Student Disseration 1st April Final
Student Disseration 1st April Final
1 INTRODUCTION
CHAPTER 1:
INTRODUCTION
The phrase "data is the new oil" is used frequently. The importance of data has increased over
the past few decades to previously unheard-of levels in an increasingly digitalized world,
including India. The majority of cyber security incidents that have occurred in India recently
have been motivated by data theft. Health data, financial data, and other critical personal and
sensitive data have all been hacked by cybercriminals on several occasions. Due to the
absence of strict data security legislation in India, many cases of data breaches, such as the
hacking of social media accounts6, the theft of credit and debit card information, and other
The Aadhar Database, which contains the individually identifiable information of over 1.3
billion Indians, was purportedly accessible for a pitiful 500 INR7 through an explosive
allegation made in an investigative article that was published in The Tribune Newspaper in
2018. Think tanks and the international media accurately labeled the Aadhar leak as the
largest data breach in history. Furthermore, India is second only to the United States in terms
of data breaches, accounting for almost 37% of worldwide data breaches8, according to a
research released by digital security company Gemalto. The numerous breaches of data in an
increasingly data-driven economy have brought to light the gap left by India's lack of a strong
The purpose of this study is to identify the gaps in our data protection framework by
examining the current and forthcoming data protection legislation in India and contrasting
them with those of advanced data protection regimes. India is particularly concerned about
data privacy regulation for several reasons, chief among them being the country's enormous
population. With more than 500 million Internet users and a growth rate of more than 8%
annually, India is now the largest market in the digital economy. India's digital economy is
The difficulties in resolving issues brought on by extensive transactions made through digital
media may quickly materialize.The use of digital space in the finance sector has increased
recently in India as well. However, with the introduction of more sophisticated technologies
and the government's aggressive stance to support digital transactions following the
demonetization, the use of data has become even more significant and vulnerable to misuse at
the same time. The rise in the number of Indians using digital payment systems such as
Google Pay, BHIM, Paytm, and several other start-ups enabling digital transactions is
evidence that they have reached an era when these digital channels have becomean essential
component of our life, therefore ensuring proper security for these transactions requires a
The danger to informational privacy is now more serious than ever due to the widespread use
of high-speed Internet throughout the nation. Even though the digital economy has created a
now more crucial than ever to have strong laws in place to guarantee the highest level of
According to definitions, one of the legal ideas that is hardest to pin down to a single
meaning is data protection. Legal experts have stated that "data protection" is a catch-all
phrase used to describe any activity related to handling personal data. Sweden's Data Act, the
first data protection legislation ever, was approved in 1973, over 50 years ago, and went into
force the following year. It is now prohibited for any individual or organization to handle
personal data using any sort of information technology without a license, according to the
Swedish Data Protection Authority. The progressive people of that nation in Scandinavia had
grown worried in the late 1960s about the increasing usage and storage of personal data, and
Data protection is the term used to describe the procedures, security measures, and legally-
mandated guidelines implemented to secure your personal data and guarantee that you
maintain control over it. In a nutshell, you should be free to decide what information you
disclose, with whom, for what length of time, and for what purpose. You should also be
Personal data" and "processing" are two components of data protection regulations that go on
to define the majority of their meaning. Due diligence is necessary because these two ideas
are important to the examination of the underlying reasoning behind the data protection laws.
Since the definition of "processing" is as broad as the data protection legislation as a whole, it
should be read broadly to increase the scope of the protections it affords. Any material
operation that directly affects data is referred to as processing. This includes gathering,
The majority of sophisticated data protection policies advocate for interpreting the phrase as
broadly as feasible. It is inevitable that the fundamental goal of having a data protection law
would be undermined by a broadly construed definition of the term "processing." The idea of
"Personal Data" is, of course, the second facet of the Data Protection Laws. Anything that
may be used to uniquely identify a person or information that can be connected to their
identity is included in the term. In accordance with this same logic, European Union courts
have used the "personally identifiable" information test24, which establishes whether or not a
protection regulations. Having said that, data protection laws may be defined as a body of
regulations that safeguard the sharing, gathering, application, deletion, storage, and
destruction of any information that could be used to identify an individual. In this case,
protection entails handling personal data with an acceptable level of fairness in accordance
with accepted standards. But the idea of informational autonomy and self-determination has
grown jurisprudentially, and data protection regulations today refer to more than just the fair
determine whether or not their personal data can be exposed in the first place7.
free democratic community, it has been suggested that inadequate autonomy in exercising
informational self-determination "would also impair the common good". This claim is based
on the observation that data protection is occasionally viewed as a subset of the right to
privacy.But most of this discussion is limited to the European Constitutional Courts, so it will
be covered in more depth at the proper time. As previously mentioned, data protection has
changed from being a tool to prevent unauthorized access to citizens' sensitive and personally
identifiable information to being a fundamental component of the social order that views the
The normative truth that the data protection legislation and the right to privacy are
inextricably linked cannot be disputed. The relationship between the right to privacy and the
right to data protection is concrete, notwithstanding the theoretical differences between these
two hazy concepts. The right to privacy has been acknowledged as a basic right, which is the
basis for the claim that data protection regulations have evolved to be regarded as such.
Along these same lines, the Indian Supreme Court has instructed the Central government to
draft a data protection code. only after determining that the right to privacy is an integral
component of the freedom and right to life as specified under Article 21 of the Indian
Constitution. That removes no question from the fact that the purpose of data protection laws
is to safeguard the private rights of the people who are under their care. However, for the
purposes of the Data Protection laws, there must be a clear understanding of the right to
privacy in a nation like India where the body of legal precedent around this right is still
developing.
Comparable to the Data Protection Law, the right to privacy is a vague notion that has caused
definition. However, a clear and logical understanding of the right to privacy is required in
order to carry out the fundamental goal of data protection regulations. Due to the dearth of
it. Additionally, and perhaps more crucially, data protection regulations themselves ought to
be sufficiently expansive to clearly define the meaning and extent of the right to privacy.
There are advantages and disadvantages to not clearly defining the right to privacy. It could
be advantageous inasmuch as the absence of a definition gives the judge plenty of leeway to
interpret it broadly. Since the world of technology is always evolving and seeming to reinvent
itself, it could be preferable for the general public, democracies, and the rule of law to
maintain an as flexible an interpretation of the right to privacy as possible. What the most
accurate definition of the right to privacy is has been hotly debated The vast body of research
on the subject of the relationship between data protection legislation and the right to privacy
argues that information control and the right to informational self-determination are related.
In the context of data protection, one of the most often cited interpretations of the right to
privacy is that "Privacy is the claim of individuals, groups, or organizations to select for
themselves whenhow and how much information is shared about them with others. The "right
to self-determination" has a powerful allure for the populace in any democratic setup, which
is the only explanation for its acceptance and popularity. Strictly speaking, no data protection
regulation can offer total informational self-determination, but what a strong law can
The right to privacy has historically been understood in a more traditional and widely held
sense as the right to be left alone. This method views the right to privacy as including non-
anonymity, and solitude" are the three pillars of the right to privacy. The foundational work
of Samuel D. Warren and Louis D. Brandeis, which established the framework for the
recognition of the right to privacy as a separate right, must always be mentioned in any
“Based on these considerations, it can be concluded that the protection of ideas, feelings, and
emotions expressed through writing or the arts, to the extent that it prevents publication, is
just an example of upholding an individual's more general right to privacy. Similar rights
include the freedom from abuse or beatings, the freedom from imprisonment, the freedom
from venomous prosecution, and the freedom from defamation. These rights, like all other
legally recognized rights, are characterized by the nature of ownership or possession. Since
this is what makes property unique, it may be appropriate to discuss these rights.
The principle which protects personal writings and all other personal productions, not
against theft and physical appropriation, but against publication in any form, is in reality not
These characteristics are taken into account by several data protection standards in order to
guarantee that people receive the highest level of protection. The idea of the right to be left
alone is the origin of data protection principles including the right to erasure, the fairness of
processing principle, and the purpose restriction principle. The revelation of sensitive
material is yet another way to link data protection with the right to privacy46. Sensitive
documents are often ones that include information that might reveal a person's identify, such
There exists a great deal of controversy among academics regarding the efficacy of this
strategy because it is quite possible that in this Big Data era, information that would not
normally be considered sensitive could be collected and processed in a way that would render
it sensitive. The Supreme Court of India decided to embrace the informational self-
determination method while retaining the key components of these many theories about the
Above all, the individual's right to privacy acknowledges an unalienable right to choose how
their freedom will be used. It is possible for someone to believe that being silence is the
mirror of their spirit. A writer conveys the idea that results from a mental process. A musician
muses over notes that, when played, produce silence. The inner quiet reflects on one's
capacity to communicate ideas and thoughts or engage in social interactions. These are
essential components of becoming a person. When a person has the freedom to choose what
they want, they can use their rights under Article 19. When interpreted in combination with
Article 21, liberty gives people the freedom to choose how and what they eat, how they dress,
what religion they practice, and a host of other choices.various issues where making a
decision in private of the mind is necessary for autonomy and self-determination. The
capacity to select a faith and the freedom to publicly express or not publicly express such
choices are inalienably linked to the constitutional right to freedom of religion under Article
25. These are a few examples of how privacy promotes freedom and is necessary for
The passage demonstrates the significance that the Indian Supreme Court has placed on the
right to privacy. Whatever happens, this historic ruling will have a long-term impact on how
India's data protection rules are interpreted in the future. The Bill states that "sensitive
personal data may only be transferred outside of India for the purpose of processing" but that
"critical personal data" is exempt from this restriction. The feminist school of jurisprudence
has heavily criticized the interpretation of the right to privacy in its physical, functional, and
institutional aspects since it is long viewed as a barrier to gender equality. The feminist
school views the right to domestic privacy as a tool to applaud the subjugation of women in
their households. This interpretation has been criticized time and time again for being used to
protect the power disparities within the families.by the constitutional scheme's exclusions
under the pretense of privacy. One tool to "defend the exemption of marital rape from sexual
assault laws, and to discourage state interference with domestic violence or child abuse" is
Data Protection Bill have also caused considerable worry among privacy experts and IT
businesses. These include provisions that will enable the Center to request the disclosure of
anonymized personal data or "other non-personal data" to any "data fiduciary or data
The proposed Indian Data Protection Act of 2019 resembles modern international norms,
such the right to be forgotten, at first glance. Some restrictions are more contentious and may
limit some corporate activities, like as the need to keep sensitive data in systems situated
inside the subcontinent. Additionally, the draft bill says that non-personal data regulation for
the digital economy might be framed by the central government. To facilitate improved
Government, it can specifically order any data processor to "provide any personal data
India's position is somewhat reversed in the final Bill, which states that while "sensitive
personal data may be transferred outside India," it should still be kept in the nation. But it's
still unclear what the lawmakers intended to achieve when they passed a robust data privacy
legislation.
