SlideShare una empresa de Scribd logo
1 de 28
The term privacy seems to have
been derived from the Latin
word privatus, which means
isolated, restricted, personal or
peculiar.
- (Traupman, 1995)
www.prashantmali.com 2
It is the right of the individual to
determine when, how, and to
what extent there should be
disclosure of the information.
- (Westin, 1967)
www.prashantmali.com 3
 Privacy is control over information or
activities relating to oneself; Privacy can be
considered as a “derivative” right i.e. privacy
right is derived from other related rights;
 In India majority understand Privacy only in
context of Sex and Wealth. Sometimes with
password too
www.prashantmali.com 4
 Indian culture is more about sharing.
Everyone wants to know everything.
Decisions are typically taken by elders in the
family. Privacy is viewed more as a tort.
 The right of privacy in the light of constitution
restricting unauthorized searches and seizures;
and
 A viewpoint that privacy is not a basic
requirement of our society.
- (Ebenger, 2004)
www.prashantmali.com 5
Only the information owner makes the decision
about the disclosure of the information.
For instance, the privacy would deemed to be
compromised if an employee working in a
government tax office views the records of
someone else out of personal interest.
www.prashantmali.com 6
The Supreme Court in the case of R. Rajagopal v. State of Tamil Nadu , for the
first time directly linked the right to privacy to Article 21 of the Constitution
and laid down:
"The right to privacy is implicit in the right to life and
liberty guaranteed to the citizens of this country by
Article 21. It is a "right to be let alone". A citizen has
aright to safeguard the privacy of his own, his family,
marriage, procreation, motherhood, child bearing
and education among other matters. None can
publish anything concerning the above matters
without his consent whether truthful or otherwise
and whether laudatory or critical. If he does so, he
would be violating the right to privacy of the person
concerned and would be liable in an action for
damages.“
R. Rajagopal v. State of Tamil Nadu, cited at: 1994 SCC (6) 632.
www.prashantmali.com 7
 The Supreme Court in the case of Ram
Jethmalani v. Union of India categorically held
that the right to privacy also requires the
state not to make public any private
information about an individual, which would
violate her privacy.
Ram Jethmalani v. Union of India, cited at:
(2011) 8 SCC 1.
www.prashantmali.com 8
The Information Technology Act, 2000 have two
sections relating to Privacy:
 Section 43A, which deals with implementation
of reasonable security practices for sensitive personal
data or information and provides for the
compensation of the person affected by wrongful loss
or wrongful gain.
 Section 72A, which provides for imprisonment for a
period up to 3 years and/or a fine up to Rs. 5,00,000
for a person who causes wrongful loss or wrongful
gain by disclosing personal information of another
person while providing services under the terms of
lawful contract.
www.prashantmali.com 9
 The IT Act,2000 has provisions that permit
the interception, monitoring, and decryption
of digital communications. It provides for the
collection and monitoring of traffic data. It
allows the government to set the national
encryption standard.
 Projects like the Central Monitoring System,
NATGRID, Phone & Internet Interception used
by Police is making State surveillance at all
time high.
www.prashantmali.com 10
 Privacy Protection Bill, proposed
legislation for a privacy and personal
data protection regime in India.
 This law when passed would regulate
the collection and use of personal data
in India, as well as surveillance and
interception of communications.
www.prashantmali.com 11
 Citizens could not claim right to privacy as a
fundamental right is the Government’s
stand.
 Supreme Court would decide in due course
in the light of Article 21 whether it is a
fundamental right.
 Or The Supreme Court relies on eight-judge
bench decision which in1954 ruled that right
to privacy was not a fundamental right
www.prashantmali.com 12
 A Standing Committee on Information
Technology (hereinafter referred to as the "IT
Standing Committee"), Lok Sabha Secretariat
in the 52nd Report on "Cyber Crime, Cyber
Security and Right to Privacy" strongly
emphasized the need to institute a legal
framework on privacy.
www.prashantmali.com 13
Violation of privacy should be looked from the
perspective whether other intersecting cluster
of rights have been violated or not.
The privacy right is derived from other
clusters of rights.
- ( Judith Jarvis Thomson, 1975)
The act of owning a picture provides a cluster
of rights such as the right to sell it, the right
to destroy it, the right to view it etc.
- (Thomson)
www.prashantmali.com 14
