Amazon Skips JPC… There is no need for summons

The Joint Parliamentary Committee (JPC) on Personal Data Protection Bill 2019 appears to have felt  insulted by the refusal of Amazon to attend the JPC and there are suggestions in the media that the JPC should issue a privilege notice and force their presence before the JPC.

It is understandable that JPC has delayed the completion of its proceedings because they wanted to give time to organizations like Face Book, Google, Twitter or Amazon to appear before the committee. This was a matter of courtesy.

But these organizations are interested more in delaying the passage of the bill and if they feel that the JPC would not finalize the Bill before they hear these big guys, it would be an incentive for them to find more excuses to delay their appearance.

The approach of the JPC to summon an unwilling organization through a “Privilege” excuse is self defeating.

It is also not understandable that the Business Standard report   suggests that questions were asked by the committee members to Face Book on how much tax they paid etc. These are again not the issues on which JPC should be concerned and diverting the JPC to issues other than the suggestions on PDPB 2019 appears irrelevant and diversionary.

We must understand that this JPC is not like the IT Standing committee. The objective of this JPC is to ensure that as much of opinion is gathered as possible so that the bill when passed would be well drafted. To this end they can try to collect as many opinions as possible. Most of the views of experts are already with the committee in the form of written submissions. The JPC invitation is only to get more clarity on the subject by interacting with domain experts.

Probably the JPC is being mislead to get into areas which are outside the scope of PDPB 2019 forcing further delay in its passage and this should be corrected.  Such an approach will provide grounds to challenge the recommendations of the JPC later in the Courts.

Business organizations like Amazon as well as Google of Face Book have vested interests and their views  are expected to be skewed against the interests of the larger public good. If a company like Amazon does not want to attend the JPC, it means that they donot have any views to submit and will accept whatever law comes into force. Unlike Google of Face Book, Amazon does not have a history of challenging the Government regulations and it appears that they would be happy to work as the law of the land dictates.

If Amazon attends the JPC, it can only say that they donot want data localization or that the financial information should not be considered as “Sensitive”. These will only support the detractors of the Bill and those who oppose data sovereignty. It will not help in the drafting of a better law.

I therefore urge the JPC to ignore the non attendance of Amazon and conclude the proceedings at the earliest.

Whatever efforts the JPC takes in good faith in collecting the views of the large MNCs, the opposition to the bill will continue to exist and there will be some litigation that will follow on the principles of data sovereignty, data localization etc., unless the JPC is interested in making the law as per the dictates of the large corporations.

Further, if the JPC gives a perception that Amazon’s views are essential to pass an Indian law, they would be undermining the status of the JPC and the Indian Parliament itself.

A question will also arise why a similar summons were not sent to the Indian e-Commerce companies or IT Companies having a huge stake in Data Protection.  There may be a perceived discrimination against Indian players such as Jio or TCS or Infosys who also may be invited through summons and obtain their views.

It is therefore strongly felt that  JPC should refrain from making the non attendance of Amazon an issue to give them a second hearing as if their views are critical to the passage of the Bill. If Amazon is important, why not Flipkart, BigBasket, Jio Mart, PayTM, all of whom will have their own views as important as that of Amazon.

We respect Amazon for its E Commerce but we donot think that they should be given a privilege to dictate the framing of Indian law or even left feeling that they are big enough for the Joint Parliamentary Committee of the sovereign Indian Parliament to hold the passage of the legislation begging for their views to be provided.

We have already lost lot of time and the recent data breaches in Breach Candy, Dr Lal Pathlabs and Dr Reddy laboratories indicate that international hackers are making a merry of the lawlessness on data protection and will continue to do so until the organizations implement better security measures in the fear of the PDPA (India).

We believe that all the recent data breaches are genuine breaches and occurred because the organizations were naïve enough not to have a passwords to their cloud data storage.

I however donot rule out the possibilities of other organizations taking a cue from these organizations and start faking the data breaches to sell their data to hackers. Such frauds are common in the Insurance area where organizations often fake fire accidents to claim insurance claims. (Many politicians might have also used such fake “Fire Accidents” to get incriminating documents destroyed.).

