The 
  Sun Report in UK on 
  leakage of information about 1000 Credit Card numbers  from an Indian BPO 
  just when news about 40 million credit card details leaked in USA, appears to 
  be  an effort to move away the discussion from the status of Data 
  Security in USA vis a vis India. 
  Under such circumstances quite 
  often we hear complaints that the absence of a specific Data Protection Act in 
  India is a matter of concern for the BPO service buyers from abroad. It is 
  strange that many top IT professionals and persons from the legal profession 
  also seem to endorse the view that "If there is no Act by name Data Protection 
  Act, then there is no protection for Data in India"
  Let us see if this view has 
  any basis.
  If we properly look at the 
  ITA_2000 it appears that whether by design or otherwise, ITA-2000 does address 
  the major issues which a new law on data protection is expected to do.
  For example ITA-2000 not only 
  recognizes any attack on Data as an offence both for criminal and civil 
  penalties, but also addresses the issues of technical facilitation of data 
  protection and a good system of grievance redressal.
  For example, ITA-2000 
  addresses Data Protection  from the following perspectives. 
  
  a)      Criminal 
  offence is recognized when data is unauthorizedly accessed
  
  b)      Civil 
  liabilities recognized when data is unauthorizedly accessed or assistance is 
  provided for such access.
  
  c)      
  Accountability and protection during storage or transit facilitated in a 
  legally approved manner.
  
  d)      Definition 
  of data extends to all forms of digital documents including database, audio 
  and video files, digital data stored on credit cards etc.
  
  e)      Grievance 
  Redressal mechanism includes “Fast Track Courts”.
   The reason why such a view 
  can be inferred from ITA-2000 is as follows:
   Recognition of Criminal 
  Offence: 
  According to ITA-2000, whoever 
  affects any information residing in a computer resource injuriously by any 
  means, is liable to be punished with imprisonment up to three years, or 
  with fine which may extend up to two lakh rupees, or with both (This 
  section can be invoked even when the action is  without intention to cause 
  loss to any person, provided  he had knowledge that his action could cause 
  such loss).
   “Affecting injuriously” can 
  cover loss of confidentiality as well as alteration, deletion etc.
   Recognition of Civil 
  Liability:
   If any person without 
  permission of the owner or any other person who is in-charge of a computer, 
  computer system or computer network  accesses or secures access to such 
  computer, computer system or computer network he shall be liable to pay 
  damages by way of compensation not exceeding one crore rupees to the 
  person so affected.
   If any person without permission of the owner 
  or any other person who is in-charge of a computer, computer system or 
  computer network  provides any assistance to any person to 
  facilitate access to a computer,  computer system or computer network in 
  contravention of the provisions of this  Act, rules or regulations made there 
  under, he shall be liable to pay damages by way of compensation not exceeding 
  one crore rupees to the person so affected.
  Thus Indian law recognizes civil liability upto 
  Rs 1 crore for the mere “Access of Data without permission” or for any form of 
  "assistance" in this regard which may perhaps include inadequate custody of 
  password user terminal, or access token which is used by another for 
  committing the offence.
  we cannot expect anything better from an 
  exclusive Data Protection Act except perhaps increasing the limit on the 
  liability or the period of imprisonment.
  Accountability and 
  Protection of data during storage or transit: 
  ITA-2000 recognizes “Digital 
  Signatures” which include a “Hashing Mechanism to protect data integrity” and 
  “Public Key encryption to ensure authentication”. If every data transmitted is 
  digitally signed, there is non repudiable accountability. 
  If encryption is used with 
  originator’s public key, data confidentiality is protected from every body 
  else. If it is encrypted with the recipient’s public key data confidentiality 
  is ensured against every one other than the intended recipient. 
  Additionally, innovative use 
  of “Hashing” and use of a “Enterprise level Data Storage Private Key” can 
  ensure that data in storage is protected and made available on “Need to Know 
  basis”  as mandated by EU Data protection principles. 
  Data protection in storage and 
  transmission is part of the implementation issue which is part of the 
  compliance audit system. 
  Definition of Data 
  According to ITA-2000, 
  
    "Data" means a representation of information, 
    knowledge, facts, concepts   or instructions which are being prepared or 
    have been prepared in a formalised   manner, and is intended to be 
    processed, is being processed or has been   processed in a computer system 
    or computer network. ,.and may be in any form   (including computer 
    printouts magnetic or optical storage media, punched   cards, punched tapes) 
    or stored internally in the memory of the computer;
    "Computer Database" means a 
    representation of information, knowledge,   facts, concepts or instructions 
    in text, image, audio, video that are being  prepared or have been prepared 
    in a formalised manner or have been produced by   a computer, computer 
    system or computer network and are intended for use in a   computer, 
    computer system or computer network;
  
