A General Perspective On Overlapping of Right
A General Perspective On Overlapping of Right
ISSN No:-2456-2165
Abstract:- Eschewing the set of all freedoms, the inexpensive and ready to access personal information pool
concept of liberty sits at the soul of a democratic which increments every single second, and if not handled
structure. Associated with varying connotations in carefully might lead to severe exploitation.
different jurisdictions, Article 21 of Indian Constitution
qualifies its enjoyment with the term ‘personal’ unlike Internet privacy is economically important since it
its U.S. counterpart; probably the reason for reluctance assures consumers that their personal particulars will not be
of Indian Courts to recognize privacy as an essential released to unauthorized persons. 3 Its infringement thus
ingredient of personal liberty for a long time. 1 Indian poses great threat by breaching the trust of a user,
Jurisprudence is now settled on the issue of privacy and detrimental to both social and economic interests. The risks
its safeguards in the modern era 2 , it is nevertheless it can generate include the theft of sensitive user data such
bound to face a resilient challenge while extending the as transaction PINs, bank account numbers, etc. The
guarantee in online sphere. situation is worsened by the injection of malwares which
damage both the computer resources and the data.
Online privacy being a mammoth subject; it is
impossible to discuss all of its facets and the authors As far as the safeguard(s) of online privacy is
have confined the discussion to the most prominent concerned, Germany is probably the first jurisdiction to
privacy concerns associated with data handling and recognize online privacy after the abuse of information by
analysis, with special reference to the legal framework state agencies, followed by Sweden where the high flow of
in India. The objective is therefore twofold: firstly, to personal information on the internet enabled a person to
determine the efficiency of national laws in ensuring access all income tax returns by hunch of a few clicks.
online privacy by addressing its massive infringement State agencies have ensured the security of online data by
by websites and the incapability of law in curbing it the system of encryptions, wherein no third party is legally
(Part III) and secondly, to suggest plausible remedies allowed to intervene and extract the input data. In India,
for the inherent flaws that exist therein considering the Information Technology Act, 2000 takes into consideration
legal mechanism adopted in countries with a much the system of key pair encryption for the recording and
matured understanding of privacy concerns (Part IV). authentication of digital signatures. 4 The system though
Setting the stage, Part II provides an insight into the secure, is not infallible and there are innumerable instances
concept of online privacy, the pivotal role it plays in life of information being accessed by third parties.
and its infringement by exploitation of the cyber
information pool while Part V contains the conclusive Privacy interests are further jeopardized by the data
remarks of the author. collection done by websites, both explicitly and impliedly.
Though one might wonder that the pop-up advertisements
Keywords:- Right to Privacy, ICT, Technology, IT Act. share utter relevancy with their cyber activities, majority of
internet users are unaware of the fact that items such as
I. INTRODUCTION banner ads, search queries, etc. are actually information
receptors to Marketing Companies. They are happy to surf
The classic meaning of privacy, i.e., ‘to be let alone’ as long as no information is sought explicitly, and thus
is the structural foundation that defines privacy in modern arises the need for massive state intervention to assure
states. Extension of this foundational principle can be made online privacy.
to the realm of Internet. Privacy can therefore be assumed
to be the security of personal data published through cyber Cognizant of the outcomes of privacy infringement,
means. It is a great cause of concern regardless of the there are multiple international directives such as OECD
services a user plans to avail, ranging from random social Privacy Guidelines, EU Data Protection Directivesand
networking to huge monetary transactions. Convergence of APEC Privacy Framework; all of which are designated to
computers with telecommunications and the advent of nullify the draconian effects of technology on privacy.
smart phones have paved way for an atmosphere of Principles such as notice, consent, collection and usage
limitation, access and corrections and openness cut across
1
Kharak Singh v. State of U.P., AIR 1963 SC 1295
2 3
See K.S. Puttaswamy v. Union of India, 2017 SCC Nandan Kamath, Law Relating to Computers, Internet and
OnLine SC 996, Maneka Gandhi v. Union of India, AIR E-commerce, 287 (5th ed., 2012)
4
1978 SC 597; Ram Jethmalani v. Union of India, (2011) 8 Vakul Sharma, Information Technology Law and Practice,
SCC 1. 111 (3rd ed., 2011)
18
Guidance on the rules on use of cookies and similar
technologies, The Privacy and Electronic Communications
(EC Directive) Regulations, 2003, available at
https://ico.org.uk/media/for-
organisations/documents/1545/cookies_guidance.pdf, last
seen on 27/03/2019.
19
Olivia Wilson, Revenge Porn Is More Than a Violation of
Privacy: It Is Digital Sexual Assault, The Huffington Post
(26 June 2015), available at
http://www.huffingtonpost.com/olivia-wilson/revenge- 22
porn-is-more- Ibid.
23
than_b_7641876.html?ir=India&adsSiteOverride=in, last Ministry of Information and Communications
seen on 27/03/2019 Technology, Government of India, No. 14 (74)/2014-ESD,
available at http://sflc.in/wp-content/uploads/2015/04/RTI-
20
Sandhya Soman, The seedy underbelly of Revenge Porn, blocking-final-reply-from-DEITY.pdf, last seen on
Times of India (23 August 2015), available at 28/03/2019
24
http://timesofindia.indiatimes.com/tech/computing/The- S.72, The Information Technology Act, 2000.
25
seedy-underbelly-of-revenge- Danielle Keats Citron, Mary Anne Franks,Criminalizing
porn/articleshow/48627922.cms, last seen on 27/03/2019 Revenge Porn, 49 Wake Forest Law Review 314, 345
21
Sunil Abraham, Elonnai Hickok, TarunKrishnakumar, (2014).
26
Security: Privacy, Transparency and Technology, 2 CyFy S. 3, Privacy Bill, 2011.
27
Journal 107, 109 (2015). S. 5, Privacy Bill, 2011.
28
Avner Levin and Mary Jo Nicholson, Privacy Law in the
United States, the EU and Canada: The Allure of the
Middle Ground, 7 University of Ottawa Law and
Technology Journal 327, 330 (2015).
29
Ibid, at 332
30
Supra 4, at 400
31
Certification Standards, Truste, available at
https://www.truste.com/privacy-certification-standards, last
seen on 29/03/2019