Because this is proposed by the government, passage is likely. Yet again, the developing world is pulling ahead on important policies. India also has advanced net neutrality.  

The Hindu summarizes: "The proposed Data Protection Bill 2018 essentially makes individual consent central to data sharing. The report notes that the right to privacy is a fundamental right. Unless you have given your explicit consent, your personal data cannot be shared or processed. Of course, this also means that the onus lies on you to make an informed choice.

Next, the draft bill also states that any person processing your personal data is obligated to do so in a fair and reasonable manner. In other words, your data should be processed only for the purposes it was intended for in the first place. Failing to meet these provisions can cost companies dear, with the bill laying down penalties that can go up to ₹15 crore or 4 per cent of a company’s total worldwide turnover.

This is the index of the 62 page proposed bill:

THE PERSONAL DATA PROTECTION BILL, 2018 CHAPTER I PRELIMINARY 1. Short title, extent and commencement.—................................................................................ 1 2. Application of the Act to processing of personal data.—........................................................ 1 3. Definitions.— In this Act, unless the context otherwise requires, —...................................... 2 CHAPTER II DATA PROTECTION OBLIGATIONS 4. Fair and reasonable processing.— ........................................................................................... 6 5. Purpose limitation.— ............................................................................................................... 6 6. Collection limitation. —. ......................................................................................................... 7 7. Lawful processing.—............................................................................................................... 7 8. Notice.—.................................................................................................................................. 7 9. Data quality.—......................................................................................................................... 8 10. Data storage limitation.— ...................................................................................................... 8 11. Accountability.—................................................................................................................... 9 CHAPTER III GROUNDS FOR PROCESSING OF PERSONAL DATA 12. Processing of personal data on the basis of consent.—.......................................................... 9 13. Processing of personal data for functions of the State. — ................................................... 10 14. Processing of personal data in compliance with law or any order of any court or tribunal. — 10 15. Processing of personal data necessary for prompt action. — .............................................. 10 16. Processing of personal data necessary for purposes related to employment. —.................. 10 17. Processing of data for reasonable purposes. —.................................................................... 11 CHAPTER IV GROUNDS FOR PROCESSING OF SENSITIVE PERSONAL DATA 18. Processing of sensitive personal data based on explicit consent. —.................................... 11 19. Processing of sensitive personal data for certain functions of the State. — ........................ 12 20. Processing of sensitive personal data in compliance with law or any order of any court or tribunal. — ........................................................................................................................... 12 21. Processing of certain categories of sensitive personal data for prompt action. —............... 12 ii 22. Further categories of sensitive personal data.— .................................................................. 13 CHAPTER V PERSONAL AND SENSITIVE PERSONAL DATA OF CHILDREN 23. Processing of personal data and sensitive personal data of children. —.............................. 13 CHAPTER VI DATA PRINCIPAL RIGHTS 24. Right to confirmation and access. — ................................................................................... 14 25. Right to correction, etc.—.................................................................................................... 14 26. Right to Data Portability. — ................................................................................................ 15 27. Right to Be Forgotten. —..................................................................................................... 16 28. General conditions for the exercise of rights in this Chapter. —......................................... 16 CHAPTER VII TRANSPARENCY AND ACCOUNTABILITY MEASURES 29. Privacy by Design. — .......................................................................................................... 17 30. Transparency. —.................................................................................................................. 18 31. Security Safeguards.—......................................................................................................... 18 32. Personal Data Breach.— ...................................................................................................... 18 33. Data Protection Impact Assessment. —............................................................................... 19 34. Record-Keeping. — ............................................................................................................. 20 35. Data Audits. —..................................................................................................................... 20 36. Data Protection Officer. — .................................................................................................. 21 37. Processing by entities other than data fiduciaries. — .......................................................... 22 38. Classification of data fiduciaries as significant data fiduciaries. — .................................... 22 39. Grievance Redressal. —....................................................................................................... 23 CHAPTER VIII TRANSFER OF PERSONAL DATA OUTSIDE INDIA 40. Restrictions on Cross-Border Transfer of Personal Data. —............................................... 23 41. Conditions for Cross-Border Transfer of Personal Data. —................................................ 24 CHAPTER IX EXEMPTIONS 42. Security of the State.— ........................................................................................................ 25 43. Prevention, detection, investigation and prosecution of contraventions of law.—.............. 25 iii 44. Processing for the purpose of legal proceedings.—............................................................. 26 45. Research, archiving or statistical purposes. — .................................................................... 27 46. Personal or domestic purposes. —....................................................................................... 27 47. Journalistic purposes.— ....................................................................................................... 28 48. Manual processing by small entities.— ............................................................................... 28 CHAPTER X DATA PROTECTION AUTHORITY OF INDIA 49. Establishment and incorporation of Authority.—................................................................ 29 50. Composition and qualifications for appointment of members.—........................................ 29 51. Terms and conditions of appointment.—............................................................................. 