{"id":247883,"date":"2023-06-14T19:58:35","date_gmt":"2023-06-14T14:28:35","guid":{"rendered":"https:\/\/blog.forumias.com\/?p=247883"},"modified":"2023-08-28T12:19:41","modified_gmt":"2023-08-28T06:49:41","slug":"data-security-in-india-need-and-challenges","status":"publish","type":"post","link":"https:\/\/forumias.com\/blog\/data-security-in-india-need-and-challenges\/","title":{"rendered":"Data Security in India: Need and Challenges \u2013 Explained, pointwise"},"content":{"rendered":"\n<table style=\"width: 100%; border-collapse: collapse; background-color: #f7f2f2;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\">For\u00a0<strong>7PM Editorial<\/strong>\u00a0Archives click<strong>\u00a0<a href=\"https:\/\/forumias.com\/blog\/7-pm-editorials\/\" target=\"_blank\" rel=\"noopener\">HERE <\/a>\u2192<\/strong><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2 aria-level=\"2\">Introduction<\/h2>\n<p><span data-contrast=\"auto\">India, set to become a trillion-dollar digital economy by 2026, faces significant data security needs and challenges. With over a billion people, digitization and burgeoning internet usage, India must protect its citizens&#8217; data from vulnerabilities and breaches. However, despite a digitally-forward government and robust IT sector, the country lacks critical infrastructure, comprehensive data protection laws, and effective cybersecurity regulations. Consequently, India grapples with increased cyber threats, placing a spotlight on the urgent need for robust data security measures and the challenges in implementing them.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:200,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"2\">What is the recent allegation of a data security breach of CoWIN data?<\/h2>\n<p><b><span data-contrast=\"auto\">Data security breach:<\/span><\/b><span data-contrast=\"auto\"> There have been recent allegations surrounding a data security breach of CoWIN, the centralized digital platform used in India for COVID-19 vaccination registration. The claims suggest that unauthorized access to the personal data of millions of CoWIN registered users occurred, with this data then being reportedly displayed via a Telegram bot.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:200,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Sensitive information leaked:<\/span><\/b><span data-contrast=\"auto\"> The leaked data is said to include sensitive information such as names, contact details, Aadhaar numbers, and the vaccination status of users. The situation has raised serious concerns about privacy and data protection in India, and highlights the need for robust cybersecurity measures. <\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:200,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Indian government response:<\/span><\/b><span data-contrast=\"auto\"> The Indian government, and specifically the Ministry of Health and Family Welfare, have denied any data breach. They insist that their security measures for CoWIN are stringent and that no data has been compromised. Despite their assurances, this incident underscores the urgent need for more comprehensive data protection legislation in India.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:200,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><strong>Read more: <a href=\"https:\/\/forumias.com\/blog\/cowin-vaccination-data-out-centre-denies-breach\/\">CoWIN vaccination data out, Centre denies breach<\/a>\u00a0<\/strong><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2 aria-level=\"2\">Why does India need to focus on Data Security?<\/h2>\n<figure id=\"attachment_247885\" aria-describedby=\"caption-attachment-247885\" style=\"width: 831px\" class=\"wp-caption alignleft\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\" wp-image-247885\" src=\"https:\/\/i0.wp.com\/forumias.com\/blog\/wp-content\/uploads\/2023\/06\/Data-Security-in-India-Need-and-Challenges.png?resize=750%2C815&#038;ssl=1\" alt=\"Data Security breach in India\" width=\"750\" height=\"815\" srcset=\"https:\/\/i0.wp.com\/forumias.com\/blog\/wp-content\/uploads\/2023\/06\/Data-Security-in-India-Need-and-Challenges.png?w=611&amp;ssl=1 611w, https:\/\/i0.wp.com\/forumias.com\/blog\/wp-content\/uploads\/2023\/06\/Data-Security-in-India-Need-and-Challenges.png?resize=276%2C300&amp;ssl=1 276w\" sizes=\"auto, (max-width: 750px) 100vw, 750px\" \/><figcaption id=\"caption-attachment-247885\" class=\"wp-caption-text\">Source: Live Mint<\/figcaption><\/figure>\n<p><b><span data-contrast=\"auto\">Rapid digitization:<\/span><\/b><span data-contrast=\"auto\"> India&#8217;s rapid digital transformation, especially in government services and the financial sector, necessitates a stronger focus on data security. India&#8217;s digital public infrastructure, known as India Stack, handles vast amounts of personal data that could be targeted by cybercriminals.