Congratulations!

[Valid RSS] This is a valid RSS feed.

Recommendations

This feed is valid, but interoperability with the widest range of feed readers could be improved by implementing the following recommendations.

Source: http://www.naavi.org/wp/?feed=rss2

  1. <?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
  2. xmlns:content="http://purl.org/rss/1.0/modules/content/"
  3. xmlns:wfw="http://wellformedweb.org/CommentAPI/"
  4. xmlns:dc="http://purl.org/dc/elements/1.1/"
  5. xmlns:atom="http://www.w3.org/2005/Atom"
  6. xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
  7. xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
  8. xmlns:georss="http://www.georss.org/georss"
  9. xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
  10. >
  11.  
  12. <channel>
  13. <title>Naavi.org</title>
  14. <atom:link href="https://www.naavi.org/wp/feed/" rel="self" type="application/rss+xml" />
  15. <link>https://www.naavi.org/wp</link>
  16. <description>Towards building Cyber Jurisprudence in India</description>
  17. <lastBuildDate>Sat, 28 Jun 2025 02:56:14 +0000</lastBuildDate>
  18. <language>en-US</language>
  19. <sy:updatePeriod>
  20. hourly </sy:updatePeriod>
  21. <sy:updateFrequency>
  22. 1 </sy:updateFrequency>
  23.  
  24. <image>
  25. <url>https://i0.wp.com/www.naavi.org/wp/wp-content/uploads/2015/08/cropped-naavi_lecture2.jpg?fit=32%2C32&#038;ssl=1</url>
  26. <title>Naavi.org</title>
  27. <link>https://www.naavi.org/wp</link>
  28. <width>32</width>
  29. <height>32</height>
  30. </image>
  31. <site xmlns="com-wordpress:feed-additions:1">44280636</site> <item>
  32. <title>Taking Control of Cookies under DPDPA</title>
  33. <link>https://www.naavi.org/wp/taking-control-of-cookies-under-dpdpa/</link>
  34. <dc:creator><![CDATA[Vijayashankar Na]]></dc:creator>
  35. <pubDate>Sat, 28 Jun 2025 02:56:14 +0000</pubDate>
  36. <category><![CDATA[Cyber Law]]></category>
  37. <guid isPermaLink="false">https://www.naavi.org/wp/?p=18498</guid>
  38.  
  39. <description><![CDATA[For DPOs in India, one of the grey areas of compliance to be managed is the &#8220;Cookies Consent&#8221;. Normally the Cookies are hosted on the website and the website is managed by the IT department. The content on the website &#8230; <a href="https://www.naavi.org/wp/taking-control-of-cookies-under-dpdpa/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
  40. <content:encoded><![CDATA[
  41. <p class="has-text-align-justify">For DPOs in India, one of the grey areas of compliance to be managed is the &#8220;Cookies Consent&#8221;.</p>
  42.  
  43.  
  44.  
  45. <p class="has-text-align-justify">Normally the Cookies are hosted on the website and the website is managed by the  IT department. The content on the website is often written by the marketing department and contains company promotion and product promotion information. The marketing department may have a close watch  on the content to ensure accuracy of product information. </p>
  46.  
  47.  
  48.  
  49. <p class="has-text-align-justify">The websites also contain the &#8220;Privacy Policy&#8221; and &#8220;Terms of Use&#8221; which are typically managed by the legal department. </p>
  50.  
  51.  
  52.  
  53. <p class="has-text-align-justify">In the case of listed companies, a part of the website contains investor information which is mandated by SEBI.</p>
  54.  
  55.  
  56.  
  57. <p class="has-text-align-justify">It is a tradition to have the &#8220;Privacy Policy&#8221; of the company displayed on the website along with the &#8220;Terms of use&#8221; and the contact details of the help desk, the Grievance officer and the DPO or Compliance officer. </p>
  58.  
  59.  
  60.  
  61. <p class="has-text-align-justify">For the public, the website is the first  contact point for knowing the company and if there is no mention of a DPO or a Compliance officer or a Grievance officer, the inference is that the company is not fully compliant.</p>
  62.  
  63.  
  64.  
  65. <p class="has-text-align-justify">CISOs recognize  that website is exposed to the public and hence could be a source for cyber attacks some of which  may have reputational damage by defacement or more seriously, implanting of malware in the source code of the website.  There have been many instances of content being manipulated, images being substituted  or invisible spamming activity occurring through hidden pages on the website. Domain name re-directions, domain name squatting, etc are also considered security risks and hence a continuous monitoring of all pages of the corporate website is required to be monitored by the Information Security department for any modification. </p>
  66.  
  67.  
  68.  
  69. <p class="has-text-align-justify">The &#8220;Domain Name&#8221; and the website is also considered an important  &#8220;Financial Asset&#8221; of a Company, and has  IPR value. The CFO also has a stake on the brand value value of the domain   and the value of the content as well as the traffic.</p>
  70.  
  71.  
  72.  
  73. <p>Thus, the website of a company serves many purposes and there are multiple stakeholders who are responsible for the content and directly or indirectly create liabilities for the organization.</p>
  74.  
  75.  
  76.  
