• News
  • Security
  • Products
  • About Seqrite
Seqrite Blog Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Cybersecurity  /  Complying with data privacy laws will be a key priority in the new normal
Compliance with data privacy laws critical
19 March 2021

Complying with data privacy laws will be a key priority in the new normal

Written by Seqrite
Seqrite
Cybersecurity
Estimated reading time: 3 minutes

As a concept, privacy is seeing a paradigm shift in terms of its importance. Traditionally, for a developing country like India with its myriad of sociological and infrastructural issues, privacy came quite low on the priority list. However, with the rapid development the country has seen in the last few decades with the growth largely driven by a digital economy, the right to privacy is now being examined in a new light.

Looking back, this shift can be traced back to August 2017 when a nine-judge bench of the country’s Supreme Court declared the Right to Privacy to be a fundamental right for Indian citizens under the Constitution. Following the lines of the European Union’s (EU) much-vaunted General Data Protection Regulation (GDPR), India is also working on a data protection legislation which was tabled in parliament in December 2019 as the Personal Data Protection Bill 2019. This law is currently being examined by a Joint Parliamentary Committee but should come into existence very soon.

Focus on data privacy in the banking & healthcare sectors

The COVID-19 pandemic of 2020 has also led to an increase in vision documents and legislation on privacy. The Reserve Bank of India (RBI), India’s central bank, took cognizance of the rise in digital banking precipitated by the coronavirus crisis and released a Technology Vision Document for Cyber Security for the Urban Co-operative banking sector to enhance the sector’s cybersecurity posture in September 2020.

The country’s healthcare sector will also soon be regulated by legislation similar to the United States’ landmark Health Insurance Portability & Accountability Act (HIPAA). The Digital Information Security in Healthcare Act (DISHA), which is currently in the draft stage, aims to provide a framework for electronic health data privacy and confidentiality, while also proposing various penalties for digital health data breaches.

What is clear from the above is that India’s institutions are taking data privacy very seriously and following in the footsteps of the world. Enterprises, hence, cannot afford to overlook the implications of data privacy; the ensuing legislations mandate substantial financial penalties if compliance on data privacy is not achieved. There is the risk of reputational damage caused due to the negative media coverage that privacy breaches routinely cause nowadays.

Compliance with regional data protection laws is necessary for the new normal

To begin with, enterprises must conduct a thorough audit of their current data protection, status if not already done. Depending on where they are located, every country will have different laws that enterprises must adhere to. Also, similar to the GDPR, enterprises may also be responsible for compliance with regulations from the states from where their customers are located. Enterprises are required to be compliant with and aware of all relevant data protection regulations – if required, a legal option should be taken.

Secondly, enterprises must examine what kind of data is being collected from consumers and how it is used. Customers are now increasingly aware of their rights and will question the data that is being collected to them. They also want to know how their data is being used and may also use the famous “Right to be Forgotten” option to ensure that their data is erased.

Does your enterprise have these mechanisms in place? Can customers be assured of how their data is being used and how it is being protected? Enterprises should ensure they follow strict and stringent data protection mechanisms like access controls, encryption and backup.

Privacy will be the buzzword of the new decade and organizations will find that they can set themselves apart from the competition by assuring customers of data privacy in an increasingly invasive world. Seqrite’s suite of comprehensive solutions and services can be an enterprise’s ally in this environment providing the tools required to comply with required data privacy laws.

 Previous PostNation-states shoot from somebody else’s shoulder
Next Post  New Spear Phishing Campaign using Army Welfare Education Society...
Seqrite
About Seqrite

Follow us for the latest updates and insights related to security for enterprise networks. Subscribe to our newsletter to stay...

Articles by Seqrite »

Related Posts

  • How to avoid dual attack and vulnerable files with double extension?

    April 9, 2021
  • Protect enterprise endpoints against their use for illicit activities

    Defend your business systems from being used for illegal purposes

    March 23, 2021
  • New Spear Phishing Campaign using Army Welfare Education Society's Scholarship Form

    New Spear Phishing Campaign using Army Welfare Education Society’s Scholarship form

    March 22, 2021

No Comments

Leave a Reply.Your email address will not be published.

Cancel reply

CAPTCHA Image
Refresh Image

Popular Posts

  • New Spear Phishing Campaign using Army Welfare Education Society’s Scholarship form New Spear Phishing Campaign using Army Welfare Education Society’s Scholarship form March 22, 2021
  • Benefits of having Intrusion Prevention/Detection System in your enterprise Benefits of having Intrusion Prevention/Detection System in your enterprise February 15, 2018
  • 5 Security measures you should take to protect your organization’s network 5 Security measures you should take to protect your organization’s network August 11, 2017

Featured Authors

  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Viraj Talikotkar
    Viraj Talikotkar

    Viraj is a Lead Technical Writer at Quick Heal Technologies. He is always on...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director and Chief Technology Officer of...

    Read more..

Latest Posts

  • How to avoid dual attack and vulnerable files with double extension?

    How to avoid dual attack and vulnerable files with double extension?

    April 9, 2021
  • Cryptocurrency Malware: Bitcoin Mining threats you need to know about

    Cryptocurrency Malware: Bitcoin Mining threats you need to know about

    April 4, 2021
  • Zloader: Entailing Different Office Files

    Zloader: Entailing Different Office Files

    March 23, 2021

Stay Updated!

Topics

Antivirus For Linux (10) apt (10) Bitcoin (9) BYOD (9) COVID-19 (10) Cyber-attack (31) cyber-attacks (56) cyberattacks (12) Cybersecurity (284) cyber security (26) Cyber threat (29) cyber threats (44) Data (11) data breach (50) data breaches (27) data loss (28) data loss prevention (33) data protection (21) data security (13) DLP (49) Encryption (16) endpoint security (103) Enterprise security (14) EPS (9) Exploit (12) firewall (11) GDPR (10) IoT (10) malware (59) malware attack (23) malware attacks (12) MDM (25) Network security (18) Patch Management (12) phishing (17) Ransomware (56) ransomware attack (29) ransomware attacks (30) ransomware protection (12) Seqrite (24) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (10)

Products

  • Endpoint Security (EPS)
  • Seqrite Encryption Manager
  • Seqrite Endpoint Security Cloud
  • Cloud Security
  • Seqrite mSuite
  • Seqrite Workspace
  • Unified Threat Management
  • Antivirus for Server
  • Antivirus for Linux

Resources

  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies

About Us

  • Company Overview
  • Leadership
  • Why choose SEQRITE?
  • Awards & Certifications
  • Newsroom

Archives

  • By Date
  • By Category

© 2020 Quick Heal Technologies Ltd. (Formerly Known as Quick Heal Technologies Pvt. Ltd.) Cookie Policies Privacy Policies

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website.
By browsing this website, you agree to our cookie policy.