BDSLCCI-Framework-Control-Areas-map-EU-GDPR-and-India-DPDP-Act-requirements

BDSLCCI Framework Control Areas mapped with EU's GDPR and India's DPDP Act requirements

Personal data privacy, also widely known as information privacy, refers to the practice of protecting personal information from unauthorized access and ensuring that individuals have control over how their data is collected, used, and shared.

The General Data Protection Regulation (GDPR) is a comprehensive data protection law enacted by the European Union (EU). It aims to protect the privacy and personal data of individuals within the EU and the European Economic Area (EEA).

The Digital Personal Data Protection Act, 2023 (DPDP Act) is a significant piece of legislation in India that governs the processing of digital personal data.


The Business Domain Specific Least Cybersecurity Controls Implementation (BDSLCCI) Framework is complying with the maximum cybersecurity control areas in defense in depth (DiD), which are helpful for micro, small, and medium enterprises known as SMEs, SMBs, MSMEs, or startup companies.

This article will help you understand different control types and cybersecurity areas, along with how the BDSLCCI cybersecurity framework will provide wide coverage of GDPR and DPDP Act.


GDPR and DPDP Act Mapping with BDLSCCI Framework:

The below table shows coverage of Defense in Depth (DiD) cybersecurity controls in align with EU's GDPR and India's DPDP Act.

GDPR (EU) DPDP Act (India) BDSLCCI CONTROL AREA
Article Outline/summary Section Outline/summary Control Area
GDPR's Chapter I - General provisions
1 Subject-matter and objectives - This article outlines the objectives of the GDPR, which include protecting the fundamental rights and freedoms of natural persons, particularly their right to the protection of personal data. CHAPTER I - Introduction An Act to provide for the processing of digital personal data in a manner that recognises both the right of individuals to protect their personal data and the need to process such personal data for lawful purposes and for matters connected therewith or incidental thereto. 1.10 - Human - Cybersecurity Awareness Training
1.11 - Human - Separation of Duties (with ARCSIK Matrix)
1.17 - Human - Non Disclosure Agreement (NDA)
2 Material scope - This article defines the scope of the GDPR, specifying the types of data processing activities that fall under its regulations. CHAPTER I - Section 1 An Act to provide for the processing of digital personal data in a manner that recognises both the right of individuals to protect their personal data and the need to process such personal data for lawful purposes and for matters connected therewith or incidental thereto.
3 Territorial scope - This article explains the territorial applicability of the GDPR, indicating that it applies to data processing activities conducted within the EU, as well as those related to offering goods or services to, or monitoring the behavior of, individuals within the EU. CHAPTER I -
Section 3
CHAPTER IV -
Section 16 and 17
Similar scope, applies to digital personal data processed within India and to entities outside India if they process data of individuals within India
4 Definitions - This article provides definitions for key terms used throughout the GDPR, such as "personal data," "data subject," "processing," and "controller". CHAPTER I - Section 2