By avoiding the common traps, India might greatly benefit from the experiences of the
nations that are recognized to have robust data protection regulations in place. It is especially
crucial to address data privacy concerns that may have transnational implications in India, as
the country and the rest of the globe move toward a more digitalized and globalized society.
The researcher would consider it beneficial to discuss the accepted principles of data
protection in the developed world, particularly in the EU, as well as the legislation in these
jurisdictions in order to present a compelling case for a data protection regime that is
compatible with the entities situated abroad, and particularly in the developed world.
As previously said, the right to privacy is a somewhat nebulous and abstract concept, thus it
is impossible to establish a clear cut rule that would direct the courts in deciding whether or
not there has been an invasion of an individual's private space. Therefore, legislators and
courts worldwide have established a number of rules defining the right to privacy, which act
as a guide for efficient adjudication of claims of privacy infringement. The US Consumer Bill
of Rights, the GDPR51, and the OECD Principles are a few noteworthy principles.
Therefore, India has to create its own national privacy principles that would be in line with
the ideals of the Indian Constitution while also incorporating the best practices from across
the globe, rather than adopting any of these principles.The goal of these guidelines must be to
ensure the security of all steps in the information gathering, processing, storage, access,
retention, and disclosure process that involve data that may be used to identify a specific
person. The Planning Commission established a committee chaired by Justice A P Shah with
the goal of creating National Privacy Principles. The committee's work resulted in the
formulation of the fundamental ideas that would serve as the foundation for future data
Under the direction of Justice AP Shah, the former Planning Committee established the
framework that considers all aspects of privacy and serves as the conceptual basis for an
Indian privacy legislation was advocated in the Justice AP Shah Committee report. Following
Guidelines. In order to discover the Indianized jurisprudence of the data protection law
through the principles outlined by the AP Shah Committee, the researcher will provide a brief
Notice: The necessity of the notice to the data owner is the first and maybe most significant
of the principles outlined by the committee. The principle emphasizes the idea of data
ownership and requires that any processor of an individual's personal data provide adequate
notification to the data owner. The notification needs to be written in a way that makes it
clear enough for the data principal to comprehend what is being processed. It is
recommended that the notice should include information on the nature of the data being
collected, its intended use, and the security protocols the collector has implemented to
The principle also requires that the data principal be notified periodically of modifications
made to the process's privacy policy and that prompt notification be given in the event of a
breach. Consent: The second principle is that getting consent is a fundamental prerequisite to
processing an individual's personal data. If the consent is declined, the processor has the right
to reject services. Notwithstanding, in cases where the processing is authorized by law and
aligned with other data protection standards, the data gathered by the agencies will be
anonymized.
Collection Limitation Principle: Only that amount of data must be gathered in order to
Purpose Limitation Principle: Only those uses of data that were disclosed to the data
principal at the time of consent-obtaining may be carried out. A new consent must be
The Chapter addresses the legality and justification for global data protection legislation. The
chapter outlines the components of an efficient data protection framework with a focus on the
chapter also discusses the several data protection theories that have been established globally,
critically identifying the point of genesis of the idea that data protection is a component of the
finding the ideal balance between achieving informational self-determination and satisfying
PROTECTION PRINCIPLES
2.1.Introduction
The researcher addressed some of the most prominent features of the digitalization era that
have given rise to privacy issues worldwide in the previous chapter. The talk has given a
theoretical understanding of the Principles of Data Protection, but in order to fully understand
the practical aspects of a Comprehensive Data Protection Code, it would be best to study the
ways in which the provisions related to the concept of Data Protection are implemented. As
the saying goes, "the taste of pudding lies in the eating.".. Additionally, the study becomes
crucial for developing a code that complies with international best practices for data
protection.
Academicians and jurists from all over the world have correctly concluded that a nation
acting alone cannot achieve data protection. Since the Internet serves as the primary source,
storage, and transmission channel for most data worldwide, national regulators are unable to
effectively address the myriad obstacles in implementing a strong data protection framework.
transfer.
There must be a mutually agreed upon framework to ensure the free movement of data across
framework that national data protection laws should be based on80. Globally recognized data
protection principles have the potential to significantly contribute to the standardization and
that can effectively address the issue of data protection, as we have shown in the previous
This makes it necessary to establish a set of global guidelines that would act as a roadmap for
countries creating their own data protection legislation. Numerous international and regional
organizations have reached consensus on some fundamental ideas that have to be included in
national data protection legislation, all while keeping this point of view in mind.82 The
researcher would mainly concentrate on two of the most significant organizations that have a
The foundation for a strong data protection framework worldwide is laid forth by the United
Nations Personal Data Protection principles. Although the majority of global data protection
laws attest to following these guidelines, there are occasionally small departures from them.
What's important in this case is the UN's acknowledged principles' persuasive value, which
serves as a guide for governments who sincerely want to establish a strong data protection
framework in their nation. Even though these guidelines are meant to direct United Nations
System Organizations in fulfilling their mandates, they nonetheless have a great deal of
persuasive power on a worldwide scale. The 2019 Personal Data Protection Bill and the
GDPR
and many data protection laws throughout the world base their data protection framework on
these fundamental ideas. In order to help the United Nations System Organizations carry out
their mandated activities, these principles (referred to as the "Principles") lay out a basic
framework for the processing of "personal data," which is defined as information relating to
The following justifications should be used by the United Nations System Organizations to
treat personal data fairly, in compliance with their missions and governing instruments:
(i) the data subject's consent; (ii) the data subject's best interests, in accordance with the
relevant United Nations System Organization mandates; (iii) the relevant United Nations
System Organization mandates and governing instruments; or (iv) any other legal basis that
PURPOSE SPECIFICATION
It is imperative that personal data be processed for specific reasons that align with the
missions of the relevant United Nations System Organization and consider the appropriate
balance of rights, freedoms, and interests. Processing personal data in a way that is
TRANSPARENCY
When relevant and feasible, processing personal data should be done in a way that is
transparent to the data subjects. As long as the stated purpose for which personal data is
processed is not thwarted, this should include, for instance, giving them information about
how their personal data is processed and instructions on how to request access, verification,
The Accountability Principle, which states that United Nations System Organizations should
have sufficient policies and procedures in place to adhere to these Principles, is one of the
other well-known principles. Furthermore, the foundation of the Data Protection Principles is
the idea that a United Nations System Organization may transfer personal data to a third party
in the course of carrying out its mandated activities, so long as the organization is satisfied
that the third party will adequately protect the personal data under the circumstances.
Rather than representing personal rights, the term "privacy" is used collectively in Article 17
of the International Covenant on Civil and Political Rights. The "internet" was still in its
infancy when it was drafted, hence the drafters' considerations and comprehension are now
protected while preventing the possible unlawful nature of targeting and widespread
.. This will provide the foundation for a data security solution that is actually successful in the
modern day. In general, the current system encourages data digitization, but it is illegal to
acquire, transmit, or retrieve personally identifiable information that is kept digitally unless it
is done in compliance with legal procedures. A person has the right to know why their data is
being used, where it is being stored, how long it was collected, how to get it corrected, and
other information. Additionally, this has been emphasized repeatedly throughout the remark.
The Human Rights Committee has often emphasized how important it is to gather and
manage personal data in a legal manner. "The collection and storage of personal data on
servers, databases, and other devices, by public institutions or private persons or entities,
should be regulated by law," the statement reads. While the connotation of the comment
appears to extend to the digital domain of the right to privacy, there are important gaps that
need to be addressed.
considering the Right to Informational Privacy from a wider angle. Countries will find great
assistance from the ECtHR precedents in amending comment 16 to expressly hold normal
public data collection procedures as grounds for violating an individual's right to privacy.
This will serve as the foundation for addressing the threat posed by mass surveillance and
expanding the scope of the provision to encompass the digital world in order to fully
The word "home" is used expressly in Article 17 of the ICCPR, which suggests that the
own personal areas. This implies that "protection from encroachment of man's own castle"
will be the extent of the covenant's security.But such a condensed interpretation of the word
"home" would be dangerous in this day and age, when the potential for private property
invasion has shifted to internet channels. Therefore, "online private spaces"—which include a
person's emails, Facebook and Twitter sites, and other social media accounts—should be
Nowadays, the only ways for a person to identify themselves in the public sphere on the
internet are through social media pages and mobile phones. The idea of private space, which
dates back a century, has mostly been replaced by electronic devices and social media
nations' courts have historically defined the term "home" broadly, stating that it encompasses
"a place in which private life can evolve freely.""The convention must accord the phrase
"private domain" the broadest possible meaning, encompassing all methods by which one can
access the online sphere, in order to recognize the growth of private life in the present era.