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:200,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Large-scale data breaches:<\/span><\/b><span data-contrast=\"auto\"> Over 80 million Indian users were reportedly affected by data breaches in 2021. These breaches can undermine user trust in digital systems, negatively impact the transition to digital services, and cause significant financial damage.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:200,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Increasing cybersecurity threats:<\/span><\/b><span data-contrast=\"auto\"> India witnessed over 674,000 cybersecurity incidents in just the first half of 2022, as reported by CERT-In. This signals an escalating trend in cyber threats.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:200,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Poor ranking in \u201cGlobal Cybersecurity Index\u201d:<\/span><\/b><span data-contrast=\"auto\"> India&#8217;s low ranking (17 out of 20) in the MIT Technology Review CyberDefense Index 2022\/23 is indicative of its inadequate cybersecurity preparedness. The report cited a lack of critical infrastructure and weak cybersecurity regulation as key areas of concern.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:200,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Data protection legislation gap:<\/span><\/b><span data-contrast=\"auto\"> Despite the Supreme Court&#8217;s ruling in 2017 that privacy is a fundamental right, comprehensive data protection legislation is still missing in India. This leaves the digital rights and privacy of users exposed.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:200,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Global tech presence:<\/span><\/b><span data-contrast=\"auto\"> Most Indian citizens use foreign-owned social networking sites and mobile devices dominated by foreign manufacturers. This, coupled with the push towards data localization, adds layers of complexity to India&#8217;s data security landscape.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:200,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">National security concerns:<\/span><\/b><span data-contrast=\"auto\"> Governments need access to personal data for national security reasons, but without appropriate data security, this can lead to misuse or compromise of sensitive information.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:200,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"2\">How is Data Security ensured in India?<\/h2>\n<figure id=\"attachment_247886\" aria-describedby=\"caption-attachment-247886\" style=\"width: 926px\" class=\"wp-caption alignleft\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-247886\" src=\"https:\/\/i0.wp.com\/forumias.com\/blog\/wp-content\/uploads\/2023\/06\/Data-Security-in-India-Need-and-Challenges-2.png?resize=750%2C727&#038;ssl=1\" alt=\"Data Security initiatives\" width=\"750\" height=\"727\" srcset=\"https:\/\/i0.wp.com\/forumias.com\/blog\/wp-content\/uploads\/2023\/06\/Data-Security-in-India-Need-and-Challenges-2.png?w=926&amp;ssl=1 926w, https:\/\/i0.wp.com\/forumias.com\/blog\/wp-content\/uploads\/2023\/06\/Data-Security-in-India-Need-and-Challenges-2.png?resize=300%2C291&amp;ssl=1 300w, https:\/\/i0.wp.com\/forumias.com\/blog\/wp-content\/uploads\/2023\/06\/Data-Security-in-India-Need-and-Challenges-2.png?resize=768%2C745&amp;ssl=1 768w\" sizes=\"auto, (max-width: 750px) 100vw, 750px\" \/><figcaption id=\"caption-attachment-247886\" class=\"wp-caption-text\">Source: DSCI<\/figcaption><\/figure>\n<p><b><span data-contrast=\"auto\"><a href=\"https:\/\/forumias.com\/blog\/indias-digital-public-infrastructure-dpi-and-associated-challenges\/\">Digital public infrastructure<\/a>:<\/span><\/b><span data-contrast=\"auto\"> India has established a digital public infrastructure (DPI), known as India Stack. This DPI ensures secure and privacy-respecting digital access to public and private services.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:200,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Computer Emergency Response Team (CERT-In):<\/span><\/b><span data-contrast=\"auto\"> It is the national nodal agency that deals with cybersecurity threats in India. It responds to cybersecurity incidents and strengthens India&#8217;s response to cybersecurity threats.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:200,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Regulatory measures:<\/span><\/b><span data-contrast=\"auto\"> Even though comprehensive data protection legislation is still pending, India relies on regulations within the Information Technology (IT) Act of 2000 and sector-specific regulations for data privacy and protection.