Congratulations!

[Valid RSS] This is a valid RSS feed.

Recommendations

This feed is valid, but interoperability with the widest range of feed readers could be improved by implementing the following recommendations.

Source: http://www.naavi.org/wp/?feed=rss2

  1. <?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
  2. xmlns:content="http://purl.org/rss/1.0/modules/content/"
  3. xmlns:wfw="http://wellformedweb.org/CommentAPI/"
  4. xmlns:dc="http://purl.org/dc/elements/1.1/"
  5. xmlns:atom="http://www.w3.org/2005/Atom"
  6. xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
  7. xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
  8. >
  9.  
  10. <channel>
  11. <title>Naavi.org</title>
  12. <atom:link href="https://www.naavi.org/wp/feed/" rel="self" type="application/rss+xml" />
  13. <link>https://www.naavi.org/wp</link>
  14. <description>Towards building Cyber Jurisprudence in India</description>
  15. <lastBuildDate>Tue, 23 Apr 2024 03:19:30 +0000</lastBuildDate>
  16. <language>en-US</language>
  17. <sy:updatePeriod>
  18. hourly </sy:updatePeriod>
  19. <sy:updateFrequency>
  20. 1 </sy:updateFrequency>
  21. <generator>https://wordpress.org/?v=6.0.3</generator>
  22.  
  23. <image>
  24. <url>https://www.naavi.org/wp/wp-content/uploads/2015/08/cropped-naavi_lecture2-32x32.jpg</url>
  25. <title>Naavi.org</title>
  26. <link>https://www.naavi.org/wp</link>
  27. <width>32</width>
  28. <height>32</height>
  29. </image>
  30. <item>
  31. <title>Nip this Apple air-pod in the bud.</title>
  32. <link>https://www.naavi.org/wp/nip-this-apple-air-pod-in-the-bud/</link>
  33. <dc:creator><![CDATA[Vijayashankar Na]]></dc:creator>
  34. <pubDate>Tue, 23 Apr 2024 02:59:55 +0000</pubDate>
  35. <category><![CDATA[Cyber Law]]></category>
  36. <guid isPermaLink="false">https://www.naavi.org/wp/?p=17032</guid>
  37.  
  38. <description><![CDATA[The article published yesterday about &#8220;Digital Marketing&#8221; and its future in the society increasingly becoming sensitive to Privacy issues has evoked a few responses from other professionals. One such response worth noting is the linked in article &#8220;Neuro Data, Capitalism &#8230; <a href="https://www.naavi.org/wp/nip-this-apple-air-pod-in-the-bud/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
  39. <content:encoded><![CDATA[
  40. <p style="text-align: justify;">The article published yesterday about &#8220;Digital Marketing&#8221; and its future in the society increasingly becoming sensitive to Privacy issues has evoked a few responses from other professionals.</p>
  41. <p style="text-align: justify;">One such response worth noting is the linked in article &#8220;Neuro Data, Capitalism &amp; Privacy Regulation&#8221; by Deepti Bhatia. (Incidentally Deepti is the President of Delhi Chapter of FDPPI).</p>
  42. <p style="text-align: justify;">In this article, Deepti raises many issues requiring further debate. We shall take one issue issue raised in this article for discussion today and that is the &#8220;Apple Patent on a Bio sensor embedded air pods&#8221;.</p>
  43. <p style="text-align: justify;">We have discussed &#8220;Neuro Rights&#8221; extensively in this website in the past and highlighted how Brain Computer interfaces, Humanoid Robots and CyBorgs with AI could transform the society in directions that may not be desirable. In such discussions, we have factored the raise of technology in neuro science which can read brain waves either through electrodes fixed on a skull cap or a chip embedded surgically inside the human skull.</p>
  44.  
  45.  
  46. <div class="wp-block-image">
  47. <figure class="aligncenter size-full"><img loading="lazy" width="463" height="618" src="https://www.naavi.org/wp/wp-content/uploads/2024/04/neuro_sensors.png" alt="" class="wp-image-17033" srcset="https://www.naavi.org/wp/wp-content/uploads/2024/04/neuro_sensors.png 463w, https://www.naavi.org/wp/wp-content/uploads/2024/04/neuro_sensors-225x300.png 225w" sizes="(max-width: 463px) 100vw, 463px" /></figure></div>
  48.  
  49.  
  50. <p style="text-align: justify;">In using such devices there was a &#8220;Technology Barrier&#8221; that would restrict the wide use of such technologies.</p>
  51. <p style="text-align: justify;">However Technology has now progressed alarmingly with Apple applying their skills to develop a wearable which can perhaps read brain waves and claiming a patent.</p>
  52. <p style="text-align: justify;"><a href="https://patentscope.wipo.int/search/en/detail.jsf?docId=US402825807&amp;_cid=P10-LRT3OJ-01103-1" target="_blank" rel="noreferrer noopener">The US patent number US20230225659 titled &#8220;Biosignal sensing device using dynamic selection of electrodes&#8221;</a> is a dangerous patent that makes the common discussions on &#8220;Deceptive Privacy Invasion techniques through Dark Pattern&#8221; look absolutely childish.</p>
  53. <p style="text-align: justify;">This device is being designed as &#8220;Airpods&#8221; looking just like normal airpods and hiding all the electrodes that make the earlier devices clumsy.</p>
  54.  
  55.  
  56.  
  57. <figure class="wp-block-table aligncenter"><table><tbody><tr><td><img loading="lazy" width="234" height="132" src="http://www.naavi.org/wp/wp-content/uploads/2024/04/airpod_neuros_Signal_reading.webp" alt=""/></td><td><img loading="lazy" width="489" height="671" class="wp-image-17034" style="width: 150px;" src="http://www.naavi.org/wp/wp-content/uploads/2024/04/apple_bio_sensor_airpod.png" alt="" srcset="https://www.naavi.org/wp/wp-content/uploads/2024/04/apple_bio_sensor_airpod.png 489w, https://www.naavi.org/wp/wp-content/uploads/2024/04/apple_bio_sensor_airpod-219x300.png 219w" sizes="(max-width: 489px) 100vw, 489px" /></td></tr></tbody></table></figure>
  58.  