Article 17 of the agreement has been limited in another essential way, which is the definition
of the term "Correspondence." While letters, phone conversations, emails, and other
correspondences have previously been covered in Comment 16, the most recent dangers to
personal data from “metadata” need to be included in the context of Article 17. In essence,
the metadata are discrete sets of personal data that may be merged for information gathering
and statistical analysis.. International courts have questioned the extent to which the metadata
may be utilized for mass surveillance and identity. The Supreme Court of India invalidated a
section of Section 57 of the Aadhar Act for purposeful limitation and breaking storage
regulations, however the court overlooked the drawbacks of storing metadata. As a result, this
would make it possible for the Indian government to handle and keep personal data of people
via the reliable Aadhar platform. To avoid such careless misunderstanding of the threats that
information might pose to the right to privacy, the inclusion of metadata in the idea of
It is important to keep in mind that the government might use metadata for a great deal of
Because information about a person's eating habits, whereabouts, and behavioral patterns is
easily accessible, it is crucial to provide metadata within the parameters of Article 17 of the
convention. This would surely broaden the scope of the provision, making it essential in
.“The United Nations Special Rapporteur on freedom of speech stated, "When gathered and
analyzed, communications metadata can create a profile of a person's life, including health
concerns, political and religious beliefs, alliances, relationships, and interests, revealing as
much information as, or even greater detail that may not be distinguishable from the content
of communications."
It is important to note that the judiciaries of other nations with sophisticated data protection
laws, as well as those in Europe, have taken action to maintain that information pertaining to
have a broad window of opportunity to carry out mass surveillance and profiling, however,
Informational Privacy
off of the customer data they gather, both for their own use and to sell to other parties. Not all
people are privacy hawks, and millennials aren't as much as previous generations were.
following the scandalous Cambridge Analytica Data dumps. In 2014, Nix, SCL, and
Cambridge Analytica Elections, got aware of the study being conducted at Cambridge
University's Psychometrics Center. The study found that using publicly accessible Facebook
user account data, one can accurately evaluate a user's personality attributes using a
psychometric model called the "OCEAN" scale. An algorithm developed by researchers was
able to identify a person's personality based on the "likes" they had on publicly accessible
Facebook sites.
The algorithm and the ensuing data collection to train the business's model ultimately resulted
in Cambridge Analytica supporting political campaigns such as Brexit and the US elections
in 2016 and set up a global controversy. Facebook's reputation suffered once the data
harvesting was made public, and the company was hit with many fines for improper data
handling.
Over time, following the Facebook/Cambridge Analytica crisis, it became clear that, in spite
of all the government hearings, the public would need to take further steps and take particular
action to get internet corporations to realize that it was time for them to offer sincere
apologies. The GDPR was primarily passed by the European Union to regulate how these
firms may utilize personal data. Users would still not be able to completely prevent someone
increase of social media users. Due to the lack of comprehensive data protection legislation,
India, a country with a high concentration of social media users, faces an increased danger of
illegal interference with users' privacy. One of these risks has emerged in the shape of the
vehement resistance to WhatsApp's recently modified privacy policy. The social networking
site updates its privacy policy in a move that has drawn significant media attention and user
anger.
.. The platform will share user data with its parent corporation, Facebook, in accordance with
the revised rules. According to reports, the government is looking into and assessing the most
recent privacy policy update that WhatsApp released, following a backlash against the
contentious modifications that connected user data to Facebook's other services and goods.
It's clear that simply because of the Due to a lack of regulations in India, Indian WhatsApp
users are being treated like second-class citizens and their personal data is being
commercialized by WhatsApp without giving them a clear, concise, and unequivocal warning
However, WhatsApp is unable to do the same for users in the European zone, where privacy
rights are still protected, due to the presence of a strong legislative framework in that region.
This facet of the business's operations clearly illustrates the necessity of a stringent legal
framework to guarantee data protection. The policy has been updated, and users are required
to approve it in order to continue using their conversations. This goes against the fundamental
Furthermore, worries about privacy violations are not limited to conversations. The recently
entrepreneurs, has demanded more government monitoring after alleging that WhatsApp's
latest privacy policy amendment poses a serious risk to user payments and financial data.
Despite WhatsApp's assertion that the upgrade solely affects WhatsApp Chat, the policy may
potentially result in more data sharing between Facebook, the parent company, and
WhatsApp Payments.
.The corporation had to delay the new policy's adoption for a few months due to public
criticism, but in the absence of any regulations, nothing in the law would make the company's
actions illegal. The tragedy has had several good outcomes, one of which being the increased
awareness of information privacy among the Indian populace. This may be demonstrated by
users switching to other platforms and a sharp drop in the platform's user base growth once
To safeguard people from arbitrary and illegal interference in their personal lives, the
GDPR's Article 17 states, "No one shall be subjected to arbitrary or unlawful interference
with his privacy, family, home or correspondence, nor to unlawful attacks on his honor and
governmental interventions that do not align with the principles outlined in the Covenant will
be considered illegal,. Given that the convention permits "lawful" interferences with the right
to privacy, it is important to give sufficient weight to the criterion when determining whether
When it comes to domestic legislation, lawfulness is just another word for it. Any law that
has been duly passed by a state's authorized authority would be considered lawful
interference. Nonetheless, General Comment 16 states clearly that this kind of interference
must not be capricious and must adhere to the convention's guidelines94. Although the
committee's remark is praiseworthy, it is important to remember that these rules only apply to
those facets of life that have been determined to be part of the right to privacy.. The sections
that aim to safeguard "unlawful" infringements are mostly pointless, as the convention's
existing understanding of the right to privacy is so narrow and antiquated. The Committee
has accepted the idea that a law does not make invasions of privacy acceptable merely
because it permits such violations. The committee suggests, in a sense, adding the due
The United Nations (Office of the High Commissioner for Human Rights) Committee and the
Inter-Parliamentary Union have worked hard to define the standards that will be used to
determine whether the law that is being used to violate privacy is legal. The committee
25
established a four-point criteria to evaluate the legitimacy of the methods used to try to
1. The legislation must be available to the public, which means that no provision that tries to
invade someone's private space may be coupled with a confidentiality clause. By taking this
exam, you may be confident that the people are aware of the legal framework that governs
2. The second test establishes that the data can only be handled for purposes that are lawful
. The third criteria offers the fundamental notion of certainty, which is that the legislation
need to sufficiently define the subtleties of interference. The legislation should establish an
objective standard to identify the categories of individuals whose privacy may be violated,
the goal that the violation of privacy is intended to accomplish, and the specific process by
which the violation of privacy may be authorized. The legislation should also specify exactly
how long such data processing must be permitted for as well as how to store and remove such
data.
The third criterion provides the essential idea of certainty, namely that the laws must
adequately specify the nuances of interference. The regulation ought to set up an objective
criterion to determine which groups of people are susceptible to privacy violations, what the
purpose of the breach is, and the precise procedure via which it may be approved. Along with
defining how long such data processing must be allowed for, the regulation should also
The third requirement, which states that the rules must sufficiently define the subtleties of
interference, offers the fundamental concept of certainty. The law should provide an objective
26
standard to identify the categories of individuals who are vulnerable to privacy breaches, the
nature of the breach, and the specific process by which it might be authorized. The legislation
should specify how long such data processing may be permitted for as well as how to store
.3. The essential idea of clarity is provided by the third criteria, which is that the regulations
must adequately describe the nuances of interference. The law ought to provide an impartial
benchmark for identifying the groups of people who are susceptible to privacy violations, the
type of violation, and the particular procedure that may permit it. The law should outline how
to keep and delete such data as well as how long such processing of data may be allowed.
The third criterion, which states that the regulations must sufficiently explain the subtleties
of interference, provides the fundamental notion of clarity. A fair standard should be set by
the law to determine which individuals are most vulnerable to privacy violations, what kinds
of violations occur, and which specific procedures may allow them. The length of time that
such data processing may be permitted, as well as how to store and destroy such data, should
The regulatory framework should have enough judicial scrutiny to guarantee the process's
openness and lack of arbitrariness. It is argued that the absence of these protections will
eventually open the door for illegal incursions into persons' private lives.
The necessity of establishing a structure that would provide effective measures that would
increase openness and foster accountability within the state's surveillance system has been
27
Adequate protections are vital to minimize and completely eradicate the potential for
arbitrary interference with an individual's right to privacy, but having strong redressal
procedures for lodging complaints against violations of the rights enshrined in Article 17. In
order to guarantee that the system has the necessary components to address the violations of
The first condition is notice, which is predicated on the idea that it is the state's responsibility
to guarantee that the public is informed about the specifics of the interference and their right
to file a lawsuit against the infringement. The necessity of an expeditious, efficient, and
A fundamental need for any legislation aiming to violate an individual's privacy is that it
. The Human Rights Committee has often argued that having laws that are strictly in line with
the goals and objectives of the covenant is necessary to ensure that the law is not arbitrarily
applied. The qualities of need, proportionality, and validity are also embraced by the criteria
of non-arbitraryness. To legitimize the state's invasion of people' private rights, it just needs
provide a clear and direct link between the [limited right] and the danger in order to illustrate
the precise nature of the threat and the necessity and proportionality of the particular measure
taken. The member governments have often opted to interpret Article 17 in the broadest sense
possible, assuming that it is sufficiently flexible to include inherent restrictions with regard to
.. It is well known that states frequently cite concerns about public interest and national
security as reasons for violating an individual's right to privacy. While preventing terrorism
28
and safeguarding national security are legitimate concerns, it is important to outline the
bounds around these matters to keep them from serving as a means of facilitating widespread
monitoring.