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:200,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">National cybersecurity policy:<\/span><\/b><span data-contrast=\"auto\"> India has a national cybersecurity policy that provides a framework for securing cyberspace in the country. It aims to create a cyber-secure environment that allows the robust growth of the IT and digital sectors.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:200,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Public-private partnerships:<\/span><\/b><span data-contrast=\"auto\"> India works with private sector companies to enhance cybersecurity capabilities. The government has established institutions to ensure the continuity of India Stack\u2019s operations, acting as a catalyst in developing India&#8217;s cybersecurity ecosystem.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:200,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Data localisation:<\/span><\/b><span data-contrast=\"auto\"> Some drafts of data protection bills have proposed stringent data localisation provisions, requiring data fiduciaries to store a copy of personal data collected in India. This could help enhance control over data and its security.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:200,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><strong>Read more: <a href=\"https:\/\/forumias.com\/blog\/data-protection-framework-in-india\/\">Data Protection Framework in India \u2013 Explained, pointwise<\/a><\/strong><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2><span data-contrast=\"auto\">How global nations are ensuring Data Security?\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:200,&quot;335559740&quot;:276}\">\u00a0<\/span><\/h2>\n<p><b><span data-contrast=\"auto\">Data protection regulations:<\/span><\/b><span data-contrast=\"auto\"> Many nations have established comprehensive data protection laws. For example, the European Union implemented the General Data Protection Regulation (GDPR), which offers stringent guidelines for the collection, storage, and use of personal data. In the United States, individual states like California have rolled out their own privacy laws such as the California Consumer Privacy Act (CCPA).\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:200,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">National cybersecurity strategies:<\/span><\/b><span data-contrast=\"auto\"> Countries like the United States, the United Kingdom, Australia, and Canada have outlined national cybersecurity strategies. These documents detail government approaches to managing cyber threats, protecting critical infrastructure, and ensuring the security of digital services.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:200,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Establishing cybersecurity agencies:<\/span><\/b><span data-contrast=\"auto\"> Specific agencies handle cybersecurity in various countries. For example, the United States has the Cybersecurity and Infrastructure Security Agency (CISA), while the United Kingdom operates the National Cyber Security Centre (NCSC).\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:200,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">International cooperation:<\/span><\/b><span data-contrast=\"auto\"> The European Union, through its cybersecurity agency ENISA, promotes cooperation between member states in the cybersecurity field. Similarly, the &#8220;Five Eyes&#8221; alliance &#8211; comprising the United States, United Kingdom, Canada, Australia, and New Zealand &#8211; regularly share intelligence, including cybersecurity threats.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:200,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Incident response teams:<\/span><\/b><span data-contrast=\"auto\"> Many nations, including India with its Computer Emergency Response Team (CERT-In), and South Korea with its Korea Internet Security Agency (KISA), have teams dedicated to handling cybersecurity incidents.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:200,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Regulation of cybersecurity products and services:<\/span><\/b><span data-contrast=\"auto\"> Governments are also putting stricter regulations on the cybersecurity products and services used in their countries. This includes setting minimum security standards and certifying products for their security.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:200,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"2\">What are the challenges in ensuring Data Security in India?