According to the eminent US law scholar William
L. Prosser (1960), the invasion of privacy would
deem to have occurred under the following four
claims:
1. Intrusion upon Solitude or Seclusion, or into
Private Affairs:
It would be considered a liability if the
intrusion is not acceptable to a “reasonable
person”.
www.prashantmali.com 15
2. Public Disclosure of Embarrassing Facts:
“The matter made public must be one
which would be offensive and objectionable to a
reasonable man of ordinary sensibilities.”
- (Prosser, 1960)
3. Publicity in the False Light in the Public Eye:
Any false comments or opinions that are
misleading and that cause a bad reputation
(“false light”) can be sued for violation of
privacy.
www.prashantmali.com 16
4. Appropriation of Name of Likeness for
Advantage:
If anyone uses the name or likeness for
benefit without consent may result in plaintiff
claiming damages.
www.prashantmali.com 17
 E-mail
E-mail has become a de-facto mode of
communication for both personal and
professional needs.
The internet serves as the conduit through
which global e-mail network operates. Before
reaching the recipient mailbox, the message
travels through intermediate devices and leased
lines, known as hosts and routers, which are
often operated and owned by third parties.
-(O’Brien, 1999)
www.prashantmali.com 18
A copy of the message might be stored in
several devices as it passes through the
origin device and server, to destination server
and device. This so-called “store-and-
forward” technology might be necessary for
technical reasons but raises serious privacy
concerns on the part of users.
-(Rest, 1998)
www.prashantmali.com 19
Detection and prevention of these
activities entail invading the privacy of
citizens by accessing and sometimes
monitoring their emails.
- (Guirguis, 2001)
However, the balance needs to be
maintained so that the right of privacy
in e-mail communication is not
unreasonably compromised.
www.prashantmali.com 20
 Social Networking Sites
With the proliferation of networking sites,
the use of social media has become
mainstream.
-(Madden, 2012)
Even in the usage of social networking sites lay
the basic privacy requirements, and users use
the privacy settings of the social networking
site to balance the competing desires of privacy
and publicity.
-(Metzger & Pure, 2009)
www.prashantmali.com 21
The body of case law in the area of
Internet-related technology “is still
relatively sparse, and only a handful of
courts have had occasion to grapple with
the rapidly evolving nature of privacy
within social networking sites”.
- (Pure, 2013)
www.prashantmali.com 22
The social awareness has to be enhanced
about the risks of posting private information
on such platforms.
In addition, the technical controls in the
protection of information need to be
reassessed and reconfigured to more
stringent requirements.
www.prashantmali.com 23
The legal battle focused on two aspects: the
perceived privacy and the deemed security for
the citizens.
In Apple’s opinion, the desire to create a
computer program that would alter the
technical controls implemented for the
protection of information amount to creating a
back-door that could also be used by the
hackers to compromise the security of devices
used by other customers.
www.prashantmali.com 24
Theoretically, a process known as
“Decapping” might allow recovering the
cryptographic keys from the device by
physical intervention in the transistors and
other micro hardware elements.
In FBI’s opinion, the information obtained
from a device used by the terrorist could
provide valuable clues and links regarding
the terrorist network, thereby diminishing
the probability of more attacks on the
citizens.
www.prashantmali.com 25
 The technology companies will deliberately try to modify
the security mechanism of their devices such that it
would be impossible to access the contents of the
device, even with a custom created computer program.
 It has now become public information that security of
the specific model of iPhone can be compromised as FBI
has publicly stated that it has managed to gain access to
the device used by the terrorist.
 Will government move in the direction of creating
legislation where it would be mandatory for the
technology companies to keep a back-door?
www.prashantmali.com 26
The concept of privacy is very fluid, and the laws
related to this topic are murky and subjective.
The rise of social media and other social
networking sites have resulted in users
voluntarily or involuntary disclosing private
information to the public.
In India we need cultural revolution to decimate
idea of Privacy.
If The Privacy Protection Bill becomes Law, India
would need mass awareness program to
enlighten citizens and Netizens.
www.prashantmali.com 27
THANK YOU
www.prashantmali.com 28