Given the value of medical and financial data in the dark web close to us$100 per data set, if a company has a few million such records, faked hacking can be a way of selling the data if the company or any of its executives want to make a million dollar bonanza stashed away in the form of Bitcoins, which again, our Government and the Supreme Court through their magnanimity  have allowed to remain in our economy as a currency of criminals and a currency of digital black wealth. (Message for Mr Modi for his Mann Ki Bath)

Passage of PDPB 2019 without further delay is therefore essential and the JPC should conclude the proceedings at the earliest and submit its recommendations. It will take further time for the DPA to be established and regulations to be compiled. But the companies will atleast be put on notice on the 4% of global turnover as possible administrative penalty if they ignore PDPA provisions.

If necessary, we can always make an amendments after passage. We know that California Consumer Privacy Act (CCPA) got amended about 7 times after its initial passage before it was due to become operative. There is no issue therefore of amending the Act say after about an year of its passage incorporating some of the experiences during that period.

Naavi

 

 

Posted in Cyber Law | Leave a comment

Covid becomes an agent of Change in the Privacy scenario

The incidence of Covid and the forced need for Work From Home (WFH) as a part of an organizational culture is a disruptive change to our life style that all of us need to adopt and adapt.

As Covid appears to be peaking out, companies have reached a stage where they will have to re-assess their strategies on how to return to their earlier operational methods or retain the current norm as the “New Normal”.

In all ISMS concepts, we try to identify what is “Reasonable”, “Commensurate with the Risks” and “Best Industry Practices” based on which we chose options.  The “New Normal” if accepted now makes it necessary for us to consider whether our current practices require a permanent change.

For example the WFH situation has made

a) BYOD as more the norm than an exception. Access devices are mostly the laptops of the individuals where the user has to also manage his personal banking transactions, e-commerce, gaming, personal communication, entertainment etc. unless it is  possible for every body to maintain a separate laptop for office purpose.

b) Physical security as less relevant than before as the heavily guarded corporate premises with access controls at the gate, biometric attendance, electronic door locks have been replaced by the home offices where workers work from their bed room, with children falling over the laptops, friends, relatives and family members walking all over.

c) The monitoring of the worker with  a centralized IS department has lost its meaning since even the CISO may be operating from his drawing room on his laptop

d) Security is therefore confined to network access security fortified by the integrity of the individual

e) Firewalls have to be liberal to accommodate access through public networks and monitoring of logs has become a bigger challenge as one has to watch a distributed work force.

f) The contractual agreements where the company had committed that the operations will be carried out in a given premises with audit access to the customer etc has lost meaning since hither to one building floor which housed 1000 workers has now spread out into 1000 different households in different towns and cities.

If we donot appreciate this change and be prepared to accept that all our principles of Information security require a complete overhaul, then we are cheating ourselves.

Hence rigid information security management systems based on international standards need to be flexible with appropriate work arounds.

In terms of Privacy, it is time for us to realize that “Privacy” as a right under Article 21 of the Indian constitution subject to “Reasonable Exemptions” under Article 19(2), needs to be revisited to set proper priorities between Article 21 and Article 19.

Perhaps we need to reverse the priorities between the two articles and recognize that Privacy is a right under the “Right to Security” that is indicated as Article 19(2) as a sub part of the Right to Freedom of Expression.

I am sure that some of the committed Privacy activists would swear by the Puttaswamy judgement and the last word on Privacy has been laid in stone.

However, we must appreciate that Puttaswamy judgment was a view in the Pre-Covid situation and may need a re-look in the Post-Covid situation. The need for such a question arose in the Aarogya Setu app where the debate was whether an individual’s right to privacy was higher than the right of another individual’s right to remain at a safe distance from the pandemic risk.

If Aarogya Setu is mandatory for Mr A because Mr B wants to know if it is safe to come near that person or having come near that person and later the person being adjudged covid +ve Mr B wants to be made aware of the risks, then the decision on what is correct or wrong depends on whether the Right to Security of B is as much or more valuable than the Right to Privacy of Mr A.

Similarly, in the Cyber Crime prevention scenario, insisting on Aadhaar as an ID for a certain service is violation of privacy or is a security measure also need to be re-assessed.

