Monthly Archives: December 2019

How the structure of PDPA 2019 has changed

The PDPA contained 112 sections divided into 15 chapters. The new version PDPA 2019 contains 98 sections and is structured as follows: Chapter Sections Title I 1-3 Preliminary II 4-11 Obligations of Data Fiduciary III 12-15 Grounds for processing personal … Continue reading

Posted in Cyber Law | Leave a comment

PDPA 2019 is shorter and Data Localization is relaxed

The first thing we notice is that the PDPA 2019 (draft) contains 98 sections instead of 112 sections in the earlier Bill and also omits one schedule regarding the amendment to RTI. The change regarding the data localization could be … Continue reading

Posted in Cyber Law | Leave a comment

New Version of PDPA is now available

A version of the PDPA which is slightly different from the earlier version is now available and though not confirmed, could be the bill which will be presented in the Parliament in the next few days. A copy of the … Continue reading

Posted in Cyber Law | Leave a comment

Personal Data Protection Bill New Version expected to be made public any time

It is reported that the Union Cabinet has approved a version of the Personal Data Protection Bill to be tabled in the Parliament. It is expected that the Bill will be tabled any time. The industry observers are waiting eagerly … Continue reading

Posted in Cyber Law | Leave a comment

PDPA principle recommended for adoption in US also in the new Federal Privacy Bill, COPRA

Justice Sri B N Srikrishna drafted the Personal Data Protection Act of India is now in consideration for the Parliament to be passed into an Act. In the meantime, in a big boost to the Indian version of the privacy … Continue reading

Posted in Cyber Law | Leave a comment

Homomorphic Encryption could be the new tool in Privacy Protection

In all information security problems, we consider “Security at Data Level” involving “Encryption” as a very important tool. When data is at rest, it is possible to store it in encrypted form so that even if access is compromised,  the … Continue reading

Posted in Cyber Law | Leave a comment