Más contenido relacionado

La actualidad más candente

15. the indecent representation of women (prohibition) act 1986 gp2
15. the indecent representation of women (prohibition) act 1986 gp215. the indecent representation of women (prohibition) act 1986 gp2
15. the indecent representation of women (prohibition) act 1986 gp2PROF. PUTTU GURU PRASAD
 
Jurisdiction issues in cyberspace
Jurisdiction issues in cyberspaceJurisdiction issues in cyberspace
Jurisdiction issues in cyberspaceatuljaybhaye
 
Administrative-Law-SC.pdf
Administrative-Law-SC.pdfAdministrative-Law-SC.pdf
Administrative-Law-SC.pdfGVinoda1
 
Copyright issues in cyberspace
Copyright issues in cyberspaceCopyright issues in cyberspace
Copyright issues in cyberspaceatuljaybhaye
 
trademark issues in cyberspace
 trademark issues in cyberspace trademark issues in cyberspace
trademark issues in cyberspacePanjab University
 
Article 19 the constitution of india
Article 19   the constitution of indiaArticle 19   the constitution of india
Article 19 the constitution of indiaGaurav Patel
 
Amber Sinha and Pooja Saxena - The Fundamental Right to Privacy - A Visual Guide
Amber Sinha and Pooja Saxena - The Fundamental Right to Privacy - A Visual GuideAmber Sinha and Pooja Saxena - The Fundamental Right to Privacy - A Visual Guide
Amber Sinha and Pooja Saxena - The Fundamental Right to Privacy - A Visual GuideThe Centre for Internet and Society
 
Casus omissus, interpretation of statutes
Casus omissus, interpretation of statutesCasus omissus, interpretation of statutes
Casus omissus, interpretation of statutespoonamraj2010
 
privileged class deviance ( concept &nature)
privileged class deviance ( concept &nature)privileged class deviance ( concept &nature)
privileged class deviance ( concept &nature)Chaitanya Limbachiya
 
Data Privacy in India and data theft
Data Privacy in India and data theftData Privacy in India and data theft
Data Privacy in India and data theftAmber Gupta
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000Dr. Heera Lal IAS
 
Deceptive similarity under trademark
Deceptive similarity under trademarkDeceptive similarity under trademark
Deceptive similarity under trademarkNipun Paleja
 
Presentationon colourable legislation
Presentationon colourable legislationPresentationon colourable legislation
Presentationon colourable legislationharshvikramsingh6
 
Offences against the State under Indian Penal Code
Offences against the State under Indian Penal CodeOffences against the State under Indian Penal Code
Offences against the State under Indian Penal CodeSwasti Chaturvedi
 
Fundamental Rights - Presentation
Fundamental Rights - PresentationFundamental Rights - Presentation
Fundamental Rights - PresentationMrudul Manojkumar
 
Appeal as mentioned in Criminal Procedure Code
Appeal   as mentioned in Criminal Procedure Code Appeal   as mentioned in Criminal Procedure Code
Appeal as mentioned in Criminal Procedure Code adwitiya prakash tiwari
 

La actualidad más candente (20)

15. the indecent representation of women (prohibition) act 1986 gp2
15. the indecent representation of women (prohibition) act 1986 gp215. the indecent representation of women (prohibition) act 1986 gp2
15. the indecent representation of women (prohibition) act 1986 gp2
 
Jurisdiction issues in cyberspace
Jurisdiction issues in cyberspaceJurisdiction issues in cyberspace
Jurisdiction issues in cyberspace
 
Immunities of Trade Union
Immunities of Trade UnionImmunities of Trade Union
Immunities of Trade Union
 
Administrative-Law-SC.pdf
Administrative-Law-SC.pdfAdministrative-Law-SC.pdf
Administrative-Law-SC.pdf
 
Copyright issues in cyberspace
Copyright issues in cyberspaceCopyright issues in cyberspace
Copyright issues in cyberspace
 
trademark issues in cyberspace
 trademark issues in cyberspace trademark issues in cyberspace
trademark issues in cyberspace
 
Article 19 the constitution of india
Article 19   the constitution of indiaArticle 19   the constitution of india
Article 19 the constitution of india
 
Article 19
Article 19Article 19
Article 19
 
Amber Sinha and Pooja Saxena - The Fundamental Right to Privacy - A Visual Guide
Amber Sinha and Pooja Saxena - The Fundamental Right to Privacy - A Visual GuideAmber Sinha and Pooja Saxena - The Fundamental Right to Privacy - A Visual Guide
Amber Sinha and Pooja Saxena - The Fundamental Right to Privacy - A Visual Guide
 