.2.5.Findings
In essence, the chapter chronicles the origins of the data protection regime and examines the
many data protection principles that are accepted by international organizations worldwide.
The conducted study gives the researcher insight into the essential components of a strong
data protection policy in a democracy. In the next chapters, the researcher attempts to develop
the best possible data protection model for the Indian scheme, paying particular attention to
the OCED Principles. The study has made it possible for the researcher to pinpoint the
.The preceding chapters have extensively covered the jurisprudential concerns surrounding
the notion of data protection worldwide. Nevertheless, each sovereign state has the freedom
to craft national laws that best suit its own needs, so it would be appropriate to talk about
some of the jurisdictions' approaches to data protection and how they have incorporated the
Numerous precautions are enforced by Big Data to guarantee the protection of personal
information belonging to people worldwide. The Internet of Things will make it more simpler
to consume large volumes of data, which will raise the danger of personal data being
threatened. Personal data makes up a significant portion of the data involved in the process
and may include personally identifiable information about the data subjects.
29
CHAPTER 3:
3.1.Introduction
Big data is the deliberate and focused use of information for purposes other than the ones for
which it was initially collected.136 Offering specialist services may require data processing,
analysis, and assessment. For instance, personalized advertisements for internet users may be
consolidation and revaluation of this data can be advantageous for financial transactions,
route taking, internet usage, electronic cards and telephones, and video or communication
surveillance
While there are clearly many scientific benefits to big data, managing it still carries a certain
level of risk. Artificial intelligence-based car information may also be falsified, and
employing these data further restricts the length of time that people may participate. This
implies that other important rights, including the right to object, that are recognized by
complex data protection legislation are nullified. This has led to the processing and
interpretation of massive amounts of data becoming a new challenge to the worldwide data
protection policy. Given massive data, the GDPR recognizes the impending challenges with
data protection. However, a number of serious issues relating to the remedy and the right
have emerged as a result of the lack of human connection. In the next section, we'll discuss
some of the impending problems that big data will provide for the data protection framework.
A portion of the stance taken by the GDPR appears to be reflected in and endorsed by the
Indian law. The federal data privacy rules in the United States have so far taken a
significantly more laissez-faire approach to data regulation as compared to the GDPR of the
30
EU. This might be an indication of a fundamentally different understanding of how online
speech protection, data privacy, and human rights relate to one another. In general,
Americans feel that the government has less responsibility for securing internet data and
information than many of its European Union counterparts.What does the law mean for
India's engagement in the international data discourse? India is a major player in the realm of
The Indian government has done a fantastic job of establishing itself as a global leader in the
regulation of democratic data. India has been praised by commentators for its ability to
influence foreign policy and for its high level of participation in the UN General Assembly
and other forums on internet policy.The specific institutional choices India makes on data
privacy would most likely have a significant impact on the national economy. These
consequences might be direct (like increased compliance costs) or indirect (such potential
stifling of innovation and overall productivity losses). The given numerical statistics show the
many ways in which different sectors of the Indian economy might be impacted by a data
privacy law, even if they might not apply to India.modeled after GDPR.
The literature on the GDPR that is now being published suggests that there will be significant
economic consequences for the European Union (EU), which might impact labor markets,
SMEs, international trade, and economic growth overall. After a careful analysis of the
literature assessing the GDPR's impacts, it is clear that there may be disadvantages for India
in implementing a data privacy law modeled after the GDPR and that similar studies must be
conducted there prior to the bill's implementation. Given that the DPC's proposed bill will
significantly impact significant sections of India's economy, it must be carefully and critically
The right to personal data protection bears close resemblance to the right to respect for the
31
private life. While both of these rights are based upon the theme that an individual have a
right to live their life with dignity and hence, they need a personal sphere which The right to
privacy and the right to respect for one's private life are closely related. The right to respect
for private life is a far larger notion than the other two, even though they are also predicated
on the idea that everyone has the right to live their life with dignity and, as such, need a
personal space free from outside interference. The right to protection of personal data is an
organic concept that encapsulates a mechanism that protects individuals' personal information
through systematic regulations for data processing, storage, and security. In contrast, the right
to fundamental freedoms, the right to life, and other rights are included within it.
In addition to reaffirming the right to personal data protection, Article 8 of the EU Charter of
Fundamental Rights (the Charter) outlines the fundamental principles that underpin this right.
It stipulates that the processing of personal data must be reasonable, done so for defined
objectives, and supported by either the subject's permission or a legally permissible basis.
Every time an individual's data is processed, they are guaranteed the right to have their data
protected, even if such processing has no bearing on the subject's right to privacy. Even in
situations when such processing has no influence on the right to privacy, it may still violate
that right.
This gives rise to the right to data protection. The European Court of Justice has given the
term "privacy" an extremely broad interpretation, holding that the mere act of collecting an
individual's data may violate that right if it is unintentionally disclosed to third parties.
Everyone has the right to respect for their home, communications, and private and family life,
public authorities in an individual's private life is the central subject of the European data
32
protection policy. A fundamental principle of a life based on dignity is the right to privacy,
with the exception of situations involving genuine public interests. The nations realized the
growing threat of privacy breaches with the advent of revolutionary technical innovations,
which led to a much broader understanding of the right to be left alone and accelerated the
Early in the 1970s, a number of states passed laws governing the processing and storage of
people' personal data in response to the rising demand for data regulation.
Intimate situations, sensitive or confidential information, information that could sway the
public's opinion of an individual, and even elements of one's professional life and public
behavior are all covered by the European courts' extremely strict stance on data protection
and liberal interpretation of the right to privacy. It may be deduced that the broad definition
of privacy is meant to cover up any ambiguities in the meaning that would compromise
When considered collectively, the personal data retained under the directive, which could be
concerning the private lives of the persons whose data has been retained, such as the habits of
everyday life, permanent or temporary places of residence, daily or other movements, the
activities carried out, the social relationships of those persons and the social environments
frequented by them." This ruling was made by the CJEU in Digital Rights Ireland142, during
its examination of the validity of Directive 2006/24/EC regarding the fundamental rights to
A vital component of any sound data protection regime is the range of rights that its citizens
are granted. A strong data protection system that aims to preserve the integrity of all valued
rights in all of its manifestations must fundamentally include the explicit acknowledgment of
33
certain of the rights that are seen to be the parameters of the right to privacy. It is thus thought
to be best to examine some of the most important rights in this area that are recognized by EU
law.
3.3.Right to Religion
Nowadays, a person's religion, beliefs, and mode of worship may have a significant influence
on how the rest of society perceives them. For this reason, safeguarding information about
thought, religion, and conscience are guaranteed by Article 9 of the Charter, and any
violation of this information is deemed to jeopardize these rights. The petitioner in Sinak Isik
v. Turkey had challenged a law on the grounds that the identity card's religious name was
incorrect. The European Court of Human Rights (ECtHR) declared the regulation to be
unlawful, stating that religious freedom includes the ability to practice one's religion alone or
in private as well as in public and with other people who share the same beliefs.
The domestic laws in effect at the time required people to carry identification cards, which
were documents proving one's faith that had to be produced upon request to any
governmental agency or private company. Such a duty overlooked the fact that the freedom
to express one's faith also granted the freedom from having to reveal one's views.
Notably, the government said that people no longer had to include their religion on their
identity card and could choose to leave it blank if they so desired. The court dismissed the
argument, stating that such a recusal would place the relevant parties in an awkward situation.
As a result, the disputed law was ruled to be violative of the Article 9 of the ECHR.
34
Certain analysts contend that churches that keep track of visitor information should have been
required under GDPR Article 91 to create internal data processing policies that adhere to the
requirements.
3.4.Financial Interests
The global corporate landscape has undergone a radical transformation with the arrival of the
digital era. Data has never been more important, and rightfully so; many economists concur
that data is the new oil. Data processing is a key component of many businesses worldwide,
and concerns over the financial effects of stringent compliance guidelines for the protection
of personal data are frequently voiced by both data controllers and data subjects. In the
historic Google Spain case, it was questioned whether financial interests might be considered
a legitimate basis for restricting the processing of data. The court determined that because
search engines hold a significant quantity of personally identifiable information, the data they
have gathered might pose a severe danger to privacy.146 The court concluded that, in
addressing the contention regarding the underlying economic interest in this type of data
processing, a just balance should be struck between that interest and the fundamental rights of
the data subject, particularly the right to privacy and the right to have personal data protected.
Therefore, it was decided that the underlying economic and other interests are subordinated to
the right to privacy and the right to personal data. The Court additionally notes that a great
deal of his personal life may be covered by this information, and that without the search
engine, it would have been extremely difficult or impossible to link the information.
