Right To Privacy and Data Protection
Right To Privacy and Data Protection
- Sumaiyah Fathima
The manipulation of digitalized storages and transactions in this technological and cashless
economy has been rapidly increasing which has instigated India to scrutiny the protection of
data and privacy rules by enacting disparate pieces of legislation. Though these laws are not
defined exclusively for the data protection, however the courts on several occasions have
interpreted ‘data protection’ with the ambits of ‘right to privacy’. As we celebrate the
Supreme Court’s unanimous verdict on privacy being a fundamental right, it is worth
exploring the changing technological landscape within which this right will play out. Now
India is waging towards the future call of Robust Regime. While a constitutional right to
privacy will undoubtedly limit the states intrusive power over individuals, the full potential of
this right will only be realized by data protection laws that will tyrannize how private
companies collect and use data.
This paper would focus on the lack of genuinely independent data protection system of
regulators and the needs for implementation of legal structure like those followed in other
countries and other exhortations that would actually result in the increase of surveillance of
individuals, so the trust of public can be maintained.
Privacy is not an option, and it shouldn’t be the price we accept for just getting on
internet.
-Gary Kovaus
Introduction
Privacy is a valuable aspect of personality. In modern society, right to privacy has been
recognized both in eyes of law and in common parlance. The right to privacy refers to
specific right of an individual to control the collection, use and disclosure of personal
information. Personal information could be in the form of personal interests, family records,
communication records, medical records, and financial records to name a few. The global use
of interest for electronic communication and e-commerce over the past few years has become
a common phenomenon of modern life. No doubt that it has fascinated our life, but the
convergence of innovative technology paves way for easy access and communication, which
abuses the privacy rights and increase cybercrimes to a peak.
The immense concern about the privacy and data protection has increased worldwide as a
consequence of expansion in technology and online environment. So the surveillance
potential of powerful computer systems prompt demands for specific rules governing the
collection and handling of personal information. The protection of personal data is the key
object of data protection which is the security of information and privacy in the computerized
society.
So, the privacy is a right whilst data protection is the legislation which implements that right.
Countries around the world have enacted different laws to protect the privacy of individuals.
But in India, the right to privacy has been interpreted as an unarticulated fundamental right
under the Constitution of India. The specific regulatory bodies seems to be lagging in
aligning their policies to evolving security and privacy challenges. The Indian judiciary is in
urgent need to take a pro-active role in protecting this right.
This paper proposed policy recommendations to the key entities that are in a position to make
a difference in current state of the privacy and protection of data.
History
World’s first computer specific statute was enacted in the form of a Data Protection Act, in
the German state of Hesse, in 1970.
1) The misuse of records under the Nazi regime had raised concerns among the public
about the use of computers to store and process large amounts of personal data.
2) The Data Protection Act sought to heal such memories of misuse of information. A
different rationale for the introduction of data protection legislation can be seen in the
case of Sweden which introduced the first national statute in 1973.
3) Here, data protection was seen as fitting naturally into a two hundred year old system
of freedom of information with the concept of subject access (such a right allows an
individual to find out what information is held about him) being identified as one of
the most important aspects of the legislation.
4) In 1995, the European Union adopted its Directive (95/46/EC) of the European
Parliament and of the Council of 24 October 1995 on the protection of individuals
with regard to the processing of personal data and on the free movement of such data
(hereinafter, the Directive), establishing a detailed privacy regulatory structure.
5) The Directive is specific on the requirements for the transfer of data. It sets down the
principles regarding the transfer of data to third countries and states that personal data
of EU nationals cannot be sent to countries that do not meet the EU “adequacy”
standards with respect to privacy.
6) In order to meet the EU “adequacy” standards, US developed a ‘Safe Harbour’.
7) Framework, according to which the US Department of Commerce would maintain a
list of US companies that have self-certified to the safe harbor framework. An EU
organization can ensure that it is sending information to a U.S. organization
participating in the safe harbor by viewing the public list of safe harbor organizations
posted on the official website.