  59.  
  60.  
  61. <p style="text-align: justify;">Further the Apple device can be used for deceptive marketing since it can capture signals such as brain waves, muscle movements etc. It can be much more than the wearables like the Watch and interact directly with the brain activity to read the &#8220;Neuro-data&#8221; generated by the humans.</p>
  62. <p style="text-align: justify;">The background of the invention states:</p>
  63. <p style="text-align: justify;">Brain activity can be monitored using electrodes placed on the scalp of a user. The electrodes may in some cases be placed inside or around the outer ear of the user. Measuring of the brain activity using electrodes placed in or around the outer ear may be preferred due to benefits such as reduced device mobility and decreased visibility of the electrodes when compared to other devices that require electrodes to be placed on visible areas around the scalp of the user&#8230;&#8221;</p>
  64. <p style="text-align: justify;">In this context the invention is designed as a wearable where the electrodes are invisible. Hence this is eminently suited for deceptive marketing and taking over of human brain activity through remote influence exercised on the human brain.</p>
  65. <p style="text-align: justify;">Imagine that a person wearing this airpod is taking a buying decision. The airpod server knows the buying intention and can broadcast it to vendors who can instantly bid for neuro messages to be sent to influence the purchase in favour of one supplier over the other. This would be like the dynamic advertisement that would be displayed when you search for a product on google.</p>
  66. <p style="text-align: justify;">The society should recognize the potential for misuse of this technology and take steps that such technologies are killed in the bud.</p>
  67. <p style="text-align: justify;">I urge Indian law makers and particularly Mr Rajeev Chandrashekar (expected to be back as IT Minister) to ensure that this AI device should be banned for sale in India or made subject to very strict licensing.</p>
  68. <p style="text-align: justify;">The IPR authorities should also re-consider if they should provide IPR protection to such devices.</p>
  69. <p style="text-align: justify;">In most of the new Privacy laws, IPR is always respected and granted an exemption. But the time has come to put reigns on IPR through other laws. Forget the international treaties on IPR, it is time to reign in IPR laws in preference to laws that are meant to protect the human society.</p>
  70. <p style="text-align: justify;">Let us remember that Technology can be disruptive but not destructive.</p>
  71.  
  72.  
  73.  
  74. <p class="has-text-align-right">Naavi</p>
  75.  
  76.  
  77.  
  78. <p><strong>Refer also:</strong></p>
  79.  
  80.  
  81.  
  82. <p><strong><a href="https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6479924/" target="_blank" rel="noreferrer noopener">Wearable system for bio signal acquisition and monitoring&#8230;</a></strong></p>
  83. ]]></content:encoded>
  84. </item>
  85. <item>
  86. <title>How Will Digital Marketing Survive DPDPA?</title>
  87. <link>https://www.naavi.org/wp/how-will-digital-marketing-survive-dpdpa/</link>
  88. <dc:creator><![CDATA[Vijayashankar Na]]></dc:creator>
  89. <pubDate>Mon, 22 Apr 2024 03:29:14 +0000</pubDate>
  90. <category><![CDATA[Cyber Law]]></category>
  91. <guid isPermaLink="false">https://www.naavi.org/wp/?p=17030</guid>
  92.  
  93. <description><![CDATA[One of the industries which is directly under threat of survival after DPDPA is the &#8220;Digital marketing industry&#8221;. Marketing requires understanding the consumer&#8217;s buying behaviour and creating a communication that convinces the prospective customer that a given product or service &#8230; <a href="https://www.naavi.org/wp/how-will-digital-marketing-survive-dpdpa/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
  94. <content:encoded><![CDATA[
  95. <p style="text-align: justify;">One of the industries which is directly under threat of survival after DPDPA is the &#8220;Digital marketing industry&#8221;.</p>
  96. <p style="text-align: justify;">Marketing requires understanding the consumer&#8217;s buying behaviour and creating a communication that convinces the prospective customer that a given product or service satisfies the requirement of the consumer.</p>
  97. <p style="text-align: justify;">The principle of AIDAS namely, Creating Awareness, Generating Interest, Eliciting a Desire, making the product available and achieving satisfaction in the post sale scenario is the formula for successful marketing of any product or service.</p>
  98. <p style="text-align: justify;">If Marketing does not exist, then the products and services will wither away.</p>
  99. <p style="text-align: justify;">An excessive importance to placing restrictions on Consumer Marketing will eventually increase the cost of the product which will fall on the consumer. If the consumer is vary of bearing this cost, he will reject all offers other than the existing brands about which he already has some information. This means that &#8220;New Products&#8221; and &#8220;New Companies&#8221; will have a tough time to promote their existence.</p>
  100. <p style="text-align: justify;">Have we as Privacy professionals thought about the difficulties in &#8220;Profiling&#8221; and &#8220;Targeted Advertising&#8221; that any privacy law considers as abhorring?</p>
  101. <p style="text-align: justify;">Has the Digital Marketing Industry thought of how they will survive the post DPDPA scenario in India? . If they try any tricks to hood wink the consumer, they may be accused of practicing &#8220;Dark Patterns&#8221;. If they are too open and ask for consents, they need to be ready for about a response which will be not more than 1% .</p>
  102. <p style="text-align: justify;">If we look at the responses for &#8220;Pay Per Clicks&#8221; advertising vs &#8220;Banner Ads&#8221; and the responses in specific sites like Linked in vs advertising in Blogs we will understand that the Clickthrough rate for social media is around 1.36 % (<a href="https://www.statista.com/statistics/872099/social-media-advertising-ctr/" target="_blank" rel="noreferrer noopener">Q2 2023 statistics</a>). This is for a product which is advertised. If we consider &#8220;Request for Consent&#8221; as an advertisement, then the click through could be even less.</p>
  103. <p style="text-align: justify;">This means that to get 1 consent, an organization may have to spend cost of 100 notices. Currently the &#8220;Privacy Policies&#8221; as a &#8220;Declaration&#8221; does not require a specific consent.</p>
  104. <p style="text-align: justify;">This scenario is an existential threat to Digital Marketing Companies.</p>
  105. <p style="text-align: justify;">As consultants it is difficult for us to either advise an organization to ignore this risk or to provide a suitable compliance solution.</p>
  106. <p style="text-align: justify;">Unfortunately the Digital marketing industry and Internet advertising industry in India has not woken up to the problems and designing a sectoral approach to counter the business risks.</p>
  107. <p style="text-align: justify;">I invite industry professionals to write back and let us know what can be done in this aspect.</p>
  108.  