Some puritans may wonder, whether we can question the Constitution, disagree with what is written in the constitution and what the Supreme Court has interpreted. But it is necessary for us to also remember that our constitution has been amended more than 100 times. Many of these amendments have been against the basic concept of equality and justice to all because they were held inconsistent with the right to correct the past oppression of a section of the society.

Hence what the Constitution or the Supreme Court says today is only a temporary guideline and “Jurisprudence” is always under development and may change the concepts which we otherwise may consider as set in stone.

The ISMS practitioners and Data Protection professionals need to therefore have an open mind to recognize that the Post Covid information management is a new era and many of the principles which we thought as sacrosanct in the past may need to be amended.

Data protection professionals also therefore need to be flexible enough to adapt to the new norm and shed their dogmas.

As an example if ISO 27001 was the bible of Information Security practice so far, it need not be so in the coming days. May be PDPSI is the Bhagavadgita of Data Security and can be more relevant and effective as the ISMS guide in the Post Covid era.

Naavi

(Comments and Criticisms welcome)

Posted in Cyber Law | Leave a comment

FDPPI launches 2nd Batch of Certification Training on Global Laws

Posted in Cyber Law | Leave a comment

ITA 2000/8 needs further changes

It is time to recall that on 17th October 2020, we have completed 20 years of the existence of Information Technology Act 2000. The one major amendment made to the Act was in 2008.  With the passage of Personal Data Protection Act some time in 2021, there will be another major amendment to ITA 2000. On that occassion apart from deletion of Section 43A, more amendments may be considered.

Naavi has suggested many times the changes required to be made to ITA 2008 and some of the articles regarding such suggestions are given below.

Drawing the attention of T K Vishwanathan Committee on ITA 2000 amendments
Proposed Amendments to ITA 2000 and Privacy Protection
Redefining the scope of ITA 2008.. in the amendments..
Suggestions on Modification of ITA 2008
Domain Name Regulation in ITA 2000..to be amended
ITA 2000/8 will remain the supreme Data Protection Law of India

Looking beyond the earlier suggestions, we need to think about the following six changes to ITA 2000.

  1. Introduce mandatory verified account tag to social media posts (as proposed in PDPB 2019 where it is optional) to eliminate fake accounts and reduce the fake news incidence.
  2. Reintroduce equivalent of Section 66A to recognize “Offences through Messages” as distinguished from “Offences through publication”
  3. Re issue the Section 79 notification for “Tracking” of messages
  4. Prevent phishing websites by making domain registrars accountable to check identity of domain registrants
  5. Introduce a controller of Mobile of Apps and Games to regulate malicious apps and games
  6. Ban Crypto currencies to choke the economy of the dark web

Naavi

Also see: 20 years anniversary of ITA 2000 

 

Posted in Cyber Law | Leave a comment

20th year Anniversary of ITA 2000

Posted in Cyber Law | Leave a comment

Dr Lal Pathlabs is ISO 27001 Certified… but stored sensitive data callously

Naavi.org was in the forefront of raising objection to the Section 43A rules of the MeitY in 2011 where the MeitY insisted that “ISO 27001 compliance” is deemed compliance of Section 43A.

When I first wrote Is India selling itself out to ISO 27001?” or Has MIT issued the guidelines without proper evaluation?Is DIT misleading the Public”? etc.,  the Kapil Sibal led ministry was extremely unhappy because it was pointed out that if all Indian companies were made to undergo ISO27001, there would be a huge and useless burden on the industry.

Now that Section 43A is coming to the end of its lifetime and would be replaced by the Personal Data Protection Act,  it is time to recall how Naavi’s concern that giving a prominence to ISO 27001 as “Deemed Compliance of Section 43A” was a blunder of the MeitY.

Dr Lal Pathlabs has given a perfect example to justify the point which I made in 2011 which the MeitY brushed aside.

Now going by the press reports, Dr Lal Pathlabs compromised millions of sensitive personal information of Indian public by storing them in Amazon cloud without a password.

Techcrunch.com reports as under:

Quote:

Unquote:

Techcrunch also reports that the security loophole has since been closed, meaning that a password has now been set.