  77. <p>Governance of a website is therefore  an important corporate activity.  </p>
  78.  
  79.  
  80.  
  81. <p class="has-text-align-justify">However, it is a common practice for most companies to register domain names and host the website with an external agency. Many of them use Cloud applications managed by different agencies. The hosting  companies suggest statistical analysis  and profiling of visitors. They also suggest certain monitoring of the visitors from the point of view of enhancing the user experience. Additionally the marketing companies try to use Google Analytics or other agencies to plant their own trackers and generate insights.  With the use of AI in the  background, we never know exactly how the information of the users may be used by these background agencies.</p>
  82.  
  83.  
  84.  
  85. <p class="has-text-align-justify">It is in this context that managing  &#8220;Cookies Consent&#8221; assume importance. If the cookies collect any personal information of the visitors of the website, then the provisions of data protection laws may become applicable. The problem with a website is that anybody in the world including from over 140 countries which have specific data protection laws, may visit the website and the cookies may be collecting various information from them. </p>
  86.  
  87.  
  88.  
  89. <p class="has-text-align-justify">Currently DPOs donot consider it essential to treat the &#8220;Web hosting&#8221;  company as a &#8220;Data Processor&#8221; and handle the data protection obligations. If the hosting is outside a country, there may also be a &#8220;Cross Border Data Transfer&#8221; issue to be resolved.</p>
  90.  
  91.  
  92.  
  93. <p>It is time for DPOs to get details of Cookies including what data each cookie collects, how long the information is stored and what is the purpose of each of the data elements that is collected. </p>
  94.  
  95.  
  96.  
  97. <p class="has-text-align-justify">If a  Cookie is tagged as &#8220;Essential&#8221; or &#8220;Functional&#8221;, there is no need for it to be a persistent cookie nor to have the personal information such as the email address or name of the person even if it is available at log in. Every cookie that collects &#8220;Personal Information&#8221; is essentially a &#8220;Profiling tool&#8221;. The profiling itself may have a &#8220;Security Purpose&#8221; or a &#8220;Marketing purpose&#8221;.  &#8220;Security&#8221; may be considered as a legitimate purpose but &#8220;Marketing&#8221; may not be. </p>
  98.  
  99.  
  100.  
  101. <p class="has-text-align-justify">Hence the Consent management has to understand and distinguish the type of data each cookie collects and display it on the website and not restrict the cookie information only to the &#8220;Name of the cookie&#8221; and its classification as &#8220;Analytical&#8221;, &#8220;Marketing&#8221; or &#8220;Functional&#8221;.</p>
  102.  
  103.  
  104.  
  105. <p class="has-text-align-justify">The DPO s need to take control of the Cookies and &#8220;No cookie should be installed on the website without the specific permission of the DPO&#8221;. If there is any &#8220;Profiling&#8221; of the visitors, then it  has to have a proper legal basis with &#8220;consent&#8221; for marketing.  &#8220;Security Profiling&#8221; of visitors may be considered as &#8220;Legitimate Use&#8221; but it has to be ensured that &#8220;Security profiling&#8221;  is not converted into &#8220;Marketing profiling&#8221; either through ignorance or design.  </p>
  106.  
  107.  
  108.  
  109. <p class="has-text-align-justify">I recall my own experience captured in the article <a href="https://www.naavi.org/wp/union-bank-and-rsa-fiasco/">&#8220;Union Bank and RSA Fiasco&#8221;</a>, where I have highlighted that a &#8220;Security Scanning&#8221; may be mis understood if the security team is blindly following automated systems of profiling</p>
  110.  
  111.  
  112.  
  113. <p class="has-text-align-justify">I therefore urge DPO s to start exercising greater control on the web hosting and planting of cookies and obtaining the cookie consents as part of their compliance exercise. The current method of Cookie Consents which are followed under GDPR regime which simply asks for consent on the basis of a declaration such as &#8220;Accept All Cookies&#8221; or &#8220;Accept Functional Cookies only&#8221; etc., are insufficient. The Cookie consent  has to list out each cookie, indicate the data elements collected, the purpose of collection and retention periods and obtain consent in a more informed manner.</p>
  114.  
  115.  
  116.  
  117. <p>Comments are welcome.</p>
  118.  
  119.  
  120.  
  121. <p class="has-text-align-right">Naavi</p>
  122. ]]></content:encoded>
  123. <post-id xmlns="com-wordpress:feed-additions:1">18498</post-id> </item>
  124. <item>
  125. <title>The D-Day</title>
  126. <link>https://www.naavi.org/wp/the-d-day/</link>
  127. <dc:creator><![CDATA[Vijayashankar Na]]></dc:creator>
  128. <pubDate>Sun, 22 Jun 2025 04:26:24 +0000</pubDate>
  129. <category><![CDATA[Cyber Law]]></category>
  130. <guid isPermaLink="false">https://www.naavi.org/wp/?p=18495</guid>
  131.  
  132. <description><![CDATA[This is just to record the night of 21/22nd June 2025, IST as an important day of our generation when we might have seen the closest to a World War 3 scenario. India successfully conducted the Sindhur operations a few &#8230; <a href="https://www.naavi.org/wp/the-d-day/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
  133. <content:encoded><![CDATA[
  134. <p class="has-text-align-justify">This is just to record the night of 21/22nd June 2025, IST as an important day of our generation when we might  have seen the closest to a World War 3 scenario.</p>
  135.  