CHAPTER V
DPDP privacy-related terms are formally defined here.
GDPR's Chapter II - The core principles for processing personal data
5 Principles relating to processing of personal data - Personal data must be: (a) processed lawfully, fairly and transparently; (b) collected for specified, explicit and legitimate purposes only; (c) adequate, relevant and limited; (d) accurate; (e) kept no longer than needed; (f) processed securely to ensure its integrity and confidentiality. The “controller” is accountable for all that. CHAPTER II -
Section 4 to 10
Reflects similar principles such as purpose limitation, data minimization, and accuracy. 1.11 - Human - Separation of Duties (with ARCSIK Matrix)
1.17 - Human - Non Disclosure Agreement (NDA)
Concent Form while personal data collection of Employees and Stakeholders
6 Lawfulness of processing - Lawful processing must be: (a) consented to by the subject for the stated purpose; (b) required by a contract; (c) necessary for other compliance reasons; (d) necessary to protect someone’s vital interests; (e) required for public interest or an official authority; and/or (f) limited if the subject is a child. Note: there are several detailed and explicit requirements concerning lawful processing - see GDPR! Note also that EU member states may impose additional rules. Primarily consent-based processing, with limited grounds for processing without consent
7 Conditions for consent - The data subject’s consent must be informed, freely given and they can withdraw it easily at any time. Emphasizes explicit, informed, and specific consent, which can be withdrawn.
8 Conditions applicable to child's consent - Special restrictions apply to consent by/for children. Sets the age of consent at 18, requiring verifiable parental consent for processing children's data.
9 Special restrictions apply to particularly sensitive data concerning a person’s race, political opinions, religion, sexuality, genetic info and other biometrics etc. Processing of such info is prohibited by default unless consent is given and processing is necessary (as defined in the Article). Many restrictions may apply.
10 Special restrictions also apply to personal data concerning criminal convictions and offenses. Many restrictions may apply.
11 Some restrictions don’t apply if a person cannot be identified from the data held. Many restrictions may apply.
GDPR's Chapter III - Rights of the data subject
12 Communications with data subjects must be transparent, clear and easily understood. CHAPTER III -
Section 11 to 15
A data subject in GDPR, is known as ‘data principal’ under the DPDPA – who is the individual to whom the data relates. Grants similar rights to data principals, including access, correction, and erasure. There is provision for appeal and alternate dispute resolution. 1.11 - Human - Separation of Duties (with ARCSIK Matrix)
1.17 - Human - Non Disclosure Agreement (NDA)
Concent Form while personal data collection of Employees and Stakeholders
13 When personal data are collected, people must be given (or already possess) several specific items of information such as details of the data “controller” and “data protection officer”, whether their info will be exported (especially outside the EU), how long the info will be held, their rights and how to enquire/complain etc.
14 Similar notification requirements to Article 13 apply if personal info is obtained indirectly (e.g. a commercial mailing list?): people must be informed within a month and on the first communication with them.
15 People have the right to find out whether the organisation holds their personal info, what it is being used for, to whom it may be disclosed etc., and be informed of the right to complain, get it corrected, insist on it being erased etc. People have rights to obtain a copy of their personal information.
16 People have the right to get their personal info corrected, completed, clarified etc.
17 People have a right to be forgotten i.e. to have their personal info erased and no longer used.
18 People have a right to restrict processing of their personal info.
19 People have a right to know the outcome of requests to have their personal info corrected, completed, erased, restricted etc.
20 People have a right to obtain a usable ‘portable’ electronic copy of their personal data to pass to a different controller.
21 People have a right to object to their information being used for profiling and marketing purposes. CHAPTER III -
Section 11 to 15

CHAPTER VII
22 People have a right to insist that key decisions arising from automatic processing of their personal info are manually reviewed/reconsidered.
23 National laws may modify or override various rights and restrictions for national security and other purposes. CHAPTER III -
Section 11 to 15
GDPR's Chapter IV Controller and processor
24 The “controller” (generally the organisation that owns and benefits from processing of personal info) is responsible for implementing appropriate privacy controls (including policies and codes of conduct) considering the risks, rights and other requirements within and perhaps beyond GDPR. CHAPTER II -
Section 8
The DPDPA follows broadly similar principles to those set out in the GDPR and specifies rules for data fiduciaries (equivalent to “controllers” under the GDPR) and data processors, and rights for data principals (equivalent to “data subjects” under the GDPR). 1.1 - Host/Endpoint - Less Permission to Use
1.2 - Host/Endpoint - Endpoint Protection - Anti-Virus
1.3 - Host/Endpoint - Licensed Operating System (OS)
1.4 - Host/Endpoint - Block File Transfers
1.5 - Data - Encryption
1.6 - Data - Access control
1.7 - Data - Backup
1.8 - Data - Data Loss Prevention
1.9 - Data - Secure Deletion
1.10 - Human - Cybersecurity Awareness Training
1.11 - Human - Separation of Duties
1.12 - Human - Service Level Agreement (SLA)
1.13 - Human - Employee Background Check
1.14 - Human - Review Access Rights
1.15 - Human - Cyber Threat Alert Notifications
1.16 - Human - Cybersecurity Banners / Posters
1.17 - Human - Non Disclosure Agreement (NDA)
2.1 - Network - Network Firewall
2.2 - Network - Network Access Control
2.3 - Network - Remote Access VPN
2.4 - Network - Instruction Detection & Prevention Systems (IDPS)
2.5 - Application - OWASP Coding Practices
2.6 - Application - Application Hardening
3.1 - Physical Perimeter - Locked and Dead-Bolted Steel Doors
3.2 - Physical Perimeter - Closed-Circuit Surveillance Cameras (CCTV)
3.3 - Physical Perimeter - Picture IDs
3.4 - Physical Perimeter - Security Guards / Proper Lighting / Biometrics / Environmental Control
3.5 - Governance - Incident Response Process
3.6 - Governance – Business Continuity Plan (BCP)
3.7 - Governance - Periodic Audit
25 Data protection by design and by default - Taking account of risks, costs and benefits, there should be adequate protection for personal info by design, and by default. CHAPTER II -
Section 10

