{"id":6238,"date":"2022-12-17T20:21:49","date_gmt":"2022-12-17T14:51:49","guid":{"rendered":"https:\/\/ijpiel.com\/?p=6238"},"modified":"2022-12-17T20:53:03","modified_gmt":"2022-12-17T15:23:03","slug":"stepping-the-game-up-data-privacy-and-data-management-in-the-broader-realm-of-ppp-projects","status":"publish","type":"post","link":"https:\/\/ijpiel.com\/index.php\/2022\/12\/17\/stepping-the-game-up-data-privacy-and-data-management-in-the-broader-realm-of-ppp-projects\/","title":{"rendered":"Stepping the Game Up \u2013 Data Privacy and Data Management in the Broader Realm of PPP Projects"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.5.1&#8243; _module_preset=&#8221;default&#8221;][et_pb_row _builder_version=&#8221;4.5.1&#8243; _module_preset=&#8221;default&#8221; min_height=&#8221;181px&#8221; custom_padding=&#8221;|0px||||&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.5.1&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.5.1&#8243; _module_preset=&#8221;default&#8221; inline_fonts=&#8221;Cormorant Garamond,Molengo,Cormorant&#8221;]<\/p>\n<p><span style=\"font-size: x-large; color: #000000;\"><strong><span style=\"font-family: 'Cormorant Garamond';\">Abstract<\/span><\/strong><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #000000; font-size: large;\">In today\u2019s world, there can be no question that the pervasion of personal data is rampant in every aspect of our lives, as data has become essential for the smooth functioning of our lives. It cannot be doubted that the data generated by us daily has made certain aspects of our lives smoother. Who amongst us would have thought as recently as ten to fifteen years ago that data generated by us would have made our lives so much easier? This is as much true for Public Private Partnership Projects where the Government, in concert with one or more private parties, seeks to construct a project or provide a service. In this Blog Post, the Authors attempt to decode both aspects of data privacy and management, i.e., storage and ensuring the confidentiality of particular data as mandated by law and general principles of storage and control of all types of data.<\/span><\/p>\n<p style=\"text-align: justify;\"><strong style=\"font-size: 14px; text-align: left;\"><\/strong><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: 'Cormorant Garamond'; font-size: x-large; font-weight: normal; color: #000000;\"><strong style=\"text-align: left;\">1. Introduction<\/strong><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: large; color: #000000;\">The simple fact that many of us are unaware of is that, though most of the data generated by us may seem harmless and inconsequential to us, it can be used by others, often to their profit, and sometimes, it can be used by others to our detriment. Certain types of data generated by us are not only highly private and sensitive, but if such data were to fall into the wrong hands, it has the potential to cause us grave harm and damage and bring our lives to a complete standstill.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: large; color: #000000;\">Certain types of data generated and collected during the execution of the Public Private Partnership (<strong>\u201cPPP Projects\u201d<\/strong>) are also required under law to be maintained in a particular manner, failing which they may be subject to specific penalties. In this aspect, all entities involved in the transmission and storage of such data are under a legal obligation to ensure the privacy of the individual to whom such data pertains and to ensure proper storage and security of such data. Even for the data which is not required to be maintained, stored, and\/or secured in a specific manner, it is always better to ensure proper and adequate data collection, retention, and storage practices as the same would almost come to one\u2019s advantage at some point in the future, especially in the event of a party being subject to a dispute either before a court of law or an arbitral tribunal. Hence, it becomes crucial for us to discuss the issue of data privacy and data management within the evolving field of PPP Projects.