SIGNIFICANCE OF DATA PROTECTION STANDARDS IN PROTECTING PRIVACY RIGHTS OF EMPLOYEE
AUTHORED BY - VIDYA M.N
INTRODUCTION:
The current work gives an overview of legal standards related to employee’s personal data protection and privacy. The paper explores the recent trends, various global principles and good practices in nexus with domain of working environment. The aim is to give a regional and global approach in the interest of contemporary view on the leading basic legal principles and standards in this filed. The paper exposes to application of general data protection principles in the context of employment relationship and new technological evolutions.[1]
The structure of the research paper includes introduction with the brief idea of the data protection and its standards and its legal evolution. The specific paper deals with regional and global data protection standards with the general perspective as well as employment specific perspective.
The development in the arena of personal data protection has strongly evolved in recent years. Many world countries have led to enforcement of data protection laws. ILO in the early days adopted Code of Practice on the protection of worker’s personal data and recently European Union came-up with the robust law, the ‘General Data Protection Regulation (GDPR)’ in 2018. The new era of data protection has rejuvenated, as a result more than 130 countries holds its own data protection principles now.
With reference to the understanding of Privacy and Data protection priorly, the personal data protection needs to broader approach of right to privacy. The privacy and data protection are interdependent and overlapping legal concepts. It is been accepted the right to data protection is a part of right to privacy.[2] The privacy is a notion which emphasizes the personal data protection. Way back the concept ‘privacy’ was defined as ‘the right to be let alone’. Since then, the protection of privacy has evolved strongly with a broader coverage of private life as well as public life of an individual. The notion of privacy has become more flexible, interpretative and responsive and adaptive to the newer settings (which includes data protection of workers in the world of work).
Another understanding is both these notions are connected to social, economic and political rights, where the right to privacy is accepted universally as a human right. Hence, the data protection principles need to be understood with common baseline in account of different jurisdictional approaches at international level.
In the specific context of employment relationship, the workers have a right to privacy based on international and regional human rights regimes. The principle of data protection and right to privacy are guaranteed for all workers regardless of type of employment or contractual agreements or employment status. Adding to this, the rights of workers are not only protected with respect to employers, but also by the other parties, such as co-workers, worker’s organisation, government and so on.
It is apparent that the recent technological challenges and new evolutions such as digitization, big data, internet of things, artificial intelligence and robotisation has affected the work environment, as a result much attention is given to privacy and data protection rights in an increased pace. The electronic and computer data has been considered more significant. The dynamic nature of privacy has adopted over time as privacy 4.0 in response to industry 4.0. Numerous regulations started to adopt the rules to address the issues of privacy and data protection. Now the world is concerned about unlimited data processing, the interconnected centralised data, free and fast flow of data, asymmetrical information, unnecessary disclosure of information, manipulation of data and so on. As a futuristic approach the countries should have a dynamic law where it is ready to adopt any technological encounters.
Another critical dimension of data protection law relevant to the era of privatization has literally changed the work culture which paved the way for new ways of working where difference between the sphere of work and private life is vague. Through the introduction of digital workplace and online communication, the employees have mixed the private and professional communication by utilising the professional communication systems for personal reasons and visa-versa, which made difficult to monitor the data of employees. On the other hand, new arena of employment relationship has adopted which facilitated the worker to work on flexible time without boundary management. Further, the emergence of social media has impacted the relationship of employment by creating additional tensions.
The concept of ‘Privacy’ has not been addressed in any Indian Legislation. When there is a need to interpret the meaning of the word privacy, the Supreme Court judgements will act as a reference,[3] where the ‘Right to Privacy’ was recognised as a subset of the larger part of ‘right to life and personal liberty under Article 21 of the Indian Constitution. But this right can only be exercised against government actions, not for actions of non-state entities.
NATIONAL REGIMES ON PRIVACY RIGHTS OF EMPLOYEE:
The dynamic concept of privacy is interpreted differently from age to age. Art. 21 of the Constitution of India guarantees ‘Right to Privacy’ as a part of ‘Right to Life’, and this has been acknowledged by various landmark judgements. As privacy is fundamental right enjoyed by every person the employee also enjoyed certain amount of privacy at work place and right to keep personal information. But in the interest of company, companies some time may override these rights through by monitoring the activities of employees. The employer may track workers’ digital footprints. They can search and have a track on employee’s data, their actions and speech and know about personal lives.[4] In the interest of protection of employee’s privacy and their data, it is mandatory that the organization should have privacy policies and needs to be documented as a part of specific rules for using of personal information of employees.
At the domestic level as a part of employee rights, India is having labour codes to control the conditions of work, non-discrimination, maternity laws, payment of wages etc. The DPDP Act, is still needs to work on this subject.