  109.  
  110.  
  111. <p class="has-text-align-right">Naavi</p>
  112. ]]></content:encoded>
  113. </item>
  114. <item>
  115. <title></title>
  116. <link>https://www.naavi.org/wp/17026-2/</link>
  117. <comments>https://www.naavi.org/wp/17026-2/#respond</comments>
  118. <dc:creator><![CDATA[Vijayashankar Na]]></dc:creator>
  119. <pubDate>Mon, 22 Apr 2024 02:40:45 +0000</pubDate>
  120. <category><![CDATA[Cyber Law]]></category>
  121. <guid isPermaLink="false">https://www.naavi.org/wp/?p=17026</guid>
  122.  
  123. <description><![CDATA[]]></description>
  124. <content:encoded><![CDATA[<div class="wp-block-image">
  125. <figure class="aligncenter size-full"><img loading="lazy" width="764" height="106" src="https://www.naavi.org/wp/wp-content/uploads/2024/04/gukesh.png" alt="" class="wp-image-17027" srcset="https://www.naavi.org/wp/wp-content/uploads/2024/04/gukesh.png 764w, https://www.naavi.org/wp/wp-content/uploads/2024/04/gukesh-300x42.png 300w" sizes="(max-width: 764px) 100vw, 764px" /></figure></div>]]></content:encoded>
  126. <wfw:commentRss>https://www.naavi.org/wp/17026-2/feed/</wfw:commentRss>
  127. <slash:comments>0</slash:comments>
  128. </item>
  129. <item>
  130. <title>Why DGPSI is the Gold Standard of Compliance to DPDPA?</title>
  131. <link>https://www.naavi.org/wp/why-dgpsi-is-the-gold-standard-of-compliance-to-dpdpa/</link>
  132. <comments>https://www.naavi.org/wp/why-dgpsi-is-the-gold-standard-of-compliance-to-dpdpa/#respond</comments>
  133. <dc:creator><![CDATA[Vijayashankar Na]]></dc:creator>
  134. <pubDate>Sun, 21 Apr 2024 03:18:54 +0000</pubDate>
  135. <category><![CDATA[Cyber Law]]></category>
  136. <guid isPermaLink="false">https://www.naavi.org/wp/?p=17024</guid>
  137.  
  138. <description><![CDATA[India has been discussing the Data Protection Law for last several years and finally arrived at the DPDPA 2023. The act has been notified with Presidential approval but the notification of an effective date and some rules are pending. We &#8230; <a href="https://www.naavi.org/wp/why-dgpsi-is-the-gold-standard-of-compliance-to-dpdpa/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
  139. <content:encoded><![CDATA[
  140. <p style="text-align: justify;">India has been discussing the Data Protection Law for last several years and finally arrived at the DPDPA 2023.</p>
  141. <p style="text-align: justify;">The act has been notified with Presidential approval but the notification of an effective date and some rules are pending. We hope this is within the 100 days agenda of the Modi 3.0 Government.</p>
  142. <p style="text-align: justify;">We donot know how generous would be the Government in giving time for implementation. At the same time we also donot know how much time each organization takes to be compliant. However one thing is certain, any organization which starts early is likely to meet the dead line more effectively than others who keep procrastinating.</p>
  143. <p style="text-align: justify;">A question however arises how can any organisation starts compliance program before the rules are notified.</p>
  144. <p style="text-align: justify;">It is true that the rules can make a difference to the compliance program. But a large part of time consuming compliance activities are already identified and we donot need any mor clarification.</p>
  145. <p style="text-align: justify;">It is in this context that the framework DGPSI (Data Governance and Protection Standard of India) which has been designed and developed by Professionals of FDPPI emerges as the <strong>Gold standard of DPDPA compliance.</strong></p>
  146. <p style="text-align: justify;">For those who donot know DGPSI, it is time to make efforts to know DGPSI Lite and DGPSI Full versions of framework that meets the compliance levels expected in the Act and ready to meet the needs of the emerging rules.</p>
  147. <p style="text-align: justify;">In fact during DGPSI implementation, accredited auditors of FDPPI use procedures which would be more than sufficient to meet the requirements of the rules.</p>
  148. <p style="text-align: justify;">The probability of compliance to the rules is extremely high if one follows the DGPSI framework and the manual of DGPSI implementation.</p>
  149. <p style="text-align: justify;">We are sure that there will be other frameworks which will come forth from different organizations but DGPSI shall remain the Gold standard since it is future ready and adaptable.</p>
  150. <p style="text-align: justify;">It is not enough if Naavi says that DGPSI is the &#8220;Gold Standard&#8221;.  You need to check and be  satisfied.</p>
  151. <p style="text-align: justify;">I invite professionals to raise any questions they have on DPDPA compliance and how DGPSI addresses it and we will be happy to answer each one of them. </p>
  152. <p style="text-align: right;">Naavi</p>
  153. ]]></content:encoded>
  154. <wfw:commentRss>https://www.naavi.org/wp/why-dgpsi-is-the-gold-standard-of-compliance-to-dpdpa/feed/</wfw:commentRss>
  155. <slash:comments>0</slash:comments>
  156. </item>
  157. <item>
  158. <title>Chief Concerns regarding DPDPA Rules</title>
  159. <link>https://www.naavi.org/wp/chief-concerns-regarding-dpdpa-rules/</link>
  160. <comments>https://www.naavi.org/wp/chief-concerns-regarding-dpdpa-rules/#respond</comments>
  161. <dc:creator><![CDATA[Vijayashankar Na]]></dc:creator>
  162. <pubDate>Sat, 20 Apr 2024 03:29:01 +0000</pubDate>
  163. <category><![CDATA[Cyber Law]]></category>
  164. <guid isPermaLink="false">https://www.naavi.org/wp/?p=17016</guid>
  165.  