<\/span><\/p>\n<p style=\"text-align: justify;\"><strong style=\"font-size: 14px; text-align: left;\"><\/strong><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: x-large; font-family: 'Cormorant Garamond'; font-weight: normal; color: #000000;\"><strong style=\"text-align: left;\">2. Data Privacy in PPP Projects<\/strong><\/span><span style=\"font-size: 14px; text-align: left;\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: large;\"><span style=\"color: #000000;\">With the recent release of the<\/span><a href=\"https:\/\/www.meity.gov.in\/writereaddata\/files\/The%20Digital%20Personal%20Data%20Potection%20Bill%2C%202022_0.pdf\">Digital Personal Data Protection Bill, 2022<\/a> <span style=\"color: #000000;\"><strong>(\u201cDPDP Bill\u201d)<\/strong> for public consultations, the existence of security for data privacy in India is not anymore entirely dependent on the<\/span><a href=\"https:\/\/www.meity.gov.in\/writereaddata\/files\/GSR313E_10511%281%29_0.pdf\">Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011<\/a> <span style=\"color: #000000;\"><strong>(\u201cSPDI Rules\u201d)<\/strong> [issued under the<\/span><a href=\"https:\/\/www.indiacode.nic.in\/bitstream\/123456789\/13116\/1\/it_act_2000_updated.pdf\">Information Technology Act, 2000<\/a> <span style=\"color: #000000;\"><strong>(\u201cIT Act\u201d)<\/strong>]. Though the DPDP Bill is currently only a draft and not binding, it still shows a ray of hope for the scope of improvement in the present legal scenario. It is also quite possible that the DPDP Bill may go through various iterations before becoming binding law.\u00a0<\/span><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: large;\"><span style=\"color: #000000;\">According to the latest DPDP Bill, \u201c<em>data<\/em>\u201d has been<\/span><a href=\"https:\/\/www.meity.gov.in\/writereaddata\/files\/The%20Digital%20Personal%20Data%20Potection%20Bill%2C%202022_0.pdf\">defined<\/a> <span style=\"color: #000000;\">as \u201c<em>a representation of information, facts, concepts, opinions or instructions in a manner suitable for communication, interpretation or processing by humans or by automated means.<\/em>\u201d In addition, this Bill has stated that offline personal data (which is not digitized) would not be within the purview of the legislation.\u00a0<\/span><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: large;\"><span style=\"color: #000000;\">The SPDI Rules deal with \u201c<em>Personal Information<\/em>,\u201d<\/span><a href=\"https:\/\/www.meity.gov.in\/writereaddata\/files\/GSR313E_10511%281%29_0.pdf\">defined<\/a> <span style=\"color: #000000;\">as \u201c<em>any information that relates to a natural person, which, either directly or indirectly, in combination with other information available or likely to be available with a body corporate, is capable of identifying such person.<\/em>\u201d This may include basic details such as a person\u2019s name\/surname but may also extend to documents such as a person\u2019s Aadhaar Card, PAN Card, Driving License, and other similar documents.\u00a0<\/span><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #000000; font-size: large;\">Examples of Personal Information collected in PPP Projects could include the following:\u00a0<\/span><\/p>\n<ul style=\"text-align: justify;\">\n<li><span style=\"color: #000000; font-size: large;\">Identification details of employees and contract workers.<\/span><\/li>\n<li><span style=\"color: #000000; font-size: large;\">Identification details of suppliers\/vendors.<\/span><\/li>\n<li><span style=\"color: #000000; font-size: large;\">Identification details of users of services for users of public utilities such as highways (when collecting tolls).\u00a0<\/span><\/li>\n<\/ul>\n<p style=\"text-align: justify;\"><span style=\"font-size: large;\"><span style=\"color: #000000;\">The SPDI Rules also<\/span><a href=\"https:\/\/www.meity.gov.in\/writereaddata\/files\/GSR313E_10511%281%29_0.pdf\">define<\/a> <span style=\"color: #000000;\">\u201c<em>Sensitive Personal Data\/Information<\/em>\u201d to include personal information consisting of information relating to:\u00a0<\/span><\/span><\/p>\n<ul style=\"text-align: justify;\">\n<li><span style=\"color: #000000; font-size: large;\">Passwords;<\/span><\/li>\n<li><span style=\"color: #000000; font-size: large;\">Financial information (e.g., Bank account or credit card or debit card, or other payment instrument details);<\/span><\/li>\n<li><span style=\"color: #000000; font-size: large;\">Any physical, physiological, and mental health condition;<\/span><\/li>\n<li><span style=\"color: #000000; font-size: large;\">Sexual orientation;<\/span><\/li>\n<li><span style=\"color: #000000; font-size: large;\">Medical records and history; and<\/span><\/li>\n<li><span style=\"color: #000000; font-size: large;\">Biometric information.