30 52. Removal of members.— ...................................................................................................... 30 53. Powers of the chairperson.— ............................................................................................... 31 54. Meetings of the Authority.— ............................................................................................... 31 55. Vacancies, etc. not to invalidate proceedings of the Authority.—....................................... 31 56. Officers and Employees of the Authority.— ....................................................................... 31 57. Grants by Central Government.— ....................................................................................... 32 58. Accounts and Audit —......................................................................................................... 32 59. Furnishing of returns, etc. to Central Government.—.......................................................... 32 60. Powers and Functions of the Authority.—........................................................................... 33 61. Codes of Practice.—............................................................................................................. 35 62. Power of Authority to issue directions.—............................................................................ 36 63. Power of Authority to call for information.— ..................................................................... 37 64. Power of Authority to conduct inquiry. — .......................................................................... 37 65. Action to be taken by Authority pursuant to an inquiry.—.................................................. 38 66. Search and Seizure.— .......................................................................................................... 39 67. Coordination between the Authority and other regulators or authorities.—........................ 40 68. Appointment of Adjudicating Officer.—............................................................................. 41 CHAPTER XI PENALTIES AND REMEDIES 69. Penalties.— .......................................................................................................................... 41 70. Penalty for failure to comply with data principal requests under Chapter VI.—................. 42 71. Penalty for failure to furnish report, returns, information, etc.—........................................ 42 iv 72. Penalty for failure to comply with direction or order issued by the Authority.—............... 43 73. Penalty for contravention where no separate penalty has been provided.— ....................... 43 74. Adjudication by Adjudicating Officer.—............................................................................. 43 75. Compensation.—.................................................................................................................. 44 76. Compensation or penalties not to interfere with other punishment.— ................................ 45 77. Data Protection Funds.—..................................................................................................... 45 78. Recovery of Amounts.—...................................................................................................... 46 CHAPTER XII APPELLATE TRIBUNAL 79. Establishment of Appellate Tribunal.—............................................................................... 47 80. Qualifications, appointment, term, conditions of service of members.—............................ 48 81. Vacancies.— ........................................................................................................................ 48 82. Staff of Appellate Tribunal.— ............................................................................................. 48 83. Distribution of business amongst benches.— ...................................................................... 48 84. Appeals to Appellate Tribunal.— ........................................................................................ 49 85. Procedure and powers of Appellate Tribunal.—.................................................................. 49 86. Orders passed by Appellate Tribunal to be executable as a decree.— ................................ 50 87. Appeal to Supreme Court of India.— .................................................................................. 50 88. Right to legal representation.— ........................................................................................... 50 89. Civil court not to have jurisdiction.—.................................................................................. 51 CHAPTER XIII OFFENCES 90. Obtaining, transferring or selling of personal data contrary to the Act.—........................... 51 91. Obtaining, transferring or selling of sensitive personal data contrary to the Act.—............ 51 92. Re-identification and processing of de-identified personal data. —.................................... 52 93. Offences to be cognizable and non-bailable.— ................................................................... 52 94. Power to investigate offences.—.......................................................................................... 52 95. Offences by companies.— ................................................................................................... 52 96. Offences by Central or State Government departments. —................................................. 53 CHAPTER XIV TRANSITIONAL PROVISIONS 97. Transitional provisions and commencement. —.................................................................. 54 v CHAPTER XV MISCELLANEOUS 98. Power of Central Government to issue directions in certain circumstances. —.................. 55 99. Members, etc., to be public servants. —.............................................................................. 55 100. Protection of action taken in good faith. — ....................................................................... 55 101. Exemption from tax on income. —.................................................................................... 55 102. Delegation. — .................................................................................................................... 55 103. Power to remove difficulties. — ........................................................................................ 56 104. Power to exempt certain data processors.— ...................................................................... 56 105. No application to non-personal data................................................................................... 56 106. Bar on processing certain forms of biometric data............................................................. 56 107. Power to make rules. — ..................................................................................................... 56 108. Power to make regulations. — ........................................................................................... 58 109. Rules and Regulations to be laid before Parliament.—...................................................... 59 110. Overriding effect of this Act. — ........................................................................................ 60 111. Amendment of Act 21 of 2000. —..................................................................................... 60 112. Amendment of Act 22 of 2005. —..................................................................................... 60 THE FIRST SCHEDULE ................................................................................................................... 61 THE SECOND SCHEDULE................................................................................................................ 62