  166. <description><![CDATA[India that is Bharath is waiting for the elections to be over and for Mr Modi to come back with a thumping majority. The DPDPA 2023 which was notified with presidential assent needs to be activated within the 100 days &#8230; <a href="https://www.naavi.org/wp/chief-concerns-regarding-dpdpa-rules/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
  167. <content:encoded><![CDATA[
  168. <p style="text-align: justify;">India that is Bharath is waiting for the elections to be over and for Mr Modi to come back with a thumping majority. The DPDPA 2023 which was notified with presidential assent needs to be activated within the 100 days plan for which we wish that Rajeev Chandrashekar will be back as the IT Minister.</p>
  169. <p style="text-align: justify;">We can expect that just as the <a href="https://naavi.org/uploads_wp/2024/draft_rules_incomplete.pdf" target="_blank" rel="noreferrer noopener">work in progress rules was leaked</a> some time back some body in MeitY is working on the rules.</p>
  170. <p style="text-align: justify;">It is our duty to bring to the notice of the team working on the rules some of our concerns and suggestions.</p>
  171. <p style="text-align: justify;">As per Section 40, at least 25 new rules need to be formulated. Out of these the following 5 rules appear to be of key importance. We would like to propose our suggestions regarding the above.</p>
  172.  
  173.  
  174. <div class="wp-block-image">
  175. <figure class="aligncenter size-full is-resized"><img loading="lazy" src="https://www.naavi.org/wp/wp-content/uploads/2024/04/rules_dpdpa_concerns_2.png" alt="" class="wp-image-17017" width="346" height="298" srcset="https://www.naavi.org/wp/wp-content/uploads/2024/04/rules_dpdpa_concerns_2.png 644w, https://www.naavi.org/wp/wp-content/uploads/2024/04/rules_dpdpa_concerns_2-300x259.png 300w" sizes="(max-width: 346px) 100vw, 346px" /></figure></div>
  176.  
  177.  
  178. <p><strong>Legacy Data:</strong></p>
  179. <p style="text-align: justify;">Since it is expected that a large number of legacy data principals may not be reachable and may not respond to the new notice, the rules should prescribe the &#8220;Reasonable Period&#8221; after which the permission is deemed as &#8220;Withdrawn&#8221;.</p>
  180. <p>The Act now simply states&#8230;</p>
  181. <p style="text-align: justify;">&#8220;the Data Fiduciary <strong>may continue to process</strong> the personal data until and unless the Data Principal withdraws her consent.&#8221;</p>
  182. <p style="text-align: justify;">This is not in consonance with the spirit of the Act and it cannot be construed that the data can be used for an indefinite period under the excuse that the data principal did not withdraw the consent. It will also be in conflict with the obligations under Section 8(3) to ensure that the data used for processing is &#8220;Complete&#8221; and &#8220;Accurate&#8221;.</p>
  183. <p style="text-align: justify;">Also the principle under ITA 2000 is that any privacy policy needs to be renewed not later than one year which therefore becomes an expiry period for the consent in the absence of any other parameter.</p>
  184. <p style="text-align: justify;"><strong>The period of 1 year however appears unreasonable in the context of DPDPA 2023. A more reasonable period has to be prescribed and in our view it should not be more than 3 months.</strong></p>
  185. <p><strong>Significant Data Fiduciary</strong></p>
  186. <p style="text-align: justify;">The definition of &#8220;Significant Data Fiduciary&#8221; could be by far the most important rule to be notified and it is necessary that the Government thinks seriously of the <a href="https://www.naavi.org/wp/significant-data-fiduciary-the-trinity-principle/" data-type="post" data-id="17004">suggestions made in our precious article</a>.</p>
  187. <p style="text-align: justify;">The essence of this suggestion is that the &#8220;Tag of Significant Data Fiduciary&#8221; is not to be associated with an enterprise as a whole but to specific processes. Under DGPSI, we group processes based on the sensitivity and this should also determine the Significant Data Fiduciary status.</p>
  188. <p style="text-align: justify;">The operating part of the suggestion is to add the following explanation in the rules:</p>
  189. <p style="text-align: justify;"><strong>&#8220;The term &#8216;class&#8217; under Section 10(1) of the Act for the application of this rule also applies to any class of personal data process/es that an entity may use where the risk, sensitivity and volume of personal data processed exceeds a specified threshold&#8221;</strong></p>
  190. <p><strong>Nomination</strong></p>
  191. <p style="text-align: justify;">If &#8220;Nomination&#8221; is considered as &#8220;Transfer of ownership of an asset on the death of a person&#8221; and applied to personal data as a property, then it will be difficult for the Data Fiduciaries to obtain consent through electronic means. We are aware that law does not consider &#8220;Nomination&#8221; as &#8220;Transfer of property&#8221; and hence the rights of legal heirs is not affected by the presence of nomination in favour of a person who is not a legal heir. However common people may not be aware of this and may consider &#8220;Nomination&#8221; as &#8220;Bequeathing of property&#8221;. If this concept is recognized then electronic consent form cannot be used to register &#8220;Nomination&#8221; because of Section 1(4) of ITA 2000.</p>