However what surprises me is that the website of Dr Lal Pathlabs does not show any information on the data breach. There is no information about CERT IN having asked for a report on the data breach as per powers available and duty cast on them under Section 70B of ITA 2000/8.

The “Privacy Policy” on the website covers only the information collected on the website and does not give clarity about the policies and practices related to the collection of information on their services.

The Privacy policy inter-alia suggests as follows:

Quote:

Information security

The Company has implemented appropriate security practices and standards and has a comprehensive documented information security programme and information security policies that contain managerial, technical, operational and physical security control measures that are commensurate with the information assets being protected with the nature of business. Further, the Company takes appropriate security measures to protect against unauthorized access to or unauthorized alteration, disclosure or destruction of data and restricts access to your personal data to the Company’s employees who need to have that information in order to fulfil your request or supply our services

Unquote:

This indicates that the privacy policy has been drafted in accordance with the words contained in Section 43A guidelines.

It is therefore not surprising to note that the company also sports ISO 27001 as one of its accreditations

It would be interesting to find out who gave the ISO 27001 accreditation to this company and with what scope and whether that would continue to be used even after the report of the current breach or would be withdrawn.

It is time for the industry to consider that ISO27001 is only a guidance tool and it cannot be considered as a stamp of everything being in order regarding the information security implementation in an organization.

I recall the reply I had received on 11th July 2011 from Mr Prafulla Kumar  of DIT which stated as follows

However the notification contained the words

“A body corporate or a person on its behalf shall be considered to have complied with reasonable security practices and procedures, if they have implemented such security practices and standards and have a comprehensively documented information security programme and information security policies that contain managerial, technical, operational and physical security control measures that are commensurate with the information assets being protected with the nature of business.

In the event of an information security breach, the body corporate or a person on its behalf shall be required to demonstrate, as and when called upon to do so by the agency mandated under the law, that they have implemented security control measures as per their documented information security programme and information security policies.”

“The international Standard IS/ISO/IEC 27001 on “Information Technology – Security Techniques – Information Security Management System – Requirements” is one such standard referred to in sub-rule (1).”

In view of the above, despite the clarification provided to me directly, MeitY continued to give an impression to the public that ISO 27001 is a “Deemed Section 43A compliance”.

This false impression created by the MeitY is the reason why Dr Lal Pathlabs type of companies continue to ignore information security in its real sense and opt to buy the certification and remain complacent that every thing is fine with them.

I call upon the MeitY to clarify whether they are prepared to withdraw their endorsement of ISO 27001 at least now.

Making mistake once is understandable.

Standing on the ego and justifying it is undesirable.

But Not making amends and not apologizing for the mistake even after it is seen how an “ISO 27001 certified company can have sensitive data in Amazon storage without a password”, is unpardonable.

The data breach raises similar questions on other accreditation agencies like the CAP, NABL etc., who have to withdraw their certifications or at least conduct an enquiry and re-establish the credentials.

I also call upon the NSE and BSE to clarify whether Dr Lal Pathlabs filed any report with them that there was a data breach, there could be a PIL or Government penal action on the company and as a result there could be a financial risk to the share holders of the company.

We will continue to watch if the Clause 49 declaration applicable to listed companies will report the breach to the share holders in the annual report and whether the statutory auditors report the same in their audit reports.

(P.S: Deloitte Haskins & Sells LLP was the auditors of the Company some time back. After the ILFS fiasco, Deloitte could have faced some sanctions barring them from continuing their audit work.  It appears that the matter is with NCLT).

There were 5 independent directors of the Company who also have many questions to answer along with the Company secretary.

I have also pointed out earlier that Adjudicating officers in multiple states can start an enquiry under Section 46 of ITA 2000 on the incident and  PIL can be filed in any High Courts or the Supreme Court, provided the matter is considered as a serious privacy breach. Otherwise all the “I Love Puttaswamy Judgement” statements of privacy activists will only be considered as a TRP hogging drama.

Unless the regulatory authorities take such data breaches seriously and use it to define the future direction of compliance, such incidents will continue to happen in future.

Naavi

Also view the article on the420.in: 

Posted in Cyber Law | Leave a comment