Unraveling blind spots in financial data sharing: User perception vs reality

Unraveling blind spots in financial data sharing: User perception vs reality

Unraveling blind spots in financial data sharing: User perception vs reality

Uncovering privacy gaps
& vulnerabilities in collaboration

Uncovering privacy gaps
& vulnerabilities in collaboration

Uncovering privacy gaps
& vulnerabilities in collaboration

OVERVIEW

In the digital age, data sharing has emerged as a cornerstone of modern financial ecosystems, enabling a myriad of benefits for consumers, businesses, and regulatory bodies.

As financial transactions and interactions increasingly occur online, the ability to share data seamlessly and securely becomes paramount. Data sharing facilitates enhanced risk management, personalized financial services, and robust fraud detection mechanisms, contributing to a more transparent and efficient financial landscape.

The digitization of financial services has democratized access to financial data, empowering consumers with greater control over their financial information. This transparency fosters trust and enables consumers to make informed financial decisions, ultimately promoting financial literacy and inclusion. Furthermore, data sharing drives innovation by allowing fintech companies to leverage comprehensive datasets to develop innovative products and services tailored to the unique needs of different consumer segments.

The Indian financial sector is on a transformative journey. Technological advancements are reshaping how financial institutions operate, and data is at the heart of this revolution. By leveraging user data, institutions can personalize services, assess risk profiles more accurately, and offer innovative financial products.

This data-driven approach hinges on a critical factor – user trust

In a landscape where financial information is highly sensitive, striking a balance between data utility and user privacy becomes paramount.

This report delves into the user experience with data sharing practices employed by Indian financial institutions. Drawing on a user survey conducted by Silence Laboratories, the report explores the delicate interplay between transparency, control, and user comfort with data sharing. It sheds light on the current state of affairs, unveils user expectations, and proposes solutions to bridge the gap between what is being communicated and how users perceive their control over their financial data.

REPORT HIGHLIGHTS

In India, privacy challenges are complex due to multiple reasons.

LOW LITERACY

45th

45th

45th

in Cyber Risk Literacy Index

Low Awareness

Low Awareness

Low Awareness

States with lower Foundational Literacy Scores
have higher cybercrimes
REGULATORY LAG
Cybersecurity regulatory frameworks falls 40.5x behind high-tech innovators infra
INEFFECTIVE CONSENT
Low clarity & control over granular aspects of data sharing terms
Lack of transparency and auditability

All of these problems create a false sense of safety & comfort

High trust in financial institutions and consent based data sharing
Poor risk perception and enhanced
vulnerabilities
Gap between the perceived privacy levels and on ground reality

There is no one stop solution to address the complex privacy challenges.

EDUCATION
Efforts to educate & inform customers about their rights & resources will play a huge role in addressing privacy challenges. However, this requires a long-term timeline to see noticeable impact.

PLACING TRUST IN TECH OVER LEGAL CONTRACTS

Preventing movement or exposure of data and collaborating on inferences to build a foolproof infrastructure that eliminates any risk of misuse or breaches.
Transparency, programmability and auditability to bind data processing with policy, governance and consent.

SURVEY OVERVIEW

The opacity surrounding data collection practices, the lack of user control over how their data is used, and the potential for misuse all contribute to a growing sense of unease amongst users.

Quest for Transparency and Control

The user survey exposes deficiencies in the current state of data sharing practices of Indian financial institutions. While a significant portion of users (80.4%) believe institutions are transparent regarding data sharing, there is a crucial disconnect.

6 terms of data sharing

Purpose of data collection
Duration of data storage
Frequency of data access (or refresh)
Specific data points collected Services
Parties with whom data might be shared
Loan Offerings
Options for revoking consent

100%

90%

80%

70%

60%

50%

40%

30%

20%

10%

0%

Do financial institutions provide clear information
about overall terms of data sharing?

Number of terms of data sharing

users were clearly communicated

Overall clarity of data

sharing terms

1

2

3

4

5

6

NO

19.6%

YES

80.4%

21.4%

14.6%

28.5%

14.6%

8.9%

7.6%

25.9%

16.4%

28.5%

14.6%

8.9%

7.6%

25.9%

14.6%

25.2%

14.6%

8.9%

7.6%

25.9%

14.6%

28.5%

17.0%

8.9%

7.6%

25.9%

14.6%

28.5%

14.6%

7.4%

7.6%

25.9%

14.6%

28.5%

14.6%

8.9%

11.0%

100%

90%

80%

70%

60%

50%

40%

30%

20%

10%

0%

Do financial institutions provide clear information
about overall terms of data sharing?

Number of terms of data sharing

users were clearly communicated

Overall clarity of data

sharing terms

1

2

3

4

5

6

NO

19.6%

YES

80.4%

21.4%

14.6%

28.5%

14.6%

8.9%

7.6%

25.9%

16.4%

28.5%

14.6%

8.9%

7.6%

25.9%

14.6%

25.2%

14.6%

8.9%

7.6%

25.9%

14.6%

28.5%

17.0%

8.9%

7.6%

25.9%

14.6%

28.5%

14.6%

7.4%

7.6%

25.9%

14.6%

28.5%

14.6%

8.9%

11.0%

100%

90%

80%

70%

60%

50%

40%

30%

20%

10%

0%

Do financial institutions provide clear information
about overall terms of data sharing?

Number of terms of data sharing

users were clearly communicated

Overall clarity of data

sharing terms

1

2

3

4

5

6

NO

19.6%

YES

80.4%

21.4%

14.6%

28.5%

14.6%

8.9%

7.6%

25.9%

16.4%

28.5%

14.6%

8.9%

7.6%

25.9%

14.6%

25.2%

14.6%

8.9%

7.6%

25.9%

14.6%

28.5%

17.0%

8.9%

7.6%

25.9%

14.6%

28.5%

14.6%

7.4%

7.6%

25.9%

14.6%

28.5%

14.6%

8.9%

11.0%

While most users do not seem to be alarmed by such deficiencies, implementing better controls would lead to higher user satisfaction. A resounding 86.7% of users express a desire for granular control over data sharing, split roughly equally between document level control & data point level control. This disconnect between the desired level of control and the current reality is a cause for concern.

Document level control: Willingness to select the document type (for example - bank statements, Investment statements etc.) to be shared

Datapoint level control: Willingness to share specific elements within a document (such as total balances/credits/debits)

What % of users want what specific
qualities of control over data they share?

Full granularity
Selective sharing
All or nothing
Unsure

5.1%

Unsure:

Depends on the data

and its intended use

8.2%

All or nothing:

Don’t mind sharing

everything

46.6%

Selective sharing:

Document level control

40.1%

Full granularity:

Ability to choose exact data points

What % of users want what specific
qualities of control over data they share?

Full granularity
Selective sharing
All or nothing
Unsure

5.1%

Unsure:

Depends on the data

and its intended use

8.2%

All or nothing:

Don’t mind sharing

everything

46.6%

Selective sharing:

Document level control

40.1%

Full granularity:

Ability to choose exact data points

What % of users want what specific
qualities of control over data they share?

Full granularity
Selective sharing
All or nothing
Unsure

5.1%

Unsure:

Depends on the data

and its intended use

8.2%

All or nothing:

Don’t mind sharing

everything

46.6%

Selective sharing:

Document level control

40.1%

Full granularity:

Ability to choose exact data points

16 out of 20 people (80.4%) think that institutions are transparent about data sharing.