Thus, internet users might create a more or a less thorough profile of the individual being
looked up. Furthermore, because search engines and the internet play such a significant part
in modern society and make the information found in these lists of results widely available,
35
the impact of the interference with an individual's rights is amplified. The Court holds that
the engine operator's financial interest in the data processing is insufficient justification for
The ECtHR has taken the stance of weighing the relevant interests in each instance against
the data protection regulations. Sometimes, when there isn't the The right to have data erased
has been rejected by the court. The question before the court in Camera di Commercio,
Mr. Salvatore Manni could assert a claim for the erasure of personal data (relating to the
bankruptcy of a business he headed a few years ago) in order to protect their financial
interests. The court held that the fundamental records of the relevant firm should be released
first, even though it acknowledged that the petitioners' prospective clients had a right to see
the information. that their contents and other information about the firm, including the
specifics of the individuals who have the authority to bind the company, may be accessible to
third parties148. Therefore, the learned court noted that the disclosure's goal of furthering the
genuine public interest made the infringement of the petitioner's personal data interference
justifiable.149 The court did note, however, that in some circumstances, people may be able
to object to the processing of their personal data even in cases where there are unusually
special circumstances and legitimate general interests. The court has underlined time and
again that a valid public interest exists when all the facts surrounding a case are taken into
account.
The case Vereinigung bildender Künstler v. Austria151 dealt with a disagreement about a
painting that depicted nudity and included a politician who had properly requested an
injunction from the domestic court due to privacy invasion. The European Court of Human
36
Rights (ECtHR) noted that, rather than addressing specifics of [the portrayed's] personal life,
the painting was more likely to refer to his public position as a politician and the need for [the
3.4.1.Freedom of Expression
The GDPR's Article 85 regulates how the freedom of speech and the right to privacy interact.
In order to do this, the Article requires the states to balance the two rights and provides a
number of exemptions and derogations from certain chapters. The link between the two rights
was controlled by Article 9 of the directive before the GDPR was passed. Nevertheless, it is
important to acknowledge that there have been many instances where the rights to data
protection and the freedom of speech and expression have clashed. In Tietosuojavaltuutettu v.
Satakunnan Markkinapörssi Oy and Satamedia, the CJEU used the chance to clarify the link
between the two rights, ruling that a balance between the two rights is necessary. urthermore,
while the right to free speech and expression is an essential component of any democratic
society, the restrictions and limitations on the right to data protection must only be applied
when absolutely required in order to strike a balance. The court ruled that while political
discourse is a necessary component of any organic democracy and that discussions about
matters of public interest cannot be legitimately restricted, editorial gossip intended to pique
the interest of certain readers does not advance the conversation or serve any fundamental
public interest. Under such circumstances, the right to data protection cannot be superseded
An injunction order against a publishing business that forbade the reporting of the arrest of a
well-known German actor was contested before the ECtHR in Axel Springer AG v.
Germany, on the grounds that the order violated Article 10 of the ECHR. Applying the
margin of appreciation concept, the court considered the fundamental question and
37
established a comprehensive set of standards for balancing the rights to privacy and freedom
of speech and expression.. Whether the article advances a topic of public interest; The extent
of the subject's notoriety and the topic of the report; the subject's past behavior; the source of
the information and its accuracy; the kind, structure, and implications of the publication; as
Given the case's circumstances, it was determined that the injunction constituted excessive
limitations because the actor was well-known to the public and his detention affected public
interest. As a result, it was determined that the order in question breached Article 10 of the
ECHR.
3.4.2.Professional Secrecy
The idea of professional secrecy has strong roots in the moral standards of all professions,
while not being a basic right. Confidentiality is a crucial component in professions that rely
Human Rights (ECtHR) has decided that, in order to safeguard the basic right of an
undertaking to respect for its private life as guaranteed by Article 8 ECHR and Article 7 of
the Charter, it may be essential to forbid the revelation of some information that is deemed
secret. The necessity to preserve a balance between the rights of data subjects and the
It would be best to take a quick look at some of the GDPR's pertinent definitions before
delving into the specifics of the European Union's data protection rules, since they have
38
3.5.1.Personal Data
understanding that the most essential component of the data protection system is, of course,
the personal data. According to the GDPR, any information that may be used to identify a
specific person or be linked to them is deemed personal data159. According to the GDPR,
data controllers must take all reasonable steps to determine the type of information they have
3.5.2.Data Subject
Any identified natural person whose personal information is being processed is referred to as
a data subject. Legal entities may, however, only assert their claim to the protection of
Articles 7 and 8 of the Charter with respect to this identification to the extent that the legal
entity's official title names one or more natural people. Articles 7 and 8 of the Charter
recognize the right to respect for private life with relation to the processing of personal data.
This right pertains to any information that may be used to identify or identify a specific
person.
The European Courts have established a strong foundation of legal reasoning in their quest to
grant the right to data protection to the fullest degree feasible, much like any other developed
jurisdiction. These guidelines provide a framework for evaluating instances in which data
subjects' rights to data protection have been violated. Notably, all of these guidelines are still
in place under the GDPR to guarantee the highest level of security and data subjects' control.
processing and must be able to provide evidence of compliance. Additionally, the controller
should be capable of guaranteeing compliance with the principles of data protection. This
concept rests on the idea that when breaches occur, the data controllers should be held
responsible.
The foundation of the European data protection legislation is the idea of providing data
subjects with appropriate security and confidentiality. It includes the notion of a system that
In order to safeguard individuals' rights to data protection, the GDPR also mandates that data
controllers take into account the state of the art, implementation costs, and the type, extent,
context, and goal of processing, in addition to the risk of varying likelihood and severity for
natural persons' rights and freedoms. Pseudonyms and encryptions are specifically mentioned
in the GDPR as ways to increase security. Additionally, as was previously mentioned, the
GDPR requires controllers to notify data subjects of any potential data breaches within a
The principles of maximizing data security also form the foundation of the Storage
Limitation Principle. In order to eliminate the possibility of any breaches, it stipulates that
data must only be kept on file for as long as is strictly required. This idea is appropriately
included by the GDPR, which states that data must be retained in a format that allows data
40
subjects to be identified for no longer than is required to fulfill the purposes for which it was
gathered. Furthermore, it stipulates that the controller must set deadlines for deletion or
frequent reviews1
The European Court of Human Rights (ECtHR) noted in S. and Marper that keeping personal
data for an excessively long period of time is not characteristic of a democratic society run by
the rule of law. The case involved the two applicants' fingerprints, cell samples, and DNA
profiles being kept on file indefinitely even after they were found not guilty. These rulings
serve to illustrate the concerns that data storage poses to people' right to privacy and the
inherent hazards associated with it for European courts. By destroying any data that is no
longer absolutely essential for the reason for which it was gathered, the idea seeks to reduce
The courts have acknowledged a broad variety of exceptions to the storage principle, though,
and data may be kept for extended lengths of time if it is needed for statistical analysis, public
interest, scientific research, or historical purposes—as long as it is used exclusively for these
purposes. The CJEU clarified the necessity of an objective standard for issuing data retention
directives169 in the Digital Rights Ireland case . The observation was founded on the idea
According to GDPR, processed data must be sufficient, pertinent, and not excessive for the
purposes for which it is gathered and/or processed further. The European Court of Human
Rights (ECHR) invalidated a data retention regulation clause in the Digital Rights Ireland
case, citing the significance of data minimization and the broad reach of data processing
through the use of a generic language. In order to combat severe crime, the directive
41
stipulated that all people, all electronic communication devices, and all traffic data must be
The court reaffirmed its support of the principle by noting that the directive contradicts the
principle prohibiting the excessive processing of data and that personal data that is
appropriate and pertinent but would cause an undue interference with the fundamental
When the aim of processing is adequately defined and unambiguous, people are better
informed about what to expect, and legal certainty and transparency are improved. However,
it's crucial to define the aim precisely so that data subjects may use it to properly exercise
their rights, such the right to object to processingThe cornerstone of European Courts' law
regarding the right to data protection has been the idea of purpose limitation. The need that
personal data be acquired for specific, explicit, and legal reasons and not subsequently
processed in a way that is incompatible with those goals has caused commentators to
The tightly worded clause prohibits the gathering and use of data for ambiguous, future
purposes by stating that a separate legal basis must exist even for uses that are related to the
original goal of the data acquisition. The foundation of the purpose limitation principle is the
idea that processing data cannot be done in a way that is surprising, improper, or offensive to
the data subject. The data may be processed further only if it serves the original purpose and
only for those purposes. Among the list of acceptable uses are further processing for public
. This implies that the data controller will be permitted to treat the data in these
42
circumstances, even if the data collected by the subject fails the compatibility test. The law,
however, is well-established regarding what types of data are compatible, and the data
controller is required to take into account the following factors: any connection between
those purposes and the intended further processing purposes; the context in which the
personal data were collected, especially with regard to the reasonable expectations of data
subjects based on their relationship with the controller regarding its further use; the nature of
the personal data and the implications of the intended further processing for data subjects;
and the presence of suitable safeguards.s in the proposed additional processing procedure as
well as the initial one. In accordance with the principle, data subjects also have the right to
object to data collection and to know the reasons why their data is being collected.
3.8.Fairness Principle
Ensuring data subjects that their information will be treated in a transparent and lawful
manner is the motivation behind the fairness principle. According to the concept, data
controllers must show off their compliance procedures and alert data subjects to any possible
risks. Additionally, where a data subject's permission serves as the legal foundation for data
processing, the controllers are required to abide by the subject's requests. The hospital in
K.H. and Others v. Slovakia refused to provide the petitioners access to their own medical
reports because of the possibility of data misuse. According to the European Court of Human
Rights, the state had not demonstrated that there were adequate and convincing grounds to
prevent the applicants from having effective access to information about their health.It was
decided that data subjects could not be denied the ability to access their data unless there
Nothing has a more significant place in the EU's whole data protection framework than the
transparency aspect. Data processing must be transparent with regard to the data subject, as
43
required by the GDPR. The term "transparency" has been used broadly to refer to a variety of
processing, those that should be easily accessible to data subjects during processing, and
those that are provided to data subjects upon request for access to their own data.One of the
important instances where the right to data accessibility was emphasized was Haralambie v.