The world needs a good news source on Internet and telecom policy. I hope to create one. Catch a mistake? Email me please.  Dave Burstein

Latest

Professor Noam's "Many Internets" http://bit.ly/ManyNets

Until about 2010, everyone agreed the Net was a "network of networks," not a monolithic entity. There was a central authority, ICANN, keeping track of domain names, but that was a minor administrative function.
Columbia Professor Noam suggests we might be better off accepting that some nations or groups might want to organize their networks differently. It's easy to see demand for an Internet with much more effective filters against material some think harmful to children. (Any 10 year old can easily find porn today. Many do.)
Internet translation is getting better very quickly. You might want an "Internet" that translates everything into your language. Google Chrome translation isn't perfect but I was able to research most of this story on Russian language sites. With a few more years progress, I might welcome an alternate that brings me everything in English, including caching for better performance.
De facto, Internet news is already split, as hundreds of millions only get their news from Facebook. Google AMP pages, including for news, also favor selected parts of the net
Centralizing the DNS doesn't prevent censorship, as the Chinese have demonstrated. There are many Jewish and Muslim fundamentalists who want to block what they consider blasphemy and limit free speech. See http://www.nytimes.com/2012/05/21/nyregion/ultra-orthodox-jews-hold-rally-on-internet-at-citi-field.html . More from Noam http://bit.ly/ManyNets

Russia Orders Alternate Root Internet System http://bit.ly/RussiaDNS
It's actually practical and not necessarily a problem.The Security Council of the Russian Federation, headed by Vladimir Putin, has ordered the "government to develop an independent internet infrastructure for BRICS nations, which would continue to work in the event of global internet malfunctions ... This system would be used by countries of the BRICS bloc – Brazil, Russia, India, China and South Africa." RT
Columbia University Professor Eli Noam and then ICANN CEO Fadi Chehadé have both said such a system is perfectly practical as long as there is robust interconnection.
Actually, the battle over ICANN and domain names is essentially symbolic. Managing the DNS is a relatively insignificant task, more clerical than governing. ICANN Chair Steve Crocker pointed out they had very little to do with policy.
Some will claim this is about blocking free speech but that's rhetoric. Russia doesn't need to fiddle with the DNS for censorship, as the Chinese have demonstrated. The wonders of the Internet will continue so long as the resulting nets" are robustly connected. The ICANN and U.S. policy goal should be to help create that system for interconnection.
I expect contentions that “The Russians are taking over our Internet” and “They are splitting the Internet.” The Internet is a “Network of Networks.” It is not a monolith so what would “splitting” it mean or do?
After the WCIT, China realized that ICANN and the DNS are side issues not worth bothering about. They have been building alternate institutions including the World Internet Summit in Wuzhan and the BRICs conferences.  The Chinese have put their main work where decisions that matter are made. Wireless standards are set by 3GPP, where nothing can be approved without China's consent.
The American battle at ITU is proving to be a historic mistake.
Why does Russia want an independent Internet?
They fear that Western sanctions on Russia could cripple the Russian Net. Communications minister, Nikolay Nikiforov, worries about, "a scenario where our esteemed partners would suddenly decide to disconnect us from the internet." I think that's highly unlikely but Nikiforov points out, “Recently, Russia is being addressed in a language of unilateral sanctions: first, our credit cards are being cut off; then the European Parliament says that they’ll disconnect us from SWIFT."
It makes sense for the Russians to be prepared for such a contingency as the Cold War has been warming up on both sides. "Britain's top military chief Air Chief Marshal Sir Stuart Peach just made headlines warning Russian subs "could CRIPPLE Britain by cutting undefended undersea internet cables." Much more http://bit.ly/RussiaDNS

