Data Protection Ecosystem: Need to Combat Organised Data Exploitation

India’s digital landscape is undergoing rapid transformation, underscoring the critical importance of data protection and privacy in today’s interconnected world.  The Digital Personal Data Protection (DPDP) Act, 2023, establishes a robust and comprehensive framework aimed at safeguarding personal data, fostering trust, and ensuring accountability in the digital ecosystem.  At its core, the Act seeks to regulate the collection, storage, and processing of digital personal data, emphasising principles of fairness, transparency, and security. However, while the DPDP Act imposes stringent compliance obligations on legitimate entities, it must also address the escalating threat posed by organised enterprises that operate outside the bounds of the law.  These entities systematically exploit personal data through unlawful means, undermining the very objectives of the legislation.  As such, the rules under the DPDP Act must not only empower lawful businesses to comply effectively but also equip mechanisms to conduct surveillance of these unlawful activities and take steps to ensure a secure and resilient digital future for all stakeholders.

The Rise of Illegal Businesses Exploiting Personal Data

While India’s legal framework governs data processing under various regulations, the country is undergoing an alarming increase in businesses that exploit personal data by illegal, deceptive, or fraudulent means. These businesses often engage in activities that undermine financial security and individuals’ privacy rights. Some common ways in which these illegal actors procure personal data include:

  1. Deceptive Call Centres and Scams: Call centres targeting individuals, pretending to be representatives of legitimate institutions, deceive people into disclosing personal information (e.g., bank details, Aadhar, OTPs, social security numbers), and then misuse it for theft or resale.
  2. Phishing and Social Engineering: Fraudsters impersonate legitimate entities (e.g., banks or government organisations) and use deceptive tactics to trick individuals into revealing personal data, which is then used for identity theft or financial fraud.
  3. Rogue Apps and Malicious Websites: Fraudulent apps or websites collect excessive personal data under the guise of offering services or discounts, which are either misused or sold.
  4. Hacking and Data Breaches: Cybercriminals hack into organisations/government databases and steal sensitive personal data such as financial information, login credentials, and social security numbers, which are then sold or used for fraudulent activities.

Examples of Fraudulent Activities by Illegal Businesses

Illegal businesses engage in a range of deceptive practices that harm individuals and undermine trust in the digital economy.  Following are the brief examples:

S.No.

Offence

Description of Offence

Offence under Section of IT Act

Personal Data Collection

Stage of Commission of Initial Offence

1

SIM Swap Fraud

Fraudsters impersonate individuals to gain control of their mobile numbers and bypass two-factor authentication.

Section 66 (Hacking), Section 66C (Identity Theft)

Yes, mobile number, possibly linked financial details

At the time of data collection (e.g., mobile details)

2

Tech Support Scams

Fake tech support call centres impersonate legitimate companies and steal financial data or install malware.

Section 66D (Cheating by Impersonation)

Yes, remote access, personal & financial data

At the time of interaction

3

Fake Loan or Job Scams

Scammers offer fake loans or jobs, collecting personal details for fraud or identity theft.

Section 66C (Identity Theft), Section 66D (Cheating)

Yes, Aadhaar, bank details, and personal information

At the time of data collection (loan/job applications)

4

Online Shopping Fraud

Fake e-commerce websites collect credit card information and either fail to deliver goods or send counterfeit items.

Section 66 (Hacking), Section 66D (Cheating by Impersonation)

Yes, credit card, financial and personal details

At the time of making a purchase or registration

5

Phishing Attacks

Fraudsters impersonate trusted entities to steal login credentials and financial details.

Section 66D (Cheating by Impersonation)

Yes, bank details, login credentials

Display of website for collecting information

6

Ransomware Attacks

Cybercriminals lock data on devices and demand ransom for decryption keys.

Section 66 (Hacking)

Yes, encrypted files, personal data on device

At the time of accessing data

7

Fake Charity Scams

Fraudsters create fake charity campaigns and steal personal data while collecting donations.

Section 66 (Hacking), Section 66C (Identity Theft)

Yes, donation details, personal information

At the time of advertising for donation and collection

8

Fake Real Estate Scams

Fraudsters offer non-existent properties for investment, collecting payments and disappearing.

Section 66D (Cheating by Impersonation)

Yes, payment details, personal info for contracts

At the time of advertising for purchase and collection

9

Fake Travel and Holiday Scams

Fraudsters offer low-priced vacation packages, taking upfront payments and failing to deliver services.

