect its
citizens from harms by US firms and improve trade relations with EU.&lt;/p&gt;
&lt;p align="justify"&gt;&lt;em&gt;The Opportunity for India&lt;/em&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
Multiple data flows taking place
over the internet simultaneously and that has led to ubiquity of data
transfers o ver the Internet, exposing individuals to privacy risks.
There has also been an enhanced economic importance of data
processing as businesses collect and correlate data using analytic
tools to create new demands, establish relationships and generate
revenue for their services. The primary concern of the Schrems case
may be the protection of the rights of EU citizens but by seeking to
extend these rights and ensure compliance in other jurisdictions, the
case touches upon many underlying contestations around  data and
sovereignty.&lt;/p&gt;
&lt;p align="justify"&gt;
Last year, Mr Ram Narain, India
Head of Delegation to the Working Group Plenary at ITU had stressed, “respecting the principle of sovereignty of information through
network functionality and global norms will go a long way in
increasing the trust and confidence in use of ICT.”&lt;a class="sdfootnoteanc" name="sdfootnote25anc" href="#sdfootnote25sym"&gt;&lt;sup&gt;25&lt;/sup&gt;&lt;/a&gt;
In the absence of the recognition of privacy as a right and
empowering citizens through measures or avenues to seek redressal
against misuse of data, the demand of data sovereignty rings empty.
The kind of framework which empowered an ordinary citizen in the EU
to approach the highest court seeking redressal based on presumed
overreach of a foreign government and from harms abetted by private
corporations simply does not exist in India. Securing citizen’s
data in other jurisdictions and from other governments begins with
establishing protection regimes within the country.&lt;/p&gt;
&lt;p align="justify"&gt;
The Indian government has also
stepped up efforts to restrict transfer of data from India including
pushing for private companies to open data centers in India.&lt;a class="sdfootnoteanc" name="sdfootnote26anc" href="#sdfootnote26sym"&gt;&lt;sup&gt;26&lt;/sup&gt;&lt;/a&gt;
Negotiating data localisation does not restrict the power of private
corporations from using data in a broad ways including tailoring ads
and promoting products. Also, data transfers impact any organisation
with international operations for example, global multinationals who
need to coordinate employee data and information. Companies like
Facebook, Google and Microsoft transfer and store data belonging to
Indian citizens and it is worth remembering that the National
Security Agency (NSA) would have access to this data through servers
of such private companies. With no existing measures to restrict such
indiscriminate access, the ruling purports to the need for India to
evolve strong protection mechanisms. Finally, the lack of such
measures also have an economic impact, as reported in a recent
Nasscom-Data Security Council of India (DSCI) survey&lt;a class="sdfootnoteanc" name="sdfootnote27anc" href="#sdfootnote27sym"&gt;&lt;sup&gt;27&lt;/sup&gt;&lt;/a&gt;
that pegs revenue losses incurred by the Indian IT-BPO industry at
$2-2.5 billion for a sample size of 15 companies. DSCI has further
estimated that outsourcing business can further grow by $50 billion
per annum once India is granted a “data secure” status by the
EU.&lt;a class="sdfootnoteanc" name="sdfootnote28anc" href="#sdfootnote28sym"&gt;&lt;sup&gt;28&lt;/sup&gt;&lt;/a&gt;
EU’s refusal to grant such a status is understandable given the
high standard of privacy as incorporated under the European Union
Data Protection Directive a standard to which India does not match
up, yet. The lack of this status prevents the flow of data which is
vital for Digital India vision and also affects the service industry
by restricting the flow of sensitive information to India such as
information about patient records.&lt;/p&gt;
&lt;p align="justify"&gt;
Data and information structures
are controlled and owned by private corporations and networks
transcend national borders, therefore the foremost emphasis needs to
be on improving national frameworks. While, enforcement mechanisms
such as the Mutual Legal Assistance Treaty (MLAT) process or other
methods of international cooperation may seem respectful of
international borders and principles of sovereignty,&lt;a class="sdfootnoteanc" name="sdfootnote29anc" href="#sdfootnote29sym"&gt;&lt;sup&gt;29&lt;/sup&gt;&lt;/a&gt;
 for users that live in undemocratic or oppressive regimes such
agreements are a considerable risk. Data is also increasingly being
stored across multiple jurisdictions and therefore merely applying
data location lens to protection measures may be too narrow. Further
it should be noted that when companies begin taking data storage
decisions based on legal considerations it will impact the speed and
reliability of services.&lt;a class="sdfootnoteanc" name="sdfootnote30anc" href="#sdfootnote30sym"&gt;&lt;sup&gt;30&lt;/sup&gt;&lt;/a&gt;
Any future regime must reflect the challenges of data transfers
taking place in legal and economic spaces that are not identical and
may be in opposition. Fundamentally, the protection of privacy will
always act as a barrier to the free flow of information even so, as
the Schrems case ruling points out not having adequate privacy
protections could also restrict flow of data, as has been the case
for India.&lt;/p&gt;
&lt;p align="justify"&gt;
The time is right for India to
appoint a data controller and put in place national frameworks, based
on nuanced understanding of issues of applying jurisdiction to govern
users and their data. Establishing better protection measures will
not only establish trust and enhance the ability of users to control
data about themselves it is also essential for sustaining economic
and social value generated from data generation and collection.
Suggestions for such frameworks have been considered previously by
the Group of Experts on Privacy constituted by the Planning
Commission.&lt;a class="sdfootnoteanc" name="sdfootnote31anc" href="#sdfootnote31sym"&gt;&lt;sup&gt;31&lt;/sup&gt;&lt;/a&gt;
By incorporating transparency in mechanisms for data and access
requests and premising requests on established necessity and
proportionality Indian government can lead the way in data protection
standards. This will give the Indian government more teeth to
challenge and address both the dangers of theft of data stored on
servers located outside of India and restrain indiscriminate access
arising from terms and conditions of businesses that grant such
rights to third parties.&amp;nbsp;&lt;/p&gt;
&lt;div id="sdfootnote1"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote1sym" href="#sdfootnote1anc"&gt;1&lt;/a&gt;
	Commission Decision of 26 July 2000 pursuant to Directive 95/46/EC
	of the European Parliament and of the Council on the adequacy of the
	protection provided by the safe harbour privacy principles and
	related frequently asked questions issued by the US Department of
	Commerce (notified under document number C(2000) 2441) (Text with
	EEA relevance.) &lt;em&gt;Official
	Journal L 215 , 25/08/2000 P. 0007 -0047 &lt;/em&gt;
	2000/520/EC:
	&lt;u&gt;&lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML"&gt;http&lt;/a&gt;&lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML"&gt;://&lt;/a&gt;&lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML"&gt;eur&lt;/a&gt;&lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML"&gt;-&lt;/a&gt;&lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML"&gt;lex&lt;/a&gt;&lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML"&gt;.&lt;/a&gt;&lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML"&gt;europa&lt;/a&gt;&lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML"&gt;.&lt;/a&gt;&lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML"&gt;eu&lt;/a&gt;&lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML"&gt;/&lt;/a&gt;&lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML"&gt;LexUriServ&lt;/a&gt;&lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML"&gt;/&lt;/a&gt;&lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML"&gt;LexUriServ&lt;/a&gt;&lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML"&gt;.&lt;/a&gt;&lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML"&gt;do&lt;/a&gt;&lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML"&gt;?&lt;/a&gt;&lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML"&gt;uri&lt;/a&gt;&lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML"&gt;=&lt;/a&gt;&lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML"&gt;CELEX&lt;/a&gt;&lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML"&gt;:32000&lt;/a&gt;&lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML"&gt;D&lt;/a&gt;&lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML"&gt;0520:&lt;/a&gt;&lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML"&gt;EN&lt;/a&gt;&lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML"&gt;:&lt;/a&gt;&lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML"&gt;HTML&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote2"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote2sym" href="#sdfootnote2anc"&gt;2&lt;/a&gt;
	Safe Harbour Privacy Principles Issued by the U.S. Department of
	Commerce on July 21, 2000
	&lt;u&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;http&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;://&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;www&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;.&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;export&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;.&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;gov&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;/&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;safeharbor&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;/&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;eu&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;/&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;eg&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;_&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;main&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;_018475.&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;asp&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote3"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote3sym" href="#sdfootnote3anc"&gt;3&lt;/a&gt;
	Megan Graham, &lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;Adding&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;Some&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;Nuance&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;on&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;the&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;European&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;Court&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;’&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;s&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;Safe&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;Harbor&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;Decision&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;,
	&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;Just&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;security&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;
	