\u00a0<\/span><\/li>\n<\/ul>\n<p style=\"text-align: justify;\"><span style=\"font-size: large;\"><span style=\"color: #000000;\">Sensitive Personal Data\/Information would<\/span><a href=\"https:\/\/www.meity.gov.in\/writereaddata\/files\/GSR313E_10511%281%29_0.pdf\">also<\/a> <span style=\"color: #000000;\">include:\u00a0<\/span><\/span><\/p>\n<ul style=\"text-align: justify;\">\n<li><span style=\"color: #000000; font-size: large;\">Any \u201c<em>data<\/em>\u201d relating to the above which has been provided to a body corporate to enable that body corporate to provide service.<\/span><\/li>\n<li><span style=\"color: #000000; font-size: large;\">Any \u201c<em>information<\/em>\u201d received under the above-mentioned by a body corporate for processing and which has been stored or processed under lawful contract or otherwise.\u00a0<\/span><\/li>\n<\/ul>\n<p style=\"text-align: justify;\"><span style=\"font-size: large;\"><span style=\"color: #000000;\">If such data is collected, the data must be necessary for the function or activity of the collector of such data. The<\/span><a href=\"https:\/\/www.meity.gov.in\/writereaddata\/files\/GSR313E_10511%281%29_0.pdf\">SDPI Rules<\/a> <span style=\"color: #000000;\">mandate that the information should only be used for the purpose that it has been collected and that such information cannot be retained for longer than required. These Rules must be strictly followed, and breach of the same may lead to penalties and criminal action.\u00a0<\/span><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #000000; font-size: large;\">Examples of Sensitive Personal Information collected in PPP Projects could include the following:\u00a0<\/span><\/p>\n<ul style=\"text-align: justify;\">\n<li><span style=\"color: #000000; font-size: large;\">Financial records of employees and contract workers.<\/span><\/li>\n<li><span style=\"color: #000000; font-size: large;\">Financial records of sub-contractors, suppliers, and vendors.<\/span><\/li>\n<li><span style=\"color: #000000; font-size: large;\">Medical records of employees and contract workers.<\/span><\/li>\n<li><span style=\"color: #000000; font-size: large;\">Medical records of patients using hospitals and medical services.<\/span><\/li>\n<li><span style=\"color: #000000; font-size: large;\">Passwords and financial information for users of public utilities such as highways (when collecting tolls) and passengers in transportation projects such as trains and metros.\u00a0<\/span><\/li>\n<\/ul>\n<p style=\"text-align: justify;\"><span style=\"font-size: large;\"><span style=\"color: #000000;\">Under the DPDP Bill, a<\/span><a href=\"https:\/\/www.meity.gov.in\/writereaddata\/files\/The%20Digital%20Personal%20Data%20Potection%20Bill%2C%202022_0.pdf\">\u201c<em>Data Protection Impact Assessment<\/em>\u201d<\/a> \u00a0<span style=\"color: #000000;\">Exercise is supposed to be conducted by a Data Fiduciary, i.e.,<\/span><a href=\"https:\/\/www.meity.gov.in\/writereaddata\/files\/The%20Digital%20Personal%20Data%20Potection%20Bill%2C%202022_0.pdf\">any person<\/a> <span style=\"color: #000000;\">who solely or combinedly with other persons determines the means and purpose to process personal data \u2014 to make sure that the data is processed and secured in proportion to its level of sensitivity. According to Section 11 of the DPDP Bill, this process would include risk management procedures, purpose, risk assessment, description, and any other matters on personal data processing.