CHAPTER III -
Section 11 to 17

CHAPTER VI -
Section 27

CHAPTER IX -
Section 37
Section 40
It encourages data fiduciaries to implement appropriate technical and organizational measures.
26 Where organisations are jointly responsible for determining and fulfilling privacy requirements collaboratively, they must clarify and fulfil their respective roles and responsibilities.
27 Organisations outside Europe must formally nominate privacy representatives inside Europe if they meet certain conditions (e.g. they routinely supply goods and services to, or monitor, Europeans).
28 If an organisation uses one or more third parties to process personal info (‘processors’), it must ensure they too are compliant with GDPR.
29 Processors must only process personal info in accordance with instructions from the controller and applicable laws.
30 Controllers must maintain documentation concerning privacy e.g. the purposes for which personal info is gathered and processed, ‘categories’ of data subjects and personal data etc. CHAPTER II -
Section 9
Section 10

CHAPTER III -
Section 11
Section 13
Section 17

CHAPTER IX -
Section 40
It encourages data fiduciaries to implement appropriate technical and organizational measures. Requires all data breaches to be reported to the Data Protection Board and data principals.
31 Organisations must cooperate with the authorities e.g. privacy or data protection ombudsmen.
32 Organisations must implement, operate and maintain appropriate technical and organisational security measures for personal info, addressing the information risks.
33 Notification of a personal data breach to the supervisory authority - Privacy breaches that have exposed or harmed personal info must be notified to the authorities promptly (within 3 days of becoming aware of them unless delays are justified).
34 Privacy breaches that have exposed or harmed personal info and hence are likely to harm their interests must be notified to the people so affected ‘without undue delay.
35 Privacy risks including potential impacts must be assessed, particularly where new technologies, systems or arrangements are being considered, or otherwise where risks may be significant (e.g. ‘profiling’). ‘Significantly risky situations’ are to be defined by the national privacy authorities, apparently.
36 Privacy risks assessed as “high” [undefined] should be notified to the authorities, giving them the chance to comment.
37 A data protection officer must be formally identified under specified circumstances e.g. public bodies, organisations regularly and systematically monitoring people on a large scale, or those performing large-scale processing of sensitive personal info relating to criminal records.
38 [If formally designated] the data protection officer must be supported by the organisation and engaged in privacy matters.
39 [If formally designated] the data protection officer must offer advice on privacy matters, monitor compliance, liaise with the authorities, act as a contact point, address privacy risks etc.
40 Various authorities, associations and industry bodies are anticipated to draw up codes of conduct elaborating on GDPR and privacy, offer them to be formally approved (by an unspecified mechanism) and (where appropriate) to implement their own (member) compliance mechanisms.
41 The bodies behind codes of conduct are required to monitor compliance (by their members), independently and without prejudice to the legal and regulatory compliance monitoring conducted by the national authorities.
42 Voluntary data protection certification schemes offering compliance seals and marks (valid for 3 years) are to be developed and registered.
43 Certification bodies that award compliance seals and marks should be competent and accredited for this purpose. The European Commission may impose technical standards for certification schemes.
GDPR's Chapter V - Transfers of personal data to third countries or international organisations
44 International transfers and processing of personal info must fulfil requirements laid down in subsequent Articles. CHAPTER IV -