	&lt;u&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;https&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;://&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;www&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;.&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;justsecurity&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;.&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;org&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;/26651/&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;adding&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;-&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;nuance&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;-&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;ecj&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;-&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;safe&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;-&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;harbor&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;-&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;decision&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;/&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote4"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote4sym" href="#sdfootnote4anc"&gt;4&lt;/a&gt;
	Advocate
	General’s Opinion in Case C-362/14 Maximillian Schrems v Data
	Protection Commissioner Court of Justice of the European Union,
	Press Release, No 106/15 Luxembourg, 23 September 2015
	&lt;u&gt;&lt;a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf"&gt;http&lt;/a&gt;&lt;a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf"&gt;://&lt;/a&gt;&lt;a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf"&gt;curia&lt;/a&gt;&lt;a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf"&gt;.&lt;/a&gt;&lt;a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf"&gt;europa&lt;/a&gt;&lt;a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf"&gt;.&lt;/a&gt;&lt;a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf"&gt;eu&lt;/a&gt;&lt;a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf"&gt;/&lt;/a&gt;&lt;a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf"&gt;jcms&lt;/a&gt;&lt;a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf"&gt;/&lt;/a&gt;&lt;a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf"&gt;upload&lt;/a&gt;&lt;a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf"&gt;/&lt;/a&gt;&lt;a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf"&gt;docs&lt;/a&gt;&lt;a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf"&gt;/&lt;/a&gt;&lt;a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf"&gt;application&lt;/a&gt;&lt;a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf"&gt;/&lt;/a&gt;&lt;a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf"&gt;pdf&lt;/a&gt;&lt;a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf"&gt;/2015-09/&lt;/a&gt;&lt;a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf"&gt;cp&lt;/a&gt;&lt;a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf"&gt;150106&lt;/a&gt;&lt;a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf"&gt;en&lt;/a&gt;&lt;a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf"&gt;.&lt;/a&gt;&lt;a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf"&gt;pdf&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote5"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote5sym" href="#sdfootnote5anc"&gt;5&lt;/a&gt;
	Jennifer Baker, ‘EU desperately pushes just-as-dodgy safe harbour
	alternatives’, The Register, October 7, 2015
	&lt;u&gt;&lt;a href="http://www.theregister.co.uk/2015/10/07/eu_pushes_safe_harbour_alternatives/"&gt;http&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/10/07/eu_pushes_safe_harbour_alternatives/"&gt;://&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/10/07/eu_pushes_safe_harbour_alternatives/"&gt;www&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/10/07/eu_pushes_safe_harbour_alternatives/"&gt;.&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/10/07/eu_pushes_safe_harbour_alternatives/"&gt;theregister&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/10/07/eu_pushes_safe_harbour_alternatives/"&gt;.&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/10/07/eu_pushes_safe_harbour_alternatives/"&gt;co&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/10/07/eu_pushes_safe_harbour_alternatives/"&gt;.&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/10/07/eu_pushes_safe_harbour_alternatives/"&gt;uk&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/10/07/eu_pushes_safe_harbour_alternatives/"&gt;/2015/10/07/&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/10/07/eu_pushes_safe_harbour_alternatives/"&gt;eu&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/10/07/eu_pushes_safe_harbour_alternatives/"&gt;_&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/10/07/eu_pushes_safe_harbour_alternatives/"&gt;pushes&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/10/07/eu_pushes_safe_harbour_alternatives/"&gt;_&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/10/07/eu_pushes_safe_harbour_alternatives/"&gt;safe&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/10/07/eu_pushes_safe_harbour_alternatives/"&gt;_&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/10/07/eu_pushes_safe_harbour_alternatives/"&gt;harbour&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/10/07/eu_pushes_safe_harbour_alternatives/"&gt;_&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/10/07/eu_pushes_safe_harbour_alternatives/"&gt;alternatives&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/10/07/eu_pushes_safe_harbour_alternatives/"&gt;/&lt;/a&gt;&lt;/u&gt;&amp;nbsp;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote6"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote6sym" href="#sdfootnote6anc"&gt;6&lt;/a&gt;
	Draft Report, General Data Protection Regulation, Committee on Civil
	Liberties, Justice and Home Affairs, European Parliament, 2009-2014
	&lt;a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf"&gt;http&lt;/a&gt;&lt;a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf"&gt;://&lt;/a&gt;&lt;a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf"&gt;www&lt;/a&gt;&lt;a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf"&gt;.&lt;/a&gt;&lt;a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf"&gt;europarl&lt;/a&gt;&lt;a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf"&gt;.&lt;/a&gt;&lt;a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf"&gt;europa&lt;/a&gt;&lt;a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf"&gt;.&lt;/a&gt;&lt;a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf"&gt;eu&lt;/a&gt;&lt;a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf"&gt;/&lt;/a&gt;&lt;a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf"&gt;meetdocs&lt;/a&gt;&lt;a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf"&gt;/2009_2014/&lt;/a&gt;&lt;a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf"&gt;documents&lt;/a&gt;&lt;a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf"&gt;/&lt;/a&gt;&lt;a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf"&gt;libe&lt;/a&gt;&lt;a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf"&gt;/&lt;/a&gt;&lt;a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf"&gt;pr&lt;/a&gt;&lt;a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf"&gt;/922/922387/922387&lt;/a&gt;&lt;a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf"&gt;en&lt;/a&gt;&lt;a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf"&gt;.&lt;/a&gt;&lt;a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf"&gt;pdf&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote7"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote7sym" href="#sdfootnote7anc"&gt;7&lt;/a&gt;
	Dana Polatin-Reuben, Joss Wright, ‘An Internet with BRICS
	Characteristics: Data Sovereignty and the Balkanisation of the
	Internet’, University of Oxford, July 7, 2014
	&lt;u&gt;&lt;a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf"&gt;https&lt;/a&gt;&lt;a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf"&gt;://&lt;/a&gt;&lt;a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf"&gt;www&lt;/a&gt;&lt;a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf"&gt;.&lt;/a&gt;&lt;a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf"&gt;usenix&lt;/a&gt;&lt;a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf"&gt;.&lt;/a&gt;&lt;a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf"&gt;org&lt;/a&gt;&lt;a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf"&gt;/&lt;/a&gt;&lt;a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf"&gt;system&lt;/a&gt;&lt;a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf"&gt;/&lt;/a&gt;&lt;a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf"&gt;files&lt;/a&gt;&lt;a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf"&gt;/&lt;/a&gt;&lt;a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf"&gt;conference&lt;/a&gt;&lt;a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf"&gt;/&lt;/a&gt;&lt;a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf"&gt;foci&lt;/a&gt;&lt;a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf"&gt;14/&lt;/a&gt;&lt;a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf"&gt;foci&lt;/a&gt;&lt;a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf"&gt;14-&lt;/a&gt;&lt;a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf"&gt;polatin&lt;/a&gt;&lt;a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf"&gt;-&lt;/a&gt;&lt;a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf"&gt;reuben&lt;/a&gt;&lt;a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf"&gt;.&lt;/a&gt;&lt;a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf"&gt;pdf&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote8"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote8sym" href="#sdfootnote8anc"&gt;8&lt;/a&gt;
	Sasha
	Meinrath, The Future of the Internet: Balkanization and Borders,
	Time, October 2013
	&lt;u&gt;&lt;a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/"&gt;http&lt;/a&gt;&lt;a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/"&gt;://&lt;/a&gt;&lt;a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/"&gt;ideas&lt;/a&gt;&lt;a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/"&gt;.&lt;/a&gt;&lt;a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/"&gt;time&lt;/a&gt;&lt;a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/"&gt;.&lt;/a&gt;&lt;a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/"&gt;com&lt;/a&gt;&lt;a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/"&gt;/2013/10/11/&lt;/a&gt;&lt;a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/"&gt;the&lt;/a&gt;&lt;a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/"&gt;-&lt;/a&gt;&lt;a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/"&gt;future&lt;/a&gt;&lt;a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/"&gt;-&lt;/a&gt;&lt;a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/"&gt;of&lt;/a&gt;&lt;a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/"&gt;-&lt;/a&gt;&lt;a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/"&gt;the&lt;/a&gt;&lt;a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/"&gt;-&lt;/a&gt;&lt;a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/"&gt;internet&lt;/a&gt;&lt;a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/"&gt;-&lt;/a&gt;&lt;a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/"&gt;balkanization&lt;/a&gt;&lt;a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/"&gt;-&lt;/a&gt;&lt;a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/"&gt;and&lt;/a&gt;&lt;a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/"&gt;-&lt;/a&gt;&lt;a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/"&gt;borders&lt;/a&gt;&lt;a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/"&gt;/&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote9"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote9sym" href="#sdfootnote9anc"&gt;9&lt;/a&gt;
	Safe Harbour Privacy Principles, Issued by the U.S. Department of
	Commerce, July 2001
	&lt;u&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;http&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;://&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;www&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;.&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;export&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;.&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;gov&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;/&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;safeharbor&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;/&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;eu&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;/&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;eg&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;_&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;main&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;_018475.&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;asp&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote10"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote10sym" href="#sdfootnote10anc"&gt;10&lt;/a&gt;
	Facebook
	case may force European firms to change data storage practices, The
	Guardian, September 23, 2015
	&lt;u&gt;&lt;a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy"&gt;http&lt;/a&gt;&lt;a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy"&gt;://&lt;/a&gt;&lt;a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy"&gt;www&lt;/a&gt;&lt;a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy"&gt;.&lt;/a&gt;&lt;a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy"&gt;theguardian&lt;/a&gt;&lt;a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy"&gt;.&lt;/a&gt;&lt;a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy"&gt;com&lt;/a&gt;&lt;a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy"&gt;/&lt;/a&gt;&lt;a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy"&gt;us&lt;/a&gt;&lt;a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy"&gt;-&lt;/a&gt;&lt;a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy"&gt;news&lt;/a&gt;&lt;a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy"&gt;/2015/&lt;/a&gt;&lt;a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy"&gt;sep&lt;/a&gt;&lt;a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy"&gt;/23/&lt;/a&gt;&lt;a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy"&gt;us&lt;/a&gt;&lt;a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy"&gt;-&lt;/a&gt;&lt;a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy"&gt;intelligence&lt;/a&gt;&lt;a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy"&gt;-&lt;/a&gt;&lt;a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy"&gt;services&lt;/a&gt;&lt;a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy"&gt;-&lt;/a&gt;&lt;a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy"&gt;surveillance&lt;/a&gt;&lt;a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy"&gt;-&lt;/a&gt;&lt;a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy"&gt;privacy&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote11"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote11sym" href="#sdfootnote11anc"&gt;11&lt;/a&gt;
	Privacy Tracker,  US-EU Safe Harbor Under Pressure, August 2, 2013
	&lt;u&gt;&lt;a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure"&gt;https&lt;/a&gt;&lt;a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure"&gt;://&lt;/a&gt;&lt;a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure"&gt;iapp&lt;/a&gt;&lt;a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure"&gt;.&lt;/a&gt;&lt;a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure"&gt;org&lt;/a&gt;&lt;a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure"&gt;/&lt;/a&gt;&lt;a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure"&gt;news&lt;/a&gt;&lt;a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure"&gt;/&lt;/a&gt;&lt;a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure"&gt;a&lt;/a&gt;&lt;a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure"&gt;/&lt;/a&gt;&lt;a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure"&gt;us&lt;/a&gt;&lt;a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure"&gt;-&lt;/a&gt;&lt;a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure"&gt;eu&lt;/a&gt;&lt;a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure"&gt;-&lt;/a&gt;&lt;a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure"&gt;safe&lt;/a&gt;&lt;a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure"&gt;-&lt;/a&gt;&lt;a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure"&gt;harbor&lt;/a&gt;&lt;a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure"&gt;-&lt;/a&gt;&lt;a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure"&gt;under&lt;/a&gt;&lt;a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure"&gt;-&lt;/a&gt;&lt;a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure"&gt;pressure&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote12"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote12sym" href="#sdfootnote12anc"&gt;12&lt;/a&gt;
	Kieren
	McCarthy, Privacy, net neutrality, security, encryption ... Europe
	tells Obama, US Congress to back off, The Register, 23 September,
	2015
	&lt;u&gt;&lt;a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/"&gt;http&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/"&gt;://&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/"&gt;www&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/"&gt;.&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/"&gt;theregister&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/"&gt;.&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/"&gt;co&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/"&gt;.&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/"&gt;uk&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/"&gt;/2015/09/23/&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/"&gt;european&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/"&gt;_&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/"&gt;politicians&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/"&gt;_&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/"&gt;to&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/"&gt;_&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/"&gt;congress&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/"&gt;_&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/"&gt;back&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/"&gt;_&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/"&gt;off&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/"&gt;/&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote13"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote13sym" href="#sdfootnote13anc"&gt;13&lt;/a&gt;
	Communication from the Commission to the European Parliament and the
	Council, Rebuilding Trust in EU-US Data Flows, European Commission,
	November 2013
	&lt;u&gt;&lt;a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf"&gt;http&lt;/a&gt;&lt;a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf"&gt;://&lt;/a&gt;&lt;a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf"&gt;ec&lt;/a&gt;&lt;a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf"&gt;.&lt;/a&gt;&lt;a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf"&gt;europa&lt;/a&gt;&lt;a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf"&gt;.&lt;/a&gt;&lt;a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf"&gt;eu&lt;/a&gt;&lt;a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf"&gt;/&lt;/a&gt;&lt;a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf"&gt;justice&lt;/a&gt;&lt;a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf"&gt;/&lt;/a&gt;&lt;a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf"&gt;data&lt;/a&gt;&lt;a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf"&gt;-&lt;/a&gt;&lt;a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf"&gt;protection&lt;/a&gt;&lt;a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf"&gt;/&lt;/a&gt;&lt;a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf"&gt;files&lt;/a&gt;&lt;a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf"&gt;/&lt;/a&gt;&lt;a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf"&gt;com&lt;/a&gt;&lt;a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf"&gt;_2013_846_&lt;/a&gt;&lt;a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf"&gt;en&lt;/a&gt;&lt;a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf"&gt;.&lt;/a&gt;&lt;a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf"&gt;pdf&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote14"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote14sym" href="#sdfootnote14anc"&gt;14&lt;/a&gt;
	Safe
	Harbor on trial in the European Union, Access Blog, September 2014
	&lt;u&gt;&lt;a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union"&gt;https&lt;/a&gt;&lt;a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union"&gt;://&lt;/a&gt;&lt;a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union"&gt;www&lt;/a&gt;&lt;a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union"&gt;.&lt;/a&gt;&lt;a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union"&gt;accessnow&lt;/a&gt;&lt;a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union"&gt;.&lt;/a&gt;&lt;a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union"&gt;org&lt;/a&gt;&lt;a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union"&gt;/&lt;/a&gt;&lt;a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union"&gt;blog&lt;/a&gt;&lt;a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union"&gt;/2014/11/13/&lt;/a&gt;&lt;a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union"&gt;safe&lt;/a&gt;&lt;a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union"&gt;-&lt;/a&gt;&lt;a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union"&gt;harbor&lt;/a&gt;&lt;a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union"&gt;-&lt;/a&gt;&lt;a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union"&gt;on&lt;/a&gt;&lt;a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union"&gt;-&lt;/a&gt;&lt;a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union"&gt;trial&lt;/a&gt;&lt;a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union"&gt;-&lt;/a&gt;&lt;a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union"&gt;in&lt;/a&gt;&lt;a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union"&gt;-&lt;/a&gt;&lt;a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union"&gt;the&lt;/a&gt;&lt;a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union"&gt;-&lt;/a&gt;&lt;a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union"&gt;european&lt;/a&gt;&lt;a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union"&gt;-&lt;/a&gt;&lt;a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union"&gt;union&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote15"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote15sym" href="#sdfootnote15anc"&gt;15&lt;/a&gt;
	European
	Commission - Fact Sheet Questions and Answers on the EU-US data
	protection "Umbrella agreement", September 8, 2015
	&lt;u&gt;&lt;a href="http://europa.eu/rapid/press-release_MEMO-15-5612_en.htm"&gt;http&lt;/a&gt;&lt;a href="http://europa.eu/rapid/press-release_MEMO-15-5612_en.htm"&gt;://&lt;/a&gt;&lt;a href="http://europa.eu/rapid/press-release_MEMO-15-5612_en.htm"&gt;europa&lt;/a&gt;&lt;a href="http://europa.eu/rapid/press-release_MEMO-15-5612_en.htm"&gt;.&lt;/a&gt;&lt;a href="http://europa.eu/rapid/press-release_MEMO-15-5612_en.htm"&gt;eu&lt;/a&gt;&lt;a href="http://europa.eu/rapid/press-release_MEMO-15-5612_en.htm"&gt;/&lt;/a&gt;&lt;a href="http://europa.eu/rapid/press-release_MEMO-15-5612_en.htm"&gt;rapid&lt;/a&gt;&lt;a href="http://europa.eu/rapid/press-release_MEMO-15-5612_en.htm"&gt;/&lt;/a&gt;&lt;a href="http://europa.eu/rapid/press-release_MEMO-15-5612_en.htm"&gt;press&lt;/a&gt;&lt;a href="http://europa.eu/rapid/press-release_MEMO-15-5612_en.htm"&gt;-&lt;/a&gt;&lt;a href="http://europa.eu/rapid/press-release_MEMO-15-5612_en.htm"&gt;release&lt;/a&gt;&lt;a href="http://europa.eu/rapid/press-release_MEMO-15-5612_en.htm"&gt;_&lt;/a&gt;&lt;a href="http://europa.eu/rapid/press-release_MEMO-15-5612_en.htm"&gt;MEMO&lt;/a&gt;&lt;a href="http://europa.eu/rapid/press-release_MEMO-15-5612_en.htm"&gt;-15-5612_&lt;/a&gt;&lt;a href="http://europa.eu/rapid/press-release_MEMO-15-5612_en.htm"&gt;en&lt;/a&gt;&lt;a href="http://europa.eu/rapid/press-release_MEMO-15-5612_en.htm"&gt;.&lt;/a&gt;&lt;a href="http://europa.eu/rapid/press-release_MEMO-15-5612_en.htm"&gt;htm&lt;/a&gt;&lt;/u&gt;&amp;nbsp;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote16"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote16sym" href="#sdfootnote16anc"&gt;16&lt;/a&gt;
	McGuire Woods, ‘EU and U.S. reach “Umbrella Agreement” on data
	transfers’, Lexology, September 14, 2015
	&lt;u&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;http&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;://&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;www&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;.&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;lexology&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;.&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;com&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;/&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;library&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;/&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;detail&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;.&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;aspx&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;?&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;g&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;=422&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;bca&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;41-2&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;d&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;54-4648-&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;ae&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;57-00&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;d&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;678515&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;e&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;1&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;f&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote17"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote17sym" href="#sdfootnote17anc"&gt;17&lt;/a&gt;
	Andrew
	Woods, Lowering the Temperature on the Microsoft-Ireland Case,
	Lawfare September, 2015
	&lt;u&gt;&lt;a href="https://www.lawfareblog.com/lowering-temperature-microsoft-ireland-case"&gt;https&lt;/a&gt;&lt;a href="https://www.lawfareblog.com/lowering-temperature-microsoft-ireland-case"&gt;://&lt;/a&gt;&lt;a href="https://www.lawfareblog.com/lowering-temperature-microsoft-ireland-case"&gt;www&lt;/a&gt;&lt;a href="https://www.lawfareblog.com/lowering-temperature-microsoft-ireland-case"&gt;.&lt;/a&gt;&lt;a href="https://www.lawfareblog.com/lowering-temperature-microsoft-ireland-case"&gt;lawfareblog&lt;/a&gt;&lt;a href="https://www.lawfareblog.com/lowering-temperature-microsoft-ireland-case"&gt;.&lt;/a&gt;&lt;a href="https://www.lawfareblog.com/lowering-temperature-microsoft-ireland-case"&gt;com&lt;/a&gt;&lt;a href="https://www.lawfareblog.com/lowering-temperature-microsoft-ireland-case"&gt;/&lt;/a&gt;&lt;a href="https://www.lawfareblog.com/lowering-temperature-microsoft-ireland-case"&gt;lowering&lt;/a&gt;&lt;a href="https://www.lawfareblog.com/lowering-temperature-microsoft-ireland-case"&gt;-&lt;/a&gt;&lt;a href="https://www.lawfareblog.com/lowering-temperature-microsoft-ireland-case"&gt;temperature&lt;/a&gt;&lt;a href="https://www.lawfareblog.com/lowering-temperature-microsoft-ireland-case"&gt;-&lt;/a&gt;&lt;a href="https://www.lawfareblog.com/lowering-temperature-microsoft-ireland-case"&gt;microsoft&lt;/a&gt;&lt;a href="https://www.lawfareblog.com/lowering-temperature-microsoft-ireland-case"&gt;-&lt;/a&gt;&lt;a href="https://www.lawfareblog.com/lowering-temperature-microsoft-ireland-case"&gt;ireland&lt;/a&gt;&lt;a href="https://www.lawfareblog.com/lowering-temperature-microsoft-ireland-case"&gt;-&lt;/a&gt;&lt;a href="https://www.lawfareblog.com/lowering-temperature-microsoft-ireland-case"&gt;case&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote18"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote18sym" href="#sdfootnote18anc"&gt;18&lt;/a&gt;
	Jens-Henrik Jeppesen, Greg Nojeim, ‘The EU-US Umbrella Agreement
	and the Judicial Redress Act: Small Steps Forward for EU Citizens’
	Privacy Rights’, October 5, 2015
	&lt;u&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;https&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;://&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;cdt&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;.&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;org&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;/&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;blog&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;/&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;the&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;-&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;eu&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;-&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;us&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;-&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;umbrella&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;-&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;agreement&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;-&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;and&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;-&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;the&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;-&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;judicial&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;-&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;redress&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;-&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;act&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;-&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;small&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;-&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;steps&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;-&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;forward&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;-&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;for&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;-&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;eu&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;-&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;citizens&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;-&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;privacy&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;-&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;rights&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;/&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote19"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote19sym" href="#sdfootnote19anc"&gt;19&lt;/a&gt;
	Ibid 18.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote20"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote20sym" href="#sdfootnote20anc"&gt;20&lt;/a&gt;
	Landmark ECJ data protection ruling could impact Facebook and
	Google, The Guardian, 2 October, 2015
	&lt;u&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;http&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;://&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;www&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;.&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;theguardian&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;.&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;com&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;/&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;technology&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;/2015/&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;oct&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;/02/&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;landmark&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;-&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;ecj&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;-&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;data&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;-&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;protection&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;-&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;ruling&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;-&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;facebook&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;-&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;google&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;-&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;weltimmo&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote21"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote21sym" href="#sdfootnote21anc"&gt;21&lt;/a&gt;
	Julia Powles, Tech companies like Facebook not above the law, says
	Max Schrems, The Guardian, Octover 9, 2015
	&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;http&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;://&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;www&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;.&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;theguardian&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;.&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;com&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;/&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;technology&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;/2015/&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;oct&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;/09/&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;facebook&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;-&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;data&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;-&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;privacy&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;-&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;max&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;-&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;schrems&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;-&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;european&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;-&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;court&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;-&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;of&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;-&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;justice&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote22"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote22sym" href="#sdfootnote22anc"&gt;22&lt;/a&gt;
	Adam
	Thierer,
	Unintended
	Consequences of the EU Safe Harbor Ruling, The Technology Liberation
	Front, October 6, 2015
	&lt;u&gt;&lt;a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831"&gt;http&lt;/a&gt;&lt;a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831"&gt;://&lt;/a&gt;&lt;a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831"&gt;techliberation&lt;/a&gt;&lt;a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831"&gt;.&lt;/a&gt;&lt;a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831"&gt;com&lt;/a&gt;&lt;a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831"&gt;/2015/10/06/&lt;/a&gt;&lt;a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831"&gt;unintended&lt;/a&gt;&lt;a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831"&gt;-&lt;/a&gt;&lt;a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831"&gt;consequenses&lt;/a&gt;&lt;a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831"&gt;-&lt;/a&gt;&lt;a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831"&gt;of&lt;/a&gt;&lt;a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831"&gt;-&lt;/a&gt;&lt;a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831"&gt;the&lt;/a&gt;&lt;a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831"&gt;-&lt;/a&gt;&lt;a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831"&gt;eu&lt;/a&gt;&lt;a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831"&gt;-&lt;/a&gt;&lt;a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831"&gt;safe&lt;/a&gt;&lt;a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831"&gt;-&lt;/a&gt;&lt;a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831"&gt;harbor&lt;/a&gt;&lt;a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831"&gt;-&lt;/a&gt;&lt;a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831"&gt;ruling&lt;/a&gt;&lt;a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831"&gt;/#&lt;/a&gt;&lt;a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831"&gt;more&lt;/a&gt;&lt;a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831"&gt;-75831&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote23"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote23sym" href="#sdfootnote23anc"&gt;23&lt;/a&gt;
	Anupam
	Chander, Tweeted ECJ&lt;a href="https://twitter.com/hashtag/schrems?src=hash"&gt;
	#&lt;/a&gt;&lt;a href="https://twitter.com/hashtag/schrems?src=hash"&gt;schrems&lt;/a&gt;
	ruling may effectively require data localization within Europe,
	&lt;u&gt;&lt;a href="https://twitter.com/AnupamChander/status/651369730754801665"&gt;https&lt;/a&gt;&lt;a href="https://twitter.com/AnupamChander/status/651369730754801665"&gt;://&lt;/a&gt;&lt;a href="https://twitter.com/AnupamChander/status/651369730754801665"&gt;twitter&lt;/a&gt;&lt;a href="https://twitter.com/AnupamChander/status/651369730754801665"&gt;.&lt;/a&gt;&lt;a href="https://twitter.com/AnupamChander/status/651369730754801665"&gt;com&lt;/a&gt;&lt;a href="https://twitter.com/AnupamChander/status/651369730754801665"&gt;/&lt;/a&gt;&lt;a href="https://twitter.com/AnupamChander/status/651369730754801665"&gt;AnupamChander&lt;/a&gt;&lt;a href="https://twitter.com/AnupamChander/status/651369730754801665"&gt;/&lt;/a&gt;&lt;a href="https://twitter.com/AnupamChander/status/651369730754801665"&gt;status&lt;/a&gt;&lt;a href="https://twitter.com/AnupamChander/status/651369730754801665"&gt;/651369730754801665&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote24"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote24sym" href="#sdfootnote24anc"&gt;24&lt;/a&gt;
	Lokman Tsui, Tweeted, “If the TPP bans data localization, but the
	ECJ ruling effectively mandates it, what does that mean for the
	internet?”
	&lt;u&gt;&lt;a href="https://twitter.com/lokmantsui/status/651393867376275456"&gt;https&lt;/a&gt;&lt;a href="https://twitter.com/lokmantsui/status/651393867376275456"&gt;://&lt;/a&gt;&lt;a href="https://twitter.com/lokmantsui/status/651393867376275456"&gt;twitter&lt;/a&gt;&lt;a href="https://twitter.com/lokmantsui/status/651393867376275456"&gt;.&lt;/a&gt;&lt;a href="https://twitter.com/lokmantsui/status/651393867376275456"&gt;com&lt;/a&gt;&lt;a href="https://twitter.com/lokmantsui/status/651393867376275456"&gt;/&lt;/a&gt;&lt;a href="https://twitter.com/lokmantsui/status/651393867376275456"&gt;lokmantsui&lt;/a&gt;&lt;a href="https://twitter.com/lokmantsui/status/651393867376275456"&gt;/&lt;/a&gt;&lt;a href="https://twitter.com/lokmantsui/status/651393867376275456"&gt;status&lt;/a&gt;&lt;a href="https://twitter.com/lokmantsui/status/651393867376275456"&gt;/651393867376275456&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote25"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote25sym" href="#sdfootnote25anc"&gt;25&lt;/a&gt;
	Statement from Indian Head of Delegation, Mr Ram Narain for WGPL,
	&lt;a href="https://ccgnludelhi.wordpress.com/2014/11/04/indian-statement-on-itu-and-internet-at-the-working-group-plenary/"&gt;Indian&lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/2014/11/04/indian-statement-on-itu-and-internet-at-the-working-group-plenary/"&gt;statement&lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/2014/11/04/indian-statement-on-itu-and-internet-at-the-working-group-plenary/"&gt;on&lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/2014/11/04/indian-statement-on-itu-and-internet-at-the-working-group-plenary/"&gt;ITU&lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/2014/11/04/indian-statement-on-itu-and-internet-at-the-working-group-plenary/"&gt;and&lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/2014/11/04/indian-statement-on-itu-and-internet-at-the-working-group-plenary/"&gt;Internet&lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/2014/11/04/indian-statement-on-itu-and-internet-at-the-working-group-plenary/"&gt;at&lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/2014/11/04/indian-statement-on-itu-and-internet-at-the-working-group-plenary/"&gt;the&lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/2014/11/04/indian-statement-on-itu-and-internet-at-the-working-group-plenary/"&gt;Working&lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/2014/11/04/indian-statement-on-itu-and-internet-at-the-working-group-plenary/"&gt;Group&lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/2014/11/04/indian-statement-on-itu-and-internet-at-the-working-group-plenary/"&gt;Plenary&lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/2014/11/04/indian-statement-on-itu-and-internet-at-the-working-group-plenary/"&gt;November&lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/2014/11/04/indian-statement-on-itu-and-internet-at-the-working-group-plenary/"&gt;
	4, 2014 &lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/author/asukum87/page/2/"&gt;https&lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/author/asukum87/page/2/"&gt;://&lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/author/asukum87/page/2/"&gt;ccgnludelhi&lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/author/asukum87/page/2/"&gt;.&lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/author/asukum87/page/2/"&gt;wordpress&lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/author/asukum87/page/2/"&gt;.&lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/author/asukum87/page/2/"&gt;com&lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/author/asukum87/page/2/"&gt;/&lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/author/asukum87/page/2/"&gt;author&lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/author/asukum87/page/2/"&gt;/&lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/author/asukum87/page/2/"&gt;asukum&lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/author/asukum87/page/2/"&gt;87/&lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/author/asukum87/page/2/"&gt;page&lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/author/asukum87/page/2/"&gt;/2/&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote26"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote26sym" href="#sdfootnote26anc"&gt;26&lt;/a&gt;
	Sounak
	Mitra, Xiaomi bets big on India despite problems, Business Standard,
	December 2014
	&lt;u&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;http&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;://&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;www&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;.&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;business&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;-&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;standard&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;.&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;com&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;/&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;article&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;/&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;companies&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;/&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;xiaomi&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;-&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;bets&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;-&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;big&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;-&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;on&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;-&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;india&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;-&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;despite&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;-&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;problems&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;-114122201023_1.&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;html&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote27"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote27sym" href="#sdfootnote27anc"&gt;27&lt;/a&gt;
	Neha
	Alawadi, Ruling on data flow between EU &amp;amp; US may impact India’s
	IT sector, Economic Times,October 7, 2015
	&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;http&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;://&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;economictimes&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;.&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;indiatimes&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;.&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;com&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;/&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;articleshow&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;/49250738.&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;cms&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;?&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;utm&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;_&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;source&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;=&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;contentofinterest&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;&amp;amp;&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;utm&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;_&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;medium&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;=&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;text&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;&amp;amp;&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;utm&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;_&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;campaign&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;=&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;cppst&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote28"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote28sym" href="#sdfootnote28anc"&gt;28&lt;/a&gt;
	Pranav Menon, Data Protection Laws in India and Data Security-
	Impact on India and Data Security-Impact on India - EU Free Trade
	Agreement, CIS Access to Knowledge, 2011
	&lt;u&gt;&lt;a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf"&gt;http&lt;/a&gt;&lt;a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf"&gt;://&lt;/a&gt;&lt;a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf"&gt;cis&lt;/a&gt;&lt;a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf"&gt;-&lt;/a&gt;&lt;a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf"&gt;india&lt;/a&gt;&lt;a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf"&gt;.&lt;/a&gt;&lt;a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf"&gt;org&lt;/a&gt;&lt;a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf"&gt;/&lt;/a&gt;&lt;a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf"&gt;a&lt;/a&gt;&lt;a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf"&gt;2&lt;/a&gt;&lt;a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf"&gt;k&lt;/a&gt;&lt;a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf"&gt;/&lt;/a&gt;&lt;a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf"&gt;blogs&lt;/a&gt;&lt;a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf"&gt;/&lt;/a&gt;&lt;a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf"&gt;data&lt;/a&gt;&lt;a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf"&gt;-&lt;/a&gt;&lt;a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf"&gt;security&lt;/a&gt;&lt;a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf"&gt;-&lt;/a&gt;&lt;a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf"&gt;laws&lt;/a&gt;&lt;a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf"&gt;-&lt;/a&gt;&lt;a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf"&gt;india&lt;/a&gt;&lt;a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf"&gt;.&lt;/a&gt;&lt;a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf"&gt;pdf&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote29"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote29sym" href="#sdfootnote29anc"&gt;29&lt;/a&gt;
	Surendra
	Kumar Sinha, India wants Mutual Legal Assistance treaty with
	Bangladesh, Economic Times, October 7, 2015
	h&lt;u&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;ttp&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;://&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;economictimes&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;.&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;indiatimes&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;.&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;com&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;/&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;articleshow&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;/49262294.&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;cms&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;?&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;utm&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;_&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;source&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;=&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;contentofinterest&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;&amp;amp;&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;utm&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;_&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;medium&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;=&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;text&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;&amp;amp;&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;utm&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;_&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;campaign&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;=&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;cppst&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote30"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote30sym" href="#sdfootnote30anc"&gt;30&lt;/a&gt;
	Pablo
	Chavez, Director, Public Policy and Government Affairs, 	Testifying
	before the U.S. Senate on 	transparency 	legislation, November 3,
	2013
	&lt;u&gt;&lt;a href="http://googlepublicpolicy.blogspot.in/2013/11/testifying-before-us-senate-on.html"&gt;http&lt;/a&gt;&lt;a href="http://googlepublicpolicy.blogspot.in/2013/11/testifying-before-us-senate-on.html"&gt;://&lt;/a&gt;&lt;a href="http://googlepublicpolicy.blogspot.in/2013/11/testifying-before-us-senate-on.html"&gt;googlepublicpolicy&lt;/a&gt;&lt;a href="http://googlepublicpolicy.blogspot.in/2013/11/testifying-before-us-senate-on.html"&gt;.&lt;/a&gt;&lt;a href="http://googlepublicpolicy.blogspot.in/2013/11/testifying-before-us-senate-on.html"&gt;blogspot&lt;/a&gt;&lt;a href="http://googlepublicpolicy.blogspot.in/2013/11/testifying-before-us-senate-on.html"&gt;.&lt;/a&gt;&lt;a href="http://googlepublicpolicy.blogspot.in/2013/11/testifying-before-us-senate-on.html"&gt;in&lt;/a&gt;&lt;a href="http://googlepublicpolicy.blogspot.in/2013/11/testifying-before-us-senate-on.html"&gt;/2013/11/&lt;/a&gt;&lt;a href="http://googlepublicpolicy.blogspot.in/2013/11/testifying-before-us-senate-on.html"&gt;testifying&lt;/a&gt;&lt;a href="http://googlepublicpolicy.blogspot.in/2013/11/testifying-before-us-senate-on.html"&gt;-&lt;/a&gt;&lt;a href="http://googlepublicpolicy.blogspot.in/2013/11/testifying-before-us-senate-on.html"&gt;before&lt;/a&gt;&lt;a href="http://googlepublicpolicy.blogspot.in/2013/11/testifying-before-us-senate-on.html"&gt;-&lt;/a&gt;&lt;a href="http://googlepublicpolicy.blogspot.in/2013/11/testifying-before-us-senate-on.html"&gt;us&lt;/a&gt;&lt;a href="http://googlepublicpolicy.blogspot.in/2013/11/testifying-before-us-senate-on.html"&gt;-&lt;/a&gt;&lt;a href="http://googlepublicpolicy.blogspot.in/2013/11/testifying-before-us-senate-on.html"&gt;senate&lt;/a&gt;&lt;a href="http://googlepublicpolicy.blogspot.in/2013/11/testifying-before-us-senate-on.html"&gt;-&lt;/a&gt;&lt;a href="http://googlepublicpolicy.blogspot.in/2013/11/testifying-before-us-senate-on.html"&gt;on&lt;/a&gt;&lt;a href="http://googlepublicpolicy.blogspot.in/2013/11/testifying-before-us-senate-on.html"&gt;.&lt;/a&gt;&lt;a href="http://googlepublicpolicy.blogspot.in/2013/11/testifying-before-us-senate-on.html"&gt;htm&lt;/a&gt;&lt;/u&gt;&amp;nbsp;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote31"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote31sym" href="#sdfootnote31anc"&gt;31&lt;/a&gt;
	Report
	of the Group of Experts on Privacy (Chaired by Justice A P Shah,
	Former Chief Justice, Delhi High Court), Planning Commission,
	October 2012
		&lt;u&gt;&lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;http&lt;/a&gt;&lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;://&lt;/a&gt;&lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;planningcommission&lt;/a&gt;&lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;.&lt;/a&gt;&lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;nic&lt;/a&gt;&lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;.&lt;/a&gt;&lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;in&lt;/a&gt;&lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;/&lt;/a&gt;&lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;reports&lt;/a&gt;&lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;/&lt;/a&gt;&lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;genrep&lt;/a&gt;&lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;/&lt;/a&gt;&lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;rep&lt;/a&gt;&lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;_&lt;/a&gt;&lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;privacy&lt;/a&gt;&lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;.&lt;/a&gt;&lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;pdf&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;p align="justify"&gt;&amp;nbsp;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote31"&gt;
&lt;p align="justify"&gt;&amp;nbsp;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote30"&gt;&amp;nbsp;&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/contestations-of-data-ecj-safe-harbor-ruling-and-lessons-for-india'&gt;https://cis-india.org/internet-governance/blog/contestations-of-data-ecj-safe-harbor-ruling-and-lessons-for-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>jyoti</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Digital Economy</dc:subject>
    
    
        <dc:subject>Public Accountability</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Platform Responsibility</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Accountability</dc:subject>
    
    
        <dc:subject>Digital Security</dc:subject>
    
    
        <dc:subject>Digital India</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-10-14T14:40:08Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/comparison-of-general-data-protection-regulation-and-data-protection-directive">
    <title>Comparison of General Data Protection Regulation and Data Protection Directive</title>
    <link>https://cis-india.org/internet-governance/blog/comparison-of-general-data-protection-regulation-and-data-protection-directive</link>
    <description>
        &lt;b&gt;Recently, the General Data Protection Regulation (REGULATION (EU) 2016/679) was passed. It shall replace the present Data Protection Directive (DPD 95/46/EC), which is a step that is likely to impact the workings of many organizations. This document intends to offer a clear comparison between the General Data Protection Regulation (GDPR) a the Data Protection Direction (DPD).

