Chapter 17: Data Protection & Electronic Crimes-Theory Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

Chapter Introduction.

A

Law relating to protection of personal data of individual i.e. “Personal Data Protection Bill, 2020” is in draft stage. Before this law, protection of individual was dealt in various other laws e.g.
- Payment System and Electronic Fund Transfers Act, 2007 (for secrecy of customer information held by financial institutions)
- Telecom Consumer Protection Regulations, 2009 (for illegal practice oftelecom operators i.e. illegal use of personal data of subscribers)
- Prevention of Electronic Crimes Act, 2016 (PECA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What ““Personal Data Protection Bill, 2020” describes? (4)

A

This law describes:
- Definitions
- Key Principles for Organizations for collection, processing, use and disclosure of personal data of individuals.
- Rights of Individuals regarding their personal data.
- Offences and punishments for violation of data privacy are also discussed in “Prevention of Electronic Crimes Act, 2016”.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define “Data Subject”.

A

Natural Persons whose personal data is being collected/processed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define “Data Controller”.

A

A person who collects/processes data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define “Personal Data”.

A

Personal data means information of a Data Subject which is in possession of a Data Controller and
from which he can be identified.
- It includes Sensitive Personal Data.
- It does not include encrypted (or anonymized or pseudonymized) data which is unable to identify an individual.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define “Sensitive Personal Data”. (5)

A

It means data relating to Access Controls (i.e. usernames and passwords) which provides access to:
- Financial information (e.g. bank account, debit/credit card or other payment instruments).
- Passport, Biometric Data
- Medical Records (including physical, psychological or mental health records)
- Religious beliefs, ethnicity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define “Consent”.

A

Consent means clear and free agreement by data subject allowing to collect and process data relating to him.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

List down Key Principles for Personal Data Processing. (7 Points)

A
  1. Lawfulness, fairness and transparency
  2. Data minimization (i.e. only limited data must be obtained which is necessary for the purpose).
  3. Purpose limitation
  4. Accuracy
  5. Security (i.e. Integrity and confidentiality)
  6. Storage limitation
  7. Accountability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

List down Rights of Individuals regarding Processing of Personal Data. (9 Points)

A
  1. Right to be informed
  2. Right of access to data (including right to get copies of data)
  3. Right to rectification of errors
  4. Right to be forgotten / Right of erasure
  5. Right to object to processing and marketing
  6. Right to restrict processing
  7. Right to data portability
  8. Right to withdraw consent
  9. Right to complain to the relevant data protection authority
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Introduction to “Prevention of Electronic Crimes Act, 2016”/ What “Prevention of Electronic Crimes Act, 2016” discusses, elaborate.

A
  1. Electronic Crimes, and
  2. Procedures for investigation, and
  3. Punishments for Electronic Crimes.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define term “Access to Information System”.

A

Access to information system means gaining ability to use information system, in part or whole.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define term “Access to Data”

A

Access to data means access gaining ability to use, copy, delete or modify data held in a device or information system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define term “Damage to Data”.

A

Data Damage means unauthorized addition, deletion, alteration, relocation or making data unavailable (temporarily or permanently).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define term “Unauthorized Access”.

A

It means accessing an information system or data which is not available for general public,
without authorization or in violation of terms and conditions of authorization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define term “Critical Infrastructure”.

A

It means those elements of infrastructure (i.e. assets, facilities, systems, networks, or processes)
whose loss may result in:
- Adverse effect on availability or delivery of essential services (including services whose disturbance can cause loss of life or casualties), taking into account significant economic or
social impact.
- Adverse effect on national security, national defence or functioning of the state.
Government can also designate any Govt. or Private infrastructure to be Critical Infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Under electronic crimes and their punishments,
what is punishment for following offence,
If Offence is Non-Critical,
1. Unauthorized access to information system or data.

A

Imprisonment up to: 3 months
And/or fine up to: Rs.50,000

17
Q

Under electronic crimes and their punishments,
what is punishment for following offence,
If Offence is Non-Critical,
2. Unauthorized copying or transmission of data.

A

Imprisonment up to: 6 months
And/or fine up to: Rs.100,000

18
Q

Under electronic crimes and their punishments,
what is punishment for following offence,
If Offence is Non-Critical,
3. Interference with or damaging information system or data.

A

Imprisonment up to: 2 Years
And/or fine up to: Rs.500,000

19
Q

Under electronic crimes and their punishments,
what is punishment for following offence,
If Offence is Critical,
1. Unauthorized access to critical infrastructure information system or data

A

Imprisonment up to: 3 Years
And/or fine up to: Rs. 1,000,000

20
Q

Under electronic crimes and their punishments,
what is punishment for following offence,
If Offence is Critical,
2. Unauthorized copying or transmission of critical infrastructure data

A

Imprisonment up to: 5 Years
And/or fine up to: Rs. 5,000,000

21
Q

Under electronic crimes and their punishments,
what is punishment for following offence,
If Offence is Critical,
3. Interference with critical infrastructure information system or data.

A

Imprisonment up to: 7 Years
And/or fine up to: Rs. 10,000,000

22
Q

Under electronic crimes and their punishments,
what is punishment for following offence,
If Offence is Critical,
4. Glorification (i.e. showing praise or celebration) of an offense:
If someone prepares or spreads information to glorify a terrorist or an offence of terrorism or activities of such prescribed persons/organizations.

A

Imprisonment up to: 7 Years
And/or fine up to: Rs. 10,000,000