  192. <p style="text-align: justify;">To honour the legal principle that &#8220;Nomination&#8221; is a procedural convenience adopted by an asset owner to transfer the property to a trusted agent of the property owner for further transfer to legal heirs, an explanation needs to be added as follows.</p>
  193. <p style="text-align: justify;"><strong>&#8221; Nomination for the purpose of Section 14 of DPDPA 2023 means transfer of custody of personal data and associated digital property in the hands of a data fiduciary to a person designated by the data principal for eventual distribution to the legal heirs. The data fiduciary shall be considered as discharged from his liability of disposal of the digital assets if the custody is properly handed over to the designated nominee&#8221;</strong>.</p>
  194. <p style="text-align: justify;">A separate procedure for claim settlement can be prescribed for this purpose (Refer to earlier articles in Naavi.org on <a href="https://www.bing.com/search?cp=CODE+PAGE+USED+BY+YOUR+HTML+PAGE&amp;FORM=FREESS&amp;q=deceased+&amp;q1=site%3Awww.naavi.org" target="_blank" rel="noreferrer noopener"><strong>digital data of deceased.</strong></a></p>
  195. <p><strong>Consent Manager</strong></p>
  196. <p style="text-align: justify;">The definition of &#8220;Consent Manager&#8221; is another area where the Meity may be stuck to their current DEPA framework and needs to think differently. This aspect has also been discussed by <a href="https://www.naavi.org/wp/consent-manager-under-dpdpa/" target="_blank" rel="noreferrer noopener">Naavi.org earlier </a> and a case has been made out that &#8220;Consent Manager&#8221; under the Account Aggregator concept is different from the &#8220;Special Data Fiduciary concept of a consent manager&#8221; used in DPDPA. There is also a need for a very strict application of &#8220;Fit and Proper&#8221; criteria for registering Consent Managers.</p>
  197. <p style="text-align: justify;"><strong>If this aspect is neglected, we can see a major scam of theft of personal data for which the negligence of rule makers would be responsible.</strong></p>
  198. <p><strong>Data Auditor</strong></p>
  199. <p style="text-align: justify;">The rules regarding the credentials of a &#8220;Data Auditor&#8221; is another area of concern where vested interests can play havoc.</p>
  200. <p style="text-align: justify;">I would welcome Meity to introduce its own accreditation of Data Auditors through an open examination and should refrain from using the terms &#8220;All Cert In Accredited Auditors shall be considered as deemed to be qualified to be data auditors under the DPDPA 2023&#8221;.</p>
  201. <p style="text-align: justify;">Meity can use the guidance available under FDPPI&#8217;s C.DPO.DA. Certification course or DGPSI as a framework to structure the accreditation examination for Data Auditors.</p>
  202. <p style="text-align: justify;">The model adopted by MCA in accrediting Independent Auditors or the Law department in accrediting Patent lawyers can be followed for this purpose. The essence of these models is that the Government has a certain norm of an examination and trainings are conducted by different private bodies and not restricted to any one agency as a &#8220;Deemed Expert&#8221;.</p>
  203. <p style="text-align: right;">Naavi</p>
  204. ]]></content:encoded>
  205. <wfw:commentRss>https://www.naavi.org/wp/chief-concerns-regarding-dpdpa-rules/feed/</wfw:commentRss>
  206. <slash:comments>0</slash:comments>
  207. </item>
  208. <item>
  209. <title>Psychological impact on Children from AI teachers</title>
  210. <link>https://www.naavi.org/wp/psychological-impact-on-children-from-ai-teachers/</link>
  211. <comments>https://www.naavi.org/wp/psychological-impact-on-children-from-ai-teachers/#respond</comments>
  212. <dc:creator><![CDATA[Vijayashankar Na]]></dc:creator>
  213. <pubDate>Thu, 18 Apr 2024 07:14:01 +0000</pubDate>
  214. <category><![CDATA[Cyber Law]]></category>
  215. <guid isPermaLink="false">https://www.naavi.org/wp/?p=17014</guid>
  216.  
  217. <description><![CDATA[A trend is developing where some schools are using humanoid robots in teaching. While there is no doubt that the humanoid robot can be a store house of actual knowledge particularly in our educational system based on a specific curriculum &#8230; <a href="https://www.naavi.org/wp/psychological-impact-on-children-from-ai-teachers/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
  218. <content:encoded><![CDATA[
  219. <p style="text-align: justify;">A trend is developing where some schools are using humanoid robots in teaching. While there is no doubt that the humanoid robot can be a store house of actual knowledge particularly in our educational system based on a specific curriculum and examination pattern based on learning from text books, the psychological impact of a machine teaching an young mind is perhaps needs to be researched.</p>
  220. <p style="text-align: justify;">If there can be a psychological impact of lack of biological parents for abandoned children, adopted children, single parents etc, there is a possibility that the teacher being non-human may also have its own impact psychologically on the children which perhaps may become evident not now but after another decade.</p>
  221.  
  222.  
  223.  
  224. <p style="text-align: justify;">Do children look forward to an emotional support from the teacher apart from guidance on the topic? A study can be made in schools while some teachers are more popular with the students than others and why some students thrive better under one class teacher than the other.</p>
  225.  
  226.  
  227.  