Section 16 and 17
Permits transfers except to blacklisted countries 1.1 - Host/Endpoint - Less Permission to Use
1.4 - Host/Endpoint - Block File Transfers
1.6 - Data - Access control
1.7 - Data - Backup
1.8 - Data - Data Loss Prevention
1.9 - Data - Secure Deletion
1.10 - Human - Cybersecurity Awareness Training
1.11 - Human - Separation of Duties (with ARCSIK Matrix)
1.14 - Human - Review Access Rights
1.16 - Human - Cybersecurity Banners / Posters
1.17 - Human - Non Disclosure Agreement (NDA)
3.7 - Governance - Periodic Audit
45 Data transfers to countries whose privacy arrangements (laws, regulations, official compliance mechanisms ...) are deemed adequate by the European Commission (i.e. compliant with GDPR) do not require official authorisation or specific additional safeguards.
46 Addresses the transfer of personal data to third countries or international organizations when there is no adequacy decision in place.
47 National authorities may approve legally-binding privacy rules permitting transfers to non-approved countries.
48 Requirements on European organisations from authorities outside Europe to disclose personal data may be invalid unless covered by international agreements or treaties.
49 Yet more conditions apply to personal info transfers to nonapproved countries e.g. explicit consent by the data subjects.
GDPR's Chapter VIII - Remedies, liability and penalties
83 Administrative fines imposed by supervisory authorities shall be “effective, proportionate and dissuasive”. Various criteria are defined. Depending on the infringements and circumstances, fines may reach 20 million Euros or up to 4% of total worldwide annual turnover for the previous year if greater. CHAPTER VIII -
Section 33 and 34
Specifies penalties ranging from INR 500 million to INR 2.5 billion 3.5 - Governance - Incident Response Process
3.6 - Governance – Business Continuity Plan (BCP)
3.7 - Governance - Periodic Audit
84 Other penalties may be imposed. They too must be “effective, proportionate and dissuasive”.
GDPR's Chapter IX - Provisions relating to specific processing situations
85 Countries must balance privacy/data protection rights against freedom of expression, journalism, academic research etc. through suitable laws. CHAPTER IV -
Section 16 and 17

CHAPTER IX
Permits transfers except to blacklisted countries as well as covers various MISCELLANEOUS clauses. 1.1 - Host/Endpoint - Less Permission to Use
1.4 - Host/Endpoint - Block File Transfers
1.6 - Data - Access control
1.7 - Data - Backup
1.8 - Data - Data Loss Prevention
1.9 - Data - Secure Deletion
1.10 - Human - Cybersecurity Awareness Training
1.11 - Human - Separation of Duties (with ARCSIK Matrix)
1.14 - Human - Review Access Rights
1.16 - Human - Cybersecurity Banners / Posters
1.17 - Human - Non Disclosure Agreement (NDA)
3.5 - Governance - Incident Response Process
3.6 - Governance – Business Continuity Plan (BCP)
3.7 - Governance - Periodic Audit.
86 Other penalties may be imposed. They too must be “effective, proportionate and dissuasive”.
87 Countries may impose further privacy controls for national ID numbers.
88 Countries may impose further constraints on corporate processing and use of personal information about employees e.g. to safeguard human dignity and fundamental rights.
89 Where personal data are to be archived e.g. for research and statistical purposes, the privacy risks should be addressed through suitable controls such as pseudonymisation and data minimisation where feasible.
90 Countries may enact additional laws concerning workers’ secrecy and privacy obligations.

Note: Despite the best efforts from our team, the above mapping information may be inaccurate and incomplete. This is not legal advice. Take competent legal advice if GDPR or DPDP Act compliance is relevant to your organization.

Visit www.BDSLCCI.com today to know more features and benefits!

Latest BDSLCCI framework 2.0 has modified Defense in Depth (DiD) as well as Mission Critical Asset (MCA).

