SlideShare una empresa de Scribd logo
1 de 9
“PRIVATISING PRIVACY”by Apar Gupta Conference on “Privacy Law, Technology Policy and the Internet” Thursday 25-Friday 26 February 2010, Hyderabad, India
Orwell’s Metaphor PAGE 1 Privatising Privacy…
Possner and Solove PAGE 2 Privatising Privacy…
State against Citizen  ,[object Object]
Peoples Union for Civil Liberties v. Union of India, (1997) 1 SCC 301
Warrantless telephone tapping
Right to privacy “overly broad and moralistic”
Privacy as per procedure evolved
Telegraph Act

Más contenido relacionado

Destacado

Presentación planeamiento estratégico para odontólogos
Presentación planeamiento estratégico para odontólogosPresentación planeamiento estratégico para odontólogos
Presentación planeamiento estratégico para odontólogosMabelRamirez27
 
Estadistica para la toma de deciones
Estadistica para la toma de decionesEstadistica para la toma de deciones
Estadistica para la toma de decionesGuillermo Durango
 
MAUI POWER POLITICS – HAWAIIAN COMMERCIAL AND SUGAR CO. – THE POWER OF WATER
MAUI POWER POLITICS – HAWAIIAN COMMERCIAL AND SUGAR CO. – THE POWER OF WATER  MAUI POWER POLITICS – HAWAIIAN COMMERCIAL AND SUGAR CO. – THE POWER OF WATER
MAUI POWER POLITICS – HAWAIIAN COMMERCIAL AND SUGAR CO. – THE POWER OF WATER Clifton M. Hasegawa & Associates, LLC
 
160910地理空間情報を地域公共交通の活性化に活かす方法
160910地理空間情報を地域公共交通の活性化に活かす方法160910地理空間情報を地域公共交通の活性化に活かす方法
160910地理空間情報を地域公共交通の活性化に活かす方法Tomoko Yago
 
Tinder Foundation: Content with purpose
Tinder Foundation: Content with purpose Tinder Foundation: Content with purpose
Tinder Foundation: Content with purpose Together We're Better
 
BuzzFeed: Growing a global publishing network through tech, product and data ...
BuzzFeed: Growing a global publishing network through tech, product and data ...BuzzFeed: Growing a global publishing network through tech, product and data ...
BuzzFeed: Growing a global publishing network through tech, product and data ...Together We're Better
 
Autonomous RC car using gps
Autonomous RC car using gpsAutonomous RC car using gps
Autonomous RC car using gpsma_np
 
Puri sebatu resort
Puri sebatu resortPuri sebatu resort
Puri sebatu resortpuri sebatu
 
Rethinking the charity model: The story of charity: water
Rethinking the charity model: The story of charity: waterRethinking the charity model: The story of charity: water
Rethinking the charity model: The story of charity: waterTogether We're Better
 
15 Types of Interactive Content
15 Types of Interactive Content15 Types of Interactive Content
15 Types of Interactive ContentZembula
 

Destacado (15)

Presentación planeamiento estratégico para odontólogos
Presentación planeamiento estratégico para odontólogosPresentación planeamiento estratégico para odontólogos
Presentación planeamiento estratégico para odontólogos
 
Estadistica para la toma de deciones
Estadistica para la toma de decionesEstadistica para la toma de deciones
Estadistica para la toma de deciones
 
My CV (1) (3) (1)
My CV (1) (3) (1)My CV (1) (3) (1)
My CV (1) (3) (1)
 
Slide ao sito 2016
Slide ao sito 2016Slide ao sito 2016
Slide ao sito 2016
 
MAUI POWER POLITICS – HAWAIIAN COMMERCIAL AND SUGAR CO. – THE POWER OF WATER
MAUI POWER POLITICS – HAWAIIAN COMMERCIAL AND SUGAR CO. – THE POWER OF WATER  MAUI POWER POLITICS – HAWAIIAN COMMERCIAL AND SUGAR CO. – THE POWER OF WATER
MAUI POWER POLITICS – HAWAIIAN COMMERCIAL AND SUGAR CO. – THE POWER OF WATER
 
160910地理空間情報を地域公共交通の活性化に活かす方法
160910地理空間情報を地域公共交通の活性化に活かす方法160910地理空間情報を地域公共交通の活性化に活かす方法
160910地理空間情報を地域公共交通の活性化に活かす方法
 
Tinder Foundation: Content with purpose
Tinder Foundation: Content with purpose Tinder Foundation: Content with purpose
Tinder Foundation: Content with purpose
 
BuzzFeed: Growing a global publishing network through tech, product and data ...
BuzzFeed: Growing a global publishing network through tech, product and data ...BuzzFeed: Growing a global publishing network through tech, product and data ...
BuzzFeed: Growing a global publishing network through tech, product and data ...
 
Caries dental
Caries dentalCaries dental
Caries dental
 
Autonomous RC car using gps
Autonomous RC car using gpsAutonomous RC car using gps
Autonomous RC car using gps
 
Puri sebatu resort
Puri sebatu resortPuri sebatu resort
Puri sebatu resort
 
Humanvalues professional ethics
Humanvalues professional ethicsHumanvalues professional ethics
Humanvalues professional ethics
 
Rethinking the charity model: The story of charity: water
Rethinking the charity model: The story of charity: waterRethinking the charity model: The story of charity: water
Rethinking the charity model: The story of charity: water
 
SlideShare!!!
SlideShare!!!SlideShare!!!
SlideShare!!!
 
