Files

65 lines
2.1 KiB
Markdown
Raw Permalink Normal View History

# Data Protection
## Data Classification
| Classification | Examples | Handling |
|----------------|----------|----------|
| **Public** | Published license numbers, verification status | No restrictions |
| **Internal** | Processing statistics, workflow configurations | Staff access only |
| **Confidential** | Applicant personal data, documents | Role-based access |
| **Restricted** | Authentication credentials, encryption keys | System access only |
## Personal Data Inventory
| Data Category | Fields | Purpose | Retention |
|---------------|--------|---------|-----------|
| Identity | Name, Aadhaar (masked), photo | Applicant identification | License validity + 7 years |
| Contact | Email, phone, address | Communication | License validity + 7 years |
| Business | Business name, registration | License application | License validity + 7 years |
| Documents | Uploaded files | Verification | License validity + 7 years |
| Activity | Login times, actions | Audit | 7 years |
## Data Subject Rights
### Right to Access
Applicants can view all their personal data through the portal under "My Profile" and "My Applications."
### Right to Correction
Applicants can request corrections through the portal. Changes require verification for critical fields.
### Right to Erasure
Limited by legal retention requirements. Non-essential data can be erased upon request after license expiry.
### Right to Portability
Data export available in JSON and PDF formats through the portal.
## Data Security Controls
### Encryption
| State | Method |
|-------|--------|
| At Rest | AES-256 (database, files) |
| In Transit | TLS 1.3 |
| Backups | AES-256 with separate key |
### Access Control
- Role-based permissions
- Department-level data isolation
- Session timeout after inactivity
- Failed login lockout
### Anonymization
For analytics and reporting, personal identifiers are removed or pseudonymized.
## Breach Response
1. Detection and containment
2. Impact assessment
3. Notification to affected individuals (within 72 hours)
4. Notification to CERT-In (as required)
5. Root cause analysis
6. Remediation