Only 1 out of 20 people (6.6%) actually have control over all aspects of data sharing.

The Comfort Spectrum: Privacy vs. Benefits

The user survey reveals a fascinating spectrum of comfort levels regarding data privacy, with a majority of users being open to sharing data in some way or the other.

5 out of 10 people consider Assurance factors rather than Convenience & other factors to be the primary motivator in exploring Indian fintech.

5 out of 10 people consider Assurance factors rather than Convenience & other factors to be the primary motivator in exploring Indian fintech.

5 out of 10 people consider Assurance factors rather than Convenience & other factors to be the primary motivator in exploring Indian fintech.

Users value clear benefits and are more likely to share data if they understand how it translates to demonstrably improved financial products and services. This finding suggests a potential path forward – a future where informed users are empowered to make conscious choices about their data in exchange for demonstrably valuable services.

Building Trust Through Informed Consent

The report underscores the critical role of user consent in building trust.

ASSURANCE IN CONSENT MECHANISMS

70.5%

70.5% users are assured of their privacy if sharing data via formal consent mechanisms

While some progress has been made in terms of transparency around data sharing, there's a significant gap between what users are told and the control they feel they have over their data. This disconnect, coupled with user concerns about privacy and data minimization, necessitates a paradigm shift in how Indian financial institutions approach data sharing.

When users understand how their data is being used and have a choice in the matter, they feel more secure about their privacy.

CONTEXT

Global data regulations are converging on key principles like user consent, data security, and subject rights, while diverging on specifics like localization and exemptions.

At the same time, open banking is driving financial innovation worldwide.

Overview of Global Regulatory Context

Various countries & regions have implemented regulations aimed at protecting user data & fostering trust in the digital ecosystem, all of which comply with a core set of values.

Lawfulness, fairness, & transparency

Purpose limitation

Data minimization

Accuracy

Storage limitation

Integrity and confidentiality

Accountability

Singapore

The Personal Data Protection Act (PDPA)

CA, USA

California Consumer Privacy Act (CCPA)

China

Personal Information Protection Law (PIPL)

India

Digital Personal Data Protection Act (DPDA)

European Union

General Data Protection Regulation (GDPR)

Brazil

Brazil's General Data Protection Law (LGPD)

Japan

The Act on the Protection of Personal Information Act Amendment (APPI)

2013

2018

2020

2020

2021

2022

2023

Singapore

The Personal Data Protection Act (PDPA)

CA, USA

California Consumer Privacy Act (CCPA)

China

Personal Information Protection Law (PIPL)

India

Digital Personal Data Protection Act (DPDA)

European Union

General Data Protection Regulation (GDPR)

Brazil

Brazil's General Data Protection Law (LGPD)

Japan

The Act on the Protection of Personal Information Act Amendment (APPI)

2013

2018

2020

2020

2021

2022

2023

Singapore

The Personal Data Protection Act (PDPA)

CA, USA

California Consumer Privacy Act (CCPA)

China

Personal Information Protection Law (PIPL)

India

Digital Personal Data Protection Act (DPDA)

European Union

General Data Protection Regulation (GDPR)

Brazil

Brazil's General Data Protection Law (LGPD)

Japan

The Act on the Protection of Personal Information Act Amendment (APPI)

2013

2018

2020

2020

2021

2022

2023

KEY SIMILARITIES

KEY DIFFERENCES

User Consent

Most regulations emphasize user consent for data collection and processing. This empowers individuals to decide how their data is used.

Data Security

Regulations mandate organizations to implement appropriate technical and organizational measures to safeguard personal data from unauthorized access.

Data Subject Rights

Individuals often have rights to access their data, request rectification of errors, and demand erasure in certain cases.

KEY SIMILARITIES

KEY DIFFERENCES

User Consent

Most regulations emphasize user consent for data collection and processing. This empowers individuals to decide how their data is used.

Data Security

Regulations mandate organizations to implement appropriate technical and organizational measures to safeguard personal data from unauthorized access.

Data Subject Rights

Individuals often have rights to access their data, request rectification of errors, and demand erasure in certain cases.

KEY SIMILARITIES

KEY DIFFERENCES

User Consent

Most regulations emphasize user consent for data collection and processing. This empowers individuals to decide how their data is used.

Data Security

Regulations mandate organizations to implement appropriate technical and organizational measures to safeguard personal data from unauthorized access.

Data Subject Rights

Individuals often have rights to access their data, request rectification of errors, and demand erasure in certain cases.

Overview of Regulatory Milestones in India

An overview of the key steps leading up to the DPDPA

The Information

Technology Act

The Information

Technology Act (Amendment)

Justice K.S. Puttaswamy (Retd.) and Anr. v. Union of India and Ors

The Right to

Information Act

The Aadhaar

Act

Digital Personal Data Protection Act

2000

2005

2008

2016

2017

2023

The Information

Technology Act

The Information

Technology Act (Amendment)

Justice K.S. Puttaswamy (Retd.) and Anr. v. Union of India and Ors

The Right to

Information Act

The Aadhaar

Act

Digital Personal Data Protection Act

2000

2005

2008

2016

2017

2023

The Information

Technology Act

The Information

Technology Act (Amendment)

Justice K.S. Puttaswamy (Retd.) and Anr. v. Union of India and Ors

The Right to

Information Act

The Aadhaar

Act

Digital Personal Data Protection Act

2000

2005

2008

2016

2017

2023

Key Opportunities and Challenges Presented by the Digital Personal Data Protection Act of 2023

India's digital data landscape is undergoing a significant transformation with the recent introduction of the Digital Personal Data Protection Act (DPDPA) of 2023. This legislation aims to establish a framework for handling digital personal data, including user data shared for financial purposes.

The DPDPA enforces stricter user consent for data processing. Financial institutions that rely on user data for credit scoring, fraud prevention, or personalized financial products will need to obtain clear, verifiable consent from users before collecting or processing their data. This empowers users with greater control over their financial information and fosters trust within the financial ecosystem.

However, the DPDPA's approach
to consent
has limitations.
However, the DPDPA's approach to consent has limitations.
Lacks explicit definition of meaningful consent

Vague or pre-checked consent boxes could still disadvantage users, potentially hindering their ability to make informed choices about data sharing.

Lacks transparency for international transfers

The DPDPA loosens restrictions on transferring data to certain government-approved countries. The criteria for approval however remains undisclosed by the Data Protection Board.

Prioritizes user control over security measures

Even with user consent, data breaches can still occur if information security practices by financial institutions remain weak.

Only regulates digitally collected information

Personal information is often collected through physical forms or interactions. Without clear guidelines for offline data, effectiveness across touchpoints remains limited.

Exemptions for government agencies

Exemptions can potentially be misused to access user data without proper oversight. This lack of transparency discourages users from sharing financial information electronically.

Evolution of Data Sharing Practices

Historically, data sharing was limited to within individual institutions or between regulated entities for specific purposes like creditworthiness assessments.

The introduction of regulations like EU's PSD2, UK's open banking initiative and RBI’s Account Aggregator Framework in India enabled data sharing through standardized APIs.

The development of global frameworks and technologies has further standardized and broadened data sharing practices.

Why is Data Sharing important?

Data sharing enhances transparency and trust among consumers and financial institutions, facilitating better financial decision-making.

It supports financial inclusion by enabling access to credit for underserved populations, boosting economic growth, and reducing poverty levels.

Facilitates innovation in financial products and services by allowing fintech companies to leverage data for developing customized solutions.