In our country, the worker’s privacy rights can be drawn from different legislations in the absence of specific data protection law at workplace. The following are some of the laws the address this subject.
The Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules (IT Rules 2011) prescribes several requirements for the corporate entities for collecting, processing and storing of personal data, which includes SPDI to comply with data protection measures. These IT Rules are similar to DPDP Act 2023, but have its own deficiencies and ambiguities. Only half of these rules can be applied to very restrictive definition of ‘sensitive personal data’ which excludes other personal data; half of them do not impose obligations in relation to data subjects per se, but only to ‘the provider of the information.
As per Rule 5(3), employer ‘collecting information directly from the employee concerned’ (but not otherwise), ‘shall take such steps as are, in the circumstances, reasonable to ensure that the employee concerned is aware of the fact of collection, the purpose, the intended recipients, and the contact information for the collector and the party that will hold the data. Because of the broad definition of ‘information in Rule 2((1)(f), this requirement should apply to all ‘personal information collected from employees. Employees are not entitled to any notice when their personal data is collected from third parties.
Without consent, the employer is not permitted to take any action on the SPDI (unless there are legal requirements or the data needs to be processed to complete the contract process). If the data is exempted from obtaining consent, the employer is still required to provide the employee a notice about this processing.
If the employer is negligent in implementing and maintaining security controls as specified under the IT Act and IT Rules, which in turn results in a wrongful loss or gain to any person, the employer has to pay compensation to the affected person. In case of violation against any other obligation under the IT Rules, employers can be required to pay compensation of up to INR 25,000 (approximately USD 350) to the persons affected by such non-compliance or to pay a penalty of up to INR 25,000 (approximately USD 350).
As a part of the duty, the employer must be mindful of the compliances and liability relating to the SPDI. If in case the employer is negligent in implementing and maintaining ‘reasonable security practices and procedures’ for the employee’s protection, it may result in ‘wrongful loss or wrongful gain’ to another person.
The IT Act sets out various parameters and compliances for the employer while dealing with the employee’s SPDI.
In this regard, the organisation must have proper employee data protection and privacy policies (for eg., employee contracts, consent clause, company policies, audit mechanisms etc).
In case of MNCs the data will be collected and processed at single location and data is made as centralized data which can be accessed by any of the other subsidiary companies situated in different parts of the world. Hence, it is necessary for such companies to have data protection policies in coordination with relevant laws of those countries.
The employer may face certain critical issues such as data leakage, data misuse, data mining, violation of intellectual property, defamation and so on. Hence, the employee surveillance is much needed mechanism which has to be adopted by the companies. There are various techniques or ways through which the employer monitor employees (keeping in mind the legal issues associated with such ways), which includes telephone call recording, monitoring of e-mails, surveillance cameras etc.
It is challenging for companies to maintain a balance between the legitimate requirements of employers to collect & process the data and monitoring the employee activities in the interest of company as well as employee’s right to privacy.
GENERAL PERSPECTIVE OF DATA SECURITY STANDARDS:
Data Security standards differs from Data protection regulations and frameworks. These standards act as a guideline which can be followed by the organisation to protect sensitive and confidential information. Adoption of such guidelines can help to prevent unauthorised access of data, its use, disclosure, modification or destruction of data.[10]
With the emergence of new technologies, various organisations developed different data security standards. Such as International Organisation for Standardization (ISO), National Institute of Standards and Technology (NIST) and Payment Card Industry Data Security Standard (PCI DSS). Some of these standards are mandatory, whereas some of them are voluntary, but recommended as best practices.
The organisations have to come up with various data protection regulations in addition to above mentioned data security standards. The data protection regulations establish legal requirements for handling and protecting personal and sensitive information. (eg. European Union’s GDPR).
Apart from Data security standards and some regulations, the organisations can secure their information systems through certain set of policies, procedures and guidelines which is referred as IT security frameworks.
The Data security standards are designed to address specific risks and to protect different types of information. Here is the list of data security standards:
ISO 2700 Series – This series includes risk management, security controls and security management systems. Some of them are –
NIST SP 1800 series – The NIST is a U.S. Government agency which develops standards and guidelines for various industries. It includes different aspects of information security, risk management, incident response and supply chain security. Some of the series are –
COBIT – The Control Objectives for Information and Related Technology is a framework developed by the Information Systems Audit and Control Association (ISACA), which provides a set of best practices for the governance and management of IT. It covers risk management, security and compliance.
CIS Controls – The Centre for Internet Security (CIS) is a nonprofit organisation that develops best practices for securing IT systems and networks. The CIS Controls designed to be prioritized and implemented based on an organisation’s risk profile.
HITRUST Common Security Framework (CSF) - The Health Information Trust Alliance (HITRUST) is an NGO, has developed best practices for protecting sensitive health information. It provides guidelines and requirements for securing electronically protected health information.