&lt;/b&gt;
        &lt;p&gt;Download the &lt;a class="external-link" href="http://cis-india.org/internet-governance/files/comparison-table-gdpr-dpd"&gt;file here&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h1 style="text-align: justify; "&gt;INTRODUCTION&lt;/h1&gt;
&lt;p style="text-align: justify; "&gt;The GDPR i.e. General Data Protection Regulation (REGULATION (EU) 2016/679) 	was adopted on May 27th, 2016. It will come into force after a two-year 	transition period on May 25th, 2018 and will replace the Data Protection 	Directive (DPD 95/46/EC). The Regulation intends to empower data subjects 	in the European Union by giving them control over the processing of their 	personal data. This is not an enabling legislation. Unlike the previous 	regime under the DPD (Data Protection Directive), wherein different member 	States legislated their own data protection laws, the new regulation 	intends uniformity in application with some room for individual member 	states to legislate on procedural mechanisms. While this will ensure a 	predictable environment for doing business, a number of obligations will 	have to be undertaken by organizations, which might initially burden them 	financially and administratively.&lt;/p&gt;
&lt;h1 style="text-align: justify; "&gt;&lt;a name="_s6hlmorxmhjt"&gt;&lt;/a&gt; 2. SUMMARY&lt;/h1&gt;
&lt;p style="text-align: justify; "&gt;The Regulation contains a number of new provisions as well as modified 	provisions that were under DPD and has removed certain requirements under 	the DPD. Some significant changes mentioned in the document have been 	summarized in this section.. These changes suggest that GDPR is a 	comprehensive law with detailed substantive and procedural provisions. Yet, 	some ambiguities remain with respect to its workability and interpretation. 	Clarifications will be required.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a name="_bx6wcm39fme2"&gt;&lt;/a&gt; 2.1 Provisions from the DPD that were retained but altered in the GDPR 	include:&lt;/h2&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_dgj5eiqdp6rg"&gt;&lt;/a&gt; 2.1.1 Scope:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;GDPR has an expanded territorial scope and is applicable under two 	scenarios; 1) when processor or controller is established in the Union, and 	2) when processor or controller is not established in the Union. The 	conditions for applicability of the GDPR under the two are much wider than 	those provided for DPD. Also, the criteria under GDPR are more specific and 	clearer to demonstrate application.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_xkff9yuwpdhu"&gt;&lt;/a&gt; 2.1.2 Definitions:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Six definitions have remained the same while those of personal data and 	consent have been expanded.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_ubv6cbv0v00"&gt;&lt;/a&gt; 2.1.3 Consent:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;GDPR mentions "unambiguous" consent and spells out in detail what 	constitutes a valid consent. Demonstration of valid consent is an important 	obligation of the controller. Further, the GDPR also explains situations in 	which child's consent will be valid. Such provisions are absent in DPD.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_uqvt1qhmvy2p"&gt;&lt;/a&gt; 2.1.4 Special categories of data:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Two new categories, biometric and genetic data have been added under GDPR.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_ap4k8hvlnia"&gt;&lt;/a&gt; 2.1.5 Rights:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The GDPR strengthens certain rights granted under the DPD. These include:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Right to restrict processing: &lt;/b&gt;Under DPD the data 	subject can block processing of data on the grounds of data inaccuracy or 	incomplete nature of data. GDPR, on the other hand , is more elaborate and 	defined in this respect. Many more grounds are listed together with 	consequences of enforcement of this right and obligations on controller.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b. &lt;b&gt;Right to erasure: &lt;/b&gt; This is known as the "right to be 	forgotten". Here, the DPD merely mentions that the data subject has the 	right to request erasure of data on grounds of data inaccuracy or 	incomplete nature of data or in case of unlawful processing. The GDPR has 	strengthened this right by laying out 7 conditions for enforcing this right 	including 5 grounds on which the request for erasure shall not be 	processed. This means that the "right to erasure" is not an absolute right. 	GDPR provides that if data has been made public, controllers are under an 	obligation to inform other controllers processing the data about the 	request.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;c. &lt;b&gt;Right to rectification: &lt;/b&gt;This right is similar under 	GDPR and DPD.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;d. &lt;b&gt;Right to access: &lt;/b&gt;GDPR has broadened the amount of 	information data subject can have regarding his/her own data. For example, 	under the DPD the data subject could know about the purpose of processing, 	categories of processing, recipients or categories to whom data are 	disclosed and extent of automated decision involved. Now under GDPR, the 	data subject can also know about retention period, existence of certain 	rights, about source of data and consequences of processing. It 	specifically states controllers obligations in this regard.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;e.	&lt;b&gt;Automated individual decision making including profiling: &lt;/b&gt; This is an interesting provision that applies solely to automate 	decision-making. This includes profiling, which is a process by which 	personal data is evaluated solely by automated means for the purpose of 	analyzing a person's personal aspect such as performance at work, health, 	location etc. The intent is that data subjects should have the right to 	obtain human intervention into their personal data. This upholds philosophy 	of data safeguard as the subject can get an opportunity to express himself, 	obtain explanation and challenge the decision. Under GDPR, such 	decision-making excludes data concerning a child.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_mirhfotxo6sy"&gt;&lt;/a&gt; 2.1.6 Code of conduct:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;A voluntary self-regulating mechanism has been provided under both GDPR and 	DPD.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_7bkgvf7abyyr"&gt;&lt;/a&gt; 2.1.7 Supervisory Authority:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;As compared to the DPD, the GDPR lays down detailed and elaborate 	provisions on Supervisory Authority.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_khb6zs50ya84"&gt;&lt;/a&gt; 2.1.8 Compensation and Liability:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Although compensation and liability provisions under GDPR and DPD are 	similar, the GDPR specifically mentions this as a right with a wider scope. 	While the Directive enforces liability on the controller only, under the 	GDPR, compensation can be claimed from both, processor and controller.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_bovy1ju2u8iv"&gt;&lt;/a&gt; 2.1.9 Effective judicial remedies:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Provisions in this area are also quite similar between the DPD and GDPR. 	The difference is that GDPR specifically mentions this as a "right" and the 	Directive does not. Use of such words is bound to bring legal clarity. It 	is interesting to note that in the DPD, recourse to remedy has been 	mentioned in the Recitals and it is the national law of individual member 	states, which shall regulate the enforceability. GDPR, on the other hand, 	mentions this under its Articles together with the jurisdiction of courts 	and exceptions to this right.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_xndzim3hdxxa"&gt;&lt;/a&gt; 2.1.10 Right to lodge complaint with supervisory authority:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The right conferred to the data subject to seek remedy under unlawful 	processing has been strengthened under GDPR. Again, as mentioned above, 	GDRP specifically words this as a "right" while the DPD does not.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a name="_68pmqs7h2gvp"&gt;&lt;/a&gt; 2.2 New provisions added to the GDPR include:&lt;/h2&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_pynrk1m03gga"&gt;&lt;/a&gt; 2.2.1 Data Transfer to third countries:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Provisions under Chapter V of GDPR regulate data transfers from EU to third 	countries and international organizations and data transfer onward. DPD 	only provides for data transfer to third countries without reference to 	international organizations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A mechanism called adequacy decisions for such transfers remains the same 	under both laws. However, in situations where Commission does not take 	adequacy decisions, alternate and elaborate provisions on "Effective 	Safeguards" and "Binding Corporate Rules" have been mentioned under the 	GDPR. Other certain situations have been envisaged under both GDPR and DPD 	for data transfers in absence of adequacy decision. These are more or less 	similar with a only few modifications.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Significantly, GDPR brings clarity with respect to enforceability of 	judgments and orders of authorities that are outside of EU over their 	decision on such data transfer. Additionally, it provides for international 	cooperation for protection of personal data. These are not mentioned in the 	DPD.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_ke5mhncq1f0n"&gt;&lt;/a&gt; 2.2.2 Certification mechanism:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Just like code of conduct, this is also a voluntary mechanism, which can 	aid in demonstrating compliance with Regulation.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_f6377ap0044"&gt;&lt;/a&gt; 2.2.3 Records of processing activities:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;This is a mandatory "compliance demonstration" mechanism under GDPR, which 	is not mentioned under DPD. Organizations are likely to face initial 	administrative and financial burdens in order to maintain records of 	processing activities.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_k6sqaxd28am7"&gt;&lt;/a&gt; 2.2.4 Obligations of processor:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;DPD fixes liability on controllers but leaves out processors. GDPR includes 	both. Consequently, GDPR specifies obligations of the processor, the kinds 	of processors the controller can use and what will govern processing.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_ggx4qdqpvwl1"&gt;&lt;/a&gt; 2.2.5 Data Protection officer:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;This finds no mention in the DPD. Under the GDPR, a data protection officer 	must be mandatorily appointed where the core business activity of the 	organization pertains to processing, which requires regular and systematic 	monitoring of data subjects on large scale, processing of large scale 	special categories of data and offences, or processing carried out by 	public authority or public body.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_vmyb0dlytf7z"&gt;&lt;/a&gt; 2.2.6 Data protection impact assessment:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;This is a Privacy Impact assessment for ensuring and demonstrating 	compliance with the Regulation. Such assessment can identify and minimize 	risks. GDPR mandates that such assessment must be carried out when 	processing is likely to result in high risk. The relevant Article mentions 	when to carry out processing, the type of information to be contained in 	assessment and a clause for prior consultation with supervisory authority 	prior to processing if assessment indicates high risk.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_jsw1owqhhya3"&gt;&lt;/a&gt; 2.2.7 Data Breach:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Under this provision, the controller is responsible for two things: 1) 	reporting personal data breach to supervisory authority no later than 72 	hours . Any delay in notifying the authority has to be accompanied by 	reasons for delay; and 2) communicating the breach to the data subject in 	case the breach is likely to cause high risk to right and freedoms of the 	person. As far as the processor is concerned, in the event of data breach, 	the processor must notify the controller. This provision is likely to push 	some major changes in the workings of various organizations. A number of 	detection and reporting mechanisms will have to be implemented. Above all, 	these mechanisms will have to be extremely efficient given the time limit.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_ccc1t8kwx628"&gt;&lt;/a&gt; 2.2.8 Data Protection by design and default:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;This entails a general obligation upon the controller to incorporate 	effective data protection in internal policies and implementation measures.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_w5imfuxpb2ys"&gt;&lt;/a&gt; 2.2.9 Rights:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Under the GDPR, a new right called the " Right to data portability " has 	been conferred upon the data subjects. This right empowers the data subject 	to receive personal data from one controller and transfer it to another.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_u0fpe4c3oxoo"&gt;&lt;/a&gt; 2.2.10 New Definitions:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Out of 26 definitions, 18 new definitions have been added. 	"Pseudonymisation" is one such new concept that can aid data privacy. This 	data processing technique encourages processing in a way that personal data 	can no longer be attributed to a specific data subject without using 	additional information. This additional information is to be stored 	separately in a way that it is not attributed to an identified or 	identifiable natural person.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_lh2v66dwa6g5"&gt;&lt;/a&gt; 2.2.11 Administrative fines:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Perhaps much concern about GDPR is due to provisions on high fines for 	non-compliance of certain provisions. Organizations simply cannot afford to 	ignore it. Non-compliance can lead to imposition of very heavy fines up to 	20,000,000 EUR or 4% of total worldwide turnover.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a name="_ad4hk9ac5g76"&gt;&lt;/a&gt; 2.3 Deleted provisions under DPD include :&lt;/h2&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_f7qp3wle6y52"&gt;&lt;/a&gt; 2.3.1 Working Party:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Working party under the DPD has been replaced by the European Data 	Protection Board provided by the GDPR. The purpose of the Board is to 	ensure consistent application of the Regulation.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_79qx7y3yed1o"&gt;&lt;/a&gt; 2.3.2 Notification Requirement:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The general obligation to notify processing supervisory authorities has 	been removed. It was observed that this requirement imposed unnecessary 	financial and administrative burden on organizations and was not successful 	in achieving the real purpose that is protection of personal data. Instead, 	now the GDPR focuses on procedures and mechanisms like Privacy Impact 	assessment to ensure compliance.&lt;/p&gt;
&lt;h1 style="text-align: justify; "&gt;&lt;a name="_mpysf7lokshn"&gt;&lt;/a&gt; 3. BRIEF OVERVIEW&lt;/h1&gt;
&lt;p style="text-align: justify; "&gt;The GDPR is the new uniform law, which will now replace older laws. A brief 	overview has been given below:&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Topic&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;GDPR&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;(General Data Protection Regulation)&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;DPD &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;(Data Protection Directive)&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Name&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;REGULATION (EU) 2016/679&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;DPD 95/46/EC&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Enforcement&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Adopted on 27 May 2016&lt;/p&gt;
&lt;p&gt;To be enforced on 25 May 2018&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Adopted on 24 October 1995&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Effect of legislation&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;It is a Regulation.&lt;/p&gt;
&lt;p&gt;Is directly applicable to all EU member states without 					requiring a separate national legislation.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;It is an enabling legislation.&lt;/p&gt;
&lt;p&gt;Countries have to pass their own separate legislations.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Objective&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;To protect "natural persons" with regard to processing of 					personal data and on free movement of such data.&lt;/p&gt;
&lt;p&gt;It repeals DPD 95/46/EC.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;To protect "individuals" with regard to processing of 					personal data and on free movement of such data.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p style="text-align: left; "&gt;Number of Chapters&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;XI&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;VII&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p style="text-align: left; "&gt;Number of Articles&lt;a name="_3znysh7"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;99&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;34&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p style="text-align: left; "&gt;Number of Recitals&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;173&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;72&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Applicability&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;To processors and controllers&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Same&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h1 style="text-align: justify; "&gt;&lt;a name="_rpg4m5a4zaod"&gt;&lt;/a&gt; 4. COMPARATIVE ANALYSIS OF GDPR AND DPD&lt;/h1&gt;
&lt;p style="text-align: justify; "&gt;This section offers a comparative analysis through a set of tables and text 	analysing and comparing the provisions of General Data Protection 	Regulation (GDPR) with those of the Data Protection Direction (DPD). Spaces 	left blank in the tables imply lack of similar provisions under the 	respective data regime.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a name="_2et92p0"&gt;&lt;/a&gt; 4.1 Territorial Scope&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;GDPR has expanded territorial scope. The application of Regulation is 	independent of the place where processing of personal data takes places 	under certain conditions. The focus is the data subject and not the 	location. The DPD made application of national law, a criterion for 	determining the applicability of the Directive. Under the GDPR, the 	following conditions need to be satisfied for application of Regulation.&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Sub-topics in the section&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;GDPR&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;DPD&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Given in Article&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;3&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;4&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;When processor or controller is established in the Union, 					the Regulation/ Directive will apply if:&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(DPD is silent on location of processors&lt;/i&gt; )&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;1. Processing is of personal data&lt;/p&gt;
&lt;p&gt;2. Processing is in "context of activities" of the 					establishment&lt;/p&gt;
&lt;p&gt;3. Processing may or may not take place in the Union&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Processing is of personal data.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;When processor or controller is not established in Union, 					the Regulation/Directive will apply if:&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(DPD is silent on location of processors&lt;/i&gt; )&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;1. Data subjects are in the Union; and&lt;/p&gt;
&lt;p&gt;2. Processing activity is related to:&lt;/p&gt;
&lt;p&gt;I. Offering of goods or services; or&lt;/p&gt;
&lt;p&gt;II. Monitoring their behavior within Union&lt;/p&gt;
&lt;p&gt;3. Will apply when Member State law is applicable to that 					place by the virtue of public international law&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;1. Like GDPR the DPD mentions that national law should be 					applicable to that place by virtue of public international 					law;&lt;/p&gt;
&lt;p&gt;Or&lt;/p&gt;
&lt;p&gt;2. If the equipment for processing is situated on Member 					state territory unless it is used only for purpose of 					transit.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a name="_tyjcwt"&gt;&lt;/a&gt; 4.2 Material Scope&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The Recital under GDPR explains that data protection is not an absolute 	right. Principle of proportionality has been adopted to respect other 	fundamental rights.&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p style="text-align: left; "&gt;Sub-topics in the section&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;GDPR&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;DPD&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Given in Article&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;3&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Applies to&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Processing of personal data&lt;/p&gt;
&lt;p&gt;Processing is by automated means, wholly or partially&lt;/p&gt;
&lt;p&gt;When processing is not by automated means, the personal 					data should form or are intended to form a part of filing 					system&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Same&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Does not apply to&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Processing of personal data:&lt;/p&gt;
&lt;p&gt;1. For activities which lie outside scope of Union law&lt;/p&gt;
&lt;p&gt;2. By Member State under Chapter 2 Title V of TEU&lt;/p&gt;
&lt;p&gt;3. By natural person in course of purely personal or 					household activity&lt;/p&gt;
&lt;p&gt;4. By competent authorities in relation to criminal 					offences and penalties and threats to public security&lt;/p&gt;
&lt;p&gt;5. Under Regulation (EC) No 45/2001. This needs to be 					adapted for consistency with GDPR&lt;/p&gt;
&lt;p&gt;6. Which should not prejudice the E commerce Directive 					2000/31/EC especially the liability rules of intermediary 					service providers&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;The provisions in DPD are similar to GDPR.&lt;/p&gt;
&lt;p&gt;In addition to Title V, the DPD did not apply to Title VI 					of TEU.&lt;/p&gt;
&lt;p&gt;DPD doesn't mention Regulation (EC) No 45/2001 or the E 					commerce Directive 2000/31/EC.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a name="_3dy6vkm"&gt;&lt;/a&gt; 4.3 Definitions&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;GDPR incorporates 26 definitions as compared to 8 definitions under DPD. 	There are 18 new definitions in GDPR. Some definitions have been expanded.&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Sub-topics in the section&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;GDPR&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;DPD&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Given in Article&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;4&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;New Definitions under GDPR&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;1. Restriction of processing&lt;/p&gt;
&lt;p&gt;2. Profiling&lt;/p&gt;
&lt;p&gt;3. Pseudonymisation&lt;/p&gt;
&lt;p&gt;4. Personal data breach&lt;/p&gt;
&lt;p&gt;5. Genetic data&lt;/p&gt;
&lt;p&gt;6. Biometric data&lt;/p&gt;
&lt;p&gt;7. Data concerning health&lt;/p&gt;
&lt;p&gt;8. Main establishment&lt;/p&gt;
&lt;p&gt;9. Representative&lt;/p&gt;
&lt;p&gt;10. Enterprise&lt;/p&gt;
&lt;p&gt;11. Group of undertakings&lt;/p&gt;
&lt;p&gt;12. Binding corporate rules&lt;/p&gt;
&lt;p&gt;13. Supervisory authority&lt;/p&gt;
&lt;p&gt;14. Supervisory authority concerned&lt;/p&gt;
&lt;p&gt;15. Cross border processing&lt;/p&gt;
&lt;p&gt;16. Relevant and reasoned objection&lt;/p&gt;
&lt;p&gt;17. Information society service&lt;/p&gt;
&lt;p&gt;18. International organizations&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;2 definitions that have been expanded under GDPR&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;1. Personal data&lt;/p&gt;
&lt;p&gt;2. Consent&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;6 Definitions which have remained same in GDPR and DPD&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;1. Processing of personal data&lt;/p&gt;
&lt;p&gt;2. Personal data filing system&lt;/p&gt;
&lt;p&gt;3. Controller&lt;/p&gt;
&lt;p&gt;4. Processor&lt;/p&gt;
&lt;p&gt;5. Third party recipient&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_1t3h5sf"&gt;&lt;/a&gt; 4.3.1 Expanded definition of personal data&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Both DPD and GDPR apply to 'personal data'. The GDPR gives an expanded 	definition of 'personal data'. Recital 30 gives example of an online 	identifier such as IP addresses.&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Sub-topics in the section&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;GDPR&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;DPD&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Given in Article&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;4(1)&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2(a)&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;New term added in the definition&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;A new term " online identifier" has been added.&lt;/p&gt;
&lt;p&gt;Example of online identifier is given under Recital 30. An 					IP address is one such example.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_tk0fv08fd3b8"&gt;&lt;/a&gt;&lt;/h3&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_4d34og8"&gt;&lt;/a&gt; 4.3.2 Expanded definition of consent&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Valid consent must be given by the data subject. The definition of valid 	consent has been added under GDPR.&lt;b&gt; &lt;/b&gt;Recital 32 further 	explains that consent can be given by "means of a written statement 	including electronic means or an oral statement". For example, ticking a 	box on websites signifies acceptance of processing while "pre ticked boxes, 	silence or inactivity" do not constitute consent.&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Sub-topics in the section&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;GDPR&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;DPD&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Given in Article&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;4(11)&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2(h)&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Term added in GDPR&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Consent must be unambiguous, freely given, specific and 					informed.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;The word "unambiguous" is not contained in DPD.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Means of signifying assent to processing own data&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Assent can be given by a					&lt;i&gt;statement or by clear affirmative action&lt;/i&gt; signifying assent to processing.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;DPD merely mentions that					&lt;i&gt;freely given, specific and informed consent &lt;/i&gt; signifies assent.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a name="_2s8eyo1"&gt;&lt;/a&gt; 4.4 Conditions for consent&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;GDPR lays down detailed provisions for valid consent. Such provisions are 	not given in DPD.&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Sub-topics in the section&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;GDPR&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;DPD&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Article&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;7&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Obligation of controller&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Must demonstrate consent has been given&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Presentation of written declaration of consent&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;It should be in a clearly distinguishable, intelligible and 					easily accessible form.&lt;/p&gt;
&lt;p&gt;Language should be clear and plain.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;If declaration or any part of it infringes on Regulation&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Declaration will be non-binding.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="2"&gt;
&lt;p&gt;Right of data subject&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;To withdraw consent at any time.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;If consent is withdrawn, it will not make processing done 					earlier unlawful.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;For assessing whether consent is freely given&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Must consider whether performance of contract or provision 					of service is made conditional on consent to processing of 					data not necessary for performance of contract.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a name="_17dp8vu"&gt;&lt;/a&gt; 4.5 Conditions applicable to child's consent in relation to information 	society services&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;This article prescribes an age limit for making processing lawful when 	information society services (direct online service) are offered directly 	to a child.&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Sub Topics in the Section&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;GDPR&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;DPD&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Given in Article&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;8&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Conditions for valid consent in this case&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;If child is at least 16 years old his consent is valid.&lt;/p&gt;
&lt;p&gt;If child is below 16 years consent must be obtained from 					holder of parental responsibility over the child.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Age relaxation can be given when&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Member States provides a law lowering the age.&lt;/p&gt;
&lt;p&gt;Age cannot be lowered below 13 years.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Controller's responsibility&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Verify who has given the consent&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Exceptions&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;This law will not affect:&lt;/p&gt;
&lt;p&gt;General contract law of member states;&lt;/p&gt;
&lt;p&gt;Effect of contract law on a child;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a name="_3rdcrjn"&gt;&lt;/a&gt; 4.6 Processing of special categories of personal data&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Like the DPD, the GDPR spells out the data that is considered sensitive and 	the conditions under which this data can be processed. Two new categories 	of special data, "genetic data" and "biometric data", have been added to 	the list in the GDPR.&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Sub Topics in the Section&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;GDPR&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;DPD&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Article&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;9&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;8&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="6"&gt;
&lt;p&gt;Categories of data considered sensitive&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Racial or ethnic origin&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Same&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Political opinions&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Same&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Religious or philosophical beliefs&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Same&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Trade union membership&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Same&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Health or sex life or sexual orientation&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Same&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Genetic data or&lt;/p&gt;
&lt;p&gt;Biometric data uniquely identifying natural person&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="9"&gt;
&lt;p&gt;Circumstances in which processing of personal data may take 					place&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;If there is explicit consent of data subject provided 					Member State laws do not prohibit such processing&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Necessary for carrying out specific rights of controller or 					data subject&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Under DPD these rights can be for employment.&lt;/p&gt;
&lt;p&gt;The GDPR adds social security and social protection to this 					list.&lt;/p&gt;
&lt;p&gt;These rights are to be authorized by Member state or Union. 					The GDPR adds "Collective agreements" to this.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;In the vital interest of data subject who cannot give 					consent due to physical or legal causes.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Same&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;In the vital interest of a Natural person physically or 					legally incapable of giving consent&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Same&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;For legitimate activities carried on by not-for 					profit-bodies for political, philosophical or trade union 					aims subject to certain conditions.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Same&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;When personal data is made public by data subject&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Same&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;For establishment, exercise of defense of legal claims or 					for courts&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Same&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;For substantial public interest in accordance with Member 					State or Union law&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Is necessary for:&lt;/p&gt;
&lt;p&gt;Preventive or occupational medicine&lt;/p&gt;
&lt;p&gt;Assessing working capacity of employee&lt;/p&gt;
&lt;p&gt;Medical diagnosis&lt;/p&gt;
&lt;p&gt;Healthcare or social care services&lt;/p&gt;
&lt;p&gt;Contract with health professional&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Is necessary in Public interest in the area of public 					health&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;For public interest, scientific or historical research or 					statistical purpose&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Data for preventive or occupational medicine, medical 					diagnosis etc. can be processed when:&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Data is processed by or under responsibility of a 					professional under obligation of professional secrecy as 					state in law&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Here the processing is done by health professional under 					obligation of professional secrecy&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a name="_26in1rg"&gt;&lt;/a&gt; 4.7 Principles relating to processing of personal data&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The principles set out in GDPR are similar to the ones under DPD. Some 	changes have been introduced. Accountability of the controller has been 	specifically given under GDPR.&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Sub-topics in this section&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;GDPR&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;DPD&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Given in Article&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;5&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;6&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p style="text-align: left; "&gt;Lawfulness, fairness, transparency&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Processing must be Lawful, fair and transparent&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Does not mention transparent&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="2"&gt;
&lt;p&gt;Purpose limitation&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Data must be specified, explicit and legitimate.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Same&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Processing for achieving public interest, scientific or 					historical research or statistical purpose is not to be 					considered incompatible with initial purpose.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Same&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Data minimization&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Processing is adequate, relevant and limited to what is 					necessary&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Same&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Accuracy&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Data is accurate, up to date, erased or rectified without 					delay&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Same&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="3"&gt;
&lt;p&gt;Storage limitation&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Data is to be stored in a way that data subject can be 					identified for no longer than is necessary for purpose of 					processing&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Same&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Data can be stored for longer periods when it is processed 					solely in public interest, scientific or historical 					research or statistical purpose&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Same&lt;/p&gt;
&lt;p&gt;However, public interest is not mentioned.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;There must be appropriate technical and organizational 					measures to safeguard rights and freedoms&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Same&lt;/p&gt;
&lt;p&gt;Additionally, it specifically states that Member States 					must lay down appropriate safeguards&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Integrity and confidentiality&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Manner of processing must:&lt;/p&gt;
&lt;p&gt;Ensure security of personal data,&lt;/p&gt;
&lt;p&gt;Protection against unlawful processing and accidental loss, 					destruction or damage&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Not mentioned&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Accountability&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Controller is responsible for and must demonstrate 					compliance with all of the above.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;DPD states it is for the controller to ensure compliance 					with this Article.&lt;/p&gt;
&lt;p&gt;Unlike GDPR, DPD doesn't specifically state the 					responsibility of controller for demonstrating compliance.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a name="_bezw6fia4pw1"&gt;&lt;/a&gt; 4.8 Lawfulness of processing&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The conditions for "lawfulness of processing" under DPD have been retained 	in the GDPR with certain modifications allowing flexibility for member 	states to introduce specific provisions in public interest or under a legal 	obligation. It should be noted that protection given to child's data and 	rights and freedoms of data subject should not be prejudiced. Additionally, 	a non-exhaustive list has been laid down in the GDPR for determining if 	processing is permissible in situations where the new purpose of processing 	is different from original purpose.&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Sub Topics in the Section&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;GDPR&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;DPD&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Given in Article&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;6&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;7&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Processing is lawful when :&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;If at least one of the principles applies:&lt;/p&gt;
&lt;p&gt;Data subject has given consent to processing for specific 					purpose(s).&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Same&lt;/p&gt;
&lt;p&gt;However it mentions "unambiguous" consent.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Processing is necessary for performance of contract to 					which data subject is party or at request of data subject 					before entering into a contract&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Same&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Processing is necessary for controller's compliance with 					legal obligation.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Same&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Is necessary for legitimate interests pursued by controller 					or by third party subject to exceptions (should not 					override rights and freedoms of data subject and 					protections given to child's data.)&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Same&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;It is necessary for performance of task carried out in 					public interest or for exercise of official authority 					vested in controller&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Same&lt;/p&gt;
&lt;p&gt;It additionally mentions third party:&lt;/p&gt;
&lt;p&gt;"…exercise of official authority vested in controller					&lt;i&gt;or in a third party to whom data are disclosed"&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;For protections of vital interest of data subject or 					another natural person&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Same&lt;/p&gt;
&lt;p&gt;Does not mention natural person.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Member States may introduce specific provisions when:&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;When processing is necessary for compliance with a legal 					obligation or to protect public interest&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Basis for processing for shall be laid down by: Union law 					or Member State law&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td colspan="3"&gt;
&lt;p&gt;&lt;b&gt; If processing is done for purpose other than for which 						data is collected and is without data subject's consent 						or is not collected under law: &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="6"&gt;
&lt;p&gt;To determine if processing for another purpose is 					compatible with the original purpose&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Controller shall take into account following factors:&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Link between purposes for which data was collected and the 					other purpose&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Context in which personal data have been collected&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Nature of personal data&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Possible consequences of other purpose&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Existence of appropriate safeguards&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a name="_2ke3ydyw8r1i"&gt;&lt;/a&gt; 4.9 Processing which does not require identification:&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;This article lays down the conditions under which the controller is 	exempted from gathering additional data in order to identify a data subject 	for the purpose of complying with this Regulation. If the controller is 	able to demonstrate that identification is not possible, the data subject 	is to be informed if possible.&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Sub Topics in the Section&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;GDPR&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;DPD&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Given in Article&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;11&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Conditions under which the controller is not obliged to 					maintain process or acquire additional information to 					identify data subject&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;If purpose for processing doesn't not require 					identification of data subject by the controller&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Consequence of not maintaining the data&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Art 15 to 20 shall not apply provided controller is able to 					demonstrate its inability to identify the data subject&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Exception to above consequence will apply when :&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Data subject provides additional information enabling 					identification&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a name="_35nkun2"&gt;&lt;/a&gt; 4.10 Rights of the data subject&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The General Data Protection Rules (GDPR) confers 8 rights upon the data 	subject.These rights are to be honored by the controller:-&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1. Right to be informed&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2. Right of access&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3. Right to rectification&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;4. Right to erasure&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;5. Right to restrict processing&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;6. Right to data portability&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;7. Right to object&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;8. Rights in relation to automated decision making and profiling&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_4ln2v6w83qoy"&gt;&lt;/a&gt; 4.10.1 Right to be informed&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The controller must provide information to the data subject in cases where 	personal data has not been obtained from the data subject. A number of 	exemptions have been listed. Additionally, GDPR lays down the time period 	within which the information has to be provided.&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Sub Topics in the Section&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;GDPR&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;DPD&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Given in Article&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;14&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;10&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="5"&gt;
&lt;p align="left"&gt;Type of information to be provided&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="left"&gt;Identity and contact details of the controller or 					controller's representative&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="left"&gt;Same&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Contact details of the data protection officer&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Purpose and legal basis for processing&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="left"&gt;Purpose of processing&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Recipients or categories of recipients of personal data&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="left"&gt;Same&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Intention to transfer data to third country or 					international organization and Information regarding 					adequacy decision or suitable safeguards or Binding 					Corporate Rules or derogations. This includes means to 					obtain a copy of these as well as information on place of 					availability.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="4"&gt;
&lt;p align="left"&gt;Additional information to be provided by controller to 					ensure fair and transparent processing&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="left"&gt;Storage period of personal data and criteria for 					determining the period&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Legitimate interests pursued by controller or third party&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Existence of data subject's rights with regard to access or 					rectification or erasure of personal data, automated 					decision making&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Where applicable, existence of right to withdraw consent&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="4"&gt;
&lt;p align="left"&gt;Time period within which information is to be provided&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="left"&gt;Information to be given within a reasonable period, latest 					within one month.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;To be provided latest at the time of first communication to 					data subject, if personal data are to be used for 					communication with data subject&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;In case of intended disclosure to another recipient , at 					the latest when personal data are first disclosed.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;If processing is intended for a new purpose other than 					original purpose, information to be provided prior to 					processing on new purpose.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="4"&gt;
&lt;p align="left"&gt;Situations in which exceptions are applicable&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="left"&gt;Data subject already has information&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="left"&gt;Same&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Provision of information involves disproportionate effort 					or is impossible or renders impossible or seriously impairs 					achievement of objective of processing.&lt;/p&gt;
&lt;p align="left"&gt;This is particularly with respect to processing for 					archiving purposes in public interest, scientific or 					historical research or statistical purpose.&lt;/p&gt;
&lt;p align="left"&gt;However controller must take measures to protect data 					subject's rights and freedom and legitimate interests 					including make information public.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="left"&gt;Provision involves impossible or disproportionate effort, 					in particular where processing is for historical or 					scientific research.&lt;/p&gt;
&lt;p align="left"&gt;However, appropriate safeguards must be provided by Member 					States.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Obtaining or disclosure is mandatory under Union or member 					law and it provides protection to data subject's legitimate 					interests&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="left"&gt;Where law expressly lays down recording or disclosure 					provided appropriate safeguards are provided by Member 					States.&lt;/p&gt;
&lt;p align="left"&gt;This is particularly applicable to processing for 					scientific or historical research.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Confidentiality of data mandated by professional secrecy 					under Union or Member State law&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_unesl7gv52zg"&gt;&lt;/a&gt; 4.10.2 Right to access&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Both Data Protection Directive (DPD) and General Data Protection Rules 	(GDPR) confer right to access information regarding personal data on the 	data subject.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CJEU in YS V. Minister voor Immigrate Integratie en Asiel stated that it is 	the data subject's right "to be aware of and verify the lawfulness of the 	processing".&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Sub-topics in the section&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;GDPR &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;DPD&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Given in Article&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;15&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;12&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="9"&gt;
&lt;p&gt;Data subject has the right to know about:&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Purpose of processing&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Same&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Categories of processing the data&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Same&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Recipients or categories to whom data are disclosed&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Same&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Retention period of the data and criteria for this&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Existence of right to request erasure, rectification or 					restriction of processing&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Right to lodge complaint with supervisory authority&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Knowledge about source of data&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;To know about any significant and envisaged consequences of 					processing for the data subject&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Existence of automated decision making and logic involved&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Same&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;In case of data transfer to third country&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Right to be informed about the safeguards&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Controller's obligation&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;To provide a copy of data undergoing processing. Reasonable 					fee based on administrative costs can be charged for this.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_d0woi8tt0i24"&gt;&lt;/a&gt; 4.10.3 Right to rectification&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;GDPR and DPD both give the data subject the right to rectify their personal 	data. Under the GDPR the data subject can complete the incomplete data by 	giving a supplementary statement.&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Sub-topics in the section&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;GDPR&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;DPD&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Given in Article&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;16&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;12(b)&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="2"&gt;
&lt;p&gt;Right can be exercised when:&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Processing does not comply with the Directive i.e. damage 					is caused due to unlawful processing (Recital 55)&lt;/p&gt;
&lt;p&gt;OR&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;When data is incomplete&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;When data is incomplete or inaccurate&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Obligations of controller&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;To enforce the right without undue delay&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="2"&gt;
&lt;p&gt;Obligation of controller to give notification when data is 					disclosed to third party&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Given under Art 19&lt;/p&gt;
&lt;p&gt;Request of erasure of personal data to be communicated to 					each recipient of such data&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Given under Article 12(c)&lt;/p&gt;