Casus omissus, interpretation of statutes
Casus omissus, interpretation of statutesCasus omissus, interpretation of statutes
Casus omissus, interpretation of statutes
 
privileged class deviance ( concept &nature)
privileged class deviance ( concept &nature)privileged class deviance ( concept &nature)
privileged class deviance ( concept &nature)
 
Data Privacy in India and data theft
Data Privacy in India and data theftData Privacy in India and data theft
Data Privacy in India and data theft
 
Plea bargaining
Plea bargainingPlea bargaining
Plea bargaining
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
Right to privacy in India
Right to privacy in IndiaRight to privacy in India
Right to privacy in India
 
Deceptive similarity under trademark
Deceptive similarity under trademarkDeceptive similarity under trademark
Deceptive similarity under trademark
 
Presentationon colourable legislation
Presentationon colourable legislationPresentationon colourable legislation
Presentationon colourable legislation
 
Offences against the State under Indian Penal Code
Offences against the State under Indian Penal CodeOffences against the State under Indian Penal Code
Offences against the State under Indian Penal Code
 
Fundamental Rights - Presentation
Fundamental Rights - PresentationFundamental Rights - Presentation
Fundamental Rights - Presentation
 
Appeal as mentioned in Criminal Procedure Code
Appeal   as mentioned in Criminal Procedure Code Appeal   as mentioned in Criminal Procedure Code
Appeal as mentioned in Criminal Procedure Code
 

Destacado

Evolution of Indian Family Law in the contemporary Indian Society and Culture
Evolution of Indian Family Law in the contemporary  Indian Society and CultureEvolution of Indian Family Law in the contemporary  Indian Society and Culture
Evolution of Indian Family Law in the contemporary Indian Society and CultureAsha Saxena
 
Article 5(1) personal liberty
Article 5(1)   personal libertyArticle 5(1)   personal liberty
Article 5(1) personal libertyHafizul Mukhlis
 
Law of Maintenance in India
Law of Maintenance in IndiaLaw of Maintenance in India
Law of Maintenance in IndiaAshok Wadje
 
Introducing the Information Technology Act [Scriboard]
Introducing the Information Technology Act [Scriboard]Introducing the Information Technology Act [Scriboard]
Introducing the Information Technology Act [Scriboard]Rodney D. Ryder
 
Effective Protection of Muslim Women under Family Law in Iran and India
Effective Protection of Muslim Women under Family Law in Iran and IndiaEffective Protection of Muslim Women under Family Law in Iran and India
Effective Protection of Muslim Women under Family Law in Iran and IndiaAMU
 
18059386 Indian Industrial Law 4 Major Laws Industrial Dispute Act Payment Of...
18059386 Indian Industrial Law 4 Major Laws Industrial Dispute Act Payment Of...18059386 Indian Industrial Law 4 Major Laws Industrial Dispute Act Payment Of...
18059386 Indian Industrial Law 4 Major Laws Industrial Dispute Act Payment Of...007rashu
 
Information Technology Amendment Act 2008
Information Technology Amendment Act 2008Information Technology Amendment Act 2008
Information Technology Amendment Act 2008Nanda Mohan Shenoy
 
Information technology act, 2000
Information technology act, 2000Information technology act, 2000
Information technology act, 2000Prateek Sinha
 
Contempt of court presentation
Contempt of court presentationContempt of court presentation
Contempt of court presentationCaroline Sutton
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Actmaruhope
 
Indian Information Technology Act
Indian Information Technology ActIndian Information Technology Act
Indian Information Technology ActKaran Bhagatwala
 
Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptDiya Mirza
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000Vijay Dalmia
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000Akash Varaiya
 

Destacado (18)

Evolution of Indian Family Law in the contemporary Indian Society and Culture
Evolution of Indian Family Law in the contemporary  Indian Society and CultureEvolution of Indian Family Law in the contemporary  Indian Society and Culture
Evolution of Indian Family Law in the contemporary Indian Society and Culture
 
Article 5(1) personal liberty
Article 5(1)   personal libertyArticle 5(1)   personal liberty
Article 5(1) personal liberty
 
Law of Maintenance in India
Law of Maintenance in IndiaLaw of Maintenance in India
Law of Maintenance in India
 
Introducing the Information Technology Act [Scriboard]
Introducing the Information Technology Act [Scriboard]Introducing the Information Technology Act [Scriboard]
Introducing the Information Technology Act [Scriboard]
 
Effective Protection of Muslim Women under Family Law in Iran and India
Effective Protection of Muslim Women under Family Law in Iran and IndiaEffective Protection of Muslim Women under Family Law in Iran and India
Effective Protection of Muslim Women under Family Law in Iran and India
 
Family
FamilyFamily
Family
 
18059386 Indian Industrial Law 4 Major Laws Industrial Dispute Act Payment Of...
18059386 Indian Industrial Law 4 Major Laws Industrial Dispute Act Payment Of...18059386 Indian Industrial Law 4 Major Laws Industrial Dispute Act Payment Of...
18059386 Indian Industrial Law 4 Major Laws Industrial Dispute Act Payment Of...
 
