Personal Data
Protection Bill

The Personal Data Protection Bill isn’t
focused on localisation
The scope of the bill
The Personal Data Protection Bill isn’t focused on localisation, whereas data transfer policies are designed to protect personal data which is identified as sensitive or critical.
The bill assigns the higher accountability requirements to the data fiduciaries who will be required to:
1
 
Conduct data protection impact assessment
2
 
Employ a DPO
3
 
Keep the records of data processing
4
 
Audit the processing activities
How SearchInform
solutions can help?
Processing and detection
SearchInform solution alerts to suspicious events, supervises user communication and data transfer detecting unsanctioned usage of confidential information. Deployment of the software in your system will allow you to assess whether the introduced controls and policies are sufficient and meet security standards.
Criminal penalties
As for the violations committed by the company and fines defined in the Bill, the regulation can impose penalties on any person who “was in charge of and was responsible to the company for the conduct of the business of the company.”
Classification
of vulnerable data
Anonymised data definition gets introduced in the Bill. The anonymisation standards will allow to render data non-personal. The attention to the data anonymisation and further processing initiated by the regulator and government in order to strengthen the competitiveness of India’s e-commerce sector should positively impact safety of the anonymisation process.
Search for content
SearchInform solutions perform search for sensitive content in documents and classify files by tagging and applying specific policies to them. Significant data fiduciaries will be notified by the Data Protection Act based on the amount and confidentiality of the stored and processed information.
SearchInform DLP in the cloud: test the solution!
By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.
Letter Subscribe to get helpful articles and white papers. We discuss industry trends and give advice on how to deal with data leaks and cyber incidents.