  136.  
  137.  
  138. <p class="has-text-align-justify">India successfully conducted the Sindhur operations a few weeks back and hit Pakistani nuclear facilities significantly. But inside these facilities the US was hurt and moved into force a ceasefire before the final assault.</p>
  139.  
  140.  
  141.  
  142. <p class="has-text-align-justify">In Iran however, the same USA has moved in to neutralize the nuclear capabilities of Iran. Though the blow could be crippling, the counter action could create lot of problems to US in the form of terrorist attacks the way India has been bled for decades  by Pakistan.</p>
  143.  
  144.  
  145.  
  146. <p class="has-text-align-justify">Neutralization or debilitation of terrorist forces anywhere in the world is welcome and as responsible global citizens we need to take note of this day as one of the most important day of our life.</p>
  147.  
  148.  
  149.  
  150. <p class="has-text-align-right">Naavi</p>
  151. ]]></content:encoded>
  152. <post-id xmlns="com-wordpress:feed-additions:1">18495</post-id> </item>
  153. <item>
  154. <title>Free DPDPA Evaluation for Select Companies</title>
  155. <link>https://www.naavi.org/wp/free-dpdpa-evaluation-for-select-companies/</link>
  156. <dc:creator><![CDATA[Vijayashankar Na]]></dc:creator>
  157. <pubDate>Sat, 21 Jun 2025 03:27:26 +0000</pubDate>
  158. <category><![CDATA[Cyber Law]]></category>
  159. <guid isPermaLink="false">https://www.naavi.org/wp/?p=18490</guid>
  160.  
  161. <description><![CDATA[DPDPA Compliance is a complex process which requires discovery of personal data to which the act is applicable, Classifying it appropriately, understanding how the different sections of the Act apply to the data and determining what risks of non compliance &#8230; <a href="https://www.naavi.org/wp/free-dpdpa-evaluation-for-select-companies/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
  162. <content:encoded><![CDATA[
  163. <p class="has-text-align-justify">DPDPA Compliance is a complex process which requires discovery of personal data to which the act is applicable, Classifying it appropriately, understanding how the different sections of the Act apply to the data and determining what risks of non compliance exists, what Governance and Technical measures are to be initiated to mitigate the risks.</p>
  164.  
  165.  
  166.  
  167. <p class="has-text-align-justify">Many companies might have already initiated some measures in this regard. Many companies are developing products and services to assist the companies for compliance. </p>
  168.  
  169.  
  170.  
  171. <p class="has-text-align-justify">In this scenario, FDPPI as the apex organization promoting DPDPA Compliance has initiated a project to provide One free assessment of DPDPA Compliance for any Company in India per week (Till the scheme is withdrawn at its discretion).</p>
  172.  
  173.  
  174.  
  175. <p class="has-text-align-justify">The assessment requires one online session of around 90-120 minutes with the DPO or equivalent senior management person who may be assisted by others in the company. During the session, Naavi will conduct an online evaluation interview with appropriate questions and record the answers. </p>
  176.  
  177.  
  178.  
  179. <p class="has-text-align-justify">Based on the answers provided,  an evaluation report would be issued.</p>
  180.  
  181.  
  182.  
  183. <p class="has-text-align-justify">The evaluation would be based  on the celebrated DGPSI system used by FDPPI.</p>
  184.  
  185.  
  186.  
  187. <p class="has-text-align-justify">There are no strings attached to this free offer which is a near substitute for a Gap Assessment which would normally cost a few lakhs for any company.</p>
  188.  
  189.  
  190.  
  191. <p class="has-text-align-justify">The offer is based on requests received and on first cum first served basis. Once the requests are received, the interviews would be scheduled appropriately. Initially around 12 bookings would be accepted for the next 3 months and a decision will be taken on its continuance.</p>
  192.  
  193.  
  194.  
  195. <p>We invite interested DPOs to contact through <a href="mailto:naavi@fdppi.in">email to Naavi</a> . Kindly use the subject line &#8220;Free DPDPA Assessment&#8221;.</p>
  196.  
  197.  
  198.  
  199. <p class="has-text-align-right">Naavi</p>
  200.  
  201.  
  202.  
  203. <p>P.S: I have received a query about why FDPPI is giving this assessment free even if it  is for one company per week. </p>
  204.  
  205.  
  206.  
  207. <p>I would like to state that there are two objectives.</p>
  208.  
  209.  
  210.  
  211. <ol>
  212. <li>To remove the fear about DPDPA Compliance.</li>
  213.  
  214.  
  215.  
  216. <li>To  prevent companies being mislead.</li>
  217.  
  218.  
  219.  
  220. <li>To provide an indication for Cyber Insurance readiness for DPDPA risk</li>
  221. </ol>
  222.  
  223.  
  224.  