Data Protection law in India is included in the Act [17] under specific provisions. Both civil
and criminal liabilities are imposed for violation of data protection.
1) Section 43 deals with penalties for damage to computer, computer system etc.
2) Section 65 deals with tampering with computer source documents.
3) Section 66 deals with hacking with computer system.
4) Section 72 deals with penalty for breach of confidentiality and privacy. Call centers
can be included in the definition of ‘intermediary’ and a ‘network service provider’
and can be penalized under this section.
These developments have put the Indian government under pressure to enact more stringent
data protection laws in the country in order to protect the lucrative Indian outsourcing
industry. In order to use IT as a tool for socio-economic development, employment
generation and to consolidate India’s position as a major player in the IT sector, amendments
to the IT Act, 2000 have been approved by the cabinet and are due to be tabled in the winter
session of the Parliament.
A landmark judgment with respect to this issue is Kharak Singh v. State of U.P. The
Supreme Court held that the right of privacy falls within the scope of Article 21 of the
Constitution and therefore concluded that an unauthorized intrusion in to a persons’ home
and disturbance caused to him is in violation of personal liberty of the individual.
However, in Gobind v. State of Madhya Pradesh, the Supreme Court qualified the right to
privacy and held that a violation of privacy could be possible under the sanction of law.
The scope and ambit of the right of privacy or right to be left alone came up for
consideration before the Supreme Court in R. Rajagopal v. State of T.N. during 1994. In
this case the right of privacy of a condemned prisoner was in issue. By interpreting the
Constitution in light of case law from the United Kingdom (“UK”) and United States (“US”),
Justice B.P. Jeevan Reddy held that though the right to privacy was not enumerated as a
fundamental right, it could certainly be inferred from Article 21 of the Constitution.
Another significant case related to the right of privacy was the People's Union of Civil
Liberties v. the Union of India. The case was primarily involved with the issue of 'telephone
tapping' and held that tapping a person’s telephone line violated his right to privacy, unless it
was required in the gravest of grave circumstances such as public emergency.
While it may seem that the right to privacy is adequately protected as a fundamental right, it
is essential to keep in mind that barring a few exceptions, fundamental fights secured to the
individual are limitations only on State action. Thus, such an interpretation will not protect an
individual against the actions of private parties.
The nine-judge bench of the Supreme Court has unanimously delivered its judgment in
Justice K.S. Puttaswamy (Retd.) v. Union of India holding that privacy is a
constitutionally protected right which not only emerges from the guarantee of life and
personal liberty in Article 21 of the constitution, but also arises in varying contexts from the
other facets of freedom and dignity recognised and guaranteed by the fundamental rights
contained in Part III of the Indian constitution.
The right to privacy judgment is one of the most landmark judgments of independent India. It
not only learns from the past, but also sets the wheel of liberty and freedom for future. The
Supreme Court of India has once again emerged as the sole guardian of the Indian
constitution.
3. Cyber Crime and Warfare: Crime syndicates including terrorists are increasingly visible.
New age cybercrimes increasingly attack the end users; increasing digitization of the end
users’ information aggravates this problem multifold. E-Governance applications are obvious
targets of these attacks that come from cyber criminals or nation states, indulged into cyber
warfare capabilities. Critical sectors like banking also offers lucrative target to them. This
poses a great challenge to an individual, who is willingly or unwillingly, become a part of the
cyber space. This lead to an unprecedented scene, where the significant section of population
is exposed to grave threats that are international in nature.
7. Arbitrary and unlawful interference: by the Government and private parties– The
legislation must ensure that an individual’s right to privacy is not interfered with in an
arbitrary and unlawful fashion. Presently, judicial precedents prohibit violation of the right to
privacy of an individual by Government agencies. A comprehensive law must provide for
protection from intrusion by the Government as well as private parties.