Romania
. The ECtHR concluded that those who were the subject of personal data stored by public
authorities had a critical interest in being able to access them, even if it noted that Article 8
had been breached. The petitioner was eventually allowed access to the material held about
him after a grueling five years. It was the responsibility of the government to provide a
reliable process for gaining access to this kind of data.181 Additionally, it was decided that
delays in granting data subjects access to their information could not be justified by flaws in
Additionally, Recital 39 of the GDPR states explicitly that data subjects must be informed
about the Processing activities in an understandable manner so that they are aware of what
will happen to their data. This implies that the data subject must be aware of the precise
reason for processing their personal data at the time the information is collected. The
The right of data subjects to access their own data is recognized under EU law. The right to
individuals to have access to their data and request corrections as required. The GDPR
establishes extensive right-based regulations to provide individuals with the highest level of
data control. A wide variety of rights that persons have with regard to their data are mandated
44
by Article 8 in order to advance this goal. Establishing procedures that allow data subjects to
contest infringements of their rights, hold controllers accountable, and seek compensation is
3.10.Right to Rectification
The GDPR envisions a legislative framework that aims to provide data subjects with the
greatest amount of control over their data, keeping in mind the significance of protecting
personal information. The right to request the correction of erroneous personal data
pertaining to oneself from the controller without undue delay is granted to the data subject.
The data subject must have the right to have incomplete personal data filled, including by
In Ciubotaru v. Moldova, despite the existence of factual proof supporting his argument, the
The State had not complied with its affirmative commitment to ensure to the applicant
effective respect for his private life, the court observed, by preventing the applicant from
having his claim reviewed in light of objectively verifiable facts. Data controllers are required
to promptly provide data subjects with the opportunity to update their stored information. The
methodically gathered public record that is kept in files owned by the government and may
45
Only when data is submitted in accordance with contractual requirements or is based on
permission are data subjects guaranteed the right to data portability. Under the EU data
protection law, cases where the data was collected legally do not have this privilege. It is
necessary for the data controller to provide systems that enable data to be transferred between
controllers in accordance with the wishes of the data subjects. The GDPR places a strong
portability.
It should be mentioned that, in terms of data portability, the legislation does not place undue
burden on data controllers. The GDPR aims to strike a balance between the interests of data
controllers and data subjects by permitting data to be maintained on the basis of legitimate
public interest or in support of legal operations. Nevertheless, the right to data portability
cannot be restricted outside of these two exceptional situations. It is also clear that giving data
subjects authority over their own personal data is the only goal of the recognition of the right,
3.12.Findings
does suggest that these rules may be used as a means of defending people's rights to total
control over their personal information. But some significant gaps that have surfaced are as
follows.
The US has an excessive number of data protection laws, each with a narrow reach, in
contrast to the European Union, which has a comprehensive rule in the shape of the General
Data Protection Regulation. Consequently, the nation's data protection structure is extensive,
intricate, and technically advanced. Additionally, there are several federal and state laws
decades ago, and many of these rules find it difficult to deal with the issues raised in the
In spite of these drawbacks, it is undeniable that the US has a strong and efficient structure in
place to safeguard citizens' rights to data protection. But as compared to the US, the EU has a
far more sophisticated, advanced, comprehensive, and contemporary data protection system.
The following two factors provide the European Union a slight advantage in the area of data
protection. First, unlike the EU, which has what is perhaps the most individual-centric data
protection regulation in the world, the US lacks a comprehensive federal law governing the
processing of data. The second explanation has to do with the European Courts' permissive
In order to successfully address the issues of the current period, the United States must also
have a comprehensive federal regulation along the lines of the General Data Protection
Regulation.India has frequently been referred to as the most significant offshore business
destination in the world. The growing network of Indian data outsourcing enterprises was the
first to raise worries about possible data breaches in India. It is sometimes asserted that India
would never have needed a data protection legislation at all if not for the concerns of
. There was no legislative structure in place to control the data outsourcing process in India,
which led to several cases of data theft and informational privacy violations by these
offshoring businesse. Naturally, the world press took notice of these instances and finally
nations with sophisticated data protection legal frameworks has created the ideal foundation
for a detailed examination of the current data protection legislation in India. To date, the
researcher has identified the best practices used by various jurisdictions to provide citizens'
personal data with a fair degree of protection as well as the difficulties governments face in
The chapter's conclusion has allowed the author to also pinpoint the level of protection that,
goal of the upcoming chapter is to get a thorough understanding of India's current Data
Protection laws.
48
CHAPTER 4:
4.1. Introduction
The researcher now has a fairly comprehensive grasp of the various methods to personal data
protection that the United States, the United Kingdom, and the European Union have taken
India's current data protection laws before delving into talks on the viability of a certain data
protection model. This chapter's talks aim only to provide readers with the most
comprehensive knowledge of India's current situation of data protection.Every day, the globe
gets more and more digitalized, and India is not an exception to this phenomenon.
Many billions of people worldwide communicate with one another via digital media,
resulting in the global generation of enormous amounts of data. A sizable portion of the
population is reached via the recently discovered digital communication channels, which
include social networking sites like Facebook, Twitter, WhatsApp, and others. In India,
almost 53% of people have an online presence thanks to more affordable internet and
increased connectivity.
Additionally, the Indian economy has a significant presence of online payment programs like
Paytm and Google Pay. The vast amount of data engaged in the digital space has increased as
a result of individuals using these apps. But technological advancements have also given both
49
governmental and commercial sector organizations the ability to quickly access, store, and
An increase in internet users also suggests that these transactions often contain a large
amount of personal and financial data. India is a digital transmission hotspot due to the
. It is important to remember that these smartphone apps, which provide users with a variety
of services including online chat, digital payments, online shopping, taxi services, etc., save
and handle a significant amount of personal data about its users.. The following paragraph
provides a comprehensive overview of the development of a digital economy that places data
at its centre:
Even something as basic as calling for a cab today requires using a smartphone app that
gathers and utilizes several kinds of data, including the user's financial information, her
current location, and details about her past travels. People's communication, decision-making,
and business practices are all being profoundly altered by data. Nowadays, companies are
compiling enormous databases about customer behaviour and preferences. It is now easier
than ever to compress, sort, modify, discover, and understand information, which can then be
The majority of the time, the process includes transmitting and storing personal data in
addition to collecting and processing it. Technology has advanced to the point where
processing and storing personal data is now very a technically and financially feasible choice.
These phenomena guarantee that data aggregators not only gather but also retain personal
information about individuals, which may be utilized to create user profiles and, naturally,
50
Service providers may speed up transactions and improve service quality by creating
personalized user profiles. The things that consumers might be interested in purchasing are
suggested by internet aggregators and e-commerce corporations based on their past online
activity. Precisely said, the way things function in the digital age may be greatly influenced
by the usage of data, and all organizations, public and commercial, want to maximize the
amount of information that can be obtained from their users' data. To enhance traffic
conditions, data analysis on the positions of residents in a certain region might be employed.
the examination of the patients' medical records might assist the researchers in developing a
more accurate diagnosing process. The government may benefit much from the examination
socially beneficial policies. Data processing may also greatly assist law enforcement
cameras and more sophisticated surveillance techniques employing internet and advanced
However, the preservation of people's personal data poses a serious danger to informational
privacy even as it makes things more easy for consumers and promotes a safer society. An
rising number of people are using the internet, which has opened up a world of worries about
potential data breaches. Since the government is the entity that processes personal data on
individuals the most in India, it is critical that laws governing data collection, storage, and
danger to informational privacy in India, like in the rest of the globe, has not suddenly
materialized; rather, it has the threat has only grown more significant with the onset of
digitalization
51
Our ability to gather, store, process, and transfer information has significantly increased
which are made possible by computers and other electronic devices. However, it also leaves
us open to more widespread breaches of our privacy. This violation of privacy might also
originate from a personal relationship. It might occur in any of the following ways:
Data on our personal computers can compromise us in ways that range from financial loss to
embarrassment; data transmission over the Internet and mobile networks is equally risky of
being intercepted; and in this era of cloud computing, where a large portion of our data,
including emails, chat logs, personal profiles, bank statements, and other data, are stored on
Our privacy thus depends on the internal electronic security mechanisms of the far-
off servers of the businesses whose services we consume.Due to their increased vulnerability
to exploitation, minorities, women, the elderly, and children's privacy are particularly
vulnerable in this digital age, and • the management of data online has given rise to new types
of annoyances that might compromise anyone's privacy, such as electronic voyeurism, spam
In view of the need for uniformity in the law pertaining to alternatives to paper-based
methods of communication and information storage, the Indian Information Technology Act
2000 ("Act") was based on the Model Law on Electronic Commerce adopted by the United
Nations Commission on International Trade Law. It was suggested that all States intending to
enact a law for the impugned purpose give favourable consideration to the said Model Law
when they enact or revise their laws. As previously mentioned, the offshoring industry and
the information technology sector were the primary focus of India's original data protection
legislation plan 334. Due to the gaps in India's current legal system, there have been several
nation.
The IT Act continues to be the cornerstone of the many Indian legislation intended to
safeguard a society supportive of the cause of data protection. The IT Act largely regulates
the issues mentioned above, which led to the emergence of a data-driven culture in India with
the growth of the IT sector. The Act has undergone many amendments to date in response to
the constantly changing threats that the development of technology poses to data security.