&lt;p&gt;Request must be communicated to third parties&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;It should not involve an impossible or disproportionate 					effort&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Same&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_2jxsxqh"&gt;&lt;/a&gt; 4.10.4 Right to erasure&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;This is also referred to as the "right to be forgotten". It empowers the 	individual to erase personal data under certain circumstances. The data 	subject can request the controller to remove the data for attaining this 	purpose.&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Sub-topics in the section&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;GDPR&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;DPD&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Given in Article&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;17&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;12(b)&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Obligation of the controller&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;To erase the data without undue delay&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="8"&gt;
&lt;p&gt;Conditions under which the right can be exercised&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;When processing does not comply with the Directive i.e. 					damage is caused due to unlawful processing (Recital 55)&lt;/p&gt;
&lt;p&gt;OR&lt;/p&gt;
&lt;p&gt;When data is incomplete or inaccurate&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Personal data is no longer necessary for the purpose for 					which it was collected or processed&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Data Subject withdraws consent for processing&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Data subject objects to processing and there are no 					overriding legitimate grounds for processing&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Data subject objects to processing for direct marketing 					purpose&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Personal data has been unlawfully processed&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;When personal data has to be erased under a legal 					obligation of Union or member State law&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;When personal data has been collected in offer of 					information society services to a child&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="5"&gt;
&lt;p&gt;Condition of processing under which request to erasure 					shall not be granted&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;For exercising right of freedom of expression and 					information&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Processing is done under Union or Member State law in 					public interest or exercise of official authority vested in 					controller&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Done for public interest in public health&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;For public interest, scientific or historical research or 					statistical purpose.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;For establishment, exercise or defense of legal claims.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Controller's obligations when personal data has been made 					public&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Controller to take reasonable steps to inform controllers 					who are processing the data, of the request of erasure.&lt;/p&gt;
&lt;p&gt;All links, copy or replication of personal data to be 					erased.&lt;/p&gt;
&lt;p&gt;Technology available and cost of implementation to be taken 					into account.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="2"&gt;
&lt;p&gt;Notification when data is disclosed to third party&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Given under obligation of controller under Art 19:&lt;/p&gt;
&lt;p&gt;Request of erasure of personal data to be communicated to 					each recipient of such data&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Given under obligation of controller under 12(c) :&lt;/p&gt;
&lt;p&gt;Request must be communicated to third parties&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;It should not involve an impossible or disproportionate 					effort&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Same&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_z337ya"&gt;&lt;/a&gt; 4.10.5 Right to restrict processing&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;While DPD provided for "blocking", the GDPR strengthened this right by 	specifically conferring the " Right to Restrict Processing" upon the data 	subject. This Article gives data subject the right to restrict processing 	under certain conditions. Recital 67 explains that these methods could 	include steps like removing published data from website or temporarily 	moving the data to another processing system.&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Sub-topics in the section&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;GDPR&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;DPD&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Given in Article&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;18&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;12(b)&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;About this right&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Data subject can restrict processing of data&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Data subject is allowed to erase, rectify or block 					processing of personal data.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="4"&gt;
&lt;p&gt;Conditions under which the right can be exercised&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;When accuracy of personal data is contested&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Besides accuracy, the DPD also mentions "incomplete nature 					of data" as grounds for exercising this right.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;When processing is unlawful and data subject opposes 					erasure and requests restriction of data use&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;When data is no longer needed by controller but is required 					by data subject for establishment, exercise or defense of 					legal claims.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Data subject objects to processing and the verification by 					controller of compelling legitimate grounds for processing 					is ongoing&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="5"&gt;
&lt;p&gt;Consequences of this enforcement of this right&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Controller can store data but not process it&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Processing can be done only with the data subject's 					consent; or&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Processing can be done for establishment exercise or 					defense of legal claims; or&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Processing can be done for protecting rights of another 					natural or legal person ;or&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;It can be done in public interest of Union or Member State.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Obligations of controller under Art 18&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;The controller must inform the data subject before the 					restrictions are lifted.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="3"&gt;
&lt;p&gt;Obligations of controller under Art 19&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Inform each recipient of personal data about the 					restriction.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;This obligation need not be performed if it is impossible 					to do so or it involved disproportionate effort.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Inform data subject about the recipients when requested by 					the data subject.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_spxapzomj6tn"&gt;&lt;/a&gt; 4.10.6 Right to data portability&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;This right empowers the data subject to receive personal data from one 	controller and transfer it to another. This gives the data subject more 	control over his or her own data. The controller cannot hinder this right 	when the following conditions are met.&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Sub-topics in the section&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;GDPR&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;DPD&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Given in article&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;20&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="3"&gt;
&lt;p&gt;Conditions for data transmission&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;The data must have been provided to the controller by data 					subject himself; and&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Processing is based on:&lt;/p&gt;
&lt;p&gt;Consent; or&lt;/p&gt;
&lt;p&gt;For performance of contract; and is carried out by 					automated means&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Data transfer must be technically feasible&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Format of personal data&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;It should be in a:&lt;/p&gt;
&lt;p&gt;Structured&lt;/p&gt;
&lt;p&gt;Commonly-used&lt;/p&gt;
&lt;p&gt;Machine readable format&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Time and cost for data transfer&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Given in Art 12(3)&lt;/p&gt;
&lt;p&gt;Should be free of charge&lt;/p&gt;
&lt;p&gt;Information to be provided within one month. Further 					extension by two months permissible under certain 					circumstances.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="4"&gt;
&lt;p&gt;Circumstance under which this Right cannot be exercised&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;When the exercise of the Right prejudices rights and 					freedom of another individual&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;When processing is necessarily carried out in public 					interest&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;When processing is necessarily done in exercise of official 					authority vested in controller&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;When this Right adversely affects the "Right to be 					forgotten"&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_ksj4krgmokmt"&gt;&lt;/a&gt; 4.10.7 Right to Object&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Both DPD and GDPR confer upon the data subject the right to object to 	processing on a number of grounds. The GDPR strengthens this right . Under 	GDPR, there is a visible shift from the data subject to the controller as 	far as the burden of showing " compelling legitimate grounds" is concerned. 	Under the DPD, when processing is undertaken in public interest or in 	exercise of official authority or in legitimate interests of third party or 	controller, the data subject not only has to show existence of compelling 	legitimate grounds but also that objection is justified. On the other hand, 	GDPR spares the data subject from this exercise and instead places the onus 	on the controller of demonstrating that "compelling legitimate grounds" 	exist such that these grounds override the interests, rights and freedom of 	the data subject.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;GDPR also provides a new ground for objecting to processing. The data 	subject can object to processing when it is for scientific or historical 	research or statistical purpose unless such processing is necessary in 	public interest.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Under the GDPR the data subject must be informed of this right "clearly and 	separately" and "at the time of first communication with data subject" when 	processing is done in public interest/exercise of official 	authority/legitimate interest of third party or controller or for direct 	marketing purpose. This right can be exercised by automated means in case 	of information society service.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The DPD also provides that the data subject must be informed of this right 	if the controller anticipates processing for direct marketing or disclosure 	of data to third party. It specifically states that this right is to be 	offered "free of charge". Additionally, it places responsibility upon the 	Member States to ensure that data subjects are aware of this right.&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center"&gt;Sub-topics in the section&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;&lt;b&gt;GDPR&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;&lt;b&gt;DPD&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Given in Article&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="left"&gt;21&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="left"&gt;14&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="4"&gt;
&lt;p align="left"&gt;Conditions under which the right can be exercised during 					processing&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="left"&gt;When performance of task is carried out in public interest 					or in exercise of official authority vested in controller. 					(Art 6(1)(e))&lt;/p&gt;
&lt;p align="left"&gt;Exception:&lt;/p&gt;
&lt;p&gt;If controller demonstrates processing is for compelling 					legitimate grounds which override interests of data subject&lt;/p&gt;
&lt;p align="left"&gt;For establishment, exercise or defense of legal claims.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="left"&gt;Grounds are same but the data subject also has to show 					existence of compelling legitimate grounds. Processing will 					cease if objection is justified.&lt;/p&gt;
&lt;p align="left"&gt;Exceptions:&lt;/p&gt;
&lt;p align="left"&gt;Unless provided by national legislation the data subject 					can object on this ground.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;For legitimate interests of controller or third party (Art 					6(1)(f))&lt;/p&gt;
&lt;p align="left"&gt;Exception:&lt;/p&gt;
&lt;p&gt;1. If controller demonstrates processing is for compelling 					legitimate grounds that override interests of data subject.&lt;/p&gt;
&lt;p&gt;2. For establishment, exercise or defense of legal claims.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Same as above&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;When data is processed for scientific/historical research/ 					statistical purpose under Art 89(1)&lt;/p&gt;
&lt;p align="left"&gt;Exception:&lt;/p&gt;
&lt;p align="left"&gt;If processing is necessary for public interest&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;When personal data is used for marketing purpose.&lt;/p&gt;
&lt;p align="left"&gt;Can object at anytime.&lt;/p&gt;
&lt;p align="left"&gt;No exceptions&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Same&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_1y810tw"&gt;&lt;/a&gt; 4.10.8 Rights in relation to automated individual decision making including 	profiling&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;This Article empowers the data subject to challenge automated decisions 	under certain conditions. This is to protect individuals from decisions 	taken without human intervention.&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Sub-topics in the section&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;GDPR &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;DPD&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Given in Article&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;22&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;15&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;This right can be exercised when decisions are based:&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="2"&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Only on automated processing&lt;/p&gt;
&lt;p&gt;Including profiling; and&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Same&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Produce legal effects or have similarly significant effects 					on data subject&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Same&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Conditions under which this right will not be guaranteed&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="3"&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;For entering into or performance of contract;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Same&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;If Member State or Union law authorizes the decision 					provided it lays down suitable measures for safeguarding 					data subject's rights, freedoms and legitimate interests; 					Or&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Same&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;When decision is based on data subject's explicit consent.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="2"&gt;
&lt;p&gt;Controller's obligation&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Enforce measures to safeguard rights and freedom and 					interests&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Ensure data subject can obtain human intervention, express 					his point of view, challenge decisions&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="2"&gt;
&lt;p&gt;Automated decision making will not apply when:&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;"Special categories of personal data" are to be processed&lt;/p&gt;
&lt;p&gt;However, if the data subject gives his explicit consent or 					such processing serves substantial public interest then the 					restriction can be waived.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Concerns a child&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a name="_4i7ojhp"&gt;&lt;/a&gt; 4.11 Security and Accountability&lt;/h2&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_2xcytpi"&gt;&lt;/a&gt; 4.11.1 Data protection by design and default&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;This is another new concept under GDPR. It is a general obligation on the 	controller to incorporate effective data protection in internal policies 	and implementation measures. Measures include: minimization of processing, 	pseudonymisation, transparency while processing, allowing data subjects to 	monitor data processing etc. The implementation of organizational and 	technical measures is essential to demonstrate compliance with Regulation.&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Sub-topics in the section&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;GDPR&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;DPD&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Article&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;25&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="2"&gt;
&lt;p&gt;Responsibility of controller when determining means of 					processing and at the time of processing&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Implementation of appropriate technical and organizational 					measures for data protection&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Ensure that by default only personal data necessary for 					purpose of processing is processed&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Means of demonstrating compliance with this Article&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Approved certification mechanism may be used.&lt;/p&gt;
&lt;p&gt;Data minimization&lt;/p&gt;
&lt;p&gt;Transparency etc.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_1ci93xb"&gt;&lt;/a&gt; 4.11.2 Security of personal data&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Security of processing is mentioned in the GDPR under Article 32. The 	controller and processor must implement technical and organizational 	measures to ensure data security. These may include pseudonymisation, 	encryption, ensuring confidentiality, restoring availability and access to 	personal data, regularly testing etc. Compliance with the code may be 	demonstrated by adherence to Code of conduct and certification mechanism. 	Further, all processing which is done by a natural person acting under 	authority of controller or processor can be done only under instructions 	from the controller.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_tws6vuoa8tch"&gt;&lt;/a&gt; 4.11.3 Notification of personal data breach&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;This Article provides the procedure for communicating the personal data 	breach to supervisory authority. If the breach is not likely to result in 	risk to rights and freedoms of natural persons, then the controller is not 	required to notify the supervisory authority.&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Sub-topics in the section&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;GDPR&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;DPD&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Given in Article&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;33&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Responsibility of controller&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Report personal data breach to supervisory authority after 					being aware of it&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Time limit for reporting data breach&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Must be reported no later than 72 hours&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;In case of delay in reporting&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Reasons to be stated&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Responsibility of processor&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Notify the controller after being aware of breach&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="4"&gt;
&lt;p&gt;Description of notification&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Describe nature of personal data&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Name contact details of data protection officer&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Likely consequences of personal data breach&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Measures to be taken or proposed to be taken by controller 					to address the breach or mitigate its possible effect&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;When information cannot be provided at same time&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Provide it in phases without further undue delay&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;For verification of compliance&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Controller has to document any personal data breach. It 					must contain Facts , effects and remedial action taken&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_2bn6wsx"&gt;&lt;/a&gt; 4.11.4 Communication of personal data breach to the data subject&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Not only is the supervisory authority to be notified, but data subjects are 	also to be informed about personal data breaches without undue delay under 	certain conditions.&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Sub-topics in the section&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;GDPR&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;DPD&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Given in Article&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;34&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Conditions under which controller is to communicate the 					breach to data subject&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;When breach is likely to cause high risk to rights and 					freedoms of natural persons&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Nature of communication&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Must be in a clear and plain language.&lt;/p&gt;
&lt;p&gt;Must describe the nature of breach.&lt;/p&gt;
&lt;p&gt;Must Contain at least:&lt;/p&gt;
&lt;p&gt;Name contact details of data protection officer&lt;/p&gt;
&lt;p&gt;Likely consequences of personal data breach&lt;/p&gt;
&lt;p&gt;Measures to be taken or proposed to be taken by controller 					to address the breach or mitigate its possible effect&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="3"&gt;
&lt;p&gt;Condition under which communication will not be required&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;If controller has implemented appropriate technical and 					organizational measures and these were applied to the 					affected data.&lt;/p&gt;
&lt;p&gt;E.g.: encryption&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Subsequent measures have been taken by controller to ensure 					there is no high risk&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;If communication involves disproportionate effort.&lt;/p&gt;
&lt;p&gt;Public communication or similar measures can be undertaken 					under such circumstances.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Role of supervisory authority&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;In case of likelihood of high risk, the authority may 					require the controller to communicate the breach if the 					controller has not already done so.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_qsh70q"&gt;&lt;/a&gt; 4.11.5 Data protection impact assessment&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;This is also known as Privacy Impact Assessment. While DPD provides general 	obligation to notify the processing to supervisory authorities, the GDPR, 	taking into account the need for more protection of personal data, has 	replaced the notification process by different set of mechanisms.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To serve the above purpose, the data protection impact assessment (DPIA) 	has been provided under this Article.&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Sub-topics in the section&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;GDPR&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;DPD&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Given in Article&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;35&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="4"&gt;
&lt;p&gt;When to carry out assessment&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;When new technology is used; and&lt;/p&gt;
&lt;p&gt;Processing is likely to result in high risk to rights and 					freedoms of natural persons&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Automated processing including profiling involving 					systematic and extensive evaluation of personal aspects of 					natural persons;&lt;/p&gt;
&lt;p&gt;and&lt;/p&gt;
&lt;p&gt;When decisions based on such processing produce legal 					effects&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Large scale processing of special categories of data or 					personal data relating to criminal convictions and offences&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Large scale systematic monitoring of publicly accessible 					area&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="4"&gt;
&lt;p&gt;Type of information contained in assessment&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Description of processing operations and purpose&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Assessment of necessity and proportionality of processing 					operations&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Assessment of risks to individuals&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Measures to address risks and demonstration of compliance 					with Regulation&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Sub-topics in the section&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;GDPR&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;DPD&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Topic&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Prior Consultation&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Given in Article&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;36&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;When should controller consult supervisory authority&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Prior to processing; and&lt;/p&gt;
&lt;p&gt;DPIA indicates high risk; and&lt;/p&gt;
&lt;p&gt;In absence of risk mitigation measures by controller&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Data protection officer&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;GDPR mandates that a person with expert knowledge of data protection law 	and practice is appointed for helping the controller or processor to comply 	with the data protections laws. A single data protection officer (DPO) may 	be appointed by a group of undertakings or where controller or processor is 	a public authority or body.The DPO must be accessible from each 	establishment.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;span&gt; &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Sub Topics in the Section&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;GDPR&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;DPD&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Article&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;37&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="3"&gt;
&lt;p&gt;Situations in which DPO must be appointed&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;When processing is carried out by public authority or body.&lt;/p&gt;
&lt;p&gt;Note: Courts acting in judicial capacity are excluded.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Core activity involves processing which requires regular 					and systematic monitoring of data subjects on large scale; 					or&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Core activity involves processing of large scale special 					categories of data and criminal convictions and offences&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h4 style="text-align: justify; "&gt;&lt;a name="_1pxezwc"&gt;&lt;/a&gt; Position of Data Protection Officer&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;The DPO must directly report to the highest management level of the 	controller or processor. Data subjects may contact the DPO in case of 	problems related to processing and exercise of rights.&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Sub Topics in the Section&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;GDPR&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;DPD&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Article&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;38&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="4"&gt;
&lt;p&gt;Responsibility of controller and processor&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Ensure DPO is involved properly and in timely manner&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Provide DPO with support, resources and access to personal 					data and processing operations&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Not dismiss or penalize DPO for performing his task.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Ensure independence of working and not give instruction to 					DPO&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h4 style="text-align: justify; "&gt;&lt;a name="_ewk2mxb1q2ei"&gt;&lt;/a&gt; Tasks of Data Protection officer&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;The DPO must be involved in all matters concerning data protection. He is 	expected to act independently and advice the controllers and processors to 	facilitate the establishment's compliance with Regulations.&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Sub Topics in the Section&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;GDPR&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;DPD&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Article&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;39&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="5"&gt;
&lt;p&gt;Tasks&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Inform and advise the controller or processor and employees 					over data protection laws&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Monitor compliance with data protection laws. Includes 					assigning responsibilities, awareness- raising, staff 					training and audits&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Advice and monitor performance&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Cooperate with supervisory authority&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Act as point of contact for supervisory authority for 					processing, prior consultation and consultation on other 					matter&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_2p2csry"&gt;&lt;/a&gt; 4.11.6 European Data Protection Board&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;For consistent application of the Regulation, the GDPR envisages a Board 	that would replace the Working Party on Protection of Individuals With 	Regard to Processing of Personal Data established under the DPD. This 	Regulation confers legal personality on the Board.&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Sub Topics in the Section&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;GDPR&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;DPD&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Article&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;68&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Represented by&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Chair&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Composition of the Board&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Head of one supervisory authority of each Member State and 					European Data Protection Supervisor or of their 					representatives.&lt;/p&gt;
&lt;p&gt;Joint representative can be appointed where Member State 					has more than one supervisory authority.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Role of Commission&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Right to participate in activities and meetings of the 					Board without voting rights.&lt;/p&gt;
&lt;p&gt;Commission to designate a representative for this.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="4"&gt;
&lt;p&gt;Functions of the Board&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Consistent application of Regulation&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Advise Commission of level of protection in third countries 					or international organizations&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Promote cooperation of supervisory authorities&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Board is to act independently&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_147n2zr"&gt;&lt;/a&gt; 4.11.7 Supervisory Authority&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;GDPR lays down detailed provisions on supervisory authorities, defining 	their functions, independence, appointment of members, establishment rules, 	competence, competence of lead supervisory authority, tasks, powers and 	activity reports. Such elaborate provisions are absent in DPD.&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Sub-topics in this section&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;GDPR&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;DPD&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Given in Article&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Chapter VI, Article 51 -59&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;28&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a name="_gdvxc914pgtx"&gt;&lt;/a&gt;&lt;/h2&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a name="_3o7alnk"&gt;&lt;/a&gt; 4.12 Processor&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The Article spells out the obligations of a processor and conditions under 	which other processors can be involved.&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Sub Topics in the Section&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;GDPR&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;DPD&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Article&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;28&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;What kind of processors can be used by controller&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;● Those which provide sufficient guarantees to 					implement appropriate technical and organizational measures&lt;/p&gt;
&lt;p&gt;● Those which comply with Regulation and Rights&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Obligations of processor in case of addition or replacement 					of processor&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;● Not engage another processor without controller's 					authorization&lt;/p&gt;
&lt;p&gt;● In case of general written authorization inform the 					controller&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Processing shall be governed by&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Contract or legal act under Union or Member State law.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Elements of Contract&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;● Is binding on processor&lt;/p&gt;
&lt;p&gt;● Sets out subject matter and duration of processing&lt;/p&gt;
&lt;p&gt;● Nature of processing&lt;/p&gt;
&lt;p&gt;● Type of personal data&lt;/p&gt;
&lt;p&gt;● Categories of data subjects&lt;/p&gt;
&lt;p&gt;● Obligations and Rights of the controller&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="8"&gt;
&lt;p&gt;Obligations of processor under contract or legal act&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Processor shall process under instructions from controller 					unless permitted under law itself.&lt;/p&gt;
&lt;p&gt;Controller is to be informed in the latter case.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Ensures that persons authorized to process have committed 					themselves to confidentiality&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Processor to undertake all data security measures 					(mentioned under Art 32)&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Enforces conditions on engaging another processor&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Assists the controller by appropriate technical and 					organizational measures&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Assists controller in compliance with Art 32 to 36&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Delete or return all personal data to controller at the 					choice of controller at the end of processing&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Make information available to controller for demonstrating 					compliance with obligations.&lt;/p&gt;
&lt;p&gt;Contribute to audits, inspections etc.&lt;/p&gt;
&lt;p&gt;Inform the controller if it believes that an instruction 					infringes the regulation or law.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Conditions under which a processor can engage another 					processor&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;● Same data protection obligations will be applicable 					to other processor.&lt;/p&gt;
&lt;p&gt;● If other processor fails to fulfill data protection 					obligations, initial processor shall remain fully liable to 					controller for such performance.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a name="_23ckvvd"&gt;&lt;/a&gt; 4.13 Records of processing activities&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The controller or processor must maintain records of processing activities 	to demonstrate compliance with the Regulation. They are obliged to 	cooperate with and make record available to the supervisory authority upon 	request. DPD does not contain similar obligations.&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Sub Topics in the Section&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;GDPR&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;DPD&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Article&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;30&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Obligation of controller or controller's representative&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Maintain a record of processing activities&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="7"&gt;
&lt;p&gt;Information to be contained in the record&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Name and contact details of:&lt;/p&gt;
&lt;p&gt;● Controller /joint controller / controller's 					representatives&lt;/p&gt;
&lt;p&gt;● Data protection officer&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Purpose of processing&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Categories of data subjects and categories of personal data&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Categories of recipients to whom data has been or will be 					disclosed&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Transfers of personal data to third party, identification 					of third party, documentation of suitable safeguards&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Expected time duration for erasure of different categories 					of data&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Technical and organizational security measures&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Obligation of processor&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Maintain a record of processing activities carried out on 					behalf of controller&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="4"&gt;
&lt;p&gt;Record maintained by processor shall contain information 					such as:&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Name and contact details of:&lt;/p&gt;
&lt;p&gt;● Processor /processor's representative&lt;/p&gt;
&lt;p&gt;● Controller /controller's representative&lt;/p&gt;
&lt;p&gt;● Data protection officer&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Categories of processing&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Data transfer to third party&lt;/p&gt;
&lt;p&gt;Identification of third party&lt;/p&gt;
&lt;p&gt;Documentation of safeguards&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Technical and organizational security measures&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Form in which record is to be maintained&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;In writing and electronic form&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Conditions under which exemption will apply&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;● Organizations employing fewer than 250 employees 					are exempted;&lt;/p&gt;
&lt;p&gt;● Processing should not cause risk to rights and 					freedoms of data subjects&lt;/p&gt;
&lt;p&gt;● Processing should not be occasional&lt;/p&gt;
&lt;p&gt;● Processing should not include special categories of 					data&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a name="_ihv636"&gt;&lt;/a&gt; 4.14 Code of Conduct&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;These mechanisms have been provided under GDPR to demonstrate compliance 	with the Regulation. This is important as the GDPR ( under Art 83 ) 	provides that adherence to code of conduct shall be one of the factors 	taken into account for calculating administrative fines. This is not an 	obligatory provision.&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Sub Topics in the Section&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;GDPR&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;DPD&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Article&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;40&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;27&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Who will encourage drawing up of code of conduct&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;● Member States&lt;/p&gt;
&lt;p&gt;● Supervisory Authorities&lt;/p&gt;
&lt;p&gt;● Commission.&lt;/p&gt;
&lt;p&gt;Specific needs of micro, small and medium enterprises to be 					taken into account.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;● Member States&lt;/p&gt;
&lt;p&gt;● Commissions&lt;/p&gt;
&lt;p&gt;Does not mention the rest&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Who may prepare amend or extend code of conduct&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Associations and other bodies representing categories of 					controller or processors&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="12"&gt;
&lt;p&gt;Information contained in the code&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Fair and transparent processing&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Legitimate interests of controller&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Collection of personal data&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Pseudonymisation&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Information to public and data subjects&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Exercise of rights of data subject&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Information provided to and protection of children and 					manner in which consent of holders of parental 					responsibility is obtained&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Measures under:&lt;/p&gt;
&lt;p&gt;● Data protection by design and default&lt;/p&gt;
&lt;p&gt;● Controller responsibilities&lt;/p&gt;
&lt;p&gt;● Security of processing&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Notification of data breach to authorities and 					communication of same to data subjects&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Data transfer to third party&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Dispute resolution procedures between controllers and data 					subjects&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Mechanisms for mandatory monitoring&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Mandatory monitoring&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Code of conduct containing the above information enables 					mandatory monitoring of compliance by body accredited by 					supervisory authority. (Art 41)&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a name="_32hioqz"&gt;&lt;/a&gt; 4.15 Certification&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Like the code of conduct, Certification is a voluntary mechanism that 	demonstrates compliance with the Regulation. Establishment of data 	protection certification mechanism and data protection seals and marks 	shall be encouraged by Member States, supervisory authorities, Boards and 	Commission. As in case of code of conduct, specific needs of micro, small 	and medium sized enterprise ought to be taken into account. DPD does not 	mention such mechanisms.&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Sub Topics in the Section&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;GDPR&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;DPD&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Article&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;42&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Who will issue the certificate&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Certification bodies or competent supervisory authority on 					basis of approved criteria.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Time period during which certification shall be issued&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Maximum period of three years.&lt;/p&gt;
&lt;p&gt;Can be renewed under same conditions.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Who accredits certification bodies&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Competent Supervisory bodies or National accreditation 					body.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;When can accreditation be revoked&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;When conditions of accreditation are not or no longer met.&lt;/p&gt;
&lt;p&gt;OR&lt;/p&gt;
&lt;p&gt;Where actions taken by certification body infringe this 					Regulation.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Who can revoke&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Competent supervisory authority or national accreditation 					body&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a name="_rmo0nrgdb8k6"&gt;&lt;/a&gt; 4.16 Data Transfer&lt;/h2&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_1hmsyys"&gt;&lt;/a&gt; 4.16.1 Transfers of personal data to third countries or international 	organizations&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Chapter V lays down the conditions with which the data controller must 	comply in order to transfer data for the purpose of processing outside of 	the EU to third countries or international organizations. The chapter also 	stipulates conditions that must be complied with for onward transfers from 	the third country or international organization.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_2grqrue"&gt;&lt;/a&gt; 4.16.2 Transfer on the basis of an adequacy decision&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Under GDPR, transfer of data can take place after the	&lt;i&gt;Commission decides&lt;/i&gt; whether the third country, territory, specified 	sector within that third country or international organization ensures 	adequate level of data protection. This is called adequacy decision. A list 	of countries or international organizations which ensure adequate data 	protection shall be published in the Official Journal of the European Union 	and on the website by the Commission. Once data transfer conditions are 	found to be compliant with the Regulation, no specific authorization would 	be required for data transfer from the supervisory authorities. The 	commission would decide this by means of an "Implementing Act" specifying a 	mechanism for periodic review, its territorial and sectoral application and 	identification of supervisory authorities. Decisions of Commission taken 	under Art 25(6) of DPD shall remain in force. DPD also provides parameters 	for the same.&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Sub-topics in this section&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;GDPR&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;DPD&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Given in article&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;45&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;25&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Conditions apply when transfers take place to&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Third country or international organization&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;International organization not mentioned.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="5"&gt;
&lt;p&gt;Functions of the commission&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Take adequacy decisions&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Same&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Review the decision periodically every four years&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Monitor developments on ongoing basis&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Repeal, amend or suspend decision&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Inform Member States if third country doesn't ensure 					adequate level of protection.&lt;/p&gt;
&lt;p&gt;Similarly, member state has to inform the Commission.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="3"&gt;
&lt;p&gt;Functions of Member State&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Inform Commission if third country doesn't ensure adequate 					level of protection.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Take measures to comply with Commission's decisions&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Prevent data transfer if Commission finds absence of 					adequate level of protection.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="3"&gt;
&lt;p&gt;Factors, with respect to third country or international 					organization, to be considered while deciding adequacy of 					safeguards&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Rule of law,&lt;/p&gt;
&lt;p&gt;human rights, fundamental freedoms, access of public 					authorities to personal data,&lt;/p&gt;
&lt;p&gt;data protection rules, rules for onward transfer of 					personal data to third country or international 					organization etc.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Circumstances surrounding data transfer operations: nature 					of data; purpose and duration of processing operation; rule 					of law, professional rules and security measures in third 					country; country of origin and final destination; 					professional rules and security measures;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Functioning of independent supervisory authorities, their 					powers of enforcing compliance with data protection rules 					and powers to assist and advise data subject to exercise 					their rights.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;International commitments entered into.&lt;/p&gt;
&lt;p&gt;Obligations under legally binding conventions.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Same&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="2"&gt;
&lt;p&gt;When adequate level of protection no longer ensues&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;The Commission, to the extent necessary: repeal, amend or 					suspend the decision.&lt;/p&gt;
&lt;p&gt;This is to be done by the means of an implementing act.&lt;/p&gt;
&lt;p&gt;No retroactive effect to take place&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;The member state will have to suspend data transfer if 					Commission finds absence of adequate level of protection.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Commission to enter into consultation with the third 					country or international organization to remedy the 					situation&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Same&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_vx1227"&gt;&lt;/a&gt; 4.16.3 Transfers subject to appropriate safeguards&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;This article provides for a situation when the Commission takes no decision. (Mentioned above under	&lt;b&gt;Transfer on the basis of an adequacy decision&lt;/b&gt;). In this 	case, the controller or processor can transfer data to third country or 	international organization subject to certain conditions. Specific 	authorization from supervisory authorities is not required in this context. 	Procedure for the same has been mentioned.&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Sub-topics in this section&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;GDPR&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;DPD&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Given in article&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;46&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;When can data transfer take place&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;When &lt;i&gt;appropriate safeguards&lt;/i&gt; are provided by the 					controller or processor;&lt;/p&gt;
&lt;p&gt;AND&lt;/p&gt;
&lt;p&gt;On condition that data subject enjoys enforceable rights 					and effective legal remedies for data safety.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="5"&gt;
&lt;p&gt;Conditions to be fulfilled for providing					&lt;i&gt;appropriate safeguards&lt;/i&gt; without specific 					authorization from supervisory authority&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Existence of legally binding and enforceable instrument 					between public bodies or authorities&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Existence of Binding Corporate Rules&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Adoption of Standard Protection Clauses adopted by the 					Commission&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Adoption of Standard data protection clauses by supervisory 					authorities and approved by Commission.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Approved code of conduct along with binding and enforceable 					commitments of controller or processor in third country to 					apply appropriate safeguards and data subject's rights&lt;/p&gt;
&lt;p&gt;OR&lt;/p&gt;
&lt;p&gt;Approved certification mechanism along with binding and 					enforceable commitments of controller or processor in third 					country to apply appropriate safeguards and data subject's 					rights.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="3"&gt;
&lt;p&gt;Conditions to be fulfilled for providing appropriate 					safeguards subject to authorization from competent 					authority&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Existence of contractual clauses between:&lt;/p&gt;
&lt;p&gt;Controller or Processor and&lt;/p&gt;
&lt;p&gt;Controller, Processor or recipient of personal data (third 					party)&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Provisions inserted in administrative arrangements between 					public authorities or bodies. Provisions to contain 					enforceable and effective data subject rights.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Consistency mechanism to be applied by supervisory 					authority&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Unless amended, replaced or repealed, authorization to 					transfer given under DPD will remain valid when:&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Third country doesn't ensure adequate level of protection 					but controller adduces adequate safeguards;&lt;/p&gt;
&lt;p&gt;or&lt;/p&gt;
&lt;p&gt;Commission decides that standard contractual clauses offer 					sufficient safeguards&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_3fwokq0"&gt;&lt;/a&gt; 4.16.4 Binding Corporate Rules&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;These are agreements that govern transfers between organizations within a 	corporate group&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Sub-topics in this section&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;GDPR&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;DPD&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Given in Article&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;47&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="3"&gt;