<\/h2>\n<p><b><span data-contrast=\"auto\">Infrastructure and regulation deficiency:<\/span><\/b><span data-contrast=\"auto\"> The MIT Technology Review CyberDefense Index indicates India has a significant deficit in critical infrastructure, weak cybersecurity regulation, and limited national digital economy adoption, despite having a digital-forward government and one of the world&#8217;s largest IT-enabled service sectors.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:200,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Lack of national cybersecurity law and dedicated ministry:<\/span><\/b><span data-contrast=\"auto\"> Despite the rising number of cyberattacks and the urgent calls for stronger cybersecurity measures, India currently lacks a comprehensive national cybersecurity law and a ministry dedicated to cybersecurity.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:200,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Inadequate data protection law:<\/span><\/b><span data-contrast=\"auto\"> India&#8217;s Personal Data Protection Bill of 2019 was withdrawn due to severe criticism over its potential to infringe upon personal data privacy. The country&#8217;s data protection remains under the IT Act of 2000, which only provides for punishment in cases of negligent data handling. This approach is insufficient for the modern digital era, with its complexities and new types of threats.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:200,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Resource constraints and firefighting:<\/span><\/b><span data-contrast=\"auto\"> Often, resources dedicated to cybersecurity are insufficient, leading to a constant firefighting mode, leaving little time for learning, strategizing, or improving defenses.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:200,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Reliance on foreign infrastructure<\/span><\/b><span data-contrast=\"auto\">: Most Indian internet users rely on foreign-owned social networking sites and hardware, creating unique national security challenges. This reliance could expose the country to additional cyber threats and data breaches.<\/span><\/p>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><strong>Read more:<\/strong><a href=\"https:\/\/forumias.com\/blog\/draft-digital-personal-data-protection-bill-2022-benefits-and-concerns\/\"><span data-contrast=\"auto\"><strong> Draft Digital Personal Data Protection Bill, 2022: Benefits and Concerns \u2013 Explained, pointwise<\/strong><\/span><\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2 aria-level=\"2\">What should be done to ensure Data Security in India?<\/h2>\n<p><b><span data-contrast=\"auto\">Establish strong legal frameworks:<\/span><\/b><span data-contrast=\"auto\"> As in the European Union&#8217;s GDPR model, India needs comprehensive legal frameworks to protect personal data and prevent breaches.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:200,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Cybersecurity Ministry and laws<\/span><\/b><span data-contrast=\"auto\">: Like Australia, India could establish a dedicated Cybersecurity Ministry to oversee and respond to cybersecurity threats. Similarly, robust national cybersecurity laws would strengthen India&#8217;s ability to respond to cyber threats.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:200,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Invest in infrastructure:<\/span><\/b><span data-contrast=\"auto\"> There&#8217;s a need to build robust digital infrastructure similar to the Netherlands, which is a nerve center for pan-European cybersecurity.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:200,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Upskill and cross-skill:<\/span><\/b><span data-contrast=\"auto\"> To meet evolving threats, India needs to invest in skills development in emerging tech cybersecurity domains. Experts could be trained in adaptive security, cloud security posture management (CSPM), Zero Trust Architecture (ZTA), and quantum cryptography, among other areas.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:200,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Public-private partnerships:<\/span><\/b><span data-contrast=\"auto\"> In line with global best practices, fostering partnerships between government, industry, and academia can help to develop innovative solutions to cybersecurity challenges.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:200,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Adopt zero trust models:<\/span><\/b><span data-contrast=\"auto\"> As recommended by global cybersecurity experts, adopting a Zero Trust Architecture (ZTA) approach, which assumes that no users or devices are trustworthy by default, regardless of their location or network, can help bolster security.