Current Landscape of Financial Data Sharing

Open Banking

Open banking refers to the practice of allowing third-party financial service providers access to consumer banking, transaction, and other financial data through APIs.

Open Finance

Open finance expands this concept to include a wider range of financial products beyond banking, such as investments, pensions, and insurance.

Open Data

Rest of the data, Retail, transit, social media, health.

Interests and Motivation for Data Sharing

Has your country considered data sharing
as a part of its open finance initiatives?

Already in place
Within 3 years
Not being considered
Regulation in place

50%

13%

12%

25%

Has your country considered data sharing
as a part of its open finance initiatives?

Already in place
Within 3 years
Not being considered
Regulation in place

50%

13%

12%

25%

Has your country considered data sharing
as a part of its open finance initiatives?

Already in place
Within 3 years
Not being considered
Regulation in place

50%

13%

12%

25%

What would be the key drivers for
data sharing adoption/implementation?

Increase efficiency
Promote competition
Regulation of access to user data
Financial Inclusion
Other

Number of participants

1

2

3

4

5

6

7

What would be the key drivers for
data sharing adoption/implementation?

Increase efficiency
Promote competition
Regulation of access to user data
Financial Inclusion
Other

Number of participants

1

2

3

4

5

6

7

What would be the key drivers for
data sharing adoption/implementation?

Increase efficiency
Promote competition
Regulation of access to user data
Financial Inclusion
Other

Number of participants

1

2

3

4

5

6

7

Global Adoption of Open Banking/Open Finance

Market Driven
Regulatory led
Regulatory led,
forthcoming.
Market Driven
Regulatory led
Regulatory led,
forthcoming.
Market Driven
Regulatory led
Regulatory led,
forthcoming.

SOURCE: Basel Commitee Member Survey (BCBS), 2024

Comparison among country profiles

KEY MOTIVATION

KEY MOTIVATION

REGIME

REGIME

MODEL OF PROVISION

MODEL OF PROVISION

API FRAMEWORK

API FRAMEWORK

Australia

Promoting competition & innovation

KEY MOTIVATON

Promoting competition & innovation

Regulator driven

REGIME

Centralised through NPP

MODEL OF PROVISION

Decentralised

Multilateral

Voluntary use

API FRAMEWORK

Brazil

Financial Inclusion

KEY MOTIVATON

Promoting competition & innovation

Regulator driven

REGIME

Centralised through Pix

MODEL OF PROVISION

Decentralised

Multilateral

Mandatory use

API FRAMEWORK

India

Financial Inclusion

KEY MOTIVATON

Digitization

KEY MOTIVATON

Promoting competition & innovation

Hybrid

REGIME

Centralised through UPI

MODEL OF PROVISION

Centralised

Multilateral

Voluntary use with strong encouragement

API FRAMEWORK

Mexico

Financial Inclusion

KEY MOTIVATON

Promoting competition & innovation

Regulator driven

REGIME

In development

Likely to be centralised through SPEI

Likely to be centralised through SPEI

MODEL OF PROVISION

In development

May involve a centralised API hub

API FRAMEWORK

Open banking opens competition

Specialist providers are challenging the service of large banks in core areas such as payments, personal banking, & even business banking.

UNBUNDLING OF PERSONAL BANKING

UNBUNDLING OF BUSINESS BANKING

Due to ease of data & context sharing, providers are able to collaborate and build bigger partnerships.

PARTNERSHIPS

Fintech product offerings have also expanded over time, with open banking allowing providers to offer more personalised services.

Lending
Debit Cards
Checking Accounts
Business Services
Stock Trading
Loan Offerings
Small Business Lending
Credit Monitoring

Authentication based on a redirection flow

Process Mechanism through which financial data is shared

Merchant App

Choosing a payment method


Merchant App

Consent

Pix Authentication

Authentication

Merchant App

Choosing a payment method


Authentication based on a redirection flow

Process Mechanism through which financial data is shared

Merchant App

Choosing a payment method


Authentication based on a redirection flow

Process Mechanism through which financial data is shared

Merchant App

Choosing a payment method


Financial Inclusion

Through data sharing enabled by open banking systems, number of mobile money accounts has seen a meteoric growth propelling financial inclusion.

2001

17 years

to onboard the
first 1B users

2017

Only 5 years

Only 5 years

Only 5 years

to onboard the next 1B users

to onboard the next 1B users

to onboard the next 1B users

2022

Types of consent mechanisms

When analyzing user data sharing practices, it's essential to understand the various types of consent mechanisms available in the market. These mechanisms form the foundation of how data sharing occurs, providing context on the methods used to obtain user consent and the extent of user awareness and control.

HISTORICAL CONTEXT

Consent management initially focused on healthcare, enabling patients to control access to their protected health information (PHI) and affirm participation in e-health initiatives.

EVOLUTION AND BROADER APPLICATION

With the advent of GDPR, consent management expanded to include private information access by various providers (e.g., online advertisers), reflecting similar consent mechanisms in both healthcare and the broader digital landscape as the same logical imperatives were relevant in the digital realm. 

Frequency of Usage

Consent Mechanisms

Consent Mechanisms

Details

Details

Frequently

USAGE

Opt-in

Informed

Layered

Explicit

MECHANISMS

These consent mechanisms are highly prevalent, especially in regions with stringent data privacy regulations and industries handling sensitive information, such as finance and healthcare.

DETAILS

Moderately

USAGE

Opt-out

Revocable

Implied

MECHANISMS

These mechanisms are commonly used where explicit consent is less practical or where the focus is on maximizing user participation without overwhelming them with too many choices.

DETAILS

Rarely

USAGE

Broad

Granular

MECHANISMS

Broad consent is less common, typically seen in research settings where the future use of data may not be fully determined at the time of collection. It is less favored in commercial settings.

Granular consent although is favourable for end users is not a widely used consent mechanism by the Industry

Granular consent although is favourable for end users is not a widely used consent mechanism by the Industry

DETAILS

Granular consent although is favourable for end users is not a widely used consent mechanism by the Industry

While consent lies at the heart of privacy regulations, the report explores the effectiveness of such mechanisms in delivering what they promise, and the need to redesign consent from a privacy perspective

SURVEY FINDINGS

This section presents the key findings of the research survey investigating user perceptions of data sharing practices employed by Indian financial institutions. The analysis is based on data collected from a sample of 1,520 respondents, adhering to the outlined methodology and focusing on the research objectives:

1

Assess user clarity and understanding of data collection practices in the Indian financial sector.

2

Evaluate user comfort levels with the types of data financial institutions collect and how it is used.

3

Analyze user preferences regarding control over data sharing, including consent mechanisms.

4

Investigate the relationship between user trust in financial institutions and their willingness to share data.

User Clarity and Understanding

Overall Clarity: While a significant portion of users (80.4%) reported feeling somewhat or very clear about the general terms of data sharing by financial institutions, the survey revealed a concerning gap in specific details.

Limited Transparency: While 69.7% respondents were clearly communicated the purpose of data collection, other crucial aspects such as the option to revoke the consent were cited as the least clear terms while giving consent to share their data.

Satisfaction: Even though the users initially felt informed about data sharing terms, deep diving into the specifics potentially puts things in perspective, and when later asked about the clarity and transparency of the consent experience, only 67.2% felt satisfied with the process.

What specific parameters of consent were you clearly able to find & understand?

What specific parameters of consent did you find in the consent notice?