Information Technology Amendment Act 2008
Information Technology Amendment Act 2008Information Technology Amendment Act 2008
Information Technology Amendment Act 2008
 
Privacy act
Privacy actPrivacy act
Privacy act
 
Information technology act, 2000
Information technology act, 2000Information technology act, 2000
Information technology act, 2000
 
Contempt of court presentation
Contempt of court presentationContempt of court presentation
Contempt of court presentation
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Act
 
Indian Information Technology Act
Indian Information Technology ActIndian Information Technology Act
Indian Information Technology Act
 
Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatesppt
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
it act 2000
it act 2000it act 2000
it act 2000
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000
 
It act ppt ( 1111)
It act ppt ( 1111)It act ppt ( 1111)
It act ppt ( 1111)
 

Similar a Privacy and Privacy Law in India By Prashant Mali

Revision Data Protection Act (Eduardo And Salvador)
Revision   Data Protection Act (Eduardo And Salvador)Revision   Data Protection Act (Eduardo And Salvador)
Revision Data Protection Act (Eduardo And Salvador)itgsabc
 
Itechlaw conferene presentation 15th feb 2013 the quest over identity the iss...
Itechlaw conferene presentation 15th feb 2013 the quest over identity the iss...Itechlaw conferene presentation 15th feb 2013 the quest over identity the iss...
Itechlaw conferene presentation 15th feb 2013 the quest over identity the iss...Prof. (Dr.) Tabrez Ahmad
 
Revision Data Protection Act ( Eduardo And Salvador)
Revision    Data  Protection  Act ( Eduardo And  Salvador)Revision    Data  Protection  Act ( Eduardo And  Salvador)
Revision Data Protection Act ( Eduardo And Salvador)itgsabc
 
Chapter 3 legal framework of cybercrime and law enforcement tools
Chapter 3   legal framework of cybercrime and law enforcement toolsChapter 3   legal framework of cybercrime and law enforcement tools
Chapter 3 legal framework of cybercrime and law enforcement toolsMarkDennielMontiano
 
Ronit Mathur Cyber Security assesment.pptx
Ronit Mathur Cyber Security assesment.pptxRonit Mathur Cyber Security assesment.pptx
Ronit Mathur Cyber Security assesment.pptxManuGupta344215
 
Ethical Dilemma/Issues is Cyberworld
Ethical Dilemma/Issues is CyberworldEthical Dilemma/Issues is Cyberworld
Ethical Dilemma/Issues is CyberworldAmae OlFato
 
The house believes that internet acces is a human right
The house believes that internet acces is a human rightThe house believes that internet acces is a human right
The house believes that internet acces is a human rightAgustina
 
RESEARCH - STUDIES IN CONSTITUTIONAL LAW
RESEARCH  - STUDIES IN CONSTITUTIONAL LAWRESEARCH  - STUDIES IN CONSTITUTIONAL LAW
RESEARCH - STUDIES IN CONSTITUTIONAL LAWChirine Haddad ?
 
It legislation
It legislationIt legislation
It legislationdoogstone
 
An Indian Outline on Database Protection
An Indian Outline on Database ProtectionAn Indian Outline on Database Protection
An Indian Outline on Database ProtectionSinghania2015
 
Great Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIGreat Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIJames Bollen
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxadampcarr67227
 
Running head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docx
Running head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docxRunning head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docx
Running head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docxtoltonkendal
 
DRAFT 2 - The Internet has effectively rendered privacy as a thing of the past
DRAFT 2 - The Internet has effectively rendered privacy as a thing of the pastDRAFT 2 - The Internet has effectively rendered privacy as a thing of the past
DRAFT 2 - The Internet has effectively rendered privacy as a thing of the pastMichael Owen
 

Similar a Privacy and Privacy Law in India By Prashant Mali (18)

Revision Data Protection Act (Eduardo And Salvador)
Revision   Data Protection Act (Eduardo And Salvador)Revision   Data Protection Act (Eduardo And Salvador)
Revision Data Protection Act (Eduardo And Salvador)
 
Itechlaw conferene presentation 15th feb 2013 the quest over identity the iss...
Itechlaw conferene presentation 15th feb 2013 the quest over identity the iss...Itechlaw conferene presentation 15th feb 2013 the quest over identity the iss...
Itechlaw conferene presentation 15th feb 2013 the quest over identity the iss...
 