It must also try and prohibit/curtail the use of cutting-edge technology to trespass upon
privacy rights and personal data. Presently, the right to privacy on the Internet is being
threatened due to several elements such as web cookies, unsafe electronic payment systems,
Internet service forms, browsers and spam mail.
8. Medical records: Historically, medical records were used largely by physicians and
medical insurers. However, with the creation of electronic records and large databases of
medical information, the number of health care professionals and organizations with access to
medical records has increased. It is essential that such data is not collected and sold to
researchers in the field biomedical science, without the consent of the patients. With the
advent of the internet, it has become increasingly difficult to track such data and not only
does it amount to an invasion of privacy, but it also amounts to breach of the duty of
confidentiality that medical professionals owe their patients.
9. Financial records: Financial records of individuals must also be protected from being
distributed and circulated among banks and financial companies as it may also result in the
misuse of such information.
International Standards
The European parliament and the Council of the EU passed the Data Protection
Distinct from all other major human rights, document protection of people’s data has been
included as one of the fundamental rights of the EU under Article 8 of the charter of the
Fundamental Rights of the European Union. The EU directives are mainly aimed at
facilitating the development of electronic commerce by fostering consumer confidence and
minimizing differences between member state’s data protection rules. The core data
protection principle is the fair and lawful processing of personal information.
The information must be obtained for one or more specified and lawful purposes and must be
relevant to the purpose for which they are processed. The data should not be stored for longer
than is necessary for the specified purpose. Further, both the controller and processor are
under an obligation to enforce appropriate technical and organizational measures to protect
against unlawful processing. The processor is subject to the same stringent conditions
imposed on the controller, who remains under a further obligation to monitor the processor’s
compliance with the security measures for the durations of agency.
In order from the data controller the unclear impact of the “adequacy” standard on personal
data transfers from the EU countries to other countries which do not have an act protecting
privacy of all personal data transfers or an agency which monitored security of personal data,
the other countries would be “inadequate” by European standards.
The United States has about 20 sector specific or medium-specific national privacy or data
security laws and hundreds of such laws among its 50 states and its territories. California
alone has more than 25 state privacy and data security laws.
In addition, the large range of companies regulated by the Federal Trade Commission(FTC)
are subject to enforcement if they engage in materially unfair or deceptive trade practices.
The FTC has used this authority to pursue companies that fail to implement reasonable
minimal data security measures fail to live up to promises in privacy policies or frustrate
consumer choices about processing or disclosure of personal data. The FTC now considers
information that can reasonably be used to contact or distinguish a person, including IP
addresses and device identifiers, as personal data. The FTC has jurisdiction over most
commercial entities and has authority to issue and enforce privacy regulations in specific
areas (Ex. For telemarketing, commercial email and children’s privacy).
Option rules apply in special cases involving information that is considered sensitive under
US law, such as for health information, use of credit reports, student data, personal
information collected online from children under 13, video viewing choices, precise geo
location data, and telecommunication usage information.
A few states have enacted laws imposing more specific security requirements for data
elements that trigger security breach notice requirements. Both Nevada and Massachusetts
laws impose encryption requirements on the transmission of sensitive personal information
across wireless networks or beyond the logical or physical controls of an organization, as
well as on sensitive personal data stored on laptops and portable storage devices.
HIPAA security regulations apply to so-called ‘covered entities’ such as doctors, hospitals,
insurers, pharmacies and other health-care providers, as well as their ‘business associates’
which include service providers who have access to, process, store or maintain any protected
health information on behalf of a covered entity. ‘Protected health information’ under HIPAA
generally includes any personally identifiable information collected by or on behalf of the
covered entity during the course of providing its services to individuals. An important step
taken in the US towards the protection of privacy on the Internet was the enactment of
Children's Online Privacy Protection Act (COPPA). Under the rule, commercial websites and
online services directed to children under 13 or that knowingly collect information from them
must inform parents of their information practices and obtain verifiable parental consent29
before collecting, using, or disclosing personal information from children.