\u00a0<\/span><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: large;\"><span style=\"color: #000000;\">On a similar ground under Rule 4 of the<\/span><a href=\"https:\/\/www.meity.gov.in\/writereaddata\/files\/GSR313E_10511%281%29_0.pdf\">SDPI Rules<\/a><span style=\"color: #000000;\">, any body corporate collecting, receiving, possessing, storing, dealing with, or handling information, or providing any information, is required to have a privacy policy in place for handling or dealing with such Personal Information. This privacy policy must also be published on the website of the body corporate. Further, it must be easily accessible and provide for the following:\u00a0<\/span><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #000000; font-size: large;\">i) the types of Personal Data or Sensitive Personal Data\/Information collected;<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #000000; font-size: large;\">ii) the purpose of its collection and usage;<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #000000; font-size: large;\">iii)\u00a0 the disclosure and dissemination of Personal Data or Sensitive Personal Data\/Information; and<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: large;\"><span style=\"color: #000000;\">iv) reasonable security practices and procedures relating to such information.<\/span><span style=\"color: #000000;\">\u00a0<\/span><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: large;\"><span style=\"color: #000000;\">Thus, keeping such a privacy policy in place would go far in insulating a body corporate against any liability caused by leaks of such information.<\/span><span style=\"color: #000000;\">\u00a0<\/span><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: large;\"><span style=\"color: #000000;\">When any Sensitive Personal Data\/Information is obtained, prior consent from the provider of such data must be obtained. This is especially true when such data is shared with a third party. This consent must be explicit, as the<\/span><a href=\"https:\/\/www.meity.gov.in\/writereaddata\/files\/GSR313E_10511%281%29_0.pdf\">SDPI Rules<\/a> <span style=\"color: #000000;\">mandate that the provider should know that the information is being collected. The data provider must be given the option to not provide the data and withdraw consent for the use of the data at any point in time.<\/span><a href=\"https:\/\/www.meity.gov.in\/writereaddata\/files\/The%20Digital%20Personal%20Data%20Potection%20Bill%2C%202022_0.pdf\">According to the DPDP Bill<span style=\"color: #000000;\">,<\/span><\/a><span style=\"color: #000000;\"> the withdrawal of consent has no bearing on the legality of the handling of personal data. Prior to its withdrawal, data depending on consent must have been collected. The ease of withdrawal must be equivalent to the ease with which consent was provided.<\/span><span style=\"color: #000000;\">\u00a0<\/span><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: large;\"><span style=\"color: #000000;\">Furthermore, the provider must be able to<\/span><a href=\"https:\/\/www.meity.gov.in\/writereaddata\/files\/The%20Digital%20Personal%20Data%20Potection%20Bill%2C%202022_0.pdf\">ascertain<\/a> <span style=\"color: #000000;\">that:<\/span><span style=\"color: #000000;\">\u00a0<\/span><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #000000; font-size: large;\">i) the fact that the information is being collected;<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #000000; font-size: large;\">ii) the purpose of collecting the information;<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #000000; font-size: large;\">iii) the intended recipients of the information; and<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: large;\"><span style=\"color: #000000;\">iv) the name and address of the agencies collecting and retaining the data.<\/span><span style=\"color: #000000;\">\u00a0<\/span><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: large;\"><span style=\"color: #000000;\">The<\/span><a href=\"https:\/\/www.meity.gov.in\/writereaddata\/files\/GSR313E_10511%281%29_0.pdf\">SDPI Rules<\/a> <span style=\"color: #000000;\">also put the onus on the receiver of the data to implement reasonable security practices and procedures of a certain nature, including<\/span><a href=\"https:\/\/www.iso.org\/isoiec-27001-information-security.html#:~:text=ISO%2FIEC%2027001%20is%20the,the%20ISO%2FIEC%2027000%20family.\">IS\/ISO\/IEC 27001<\/a><span style=\"color: #000000;\">. These practices are required to be audited regularly through an independent auditor.