25.01.2018 Views

white_paper_on_data_protection_in_india_171127_final_v2

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

esults from this cha<strong>in</strong> of process<strong>in</strong>g it will be difficult to adequately allocate resp<strong>on</strong>sibility.<br />

While the pr<strong>in</strong>ciple of jo<strong>in</strong>t and several liability may be applied, it could be unfair to <strong>data</strong><br />

c<strong>on</strong>trollers who have genu<strong>in</strong>ely taken all care and diligence to safeguard the <strong>in</strong>dividual from<br />

harm. On the other hand, hav<strong>in</strong>g such a str<strong>in</strong>gent norm could be what is required to ensure<br />

that the <strong>data</strong> c<strong>on</strong>trollers take adequate efforts to ensure that any<strong>on</strong>e down the cha<strong>in</strong> who is<br />

given access to the <strong>data</strong> takes care to ensure that it does not result <strong>in</strong> any harm. This may be<br />

effectuated by <strong>data</strong> c<strong>on</strong>trollers tak<strong>in</strong>g <strong>in</strong>demnities aga<strong>in</strong>st harm be<strong>in</strong>g caused to the <strong>data</strong><br />

subject ow<strong>in</strong>g to any process<strong>in</strong>g <strong>in</strong> this cha<strong>in</strong>. This is c<strong>on</strong>s<strong>on</strong>ant with the basel<strong>in</strong>e pr<strong>in</strong>ciple<br />

that harm suffered by an <strong>in</strong>dividual should not rema<strong>in</strong> unredressed.<br />

(iii) Audit<br />

Harms that result from improper process<strong>in</strong>g of <strong>data</strong> are not always immediately evident. For<br />

<strong>in</strong>stance, <strong>in</strong> many cases, the bias <strong>in</strong>herent <strong>in</strong> the decisi<strong>on</strong> mak<strong>in</strong>g algorithms is not<br />

immediately discernible. It is <strong>on</strong>ly after a large number of people suffer from improper<br />

process<strong>in</strong>g that we come to realise the harm that is be<strong>in</strong>g caused. This could well be too late<br />

and <strong>in</strong> order to appropriately protect the <strong>in</strong>dividual the law must suggest proactive measures<br />

that detect these harms early enough. Thus, <strong>in</strong> additi<strong>on</strong> to requir<strong>in</strong>g that pers<strong>on</strong>al <strong>data</strong><br />

process<strong>in</strong>g bey<strong>on</strong>d certa<strong>in</strong> scales must be commenced <strong>on</strong>ly after hav<strong>in</strong>g <strong>in</strong> place a policy or<br />

prescribed organisati<strong>on</strong>al procedure, there could be provisi<strong>on</strong>s for audits (both <strong>in</strong>ternal and<br />

external). This would be critical <strong>in</strong> implement<strong>in</strong>g the sec<strong>on</strong>d limb of accountability, i.e.<br />

ma<strong>in</strong>ta<strong>in</strong><strong>in</strong>g the burden of proof of compliance <strong>on</strong> the <strong>data</strong> c<strong>on</strong>troller. A requirement of audit<br />

would mean that the <strong>data</strong> c<strong>on</strong>troller must ma<strong>in</strong>ta<strong>in</strong> records of measures and processes which<br />

could provide proof of compliance of <strong>data</strong> protecti<strong>on</strong> pr<strong>in</strong>ciples.<br />

(iv) Security Safeguard Obligati<strong>on</strong>s<br />

Appropriate technical and organisati<strong>on</strong>al measures to ensure security of pers<strong>on</strong>al <strong>data</strong> are<br />

central to the pr<strong>in</strong>ciple of accountability. These measures should be <strong>in</strong>-tune with the cyber<br />

threats of today. At the same time, these security obligati<strong>on</strong>s should keep <strong>in</strong> m<strong>in</strong>d the costs of<br />

implementati<strong>on</strong> of such measures which have to be kept operati<strong>on</strong>al c<strong>on</strong>stantly as security<br />

and privacy breach protecti<strong>on</strong> require c<strong>on</strong>stant assessment and report<strong>in</strong>g.<br />

The EU GDPR provides general security obligati<strong>on</strong>s that the <strong>data</strong> c<strong>on</strong>troller and the processer<br />

must follow. These are summarised below:<br />

a. Obligati<strong>on</strong> to assess the risks and implement security measures to mitigate those risks.<br />

b. These risks are of vary<strong>in</strong>g likelihood and severity for the rights of <strong>in</strong>dividuals, <strong>in</strong><br />

particular from accidental or unlawful destructi<strong>on</strong>, loss, alterati<strong>on</strong>, unauthorized<br />

disclosure of, or access to pers<strong>on</strong>al <strong>data</strong> transmitted, stored or otherwise processed.<br />

c. Obligati<strong>on</strong> to tra<strong>in</strong> staff hav<strong>in</strong>g access to pers<strong>on</strong>al <strong>data</strong> <strong>on</strong> the steps to follow <strong>in</strong> case of<br />

a <strong>data</strong> breach (adopt an <strong>in</strong>cident resp<strong>on</strong>se plan).<br />

150

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!