Revision Data Protection Act ( Eduardo And Salvador)
Revision    Data  Protection  Act ( Eduardo And  Salvador)Revision    Data  Protection  Act ( Eduardo And  Salvador)
Revision Data Protection Act ( Eduardo And Salvador)
 
Chapter 3 legal framework of cybercrime and law enforcement tools
Chapter 3   legal framework of cybercrime and law enforcement toolsChapter 3   legal framework of cybercrime and law enforcement tools
Chapter 3 legal framework of cybercrime and law enforcement tools
 
Ronit Mathur Cyber Security assesment.pptx
Ronit Mathur Cyber Security assesment.pptxRonit Mathur Cyber Security assesment.pptx
Ronit Mathur Cyber Security assesment.pptx
 
Ethical Dilemma/Issues is Cyberworld
Ethical Dilemma/Issues is CyberworldEthical Dilemma/Issues is Cyberworld
Ethical Dilemma/Issues is Cyberworld
 
Ethical dilemma
Ethical dilemmaEthical dilemma
Ethical dilemma
 
Cie 2 cyber law
Cie 2  cyber lawCie 2  cyber law
Cie 2 cyber law
 
The house believes that internet acces is a human right
The house believes that internet acces is a human rightThe house believes that internet acces is a human right
The house believes that internet acces is a human right
 
RESEARCH - STUDIES IN CONSTITUTIONAL LAW
RESEARCH  - STUDIES IN CONSTITUTIONAL LAWRESEARCH  - STUDIES IN CONSTITUTIONAL LAW
RESEARCH - STUDIES IN CONSTITUTIONAL LAW
 
It legislation
It legislationIt legislation
It legislation
 
An Indian Outline on Database Protection
An Indian Outline on Database ProtectionAn Indian Outline on Database Protection
An Indian Outline on Database Protection
 
Internet Privacy Essay
Internet Privacy EssayInternet Privacy Essay
Internet Privacy Essay
 
Great Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIGreat Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLI
 
Legal Issues in Mobile Security Research
Legal Issues in Mobile Security ResearchLegal Issues in Mobile Security Research
Legal Issues in Mobile Security Research
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
 
Running head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docx
Running head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docxRunning head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docx
Running head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docx
 
DRAFT 2 - The Internet has effectively rendered privacy as a thing of the past
DRAFT 2 - The Internet has effectively rendered privacy as a thing of the pastDRAFT 2 - The Internet has effectively rendered privacy as a thing of the past
DRAFT 2 - The Internet has effectively rendered privacy as a thing of the past
 

Más de Adv. Prashant Mali ♛ [Bsc(Phy),MSc(Comp Sci), CCFP,CISSA,LLM] (8)

Legality of bitcoins by Prashant Mali
Legality of bitcoins by Prashant MaliLegality of bitcoins by Prashant Mali
Legality of bitcoins by Prashant Mali
 
Electronic Evidence with Case Laws for Maharashtra Judicial Academy by Prasha...
Electronic Evidence with Case Laws for Maharashtra Judicial Academy by Prasha...Electronic Evidence with Case Laws for Maharashtra Judicial Academy by Prasha...
Electronic Evidence with Case Laws for Maharashtra Judicial Academy by Prasha...
 