&lt;p&gt;Elements of Binding Corporate Rules&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Legally binding&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Apply to and are enforced by every member of group of 					undertakings or group of enterprises engaged in joint 					economic activity. Includes employees&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Expressly confer enforceable rights on data subject over 					processing of personal data&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="12"&gt;
&lt;p&gt;What do they specify&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Structure and contact details of group of undertakings&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Data transfers or set of transfers including categories of 					personal data , type of processing, type of data subjects 					affected, identification of third countries&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Legally binding nature&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Application of general data protection principles&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Rights of data subjects&lt;/p&gt;
&lt;p&gt;Means to exercise those right&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;How the information on BCR is provided to data subjects&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Tasks of data protection officer etc.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Complaint procedure&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Mechanisms within the group of undertakings, group of 					enterprises for ensuring verification of compliance with 					BCR.&lt;/p&gt;
&lt;p&gt;Eg. Data protection audits&lt;/p&gt;
&lt;p&gt;Results of verification to be available to person in charge 					of monitoring compliance with BCR and to board of 					undertaking or Group of enterprises.&lt;/p&gt;
&lt;p&gt;Should be available upon request to competent supervisory 					authority&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Mechanism for reporting and recording changes to rules and 					reporting changes to supervisory authority&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Cooperation mechanism with supervisory authority&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Data protection training to personnel having access to 					personal data&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Role of Commission&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;May specify format and procedures for exchange of 					information between controllers, processors and supervisory 					authorities for BCR&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_ior7p9ed8ake"&gt;&lt;/a&gt; 4.16.5 Transfers or disclosures not authorized by Union law&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;This Article lays down enforceability of decisions given by judicial and 	administrative authorities in third countries with regard to transfer or 	disclosure of personal data.&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Sub-topics in this section&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;GDPR&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;DPD&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Given in Article&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;48&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Article concerns&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Transfer of personal data under judgments of courts, 					tribunals, decision of administrative authorities in third 					countries.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;When can data be transferred or disclosed&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;International agreement between requesting third country 					and member state or union.&lt;/p&gt;
&lt;p&gt;E.g.: mutual legal assistance treaty&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_4f1mdlm"&gt;&lt;/a&gt; 4.16.6 Derogations for specific situations&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;This Article comes into play in the absence of adequacy decision or 	appropriate safeguards or of binding corporate rules. Conditions for data 	transfer to a third country or international organization under such 	situations have been laid down.&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Sub-topics in this section&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;GDPR&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;DPD&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Given in Article&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;49&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;26&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="6"&gt;
&lt;p&gt;Conditions under which data transfer can take place&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;On obtaining Explicit consent of data subject after being 					informed of possible risks&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;On obtaining unambiguous consent of data subject to the 					proposed transfer&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Transfer is necessary for conclusion or performance of 					contract.&lt;/p&gt;
&lt;p&gt;The contract should be in the interest of data subject.&lt;/p&gt;
&lt;p&gt;The contract is between the controller and another natural 					or legal person.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Contractual conditions are same.&lt;/p&gt;
&lt;p&gt;DPD also includes implementation of pre contractual 					measures taken upon data subject's request.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Transfer is necessary in public interest&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Same&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Is necessary for establishment, exercise or defense of 					legal claims&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Same&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;To protect vital interest of data subject or of other 					persons where data subject is physically or legally 					incapable of giving consent&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Includes vital interest of data subject but doesn't include 					"other person". Condition for consent is also not included.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Transfer made from register under Union or Member State law 					to provide information to public and is open to 					consultation by public or person demonstrating legitimate 					interest.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Same&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="8"&gt;
&lt;p&gt;Conditions for transfer when even the above specific 					situations are not applicable&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Transfer is not repetitive&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Concerns limited number of data subjects&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Necessary for compelling legitimate interests pursued by 					controller&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Legitimate interests are not overridden by interests or 					rights and freedoms of data subject&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Controller has provided suitable safeguards after assessing 					all circumstances surrounding data transfer&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Controller to inform supervisory authority about the 					transfer&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Controller to inform data subject of transfer and 					compelling legitimate interests pursued&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Member may authorize transfer personal data to third 					country where controller adduces adequate safeguards for 					protection of privacy and fundamental rights and freedoms 					of individuals&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a name="_2u6wntf"&gt;&lt;/a&gt; 4.17 International cooperation for protection of personal data&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;This Article lays down certain steps to be taken by Commissions and 	supervisory authorities for protection of personal data.&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Sub-topics in this section&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;GDPR&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;DPD&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Given in Article&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;50&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="4"&gt;
&lt;p&gt;Steps will include&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Development of international cooperation mechanisms to 					facilitate enforcement of legislation for protection of 					personal data&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Provide international mutual assistance in enforcement of 					legislation for protection of personal data&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Engage relevant stakeholders for furthering international 					cooperation&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Promote exchange and documentation of personal data 					protection legislation and practice&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a name="_pn5fviodvkzf"&gt;&lt;/a&gt; 4.18 Remedies, Liability and Compensation&lt;/h2&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_3tbugp1"&gt;&lt;/a&gt; 4.18.1 Right to lodge complaint with a supervisory authority&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;This article gives the data subject the right to seek remedy against 	unlawful processing of data. GDPR strengthens this right as compared to the 	one provided under DPD.&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Sub-topics in this section&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;GDPR&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;DPD&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Given in Article&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;77&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;28(4)&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Right given&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Right to lodge complaint&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Under GDPR the data subject has been conferred the "right" 					specifically. This is not so in DPD.&lt;/p&gt;
&lt;p&gt;DPD merely obliges the supervisory authority to hear claims 					concerning rights and freedoms.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Who can lodge complaint&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Data subject&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Any person or association representing that person&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Complaint to be lodged before&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Supervisory authority in the Member State of habitual 					residence, place of work or place of infringement&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Supervisory authority&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;When can the complaint be lodged&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;When processing of personal data relating to data subject 					allegedly infringes on Regulation&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;When rights and freedom are to be protected while 					processing.&lt;/p&gt;
&lt;p&gt;When national legislative measures to restrict scope of 					Regulations is adopted and processing is alleged to be 					unlawful.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Accountability&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Complainant to be informed by Supervisory authority on 					progress and outcome of complaint and judicial remedy to be 					taken up&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Complainant to be informed on outcome of claim or if check 					on unlawfulness has taken place&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_28h4qwu"&gt;&lt;/a&gt; 4.18.2 Right to an effective judicial remedy against supervisory authority&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The concerned Article seeks to make supervisory authorities accountable by 	bringing proceedings against the authority before the courts. GDPR gives a 	specific right to the individual. DPD under Article 28(3) merely provides 	for appeal against decisions of supervisory authority in the courts.&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Sub-topics in this section&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;GDPR&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;DPD&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Given in Article&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;78 (1)&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Who has the right&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Every natural or legal person&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;When can the right be exercised&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Against legally binding decision of supervisory authorities 					concerning the complainant&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Sub-topics in this section&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;GDPR&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;DPD&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Given in Article&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;78(2)&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Who has the right&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Data subject&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;When can the right be exercised&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;When the competent supervisory authority doesn't handle the 					complaint&lt;/p&gt;
&lt;p&gt;Or&lt;/p&gt;
&lt;p&gt;Doesn't inform data subject about progress / outcome of 					complaint within 3 months&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;The jurisdiction of court will extend to the territory of the Member State 	in which the supervisory authority is established (GDPR Art 78(3)). The 	supervisory authority is required to forward proceedings to the court if 	the decision was preceded by the Board's decision in the consistency 	mechanism. (GDPR 78(4))&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_nmf14n"&gt;&lt;/a&gt; 4.18.3 Right to effective judicial remedy against a controller or processor&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The data subject has been conferred with the right to approach the courts 	under certain circumstance. The GDPR confers the specific right while DPD 	provides for judicial remedy without using the word "right".&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Sub-topics in this section&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;GDPR&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;DPD&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Given in&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Art 79&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Recital 55&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Right can be exercised when:&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;1. Data has been processed; and&lt;/p&gt;
&lt;p&gt;2. Processing Results in infringement of rights; and&lt;/p&gt;
&lt;p&gt;3. Infringement is due to non compliance of Regulation&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Similar provisions provided under DPD:&lt;/p&gt;
&lt;p&gt;When controller fails to respect the rights of data 					subjects and national legislation provides a judicial 					remedy.&lt;/p&gt;
&lt;p&gt;Processors are not mentioned.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Jurisdiction of the courts&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Proceedings can be brought before the courts of Member 					States wherein:&lt;/p&gt;
&lt;p&gt;1. Controller or processor has an establishment&lt;/p&gt;
&lt;p&gt;Or&lt;/p&gt;
&lt;p&gt;2. Data Subject has habitual residence&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Right cannot be exercised when&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;1. The controller or processor is a public authority of 					Member State&lt;/p&gt;
&lt;p&gt;And&lt;/p&gt;
&lt;p&gt;2. Is exercising its public powers&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_37m2jsg"&gt;&lt;/a&gt; 4.18.4 Right to compensation and liability&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;GDPR enables a person who has suffered damages to claim compensation as a 	specific right. DPD merely entitles the person to receive compensation. 	Although Liability provisions under GDPR and DPD are similar, the liability 	under GDPR is stricter as compared to DPD. This is because DPD exempts the 	processor from liability but GDPR does not. For example, DPD imposes 	liability on controllers only.&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Sub-topics in this section&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;GDPR&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;DPD&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Given in Article&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;82&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;23&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Who can claim compensation&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Any person who has&lt;/p&gt;
&lt;p&gt;suffered material or non material damage&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Similar provisions.&lt;/p&gt;
&lt;p&gt;But DPD doesn't mention "material or non-material damage" 					specifically.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Right arises due to&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Infringement of Regulation&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Same&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Right granted&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Right to receive compensation&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Same&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Compensation has to be given by&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Controller or processor&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Compensation can be claimed only from controller&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Liability of controller arises when&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Damage is caused by processing due to infringement of 					regulation&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Same&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Liability of processor arises when&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;1. Processor has not complied with directions given to it 					under Regulation&lt;/p&gt;
&lt;p&gt;OR&lt;/p&gt;
&lt;p&gt;2. Processor has acted outside or contrary to lawful 					instructions of controller&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Exemptions to controller or processor from liability&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;If there is proof that they are not responsible&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Exemption for controller is same&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Liability when more than one controller or processor cause 					damage&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Each controller or processor to be held liable for entire 					damage&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a name="_1mrcu09"&gt;&lt;/a&gt; 4.19 General conditions for imposing administrative fines&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;GDPR makes provision for imposition of &lt;i&gt;administrative fines &lt;/i&gt;by 	supervisory authorities in case of infringement of Regulation. Such fines 	should be effective, proportionate and dissuasive. In case of minor infringement, "reprimand may be issued instead of a fine"	&lt;a href="#_ftn1" name="_ftnref1"&gt;&lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;. 	Means of enforcing accountability of supervisory authority have been 	provided. If Member state law does not provide for administrative fines, 	then the fine can be initiated by the supervisory authority and imposed by 	courts. However, by 25 May 2018, Member States have to adopt laws that 	comply with this Article.&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Sub-topics in this section&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;GDPR&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;DPD&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Given in Article&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;83&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Who can impose fines&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Supervisory Authority&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Fines to be issued against&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Controllers or Processors&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="11"&gt;
&lt;p&gt;Parameters to be taken into account while determining 					administrative fines&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Nature, gravity and duration of infringement&lt;/p&gt;
&lt;p&gt;and&lt;/p&gt;
&lt;p&gt;Nature scope or purpose of processing&lt;/p&gt;
&lt;p&gt;and&lt;/p&gt;
&lt;p&gt;Number of data subjects affected&lt;/p&gt;
&lt;p&gt;and&lt;/p&gt;
&lt;p&gt;Level of damage suffered&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Intentional or negligent character of infringement&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Action taken by controller or processor to mitigate damage 					suffered by data subjects&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Degree of responsibility of con controller or processor. 					Technical and organizational measures implemented to be 					taken into account.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Relevant previous infringement&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Degree of cooperation with supervisory authority&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Categories of personal data affected&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Manner in which supervisory authorities came to know of the 					infringement and&lt;/p&gt;
&lt;p&gt;Extent to which the controller or processor notified the 					infringement&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether corrective orders of supervisory authority under 					Art 58(2) have been issue before and complied with&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Adherence to approved code of conduct under Art 40 or 					approved certification mechanisms under Art 42&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Other aggravating or mitigating factors like financial 					benefits gained losses avoided etc.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;If infringement is intentional or due to negligence of 					processor or controller&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Total amount of administrative fine to not exceed amount 					specified for gravest infringement&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Means checking power of supervisory authority to impose 					fines&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Procedural safeguards under Member State or Union law.&lt;/p&gt;
&lt;p&gt;Including judicial remedy and due process&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Article 83 splits the amount of administrative fines according to 	obligations infringed by controllers, processors or undertakings. The first 	set of infringements may lead to imposition of fines up to 10,000,000 EUR 	or 2% of total worldwide turnover.&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Sub-topics in this section&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;GDPR&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;DPD&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Article&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;83(4)&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Fine imposed&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Up to 10,000,000 EUR&lt;/p&gt;
&lt;p&gt;or&lt;/p&gt;
&lt;p&gt;in case of undertaking,&lt;/p&gt;
&lt;p&gt;2% of total worldwide turnover of preceding financial year, 					whichever is higher&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="8"&gt;
&lt;p&gt;Infringement of these provisions will cause imposition of 					fine (Provisions infringed)&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Obligations of controller and processor under:&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Art 8&lt;/p&gt;
&lt;p&gt;Conditions applicable to child's consent in relation to 					information society services&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Art 11&lt;/p&gt;
&lt;p&gt;Processing which does not require identification&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Art 25 to 39&lt;/p&gt;
&lt;p&gt;General obligations , Security of personal data , Data 					Protection impact assessment and prior consultation&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Art 42&lt;/p&gt;
&lt;p&gt;Certification&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Art 43&lt;/p&gt;
&lt;p&gt;Certification bodies&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Obligations of certification body under:&lt;/p&gt;
&lt;p&gt;Art 42&lt;/p&gt;
&lt;p&gt;Art 43&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Obligations of monitoring body under:&lt;/p&gt;
&lt;p&gt;Art 41(4)&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Second set of infringements may cause the authority to impose higher fines 	up to 20,000,000 EUR or 4% of total worldwide turnover.&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Sub-topics in this section&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;GDPR&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;DPD&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Article&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;83(5)&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Fine imposed&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Up to 20,000,000 EUR&lt;/p&gt;
&lt;p&gt;or&lt;/p&gt;
&lt;p&gt;in case of undertaking,&lt;/p&gt;
&lt;p&gt;4% of total worldwide turnover of preceding financial year, 					whichever is higher&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="12"&gt;
&lt;p&gt;Infringement of provisions that will cause imposition of 					fine (Provisions infringed)&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Basic principles for processing and conditions for consent 					under:&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Art 5&lt;/p&gt;
&lt;p&gt;Principles relating to processing of personal data&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Art 6&lt;/p&gt;
&lt;p&gt;Lawfulness of processing&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Art 7&lt;/p&gt;
&lt;p&gt;Conditions for consent&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Art 9&lt;/p&gt;
&lt;p&gt;Processing of special categories of personal data&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Data subject's rights under:&lt;/p&gt;
&lt;p&gt;Art 12 to 22&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Transfer of personal data to third country or international 					organization under:&lt;/p&gt;
&lt;p&gt;Art 44 to 49&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Obligations under Member State law adopted under Chapter IX&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Non Compliance with supervisory authority's powers under 					provisions of Art 58:&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Imposition of temporary or definitive limitation including 					ban on processing&lt;/p&gt;
&lt;p&gt;(Art 58 (2)(f))&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Suspension of data flows to third countries or 					international organization&lt;/p&gt;
&lt;p&gt;(Art 58(2) (j))&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Provide access to premises or data processing equipment and 					means (Art 58 (1) (f))&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a name="_46r0co2"&gt;&lt;/a&gt; 4.20 Penalties&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Article 84 makes provision for penalties in case of infringement of 	Regulation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The penalties must be effective, proportionate and dissuasive.&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Sub-topics in this section&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;GDPR&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;DPD&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Given in Article&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;84&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;When will penalty be imposed&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;In case of infringements that are not subject to 					administrative fines&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Who imposes them&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Member State&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Responsibility of Member State&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;To lay down the law and ensure implementation.&lt;/p&gt;
&lt;p&gt;To notify to the Commission, the law adopted, by 25 May 					2018&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;div style="text-align: justify; "&gt;&lt;br clear="all" /&gt; 
&lt;hr /&gt;
&lt;div id="ftn1"&gt;
&lt;p&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt; &lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt; &lt;/a&gt; Recital 148 , GDPR&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/comparison-of-general-data-protection-regulation-and-data-protection-directive'&gt;https://cis-india.org/internet-governance/blog/comparison-of-general-data-protection-regulation-and-data-protection-directive&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Aditi Chaturvedi and Edited by Leilah Elmokadem</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-02-07T14:08:35Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/comments-to-the-personal-data-protection-bill-2019">
    <title> Comments to the Personal Data Protection Bill 2019</title>
    <link>https://cis-india.org/internet-governance/blog/comments-to-the-personal-data-protection-bill-2019</link>
    <description>
        &lt;b&gt;The Personal Data Protection Bill, 2019 was introduced in the Lok Sabha on December 11, 2019. &lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;Please view our general comments below, or download as PDF &lt;a href="https://cis-india.org/accessibility/blog/cis-general-comments-to-the-pdp-bill-2019" class="internal-link" title="CIS' General Comments to the PDP Bill 2019"&gt;here&lt;/a&gt;.&lt;/h4&gt;
&lt;h4&gt;Our comments and recommendations can be downloaded as PDF &lt;a href="https://cis-india.org/accessibility/blog/cis-comments-pdp-bill-2019" class="internal-link" title="CIS Comments PDP Bill 2019"&gt;here&lt;/a&gt;.&lt;/h4&gt;
&lt;h4&gt;We have also prepared an annotated version of the Bill, where our detailed comments and recommendations can be viewed alongside the Bill, available as PDF &lt;a href="https://cis-india.org/accessibility/blog/annotated-ver-pdp-bill-2019" class="internal-link" title="Annotated ver PDP Bill 2019"&gt;here&lt;/a&gt;.&lt;/h4&gt;
&lt;hr /&gt;
&lt;h2&gt;General Comments&lt;/h2&gt;
&lt;h3&gt;1. Executive notification cannot abrogate fundamental rights &lt;br /&gt;&lt;/h3&gt;
&lt;p&gt;In 2017, the Supreme Court in K.S. Puttaswamy v Union of India [1] held the right to privacy to be a fundamental right. While this right is subject to reasonable restrictions, the restrictions have to meet a three fold requirement, namely (i) existence of a law; (ii) legitimate state aim; (iii) proportionality.Under the 2018 Bill, the exemption to government agencies for processing of personal data from the provisions of the Bill in the ‘interest of the security of the State’ [2] was subject to a law being passed by Parliament. However, under Clause 35 of the present Bill, the Central Government is merely required to pass a written order exempting the government agency from the provisions of the Bill.Any restriction on the right to privacy will have to comply with the conditions prescribed in Puttaswamy I. An executive order issued by the central government authorising any agency of the government to process personal data does not satisfy the first requirement laid down by the Supreme Court in Puttaswamy I — as it is not a law passed by Parliament. The Supreme Court while deciding upon the validity of Aadhar in K.S. Puttaswamy v Union of India [3] noted that “an executive notification does not satisfy the requirement of a valid law contemplated under Puttaswamy. A valid law in this case would mean a law passed by Parliament, which is just, fair and reasonable. Any encroachment upon the fundamental right cannot be sustained by an executive notification.”&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;2. Exemptions under Clause 35 do not comply with the legitimacy and proportionality test&lt;/h3&gt;
&lt;p&gt;The lead judgement in Puttaswamy I while formulating the three fold test held that the restraint on privacy emanate from the procedural and content based mandate of Article 21 [4]. The Supreme Court in Maneka Gandhi v Union India [5] had clearly established that “mere prescription of some kind of procedure cannot ever meet the mandate of Article 21. The procedure prescribed by law has to be fair, just and reasonable, not fanciful,  oppressive and arbitrary” [6]. The existence of a law is the first requirement; the second requirement is that of ‘legitimate state aim’. As per the lead judgement this requirement ensures that “the nature and content of the law which imposes the restriction falls within the zone of reasonableness mandated by Article 14, which is  a guarantee against arbitrary state action” [7]. It is established that for a provision which confers upon the executive or administrative authority discretionary powers to be regarded as non-arbitrary, the provision should lay down clear and specific guidelines for the executive to exercise  the power [8]. The third test to be complied with is that the restriction should be ‘proportionate,’ i.e. the means that are adopted by the legislature are proportional to the object and needs sought to be fulfilled by the law. The Supreme Court in Modern Dental College &amp;amp; Research Centre v State of Madhya Pradesh [9] specified the components of proportionality standards —&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;A measure restricting a right must have a legitimate goal;&lt;/li&gt;
&lt;li&gt;It must be a suitable means of furthering this goal;&lt;/li&gt;
&lt;li&gt;There must not be any less restrictive, but equally effective alternative; and&lt;/li&gt;
&lt;li&gt;The measure must not have any disproportionate impact on the right holder&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;Clause 35 provides extensive grounds for the Central Government to exempt any agency from the requirements of the bill but does not specify the procedure to be followed by the agency while processing personal data under this provision. It merely states that the ‘procedure, safeguards and oversight mechanism to be followed’ will be prescribed in  the rules.The wide powers conferred on the central government without clearly specifying the procedure may be contrary to the three fold test laid down in Puttaswamy I, as it is difficult to ascertain whether a legitimate or proportionate objective is being fulfilled [10].&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;3. Limited powers of Data Protection Authority in comparison with the Central Government&lt;/h3&gt;
&lt;p&gt;In comparison with the last version of the Personal Data Protection Bill, 2018 prepared by the Committee of Experts led by Justice Srikrishna, we witness an abrogation of powers of the Data Protection Authority (Authority), to be created, in this Bill. The powers and functions that were originally intended to be performed by the Authority have now been allocated to the Central Government. For example:&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;In the 2018 Bill, the Authority had the power to notify further categories of sensitive personal data. Under the present Bill, the Central Government in consultation with the sectoral regulators has been conferred the power to do so.&lt;/li&gt;
&lt;li&gt;Under the 2018 Bill, the Authority had the sole power to determine and notify significant data fiduciaries, however, under the present Bill, the Central Government has in consultation with the Authority been given the power to notify social media intermediaries as significant data fiduciaries.&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;In order to govern data protection effectively, there is a need for a responsive market regulator with a strong mandate and resources. The political nature of the personal data also requires that the governance of data, particularly the rule-making and adjudicatory functions performed by the Authority are independent of the Executive.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;4. No clarity on data sandbox&lt;/h3&gt;
&lt;p&gt;The Bill contemplates a sandbox for “ innovation in artificial intelligence, machine-learning or any other emerging technology in public interest.” A Data Sandbox is a non-operational environment where the analyst can model and manipulate data inside the data management system. Data sandboxes have been envisioned as a secure area where only a copy of the company’s or participant companies’ data is located [11]. In essence, it refers to the scalable and creation platform which can be used to explore an enterprise’s information sets. On the other hand, regulatory sandboxes are controlled environments where firms can introduce innovations to a limited customer base within a relaxed regulatory framework, after which they may be allowed entry into the larger market after meeting certain conditions. This purportedly encourages innovation through the lowering of entry barriers by protecting newer entrants from unnecessary and burdensome regulation. Regulatory sandboxes can be interpreted as a form of responsive regulation by governments that seek to encourage innovation – they allow selected companies to experiment with solutions within an environment that is relatively free of most of the cumbersome regulations that they would ordinarily be subject to, while still subject to some appropriate safeguards and regulatory requirements. Sandboxes are regulatory tools which may be used to permit companies to innovate in the absence of heavy regulatory burdens. However, these ordinarily refer to burdens related to high barriers to entry (such as capital requirements for financial  and banking companies), or regulatory costs. In this Bill, however, the relaxing of data protection provisions for data fiduciaries would lead to restrictions of the privacy of individuals. Limitations to a fundamental rights on grounds of ‘fostering innovation’ is not a constitutional tenable position, and contradict the primary objectives of a data protection law.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;5. The primacy of ‘harm’ in the Bill ought to be reconsidered&lt;/h3&gt;
&lt;p&gt;While a harms based approach is necessary for data protection frameworks, such approaches should be restricted to the positive obligations, penal provisions and responsive regulation of the Authority. The Bill does not provide any guidance on either the interpretation of the term ‘harm,’ [12] or on the various activities covered within the definition of the term. Terms such as ‘loss of reputation or humiliation’ ‘any discriminatory treatment’ are a subjective standard and are open to varied interpretations. This ambiguity in the definition will make it difficult for the data principal to demonstrate harm and for the DPA to take necessary action as several provisions are based upon harm being caused or likely to be caused.Some of the significant provisions where ‘harm’ is a precondition for the provision to come into effect are —&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;Clause 25: Data Fiduciary is required to notify the Authority about the breach of personal data processed by the data fiduciary, if such breach is likely to cause harm to any data principal. The Authority after taking into account the severity of the harm that may be caused to the data principal will determine whether the data principal should be notified about the breach.&lt;/li&gt;
&lt;li&gt;Clause 32 (2): A data principal can file a complaint with the data fiduciary for a contravention of any of the provisions of the Act, which has caused or is likely to cause ‘harm’ to the data principal.&lt;/li&gt;&lt;li&gt;Clause 64 (1): A data principal who has suffered harm as a result of any violation of the provision of the Act by a data fiduciary, has the right to seek compensation from the data fiduciary.&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;Clause 16 (5): The guardian data fiduciary is barred from profiling, tracking or undertaking targeted advertising directed at children and undertaking any other processing of personal data that can cause significant harm to the child.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;6. Non personal data should be outside the scope of this Bill&lt;/h3&gt;
&lt;p&gt;Clause 91 (1) states that the Act does not prevent the Central Government from framing a policy for the digital economy, in so far as such policy does not govern personal data. The Central Government can, in consultation with the Authority, direct any data fiduciary  to provide any anonymised personal data or other non-personal data to enable better targeting of delivery of services or formulation of evidence based policies in any manner as may be prescribed.It is concerning that the data protection bill has specifically carved out an exception for the Central Government to frame policies for the digital economy and seems to indicate that the government plans to freely use any and all anonymized and/or non-personal data that rests with any data fiduciary that falls under the ambit of the bill to support the digital economy including for its growth, security, integrity, and prevention of misuse. It is unclear how the government, in practice, will be able to compel organizations to share this data. Further, there is a lack of clarity on the contours of the definition of non-personal data and the Bill does not define the term. It is also unclear whether the Central Government can compel the data fiduciary to transfer/share all forms of non-personal data and the rights and obligations of the data fiduciaries and data principals over such forms of data. Anonymised data refers to data which has ‘ irreversibly’ been converted into a form in which the data principal cannot be identified. However, as several instances have shown ‘ irreversible’ anonymisation is not possible. In the United States, the home addresses of taxi drivers were uncovered and in Australia individual health records were mined from anonymised medical bills [13]. In September 2019, the Ministry of Electronics and Information Technology, constituted an expert committee under the chairmanship of Kris Gopalkrishnan to study various issues relating to non-personal data and to deliberate over a data governance framework for the regulation of such data.The provision should be deleted and the scope of the bill should be limited to protection of personal data and to provide a framework for the protection of individual privacy. Until the report of the expert committee is published, the Central Government should not frame any law/regulation on the access and monetisation of non-personal/ anonymised data nor can they create a blanket provision allowing them to request such data from any data fiduciary that falls within the ambit of the bill. If the government wishes to use data resting with a data fiduciary; it must do so on a case to case basis and under formal and legal agreements with each data fiduciary.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;7. Steps towards greater decentralisation of power&lt;/h3&gt;
&lt;p&gt;We propose the following steps towards greater decentralisation of powers and devolved jurisdiction —&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;Creation of State Data Protection Authorities: A single centralised body may not be the appropriate form of such a regulator. We propose that on the lines of central and state commissions under the Right to Information Act, 2005, state data protection authorities are set up which are in a position to respond to local complaints and exercise jurisdiction over entities within their territorial jurisdictions.&lt;/li&gt;
&lt;li&gt;More involvement of industry bodies and civil society actors: In order to lessen the burden on the data protection authorities it is necessary that there is active engagement with industry bodies, sectoral regulators and civil society bodies engaged in privacy research. Currently, the Bill provides for involvement of industry or trade association, association representing the interests of data principals, sectoral regulator or statutory Authority, or an departments or ministries of the Central or State Government in the formulation of codes of practice. However, it would be useful to also have a more active participation of industry associations and civil society bodies in activities such as promoting  awareness among data fiduciaries of their obligations under this Act, promoting measures and undertaking research for innovation in the field of protection of personal data.&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;8. The Authority must be empowered to exercise responsive regulation&lt;/h3&gt;
&lt;p&gt;In a country like India, the challenge is to move rapidly from a state of little or no data protection law, and consequently an abysmal state of data privacy practices to a strong data protection regulation and a powerful regulator capable of enabling a state of robust data privacy practices. This requires a system of supportive mechanisms to the stakeholders in the data ecosystem, as well as systemic measures which enable the proactive detection of breaches. Further, keeping in mind the limited regulatory capacity in India, there is a need for the Authority to make use of different kinds of inexpensive and innovative strategies.We recommend the following additional powers for the Authority to be clearly spelt out in the Bill —&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;Informal Guidance: It would be useful for the Authority to set up a mechanism on the lines of the Security and Exchange Board of India (SEBI)’s Informal Guidance Scheme, which enables regulated entities to approach the Authority for non-binding advice on the position of law. Given that this is the first omnibus data protection law in India, and there is very little jurisprudence on the subject from India, it would be extremely useful for regulated entities to get guidance from  the regulator.&lt;/li&gt;
&lt;li&gt;Power to name and shame: When a DPA makes public the names of organisations that have seriously contravened data protection legislation, this is a practice known as “naming and shaming.”  The UK ICO and other DPAs recognise the power of publicity, as evidenced by their willingness to co-operate  with the media. The ICO does not simply post monetary penalty notices (MPNs or fines) on its websites for journalists to find, but frequently issues press releases, briefs journalists and uses social media. The ICO’s publicity statement on communicating enforcement activities states that the “ICO aims to get media coverage for  enforcement activities.”&lt;/li&gt;
&lt;li&gt;Undertakings: The UK ICO has also leveraged the threats of fines into an alternative enforcement mechanism seeking contractual undertakings from data controllers to take certain remedial steps. Undertakings have significant advantages for the regulator. Since an undertaking is a more “co-operative”solution, it is less likely that a data controller will change it. An undertaking is simpler and easier to put in place. Furthermore, the Authority can put an undertaking in place quickly as opposed to legal proceedings which are longer.&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;9. No clear roadmap for the implementation of the Bill&lt;/h3&gt;
&lt;p&gt;The 2018 Bill had specified a roadmap for the different provisions of the Bill to come into effect from the date of the Act being notified [14]. It specifically stated the time period within which the Authority had to be established and the subsequent rules and regulations notified.The present Bill does not specify any such blueprint; it does not provide any details on either when the Bill will be notified or the time period within within which the Authority shall be established and specific rules and regulations notified. Considering that 25 provisions have been deferred to rules that have to be framed by the Central Government and a further 19 provisions have been deferred to the regulations to be notified by the Authority the absence and/or delayed notification of such rules and regulations will impact the effective functioning of the Bill.The absence of any sunrise or sunset provision may disincentivise political or industrial will to support or enforce the provisions of the Bill. An example of such a lack of political will was the establishment of the Cyber Appellate Tribunal. The tribunal was established in 2006 to redress cyber fraud. However, it was virtually a defunct body from 2011 onwards when the last chairperson retired. It was eventually merged with the Telecom Dispute Settlement and Appellate Tribunal in 2017.We recommend that Bill clearly lays out a time period for the implementation of the different provisions of the Bill, especially a time frame for the establishment of the Authority. This is important to give full and effective effect to the right of privacy of the &lt;br /&gt;individual. It is also important to ensure that individuals have an effective mechanism  to enforce the right and seek recourse in case of any breach of obligations by the  data fiduciaries.For offences, we suggest a system of mail boxing where provisions and punishments are enforced in a staggered manner, for a period till the fiduciaries are aligned with the provisions of the Act. The Authority must ensure that data principals and fiduciaries have sufficient awareness of the provisions of this Bill before bringing the provisions for punishment are brought into force. This will allow the data fiduciaries to align their practices with the provisions of this new legislation and the Authority will also have time to define and determine certain provisions that the Bill has left the Authority to define. Additionally enforcing penalties for offences initially must be in a staggered process, combined with provisions such as warnings, in order to allow first time and mistaken offenders from paying a high price. This will relieve the fear of smaller companies and startups who might fear processing data for the fear of paying penalties for offences.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;10. Lack of interoperability&lt;/h3&gt;
&lt;p&gt;In its current form, a number of the provisions in the Bill will make it difficult for India’s framework to be interoperable with other frameworks globally and in the region. For example, differences between the draft Bill and the GDPR can be found in the grounds for processing,&amp;nbsp; data localization frameworks, the framework for cross border transfers, definitions of sensitive personal data, inclusion of&amp;nbsp; the undefined category of ‘critical&amp;nbsp; data’, and the roles of the authority and the central government.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;11. Legal Uncertainty&lt;/h3&gt;
&lt;p&gt;In its current structure, there are a number of provisions in the Bill that, when implemented, run the risk of creating an environment of legal uncertainty. These include: lack of definition of critical data, lack of clarity in the interpretation of the terms ‘harm’ and ‘significant harm’, ability of the government to define further categories of sensitive personal data,&amp;nbsp; inclusion of requirements for ‘social media intermediaries’, inclusion of ‘non-personal data’, framing of the requirements for data transfers, bar on processing of certain forms of biometric data as defined by the Central Government, the functioning between a consent manager and another data fiduciary, the inclusion of an AI sandbox and the definition of state. To ensure the greatest amount of protection of individual privacy rights and the protection of personal data while also enabling innovation, it is important that any data protection framework is structured and drafted in a way to provide as much legal certainty as possible.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Endnotes&lt;/h3&gt;
&lt;p&gt;1. (2017) 10 SCC 641 (“Puttaswamy I”).&lt;/p&gt;
&lt;p&gt;2. Clause 42(1) of the 2018 Bill states that “Processing of personal data in the interests of the security of the State shall not be permitted unless it is authorised pursuant to a law, and is in accordance with the procedure established by such law, made by Parliament and is necessary for, and proportionate to such interests being achieved.”&lt;/p&gt;
&lt;p&gt;3. (2019) 1 SCC 1 (“Puttaswamy II”)&lt;/p&gt;
&lt;p&gt;4. Puttaswamy I, supra, para 180.&lt;/p&gt;
&lt;p&gt;5. (1978) 1 SCC 248.&lt;/p&gt;
&lt;p&gt;6. Ibid para 48.&lt;/p&gt;
&lt;p&gt;7. Puttaswamy I supra para 180.&lt;/p&gt;
&lt;p&gt;8. State of W.B. v. Anwar Ali Sarkar, 1952 SCR 284; Satwant Singh Sawhney v A.P.O AIR 1967 SC1836.&lt;/p&gt;
&lt;p&gt;9. (2016)7 SCC 353.&lt;/p&gt;
&lt;p&gt;10. Dvara Research “Initial Comments of Dvara Research dated 16 January 2020 on the Personal Data Protection Bill, 2019 introduced in Lok Sabha on 11 December 2019”, January 2020, https://www.dvara.com/blog/2020/01/17/our-initial-comments-on-the-personal-data-protection-bill-2019/ (“Dvara Research”).&lt;/p&gt;
&lt;p&gt;11. “A Data Sandbox for Your Company”, Terrific Data, last accessed on January 31, 2019, http://terrificdata.com/2016/12/02/3221/.&lt;/p&gt;
&lt;p&gt;12. Clause 3(20) — “harm” includes (i) bodily or mental injury; (ii) loss, distortion or theft of identity; (ii) financial loss or loss of property; (iv) loss of reputation or humiliation; (v) loss of employment; (vi) any discriminatory treatment; (vii) any subjection to blackmail or extortion; (viii) any denial or withdrawal of service,benefit or good resulting from an evaluative decision about the data principal; (ix) any restriction placed or suffered directly or indirectly on speech, movement or any other action arising out of a fear of being observed or surveilled; or (x) any observation or surveillance that is not reasonably expected by the data principal.&lt;/p&gt;
&lt;p&gt;13. Alex Hern “Anonymised data can never be totally anonymous, says study”, July 23, 2019 https://www.theguardian.com/technology/2019/jul/23/anonymised-data-never-be-anonymous-enough-study-finds.&lt;/p&gt;
&lt;p&gt;14. Clause 97 of the 2018 Bill states“(1) For the purposes of this Chapter, the term ‘notified date’ refers to the date notified by the Central Government under sub-section (3) of section 1. (2)The notified date shall be any date within twelve months from the date of enactment of this Act. (3)The following provisions shall come into force on the notified date-(a) Chapter X; (b) Section 107; and (c) Section 108. (4)The Central Government shall, no later than three months from the notified date establish the Authority. (5)The Authority shall, no later than twelve months from the notified date notify the grounds of processing of personal data in respect of the activities listed in sub-section (2) of section 17. (6)The Authority shall no, later than twelve months from the date notified date issue codes of practice on the following matters-(a) notice under section 8; (b) data quality under section 9; (c) storage limitation under section 10; (d) processing of personal data under Chapter III; (e) processing of sensitive personal data under Chapter IV; (f ) security safeguards under section 31; (g) research purposes under section 45; (h) exercise of data principal rights under Chapter VI; (i) methods of de-identification and anonymisation; (j) transparency and accountability measures under Chapter VII. (7)Section 40 shall come into force on such date as is notified by the Central Government for the purpose of that section.(8)The remaining provision of the Act shall come into force eighteen months from the notified date.”&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/comments-to-the-personal-data-protection-bill-2019'&gt;https://cis-india.org/internet-governance/blog/comments-to-the-personal-data-protection-bill-2019&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Amber Sinha, Elonnai Hickok, Pallavi Bedi, Shweta Mohandas, Tanaya Rajwade</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2020-02-21T10:13:35Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/comments-on-the-statistical-disclosure-control-report">
    <title>Comments on the Statistical Disclosure Control Report</title>
    <link>https://cis-india.org/internet-governance/comments-on-the-statistical-disclosure-control-report</link>
    <description>
        &lt;b&gt;This submission presents comments by the Centre for Internet and Society, India (“CIS”) on the ​Statistical Disclosure Control Report published on March 30th by Ministry of Statistics and Programme Implementation. 
&lt;/b&gt;
        