  225. <p class="has-text-align-right">Naavi</p>
  226. ]]></content:encoded>
  227. <post-id xmlns="com-wordpress:feed-additions:1">18490</post-id> </item>
  228. <item>
  229. <title>Name &#8220;Air India&#8221; attracts Risks of its own</title>
  230. <link>https://www.naavi.org/wp/name-air-india-attracts-risks-of-its-own/</link>
  231. <dc:creator><![CDATA[Vijayashankar Na]]></dc:creator>
  232. <pubDate>Mon, 16 Jun 2025 02:53:36 +0000</pubDate>
  233. <category><![CDATA[Cyber Law]]></category>
  234. <guid isPermaLink="false">https://www.naavi.org/wp/?p=18487</guid>
  235.  
  236. <description><![CDATA[The Air India crash has a distinct signature of what experts call as a near improbable total two engine failure. However this also significantly increases the possibility of an &#8220;Electronic Sabotage&#8221; which could have caused the fuel cut-off or hydraulic &#8230; <a href="https://www.naavi.org/wp/name-air-india-attracts-risks-of-its-own/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
  237. <content:encoded><![CDATA[
  238. <p class="has-text-align-justify">The Air India crash has a distinct signature of what experts call as a near improbable total two engine failure. However this also significantly increases the possibility of an &#8220;Electronic Sabotage&#8221; which could have caused the fuel cut-off or hydraulic failure etc which the experts indicate as a possible reason.</p>
  239.  
  240.  
  241.  
  242. <p class="has-text-align-justify">Though Air India is no longer a national carrier and is as much private as any other airline, the perception is that its reputation good or bad is linked to the reputation of India. Hence the enemies of India both within the country or outside target the airline to indirectly bring down the reputation of Air India. Hence Air India faces an &#8220;Enemy Risk&#8221; which other airlines donot face. </p>
  243.  
  244.  
  245.  
  246. <p class="has-text-align-justify">Since today&#8217;s aircrafts are all controlled by electronics, the safety of the aircraft is very much dependent on the safety of the electronic systems just like controlling a large computer network. It appears that there needs to be a CISO for every aircraft. </p>
  247.  
  248.  
  249.  
  250. <p class="has-text-align-justify">The more we think Air India is the nation&#8217;s pride, the more attention we would attract of Pakistani terrorists. </p>
  251.  
  252.  
  253.  
  254. <p class="has-text-align-justify">One of the Risk management strategies for the airline now is to change its name though it would be a sad decision to take. </p>
  255.  
  256.  
  257.  
  258. <p class="has-text-align-right">Naavi</p>
  259. ]]></content:encoded>
  260. <post-id xmlns="com-wordpress:feed-additions:1">18487</post-id> </item>
  261. <item>
  262. <title>Valuation of Data upheld by a Court</title>
  263. <link>https://www.naavi.org/wp/valuation-of-data-upheld-by-a-court/</link>
  264. <dc:creator><![CDATA[Vijayashankar Na]]></dc:creator>
  265. <pubDate>Sun, 15 Jun 2025 06:49:33 +0000</pubDate>
  266. <category><![CDATA[Cyber Law]]></category>
  267. <guid isPermaLink="false">https://www.naavi.org/wp/?p=18485</guid>
  268.  
  269. <description><![CDATA[In an interesting decision of the UP State Consumer disputes redressal Commission, WhatsApp has been considered as a &#8220;Paid Service&#8221; with the payment having been received in the form of personal data shared by the account holder. (Refer: article the420.in) &#8230; <a href="https://www.naavi.org/wp/valuation-of-data-upheld-by-a-court/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
  270. <content:encoded><![CDATA[
  271. <p class="has-text-align-justify">In an interesting decision of the UP State Consumer disputes redressal Commission,  WhatsApp has been considered as a &#8220;Paid Service&#8221; with the payment having been received in the form of personal data shared by the account holder.</p>
  272.  
  273.  
  274.  
  275. <p>(<a href="https://the420.in/amitabh-thakur-whatsapp-consumer-rights-case-up-state-commission-game-changing-verdict-on-free-apps-data-as-payment/" target="_blank" rel="noreferrer noopener">Refer: article  the420.in</a>)</p>
  276.  
  277.  
  278.  
  279. <p class="has-text-align-justify">Naavi has been advocating the &#8220;Data Valuation&#8221; as one of the essential features of Data Management in a company and valuing of data and its disclosure is a recommended procedure under the DGPSI (Data Governance and Protection Standard of India) framework of compliance.</p>
  280.  
  281.  
  282.  
  283. <p class="has-text-align-justify">The exact value of the data may be under dispute but the fact that data has a a value is indisputable.  In this case, the value of the data has not been specified in rupee terms but whatever is the benefit  used by WhatsApp is to be treated as the consideration passed.</p>
  284.  
  285.  
  286.  
  287. <p>Hope Income Tax and GST is not applicable !</p>
  288.  
  289.  
  290.  
  291. <p class="has-text-align-right">Naavi</p>
  292. ]]></content:encoded>
  293. <post-id xmlns="com-wordpress:feed-additions:1">18485</post-id> </item>
  294. <item>
  295. <title>Is Ahmedabad Crash an act of hacking?</title>
  296. <link>https://www.naavi.org/wp/is-ahmedabad-crash-an-act-of-hacking/</link>
  297. <dc:creator><![CDATA[Vijayashankar Na]]></dc:creator>
  298. <pubDate>Sat, 14 Jun 2025 03:11:02 +0000</pubDate>
  299. <category><![CDATA[Cyber Law]]></category>
  300. <guid isPermaLink="false">https://www.naavi.org/wp/?p=18482</guid>
  301.  