<\/span><span style=\"color: #000000;\">\u00a0<\/span><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: large;\"><span style=\"color: #000000;\">Under<\/span><a href=\"https:\/\/www.indiacode.nic.in\/bitstream\/123456789\/13116\/1\/it_act_2000_updated.pdf\">Section 43(A)<\/a> <span style=\"color: #000000;\">of the IT Act, if any body corporate that possesses, deals with, or handles any Sensitive Personal Data\/Information is found negligent in implementing and maintaining reasonable security practices in the course of its operations, and such negligence causes wrongful loss or gain to any person, the body corporate is mandated to compensate the wronged party in the form of damages. It is pertinent to note that there has been no cap placed on damages under the IT Act; thus, the damages awarded may be astronomical in terms of the amount.<\/span><span style=\"color: #000000;\">\u00a0<\/span><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: large;\"><span style=\"color: #000000;\">It would also be helpful to review and keep in line with the Ministry of Information and Technology\u2019s<\/span><a href=\"https:\/\/www.meity.gov.in\/writereaddata\/files\/public%20-private%20-partnerships%20.pdf\">guidance notes<\/a> <span style=\"color: #000000;\">for Information Technology PPP Projects. These include guidelines for bidding processes, references for good practices for PPP Projects, and model RFP (Request for Proposal) templates for projects. Although these guidelines have been issued specifically for PPP Projects related to Information Technology, they could quickly be adopted\/modified for other PPP Projects as well. They may serve as a valuable benchmark for best practices relating to PPP Projects and data.<\/span><span style=\"color: #000000;\">\u00a0<\/span><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: large;\"><span style=\"color: #000000;\">When dealing with Aadhaar cards, entities sometimes use the same for authentication of the customer\/employee. In such cases, the<\/span><a href=\"https:\/\/uidai.gov.in\/images\/targeted_delivery_of_financial_and_other_subsidies_benefits_and_services_13072016.pdf\">Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) Act, 2016<\/a> <span style=\"color: #000000;\"><strong>(\u201cAadhaar Act\u201d)<\/strong> and the accompanying<\/span><a href=\"https:\/\/www.uidai.gov.in\/images\/Draft_Aadhaar_Authentication_Regulations_2021_v0.3.pdf\">Aadhaar (Authentication and Offline Verification) Regulations, 2021<\/a> <span style=\"color: #000000;\">provide for specific regulations during such use, including a requirement of prior consent for particular uses. Further, the Aadhaar Act also provides for penalties and imprisonment for unauthorized dissemination of information or dissemination of knowledge in contravention of agreements. Thus, entities must be careful when dealing with Aadhaar cards and information and strictly comply with the relevant rules and regulations.<\/span><span style=\"color: #000000;\">\u00a0<\/span><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #000000; font-size: large;\">As can be seen from the whatsoever limited data protection regulations currently in force in India, it is evident that Companies and LLPs who operate in the PPP Infrastructure sector must take special care on multiple fronts to ensure that they do not fall short of any laws or data security regulations when dealing with copious amounts of data being processed on an almost daily basis. Entities need the robust data management and protection practices to effectively manage data coming through and going out, including continuous and effective training of personnel handling data for these entities. Further, the high volume of data being held by PPP Projects may incur increased costs to meet such standards. Although this higher cost may be an initial barrier, shouldering a higher price in the early stages would provide much more significant benefits to private entities when executing PPP Projects.<\/span><\/p>\n<p style=\"text-align: justify;\"><strong style=\"font-size: 14px; text-align: left;\"><\/strong><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: x-large; font-family: 'Cormorant Garamond'; font-weight: normal; color: #000000;\"><strong style=\"text-align: left;\">3. Data Management in PPP Projects<\/strong><span style=\"text-align: left;\">\u00a0<\/span><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #000000; font-size: large;\">Another often overlooked\/lightly taken aspect is the issue of proper data management and preservation in PPP Projects. Callous behavior at all levels of an organization results in data being stored haphazardly and spread out over a large number of digital systems. Data relating to the same issue can be spread between multiple devices