   It may be noted that the 
  above definition includes even printouts, punched cards etc. 
  Thus the definition of data is 
  wide and covers all the requirements of the IT industry.
  Grievance Redressal
   The civil liabilities 
  under ITA-2000 are subject to adjudication through an adjudication officer 
  appointed under the Act.  
  Such adjudicating officers are 
  already available in all States of India and comprise of the IT Secretary of 
  the State who is  IT savvy. 
  The adjudicator is not bound 
  by Civil Procedure Code, can resort to online dispute resolution mechanism and 
  is expected to resolve conflicts normally within 4 months through an enquiry 
  process extendable by another two months if required. His decisions will 
  however be equivalent to that of a civil court and appealable to the High 
  Court (In the absence of an appellate tribunal which is yet to be 
  commissioned).
   According to the Act, it is 
  mandatory to settle civil disputes through the adjudicator and hence even if 
  one of the parties like to delay proceedings with judicial intervention, it is 
  not possible at the stage below the High Court. 
  In summary, we can state that 
  there are enough provisions in ITA-2000 which make the demand for a separate 
  data protection act redundant.
  Perhaps some “Due Diligence 
  Guidelines “ will emerge in due course. CyLawCom process advocated by Cyber 
  Law College is already addressing this issue in its recommendations.
  Where  Action is Required:
   It is however accepted that 
  there has been a feeling in the industry and international markets that the 
  absence of data protection laws is a huge drag on the reliability of Indian 
  BPOs. 
  Also some provisions of 
  ITA-2000 discussed above have not been recognized by the parties concerned and 
  hence there is no recognition that just as ITA-2000 is some times called a 
  "Digital Signature Law", there is no harm in calling it a "Data Protection 
  Law" also. 
  For example, one area where 
  such ignorance prevails is on the role adjudicators. It is possible that many 
  of the adjudicators may not know their powers and responsibilities. Many 
  corporate legal advisors may be equally in the dark about the benefits of 
  adjudication and fail to recommend this process for dispute resolution. 
  Perhaps some Courts also might not have realized the lack of  
  jurisdiction in matters coming under Chapter IX of ITA-2000.
  Need for a Security BPO for 
  BPOs
  If despite a robust data 
  protection law, India has to still face criticism of the ignorant 
  international community, one of the main reasons is  lack of proper 
  education regarding  the provisions of ITA-2000. Additionally there are 
  other issues such as the employee fraud factor which is a problem which cannot 
  be tackled except with a multifaceted approach to Information Security in BPOs.
  These problems  need to 
  be addressed on a war footing by all stake holders such as the IT industry, 
  Ministry of Communications and  Information Technology and Nasscom.
  IT industry in India 
  has unfortunately not exhibited a long term vision and has not been able to 
  harness the long term business potential of some of the spin offs from 
  ITA-2000. It is high time that the top companies in the industry 
  realize that instead of crying that there is no Data Protection Law in India, 
  they can contribute to the strengthening of the Data Protection environment in 
  India with their participation in some of the projects pioneered by Naavi.org 
  such as the Cyber Evidence Archival Center, Arbitration.in, CyLawCom.org etc.  
  so that  international community may feel confident about the Indian 
  Cyber Security system. 
  Ministry of Communications 
  and Information Technology (MCIT) should also realize that instead of 
  trying to re-invent the wheel and making wholesale changes to ITA-2000, they 
  should invest in educating the industry on the existing laws and also 
  participate in  existing projects such as Cyber Evidence Archival, 
  Arbitration.in and CyLawCom, if necessary through the enormous funds they have 
  allocated for e-Governance projects. This will help in the full realization of 
  the potential of these projects and also project India to world leadership in 
  Information Security.
  Nasscom also has a 
  significant  role in creating an awareness of the  data protection 
  aspects enshrined in ITA-2000. It can also help bringing together industry 
  participation towards implementation of CyLawCom audit standards across the 
  BPO industry and improving the grievance redressal system with the 
  introduction of online dispute resolution mechanisms as proposed by 
  arbitration.in.
  Let us hope that at least in 
  the second half of 2005, when MCIT is addressing the issue of reviewing 
  ITA-2000 and Nasscom is addressing the post Mphasis Fraud security issues, 
  some of the points raised here in will get the attention due to them. 
  If Indian BPO industry has to 
  realize its ambitions despite the security issues and the international 
  pressure against outsourcing, many of the suggestions made here in require to 
  be addressed with a BPO for BPOs in which MCIT and Nasscom will 
  have joint stakes with the IT industry. 
  Naavi.org makes an open offer 
  to MCIT and Nasscom to share its vision of the BPO for BPOs so 
  that a  security blanket can be drawn for the Indian BPOs that would 
  ensure security for the information that the industry is expected to handle.
  
  (Comments 
  welcome)
  Naavi
  June 24,2005
  
 
   
 
  
  Comments 
  are welcome