  302. <description><![CDATA[For a long time there has been a discussion on whether the computer systems of an aircraft can be manipulated through external interference. The tragic Ahmedabad plane crash will revive this discussion since there are certain indications of the possibility &#8230; <a href="https://www.naavi.org/wp/is-ahmedabad-crash-an-act-of-hacking/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
  303. <content:encoded><![CDATA[
  304. <p class="has-text-align-justify">For a long time there has been a discussion on whether the computer systems of an aircraft can be manipulated through external interference.</p>
  305.  
  306.  
  307.  
  308. <p class="has-text-align-justify">The tragic Ahmedabad plane  crash will revive this discussion since there are certain indications of the possibility of such sabotage. </p>
  309.  
  310.  
  311.  
  312. <p class="has-text-align-justify">Apart from the social media watchers who are revealing some earlier X posts to suggest a terror plan,  astrological analysis  of the event also indicate the possibility of sabotage.  </p>
  313.  
  314.  
  315.  
  316. <p class="has-text-align-justify">It is time the technical concerns, media  concerns and astrological concerns may all be put to test with the investigations of the crash.</p>
  317.  
  318.  
  319.  
  320. <p>Let&#8217;s us watch the developments.</p>
  321.  
  322.  
  323.  
  324. <p class="has-text-align-right">Naavi</p>
  325. ]]></content:encoded>
  326. <post-id xmlns="com-wordpress:feed-additions:1">18482</post-id> </item>
  327. <item>
  328. <title>When Do Cookies become an issue under DPDPA?</title>
  329. <link>https://www.naavi.org/wp/when-do-cookies-become-an-issue-under-dpdpa/</link>
  330. <dc:creator><![CDATA[Vijayashankar Na]]></dc:creator>
  331. <pubDate>Thu, 12 Jun 2025 08:16:30 +0000</pubDate>
  332. <category><![CDATA[Cyber Law]]></category>
  333. <guid isPermaLink="false">https://www.naavi.org/wp/?p=18477</guid>
  334.  
  335. <description><![CDATA[We are all aware that Cookies are hosted on websites and they collect some technical information from visitors. Normally cookies are implanted in the user&#8217;s system through at a location assigned by the browser. It is a text file and &#8230; <a href="https://www.naavi.org/wp/when-do-cookies-become-an-issue-under-dpdpa/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
  336. <content:encoded><![CDATA[
  337. <p class="has-text-align-justify">We are all aware that Cookies are hosted on websites and they collect some technical information from visitors. </p>
  338.  
  339.  
  340.  
  341. <p class="has-text-align-justify">Normally cookies are implanted in the user&#8217;s system through at a location assigned by the browser. It is a text file and may contain some information. </p>
  342.  
  343.  
  344.  
  345. <p class="has-text-align-justify">The session cookies are those files which exist during a session and are automatically cleared when the session ends. Persistent cookies are those cookies that remain in the system and are available for future reference.</p>
  346.  
  347.  
  348.  
  349. <p class="has-text-align-justify">When a person visits a websites, a &#8220;Cookie Consent&#8221; is taken in which normally an option is given to provide consent for &#8220;Necessary Cookies&#8221;, &#8220;Statistical Cookies&#8221; and &#8220;Marketing Cookies&#8221;. Necessary cookies are normally mandatory while others can be optional. </p>
  350.  
  351.  
  352.  
  353. <p class="has-text-align-justify">When the person visits the same website again, the web server checks for the existence of the cookie related to the webserver using the cookie identity. Once it is found, it may use the information there in, to record the current session as related to the previous session. The web server may keep its own record of the earlier session and therefore build a profile of the user  in its systems. </p>
  354.  
  355.  
  356.  
  357. <p class="has-text-align-justify">Certain cookies (mostly in the category of necessary cookies) are meant only to record the operating system, the browser used  which are required for configuration of the web page. If it identifies the person as coming from a mobile, it may present a compatible page to enhance the viewer&#8217;s experience. If the information picked up is IP address, it can be analysed to identify the user&#8217;s location. Based on the location of the user, the content can also be modified.</p>
  358.  
  359.  
  360.  
  361. <p class="has-text-align-justify">In such uses the identify of the individual may not be required and hence the information may remain technical and statistical information of the &#8220;De-identified Personal Information&#8221; category. </p>
  362.  
  363.  
  364.  
  365. <p class="has-text-align-justify">However it is possible that some cookies which are &#8220;Persistent Cookies&#8221; and not deleted after the session, may capture more identifiable data of the individual and store it for future use. In such cases, a question  arises whether the Cookie is a &#8220;Personally identifiable information&#8221; as per the data protection laws such as GDPR or DPDPA.</p>
  366.  
  367.  
  368.  