Cybersecurity is right for every business, regardless of its size, location, or revenue! The BDSLCCI Cybersecurity Framework complies with the maximum cybersecurity controls's categories using a tailored list of controls, especially useful for micro, small, and medium enterprises known as SMEs, SMBs, MSMEs, or startup companies.

by Dr. Shekhar Ashok Pawar

OVERVIEW of BDLSCCI Framework:

SecureClaw Incorporation is the second venture of Dr. Pawar, which is on the mission of cybersecuring small and medium companies worldwide, which are known as MSMEs, small and medium businesses (SMBs), or even small and medium enterprises (SMEs), depending on their size, revenue, and location. For this article, let us consider the word SMB, which represents any of these kinds of companies. With his decades of international experience and research studies during his doctorate from the Swiss School of Business and Management in Geneva, Switzerland, Dr. Pawar has invented a new cybersecurity framework popularly known as Business Domain Specific Least Cybersecurity Controls Implementation (BDSLCCI), which is more focused on these kinds of organizations. Apart from continuous research and enhancement in BDSLCCI to make it more beneficial to MSMEs, SecureClaw also provides various cybersecurity services, which include the Virtual Chief Information Security Officer (V-CISO), Source Code Security Review, which is popularly known as static application security testing (SAST), dynamic application security testing (DAST), or vulnerability assessment and penetration testing (VAPT), as a few of its key offerings. These organizations have diverse experience in programming, telecom, and cybersecurity, which makes their expertise unique while designing solutions for their customers.

During international research studies by Dr. Pawar, the top management of SMB companies from 19 different countries participated.

It was evident that there were three major problems faced by those companies.

  • Small and medium-sized companies are not having enough funds or allocated budget for the implementation of hundreds of controls mandated by existing cybersecurity standards.
  • These companies do not have skilled teammates or other resources to implement and maintain cybersecurity controls.
  • Top management is not able to see the return on investment (RoI) for cybersecurity implementation, as the top priorities of such companies are not directly aligned with the recommended controls by existing cybersecurity standards or frameworks.

Dr. Pawar's research reveals that each SMB has a unique business domain and mission-critical asset (MCA) based on their sector. MCAs, such as data, information, or infrastructure, are crucial for a SMB's core business. For instance, healthcare MCAs might be Electronic Medical Record (EMR) software, while banking, financial services, and insurance (BSFI) MCAs might be financial records. MCAs can be information-related or even business function-related.

MCAs weigh confidentiality, integrity, and availability differently, and SMBs need cybersecurity controls. Defense in Depth (DiD) strategy addresses people, process, and technology. BDSLCCI framework provides recommendations for implementing DiD controls in parallel with MCA, designed by Dr. Pawar.

There are multiple ways to get BDSLCCI certification.

  • SMB can self-assist by directly registering itself on the BDSLCCI web portal. The BDSLCCI web portal provides secured access to various data points and guidance provided by the logic of the BDSLCCI framework.
  • SMB can identify a BDSLCCI member company, which is a certification body of BDSLCCI, authorized to provide BDSLCCI certificates as one of its services.
  • SMB can even hire BDSLCCI-authorized freelancers who can assist them in their BDSLCCI certification journey, where the final audit will be done by SecureClaw and the BDSLCCI certification and transcript will be issued by SecureClaw.

The BDSLCCI offers certifications and assessments at three different levels. On the incremental order of control implementation, SMB can be more cybersecure while reaching BDSLCCI Level 3.

Any startup, even one employee company, or any medium-scale company with hundreds of employees can get a customized or tailored cybersecurity controls list using BDSLCCI. It offers an ascending order of controls, aiding top management in decision-making. In situations where organizations need to take the Data Privacy and Protection Acts of their nation seriously to avoid high penalties if a data breach happens, or even to avail of cyber insurance, or to simply have better confidence in their way of working and handling customers’ critical assets, selecting SecureClaw’s BDSLCCI will be a very good choice. SecureClaw has been deployed in many SMBs/ SMEs/ MSMEs and has received good market feedback.

previous button icon Previous Post
Next Post next button icon