ICANN Continues Excluding Russia & China From the Board http://bit.ly/CEOPromises
No wonder Russia wants an alternate root. Three years ago, ICANN CEO Fadi Chehadé promised "a seat at the table" to Chinese Premier Li. ICANN welched and this year added two more Americans.
Almost all the ICANN board is from the U.S. and close allies; only about 4 of the 18 board members are from countries on the other side of the North/South divide in Internet policy.  Claiming ICANN represents the Global Internet is inappropriate. China is 1/3rd of the Internet but has no representation on the board.
I know many of the board members. They are all basically honorable but generally share a strong opinion on North-South issues.
Larry Strickling of the U.S. government knew just what he was doing with the IANA transition. He handed over to a board with similar positions as the U.S. government.
"The system is unsustainable while it excludes half the world," I have been saying since 2012. More, including the transcript of Fadi's statements,http://bit.ly/CEOPromises

Sorry, Ajit Pai: Smaller Telcos Did Not Reduce Investment After NN Ruling http://bit.ly/SorryPai
Pai justifies his NN choice with the claim, "The impact has been particularly serious for smaller Internet service providers." #wrong (Actually, NN has minimal effects on investment, up or down, I’m convinced. Competition, new technology, customer demand and similar are far more important.)
The two largest suppliers to “smaller ISPs” saw sales go up. Adtran's sales the most recent nine months were $540M, up from $473M the year before. 2016 was $636M, 2015 $600M. Calix the last nine months sold $372M, up from $327M. The full year 2016 was $459M, up from $407M in 2015. Clearfield, a supplier of fiber optic gear, was up 8% in sales in the smaller ISPs.
There is nothing in the data from others that suggests an alternate trend. Anyone could have found this data in a few minutes from the company quarterly reports.
The results in larger companies are ambiguous. I can "prove" capex went up or went down by selecting the right data. The four largest companies' capex - two/thirds of the total - went up from $52.7B in 2015 to $55.7B in 2016. The result remains positive after making sensible adjustments for mergers and acquisitions. That's as close to "proving" that NN led to increased spending as the facts chosen to prove the opposite.
Actually, whether capex went up or down in 2016 tells us almost nothing about the choice on neutrality. Everyone knows a single datapoint could be random or due to other causes. Much more, including the source of the errors http://bit.ly/SorryPai

Elders Bearing Witness: Vint, Timbl, & Many More http://bit.ly/VintTim
Vint Cerf, Tim Berners-Lee, Steve Wozniak and more than a dozen true Internet pioneers wrote Congress to protect Neutrality. The best Congress money can buy didn't listen but I wanted to reproduce their letter.
I hope they are wrong believing "is an imminent threat to the Internet we worked so hard to create." My take is the impact will be moderate in the short run.
From the letter:
We are the pioneers and technologists who created and now operate the Internet, and some of the innovators and business people who, like many others, depend on it for our livelihood. ... The FCC’s proposed Order is based on a flawed and factually inaccurate understanding of Internet technology. These flaws and inaccuracies were documented in detail in a 43-page-long joint comment signed by over 200 of the most prominent Internet pioneers and engineers and submitted to the FCC on July 17, 2017.
Despite this comment, the FCC did not correct its misunderstandings, but instead premised the proposed Order on the very technical flaws the comment explained. The technically-incorrect proposed Order ... More, including the full list, http://bit.ly/VintTim