&lt;p&gt;&lt;strong id="docs-internal-guid-a12fe2b3-c746-4c1a-0287-1814414668af"&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify;" dir="ltr"&gt;1. PRELIMINARY&lt;/h3&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;This submission presents comments by the Centre for Internet and Society, India (“CIS”) on the ​Statistical Disclosure Control Report published on March 30th by Ministry of Statistics and Programme Implementation.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;CIS is thankful for the opportunity to put forth its views.&lt;br class="kix-line-break" /&gt;This submission is divided into three main parts. The first part, ‘Preliminary’, introduces the document; the second part, ‘About CIS’, is an overview of the organization; and, the third part contains the ‘Comments’.&lt;br class="kix-line-break" /&gt;&lt;br class="kix-line-break" /&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify;" dir="ltr"&gt;2. ABOUT CIS&lt;/h3&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;CIS is a non-​profit organisation that undertakes interdisciplinary research on internet and digital technologies from policy and academic perspectives. The areas of focus include digital accessibility for persons with diverse abilities, access to knowledge, intellectual property rights, openness (including open data, free and open source software, open standards, open access, open educational resources, and open video), internet governance, telecommunication reform, freedom of speech and expression, intermediary liability, digital privacy, and cybersecurity.​&lt;br class="kix-line-break" /&gt;&lt;br /&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;CIS values the fundamental principles of justice, equality, freedom and economic development. This submission is consistent with CIS' commitment to these values, the safeguarding of general public interest and the protection of India's national interest at the international level. Accordingly, the comments in this submission aim to further these principles.&lt;/p&gt;
&lt;h3 style="text-align: justify;" dir="ltr"&gt;3. Comments&lt;/h3&gt;
&lt;h4 style="text-align: justify;" dir="ltr"&gt;3.1 General Comments&lt;/h4&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;As a non-profit organisation we recognize the importance of the efforts by the Ministry of Statistics and Programme Implementation (MoSPI) to make the &amp;nbsp;data you collect available to the public in open formats with relevant information about reliability of statistical estimates.&lt;/p&gt;
&lt;p&gt;&lt;span style="text-align: justify;"&gt;We at CIS have recently released a report titled “Information Security Practices of Aadhaar (or lack thereof): A documentation of public availability of Aadhaar Numbers with sensitive personal financial information”. We encountered several central and state government departments collecting socioeconomic data from citizens, linking it with Aadhaar and even publishing them in exportable data formats like EXCEL and MS ACCESS Databases. &amp;nbsp;&lt;/span&gt;&lt;span style="text-align: justify;"&gt;While we understand this issue primarily concerns to Unique Identification Authority of India (UIDAI), the lack of standards around information/statistical disclosure are a general threat to transparency in a democracy and privacy of individuals.&amp;nbsp;&lt;/span&gt;&lt;span style="text-align: justify;"&gt;Going through the report we understand the committee is unable to prescribe a standard for other ministries and departments until they try and pilot these standards within Ministry of Statistics and Programme Implementation. This delay in prescribing the standards can be really dangerous in the current circumstances of massive data collection by government departments and linking all the databases with a unique identifier, Aadhaar Number. &amp;nbsp;&lt;/span&gt;&lt;span style="text-align: justify;"&gt;At the same time we understand the importance of data dissemination to be carried out and we recommend the following for improving the standards around data disclosure control.&lt;/span&gt;&lt;/p&gt;
&lt;h4 style="text-align: justify;" dir="ltr"&gt;3.2 Integrity of Information and Data&lt;/h4&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;We agree with the committee that the error rates need to be kept in mind while designing practices to convert raw data. But we request the process of changes being made be actively measured and documented. In case of errors being computed, guidelines can be made to decrease the possibilities of misinterpretation of errors causing loss of integrity of information. Statistics are important for decision making in governance, errors in computations can be biased towards millions of people. Statistical biases are important to be looked into while converting data from its raw format to make sure there are no damage caused by information.&lt;/p&gt;
&lt;h4 style="text-align: justify;" dir="ltr"&gt;3.3 Data Security&lt;/h4&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;One of the important issues around storage and publication of Aadhaar information is the lack of masking standards. With the availability of data from multiple departments, it is possible to reconstruct identification details by linking data from multiple databases. It is recommended to bring masking standards while personally identifiable micro data is being published. There is an urgent need for departments to also look at auditing access to information and tracking sharing of information. It is recommended the department digitally signs all the information and documents being published or shared by them to keep track of who had accessed the information and verifying the authenticity of information.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;We request the department to define what exactly is “usage for statistical purposes only” and recommend standards to control and restrict usage of information for this purpose. It is important they design frameworks or mechanisms to allow others to report violations around this. This process should be transparent and documented heavily.&lt;/p&gt;
&lt;h4 style="text-align: justify;" dir="ltr"&gt;3.4 Anonymization of microdata&lt;/h4&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;We recommend the data being collected be anonymized at source to evade the possibility of the accidental disclosure of personally identifiable information. While the current anonymization efforts have been helpful, with steady increase in data mining and classification algorithms and practices it is recommended to evolve the standards around this area.&lt;/p&gt;
&lt;h4 style="text-align: justify;" dir="ltr"&gt;3.5 Data Dissemination&lt;/h4&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Data dissemination is an important aspect for district statistics officers, we recommend they actively communicate their work through monthly newsletters, quarterly workshops to help improve the conversations around statistics and at the same time engage with the users who would benefit from the data.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;We also recommend that data when being published includes metadata of collection, modification, storage and other important information. Also the information needs to be published in open formats which does not require proprietary software to be used to open them. At the same time data should be published in multiple formats like CSV, XLS, PDF,&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The committee also recognizes the need for having data users part of discussions around important decisions and be part of committees. We would like the department to recognize our efforts and consider us for future committee representations.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Thank you for this opportunity and we look forward to work with you in future.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/comments-on-the-statistical-disclosure-control-report'&gt;https://cis-india.org/internet-governance/comments-on-the-statistical-disclosure-control-report&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Srinivs Kodali and Amber Sinha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Call for Comments</dc:subject>
    