Japan
After European Union, Japan introduced a separate central legislation for protection of data
as the Act on the Protection of Personal Information(APPI). The Act took partial effect in
2016 and has been enforceable from May 30, 2017. The law defines the scope of the
legislation and states on whom the law is applicable under Article 2-4 of the APPI. As per the
Act, it is applicable to four entities- state institutions, local public bodies, independent
administrative agencies and an entity not having over 5,000 individuals’ personal information
for more than six months. Similar to the EU law, consent of a data subject forms the essence
of the legislation and has been stated as mandatory in case of transmitting data to a third party
or for any use beyond communication purposes.
There was need to diminish the divide between the United States and the European
Community who adopted different approaches to privacy protection to their citizens.
Following extensive discussions, the EU Working Party and the US Department of commerce
agreed that the department would compile a publicly accessible list of companies that provide
adequate protection for personal data. Companies and individuals that subscribe to certain
safe harbour principles will be able to secure protection against future data blockages.
The agreement between the European Union and the United States rests on seven safe
harbour principles: notice, choice, onward transfer, security, data integrity, access and
enforcement. India could incorporate these principles while formulating legislation in this
behalf.
Notice - The data subject must be given notice in clear language, when first asked for
personal data, of the purpose of data collection, the identity of the data controller, the kinds of
third parties with whom the data will be shared, how to contact the organization collecting or
processing the data, and the choices available for limiting use or disclosure of the
information.
Choice - The data subject must be given clear, affordable mechanisms by which he or she
can opt out of having personal information used in any way that is inconsistent with the stated
purposes of collection.
Onward transfer - Where the data controller has adhered to the principles of notice and
choice, it may transfer personal data if it ascertains that the receiving party also complies with
the safe harbor principles, or if it enters into a contractual agreement that the receiving party
will guarantee at least the same level of data protection as the transmitting party. When
disclosure is made to a third party that will perform under instructions of the data controller,
it is not necessary to again provide notice or choice, but the onward transfer principle
continues to apply.
Security - The data controller must take reasonable precautions to protect data from loss or
misuse, and from unauthorized access, disclosure, alteration or destruction.
Data integrity - The data controller must take reasonable steps to ensure that data are
accurate, complete and current.
Access - Data subjects must have reasonable access to their personal data and an opportunity
to correct inaccurate information.
1) For the success of policy initiatives that can really create an impact, entities, including
2) Government and private, need to work in tandem. Each of these entities, in their
respective
3) Capacity can bring the necessary change that promotes a culture of privacy.
4) Privacy by design is a trilogy model ewhuch could extend the encompassing
application through
i. IT systems;
ii. Accountable business practices;
iii. Physical design and infrastructure. It advocates a proactive approach, which relies
on preventive measures of an organization to gain confidence to the end users.
Data Security Council of India has come up with a privacy framework known as
DSCI.
5) Privacy Framework which helps the organizations establish a privacy function that is
based on visibility of information, intelligence over regulatory compliance, and
privacy principles, policies and processes. Different frameworks, practices,
technology measures and processes that embed into an organization’s culture lead to a
situation where privacy is treated as a hygiene factor in its operations.
6) End user education among the various measures that are advocated to build a privacy
culture in India, education of end users is particularly important. Majority of them
would be the first time users of the IT systems. With technology being seen as a
means to achieve financial inclusion, there has been increased investment in the e-
Governance projects. Simultaneously, growing private investment in the technology
will bring the entire population of the country under the fold of cyber age. This is
being done irrespective of how equipped the end users are to understand the dangers
of the cyber space. End user’s awareness of how his or her personal information is
being collected, used, processed, shared and stored and how organizations and
individuals can misuse this information will go a long way in creating a privacy
culture. End user’s awareness of the legal protection available to guard his or her
personal rights , in case of any breach pertaining to the personal information, will
definitely serve as an effective check on organizational practices in respect of
processing the personal information. High level end user awareness will also help
deploy trust mechanisms
7) The role of Self-regulation in data protection increasingly has been established as an
effective step. Self-regulation reduces administrative bureaucracy and promises to
bring efficiency in the data protection processes. A self-regulatory initiative has
become now a useful instrument that not only supplements a legislative framework of
an organization but also brings a required dynamism in the protection. United States
has a long tradition of self-regulation. The best practices approach as a practical and
realistic way to enhance global adherence to the data security standards.