over e-mails, physical documents, documents in the cloud, WhatsApp messages, and Short Message Service <strong>(\u201cSMS\u201d)<\/strong>. While organizations can and have been functioning on this basis, the actual difficulty arises when any kind of dispute rears its head, and the proverbial damage hits the ceiling. In other words, people often find that their attitude has severely hampered their ability to present a cogent and comprehensive case in their favor in handling and storing information in the digital format. This leads to a mad scramble at the end to collate multiple forms of data over a plethora of devices during the limited time of trial, which can easily be avoided by inculcating and strictly enforcing proper data management practices from the inception of a PPP Project.\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: large;\"><span style=\"color: #000000;\">The essential part of proving any piece of data, whether a letter or report, is demonstrating the integrity and chain of custody of a document from the time it was made to the time it was presented to the adjudicating authority. The basis in law for this principle stems from<\/span><a href=\"https:\/\/www.indiacode.nic.in\/show-data?actid=AC_CEN_3_20_00034_187201_1523268871700&amp;orderno=71\">Section 65(B) of the Indian Evidence Act 1872<\/a> <span style=\"color: #000000;\"><strong>(\u201cEvidence Act\u201d)<\/strong>. In<\/span><a href=\"https:\/\/main.sci.gov.in\/supremecourt\/2017\/39058\/39058_2017_34_1501_22897_Judgement_14-Jul-2020.pdf\"><strong><em>Arjun Panditrao Khotkar v. Kailash Kushanrao Gorantyal<\/em><\/strong><\/a><span style=\"color: #000000;\">, the Supreme Court categorically stated that, to render any electronic record admissible and prove the same in an Indian court, the procedure outlined in Section 65B of the Evidence Act must be strictly followed. The natural corollary to this is that, if the process is not followed, the electronic record cannot be admitted or proved in evidence. This results in a situation where the electronic data will not be considered by the court and may lead to disastrous consequences, including possibly the judgment going against a party.\u00a0<\/span><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: large;\"><span style=\"color: #000000;\">A requisite of compliance with the procedure in Section 65B also<\/span><a href=\"https:\/\/www.indiacode.nic.in\/show-data?actid=AC_CEN_3_20_00034_187201_1523268871700&amp;orderno=71\">mandates<\/a> <span style=\"color: #000000;\">furnishing a certificate to prove the electronic data being sought to be tendered into evidence. This can be given by (a) \u201c<em>any person who occupies a responsible official position<\/em>\u201d concerning the operation of the relevant device; or (b) any person who would be in \u201c<em>the management of appropriate activities<\/em>.\u201d\u00a0<\/span><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #000000; font-size: large;\">It is pertinent to note that, in the <strong><em>Arjun Panditrao case<\/em><\/strong>, the Supreme Court also understood that the period between the creation of the electronic record on the electronic device and the submission of a certificate under Section 65B might conceivably be a long time due to which the person submitting the certificate under Section 65B would be doing so to the best of their knowledge or belief. This would help alleviate situations where the person who created the electronic record had left the organization and would not be able to provide the certificate. This would also help to cover situations where, in a big organization, each person who creates the record is not needed to come and give a certificate in relation to a specific record.\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #000000; font-size: large;\">Thus, it is always preferable to keep all vital records and correspondence via e-mail instead of WhatsApp or SMS unless entirely unavoidable. The reason is that it is always easier to prove e-mails rather than WhatsApp messages in evidence during the course of a trial. WhatsApp forwards is also highly susceptible to being treated as hearsay, especially in cases where the originator of the forward cannot be ascertained. Though there has been a trend to create multiple WhatsApp groups in PPP Projects to coordinate multiple sub-projects, especially with government-appointed officials, the benefits of the ease of use of these groups must be weighed with the types and number of electronic records being created and the probability of the said electronic records being used in any dispute.