    
        <dc:subject>Digital Access</dc:subject>
    
    
        <dc:subject>Open Data</dc:subject>
    
    
        <dc:subject>Open Government Data</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Data Governance</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Digitisation</dc:subject>
    
    
        <dc:subject>Information Security</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Data Management</dc:subject>
    

   <dc:date>2019-03-13T00:28:44Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/comments-on-the-rbi-consultation-paper-on-peer-to-peer-lending">
    <title>Comments on the RBI's Consultation Paper on Peer to Peer Lending</title>
    <link>https://cis-india.org/raw/comments-on-the-rbi-consultation-paper-on-peer-to-peer-lending</link>
    <description>
        &lt;b&gt;The Reserve Bank of India published a Consultation Paper on Peer to Peer Lending on April 28, 2016, and invited comments from the public. CIS submitted the following response, authored by Elonnai Hickok, Pavishka Mittal, Sumandro Chattapadhyay, Vidushi Marda, and Vipul Kharbanda.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;1. Preliminary&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;1.1.&lt;/strong&gt; This submission presents comments and recommendations by the Centre for Internet and Society (&lt;strong&gt;“CIS”&lt;/strong&gt;) on the Consultation Paper on Peer to Peer Lending (&lt;strong&gt;“the consultation paper”&lt;/strong&gt;) by the Reserve Bank of India (&lt;strong&gt;“RBI”&lt;/strong&gt;) &lt;strong&gt;[1]&lt;/strong&gt;.&lt;/p&gt;
&lt;h2&gt;2. The Centre for Internet and Society&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;2.1.&lt;/strong&gt; The Centre for Internet and Society, CIS &lt;strong&gt;[2]&lt;/strong&gt;, is a non-profit organisation that undertakes interdisciplinary research on internet and digital technologies from policy and academic perspectives. The areas of focus include digital accessibility for persons with diverse abilities, access to knowledge, intellectual property rights, openness (including open data, free and open source software, open standards, open access, open educational resources, and open video), internet governance, telecommunication reform, digital privacy, and cyber-security. The academic research at CIS seeks to understand the reconfiguration of social processes and structures through the internet and digital media technologies, and vice versa.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;2.2.&lt;/strong&gt; This submission is consistent with CIS’ commitment to safeguarding general public interest, and the interests and rights of various stakeholders involved. The comments in this submission aim to further the concerns of citizens’ and users’ rights in the context of products, services, and transactions facilitated by digital media technologies, the , the principle that regulation should be defined around functions of the acts concerned, and not the technologies of delivery. Our comments are limited to the clauses that most directly have an impact on these concerns.&lt;/p&gt;
&lt;h2&gt;3. Response&lt;/h2&gt;
&lt;h3&gt;3.1. Whether there is a felt need for regulating peer to peer lending platforms?&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.1.1.&lt;/strong&gt; Peer to peer (&lt;strong&gt;“P2P”&lt;/strong&gt;) lenders are platforms serving as marketplaces for the lenders and the borrowers of funds to connect. Their very business model does not render them as a provider of finance, as they aspire to function as pure intermediaries to enable lending and borrowing.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.1.2.&lt;/strong&gt; The Section 45I.(f)(iii) of the RBI Act, 1935 &lt;strong&gt;[3]&lt;/strong&gt;, provides RBI the authority to classify any financial institution as a non-banking financial company (&lt;strong&gt;“NBFC”&lt;/strong&gt;) “with the previous approval of the Central Government and by notification in the Official Gazette.” Since the P2P lending platforms do not provide any finance themselves, undertake acquisition of financial instruments, deliver financial and/or insurance services, or collect financial resources directly, the only ground for classifying such companies as “financial institutions” &lt;strong&gt;[4]&lt;/strong&gt; appears to be their involvement in “managing, conducting or supervising, as foreman, agent or in any other capacity, of chits or kuries as defined in any law which is for the time being in force in any State, or any business, which is similar thereto” &lt;strong&gt;[5]&lt;/strong&gt;. P2P lending platforms can be considered to be brokers and thus there are other aspects that merit scrutiny such as antitrust issues, obligations of either party, company activities and the transactional system involved, as we will discuss in this document.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.1.3.&lt;/strong&gt; The consultation paper itself states that the balance sheet of the platform cannot indicate any borrowing / lending activity, which entails that the platform cannot itself provide finance or receive any funds for the provision of loans to others. Platforms are not allowed to determine the interest rates as they are not a party to the transaction. Neither would they be liable in cases of default by the borrower. These rules, standard for P2P platforms in other jurisdictions as well, confirm the assumption that the platform itself is not providing finance and thus, cannot be entrusted with any liability, obligation from the transaction.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.1.4.&lt;/strong&gt; Further, with RBI raising the threshold asset size for an NBFC to be considered systemically important (NBFC-ND-SI) from Rs. 100 Crores to Rs. 500 Crores &lt;strong&gt;[6]&lt;/strong&gt;, and Economic Times reporting that one of the biggest Indian P2P lending platform’s enterprise valuation (which can be taken as indicative of its net assets) is Rs 50 Crores &lt;strong&gt;[7]&lt;/strong&gt;, we may assume that most P2P lending platforms will have net assets worth less than 500 crore, at least in the near future; although there is a possibility for exponential growth with some companies.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.1.5.&lt;/strong&gt; Given the limited sphere of operation, restricted ability (by design) of these platforms to shape interest rates and other features of financial instruments, and their generally non-systemically-important nature, we would submit that the regulation of such P2P lending platforms are kept to an absolute minimum, so that their economic viability is not undermined, and at the same time the key risks associated with their operations are addressed by RBI.&lt;/p&gt;
&lt;h3&gt;3.2. Is the assessment of P2P lending and risks associated with it adequate?&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.2.1.&lt;/strong&gt; CIS observes that the following are the key risks involved with the operations of the P2P lending platforms, and these are being respectively addressed by, or can be addressed by RBI in the following manners.&lt;/p&gt;
&lt;ol type="A"&gt;&lt;li&gt;&lt;strong&gt;Insufficient information about the conditions of lending, leading to defrauding of the borrower:&lt;/strong&gt; The borrower may not receive appropriate information about the terms of the loan, and/or the P2P lending platform may not act in a “fair” manner (say, in case of collusion between the P2P lending platform and the lender, or the lending platform and the borrower), which may lead to defrauding and/or economic loss of either party. By classifying P2P lending platforms as NBFCs, RBI will ensure that these companies follow the Guidelines on Fair Practices Code for NBFCs &lt;strong&gt;[8]&lt;/strong&gt;, which extensively addresses concerns related to this type of risks.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Insufficient information about the borrower, or her/his ability to repay the loan, may lead to non-repayment and economic loss of the lender:&lt;/strong&gt; If the P2P lending platform allows the lender to offer loans to borrowers without acquiring and/or providing sufficient information to the lender about the borrower’s credit history and/or ability to repay the loan, modes of formulating security for loans, this may heighten the risks of non-repayment of loans. By classifying P2P lending platforms as NBFCs, RBI will ensure that these companies follow the Master Circular – 'Know Your Customer' (KYC) Guidelines – Anti Money Laundering Standards (AML) - Prevention of Money Laundering Act, 2002 - Obligations of NBFCs &lt;strong&gt;[9]&lt;/strong&gt;, which extensively addresses concerns related to this type of risks.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Credit-related information of the lenders and the borrowers collected by P2P lending platforms may not be made available to other financial institutions and that will lead asymmetry in credit information available across various actors in the sector:&lt;/strong&gt; Credit information, related to both lending and borrowing practices of entities using the platform concerned, is a key asset of the P2P lending platforms. Lack of sharing of such information with Credit Information Companies, for economic reasons or otherwise, may however, lead to information asymmetry within the financial sector, which will structurally weaken the entire sector (with pieces of credit information being distributed across actors and not being shared internally). By classifying P2P lending platforms as NBFCs, RBI will ensure that these companies follow the Credit Information Companies (Regulation) Act, 2005 &lt;strong&gt;[10]&lt;/strong&gt;, which extensively addresses concerns related to this type of risks.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;P2P lending platforms diversifying their financial operations without informing RBI and hence without appropriate regulatory control:&lt;/strong&gt; It is possible that P2P lending platforms may decide to diversify their activities. There have been similar examples in other related sectors, say e-commerce marketplaces, that have started their own product re/selling companies that use the same online marketplace concerned. By classifying P2P lending platforms as NBFCs, RBI will ensure that these companies provide RBI with detailed and regular reports of their economic activities and investments, which is expected to address concerns related to this type of risks.&lt;/li&gt;&lt;/ol&gt;
&lt;h3&gt;3.3. Are there any other risks which ought to be addressed?&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.3.1.&lt;/strong&gt; CIS observes that as part of the usual transaction related activities of the P2P lending platforms, the companies will come into possession of what has been defined as “sensitive personal data or information” by the Information Technology (Reasonable security practices and procedures and sensitive personal data or information) Rules, 2011 &lt;strong&gt;[11]&lt;/strong&gt;. The concerns related to this type of risk is directly addressed by the Rules concerned, and may not require additional attention from the RBI.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.3.2.&lt;/strong&gt; CIS observes that as borrowers and lenders start using specific P2P lending platforms, the data regarding their credit histories and/or “financial reputation” will be owned by these companies. While such information might be shared internally within the financial sector through the Credit Information Companies, the borrowers and lenders themselves may not get direct access to such data. Hence, the borrowers and lenders will not be able to move easily and smoothly to a new P2P lending platform and make use of their existing credit information and/or “financial reputation” when accessing services offered via the new P2P lending platform. In other words, the borrowers and lenders may face a &lt;em&gt;service provider lock-in&lt;/em&gt;, and inability to move between P2P lending platforms easily, without explicit access to their own credit history/reputation, and will not have the ability to migrate such information from one P2P lending platform to another (or to any other agency, for that matter). CIS submits that RBI must provide a mechanism to allow users to migrate between platforms as it has not been discussed in the consultation paper.&lt;/p&gt;
&lt;h3&gt;3.4. Is the proposed approach to regulating these platforms adequate?&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.4.1.&lt;/strong&gt; CIS observes that while classification of P2P lending platforms will appropriately address key risks associated with their operations (as listed in 3.2.1. A-D), it will not address a major risk emerging out of their operations that is unique to the technological basis of the business concerned (as mentioned in 3.3.2.), and further, it will impose substantial financial and management obligations that have a very high probability of undermining the economic viability of this emerging and niche sector of intermediated direct lending and borrowing.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.4.2.&lt;/strong&gt; CIS observes that these financial and management obligations may involve the following topics among others discussed: 1) minimum net worth requirement for registration, 2) minimum investments required to be made government securities, 3) transferring of minimum percentage of net profits to RBI, 4) guidelines regarding corporate governance &lt;strong&gt;[12]&lt;/strong&gt;, etc.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.4.3.&lt;/strong&gt; Given this, CIS submits that instead of classifying P2P lending platforms as “Misc NBFCs,” a new sub-classification is created under the category of NBFC for such platforms, that directly addresses the key risks associated with businesses of P2P lending platforms, and protects lenders as well as borrowers while enhancing transparency in operations. This new sub-classification of P2P lending companies should also be divided into systemically-important and non-systemically-important like other NBFCs, and requirements regarding financial operations and corporate management should only be enforced for the former category of P2P lending companies.&lt;/p&gt;
&lt;h3&gt;3.5. Any other relevant issues pertaining to P2P lending&lt;/h3&gt;
&lt;p&gt;Beyond the issues already discussed above, CIS seek clarity from the RBI around the following aspects:&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;&lt;strong&gt;Transactional system pertaining to P2P lending:&lt;/strong&gt;
&lt;ol type="a"&gt;
&lt;li&gt;What are the requirements and prerequisites for mandating the collection of user identity?&lt;/li&gt;
&lt;li&gt;Establishing a maximum sum that can be transferred per transaction.&lt;/li&gt;&lt;/ol&gt;
&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Company activities:&lt;/strong&gt;
&lt;ol type="a"&gt;&lt;li&gt;Fees that can be charged by platforms.&lt;/li&gt;
&lt;li&gt;How data security can be best addressed.&lt;/li&gt;
&lt;li&gt;How the financial transactions are brokered.&lt;/li&gt;
&lt;li&gt;Modes of redressal.&lt;/li&gt;
&lt;li&gt;Restitution to users if something goes amiss in the transaction.&lt;/li&gt;
&lt;li&gt;Insurance that the company has to buy or capital on hand to support.&lt;/li&gt;&lt;/ol&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Endnotes&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;[1]&lt;/strong&gt; See: &lt;a href="https://www.rbi.org.in/scripts/bs_viewcontent.aspx?Id=3164"&gt;https://www.rbi.org.in/scripts/bs_viewcontent.aspx?Id=3164&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[2]&lt;/strong&gt; See: &lt;a href="http://cis-india.org/"&gt;http://cis-india.org/&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[3]&lt;/strong&gt; See: &lt;a href="https://rbidocs.rbi.org.in/rdocs/Publications/PDFs/RBIA1934170510.pdf"&gt;https://rbidocs.rbi.org.in/rdocs/Publications/PDFs/RBIA1934170510.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[4]&lt;/strong&gt;  See Section 45I.(c) of RBI Act, 1923, last amended on January 07, 2013.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[5]&lt;/strong&gt;  See Section 45I.(c)(v) of RBI Act, 1923, last amended on January 07, 2013.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[6]&lt;/strong&gt; See: &lt;a href="https://rbidocs.rbi.org.in/rdocs/content/pdfs/PNNBFC200315.pdf"&gt;https://rbidocs.rbi.org.in/rdocs/content/pdfs/PNNBFC200315.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[7]&lt;/strong&gt; See: &lt;a href="http://economictimes.indiatimes.com/small-biz/startups/faircent-com-raises-pre-series-a-funding-of-250k/articleshow/47630279.cms"&gt;http://economictimes.indiatimes.com/small-biz/startups/faircent-com-raises-pre-series-a-funding-of-250k/articleshow/47630279.cms&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[8]&lt;/strong&gt; See: &lt;a href="https://rbi.org.in/scripts/NotificationUser.aspx?Id=7866"&gt;https://rbi.org.in/scripts/NotificationUser.aspx?Id=7866&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[9]&lt;/strong&gt; See: &lt;a href="https://rbi.org.in/scripts/BS_ViewMasCirculardetails.aspx?id=8168"&gt;https://rbi.org.in/scripts/BS_ViewMasCirculardetails.aspx?id=8168&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[10]&lt;/strong&gt; See: &lt;a href="http://www.incometaxindia.gov.in/Pages/acts/credit-information-companies-act.aspx"&gt;http://www.incometaxindia.gov.in/Pages/acts/credit-information-companies-act.aspx&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[11]&lt;/strong&gt; See: &lt;a href="http://deity.gov.in/sites/upload_files/dit/files/GSR313E_10511%281%29.pdf"&gt;http://deity.gov.in/sites/upload_files/dit/files/GSR313E_10511%281%29.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[12]&lt;/strong&gt; See: &lt;a href="https://www.rbi.org.in/scripts/BS_NBFCNotificationView.aspx?Id=3706"&gt;https://www.rbi.org.in/scripts/BS_NBFCNotificationView.aspx?Id=3706&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/comments-on-the-rbi-consultation-paper-on-peer-to-peer-lending'&gt;https://cis-india.org/raw/comments-on-the-rbi-consultation-paper-on-peer-to-peer-lending&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Reserve Bank of India</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Research</dc:subject>
    