70.00%

60.00%

50.00%

40.00%

30.00%

20.00%

10.00%

0.00%

Purpose of data collection

Duration of data storage

Specific data points collected

Parties with whom data might be shared

Frequency of data access (refresh)

Options for revoking consent

None of the above

69.7%

48.9%

53.6%

45.3%

42.5%

26.0%

2.8%

What specific parameters of consent did you find in the consent notice?

70.00%

60.00%

50.00%

40.00%

30.00%

20.00%

10.00%

0.00%

Purpose of data collection

Duration of data storage

Specific data points collected

Parties with whom data might be shared

Frequency of data access (refresh)

Options for revoking consent

None of the above

69.7%

48.9%

53.6%

45.3%

42.5%

26.0%

2.8%

What specific parameters of consent did you find in the consent notice?

70.00%

60.00%

50.00%

40.00%

30.00%

20.00%

10.00%

0.00%

Purpose of data collection

Duration of data storage

Specific data points collected

Parties with whom data might be shared

Frequency of data access (refresh)

Options for revoking consent

None of the above

69.7%

48.9%

53.6%

45.3%

42.5%

26.0%

2.8%

Takeaways

These findings highlight a need for financial institutions to move beyond generic consent forms and prioritize clear communication about specific data practices. Customers need to be made aware of their rights, and consent requests should include all the key terms of data fetch in an easy to read format.

Furthermore, just as important as clear communication is the timing and placement of the consent terms, for example - even though a consent revocation would happen at a later stage, communicating the option to revoke while giving the consent makes the customers aware of their rights.

User Comfort Levels with Data Sharing

Spectrum of Comfort: The survey revealed a fascinating range of user comfort levels with data sharing. While a significant segment (38.8%) prioritized data minimization and only shared the absolute essentials ("Minimalists"), another sizeable group (42.0%) emerged as "Conditional Sharers," open to sharing some data for demonstrably personalized benefits.

Concerns Regarding Data Collection:

73.5%

users felt financial institutions collect more data than demonstrably needed, raising concerns about data minimization practices. Furthermore, the concerns could be heightened by the lack of awareness of the organisations who get access to customer’s data.

52.9%

customers think account aggregators/consent managers too have access to their financial data, whereas account aggregators are inherently data blind. While customers might trust traditional banking institutions, lack of awareness about who accesses the data and limited trust in newer fintechs or NBFCs may lead to customer concerns.

Privacy vs. Benefits Trade-off: Interestingly, despite privacy concerns, a majority (65.7%) were willing to share data for clear and demonstrably valuable benefits, highlighting the potential for user-centric data sharing models.

Spectrum of comfort regarding data privacy

8.0%

Indifferent

Unconcerned about data sharing, regardless of potential benefits

11.2%

Risk Averse

Hesitant to share any data,

even letting go of benefits

38.8%

Minimalists

Values complete privacy

and is hesitant to share any financial data unless

absolutely necessary

42.0%

Conditional sharers

Open to sharing some data,

but only for clear and demonstrably personalized benefits

8.0%

Indifferent

Unconcerned about data sharing, regardless of potential benefits

11.2%

Risk Averse

Hesitant to share any data,

even letting go of benefits

38.8%

Minimalists

Values complete privacy

and is hesitant to share any financial data unless

absolutely necessary

42.0%

Conditional sharers

Open to sharing some data,

but only for clear and demonstrably personalized benefits

8.0%

Indifferent

Unconcerned about data sharing, regardless of potential benefits

11.2%

Risk Averse

Hesitant to share any data,

even letting go of benefits

38.8%

Minimalists

Values complete privacy

and is hesitant to share any financial data unless

absolutely necessary

42.0%

Conditional sharers

Open to sharing some data,

but only for clear and demonstrably personalized benefits

User Preferences for Control Mechanisms

Limited Control Over Existing Data: Similar to the trends in clarity of terms of data sharing, users generally find themselves unable to control some of them, with <45% of them being able to modify the frequency of data access, parties who get access to this data and options for revoking consent.

70%

60%

50%

40%

30%

20%

10%

0%

Purpose of data collection

Specific data points collected

Duration of data storage

Parties with whom data might be shared

Frequency of data access (refresh)

Options for revoking consent

None of the above

51.1%

45.6%

45.9%

41.6%

39.3%

23.7%

4.6%

Which aspects of data sharing were you able to control?

70%

60%

50%

40%

30%

20%

10%

0%

Purpose of data collection

Specific data points collected

Duration of data storage

Parties with whom data might be shared

Frequency of data access (refresh)

Options for revoking consent

None of the above

51.1%

45.6%

45.9%

41.6%

39.3%

23.7%

4.6%

Which aspects of data sharing were you able to control?

70%

60%

50%

40%

30%

20%

10%

0%

Purpose of data collection

Specific data points collected

Duration of data storage

Parties with whom data might be shared

Frequency of data access (refresh)

Options for revoking consent

None of the above

51.1%

45.6%

45.9%

41.6%

39.3%

23.7%

4.6%

Which aspects of data sharing were you able to control?

Desire for Granular Control: In terms of the specificity of the data that is shared with a financial institution, a resounding 86.7% of respondents expressed a strong preference for having at least a document level control. Roughly half of these would in fact want to dive a level further deeper to select the specific data fields which they’d want to share with financial institutions. This finding emphasizes the need for financial institutions to design consent forms that offer granular control options.

8.2%

All or nothing

I trust the institution & don’t mind sharing everything for them to choose.

5.1%

Unsure

It depends on the data being shared & its intended use on case to case basis.

How specifically do you want to share your data?

46.6%

Selective sharing

I choose selective docs to share (account statement, credit report)

40.1%

Full granularity

I choose exactly what data points are shared, down to broad data type.

8.2%

All or nothing

I trust the institution & don’t mind sharing everything for them to choose.

5.1%

Unsure

It depends on the data being shared & its intended use on case to case basis.

How specifically do you want to share your data?

46.6%

Selective sharing

I choose selective docs to share (account statement, credit report)

40.1%

Full granularity

I choose exactly what data points are shared, down to broad data type.

8.2%

All or nothing

I trust the institution & don’t mind sharing everything for them to choose.

5.1%

Unsure

It depends on the data being shared & its intended use on case to case basis.

How specifically do you want to share your data?

46.6%

Selective sharing

I choose selective docs to share (account statement, credit report)

40.1%

Full granularity

I choose exactly what data points are shared, down to broad data type.

Level of Satisfaction: When looking at the level of content across different aspects of the consent process, the satisfaction score for the control aspect of consent (68.4%) is rated lower than ease of navigation & trustworthiness / security. This clearly indicates control as a major pain point of the users when navigating the consent journey, and implies customer empowerment via data control as a tool to increase customer satisfaction.

Trust and Willingness to Share Data

The Role of Consent: Users have assurance in sharing their financial data if formal consent mechanisms are used, highlighting the power of informed consent in building trust and empowering users.

Understanding of privacy: Users also seem to associate privacy with security measures and consent mechanisms. When asked about their best understanding of privacy, strong security practices to prevent unauthorized access ranked highest with 29.1% respondents choosing this option, closely followed by clear consent mechanisms (27.0%).

What is your best understanding of privacy?