Ecommerce GST and tax laws in India by prashant mali
Ecommerce GST and tax laws in India by prashant maliEcommerce GST and tax laws in India by prashant mali
Ecommerce GST and tax laws in India by prashant mali
 
Ransomware : A cyber crime without solution ? by Prashant Mali
Ransomware : A cyber crime without solution ? by Prashant MaliRansomware : A cyber crime without solution ? by Prashant Mali
Ransomware : A cyber crime without solution ? by Prashant Mali
 
VAPT, Ethical Hacking and Laws in India by prashant mali
VAPT, Ethical Hacking and Laws in India by prashant maliVAPT, Ethical Hacking and Laws in India by prashant mali
VAPT, Ethical Hacking and Laws in India by prashant mali
 
zero day exploits
zero day exploitszero day exploits
zero day exploits
 
Panama-Paper-Leak
Panama-Paper-LeakPanama-Paper-Leak
Panama-Paper-Leak
 
Panama Papers Leak and Precautions Law firms should take
Panama Papers Leak and Precautions Law firms should takePanama Papers Leak and Precautions Law firms should take
Panama Papers Leak and Precautions Law firms should take
 

Privacy and Privacy Law in India By Prashant Mali

  • 1.
  • 2. The term privacy seems to have been derived from the Latin word privatus, which means isolated, restricted, personal or peculiar. - (Traupman, 1995) www.prashantmali.com 2
  • 3. It is the right of the individual to determine when, how, and to what extent there should be disclosure of the information. - (Westin, 1967) www.prashantmali.com 3
  • 4.  Privacy is control over information or activities relating to oneself; Privacy can be considered as a “derivative” right i.e. privacy right is derived from other related rights;  In India majority understand Privacy only in context of Sex and Wealth. Sometimes with password too www.prashantmali.com 4
  • 5.  Indian culture is more about sharing. Everyone wants to know everything. Decisions are typically taken by elders in the family. Privacy is viewed more as a tort.  The right of privacy in the light of constitution restricting unauthorized searches and seizures; and  A viewpoint that privacy is not a basic requirement of our society. - (Ebenger, 2004) www.prashantmali.com 5
  • 6. Only the information owner makes the decision about the disclosure of the information. For instance, the privacy would deemed to be compromised if an employee working in a government tax office views the records of someone else out of personal interest. www.prashantmali.com 6
  • 7. The Supreme Court in the case of R. Rajagopal v. State of Tamil Nadu , for the first time directly linked the right to privacy to Article 21 of the Constitution and laid down: "The right to privacy is implicit in the right to life and liberty guaranteed to the citizens of this country by Article 21. It is a "right to be let alone". A citizen has aright to safeguard the privacy of his own, his family, marriage, procreation, motherhood, child bearing and education among other matters. None can publish anything concerning the above matters without his consent whether truthful or otherwise and whether laudatory or critical. If he does so, he would be violating the right to privacy of the person concerned and would be liable in an action for damages.“ R. Rajagopal v. State of Tamil Nadu, cited at: 1994 SCC (6) 632. www.prashantmali.com 7
  • 8.  The Supreme Court in the case of Ram Jethmalani v. Union of India categorically held that the right to privacy also requires the state not to make public any private information about an individual, which would violate her privacy. Ram Jethmalani v. Union of India, cited at: (2011) 8 SCC 1. www.prashantmali.com 8
  • 9. The Information Technology Act, 2000 have two sections relating to Privacy:  Section 43A, which deals with implementation of reasonable security practices for sensitive personal data or information and provides for the compensation of the person affected by wrongful loss or wrongful gain.  Section 72A, which provides for imprisonment for a period up to 3 years and/or a fine up to Rs. 5,00,000 for a person who causes wrongful loss or wrongful gain by disclosing personal information of another person while providing services under the terms of lawful contract. www.prashantmali.com 9
  • 10.  The IT Act,2000 has provisions that permit the interception, monitoring, and decryption of digital communications. It provides for the collection and monitoring of traffic data. It allows the government to set the national encryption standard.  Projects like the Central Monitoring System, NATGRID, Phone & Internet Interception used by Police is making State surveillance at all time high. www.prashantmali.com 10
  • 11.  Privacy Protection Bill, proposed legislation for a privacy and personal data protection regime in India.  This law when passed would regulate the collection and use of personal data in India, as well as surveillance and interception of communications. www.prashantmali.com 11
  • 12.  Citizens could not claim right to privacy as a fundamental right is the Government’s stand.  Supreme Court would decide in due course in the light of Article 21 whether it is a fundamental right.  Or The Supreme Court relies on eight-judge bench decision which in1954 ruled that right to privacy was not a fundamental right www.prashantmali.com 12