Section 66D (Cheating by Impersonation)

Yes, personal and payment details for booking

After booking or payment is made

10

Social Media Impersonation & Romance Scams

Fraudsters create fake profiles to manipulate victims into sending money or sharing personal information.

Section 66C (Identity Theft), Section 66D (Cheating)

Yes, personal details and financial information

At the time of creating profile, interaction or when money is requested

11

Data Harvesting and Selling

Fraudulent businesses collect personal data via surveys, fake apps, or websites and sell it without consent.

Section 43 (Damage to Computer Systems), Section 66 (Hacking)

Yes, via surveys or apps

At the time of data collection (without consent)

12

Fake Software and Antivirus Scams

Fake software/antivirus programs are sold, stealing personal data or installing malware.

Section 66 (Hacking), Section 66D (Cheating)

Yes, installation process, personal data on devices

After installation and access to device data

13

Fake Investment Schemes

Fraudulent schemes promise unrealistic returns, using collected money for fraudulent purposes.

Section 66D (Cheating by Impersonation)

Yes, investment details and personal information

After the victim invests or provides personal details

14

Fraudulent SMS and Email Promotions

Fraudsters send fake promotional offers to steal personal details or payment info by redirecting victims to fake sites.

Section 66D (Cheating by Impersonation)

Yes, personal and payment details

After the victim interacts or submits details

15

Fake Mobile App Scams

Fraudulent mobile apps collect personal data or install malware on devices.

Section 66 (Hacking), Section 66D (Cheating)

Yes, app permissions, user data

At the time of app installation or data collection

16

Fake Online Reviews and Ratings

Posting fake reviews to mislead consumers into making purchases based on fabricated feedback.

Section 66D (Cheating by Impersonation)

No significant personal data involved

At the time of posting reviews

17

SMS Spoofing

Fraudsters spoof SMS sender IDs to impersonate banks and trick victims into disclosing sensitive personal details.

Section 66C (Identity Theft), Section 66D (Cheating)

Yes, banking info or login credentials

After the spoofed message is sent and the victim responds

18

Fake Job Offers on Job Portals

Fake job offers on platforms like LinkedIn or Naukri collect personal details or “joining fees”.

Section 66C (Identity Theft), Section 66D (Cheating)

Yes, personal details (e.g., resume, bank info)

At the time of job application submission

19

Fake Document Services

Fraudsters offer fake document services, taking payment upfront without delivering valid documents.

Section 66D (Cheating by Impersonation)

Yes, personal and document-related data

After payment and data collection for documentation

20

Fake Debt Relief & Credit Repair Scams

Scammers promise debt relief or credit repair and disappear after taking fees.

Section 66D (Cheating by Impersonation)

Yes, personal financial details

After the victim provides financial details

21

Fake Health & Wellness Products

Fake products are sold under health and wellness brands, collecting personal details during purchase.

Section 66C (Identity Theft), Section 66D (Cheating)

Yes, health-related and payment details

At the time of purchase or subscription

22

Fake Dating Scams

Fraudsters create fake dating profiles, establish fake relationships, and then ask for money or “emergency” help.

Section 66C (Identity Theft), Section 66D (Cheating)

Yes, personal and financial info

After emotional manipulation or money request

23

Fake Lottery or Prize Wins

Fraudsters notify victims of fake lottery wins, asking for money or sensitive information to “process” the prize.

Section 66D (Cheating by Impersonation)

Yes, personal information for claiming prize

After the victim shares personal data or payment

24

Fake Shipping or Delivery Scams

Fraudsters send fake shipping notifications asking for personal details or payments for supposed fees.

Section 66D (Cheating by Impersonation)

Yes, shipping and payment details

After notification and data request

25

Fake Prize Draws or Giveaways

Fraudulent prize draws or giveaways ask victims to pay or provide data to claim non-existent prizes.

Section 66D (Cheating by Impersonation)

Yes, personal and payment information

After the victim shares personal data or payment

26

Fake Tax Refund Scams

Fraudsters impersonate tax authorities to steal personal and financial information under the pretence of processing a refund.

Section 66D (Cheating by Impersonation)

Yes, financial details (bank information, PAN)

After the victim shares sensitive financial details

27

Fake Ticketing Scams

Fraudsters offer discounted event or travel tickets and disappear once payments are made.

Section 66D (Cheating by Impersonation)

Yes, payment and personal information

After payment and ticket request

28

Fake Domain & Website Registration Scams

Fraudulent companies promise domain or website registration at low prices but deliver nothing.