40%

30%

20%

10%

0%

Security Measures

Financial institutions have strong security measures in place to protect my data from unauthorized access

Clear Consent

Financial institutions must have my clear consent before using my data for any specific purpose

Purpose-bound Usage

Financial institutions must only use my financial data for the specified purpose, & nothing else

Managed Exposure

Who can access my data is entirely under my control, and exposure is minimal

29.1%

27.0%

24.0%

19.9%

40%

30%

20%

10%

0%

Security Measures

Financial institutions have strong security measures in place to protect my data from unauthorized access

Clear Consent

Financial institutions must have my clear consent before using my data for any specific purpose

Purpose-bound Usage

Financial institutions must only use my financial data for the specified purpose, & nothing else

Managed Exposure

Who can access my data is entirely under my control, and exposure is minimal

29.1%

27.0%

24.0%

19.9%

40%

30%

20%

10%

0%

Security Measures

Financial institutions have strong security measures in place to protect my data from unauthorized access

Clear Consent

Financial institutions must have my clear consent before using my data for any specific purpose

Purpose-bound Usage

Financial institutions must only use my financial data for the specified purpose, & nothing else

Managed Exposure

Who can access my data is entirely under my control, and exposure is minimal

29.1%

27.0%

24.0%

19.9%

This misdirected association possibly instills a false sense of assurance when sharing data with proper consent and security practices. However, users need to be made aware that privacy can’t be guaranteed even with the existence of these practices.

Is User Confidence in Data Sharing & Security Justified?

Data Breaches: The Next Big Threat to Business

83%

of organizations faced more than one data breach in 2022

IBM

IBM

13.5%

higher audit fees for breached companies

Yen et. al., Journal of Accounting and Public Policy

Yen et. al., Journal of Accounting and Public Policy

$5.4B

mean market cap loss for publicly traded companies after a data breach

IBM

IBM

$4.35M

Global average cost of a data breach in 2022

IBM

80%

of impacted consumers are likely to stop doing business with a company after a cyberattack

IAPP & Ponemon Institute

IAPP & Ponemon Institute

$9.5Tr

expected losses due to cyber crime in 2024

PwC

PwC

Case Study: Estonia

Estonia faced a major cyberattack in 2007 despite being a leader in digital governance. DDoS attacks targeted critical infrastructure, including banks, government websites, and media outlets. The attacks were largely attributed to Russian cyber forces.

IMPACT

IMPACT

RESPONSE

RESPONSE

Paralyzed digital infrastructure

IMPACT

Catalyzed a shift in cybersecurity posture

RESPONSE

Widespread disruption

IMPACT

Accelerated investments in cybersecurity infrastructure and human capital

RESPONSE

Financial losses

IMPACT

Established the Cyber Emergency Response Team (CERT-EE)

RESPONSE

Reputation damage as a secure digital nation

IMPACT

Enhanced international cooperation

RESPONSE

The cyberattack highlighted the need for robust cybersecurity measures, technology, human capital, and international collaboration, even for digitally advanced nations.

>70%

of users feel secure about sharing data with financial institutions

Silence Laboratories Survey

Silence Laboratories Survey

1.3M+

cyber-attacks reported in the financial sector, with over 7,400 Crore INR in losses

How can user confidence be so high when the actual digital landscape is seeing an alarming rise in risks

UNDERSTANDING THE GAPS

Global Context : Country Wise Cyber Risk Literacy Rankings

Global Context : Country Wise Cyber Risk Literacy Rankings

The first edition of the Index ranks 50 geographies, including the European Union as a population-weighted aggregate of our ranked EU geographies. The Index, developed through consultations with policy, industry, and academic experts, leverages 42 aggregated indicators across 32 objectives that contribute to scoring 9 “pillars” of cyber risk literacy and education.

They in turn fall under five key drivers of cyber risk literacy and education:

Public motivation

Measures the population’s commitment to practicing cybersecurity, including metrics such as the rate of adherence to specific safe cyber practices


Government policy

Evaluates government policies to improve cyber risk literacy and education, including evaluation of metrics that assess the geography’s national cybersecurity strategy.

Educational system

Measures the extent to which cyber risk instruction is encouraged or mandated, includes metrics that assess primary and secondary school curricula;

Labor market

Measures the degree to which employers drive demand for cyber literacy skills, including metrics such as the uptake of cybersecurity-related roles and the number of cybersecurity startups

Population inclusivity

Measures degree of equal access to digital technologies and formal education in a geography, including metrics such as Internet access and school completion rates.

Cyber Risk Literacy and Education Index rankings

Rank

Countries

1

Switzerland

2

Singapore

3

United Kingdom

4

Australia

5

Netherlands

6

Canada

7

Estonia

8

Israel

9

Ireland

10

United States

( 11 - 44 have been skipped to focus on the top 10 and last 6 countries. )

45

India

46

Indonesia

47

Argentina

48

Turkey

49

China

50

South Africa

Public motivation

Government policy

Educational system

Labor market

Population Inclusivity

Rank

Countries

1

Switzerland

2

Singapore

3

United Kingdom

4

Australia

5

Netherlands

6

Canada

7

Estonia

8

Israel

9

Ireland

10

United States

( 11 - 44 have been skipped to focus on the top 10 and last 6 countries. )

45

India

46

Indonesia

47

Argentina

48

Turkey

49

China

50

South Africa

Public motivation

Government policy

Educational system

Labor market

Population Inclusivity

Rank

Countries

1

Switzerland

2

Singapore

3

United Kingdom

4

Australia

5

Netherlands

6

Canada

7

Estonia

8

Israel

9

Ireland

10

United States

( 11 - 44 have been skipped to focus on the top 10 and last 6 countries. )

45

India

46

Indonesia

47

Argentina

48

Turkey

49

China

50

South Africa

Public motivation

Government policy

Educational system

Labor market

Population Inclusivity

Distribution of ranking against overall score

China

200

400

600

800

India

United States

Switzerland

European Union

China

200

400

600

800

India

United States

Switzerland

European Union

China

200

400

600

800

India

United States

Switzerland

European Union

Unveiling Blind Spots in Indian User Awareness:

Perception vs. Reality in Financial Data Sharing





State/UT wise details of Citizen Financial Cyber Fraud Reporting Management System during the period 1.1.2023 to 31.12.2023
This was stated by the Minister of State for Home Affairs, Shri Ajay Kumar Mishra in a written reply to a question in the Lok Sabha. View press release

STATE

NO. OF COMPLAINS

AMOUNT

(Rs. in Crores)

2

Andhra Pradesh

33,507

374.2

3

Arunachal Pradesh

470

7.7

4

Assam

7,621

34.4

5

Bihar

42,029

243.3

7

Chattisgarh

18,147

87.8

9

Delhi

58,748

391.6

10

Goa

1,788

23.2

11

Gujarat

121,701

650.5

12

Haryana

76,736

419.2

13

Himachal Pradesh

5,268

41.2

14

Jammu & Kashmir

1,046

7.9

15

Jharkhand

10,040

67.9

16

Karnataka

64,301

662.1

17

Kerala

23,757

201.8

18

Ladakh

162

1.9

20

Madhya Pradesh

37,435

196.3

21

Maharashtra

125,153

990.7

22

Manipur

339

3.3

23

Meghalaya

654

4.2

24

Mizoram

239

4.8

25

Nagaland

224

1.5

26

Odisha

16,869

79.7

27

Puducherry

1,953

20.2

28

Punjab

19,252

121.8

29

Rajasthan

77,769

353.9

30

Sikkim

292

2.0

31

Tamil Nadu

59,549

661.2

32

Telangana

71,426

759.1

33

Tripura

1,913

9.0

34

Uttarakhand

17,958

68.8

3

Uttar Pradesh

197,547

721.1

36

West Bengal

29,804

247.3

36

Total

1,128,265

7,488.6

STATE

NO. OF COMPLAINS

AMOUNT

(Rs. in Crores)