8) Harmonize the legal framework which regulate communications surveillance in India
to ensure that the law is accessible and clear, and meets India’s international human
rights obligations;
9) Establish an independent and effective oversight mechanism with a mandate to
monitor all stages of interceptions of communications to ensure they are compliant
with India’s domestic and international obligations to respect and protect the right to
privacy and other human rights;
10) Establish independent accountability mechanisms and clear standards for India’s
security and intelligence agencies to ensure they are subject to independent oversight
mechanisms and guarantee transparency of their mandate and operations in
accordance with international human rights standards;
11) Review and reform the regulations regarding export and import of surveillance
technologies to and from India and review all licensing agreements which impose
obligations on the private sector to facilitate and/or conduct communication
surveillance, and take the necessary measures to ensure that the private sector – in
both policy and practice – comply with international human rights law and standards;
12) Review the proportionality of data retention requirements placed on
telecommunications companies also adopt and enforce a comprehensive data
protection legal framework that meets international standards, applies to both the
private and public sector, and establish an independent data protection authority that
is appropriately resourced and has the power to investigate data protection breaches
and order redress.
13) Government of India, under the amended IT act, which is under progress, should set
guiding principles for privacy in line with the globally recognized privacy principles.
They can establish a national ecosystem that is continuously engaged for the data
protection cause, issue guidelines and standards that provide practical guide
government departments, e-Governance projects and private sectors and establish a
mechanism for data breach notifications that mandates organizations to report the data
breaches.
14) Attributes of humanity and democracy principles change with technology. Civil
societies should proactively take data privacy in their agenda and vigilant review or
monitoring of private organization’s practices that processes personal information.
15) Augment skills to deal with technology matters that impact the end users under cyber
security concepts and how cybercrimes are perpetrated, and develop investigative
techniques for such crimes.
16) Issue specific and more granular set of guidelines and standards that control industry
practices pertaining to processing of personal information.
17) Build a Risk and Compliance Intelligence mechanism that closely tracks global data
protection regimes, and their impact on trans-border data flows.
Conclusion
The threat of privacy is also an obstacle towards facilitating a secure environment for
communication over the Internet. Unless these issues are addressed India cannot take full
advantage of the tremendous opportunities and benefits that e-commerce presents to
developing nations such as ours. With the passage of time the ‘global village’ is being
surrounded by and thickly populated by these advancements and technology related
developments where skies are the limit, therefore, every forthcoming minute is a challenge.
Since it is always difficult to predict that what is going to happen in future but keeping in the
view the desires of mankind and speed of technological innovation it can be said that the
future is going to be more demanding and threats to our privacy and personal information are
high which requires much effective data protection mechanism.
A legal framework needs to be established setting specific standards relating to the methods
and purpose of assimilation of personal data offline and over the Internet. Consumers must be
made aware of voluntarily sharing information and no data should be collected without
express consent. India could also follow the regimes like those followed in other countries in
order to overcome the data protection insecurities. The future of India’s trade depends on
striking an effective balance between personal liberties and secure means of commerce.
Reference
The Right to Privacy in India: Stakeholder Report Universal Periodic Review 27th Session-
India. By Centre for Internet and Society
Guidelines on the Protection of Privacy and Trans Border Flows of Personal Data :
http://www.oecd.org/dsti/sti/it/secur/prod/PRIV-EN.HTM (As visited on April 18, 2002)