This section will address the current Act provisions in order to examine the current Indian
data protection system. Within its system, the IT Act defines "data" according to a traditional
meaning focused on e-commerce. The original legislative aim behind the clause is implied by
the focus on computer and other types of memory storage. Furthermore, it should be
mentioned that in the wake of later rules, the limited definition of term data has had
significant modifications
"(o) 'data' is a representation of knowledge, facts, concepts, or instructions that are being
prepared or have already been prepared in a formalized manner and are meant to be
processed in a computer system or computer network. They can be stored internally in the
media, punched cards, punched tapes, and computer printouts. “The IT Act's purview seems
to be limited to e-commerce operations, and the Indian legal definition of data was primarily
intended to further the cause of internet regulation in the information technology industry.
This proposition may be appreciated from the fact that the concept of data protection was far
far away from the Indian conception of privacy and informational self determination. The fact
that there is any law in existence in India can be attributed to the subsequent amendments 337
that were brought in the IT Act. The two most notable pillars of the data protection scheme in
53
the country are Section 43A and Section 72A of the Act.
This claim may be understood in light of the fact that the Indian conceptions of privacy and
informational self-determination differ greatly from those of data protection. The following
amendments made to the IT Act are responsible for the existence of any laws in India today.
Sections 43A and 72A of the Act are the two most significant foundations of the nation's data
protection program. The cyber contraventions and cyber offenses are the two main categories
into which the Indian data protection system may be divided. Even so, the cyber
protocols.338
Cyber violation includes breaking the rules outlined in this section. The word "convention" is
notable for being extremely narrow in its definition, encompassing any unjustified inference
into an individual's informational privacy by an unlawful breach into data held on a computer
or computer network . Chapter IX of the IT Act is the cornerstone of codified Indian data
protection legislation. The Information Technology Act of 2000's Section 43 stipulates the
(i) 43A Compensation for Data Protection Violation. -If a corporate entity owns, controls, or
putting reasonable security practices and procedures in place, causing wrongful loss or
wrongful gain to any individual, the corporate entity shall be liable to compensate the
(ii) "body corporate" refers to any organization of people involved in business or professional
activities, including firms, sole proprietorships, and other associations; (iii) "reasonable
security practices and procedures" refers to security measures intended to guard against
Government in consultation with such professional bodies or associations as it may deem fit,
or as may be specified in any law currently in force, between the parties, or in the absence of
such an agreement or any law; (iii) "Sensitive personal data or information" refers to any
personal data that the Central Government may prescribe after consulting with any
(iii) .As implied by the language of the provision, the Section aims to penalize body
corporates that deal with, possess, and handle sensitive data but neglect to maintain and
implement reasonable security measures. Should this lead to an individual's wrongful gain or
loss, the body corporate in question will be responsible for compensating the individual for
damages. The Indian Penal Code's concept of unjust gain must be used while interpreting the
term.
(iv) From a cursory reading of the passage, it is clear that the obligations are limited to the
body corporates, which includes businesses, corporations, proprietorships, and other divisions
of groups of persons. The fact that the people are spared from the harsh penalties outlined in
the provision does indicate that the legislature's primary goal in establishing the stated section
was to target corporations that handle the processing of personal data. However, the author
believes that the provision's scope and ambit are extremely limited, and the following
(vi) A body corporate must be the owner and operator of the computer resource handling
the data.
55
(vii) There must be a lack of adequate security standards and the corporate body cannot
Above all, there must have been unjust gain or wrongful loss as a consequence of the
carelessness. In 2009, the Indian legislature amended the Information Technology Act to
very restrictive provision that aims to prevent breaches of informational privacy in non-
contractual relationships.
In response to the 26/11 Mumbai assaults, India enacted the IT (Amendment) Act, 2008
(ITAA 2008), which established a robust data protection framework. It resolves data
protection issues raised by the sector and, among other things, establishes a more foreseeably
structured legislative framework with provisions for cybercrimes and data protection.
Corporate entities are expected to secure sensitive personal information of customers stored
Furthermore, the ITAA 2008 mandated that they safeguard data in accordance with valid
The Information Technology Act of 2000 implicitly states that sensitive personal data was
not defined, which left a great deal of space for misunderstandings and cases of
"Information technology (Reasonable Security Practices and Procedures and Sensitive Person
Data or Information) Rules, 2011" in 2011 as a result of using the authority granted by
section 43 A of the Act to periodically enact new regulations. It would be excellent for us
56
analysis to quickly review some of the rule's pertinent sections in order to have a
Although the guidelines mostly preserve the definitions of the IT Act of 2000, they also close
some of the Act's main gaps, attempting to provide a viable framework for data protection
laws that would safeguard people' information privacy. The definition of "sensitive data" is
The Rule is fairly broad in its wording and includes nearly any information that, in the event
of a breach, might directly affect a person's right to privacy. The rule's proviso does,
however, exclude material that is already in the public domain from the category of sensitive
data.
The need for the supplier of the sensitive data to grant their consent is embodied in the
obligation to get that consent. Additionally, the regulation stipulates that data must only be
gathered for legally authorized purposes. These regulations also acknowledge the well-
established principles of data protection, such as the rights to fairness in processing, purpose
limitation, and the . Apart from these fundamental guidelines, the regulations mandate that
corporations that gather confidential data have a strong privacy policy and implement
Nonetheless, the regulations give the government carte blanche to disregard any data privacy
norms and grant access to law enforcement and the government to individuals' sensitive
Furthermore, the central government appoints members of the Cyber Appellate Tribunal, the
adjudicating body346. A strong data protection framework in India is still a pipe dream since
It is irrefutable that a fundamental component of the right to privacy is the information about
an individual's health and medical history. Constitutional courts in India and other countries
unjustified intrusion into an individual's personal space, severely upsetting that person's peace
of mind.In Mr. X v. Hospital Z, the Supreme Court declared the following, emphasizing the
“In addition to a contract, a right to privacy may also result from a particular connection,
such as a business partnership, marriage, or even a political one. As was previously said, the
confidence. As such, doctors have an ethical and moral obligation to safeguard patient
confidentiality.
Under such circumstances, making even factual private information publicly available might
violate someone's right to privacy and can result in a conflict between one person's "right to
be let alone" and another person's right to information. Even genuine private information
disclosed has the potential to upset someone's peace of mind. It can cause him to develop a
lot of complexes and possibly develop psychiatric issues. After then, he could lead a chaotic
In the most straightforward language possible, this precedent-setting decision from the
Honorable Supreme Court establishes the prohibition on disclosing even accurate medical
history information about a patient without that patient's consent. Health-related data is even
classified as sensitive data by the SPDI Rules, 2011, which means that it cannot be shared
58
with a third party without authorization. On the other hand, hospitals are required under the
Clinical Establishment Rules, 2012 to keep an electronic record of their patients' medical
histories.
However, because the regulations are not applied to public entities, government-run hospitals
are free from all of them, giving them a reputation for protection against unjustified invasions
The limitations that the proposed data protection law in India aims to place on the breadth
and depth of the right to privacy are its most important feature. Since the subject of law is
still extremely young, it will take some years before the courts develop a clear methodology
for determining the boundaries of when and how the right to privacy can be used. Without a
doubt, the Puttaswamy ruling will launch a system that will significantly protect the privacy
marks the end of the effort to protect citizens' private information; rather, it marks the
beginning. We are now worried about the ruling in Puttaswamy, how the court justified it,
and how this may affect India's future data protection laws.
.It should be mentioned that the nature of the right to privacy was the main point of argument
in the Puttaswamy case between the petitioners and the defendants. Is there an unrestricted
right to privacy, or does it include certain built-in restrictions? What are the imitations, and
how does the court defend them if it isn't absolute? Although the legislation on the matter is
still in its infancy, the Puttaswamy does offer a model.to ascertain the circumstances that
warrant the state's invasion of privacy. The next portions of our debate will aim to delve more
into the subtleties of the restrictions imposed on the right to privacy by the SC. This is the
most crucial aspect of the problem as, even while the government is likely to acknowledge
59
that citizens have a fundamental right to privacy, it will undoubtedly hunt for other
justifications for interfering in people's private lives.The Data Protection Bill, 2019 has been
sent to a select committee, which is unlikely to change the draft bill's "exemptions" section.
The lack of explicit or even implicit reference of privacy in the constitution's text or in the
deliberations of the Constituent Assembly is the biggest obstacle to the acceptance of the
right to privacy in the Indian constitutional structure. The Indian courts have only been able
to identify the right to privacy in the constitution by means of a functional and structural
interpretation of its provisions. It is hardly unexpected, then, that it has taken more than 60
years for Indian courts to acknowledge that an individual's private rights are fundamental to
their rights.."[i]f India wants to avoid coming out as an authoritarian state, it must be open
and honest about who will be allowed to gather data, what information will be gathered, how
it will be put to use, and how the right to privacy would be upheld Regrettably, the impending
The fact that the constituent assembly summarily rejected the inclusion of any such
protection in the Indian constitution, and this understanding of the right to privacy under the
fourth amendment served as the only source of guidance—or rather, misguidance—for the
Indian courts for years. This rejection had a significant impact on the development of the data
protection regime in India for years. M. P. Sharma and Others v. Satish Chandra was the first
case in which the Supreme Court had the opportunity to consider whether a right to privacy
existed within the context of a right to property.The SC cited many rulings from the US
Supreme Court to consider the legality of the state's intrusion and adoption under the Indian
60
scheme. The court determined that: Despite rejecting the acceptance of spatial privacy in the
"In any system of jurisprudence, the State's power of search and seizure is paramount for
construction when the framers of the Constitution saw fit to exempt such regulation from
constitutional limitations
It is evident from this that the court declined to incorporate the fourth amendment into the
constitutional framework for two reasons. First, it adopted the originalist approach and just
refused to include the fourth amendment in the Indian plan on the grounds that the
Constituent Assembly had not included it. The second rationale was more of a defense
predicated on the idea that the state could have the authority to search and seize in order to
This idea, however, was short-lived, since the Supreme Court quickly established a
completely different definition of the scope of the right to privacy in Kharak Singh v. State of
UP. The matter at hand was to an administrative directive that aimed to grant the authority to
search and seize property from police officers on historical sheeters' homes. The court
continued to consider the legitimacy of this restriction based on Article 21 of the Constitution
even though, as an executive order, it would not be considered a law under Article 13 of the
Constitution. Based on the preamble's use of the word "dignity," the SC observed that an
arbitrary incursion into someone's house would rob them of their dignity and mental serenity.