2

Andhra Pradesh

33,507

374.2

3

Arunachal Pradesh

470

7.7

4

Assam

7,621

34.4

5

Bihar

42,029

243.3

7

Chattisgarh

18,147

87.8

9

Delhi

58,748

391.6

10

Goa

1,788

23.2

11

Gujarat

121,701

650.5

12

Haryana

76,736

419.2

13

Himachal Pradesh

5,268

41.2

14

Jammu & Kashmir

1,046

7.9

15

Jharkhand

10,040

67.9

16

Karnataka

64,301

662.1

17

Kerala

23,757

201.8

18

Ladakh

162

1.9

20

Madhya Pradesh

37,435

196.3

21

Maharashtra

125,153

990.7

22

Manipur

339

3.3

23

Meghalaya

654

4.2

24

Mizoram

239

4.8

25

Nagaland

224

1.5

26

Odisha

16,869

79.7

27

Puducherry

1,953

20.2

28

Punjab

19,252

121.8

29

Rajasthan

77,769

353.9

30

Sikkim

292

2.0

31

Tamil Nadu

59,549

661.2

32

Telangana

71,426

759.1

33

Tripura

1,913

9.0

34

Uttarakhand

17,958

68.8

3

Uttar Pradesh

197,547

721.1

36

West Bengal

29,804

247.3

36

Total

1,128,265

7,488.6

STATE

NO. OF COMPLAINS

AMOUNT

(Rs. in Crores)

2

Andhra Pradesh

33,507

374.2

3

Arunachal Pradesh

470

7.7

4

Assam

7,621

34.4

5

Bihar

42,029

243.3

7

Chattisgarh

18,147

87.8

9

Delhi

58,748

391.6

10

Goa

1,788

23.2

11

Gujarat

121,701

650.5

12

Haryana

76,736

419.2

13

Himachal Pradesh

5,268

41.2

14

Jammu & Kashmir

1,046

7.9

15

Jharkhand

10,040

67.9

16

Karnataka

64,301

662.1

17

Kerala

23,757

201.8

18

Ladakh

162

1.9

20

Madhya Pradesh

37,435

196.3

21

Maharashtra

125,153

990.7

22

Manipur

339

3.3

23

Meghalaya

654

4.2

24

Mizoram

239

4.8

25

Nagaland

224

1.5

26

Odisha

16,869

79.7

27

Puducherry

1,953

20.2

28

Punjab

19,252

121.8

29

Rajasthan

77,769

353.9

30

Sikkim

292

2.0

31

Tamil Nadu

59,549

661.2

32

Telangana

71,426

759.1

33

Tripura

1,913

9.0

34

Uttarakhand

17,958

68.8

3

Uttar Pradesh

197,547

721.1

36

West Bengal

29,804

247.3

36

Total

1,128,265

7,488.6

Inferences from Comparative Study: Survey Insights vs Cybercrime Stats

User Confidence
Rooted in trust built by legacy institutions over time
Based on brand value and perceived reliability of institutions with a long history of customer service
Emerging Issues
Increasing incidents of cyber financial crimes
Trust may be misplaced or overly optimistic
Users remain unaware of contemporary risks despite digital growth benefits
Necessary Actions
Identify and address factors contributing to the disparity between perception and reality
Enhance user awareness
Improve institutional accountability

Understanding the Factors Contributing to Low Cyber Risk Literacy in India

Understanding the Factors Contributing to Low Cyber Risk Literacy in India

Cyber Risk Literacy and Cyber Risk Awareness Across India: A Comparative Analysis of FLN Scores and Reported Cyber financial Crimes

In this section, we will explore how consumer perception and awareness, correlated with foundational literacy scores, demonstrate that higher literacy reduces vulnerability to cybercrime.They in turn fall under five key drivers of cyber risk literacy and education:

Why FLN Scores?

Public Motivation & Education System

Cyber risk literacy is deeply tied to public motivation and the education system.

A strong foundational literacy and numeracy (FLN) foundation equips individuals with the critical thinking skills needed to navigate cyber risks.

Prioritizing Education Systems

Countries that prioritize quantitative topics in their education systems tend to have higher cyber risk literacy.

Oliver Wyman Forum findings indicate that effective cyber risk education is rooted in strong foundational literacy

Weightage and Influence

Public Motivation (30%), Educational System (20%), and Government Policy (25%) cumulatively contribute to 75% of the overall index score.

The insights in Oliver Wyman Report indicate that Strong policy-driven education systems improve public motivation with respect to navigating cyber security risks.

Therefore, using FLN scores as a proxy for cyber risk literacy in the Indian Context is justified by the strong link between foundational education and cyber risk understanding.

Category wise ranking - Index on Foundational Literacy and Numeracy

Tap on a state to see details.

DELHI

LADAKH

J&K

HIMACHAL PRADESH

PUNJAB

UTTARAKHAND

HARYANA

RAJASTHAN

GUJARAT

MAHARASHTRA

GOA

KARNATAKA

KERALA

TAMIL NADU

TELANGANA

ODISHA

CHATTISGARH

BIHAR

SIKKIM

ARUNACHAL PRADESH

MANIPUR

NAGALAND

MIZORAM

MEGHALAYA

ASSAM

TRIPURA

WEST BENGAL

JHARKHAND

ANDHRA PRADESH

MADHYA PRADESH

UTTAR PRADESH

Delhi

COMPLAINS

58,748

RANK

9

FLN SCORE

50.74

RANK

13

DELHI

LADAKH

J&K

HIMACHAL PRADESH

PUNJAB

UTTARAKHAND

HARYANA

RAJASTHAN

GUJARAT

MAHARASHTRA

GOA

KARNATAKA

KERALA

TAMIL NADU

TELANGANA

ODISHA

CHATTISGARH

BIHAR

SIKKIM

ARUNACHAL PRADESH

MANIPUR

NAGALAND

MIZORAM

MEGHALAYA

ASSAM

TRIPURA

WEST BENGAL

JHARKHAND

ANDHRA PRADESH

MADHYA PRADESH

UTTAR PRADESH

Delhi

COMPLAINS

58,748

RANK

9

FLN SCORE

50.74

RANK

13

DELHI

LADAKH

J&K

HIMACHAL PRADESH

PUNJAB

UTTARAKHAND

HARYANA

RAJASTHAN

GUJARAT

MAHARASHTRA

GOA

KARNATAKA

KERALA

TAMIL NADU

TELANGANA

ODISHA

CHATTISGARH

BIHAR

SIKKIM

ARUNACHAL PRADESH

MANIPUR

NAGALAND

MIZORAM

MEGHALAYA

ASSAM

TRIPURA

WEST BENGAL

JHARKHAND

ANDHRA PRADESH

MADHYA PRADESH

UTTAR PRADESH

Delhi

COMPLAINS

58,748

RANK

9

FLN SCORE

50.74

RANK

13
Rajasthan

COMPLAINS

77,769

RANK

4

FLN SCORE

47.02

RANK

19

DELHI

LADAKH

J&K

HIMACHAL PRADESH

PUNJAB

UTTARAKHAND

HARYANA

RAJASTHAN

GUJARAT

MAHARASHTRA

GOA

KARNATAKA

KERALA

TAMIL NADU

TELANGANA

ODISHA

CHATTISGARH

BIHAR

SIKKIM

ARUNACHAL PRADESH

MANIPUR

NAGALAND

MIZORAM

MEGHALAYA

ASSAM

TRIPURA

WEST BENGAL

JHARKHAND

ANDHRA PRADESH

MADHYA PRADESH

UTTAR PRADESH

Key Findings:

Bihar & Uttar Pradesh have low FLN scores.