    
        <dc:subject>Network Economies</dc:subject>
    
    
        <dc:subject>P2P Lending</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2016-06-01T20:21:13Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/comments-on-the-report-of-the-committee-on-digital-payments-dec-2016">
    <title>Comments on  the Report of the Committee on Digital Payments (December 2016)</title>
    <link>https://cis-india.org/internet-governance/blog/comments-on-the-report-of-the-committee-on-digital-payments-dec-2016</link>
    <description>
        &lt;b&gt;The Committee on Digital Payments constituted by the Ministry of Finance and chaired by Ratan P. Watal, Principal Advisor, NITI Aayog, submitted its report on the "Medium Term Recommendations to Strengthen Digital Payments Ecosystem" on December 09, 2016. The report was made public on December 27, and comments were sought from the general public. Here are the comments submitted by the Centre for Internet and Society.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;1. Preliminary&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;1.1.&lt;/strong&gt; This submission presents comments by the Centre for Internet and Society (“CIS”) &lt;strong&gt;[1]&lt;/strong&gt; in response to the report of the Committee on Digital Payments, chaired by Mr. Ratan P. Watal, Principal Advisor, NITI Aayog, and constituted by the Ministry of Finance, Government of India (“the report”) &lt;strong&gt;[2]&lt;/strong&gt;.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;2. The Centre for Internet and Society&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;2.1.&lt;/strong&gt; The Centre for Internet and Society, CIS, is a non-profit organisation that undertakes interdisciplinary research on internet and digital technologies from policy and academic perspectives. The areas of focus include digital accessibility for persons with diverse abilities, access to knowledge, intellectual property rights, openness (including open data, free and open source software, open standards, and open access), internet governance, telecommunication reform, digital privacy, and cyber-security.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;2.2.&lt;/strong&gt; CIS is not an expert organisation in the domain of banking in general and payments in particular. Our expertise is in matters of internet and communication governance, data privacy and security, and technology regulation. We deeply appreciate and are most inspired by the Ministry of Finance’s decision to invite entities from both the sectors of finance and information technology. This submission is consistent with CIS’ commitment to safeguarding general public interest, and the interests and rights of various stakeholders involved, especially the citizens and the users. CIS is thankful to the Ministry of Finance for this opportunity to provide a general response on the report.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;3. Comments&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.1.&lt;/strong&gt; CIS observes that the decision by the Government of India to withdraw the legal tender character of the old high denomination banknotes (that is, Rs. 500 Rs. 1,000 notes), declared on November 08, 2016 &lt;strong&gt;[3]&lt;/strong&gt;, have generated &lt;strong&gt;unprecedented data about the user base and transaction patterns of digital payments systems in India, when pushed to its extreme use due to the circumstances&lt;/strong&gt;. The majority of this data is available with the National Payments Corporation of India and the Reserve Bank of India. CIS requests the authorities concerned to consider &lt;strong&gt;opening up this data for analysis and discussion by public at large and experts in particular, before any specific policy and regulatory decisions are taken&lt;/strong&gt; towards advancing digital payments proliferation in India. This is a crucial opportunity for the Ministry of Finance to embrace (open) data-driven regulation and policy-making.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.2.&lt;/strong&gt; While the report makes a reference to the European General Data Protection Directive, it does not make a reference to any substantive provisions in the Directive which may be relevant to digital payments. Aside from the recommendation that privacy protections around the purpose limitation principle be relaxed to ensure that payment service providers be allowed to process data to improve fraud monitoring and anti-money laundering services, the report is silent on significant privacy and data protection concerns posed by digital payments services. &lt;strong&gt;CIS strongly warns that the existing data protection and security regulations under Information Technology (Reasonable security practices and procedures and sensitive personal data or information), Rules are woefully inadequate in their scope and application to effectively deal with potential privacy concerns posed by digital payments applications and services.&lt;/strong&gt; Some key privacy issues that must be addressed either under a comprehensive data protection legislation or a sector specific financial regulation are listed below. The process of obtaining consent must be specific, informed and unambiguous and through a clear affirmative action by the data subject based upon a genuine choice provided along with an option to opt out at any stage. The data subjects should have clear and easily enforceable right to access and correct their data. Further, data subjects should have the right to restrict the usage of their data in circumstances such as inaccuracy of data, unlawful purpose and data no longer required in order to fulfill the original purpose.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.3.&lt;/strong&gt; The initial recommendation of the report is to “[m]ake regulation of payments independent from the function of central banking” (page 22). This involves a fundamental transformation of the payment and settlement system in India and its regulation. &lt;strong&gt;We submit that a decision regarding transformation of such scale and implications is taken after a more comprehensive policy discussion, especially involving a wider range of stakeholders&lt;/strong&gt;. The report itself notes that “[d]igital payments also have the potential of becoming a gateway to other financial services such as credit facilities for small businesses and low-income households” (page 32). Thus, a clear functional, and hence regulatory, separation between the (digital) payments industry and the lending/borrowing industry may be either effective or desirable. Global experience tells us that digital transactions data, along with other alternative data, are fast becoming the basis of provision of financial and other services, by both banking and non-banking (payments) companies. We appeal to the Ministry of Finance to adopt a comprehensive and concerted approach to regulating, enabling competition, and upholding consumers’ rights in the banking sector at large.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.4.&lt;/strong&gt; The report recognises “banking as an activity is separate from payments, which is more of a technology business” (page 154). Contemporary banking and payment businesses are both are primarily technology businesses where information technology particularly is deployed intimately to extract, process, and drive asset management decisions using financial transaction data. Further, with payment businesses (such as, pre-paid instruments) offering return on deposited money via other means (such as, cashbacks), and potentially competing and/or collaborating with established banks to use financial transaction data to drive lending decisions, including but not limited to micro-loans, it appears unproductive to create a separation between banking as an activity and payments as an activity merely in terms of the respective technology intensity of these sectors. &lt;strong&gt;CIS firmly recommends that regulation of these financial services and activities be undertaken in a technology-agnostic manner, and similar regulatory regimes be deployed on those entities offering similar services irrespective of their technology intensity or choice&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.5.&lt;/strong&gt; The report highlights two major shortcomings of the current regulatory regime for payments. Firstly “the law does not impose any obligation on the regulator to promote competition and innovation in the payments market” (page 153). It appears to us that the regulator’s role should not be to promote market expansion and innovation but to ensure and oversee competition. &lt;strong&gt;We believe that the current regulator should focus on regulating the existing market, and the work of the expansion of the digital payments market in particular and the digital financial services market in general be carried out by another government agency, as it creates conflict of interest for the regulator otherwise.&lt;/strong&gt; Secondly, the report mentions that Payment and Settlement Systems Act does not “focus the regulatory attention on the need for consumer protection in digital payments” and then it notes that a “provision was inserted to protect funds collected from customers” in 2015 (page 153). &lt;strong&gt;This indicates that the regulator already has the responsibility to ensure consumer protection in digital payments. The purview and modalities of how this function of course needs discussion and changes with the growth in digital payments&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.6.&lt;/strong&gt; The report identifies the high cost of cash as a key reason for the government’s policy push towards digital payments. Further, it mentions that a “sample survey conducted in 2014 across urban and rural neighbourhoods in Delhi and Meerut, shows that despite being keenly aware of the costs associated with transacting in cash, most consumers see three main benefits of cash, viz. freedom of negotiations, faster settlements, and ensuring exact payments” (page 30). It further notes that “[d]igital payments have significant dependencies upon power and telecommunications infrastructure. Therefore, the roll out of robust and user friendly digital payments solutions to unelectrified areas/areas without telecommunications network coverage, remains a challenge.” &lt;strong&gt;CIS much appreciates the discussion of the barriers to universal adoption and rollout of digital payments in the report, and appeals to the Ministry of Finance to undertake a more comprehensive study of the key investments required by the Government of India to ensure that digital payments become ubiquitously viable as well as satisfy the demands of a vast range of consumers that India has&lt;/strong&gt;. The estimates about investment required to create a robust digital payment infrastructure, cited in the report, provide a great basis for undertaking studies such as these.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.7.&lt;/strong&gt; CIS is very encouraged to see the report highlighting that “[w]ith the rising number of users of digital payment services, it is absolutely necessary to develop consumer confidence on digital payments. Therefore, it is essential to have legislative safeguards to protect such consumers in-built into the primary law.” &lt;strong&gt;We second this recommendation and would like to add further that financial transaction data is governed under a common data protection and privacy regime, without making any differences between data collected by banking and non-banking entities&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.8.&lt;/strong&gt; We are, however, very discouraged to see the overtly incorrect use of the word “Open Access” in this report in the context of a payment system disallowing service when the client wants to transact money with a specific entity &lt;strong&gt;[4]&lt;/strong&gt;. This is not an uncommon anti-competitive measure adopted by various platform players and services providers so as to disallow users from using competing products (such as, not allowing competing apps in the app store controlled by one software company). &lt;strong&gt;The term “Open Access” is not only the appropriate word to describe the negation of such anti-competitive behaviour, its usage in this context undermines its accepted meaning and creates confusion regarding the recommendation being proposed by the report.&lt;/strong&gt; The closest analogy to the recommendation of the report would perhaps be with the principle of “network neutrality” that stands for the network provider not discriminating between data packets being processed by them, either in terms of price or speed.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.9.&lt;/strong&gt; A major recommendation by the report involves creation of “a fund from savings generated from cash-less transactions … by the Central Government,” which will use “the trinity of JAM (Jan Dhan, Adhaar, Mobile) [to] link financial inclusion with social protection, contributing to improved Social and Financial Security and Inclusion of vulnerable groups/ communities” (page 160-161). &lt;strong&gt;This amounts to making Aadhaar a mandatory ID for financial inclusion of citizens, especially the marginal and vulnerable ones, and is in direct contradiction to the government’s statements regarding the optional nature of the Aadhaar ID, as well as the orders by the Supreme Court on this topic&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.10.&lt;/strong&gt; The report recommends that “Aadhaar should be made the primary identification for KYC with the option of using other IDs for people who have not yet obtained Aadhaar” (page 163) and further that “Aadhaar eKYC and eSign should be a replacement for paper based, costly, and shared central KYC registries” (page 162). &lt;strong&gt;Not only these measures would imply making Aadhaar a mandatory ID for undertaking any legal activity in the country, they assume that the UIDAI has verified and audited the personal documents submitted by Aadhaar number holders during enrollment.&lt;/strong&gt; A mandate for &lt;em&gt;replacement&lt;/em&gt; of the paper-based central KYC agencies will only remove a much needed redundancy in the the identity verification infrastructure of the government.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.11.&lt;/strong&gt; The report suggests that “[t]ransactions which are permitted in cash without KYC should also be permitted on prepaid wallets without KYC” (page 164-165). This seems to negate the reality that physical verification of a person remains one of the most authoritative identity verification process for a natural person, apart from DNA testing perhaps. &lt;strong&gt;Thus, establishing full equivalency of procedure between a presence-less transaction and one involving a physically present person making the payment will only amount to removal of relatively greater security precautions for the former, and will lead to possibilities of fraud&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.12.&lt;/strong&gt; In continuation with the previous point, the report recommends promotion of “Aadhaar based KYC where PAN has not been obtained” and making of “quoting Aadhaar compulsory in income tax return for natural persons” (page 163). Both these measures imply a replacement of the PAN by Aadhaar in the long term, and a sharp reduction in growth of new PAN holders in the short term. &lt;strong&gt;We appeal for this recommendation to be reconsidered as integration of all functionally separate national critical information infrastructures (such as PAN and Aadhaar) into a single unified and centralised system (such as Aadhaar) engenders massive  national and personal security threats&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.13.&lt;/strong&gt; The report suggest the establishment of “a ranking and reward framework” to recognise and encourage for the best performing state/district/agency in the proliferation of digital payments. &lt;strong&gt;It appears to us that creation of such a framework will only lead to making of an environment of competition among these entities concerned, which apart from its benefits may also have its costs. For example, the incentivisation of quick rollout of digital payment avenues by state government and various government agencies may lead to implementation without sufficient planning, coordination with stakeholders, and precautions regarding data security and privacy&lt;/strong&gt;. The provision of central support for digital payments should be carried out in an environment of cooperation and not competition.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.14.&lt;/strong&gt; CIS welcomes the recommendation by the report to generate greater awareness about cost of cash, including by ensuring that “large merchants including government agencies should account and disclose the cost of cash collection and cash payments incurred by them periodically” (page 164). It, however, is not clear to whom such periodic disclosures should be made. &lt;strong&gt;We would like to add here that the awareness building must simultaneously focus on making public how different entities shoulder these costs. Further, for reasons of comparison and evidence-driven policy making, it is necessary that data for equivalent variables are also made open for digital payments - the total and disaggregate cost, and what proportion of these costs are shouldered by which entities&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.15.&lt;/strong&gt; The report acknowledges that “[t]oday, most merchants do not accept digital payments” and it goes on to recommend “that the Government should seize the initiative and require all government agencies and merchants where contracts are awarded by the government to provide at-least one suitable digital payment option to its consumers and vendors” (page 165). This requirement for offering digital payment option will only introduce an additional economic barrier for merchants bidding for government contracts. &lt;strong&gt;We appeal to the Ministry of Finance to reconsider this approach of raising the costs of non-digital payments to incentivise proliferation of digital payments, and instead lower the existing economic and other barriers to digital payments that keep the merchants away&lt;/strong&gt;. The adoption of digital payments must not lead to increasing costs for merchants and end-users, but must decrease the same instead.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.16.&lt;/strong&gt; As the report was submitted on December 09, 2016, and was made public only on December 27, 2016, &lt;strong&gt;it would have been much appreciated if at least a month-long window was provided to study and comment on the report, instead of fifteen days&lt;/strong&gt;. This is especially crucial as the recently implemented demonetisation and the subsequent banking and fiscal policy decisions taken by the government have rapidly transformed the state and dynamics of the payments system landscape in India in general, and digital payments in particular.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Endnotes&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;[1]&lt;/strong&gt; See: &lt;a href="http://cis-india.org/"&gt;http://cis-india.org/&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[2]&lt;/strong&gt; See: &lt;a href="http://finmin.nic.in/reports/Note-watal-report.pdf"&gt;http://finmin.nic.in/reports/Note-watal-report.pdf&lt;/a&gt; and &lt;a href="http://finmin.nic.in/reports/watal_report271216.pdf"&gt;http://finmin.nic.in/reports/watal_report271216.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[3]&lt;/strong&gt; See: &lt;a href="http://finmin.nic.in/cancellation_high_denomination_notes.pdf"&gt;http://finmin.nic.in/cancellation_high_denomination_notes.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[4]&lt;/strong&gt; Open Access refers to “free and unrestricted online availability” of scientific and non-scientific literature. See: &lt;a href="http://www.budapestopenaccessinitiative.org/read"&gt;http://www.budapestopenaccessinitiative.org/read&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/comments-on-the-report-of-the-committee-on-digital-payments-dec-2016'&gt;https://cis-india.org/internet-governance/blog/comments-on-the-report-of-the-committee-on-digital-payments-dec-2016&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Sumandro Chattapadhyay and Amber Sinha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>UID</dc:subject>
    
    
        <dc:subject>Digital ID</dc:subject>
    
    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Digital Economy</dc:subject>
    
    
        <dc:subject>Digital Access</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Digital Security</dc:subject>
    
    
        <dc:subject>Data Revolution</dc:subject>
    
    
        <dc:subject>Digital Payment</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital India</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Demonetisation</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    

   <dc:date>2017-01-12T12:32:22Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/medianama-february-21-2022-amber-sinha-data-protection-bill-digital-healthcare-case-study">
    <title>Clause 12 Of The Data Protection Bill And Digital Healthcare: A Case Study</title>
    <link>https://cis-india.org/internet-governance/blog/medianama-february-21-2022-amber-sinha-data-protection-bill-digital-healthcare-case-study</link>
    <description>
        &lt;b&gt;In light of the state’s emerging digital healthcare apparatus, how does Clause 12 alter the consent and purpose limitation model?&lt;/b&gt;
        &lt;p&gt;The blog post was &lt;a class="external-link" href="https://www.medianama.com/2022/02/223-data-protection-bill-digital-healthcare-case-study/"&gt;published in Medianama&lt;/a&gt; on February 21, 2022. This is the second in a two-part series by Amber Sinha.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;In the &lt;a href="https://www.medianama.com/2022/02/223-data-protection-bill-consent-clause-state-function/"&gt;previous post&lt;/a&gt;, I looked at provisions on non-consensual data processing for state functions under the most recent version of recommendations by the Joint Parliamentary Committee on India’s Data Protection Bill (DPB). The true impact of these provisions can only be appreciated in light of ongoing policy developments and real-life implications.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To appreciate the significance of the dilutions in Clause 12, let us consider the Indian state’s range of schemes promoting digital healthcare. In July 2018, NITI Aayog, a central government policy think tank in India released a strategy and approach paper (Strategy Paper) on the formulation of the National Health Stack which envisions the creation of a federated application programming interface (API)-enabled health information ecosystem. While the Ministry of Health and Family Welfare has focused on the creation of Electronic Health Records (EHR) Standards for India during the last few years and also identified a contractor for the creation of a centralised health information platform (IHIP), this Strategy Paper advocates a completely different approach, which is described as a Personal Health Records (PHR) framework. In 2021, the National Digital Health Mission (NDHM) was launched under which a citizen shall have the option to obtain a digital health ID. A digital health ID is a unique ID and will carry all health records of a person.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;A Stack Model for Big Data Ecosystem in Healthcare&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;A stack model as envisaged in the Strategy Paper, consists of several layers of open APIs connected to each other, often tied together by a unique health identifier. The open nature of APIs has the advantage that it allows public and private actors to build solutions on top of it, which are interoperable with all parts of the stack. It is however worth considering both the ‘openness’ and the role that the state plays in it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even though the APIs are themselves open, they are a part of a pre-decided technological paradigm, built by private actors and blessed by the state. Even though innovators can build on it, the options available to them are limited by the information architecture created by the stack model. When such a technological paradigm is created for healthcare reform and health data, the stack model poses additional challenges. By tying the stack model to the unique identity, without appropriate processes in place for access control, siloed information, and encrypted communication, the stack model poses tremendous privacy and security concerns. The broad language under Clause 12 of the DPB needs to be looked at in this context.&lt;/p&gt;
&lt;p&gt;Clause 12 allows non-consensual processing of personal data where it is necessary “for the performance of any function of the state authorised by law” in order to provide a service or benefit from the State. In the previous post, I had highlighted the import of the use of only ‘necessity’ to the exclusion of ‘proportionality’. Now, we need to consider its significance in light of the emerging digital healthcare apparatus being created by the state.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The National Health Stack and National Digital Health Mission together envision an intricate system of data collection and exchange which in a regulatory vacuum would ensure unfettered access to sensitive healthcare data for both the state and private actors registered with the platforms. The Stack framework relies on repositories where data may be accessed from multiple nodes within the system. Importantly, the Strategy Paper also envisions health data fiduciaries to facilitate consent-driven interaction between entities that generate the health data and entities that want to consume the health records for delivering services to the individual. The cast of characters involve the National Health Authority, health care providers and insurers who access the National Health Electronic Registries, unified data from different programmes such as National Health Resource Repository (NHRR), NIN database, NIC and the Registry of Hospitals in Network of Insurance (ROHINI), private actors such as Swasth, iSpirt who assist the Mission as volunteers. The currency that government and private actors are interested in is data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The promised benefits of healthcare data in an anonymised and aggregate form range from Disease Surveillance to Pharmacovigilance as well as Health Schemes Management Systems and Nutrition Management, benefits which have only been more acutely emphasised during the pandemic. However, the pandemic has also normalised the sharing of sensitive healthcare data with a variety of actors, without much thinking on much-needed data minimisation practises.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The potential misuses of healthcare data include greater state surveillance and control, predatory and discriminatory practices by private actors which rely on Clause 12 to do away with even the pretense of informed consent so long as the processing of data is deemed necessary by the state and its private sector partners to provide any service or benefit.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Subclause (e) in Clause 12, which was added in the last version of the Bill drafted by MeitY and has been retained by the JPC, allows processing wherever it is necessary for ‘any measures’ to provide medical treatment or health services during an epidemic, outbreak or threat to public health. Yet again, the overly-broad language used here is designed to ensure that any annoyances of informed consent can be easily brushed aside wherever the state intends to take any measures under any scheme related to public health.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Effectively, how does the framework under Clause 12 alter the consent and purpose limitation model? Data protection laws introduce an element of control by tying purpose limitation to consent. Individuals provide consent to specified purposes, and data processors are required to respect that choice. Where there is no consent, the purposes of data processing are sought to be limited by the necessity principle in Clause 12. The state (or authorised parties) must be able to demonstrate necessity to the exercise of state function, and data must only be processed for those purposes which flow out of this necessity. However, unlike the consent model, this provides an opportunity to keep reinventing purposes for different state functions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the absence of a data protection law, data collected by one agency is shared indiscriminately with other agencies and used for multiple purposes beyond the purpose for which it was collected. The consent and purpose limitation model would have addressed this issue. But, by having a low threshold for non-consensual processing under Clause 12, this form of data processing is effectively being legitimised.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/medianama-february-21-2022-amber-sinha-data-protection-bill-digital-healthcare-case-study'&gt;https://cis-india.org/internet-governance/blog/medianama-february-21-2022-amber-sinha-data-protection-bill-digital-healthcare-case-study&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>amber</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Data Governance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2022-03-01T15:07:44Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