<\/span><\/p>\n<p style=\"text-align: justify;\"><strong style=\"font-size: 14px; text-align: left;\"><\/strong><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #000000; font-size: x-large; font-family: 'Cormorant Garamond'; font-weight: normal;\"><strong style=\"text-align: left;\">4. Conclusion<\/strong><\/span><span style=\"font-size: 14px; text-align: left;\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: large; color: #000000;\">Data privacy and management issues are not novel to the legal arena, but their application in the PPP Project regime is. Often being side-lined, these issues must be seen from a more holistic approach. The DPDP Bill has recently been released for public comments to make its approach more holistic and comprehensible. However, the DPDP Bill, like its past editions, enables the Government to remove the applicability of specific or even all of the DPDP Bill\u2019s provisions to Government agencies on premises like public order, national security, and so on. The DPDP Bill also repeals the 2021 provisions requiring the Government to follow a <em>\u201cjust, fair, reasonable, and proportionate\u201d<\/em> procedure before granting an exemption and the 2018 provision requiring exemption to be <em>\u201cauthorized by law.\u201d <\/em>Furthermore, the Government has the authority to keep personally identifiable information for an indefinite period. Additionally, there is an instantaneous exemption for handling personal data for crime prevention, investigation, and so on, without the necessity for the Government to release any notification. This gives an unreasonable upper hand to the public enterprises in the PPP Projects.\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: large; color: #000000;\">When coming to data-related issues in the PPP Project regime, the issues are not new, but the approach taken to resolve them must be. PPP has been active enough in cyber security in fashioning resolutions and extenuations for handling modern threats that are sensible and effective. Therefore, currently, the same should be done for infrastructure projects as well, giving equal power to the private sector as it is given to public entities.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: large;\"><span style=\"color: #000000;\"><\/span><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: large;\"><span style=\"font-size: x-large; font-family: 'Cormorant Garamond'; font-weight: normal; color: #000000;\"><strong>Disclaimer<\/strong><\/span><span style=\"color: #000000;\"><\/span><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: large; color: #000000;\">The views, thoughts, and opinions expressed in the article belong solely to the authors, and not necessarily to their employers, organizations, committees, or other groups or individuals to which they are affiliated.<\/span><\/p>\n<p style=\"text-align: justify;\"><strong style=\"text-align: left; color: #000000; font-family: 'Cormorant Garamond'; font-size: x-large;\"><\/strong><\/p>\n<p style=\"text-align: justify;\"><strong style=\"text-align: left; color: #000000; font-family: 'Cormorant Garamond'; font-size: x-large;\"><\/strong><\/p>\n<p style=\"text-align: justify;\"><strong style=\"text-align: left; color: #000000; font-family: 'Cormorant Garamond'; font-size: x-large;\">About the Authors<\/strong><span style=\"font-size: 14px; text-align: left;\">\u00a0<\/span><\/p>\n<p><span style=\"font-size: large; color: #000000;\">Mr. Rushad Irani is a Senior Associate at Pioneer Legal and practices primarily at the High Court of Bombay.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: large; color: #000000;\">Ms. Parishti Kaushik is a Third-year law student at Gujarat National Law University and an Associate Editor at IJPIEL. .