  228. <p style="text-align: justify;">While I am not inclined to go into the details of how a student may feel being taught by a robot instead of a human teacher as it is a core psychological subject, as some body observing the development of technology and its effect on the society, I am uncomfortable with the impact that the humanoid teacher may have on the development of a student particularly in the primary and middle educational level.</p>
  229. <p style="text-align: justify;">Many of the students are actually averse to learning and only when the teacher presents the concepts interestingly in the form of exercises, activities etc., are able to learn. Will a robot be able to perform similarly?</p>
  230. <p style="text-align: justify;">Can the robot express empathy and understand from the look of the child that today his/her mother must have scolded him or he has some other concern on the back of his mind and is unable to focus? It is doubtful that except a sentient robot others may not be able to come any where near the experience of learning from a human.</p>
  231. <p style="text-align: justify;">Further students in class learn not only about the subject but also about life. In this respect only a human teacher can evoke empathy even in the student who can see his mother in the form of teacher which is unlikely to happen in the case of a humanoid robots.</p>
  232. <p style="text-align: justify;">I wish some psychology student does a research on this subject and come up with some insight on this topic.</p>
  233.  
  234.  
  235.  
  236. <p class="has-text-align-right">Naavi</p>
  237.  
  238.  
  239.  
  240. <p></p>
  241. ]]></content:encoded>
  242. <wfw:commentRss>https://www.naavi.org/wp/psychological-impact-on-children-from-ai-teachers/feed/</wfw:commentRss>
  243. <slash:comments>0</slash:comments>
  244. </item>
  245. <item>
  246. <title>&#8220;Significant Data Fiduciary&#8221; &#8230;The Trinity Principle</title>
  247. <link>https://www.naavi.org/wp/significant-data-fiduciary-the-trinity-principle/</link>
  248. <comments>https://www.naavi.org/wp/significant-data-fiduciary-the-trinity-principle/#respond</comments>
  249. <dc:creator><![CDATA[Vijayashankar Na]]></dc:creator>
  250. <pubDate>Thu, 18 Apr 2024 03:00:02 +0000</pubDate>
  251. <category><![CDATA[Cyber Law]]></category>
  252. <guid isPermaLink="false">https://www.naavi.org/wp/?p=17004</guid>
  253.  
  254. <description><![CDATA[In the DPDPA 2023, when the rules are notified, one of the most important aspects which the industry is looking forward to is the notification under Section 10(1) on the identification of a Significant Data Fiduciary. The &#8220;Data Fiduciary&#8221; (DF) &#8230; <a href="https://www.naavi.org/wp/significant-data-fiduciary-the-trinity-principle/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
  255. <content:encoded><![CDATA[
  256. <p style="text-align: justify;">In the DPDPA 2023, when the rules are notified, one of the most important aspects which the industry is looking forward to is the notification under Section 10(1) on the identification of a Significant Data Fiduciary.</p>
  257. <p style="text-align: justify;">The &#8220;Data Fiduciary&#8221; (DF) is an entity that determines the purpose and means of processing of personal data as distinguished from the &#8220;Data Processor&#8221; who processes the personal data under the instruction from another entity which determines the purpose and means.</p>
  258. <p style="text-align: justify;">There are some instances when one organization determines the purpose and then engages another organization which has full control on the means of processing for the given purpose. In such instances both organizations become &#8220;Joint Data Fiduciaries&#8221;.</p>
  259. <p style="text-align: justify;">Once this distinction is determined an organization needs to determine whether they are &#8220;Significant Data Fiduciaries&#8221; or not.</p>
  260. <p style="text-align: justify;">If volume is a criteria there could be many processors who become &#8220;Data Fiduciaries&#8221;. Firstly  since they manage proprietary processing technologies they may become joint Data Fiduciaries. There after, they may become &#8220;Significant Data Fiduciaries&#8221; since as processors for many Data Fiduciaries, the cumulative volume they handle may exceed the thresholds even if the vendors themselves may operate at low volumes. </p>
  261. <p style="text-align: justify;">In other words, in today&#8217;s chain of processors, the sub contractor (Who is today referred to as a data processor) could be a &#8220;SDF&#8221; while the main contracting party may be only a &#8220;DF&#8221;.</p>
  262. <p style="text-align: justify;">Many cloud service providers will fall into the category of SDF where as their users may not be.</p>
  263. <p style="text-align: justify;">It is possible that the determination of when a DF becomes a SDF is not determined only on the basis of &#8220;Volume&#8221; but also on &#8220;Sensitivity&#8221;. Sensitivity (including processing of children data) itself is based on the &#8220;Risk to the Data Principal&#8221; and hence the criteria for determination of SDF status may depend on Volume-Sensitivity-Risk combination.</p>
  264. <p style="text-align: justify;">It is also possible that without consideration of &#8220;Volume&#8221;, some factors such as  &#8216;Risk&#8217;, as well as the &#8216;impact on sovereignty and integrity of India&#8217;, &#8216;risk to electoral democracy&#8217;, &#8216;security of state&#8217; or &#8216;public order&#8217; may be considered as independent criteria under which an organization may be classified as SDF .</p>
  265. <p style="text-align: justify;">Hence the primary criteria for identifying SDF status is the &#8220;Risk status of Processing&#8221; and volume becomes a secondary factor.</p>
  266. <p style="text-align: justify;">The term Data Fiduciary used in DPDPA is similar to the term &#8220;Data Controller&#8221; under GDPR and hence it would be natural for many to interpret DF from their knowledge of a Data Controller under GDPR.</p>