General Data Protection Regulation (GDPR) – the GDPR applies to organisations operating in the European Union and European Economic Area. It sets out specific requirements for collecting, using and protecting personal data and gives individuals the right to control their data.
COSO – The Committee of Sponsoring Organisations of the Trade way Commission (COSO) is a joint initiative of five private sector organisation. It provides guidance on risk management. It has developed a framework called the ‘Internal Control Integrated Framework’ that provides a set of principles and guidelines for managing risk and improving internal control in organisations.
PCI DSS (Payment Card Industry Data Security Standard) – This set of standards is not directly relevant to employee data protection standards. The PCI DSS is a security standard that applies to organisations in accepting, processing, storing or transmitting the payment card data.
SOC 1 (System and organisation Controls Report) – This standard is designed to help organisations assess the internal controls related to their financial reporting.
SOC 2 – it focuses on a business’s non-financial reporting controls related to information security, availability, processing integrity, confidentiality and privacy. It is typically used by organisations that provide cloud-based or other outsources services.
SOC 3 – it is often used as a way for organisations to demonstrate their commitments to information security.
SOC for Cybersecurity – it is designed to help organisations assess their cybersecurity risk management practices and controls.
SOC for supply Chian – designed to help organisations assess the internal controls of their supply chine partners and ensure that they are meeting the necessary controls and requirements.
SSL/TLS (Secure Sockets Layer/Transport Layer Security) – they are cryptographic protocols that are used to secure communication over the internet.
ADOPTION OF BEST PRACTICES TO PROTECT EMPLOYEE DATA BY THE COMPANIES:
In this era of digitization, the companies need to take action to protect their employee’s personal data and companies’ data also. The following are some of the techniques through which the data can be protected:[11]
CONCLUSION:
Various national laws and international standards have established the binding procedures for the processing of personal data. Priorly, ILO’s Code of Practice has come up with the policies for worker’s privacy rights and recently some of the countries has enacted Data Protection Laws, which includes employees’ privacy rights. But, as the technology is changing every day, the new problems has also emerged, such as data anonymization, right to erase, right to consent etc. So, there is a need to generalised principles, collection of data, processing of data, securing and storing of data and data usage. And there is a need to develop data protection provisions which specifically address the use of workers’ personal data. The State need to have data protection framework for protection of employee privacy rights from threats to information privacy originating from company policies. Apart from the State laws, the companies should also lay down specific guidelines in compliance with the application of laws with reasonable expectation of privacy protection of employees.
[2] The case of European Human Rights Court is a best example where the rules of data protection is conceived under the concept of right to privacy. Another example is, in South Africa the right to personal data protection is considered as derivative of Constitutional Right to privacy, similar to Indian approach.
[3] Kharak Singh V/S State of U.P (AIR 1963 SC 1295) and People’s Union of Civil Liberties V/S the Union of India (1997) 1 SCC 318), and the recent Puttaswami judgement (2016)
[6] The Information Technology Act (2010), s. 43A: In the event that a body corporate negligently fails to implement and maintain reasonable security practises and procedures and causes wrongful loss or wrongful gain to any person while handling sensitive personal data or information in a computer resource that it owns, controls, or operates, such body corporate shall be liable to pay damages by way of compensation, which shall not exceed Rupees Five Crores.
[7] The Information Technology Act (2010), s. 66C: Anybody who uses another person's electronic signature, password, or any other unique identification feature dishonestly or fraudulently maybe punished with imprisonment of up to three years and a fine of up to INR 1,00,000 in addition to their punishment.
[8] The Information Technology Act (2010), s. 72A: If someone, including an intermediary, discloses information about another person without that person's consent or in violation of a legal contract while performing services under the terms of a legal contract, with the intent to cause or knowing that he is likely to cause wrongful loss or wrongful gain, they may be punished with imprisonment for a term that may extend to three years or with fine extending to five lakhs or both.
[9] Sensitive Personal Data or Information (SPDI) – the organisation can collect the SPDI of workers for various reasons, which includes hiring process, record retention, employee assessments or to fulfil any other legal requirements. The confidentiality of such data should be maintained throughout the processing of data and transfer of data to third parties. The Rule 5 of IT Rules states that ‘no corporate or person acting on its behalf may collect sensitive personal data or information unless the information is used for legitimate purpose to fulfil corporate activity and collected only for specific purpose and data can be collected with the written consent of the employee which is under employee surveillance.
Authors: VIDYA M.N
Registration ID: 102875 | Published Paper ID: 2875
Year : May -2024 | Volume: 2 | Issue: 16
Approved ISSN : 2581-8503 | Country : Delhi, India
DOI Link : https://www.whiteblacklegal.co.in/details/significance-of-data-protection-standards-in-protecting-privacy-rights-of-employee-by---vidya-m-n