\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><strong style=\"color: #000000; font-family: 'Cormorant Garamond'; font-size: x-large;\"><\/strong><\/p>\n<p style=\"text-align: justify;\"><strong style=\"color: #000000; font-family: 'Cormorant Garamond'; font-size: x-large;\">Editorial Team<\/strong><span style=\"font-size: 14px; text-align: left;\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: Molengo; font-weight: normal; color: #000000; font-size: large;\"><em>Managing Editor: Naman Anand<\/em><\/span><span style=\"font-size: 14px; text-align: left;\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: Molengo; font-weight: normal; color: #000000; font-size: large;\"><em>Editors-in-Chief: Muskaan Singh and Hamna Viriyam<\/em><\/span><span style=\"font-size: 14px; text-align: left;\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><em style=\"color: #000000; font-family: Molengo; font-size: large;\">Senior Editor: Pushpit Singh<\/em><span style=\"font-size: 14px; text-align: left;\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: Molengo; font-weight: normal; font-size: large; color: #000000;\"><em>Associate Editor: Parishti Kaushik<\/em><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: Molengo; font-weight: normal; color: #000000; font-size: large;\"><em>Junior Editor: Kaushiki Singh <\/em><\/span><\/p>\n<p style=\"text-align: justify;\"><strong style=\"color: #000000; font-family: 'Cormorant Garamond'; font-size: x-large; text-align: left;\"><\/strong><\/p>\n<p style=\"text-align: justify;\"><strong style=\"color: #000000; font-family: 'Cormorant Garamond'; font-size: x-large; text-align: left;\">Preferred Method of Citation<\/strong><em style=\"color: #000000; font-family: 'Cormorant Garamond'; font-size: x-large; text-align: left;\">\u00a0<\/em><span style=\"font-size: 14px; text-align: left;\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: Molengo; font-weight: normal; color: #000000; font-size: large;\"><span size=\"4\" style=\"font-size: large;\"><span>Rushad Irani and\u00a0Parishti Kaushik<\/span>, &#8220;Stepping the Game Up \u2013 Data Privacy and Data Management in the Broader Realm of PPP Projects&#8221;<\/span><span face=\"arial, sans-serif\">\u00a0<\/span><span size=\"4\" style=\"font-size: large;\">(IJPIEL, 17 December 2022)<\/span><\/span><span style=\"font-size: 14px; text-align: left;\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: Molengo; font-weight: normal; color: #000000; font-size: large;\">&lt;https:\/\/ijpiel.com\/index.php\/2022\/12\/17\/stepping-the-game-up-data-privacy-and-data-management-in-the-broader-realm-of-ppp-projects\/&gt;<\/span><\/p>\n<p style=\"text-align: justify;\">\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.5.1&#8243; _module_preset=&#8221;default&#8221;][et_pb_row _builder_version=&#8221;4.5.1&#8243; _module_preset=&#8221;default&#8221; min_height=&#8221;181px&#8221; custom_padding=&#8221;|0px||||&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.5.1&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.5.1&#8243; _module_preset=&#8221;default&#8221; inline_fonts=&#8221;Cormorant Garamond,Molengo,Cormorant&#8221;] Abstract In today\u2019s world, there can be no question that the pervasion of personal data is rampant in every aspect of our lives, as data has become essential for the smooth functioning of our lives. It cannot be doubted that [&hellip;]<\/p>\n","protected":false},"author":219,"featured_media":6244,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":"","wp_social_preview_title":"","wp_social_preview_description":"","wp_social_preview_image":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/ijpiel.com\/index.php\/wp-json\/wp\/v2\/posts\/6238"}],"collection":[{"href":"https:\/\/ijpiel.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ijpiel.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ijpiel.com\/index.php\/wp-json\/wp\/v2\/users\/219"}],"replies":[{"embeddable":true,"href":"https:\/\/ijpiel.com\/index.php\/wp-json\/wp\/v2\/comments?post=6238"}],"version-history":[{"count":5,"href":"https:\/\/ijpiel.com\/index.php\/wp-json\/wp\/v2\/posts\/6238\/revisions"}],"predecessor-version":[{"id":6246,"href":"https:\/\/ijpiel.com\/index.php\/wp-json\/wp\/v2\/posts\/6238\/revisions\/6246"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ijpiel.com\/index.php\/wp-json\/wp\/v2\/media\/6244"}],"wp:attachment":[{"href":"https:\/\/ijpiel.com\/index.php\/wp-json\/wp\/v2\/media?parent=6238"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ijpiel.com\/index.php\/wp-json\/wp\/v2\/categories?post=6238"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ijpiel.com\/index.php\/wp-json\/wp\/v2\/tags?post=6238"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}