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:200,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Awareness and training:<\/span><\/b><span data-contrast=\"auto\"> There should be continuous efforts to increase awareness and training among internet users about data privacy and the steps they can take to protect their own data.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:200,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Regular cybersecurity audits:<\/span><\/b><span data-contrast=\"auto\"> Like many developed nations, India should implement regular and rigorous cybersecurity audits for both public and private entities to ensure that they&#8217;re adhering to the best practices in data security.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:200,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Sources<\/span><\/b><span data-contrast=\"auto\">:\u00a0<\/span><span style=\"font-family: var(--list--font-family); background-color: var(--global--color-background); color: var(--global--color-primary); font-size: var(--global--font-size-base);\" data-contrast=\"none\">Indian Express (<\/span><a style=\"font-family: var(--list--font-family); background-color: var(--global--color-background); font-size: var(--global--font-size-base);\" href=\"https:\/\/indianexpress.com\/article\/opinion\/columns\/apar-gupta-writes-cowin-breach-jack-dorsey-claims-digital-india-is-not-built-on-constitution-8661042\/\"><span data-contrast=\"none\">Article 1<\/span><\/a><span style=\"font-family: var(--list--font-family); background-color: var(--global--color-background); color: var(--global--color-primary); font-size: var(--global--font-size-base);\" data-contrast=\"none\">,\u00a0<\/span><a style=\"font-family: var(--list--font-family); background-color: var(--global--color-background); font-size: var(--global--font-size-base);\" href=\"https:\/\/indianexpress.com\/article\/business\/economy\/absence-of-data-protection-law-in-india-poses-privacy-risk-imf-paper-8573983\/\"><span data-contrast=\"none\">Article 2<\/span><\/a><span style=\"font-family: var(--list--font-family); background-color: var(--global--color-background); color: var(--global--color-primary); font-size: var(--global--font-size-base);\"> and\u00a0<\/span><a style=\"font-family: var(--list--font-family); background-color: var(--global--color-background); font-size: var(--global--font-size-base);\" href=\"https:\/\/indianexpress.com\/article\/explained\/explained-economics\/india-draft-digital-privacy-law-data-protection-laws-8279199\/\"><span data-contrast=\"none\">Article 3<\/span><\/a><span style=\"font-family: var(--list--font-family); background-color: var(--global--color-background); color: var(--global--color-primary); font-size: var(--global--font-size-base);\">),\u00a0<\/span><span style=\"font-family: var(--list--font-family); background-color: var(--global--color-background); color: var(--global--color-primary); font-size: var(--global--font-size-base);\" data-contrast=\"none\">Times of India (<\/span><a style=\"font-family: var(--list--font-family); background-color: var(--global--color-background); font-size: var(--global--font-size-base);\" href=\"https:\/\/epaper.timesgroup.com\/article-share?article=14_06_2023_024_011_cap_TOI\"><span data-contrast=\"none\">Article 1<\/span><\/a><span style=\"font-family: var(--list--font-family); background-color: var(--global--color-background); color: var(--global--color-primary); font-size: var(--global--font-size-base);\">,\u00a0<\/span><a style=\"font-family: var(--list--font-family); background-color: var(--global--color-background); font-size: var(--global--font-size-base);\" href=\"https:\/\/epaper.timesgroup.com\/article-share?article=14_06_2023_024_007_cap_TOI\"><span data-contrast=\"none\">Article 2<\/span><\/a><span style=\"font-family: var(--list--font-family); background-color: var(--global--color-background); color: var(--global--color-primary); font-size: var(--global--font-size-base);\"> and <\/span><a style=\"font-family: var(--list--font-family); background-color: var(--global--color-background); font-size: var(--global--font-size-base);\" href=\"https:\/\/timesofindia.indiatimes.com\/blogs\/voices\/data-privacy-in-india-current-outlook-and-the-future\/\"><span data-contrast=\"none\">Article 3<\/span><\/a><span style=\"font-family: var(--list--font-family); background-color: var(--global--color-background); color: var(--global--color-primary); font-size: var(--global--font-size-base);\">),\u00a0<\/span><a style=\"font-family: var(--list--font-family); background-color: var(--global--color-background); font-size: var(--global--font-size-base);\" href=\"https:\/\/www.business-standard.com\/opinion\/editorial\/digital-risks-123061301196_1.html\"><span