Section 66D (Cheating by Impersonation)

Yes, domain registration details (e.g., personal data)

At the time of payment for registration

 Key Takeaways:

  1. Such crimes require significant analysis, preparation, infrastructure, and personnel – These crimes are typically orchestrated by organised enterprises rather than individuals, since the tasks are time-consuming and resource-intensive.
  2. Majority of the effort is expended during the information-gathering phase, which involves advertisements, calls, and other tactics – most of the time is spent by them on the personal data collection.
  3. Majority of the crimes are identity theft and/or impersonation – There is a requirement for a genuineness check on all collection mechanisms.

Two-prong approach: By 1) identifying these enterprises; enforcing action against all its partners and associates, and 2) implementing genuineness check, the occurrence of such crimes can be significantly reduced.

Limitations of CERT-In, TRAI in Addressing Illegal Data Exploitation

While CERT-In (Computer Emergency Response Team – India) and TRAI (Telecom Regulatory Authority of India) play important roles in cybersecurity and telecom regulation, they are not adequately equipped to tackle the growing issue of illegal exploitation of personal data by businesses outside the legal framework. Their functions are limited:

  • CERT-In focuses primarily on technical aspects of cybersecurity and provides advisory services but lacks enforcement authority to prosecute illegal actors or take legal action against them.
  • TRAI regulates the telecommunications sector and can issue guidelines for data privacy within this domain, but it lacks the legal authority to take direct action against businesses misusing personal data across various industries.

The ambit of both bodies is not sufficient to deal with the surveillance of organised data exploitation.

Lacunae in the Current Framework under IT Act: The Need for a Dedicated Body to Address Illegal Data Businesses

Cybercriminals often dedicate significant time, energy, and resources to collecting, processing, and misusing personal data. However, existing cybercrime law enforcement agencies primarily focus on investigating crimes that have already been committed, rather than addressing the illegal businesses whose sole purpose is to procure personal data for financial fraud. This creates a significant gap in the current framework, as the centralised cybercrime police stations are not adequately equipped to investigate and take action against these illegal entities whose primary objective is the collection of personal information.  While the misuse of personal data is typically addressed once a cybercrime complaint is filed by the victim, there is a clear need for a dedicated agency that focuses on investigating and preventing these illegal businesses from obtaining personal data in the first place.

Despite data protection-related aspects being segregated from the Information Technology Act, 2000 (IT Act), to form the DPDP Act, there is no such mechanism or governmental agency to deal with surveillance and thereafter specific enforcement of data collection by illegal businesses.  The IT Act primarily focuses on cybercrimes such as hacking, identity theft, impersonation, and cyberstalking, which fall under the jurisdiction of cybercrime police. However, data protection issues, including breaches of personal data and unauthorised data collection and processing by illegal businesses, necessitate a distinct surveillance and reporting framework, as they involve specialised expertise.

To effectively combat the rising tide of illegal businesses that steal, misuse, sell personal data, or commit financial fraud based on the same, there is an urgent need for a dedicated, empowered surveillance and reporting body. This body would focus on continuous surveillance of illegal data exploitation and report them to enforcement agencies.  This authority should work in collaboration with CERT-In, TRAI, and the cybercrime department to ensure a comprehensive and effective approach to data security and protection.

Proposal for the Establishment of the Data Protection Surveillance Authority (DPSA)

We propose the creation of a Data Protection Surveillance Authority (DPSA) to monitor, assess, and report illegal activities related to the exploitation of personal data. The DPSA will serve as a dedicated body responsible for:

  1. Monitoring and Identifying Illegal Data Practices: DPSA will conduct routine surveillance to identify businesses or individuals involved in unauthorised data collection, hacking, or fraudulent activities related to personal data.
  2. Collaborating with CERT-In, TRAI, and other enforcement agencies: DPSA will work alongside CERT-In, Data Protection Board, Financial Intelligence Unit, National Critical Information Infrastructure Protection Centre (NCIIPC), Ministry of Electronics and Information Technology (MeitY), TRAI, DoT, RBI, SEBI, DPIIT, CCI, ED, CBI, NIA, and such other monitoring, regulatory, or enforcement agencies, to strengthen the overall ecosystem against illegal data practices.
  3. Reporting Cases to the Data Protection Board (DPB) and other agencies: DPSA will have the authority to submit reports to Cybercrime Police, CBI, NIA, ED, or such other enforcement agencies seeking to initiate cases against such illegal entities engaged in data exploitation for adjudication and necessary regulatory action.
  4. Public Awareness and Risk Prevention: DPSA will actively engage in public awareness initiatives to educate individuals about the risks of data exploitation and provide guidance on safeguarding personal information.
  5. Actionable Intelligence: This authority will focus solely on surveillance and reporting, ensuring that regulatory bodies and law enforcement agencies are equipped with actionable intelligence to curb data-related offences.