15 Types of Interactive Content
15 Types of Interactive Content15 Types of Interactive Content
15 Types of Interactive Content
 

Similar a Privatising Privacy

Social netwoks freedom of speech-dps indrapuram
Social netwoks freedom of speech-dps indrapuramSocial netwoks freedom of speech-dps indrapuram
Social netwoks freedom of speech-dps indrapuramKarnika Seth
 
Cyber Laws : National and International Perspective.
Cyber Laws : National and International Perspective.Cyber Laws : National and International Perspective.
Cyber Laws : National and International Perspective.Nilendra Kumar
 
Ethics in public governance and public administration
Ethics in public governance and public administrationEthics in public governance and public administration
Ethics in public governance and public administrationrandomhuman089
 
RTRTI EDUCATIONRTI ERTI EDUCATIONRTI EDUCATIONDUCATIONI.ppt
RTRTI EDUCATIONRTI ERTI EDUCATIONRTI EDUCATIONDUCATIONI.pptRTRTI EDUCATIONRTI ERTI EDUCATIONRTI EDUCATIONDUCATIONI.ppt
RTRTI EDUCATIONRTI ERTI EDUCATIONRTI EDUCATIONDUCATIONI.pptSukanya Devi
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importanceAditya Shukla
 
PPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIAPPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIAHardik Solanki
 
Cyber law in India: Its need & importance
Cyber law in India: Its need & importanceCyber law in India: Its need & importance
Cyber law in India: Its need & importanceAditya Shukla
 
Internet Security and Legal Compliance: Cyber Law in India
Internet Security and Legal Compliance: Cyber Law in IndiaInternet Security and Legal Compliance: Cyber Law in India
Internet Security and Legal Compliance: Cyber Law in IndiaRodney D. Ryder
 
cyber law its need importance.pdf
cyber law its need importance.pdfcyber law its need importance.pdf
cyber law its need importance.pdfkratoskkd
 
On the cybercrime act
On the cybercrime actOn the cybercrime act
On the cybercrime actCP-Union
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protectionatuljaybhaye
 
Cyber laws in India
Cyber laws in IndiaCyber laws in India
Cyber laws in Indiasaumi17
 
cyber crime and laws
cyber crime and laws cyber crime and laws
cyber crime and laws Aman Bhargava
 

Similar a Privatising Privacy (20)

Internet Freedom 2.1
Internet Freedom 2.1Internet Freedom 2.1
Internet Freedom 2.1
 
Social netwoks freedom of speech-dps indrapuram
Social netwoks freedom of speech-dps indrapuramSocial netwoks freedom of speech-dps indrapuram
Social netwoks freedom of speech-dps indrapuram
 
Cyber Laws : National and International Perspective.
Cyber Laws : National and International Perspective.Cyber Laws : National and International Perspective.
Cyber Laws : National and International Perspective.
 
Ethics in public governance and public administration
Ethics in public governance and public administrationEthics in public governance and public administration
Ethics in public governance and public administration
 
cyber .pptx
cyber .pptxcyber .pptx
cyber .pptx
 
RTRTI EDUCATIONRTI ERTI EDUCATIONRTI EDUCATIONDUCATIONI.ppt
RTRTI EDUCATIONRTI ERTI EDUCATIONRTI EDUCATIONDUCATIONI.pptRTRTI EDUCATIONRTI ERTI EDUCATIONRTI EDUCATIONDUCATIONI.ppt
RTRTI EDUCATIONRTI ERTI EDUCATIONRTI EDUCATIONDUCATIONI.ppt
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 
PPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIAPPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIA
 
Cyber law in India: Its need & importance
Cyber law in India: Its need & importanceCyber law in India: Its need & importance
Cyber law in India: Its need & importance
 
Internet Security and Legal Compliance: Cyber Law in India
Internet Security and Legal Compliance: Cyber Law in IndiaInternet Security and Legal Compliance: Cyber Law in India
Internet Security and Legal Compliance: Cyber Law in India
 
cyber law its need importance.pdf
cyber law its need importance.pdfcyber law its need importance.pdf
cyber law its need importance.pdf
 
Privacy and Privacy Law in India By Prashant Mali
Privacy and Privacy Law in India By Prashant MaliPrivacy and Privacy Law in India By Prashant Mali
Privacy and Privacy Law in India By Prashant Mali
 
On the cybercrime act
On the cybercrime actOn the cybercrime act
On the cybercrime act
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protection
 
Cyber
CyberCyber
Cyber
 
Cyber laws in India
Cyber laws in IndiaCyber laws in India
Cyber laws in India
 
IT ACT 2000
IT ACT 2000IT ACT 2000
IT ACT 2000
 
Cyber law
Cyber lawCyber law
Cyber law
 
cyber crime and laws
cyber crime and laws cyber crime and laws
cyber crime and laws
 
Sec Wars Episode 3
Sec Wars Episode 3Sec Wars Episode 3
Sec Wars Episode 3
 

Último

“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdfMuhammad Subhan
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch TuesdayIvanti
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxFIDO Alliance
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTopCSSGallery
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Hiroshi SHIBATA
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...ScyllaDB
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfFIDO Alliance
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...FIDO Alliance
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightSafe Software
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Patrick Viafore
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewDianaGray10
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfFIDO Alliance
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingScyllaDB
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfFIDO Alliance
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe中 央社
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfFIDO Alliance
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxFIDO Alliance
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...FIDO Alliance
 

Último (20)

“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 

Privatising Privacy