Cyber Law Academy
Part 13.4

VPN and Cloud Regulations

"New Compliance Landscape for Digital Services"

VPN service provider obligations, KYC requirements, 5-year data retention, cloud service agreements, data localization, and third-party risk management.

4.1

VPN Provider Obligations under CERT-In 2022

VPN Service Providers - Who is Covered?

Covered Entities:

1. Virtual Private Network (VPN) service providers

2. Virtual Private Server (VPS) providers

3. Cloud Service Providers

4. Data Centre service providers

Note: Enterprise/Corporate VPNs used internally are NOT covered by these provisions (exemption for own use).

4.2

KYC Requirements - Detailed Breakdown

Information RequiredIndividual UsersBusiness Users
NameFull legal name (validated)Company name + Authorized person
AddressValidated residential addressRegistered office + Branch address
ContactMobile number (verified)Official contact + Authorized person mobile
EmailEmail at time of registrationOfficial email + Personal email of contact
IP AddressIP at registration timeIP at registration time
IPs AllottedAll IPs assigned during subscriptionAll IPs assigned to the organization
PurposeStated purpose of hiring servicesBusiness use case description
OwnershipSelf-declarationDirectors/Partners/Shareholders details
Retention5 years after cancellation5 years after cancellation
Validation Methods

For Individuals:

- Aadhaar-based eKYC (recommended)

- Video KYC with ID verification

- In-person verification with documents

For Businesses:

- GST registration verification

- MCA (Company/LLP registration) verification

- Authorized signatory verification via KYC

4.3

Cloud Service Compliance

Cloud Service Provider Obligations

CERT-In Requirements:

1. Maintain customer/subscriber KYC records (5 years)

2. Maintain logs of cloud infrastructure (180 days)

3. Report incidents within 6 hours

4. Designate Point of Contact

5. Enable NTP synchronization (Indian Standard Time)

Additional Considerations:

6. Data localization requirements (sector-specific)

7. Encryption standards

8. Access controls and audit trails

SectorData Localization RequirementRegulator
Payment DataMust be stored in India (RBI 2018)RBI
Insurance DataCritical data in India (IRDAI guidelines)IRDAI
Telecom DataCustomer data in India (License conditions)DoT
Government DataMust be in India (GI Cloud/MeghRaj)MeitY
HealthcarePatient records preferably in IndiaABDM Guidelines
DPDPA (All)Blacklist approach - restricted countries onlyDPB (Future)
4.4

Cloud Service Agreements - Key Clauses

Essential Clauses for CERT-In Compliance

1. Data Location Clause:

- Specify data storage locations

- Ensure India jurisdiction access for logs

2. Security Standards Clause:

- Encryption at rest and in transit

- Access control mechanisms

- Security certifications (ISO 27001, SOC 2)

3. Incident Response Clause:

- Provider must notify customer within specified time (less than 6 hours)

- Support for CERT-In reporting obligations

- Evidence preservation support

4. Audit Rights Clause:

- Customer right to audit or obtain audit reports

- Third-party audit access

5. Data Retention/Deletion Clause:

- Clear data deletion procedures

- Certificate of deletion

- Compliance with 180-day log retention

Third-Party Risk Management

Due Diligence Checklist:

1. Security certifications and compliance status

2. Data center locations and jurisdiction

3. Sub-contractor/sub-processor policies

4. Incident history and response capabilities

5. Business continuity and disaster recovery

6. Insurance coverage

7. Exit strategy and data portability

4.5

Maharashtra Context - Cloud and VPN Usage

Maharashtra IT Industry Implications

IT/ITES Companies (Pune, Mumbai, Nagpur):

- Using international cloud services? Ensure logs accessible in India

- Client data processing? Check sector-specific localization rules

- Remote workforce using VPN? Enterprise VPN exempt but ensure security

Startups:

- Cost considerations for compliance vs. cloud convenience

- MeitY empaneled cloud providers (GI Cloud) may simplify compliance

E-commerce (Mumbai/Pune):

- Payment data must be in India (RBI mandate)

- Customer data subject to CERT-In + DPDPA obligations

Key Points - Part 13.4