BIHAR

36.81

UTTAR PRADESH

38.46

TOTAL COMPLAINTS

239,576

AVERAGE COMPLAINTS

119,788

TOTAL AMOUNT

Rs 964.35 Crores

These states have the lowest FLN scores and report the highest number of cyber financial complaints and significant amounts of fraud, indicating higher vulnerability.

West Bengal and Kerala have high FLN scores.

WEST BENGAL

58.95

KERALA

67.95

TOTAL COMPLAINTS

53,561

AVERAGE COMPLAINTS

26,780

TOTAL AMOUNT

Rs 449.13 Crores

These states have high FLN scores and report fewer complaints and lower amounts of fraud, suggesting better resilience against cyber financial crimes.

The analysis underscores the significant correlation between foundational literacy and Cyber Risk Literacy, which directly impacts the vulnerability to cyber financial crimes. States with higher foundational literacy scores are less susceptible to such threats.

Clear communication, assurances of data deletion upon request, and education about customer rights significantly enhance trust in financial institutions

64%

customers have an increased trust in the companies which provide clear information

IAPP

IAPP

>70%

customers have an increased trust in the companies which provide clear information

IBM

Only 41%

organisations mentioned data principal rights

PwC

PwC

43%

organisations do not provide well-defined purposes for which personal data is shared with data processors for processing

PwC

PwC

The six dimensions of trust

India’s Account Aggregator (AA) ecosystem, often referred to as the UPI of data, is gaining significant traction. With 1.1 billion AA-enabled accounts and over 2.05 million users voluntarily sharing their financial data, the potential for AA is enormous. Current penetration is at 0.2%, but the annual transaction volume is expected to reach 1 billion by 2025 and 5 billion by 2027, according to Sahamati.

To ensure trust and sustainability, AAs must integrate the six dimensions of trust:

Security

Protect data confidentiality, integrity, and availability.

Measures the population’s commitment to practicing cybersecurity, including metrics such as the rate of adherence to specific safe cyber practices

Accountability

Ensure compliance and hold stakeholders responsible for failures.

Ensure compliance and hold stakeholders responsible for failures.

Transparency

Provide clear information on data collection, storage, processing, and sharing.

Provide clear information on data collection, storage, processing, and sharing.

Auditability

Enable external audits and verification

Enable external audits and verification

Fairness

Prevent privacy abuses and ensure regulatory oversight.

Prevent privacy abuses and ensure regulatory oversight.

Ethics

Adhere to ethical standards to maintain trust.

Adhere to ethical standards to maintain trust.

As AA volumes soar, incorporating these six dimensions of trust is essential. Addressing the gaps identified in Silence Laboratories’ survey around privacy, transparency, and auditability of consent mechanisms would be crucial for sustainable and secure growth.

Risks of Ignoring Cybersecurity and Cyber Risk Literacy in India's Financial Hypergrowth

The table below draws a parallel between the challenges faced in achieving financial inclusion and those currently hindering financial data privacy. Just as technological solutions like UPI and Aadhaar successfully addressed barriers to financial inclusion, adopting Privacy Enhancing Technologies (PETs) could similarly tackle the challenges in data privacy, ensuring a secure and resilient digital ecosystem.

ASPECT

ASPECT

FINANCIAL INCLUSION

FINANCIAL INCLUSION

FINANCIAL DATA PRIVACY

FINANCIAL DATA PRIVACY

Supply and Demand Side Challenges

ASPECT

  • Low literacy and lack of collateral 

  • Absence of a universal identity solution for all citizens, regardless of educational background

  • Trust issues while transacting with digital money  

FINANCIAL INCLUSION

  • Low cyber risk literacy 

  • Awareness gaps of new age risks

  • Absence of cybersecurity solutions accessible to all citizens, irrespective of their level of cyber literacy

FINANCIAL DATA PRIVACY

Regulatory Hurdles

ASPECT

  • Stringent bank requirements

  • Difficult onboarding  

FINANCIAL INCLUSION

  • Complex data protection needs 

  • Rising cybercrimes 

FINANCIAL DATA PRIVACY

Technological Solutions

ASPECT

  • UPI and Sahamati platforms

  • UIDAI (Aadhaar) for uniform identity

FINANCIAL INCLUSION

  • Privacy Enhancing Technologies (PETs)

  • Transparent, auditable & programmable consent 

FINANCIAL DATA PRIVACY

Impact

FACTOR

  • Easy onboarding

  • Access to safe credit and savings

FINANCIAL INCLUSION

  • Secure financial data

  • Resilient digital infrastructure

FINANCIAL DATA PRIVACY

The Cost of Delaying Tech Adoption

Consider the impact if UPI and Aadhaar had been delayed—India’s rapid economic growth might not have materialized at the same scale. UPI alone has saved the Indian economy approximately $67 billion since 2016. A delay could have cost the nation billions, potentially stalling its rise to the 5th largest economy by 2022.

Similarly, Privacy Enhancing Technologies (PETs) are crucial for addressing current data privacy challenges. However, delays in their adoption could lead to escalating economic losses due to rising cybercrimes, which already resulted in over 1.14 million attacks and 7400 Crores INR in losses in the financial sector alone.

Interconnected Risks in a Hyperconnected World

A report by WEF suggests that, In our interconnected digital world, the risks posed by cyber threats are amplified. Unlike biological viruses, cyber viruses are more potent, spreading rapidly and uncontrollably. For instance, while COVID-19’s R0 is between two and three, the R0 for cyberattacks can exceed 27. The 2017 WannaCry attack crippled over 200,000 computers across 150 countries in a single day.

If not addressed urgently, these cyber threats could trigger a domino effect, compromising critical growth engines like UPI and Open Banking as financial crimes scale from targeting individuals to threatening entire institutions and sovereign infrastructure.

Estimated Regulatory Lag in Cyber Risk Regulation & Awareness Across Countries 

Understanding Factors Influencing Cyber Risk Regulation 

FACTOR

FACTOR

EXPLANATION

EXPLANATION

IMPACT

IMPACT

Government Policy

SUPPLY SIDE

DIRECT IMPACT

FACTOR

Government policies directly set the regulatory framework for cybersecurity.

EXPLANATION

The speed and effectiveness of these policies directly influence regulatory lag.

IMPACT

Educational System

SUPPLY SIDE

INDIRECT IMPACT

FACTOR

Integrates cyber risk literacy into formal education.

REGIME

Produces knowledgeable individuals who advocate for stronger, timely regulations, indirectly reducing regulatory lag.

MODEL OF PROVISION

Labor Market

SUPPLY SIDE

INDIRECT IMPACT

FACTOR

Measures employer demand for cybersecurity skills.

REGIME

High demand highlights the need for up-to-date regulations to protect businesses, indirectly influencing regulatory speed.


MODEL OF PROVISION

Public Motivation

DEMAND SIDE

INDIRECT IMPACT

FACTOR

Reflects public awareness and proactive behavior towards cybersecurity.

REGIME

High public demand can push governments to expedite regulatory updates, indirectly reducing regulatory lag.

