65 lines
2.1 KiB
Markdown
65 lines
2.1 KiB
Markdown
|
|
# Data Protection
|
||
|
|
|
||
|
|
## Data Classification
|
||
|
|
|
||
|
|
| Classification | Examples | Handling |
|
||
|
|
|----------------|----------|----------|
|
||
|
|
| **Public** | Published license numbers, verification status | No restrictions |
|
||
|
|
| **Internal** | Processing statistics, workflow configurations | Staff access only |
|
||
|
|
| **Confidential** | Applicant personal data, documents | Role-based access |
|
||
|
|
| **Restricted** | Authentication credentials, encryption keys | System access only |
|
||
|
|
|
||
|
|
## Personal Data Inventory
|
||
|
|
|
||
|
|
| Data Category | Fields | Purpose | Retention |
|
||
|
|
|---------------|--------|---------|-----------|
|
||
|
|
| Identity | Name, Aadhaar (masked), photo | Applicant identification | License validity + 7 years |
|
||
|
|
| Contact | Email, phone, address | Communication | License validity + 7 years |
|
||
|
|
| Business | Business name, registration | License application | License validity + 7 years |
|
||
|
|
| Documents | Uploaded files | Verification | License validity + 7 years |
|
||
|
|
| Activity | Login times, actions | Audit | 7 years |
|
||
|
|
|
||
|
|
## Data Subject Rights
|
||
|
|
|
||
|
|
### Right to Access
|
||
|
|
Applicants can view all their personal data through the portal under "My Profile" and "My Applications."
|
||
|
|
|
||
|
|
### Right to Correction
|
||
|
|
Applicants can request corrections through the portal. Changes require verification for critical fields.
|
||
|
|
|
||
|
|
### Right to Erasure
|
||
|
|
Limited by legal retention requirements. Non-essential data can be erased upon request after license expiry.
|
||
|
|
|
||
|
|
### Right to Portability
|
||
|
|
Data export available in JSON and PDF formats through the portal.
|
||
|
|
|
||
|
|
## Data Security Controls
|
||
|
|
|
||
|
|
### Encryption
|
||
|
|
|
||
|
|
| State | Method |
|
||
|
|
|-------|--------|
|
||
|
|
| At Rest | AES-256 (database, files) |
|
||
|
|
| In Transit | TLS 1.3 |
|
||
|
|
| Backups | AES-256 with separate key |
|
||
|
|
|
||
|
|
### Access Control
|
||
|
|
|
||
|
|
- Role-based permissions
|
||
|
|
- Department-level data isolation
|
||
|
|
- Session timeout after inactivity
|
||
|
|
- Failed login lockout
|
||
|
|
|
||
|
|
### Anonymization
|
||
|
|
|
||
|
|
For analytics and reporting, personal identifiers are removed or pseudonymized.
|
||
|
|
|
||
|
|
## Breach Response
|
||
|
|
|
||
|
|
1. Detection and containment
|
||
|
|
2. Impact assessment
|
||
|
|
3. Notification to affected individuals (within 72 hours)
|
||
|
|
4. Notification to CERT-In (as required)
|
||
|
|
5. Root cause analysis
|
||
|
|
6. Remediation
|