  • 13.  A Standing Committee on Information Technology (hereinafter referred to as the "IT Standing Committee"), Lok Sabha Secretariat in the 52nd Report on "Cyber Crime, Cyber Security and Right to Privacy" strongly emphasized the need to institute a legal framework on privacy. www.prashantmali.com 13
  • 14. Violation of privacy should be looked from the perspective whether other intersecting cluster of rights have been violated or not. The privacy right is derived from other clusters of rights. - ( Judith Jarvis Thomson, 1975) The act of owning a picture provides a cluster of rights such as the right to sell it, the right to destroy it, the right to view it etc. - (Thomson) www.prashantmali.com 14
  • 15. According to the eminent US law scholar William L. Prosser (1960), the invasion of privacy would deem to have occurred under the following four claims: 1. Intrusion upon Solitude or Seclusion, or into Private Affairs: It would be considered a liability if the intrusion is not acceptable to a “reasonable person”. www.prashantmali.com 15
  • 16. 2. Public Disclosure of Embarrassing Facts: “The matter made public must be one which would be offensive and objectionable to a reasonable man of ordinary sensibilities.” - (Prosser, 1960) 3. Publicity in the False Light in the Public Eye: Any false comments or opinions that are misleading and that cause a bad reputation (“false light”) can be sued for violation of privacy. www.prashantmali.com 16
  • 17. 4. Appropriation of Name of Likeness for Advantage: If anyone uses the name or likeness for benefit without consent may result in plaintiff claiming damages. www.prashantmali.com 17
  • 18.  E-mail E-mail has become a de-facto mode of communication for both personal and professional needs. The internet serves as the conduit through which global e-mail network operates. Before reaching the recipient mailbox, the message travels through intermediate devices and leased lines, known as hosts and routers, which are often operated and owned by third parties. -(O’Brien, 1999) www.prashantmali.com 18
  • 19. A copy of the message might be stored in several devices as it passes through the origin device and server, to destination server and device. This so-called “store-and- forward” technology might be necessary for technical reasons but raises serious privacy concerns on the part of users. -(Rest, 1998) www.prashantmali.com 19
  • 20. Detection and prevention of these activities entail invading the privacy of citizens by accessing and sometimes monitoring their emails. - (Guirguis, 2001) However, the balance needs to be maintained so that the right of privacy in e-mail communication is not unreasonably compromised. www.prashantmali.com 20
  • 21.  Social Networking Sites With the proliferation of networking sites, the use of social media has become mainstream. -(Madden, 2012) Even in the usage of social networking sites lay the basic privacy requirements, and users use the privacy settings of the social networking site to balance the competing desires of privacy and publicity. -(Metzger & Pure, 2009) www.prashantmali.com 21
  • 22. The body of case law in the area of Internet-related technology “is still relatively sparse, and only a handful of courts have had occasion to grapple with the rapidly evolving nature of privacy within social networking sites”. - (Pure, 2013) www.prashantmali.com 22
  • 23. The social awareness has to be enhanced about the risks of posting private information on such platforms. In addition, the technical controls in the protection of information need to be reassessed and reconfigured to more stringent requirements. www.prashantmali.com 23
  • 24. The legal battle focused on two aspects: the perceived privacy and the deemed security for the citizens. In Apple’s opinion, the desire to create a computer program that would alter the technical controls implemented for the protection of information amount to creating a back-door that could also be used by the hackers to compromise the security of devices used by other customers. www.prashantmali.com 24
  • 25. Theoretically, a process known as “Decapping” might allow recovering the cryptographic keys from the device by physical intervention in the transistors and other micro hardware elements. In FBI’s opinion, the information obtained from a device used by the terrorist could provide valuable clues and links regarding the terrorist network, thereby diminishing the probability of more attacks on the citizens. www.prashantmali.com 25
  • 26.  The technology companies will deliberately try to modify the security mechanism of their devices such that it would be impossible to access the contents of the device, even with a custom created computer program.  It has now become public information that security of the specific model of iPhone can be compromised as FBI has publicly stated that it has managed to gain access to the device used by the terrorist.  Will government move in the direction of creating legislation where it would be mandatory for the technology companies to keep a back-door? www.prashantmali.com 26
  • 27. The concept of privacy is very fluid, and the laws related to this topic are murky and subjective. The rise of social media and other social networking sites have resulted in users voluntarily or involuntary disclosing private information to the public. In India we need cultural revolution to decimate idea of Privacy. If The Privacy Protection Bill becomes Law, India would need mass awareness program to enlighten citizens and Netizens. www.prashantmali.com 27