Framework

Option 1: Amend the Data Protection Act, 2023, in the following manner:

Chapter VIA of Data Protection Surveillance Authority.

Section 28A: Establishment of the Data Protection Surveillance Authority (DPSA)

Section 28B: Composition, Qualification, and Appointment of Members

Section 28C: Salary, Allowances, and Other Conditions of Service

Section 28D: Disqualifications for Appointment as Chairperson or Member

Section 28E: Proceedings of the Authority

Section 28F: Officers and Employees of the Authority

Section 28G: Members and Officers to be Public Servants

Section 28H: Powers and Functions of the Data Protection Surveillance Authority (DPSA)

  • The DPSA shall perform the following functions:
    1. Monitor and identify unauthorised data collection, processing, and transfers routinely without due authorisation.
    2. Conduct research and surveillance on such entities who engage in unauthorised data collection and processing routinely.
    3. Collaborate with regulatory and enforcement agencies to procure information from and report violations to them.
    4. Submit reports and recommendations to the Data Protection Board and other relevant authorities.
    5. Promote awareness and best practices for data protection among businesses and individuals.
    6. The DPSA shall have no direct enforcement powers, but may recommend actions to the Data Protection Board (DPB) and/or other enforcement agencies in India for necessary adjudication.

Section 28J: Procedure to be Followed by the DPSA

  1. The DPSA and its members shall maintain confidentiality while carrying out surveillance activities without any interference from or access to others.
  2. The DPSA shall follow a structured process for gathering, verifying, and reporting information, as prescribed by rules.
  3. Any entity found engaging in potentially unlawful data practices shall be provided an opportunity to explain or clarify before a report is submitted to the enforcement agencies.
  4. The DPSA may conduct periodic risk assessments, issue advisories, and recommend policy updates to the Central Government.

Option 2: Insert the following Clauses in the proposed Data Protection Rules, 2025 in the following manner:

  1. Establish DPSA as a surveillance arm of the Data Protection Board under Section 28(7)(d) of DPA.
  2. Powers and functions – U/s 27 either by a complaint or reference from the government, DPSA can initiate surveillance on any person/entity within India or abroad.
  3. In Rule 15 of the Rules, the power to conduct surveillance can also be added along with research, archiving, and statistical powers for DPSA.

The provisions outlined in Option 1 can be incorporated as new sections under the Rules. The following structure is proposed:

Rule 23: Establishment of the Data Protection Surveillance Authority (DPSA).

Rule 24: Proceedings of the Authority.

Rule 25: Powers and Functions of the Data Protection Surveillance Authority (DPSA).

Rule 26: Procedure to be Followed by the DPSA.

Option 3: Data Protection Surveillance Authority (DPSA) under the IT Act, 2000:

To establish the DPSA under the IT Act, 2000, a new set of rules—Data Protection Surveillance Authority Rules, 2025—can be introduced. These rules will provide a legal framework for monitoring, reporting, and coordinating data protection compliance with/without enforcement powers.

Conclusion

India is at a critical juncture in its digital evolution. While the DPDP Act establishes a solid framework for regulating personal data protection, there is a pressing need for a Data Protection Surveillance Authority (DPSA) to tackle the growing problem of illegal data exploitation.  This body, empowered by specific clauses in the DPDP Rules, will work alongside CERT-In and TRAI to investigate and take action against illegal businesses that steal and misuse personal data.

With a clear mandate, the DPSA will strengthen India’s ability to protect its citizens’ privacy and create a safer digital ecosystem.

Image Credits:

Photo by towfiqu ahamed on Canva

India is at a critical juncture in its digital evolution. While the DPDP Act establishes a solid framework for regulating personal data protection, there is a pressing need for a Data Protection Surveillance Authority (DPSA) to tackle the growing problem of illegal data exploitation.  This body, empowered by specific clauses in the DPDP Rules, will work alongside CERT-In and TRAI to investigate and take action against illegal businesses that steal and misuse personal data.

POST A COMMENT