  369. <p class="has-text-align-justify">If a person is normally visiting a website and does not provide any of the information such as his name, email address etc in the process, the Cookie can only access  statistical and technical information. In such cases it may not be a &#8220;Personally identifiable information&#8221; .  If however the web server maintains such data which is linked to some other identified data in its possession and can link the current session with the personal information already available with the server, then the cookie gathered information along with the available information together becomes personally identifiable and comes under data protection laws.</p>
  370.  
  371.  
  372.  
  373. <p class="has-text-align-justify">The consent to be taken by the web site therefore depends on what is the configuration of the Cookie and whether any personal data of the visitor is already with the web server and also whether the cookie is a persistent cookie or not.</p>
  374.  
  375.  
  376.  
  377. <p class="has-text-align-justify">If cookies are not &#8220;Secure Cookies&#8221; the data may be transferred on http connections without transit encryption.</p>
  378.  
  379.  
  380.  
  381. <p class="has-text-align-justify">Usually the web sites are managed by the hosting company and the data fiduciary may not have a clear understanding of what cookies are in place and what kind of parameters they collect. </p>
  382.  
  383.  
  384.  
  385. <p class="has-text-align-justify">Hence it is necessary for DPOs to collect this information and construct their cookie policy appropriately. In particular we need to understand if cookies collect information that are of personal nature and whether any copies of such information are stored in third party accessible systems.</p>
  386.  
  387.  
  388.  
  389. <p class="has-text-align-justify">Currently websites take a consent which is not specifically explaining what is the purpose of the cookie, what type of information it collects, how long it retains, how it is used etc. Hence it may be necessary to list each cookie and obtain consent for each cookie separately. The current practice of taking the consent for all cookies or for categories of cookies like functional cookies or advertising cookies etc. needs to be modified forthwith.</p>
  390.  
  391.  
  392.  
  393. <p class="has-text-align-justify">If DPOs donot take control of the cookies on their websites, they may be a source of concern at any point of time. Cookie Control may be simple but needs to be managed along with a periodical audit. </p>
  394.  
  395.  
  396.  
  397. <p class="has-text-align-right">Naavi</p>
  398. ]]></content:encoded>
  399. <post-id xmlns="com-wordpress:feed-additions:1">18477</post-id> </item>
  400. <item>
  401. <title>The Nature of Business Requirement Document released by Meity for Consent Management</title>
  402. <link>https://www.naavi.org/wp/the-nature-of-business-requirement-document-released-by-meity-for-consent-management/</link>
  403. <dc:creator><![CDATA[Vijayashankar Na]]></dc:creator>
  404. <pubDate>Thu, 12 Jun 2025 04:13:28 +0000</pubDate>
  405. <category><![CDATA[Cyber Law]]></category>
  406. <guid isPermaLink="false">https://www.naavi.org/wp/?p=18474</guid>
  407.  
  408. <description><![CDATA[Medianama, a well known website has commented on the Business Requirement Document (BRD) released by MeitY with the following caption. &#8220;MeitY Explains How an Ideal Consent Management System Should Work Under DPDPA&#8221; The perception has been that MeitY has actually &#8230; <a href="https://www.naavi.org/wp/the-nature-of-business-requirement-document-released-by-meity-for-consent-management/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
  409. <content:encoded><![CDATA[
  410. <p>Medianama, a well known website has commented on the Business Requirement Document (BRD) released by MeitY with the following caption.</p>
  411.  
  412.  
  413.  
  414. <p><a href="https://www.medianama.com/2025/06/223-meity-guidelines-consent-management-system-under-dpdpa/" target="_blank" rel="noreferrer noopener">&#8220;MeitY Explains How an Ideal Consent Management System Should Work Under DPDPA&#8221;</a></p>
  415.  
  416.  
  417.  
  418. <p class="has-text-align-justify">The perception has been that MeitY has actually released a guideline in extension of the DPDPA Rules on the Consent Management System more particularly for the Consent Managers.</p>
  419.  
  420.  
  421.  
  422. <p class="has-text-align-justify">We should however point out that this is a mis conception. The NeGD under MeitY has actually released this document to support a &#8220;Code Development Challenge&#8221; that it has floated for developing an open source recommendation for Data Fiduciaries. </p>
  423.  
  424.  
  425.  
  426. <p class="has-text-align-justify">&#8220;Consent Managers&#8221; who register themselves with DPB are also data fiduciaries but their requirement goes beyond managing the consent. They are an intermediary with multiple Data Fiduciaries whose services are used by data principals. </p>
  427.  
  428.  
  429.  
  430. <p class="has-text-align-justify">Further the BRD is a generic platform which requires to be customized by different data fiduciaries.</p>
  431.  
  432.  
  433.  
  434. <p class="has-text-align-justify">It is necessary to clarify the purpose of this document as otherwise there would be a difficulty for Data Fiduciaries who may think this is the final guideline from the Ministry.</p>
  435. ]]></content:encoded>
  436. <post-id xmlns="com-wordpress:feed-additions:1">18474</post-id> </item>
  437. <item>
  438. <title>Consent Life Cycle for DPDPA Compliance</title>
  439. <link>https://www.naavi.org/wp/consent-life-cycle-for-dpdpa-compliance/</link>
  440. <dc:creator><![CDATA[Vijayashankar Na]]></dc:creator>
  441. <pubDate>Wed, 11 Jun 2025 07:03:48 +0000</pubDate>
  442. <category><![CDATA[Cyber Law]]></category>
  443. <guid isPermaLink="false">https://www.naavi.org/wp/?p=18466</guid>
  444.  