data-contrast=\"none\">Business Standard<\/span><\/a><span style=\"font-family: var(--list--font-family); background-color: var(--global--color-background); color: var(--global--color-primary); font-size: var(--global--font-size-base);\">,\u00a0 <\/span><a style=\"font-family: var(--list--font-family); background-color: var(--global--color-background); font-size: var(--global--font-size-base);\" href=\"https:\/\/www.livemint.com\/technology\/govt-prepares-new-cyber-security-policy-to-beat-malware-attacks-11686717816691.html\"><span data-contrast=\"none\">Livemint<\/span><\/a><span style=\"font-family: var(--list--font-family); background-color: var(--global--color-background); color: var(--global--color-primary); font-size: var(--global--font-size-base);\">,\u00a0<\/span><a style=\"font-family: var(--list--font-family); background-color: var(--global--color-background); font-size: var(--global--font-size-base);\" href=\"https:\/\/www.thehindu.com\/business\/to-beef-up-cyber-security-india-should-develop-newer-skill-sets-and-expertise\/article66924706.ece\"><span data-contrast=\"none\">The Hindu<\/span><\/a><span style=\"font-family: var(--list--font-family); background-color: var(--global--color-background); color: var(--global--color-primary); font-size: var(--global--font-size-base);\">,\u00a0<\/span><a style=\"font-family: var(--list--font-family); background-color: var(--global--color-background); font-size: var(--global--font-size-base);\" href=\"https:\/\/www.eastasiaforum.org\/2022\/11\/16\/indias-data-protection-dilemma\/\"><span data-contrast=\"none\">East Asia Forum<\/span><\/a><span style=\"font-family: var(--list--font-family); background-color: var(--global--color-background); color: var(--global--color-primary); font-size: var(--global--font-size-base);\">,\u00a0<\/span><a style=\"font-family: var(--list--font-family); background-color: var(--global--color-background); font-size: var(--global--font-size-base);\" href=\"https:\/\/cio.economictimes.indiatimes.com\/news\/digital-security\/cybersecurity-how-does-india-perform-at-the-global-stage\/99628852\"><span data-contrast=\"none\">Economic Times<\/span><\/a><span style=\"font-family: var(--list--font-family); background-color: var(--global--color-background); color: var(--global--color-primary); font-size: var(--global--font-size-base);\"> and\u00a0<\/span><a style=\"font-family: var(--list--font-family); background-color: var(--global--color-background); font-size: var(--global--font-size-base);\" href=\"https:\/\/www.businesstoday.in\/opinion\/columns\/story\/why-data-security-and-privacy-can-become-a-key-esg-opportunity-359403-2023-01-09\"><span data-contrast=\"none\">Business Today<\/span><\/a><span style=\"font-family: var(--list--font-family); background-color: var(--global--color-background); color: var(--global--color-primary); font-size: var(--global--font-size-base);\">)<\/span><\/p>\n<p><strong>Syllabus<\/strong>: GS 3: Security Issues: basics of cyber security.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>For\u00a07PM Editorial\u00a0Archives click\u00a0HERE \u2192 Introduction India, set to become a trillion-dollar digital economy by 2026, faces significant data security needs and challenges. With over a billion people, digitization and burgeoning internet usage, India must protect its citizens&#8217; data from vulnerabilities and breaches. However, despite a digitally-forward government and robust IT sector, the country lacks critical&hellip; <a class=\"more-link\" href=\"https:\/\/forumias.com\/blog\/data-security-in-india-need-and-challenges\/\">Continue reading <span class=\"screen-reader-text\">Data Security in India: Need and Challenges \u2013 Explained, pointwise<\/span><\/a><\/p>\n","protected":false},"author":10311,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"footnotes":""},"categories":[130,9],"tags":[216,406],"class_list":["post-247883","post","type-post","status-publish","format-standard","hentry","category-7-pm","category-public","tag-gs-paper-3","tag-internal-security","entry"],"jetpack_featured_media_url":"","views":{"total":74,"cached_at":1698376162,"cached_date":1698420474},"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/posts\/247883","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/users\/10311"}],"replies":[{"embeddable":true,"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/comments?post=247883"}],"version-history":[{"count":0,"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/posts\/247883\/revisions"}],"wp:attachment":[{"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/media?parent=247883"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/categories?post=247883"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/tags?post=247883"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}