MODEL OF PROVISION

Population Inclusivity

DEMAND SIDE

INDIRECT IMPACT

FACTOR

Ensures equal access to digital technologies and education.

REGIME

Inclusive policies ensure all demographics are considered in regulations, indirectly reducing lag by addressing comprehensive needs.

MODEL OF PROVISION

Source: Oliver Wyman

Source: Oliver Wyman

Estimating regulatory gaps

High Tech Business Vs US Government

9x regulatory gap

In 2011, Eric Schmidt, then CEO of Google, echoed former Intel CEO Andy Grove’s sentiment, highlighting a critical challenge:

"High tech runs three times faster than normal businesses, and the government runs three times slower than normal businesses. So we have a nine-times gap.”

Schmidt’s perspective underscores a fundamental issue—technology advancements occur at a pace that far outstrips the ability of regulatory frameworks to keep up. Google, recognizing this discrepancy, sought to shield itself from the sluggish pace of democratic institutions

The Indian Context

India's Lag Factor = (India's Ranking / USA's Ranking) * Schmidt's Lag Factor

India's Lag Factor = (India's Ranking / USA's Ranking) * Schmidt's Lag Factor

Based on Andy Grove's formula, if advanced countries like  USA experience a 9x regulatory lag, then India, which ranks 45th in cyber risk literacy, would experience a regulatory lag proportion of 40.5 x. This disparity is not just a multiple of the difference in rankings but also reflects the compounded effect of lower public motivation, weaker government policy, less effective educational systems, a less responsive labor market, and lower population inclusivity.

40

30

20

10

0

Switzerland

USA

India

0.9

9

40.5

REGULATORY LAG

COUNTRIES

40

30

20

10

0

Switzerland

USA

India

0.9

9

40.5

REGULATORY LAG

COUNTRIES

40

30

20

10

0

Switzerland

USA

India

0.9

9

40.5

REGULATORY LAG

COUNTRIES

Prioritization of SupTech use cases under
consumer protection and market conduct supervision (N=35)

Prioritization of SupTech use cases under consumer protection and market conduct supervision (N=35)

Only the top 5 use cases included
Only the top 5 use cases included

% of financial regulators seeking a solution but not planned yet

% of financial regulators seeking a solution but not planned yet

Interdepartmental data

(e.g. stacking market conduct supervision data with prudential supervision data)

43%

Cross-entity analytics

stacking multiple data sources

43%

Alternative dispute resolution

37%

Detect algorithmic bias/error

37%

Terms and conditions, privacy policy, and consent management data

34%

Causes of the mismatch in demand and supply of RegTech /SupTech

There is a significant disconnect between financial authorities and technology innovators regarding the development and implementation of RegTech (Regulatory Technology) and SupTech (Supervisory Technology) solutions. This mismatch stems from various challenges faced by both parties as illustrated in the figure. 

FINANCIAL AUTHORITIES

FINANCIAL AUTHORITIES

INNOVATORS

INNOVATORS

Unaware of solutions that are available or how to find them

EXPLANATION

Not aware of demands or needs of financial authorities

IMPACT

Lack resources, advice, or technical assistance

EXPLANATION

May perceive regtech for regulators as too small a market

IMPACT

Legacy or non-existent IT systems & processes

EXPLANATION

Discouraged by burdensome processes

IMPACT

Unable to express their needs to vendors in an easily understandable way

EXPLANATION

Lack of clarity on technical parameters & requirements

IMPACT

Limited collaboration across departments & agencies to share tools & data

EXPLANATION

Not accustomed to engaging with financial authorities

IMPACT

Regulatory Lag & the role of PETs

Based on Andy Groves formula and cyber risk literacy rankings, advanced countries like the USA experience a 9 x regulatory lag, while India faces a 40.5 x lag due to lower cyber risk literacy.

With increasing demand for personalised services and the recent introduction of DPDP Act in India, businesses struggle in managing regulatory requirements, and may inadvertently attract penalties for non-compliance.

Some ways to ensure compliance include

Regulators should communicate clear interpretation of laws and actionable steps for businesses
Advocacy of privacy based technologies and “privacy by design” by regulatory bodies
Adoption of RegTech and SupTech solutions by businesses to ensure compliance

The onus of compliance should not be blindly placed on trust between organisations or legal agreements, but by embedding policy as a code. Such programmability could be enabled by Privacy Enhancing Technologies (PETs), cryptographic tools which can unlock collaboration on siloed data, ensuring privacy and compliance with regulatory requirements

BRIDGING THE GAPS

The research highlights the inadequacy of simply informing users about data sharing practices. Instead, financial institutions need to move towards a model that empowers users with genuine control over their data. This shift can be achieved through clear and concise communication, offering granular consent options, and providing user-friendly tools for managing data access and revoking consent.

CLEAR, EXPLICIT, AND GRANULAR CONSENT

Empowering users with refined understanding & control over what data is shared and for what purpose through detailed yet lucid consent notices and forms at the time of signup

TRANSPARENCY BEYOND CONSENT

Providing unambiguous, sincere, and proactive communication about terms of data collection, storage, and usage including details of data sharing, duration of storage, and access procedures

EASY-TO-ACCESS CONTROL OPTIONS

Providing readily-available user-friendly mechanisms for revoking consent and conveniently managing data access whenever they desire

DEMONSTRATING VALUE

Illustrating and exemplifying clearly how more collected data translates to better products and services through distinctly enhanced user experience

PARTICIPATIVE DECISION-MAKING

Continuously interacting with users, keeping them informed of changes, eliciting & incorporating their opinion, & fostering a dialectical developmental ecosystem

Customer education

A cornerstone to building trust

The user-centric approach begins with the education of the customer

What are the rights which they have, and how can they exercise them

How privacy differs from consent mechanisms
or security measures, and its relevance for them

What terms of data sharing should they look out for, and the importance of control over their data

Marrying consent with compute

From contractual trust to mathematical guarantees

Prevention of data misuse is key to building customer trust. Consent given for a particular purpose should ensure data is being processed for the same, and provide verifiable mechanisms to audit as well. However, trust on third parties or legal contracts should not simply alleviate privacy concerns. Instead, the ability to only process what is consented should be programmed in the consent mechanisms. 

Leveraging Technology

Secure and Transparent Data Sharing

Technological advancements offer powerful tools to ensure secure and transparent data processing practices. Privacy-preserving technologies like Multi-Party Computation (MPC) can unlock data-driven insights without compromising user privacy. Ensuring zero movement of data in its raw form and eliminating the risk of single point of failure enabled by such technologies could revolutionize collaborations with utmost respect to privacy.

CONCLUSION

Building a secure, streamlined, synergistic, and sustainable financial data sharing ecosystem is a shared responsibility, requiring collaborative effort from all stakeholders.

Financial institutions must prioritize transparency, provide user-centric control mechanisms, and utilize privacy-preserving technologies. Regulatory bodies need to establish a balanced framework that facilitates innovation while safeguarding privacy and other user rights. Finally, user education efforts are crucial to empower individuals to understand their data rights, develop a keen sense of discernment for data sharing, and make informed decisions about their data.

Although the aforementioned insights were derived in the context of financial institutions, they also broadly capture key general trends in user attitudes which would be of relevance to any industry. Industries must move beyond merely informing users about data sharing to empowering them with genuine control.

Observing the distinction and interrelationship between privacy, security, consent and control in thought,
communication, and practice would benefit all stakeholders and enable the worlds most populous country to harness the full potential of data, the fuel of the future.