  445. <description><![CDATA[&#8220;Consent&#8221; is the backbone of DPDPA Compliance. &#8220;Legitimate Use&#8221; is an exception and organizations need to cover as much of their management of Data protected by DPDPA through Consents. As a result most companies are now struggling to trace the &#8230; <a href="https://www.naavi.org/wp/consent-life-cycle-for-dpdpa-compliance/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
  446. <content:encoded><![CDATA[
  447. <p class="has-text-align-justify">&#8220;Consent&#8221; is the backbone of DPDPA Compliance. &#8220;Legitimate Use&#8221; is an exception and organizations need to cover as much of their management of Data protected by DPDPA  through Consents.</p>
  448.  
  449.  
  450.  
  451. <p class="has-text-align-justify">As a result most companies are now struggling to trace the life cycle of their &#8220;Consent Management Program&#8221;.</p>
  452.  
  453.  
  454.  
  455. <p class="has-text-align-justify">Consent management program has a close association with the Data Life Cycle in an organization. </p>
  456.  
  457.  
  458.  
  459. <p class="has-text-align-justify">As per <a href="https://www.naavi.org/wp/reversible-life-cycle-hypothesis-of-the-theory-of-data/" data-type="post" data-id="9454">&#8220;Naavi&#8217;s Theory of Data&#8221;</a>, data in an organization goes through a &#8220;Reversible Life Cycle&#8221;</p>
  460.  
  461.  
  462.  
  463. <p class="has-text-align-center"><img fetchpriority="high" decoding="async" width="450" height="379" data-attachment-id="18467" data-permalink="https://www.naavi.org/wp/consent-life-cycle-for-dpdpa-compliance/life_cycle_of_data/" data-orig-file="https://i0.wp.com/www.naavi.org/wp/wp-content/uploads/2025/06/life_cycle_of_data.jpg?fit=720%2C606&amp;ssl=1" data-orig-size="720,606" data-comments-opened="0" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="life_cycle_of_data" data-image-description="" data-image-caption="" data-medium-file="https://i0.wp.com/www.naavi.org/wp/wp-content/uploads/2025/06/life_cycle_of_data.jpg?fit=300%2C253&amp;ssl=1" data-large-file="https://i0.wp.com/www.naavi.org/wp/wp-content/uploads/2025/06/life_cycle_of_data.jpg?fit=640%2C539&amp;ssl=1" class="wp-image-18467" style="width: 450px;" src="https://i0.wp.com/www.naavi.org/wp/wp-content/uploads/2025/06/life_cycle_of_data.jpg?resize=450%2C379&#038;ssl=1" alt="" srcset="https://i0.wp.com/www.naavi.org/wp/wp-content/uploads/2025/06/life_cycle_of_data.jpg?w=720&amp;ssl=1 720w, https://i0.wp.com/www.naavi.org/wp/wp-content/uploads/2025/06/life_cycle_of_data.jpg?resize=300%2C253&amp;ssl=1 300w" sizes="(max-width: 450px) 100vw, 450px" data-recalc-dims="1" /> </p>
  464.  
  465.  
  466.  
  467. <p class="has-text-align-justify">The Reversible Life Cycle hypothesis of the theory recognizes that the status of Data in an organization is dynamic and starts from a No Data&#8221; status to &#8220;Data&#8221; which transforms into personal data, modified personal data, de-identified personal data, re-identified personal data etc until it  is forensically erased and the storage medium returns to the &#8220;No Data&#8221; status.</p>
  468.  
  469.  
  470.  
  471. <p class="has-text-align-justify">When we try to identify a lifecycle for &#8220;Consent&#8221;  for DPDPA Compliance, we need to recognize the birth of the Consent, its own development and extinguishing with the lifecycle of the personal data. </p>
  472.  
  473.  
  474.  
  475. <p class="has-text-align-justify">For example, Consent takes birth when a notice is accepted and received by the data fiduciary. </p>
  476.  
  477.  
  478. <div class="wp-block-image">
  479. <figure class="aligncenter size-full is-resized"><img decoding="async" width="609" height="583" data-attachment-id="18468" data-permalink="https://www.naavi.org/wp/consent-life-cycle-for-dpdpa-compliance/consent_life_cycle/" data-orig-file="https://i0.wp.com/www.naavi.org/wp/wp-content/uploads/2025/06/consent_life_cycle.jpg?fit=609%2C583&amp;ssl=1" data-orig-size="609,583" data-comments-opened="0" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="consent_life_cycle" data-image-description="" data-image-caption="" data-medium-file="https://i0.wp.com/www.naavi.org/wp/wp-content/uploads/2025/06/consent_life_cycle.jpg?fit=300%2C287&amp;ssl=1" data-large-file="https://i0.wp.com/www.naavi.org/wp/wp-content/uploads/2025/06/consent_life_cycle.jpg?fit=609%2C583&amp;ssl=1" src="https://i0.wp.com/www.naavi.org/wp/wp-content/uploads/2025/06/consent_life_cycle.jpg?resize=609%2C583&#038;ssl=1" alt="" class="wp-image-18468" style="width:401px;height:auto" srcset="https://i0.wp.com/www.naavi.org/wp/wp-content/uploads/2025/06/consent_life_cycle.jpg?w=609&amp;ssl=1 609w, https://i0.wp.com/www.naavi.org/wp/wp-content/uploads/2025/06/consent_life_cycle.jpg?resize=300%2C287&amp;ssl=1 300w" sizes="(max-width: 609px) 100vw, 609px" data-recalc-dims="1" /></figure></div>
  480.  