  267. <p style="text-align: justify;">The current interpretation of Data Controller is that &#8220;An Organization is a Data Controller&#8221;. If the same is applied in India, an &#8220;Organization&#8221; becomes a &#8220;Data Fiduciary&#8221;.</p>
  268. <p style="text-align: justify;">I would however like to challenge this concept of the status of Data Fiduciary being assigned to an organization.</p>
  269. <p style="text-align: justify;">Most of us today accept that an organization is some times a data controller and some times also a data processor. Significant Data Fiduciary is considered another status with special obligations. We identify this as the &#8220;Trinity Principle&#8221; where an organization can be any one of these categories for compliance purpose.</p>
  270. <p style="text-align: justify;"><span style="color: #0000ff;"><em><strong>This &#8220;Trinity&#8221; principle of an organization seems to remind us of the famous Heisenberg principle of uncertainty  applicable to light and matter.  The Trinity principle states that an organization in the context of Data Protection context may exist in any of the three states of Data Fiduciary, Significant Data Fiduciary or Data Processor and the controls have to be applied accordingly.</strong></em></span></p>
  271. <p style="text-align: justify;">These three different categories of status of an organization adds uncertainty to when the organization should designate a DPO or appoint a DA or when it has the obligations under Section 9. </p>
  272. <p style="text-align: justify;">It is for this reason that the DGPSI (Data Governance and Protection Standard of India) adopts the principle that</p>
  273. <p style="text-align: justify;"><em>&#8220;Every Organization is an aggregation of multiple processes&#8221;.</em></p>
  274. <p style="text-align: justify;">This principle of DGPSI is related to the Trinity principle of  categorization of compliance entities and makes it easy to recognise that in one process the organization may be a Data fiduciary and in another a Data Processor. By the same logic, in one process an organization is a &#8220;Significant Data Fiduciary&#8221; and in another, simply a &#8220;Data Fiduciary&#8221;.</p>
  275. <p style="text-align: justify;">Thus an organization is like a &#8220;Trinity&#8221; and in terms of compliance may need to be a Data Processor some times, Data Fiduciary some other times and Significant Data Fiduciary some other times. This can be identified and tagged if we break up an organization into processes of personal information for compliance.</p>
  276. <p style="text-align: justify;">Unfortunately, GDPR did not visualize this possibility and the DPDPA 2023 at the level of he Act has also not visualized this possibility.</p>
  277. <p style="text-align: justify;">However, while framing the rules, it is possible for the Government to bring in this &#8220;Trinity Principle&#8221; and distinguish our law from the rest of the world.</p>
  278. <p style="text-align: justify;">The Section 10(1) provides an option to notify either any &#8220;Data Fiduciary&#8221; or a &#8220;Class of Data Fiduciary&#8221; as a SDF and the Government can use the &#8220;Class&#8221; as a sub category of a DF and link it to a process.</p>
  279. <p style="text-align: justify;">For example, (after stating the general criteria for determining the data fiduciary), it may state</p>
  280. <p style="text-align: justify;"><strong>&#8220;The term &#8216;class&#8217; under Section 10(1) of the Act for the application of this rule applies to any class of personal data process/es that an entity may use where the risk, sensitivity and volume of personal data processed exceeds a specified threshold&#8221;</strong></p>
  281.  
  282.  
  283.  
  284. <p>I hope the Meity incorporates this principle when the rules are notified&#8230;..</p>
  285.  
  286.  
  287.  
  288. <p class="has-text-align-right">Naavi</p>
  289.  
  290.  
  291.  
  292. <p>Also refer: <a href="https://www.naavi.org/wp/why-not-significant-data-fiduciary-be-process-centric/" target="_blank" rel="noreferrer noopener">Why Not “Significant Data Fiduciary” be Process Centric</a></p>
  293. ]]></content:encoded>
  294. <wfw:commentRss>https://www.naavi.org/wp/significant-data-fiduciary-the-trinity-principle/feed/</wfw:commentRss>
  295. <slash:comments>0</slash:comments>
  296. </item>
  297. <item>
  298. <title>100 day agenda of Modi 3.0 to address some old demands of Naavi.org</title>
  299. <link>https://www.naavi.org/wp/100-day-agenda-of-modi-3-0-to-address-some-old-demands-of-naavi-org/</link>
  300. <comments>https://www.naavi.org/wp/100-day-agenda-of-modi-3-0-to-address-some-old-demands-of-naavi-org/#respond</comments>
  301. <dc:creator><![CDATA[Vijayashankar Na]]></dc:creator>
  302. <pubDate>Wed, 17 Apr 2024 01:29:06 +0000</pubDate>
  303. <category><![CDATA[Cyber Law]]></category>
  304. <guid isPermaLink="false">https://www.naavi.org/wp/?p=16996</guid>
  305.  
  306. <description><![CDATA[As India awaits for the 2024 Lok Sabha elections to be completed and for the new Government to take charge, many of the long pending suggestions of Naavi are likely to find place in the immediate 100 day implementation plan &#8230; <a href="https://www.naavi.org/wp/100-day-agenda-of-modi-3-0-to-address-some-old-demands-of-naavi-org/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
  307. <content:encoded><![CDATA[
  308. <p style="text-align: justify;">As India awaits for the 2024 Lok Sabha elections to be completed and for the new Government to take charge, many of the long pending suggestions of Naavi are likely to find place in the immediate 100 day implementation plan of the next Modi Government.</p>
  309. <p style="text-align: justify;">One such thing is setting up of the National Cyber Security Agency (NCSA). Another focus area is the control of mobile crimes and introduction of the &#8220;Calling Name Presentation (CNAP).</p>
  310. <p style="text-align: justify;">The NCSA will likely to be the umbrella organization for managing Cyber Crime prevention.</p>
  311. <p><a href="https://economictimes.indiatimes.com/news/india/tackling-mobile-frauds-in-new-govts-100-day-plan-caller-id-service-national-cyber-security-agency-to-be-set-up/articleshow/109323045.cms?from=mdr" target="_blank" rel="noreferrer noopener">Refer Economic Times article here</a></p>