  481.  
  482. <p class="has-text-align-justify">Prior to this stage, data exists in the company but not recognized as personal data. At this stage a data discovery process has to be initiated . The Consent lifecycle starts only when personal data is already there or is about to be collected. </p>
  483.  
  484.  
  485.  
  486. <p class="has-text-align-justify">The birth of the consent starts with the Notice. The notice itself has a generative process starting with the recognition of the need of a set of data aligned to a business requirement. In other words, Business needs data, the Tech department shows how it can be obtained and then the collection mechanism gets activated. At this stage the legal department or the DPO generates the purpose specific notice and tech department hosts it in such form that the acceptance can be provided by the data principal before it enters the production zone for usage. </p>
  487.  
  488.  
  489.  
  490. <p class="has-text-align-justify">This itself is a sub process which involves sending of the notice, receiving confirmation, documenting the receipt, noting rejections, request for modifications etc. If we take this into consideration, the origin of consent starts with the business division, passes through the tech and legal divisions before it lands into the Privacy division/DPO.</p>
  491.  
  492.  
  493.  
  494. <p class="has-text-align-justify">Once the consented data is in storage, whether it is for one time use or repeated use depends on the consent and accordingly it has to be managed. The access control, retention and deletion etc also depend on the consent and that needs to be managed. Consent is also a reference document whenever the data principal tries to exercise his rights. Consent may have to be retained even beyond the principal data itself for dispute management purpose.</p>
  495.  
  496.  
  497.  
  498. <p class="has-text-align-justify">In the Indian context, the consent may  also be provided by a recognized consent manager and hence management of consent collection and subsequent operations has to accommodate the consent manager as a third party.</p>
  499.  
  500.  
  501.  
  502. <p class="has-text-align-justify">Finally when the consent expires there  has to be a mechanism for removing the data from production, archive it to the extent necessary and discard it when relevant. </p>
  503.  
  504.  
  505.  
  506. <p class="has-text-align-justify">The Consent life cycle therefore starts with the &#8220;Drafting of the Privacy Notice&#8221; and goes through the collection, usage until expiry and disposal.</p>
  507.  
  508.  
  509.  
  510. <p class="has-text-align-justify">Once the personally identifiable data is irreversibly anonymised, it becomes &#8220;Non Personal Data&#8221; and goes out of the cycle. The reversible de-identification and pseudonymisation keeps the data in the status of a &#8220;Provisional PII&#8221; since they can be re-identified when required. The consent needs to support these activities. Since Consent is basically a permission to support a data processing operation, it is the purpose of consent which determines whether the data can be modified by the data fiduciary in any specific manner. If the purpose is over, the data is deleted and this deletion does not require a specific permission unless &#8220;Data Storage&#8221; itself is a service.  Hence &#8220;Irreversible anonymization&#8221; is also a process which can be tagged to the completion of the purpose. </p>
  511.  
  512.  
  513.  
  514. <p class="has-text-align-justify">De-identification or Pseudonymisation for security purpose is also considered  part of the permissions. &#8220;Disclosure of pseudonymised personal information&#8221; may not be strictly within the permission for processing and has to be handled with care.  </p>
  515.  
  516.  
  517.  
  518. <p class="has-text-align-justify">In certain cases the data may belong to more than one individual and may also be a transactional data on which the data fiduciary also has a stake. In such cases the purpose closure needs to  be recognized only when all the owners have indicated closure of their respective stakes. </p>
  519.  
  520.  
  521.  
  522. <p class="has-text-align-justify">Consent management process therefore needs to take note of all these complications.</p>
  523.  
  524.  
  525.  
  526. <p class="has-text-align-right">Naavi</p>
  527. ]]></content:encoded>
  528. <post-id xmlns="com-wordpress:feed-additions:1">18466</post-id> </item>
  529. </channel>
  530. </rss>
  531.  

If you would like to create a banner that links to this page (i.e. this validation result), do the following:

  1. Download the "valid RSS" banner.

  2. Upload the image to your own server. (This step is important. Please do not link directly to the image on this server.)

  3. Add this HTML to your page (change the image src attribute if necessary):

If you would like to create a text link instead, here is the URL you can use:

http://www.feedvalidator.org/check.cgi?url=http%3A//www.naavi.org/wp/%3Ffeed%3Drss2

Copyright © 2002-9 Sam Ruby, Mark Pilgrim, Joseph Walton, and Phil Ringnalda