  312. <p style="text-align: justify;">The NCSA needs to function with a &#8220;Cyber Space Jurisdiction&#8221; cutting across the State Police Jurisdictions and take over many of the intra state Cyber crimes which have given raise to many mafia centers in Bharatpur, Nuh etc. where criminals are unable to be controlled by the state police for various reasons. Similarly, CNAP should significantly reduce the vishing frauds.</p>
  313. <p style="text-align: justify;">We need similar law and procedure to ensure that E-Mail sender&#8217;s identity and domain name identity is also displayed. Without waiting for Google and Proton mail to introduce such systems, NCSA itself should introduce a &#8220;Digital Identity Gateway&#8221; which should be integrated with the browser and email clients and display the sender identity or domain name registrant identity.</p>
  314. <p style="text-align: justify;">Appropriate consent can be made available by the user of the service  without infringing on the Privacy .</p>
  315. <p style="text-align: justify;">Hopefully the rules of DPDPA 2023 will also be released during the same time. Naavi.org may publish a document shortly on the 26+ required notifications that the Government needs to make to indicate that it is not an insurmountable task any way given the intentions.</p>
  316. <p style="text-align: justify;">There is also a proposal for NFIR (National Financial Information Registry Bill). This should change the current <a href="https://unacademy.com/content/bank-exam/study-material/general-awareness/brief-notes-on-credit-information-companies-regulation-act-2005/" target="_blank" rel="noopener">non compliant system run by CIBIL</a> and other rating agencies under the <a href="https://kanoongpt.in/bare-acts/the-credit-information-companies-regulation-act-2005" target="_blank" rel="noopener">Credit Information Companies (Regulation) Act 2005</a> which has conveniently facilitated siphoning off of lakhs of crores worth of data of Indian Bank customers to USA. RBI has in its certification system failed to monitor the activities of these companies and today TransUnion a US Company is the owner of TransUnion CIBIL and personal information provided to Bankers for the purpose of a loan/credit card is without proper consent  shared with the US entity. This should stop and the new Act is an opportunity to correct this monumental mistake.</p>
  317. <p style="text-align: right;">Naavi</p>
  318. ]]></content:encoded>
  319. <wfw:commentRss>https://www.naavi.org/wp/100-day-agenda-of-modi-3-0-to-address-some-old-demands-of-naavi-org/feed/</wfw:commentRss>
  320. <slash:comments>0</slash:comments>
  321. </item>
  322. <item>
  323. <title>FDPPI Event in Delhi on May 12</title>
  324. <link>https://www.naavi.org/wp/fdppi-event-in-delhi-on-may-12/</link>
  325. <comments>https://www.naavi.org/wp/fdppi-event-in-delhi-on-may-12/#comments</comments>
  326. <dc:creator><![CDATA[Vijayashankar Na]]></dc:creator>
  327. <pubDate>Fri, 12 Apr 2024 01:46:38 +0000</pubDate>
  328. <category><![CDATA[Cyber Law]]></category>
  329. <guid isPermaLink="false">https://www.naavi.org/wp/?p=16988</guid>
  330.  
  331. <description><![CDATA[The&#160;Delhi Chapter of FDPPI&#160;is conducting a&#160;workshop on DPDPA 2023 Implementation Challenges &#38; Framework, on 12th&#160;May 2024 in New Delhi. This will be a day long workshop which will cover the DPDPA and its applicability, how GDPR &#38; ISO 27701 certified &#8230; <a href="https://www.naavi.org/wp/fdppi-event-in-delhi-on-may-12/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
  332. <content:encoded><![CDATA[
  333. <p class="has-text-align-justify">The&nbsp;Delhi Chapter of FDPPI&nbsp;is conducting a&nbsp;workshop on DPDPA 2023 Implementation Challenges &amp; Framework, on 12<sup>th</sup>&nbsp;May 2024 in New Delhi.</p>
  334.  
  335.  
  336.  
  337. <figure class="wp-block-image size-full"><img loading="lazy" width="724" height="1024" src="https://www.naavi.org/wp/wp-content/uploads/2024/04/dpdpa_2-724x1024-1.png" alt="" class="wp-image-16989" srcset="https://www.naavi.org/wp/wp-content/uploads/2024/04/dpdpa_2-724x1024-1.png 724w, https://www.naavi.org/wp/wp-content/uploads/2024/04/dpdpa_2-724x1024-1-212x300.png 212w" sizes="(max-width: 724px) 100vw, 724px" /></figure>
  338.  
  339.  
  340.  
  341. <p style="text-align: justify;">This will be a day long workshop which will cover the DPDPA and its applicability, how GDPR &amp; ISO 27701 certified companies can adopt DPDPA, CXO Insights implementation guidance and framework.</p>
  342. <p style="text-align: justify;">This is an excellent opportunity to interact with the community of privacy professionals and gain more insights. The workshop will be led by Mr. Na.Vijayashankar (Naavi), Chairman, FDPPI and Mr Ramesh Venkataraman,  Director, FDPPI.</p>
  343. <p style="text-align: justify;">The workshop cost is <strong>INR 11,000/- (with GST) </strong>which includes the course content, lunch, and beverages at the venue.</p>
  344. <p style="text-align: justify;"><strong>Early bird offer till Apr 22, 2024 &#8211; 15% discount</strong></p>
  345. <p><strong>Group enrolment of 3 or more &#8211;  20% discount</strong></p>
  346. <p>Register at <a href="https://forms.gle/SSWsV1W3pHWbkgbV9">https://forms.gle/SSWsV1W3pHWbkgbV9</a></p>
  347. <p>For queries, write to delhi@fdppi.in/ fdppi4privacy@gmail.com</p>
  348. ]]></content:encoded>
  349. <wfw:commentRss>https://www.naavi.org/wp/fdppi-event-in-delhi-on-may-12/feed/</wfw:commentRss>
  350. <slash:comments>1</slash:comments>
  351. </item>
  352. </channel>
  353. </rss>
  354.  

If you would like to create a banner that links to this page (i.e. this validation result), do the following:

  1. Download the "valid RSS" banner.

  2. Upload the image to your own server. (This step is important. Please do not link directly to the image on this server.)

  3. Add this HTML to your page (change the image src attribute if necessary):

If you would like to create a text link instead, here is the URL you can use:

http://www.feedvalidator.org/check.cgi?url=http%3A//www.naavi.org/wp/%3Ffeed%3Drss2

Copyright © 2002-9 Sam Ruby, Mark Pilgrim, Joseph Walton, and Phil Ringnalda