. The court essentially acknowledged that following a person's activities did in fact breach
their right to privacy, even if it declined to interpret this as one of the core liberties protected
61
by the constitution. Judge Subba Rao, on the other hand, established a connection between
privacy and personal freedom and concluded that: While the right to privacy is not
individual freedom. Domestic life is sacred in any democratic nation; it should provide him
with security, tranquillity, pleasure, and relaxation. When everything else fails, a person's
home, where they reside with their family, serves as their "castle" and barrier against
It is important to highlight that Justice Subba Rao displayed remarkable judicial innovation in
his dissenting opinion by interpreting the right to privacy in both Article 19 and the right to
life and liberty. "Be free from restrictions or encroachments on his person, whether those
measures," he said, emphasizing the word freely.He rejected the idea that the right to free
speech and expression is an abstract idea without any psychological foundation, but he
We have arrived at the conclusion that Art. 19 (1) (d) of the Constitution, when combined
with the freedom of speech and expression, must only apply to bodily movements.
Undoubtedly, the act of spying imposes limitations on the aforementioned freedom. It cannot
be argued that the aforementioned freedom would just uphold the procedures of speech and
One may argue that Kharak Singh represented the hesitant acceptance of the "individual"
oriented understanding of the right to privacy. One may argue that this case did bring to light
some of the most urgent issues with India's current monitoring policy. To understand the
characteristics of the current surveillance system in India, a quick review of the cases that
62
followed is required before going into the difficulties that are similar in the current situation
and those that the court addressed or neglected to address in Kharak Singh.
Courts will safeguard innocent citizens' phone conversations against improper or haughty
intervention by listening in on the call. The guilty are not the ones who are protected. It
should not be interpreted as meaning that the courts will accept measures that put citizens'
safety at jeopardy in order to allow the police to act in an illegal or unusual way. There isn't
Nothing is more detrimental to a man's physical happiness and health than a calculated
intrusion into his privacy, he said, adding that while it is true that our Constitution does not
component of personal liberty and that, in the last resort, a person's home is his
castle.Assuming that the fundamental rights explicitly guaranteed to a citizen have penumbral
zones and that the right to privacy is itself a fundamental right, that fundamental right must
The Indian telegraph Act's section 5(2), which has been the government's most frequently
used tool in its surveillance regime, was one of the questions under challenge in People's
Union for Civil Liberties (PUCL) v. Union of India, one of the Supreme Court's most well-
It should be noted that the clause fully supported the idea that even the most little information
about a person's medical history might be harmful to their dignity and thus require further
protection. At this point, the ruling in Mr. X v. Hospital Z is relevant since the SC
emphasized that the clause has been acknowledged in both text and spirit.,
63
"Private facts may constitute an infringement on one's right to privacy, which may
occasionally result in a conflict between one person's "right to be let alone" and another
person's right to information." Even genuine private information disclosed has the potential to
upset someone's peace of mind. It might cause him to develop several complexes and
With the post-Puttaswamy period law on phone tapping and surveillance, the Bombay High
Court was given the chance to rule in 2019 by applying the principles of the right to privacy
to section 5(2) of the IT Act.Regarding the interception issue in the Vinit Kumar Case, the
High Court decided as follows: An The IT Act's section 5(2) only permits orders of
The BN Srikrishna committee report states that "the Puttaswamy test of necessity,
proportionality, and due process should not be passed without a degree of transparency being
followed in the surveillance process." Public information, legislative oversight, executive and
administrative supervision, and judicial oversight are just a few ways that this might manifest
itself. The investigation made clear that, when it comes to monitoring, the state must follow
We will first go into great length in this part on the guidelines established by the Indian
Supreme Court that must be adhered to when denying someone their fundamental rights. The
Puttaswamy ruling recognized the right to privacy as an integral part of the right to life and
liberty, making it a basic right. As such, the state agencies that are allowed exemptions from
these constitutional safeguards must meet the criteria outlined in the ruling.
64
Indian courts have customarily employed distinct standards to ascertain the boundaries within
which individuals' rights might be curtailed. The Supreme Court has developed three
standards throughout the years to determine whether the limitation of basic rights is
appropriate. We will now have a quick review of these criteria in order to assess if the current
bill's provisions, which aim to exclude the agencies from applying the Act's safeguards, can
pass muster with the standards established by legally binding judicial decisions.
In the Puttaswamy majority ruling, the proportionality test was interpreted in a way that was
specific to the Indian constitutional framework. In assessing the degree of privacy violations,
Indian courts will apply the theory of proportionality in the upcoming days and the
constitutionality of the provisions providing for The test will serve as the foundation for
exceptions under the data protection bill. While the Puttaswamy judges' understanding of
proportionality differs from other jurisdictions around the globe, it is important to note that
the judges thoroughly examined the test's design before changing the current standards for
privacy infringement.
privacy invasion is legitimate. The validity of the objective for which the action is being done
is the subject of the test's first component. A sensible relationship between the methods and
the desired outcome is necessary for the second component to be met. The third component,
often known as the need stage, stipulates that there must be no less restrictive option that is
. The last phase, referred to as the "balancing stage," calls for the government action to not
disproportionately affect people' rights. Citing a passage from Professor Bilchitz's thesis, the
Supreme Court has clarified that, in order to determine whether a policy is necessary, it must
first identify all potential alternatives to the government's adopted policy. Only then can it
65
investigate whether these measures could be a viable alternative.
. The less restrictive alternative policy ought to be chosen if it can actually and significantly
4.7. Findings
This chapter's examination focused on the many aspects of India's current data protection
laws. A cursory examination of the laws now in effect and previous rulings paints an
extremely negative image of the nation's data protection framework. It must be acknowledged
that the notion of acknowledging the right to privacy as a separate right that might be linked
to dignity and the rights to life and liberty was not well received by the Indian populace as a
In accordance with the same logic, it took the Indian Constitutional Courts more than 70
years to acknowledge that the Indian Constitution had a separate right to privacy. Regarding
data security, the Indian legislative first addressed the rising number of cases of fraud and
data theft in the rapidly expanding Indian sector of information technology. India's data
protection laws are extremely lax since the Information Technology Act, 2000 was enacted
primarily to combat the rising threat of cyber fraud rather than to address data protection
issues.
Since India does not yet have a complete data protection law, one must search for provisions
in other laws that attempt to provide individuals' personal data with sufficient security. The
Information Technology Act, 2000 and the Information Technology Rules 2011 are two
examples of laws that attempt to protect individuals' informational privacy. The researcher
has examined these laws' various provisions in order to assess how effective India's current
66
a) Indian data protection laws have a relatively weak stance on data protection and lack
b) The Indian data protection regime does not incorporate the internationally recognized Data
Protection Principles.
b) Given that the State is the entity that processes data the most, the legislation need to
provide adequate protections against the potential for the State to violate an individual's right
to data privacy. Because State actors are not covered by India's present data protection
framework, it is difficult to prevent unjustified data breaches by the government and its
agencies.
d) There is an urgent need to advance a paradigm change in the approach of the legislative to
provide the ownership of data to the data principals, since there are now insufficient
mechanisms to ensure and enforce the data protection standards. e) To defend people's rights
against data breaches, India needs to establish an impartial Data Protection Authority. At the
moment, there isn't The executive staffs the clause requiring the creation of a data protection
authority and oversees the whole system for resolving data breach claims.
e) There is a need to incorporate laws controlling social media intermediaries and data
localization because the current data protection framework in India places little focus on data
security measures. f) The Information Technology Act of 2000 is unfavorable to the rights of
data principals because it places several obstacles in the way of the implementation of the
f) The fundamental tenets of data protection—such as the right to erasure, the right to
informational self-determination, the right to informed consent, the right to be forgotten, etc.
—are absent from the current framework.b) The current framework excludes minors from the
f) The existing framework does not include the core principles of data protection, such as the
right to erasure, the right to informational self-determination, the right to informed consent,
the right to be forgotten, etc. b) Minors are not included in the definition of personal data
under the existing framework, and their data is not protected. h) Obtaining the remedies that
the existing laws have set is extremely difficult due to the severely restricted obligations of
data processors. right to privacy, the nation's top court has established the cornerstones of a
strong data protection system. The day the right to privacy was acknowledged as a basic right
protected by the Indian Constitution was more than three years ago. But there hasn't been
much progress made in India on passing a comprehensive data protection law, and the
planned Data Protection Bill, 2019 hasn't even been given the green light yet. Given that the
researcher has given careful thought to the laws pertaining to India's data protection
framework
CHAPTER 5:
REFERNCE TO EU, US
5.1. Introduction
n in India, allowing the researcher to develop a logical assessment of the current situation of
data protection in India. After completing most of the preliminary work, the researcher will
compare and contrast some of the most important elements of the current and planned data
68
protection laws in India in this chapter. This discussion's only goal is to produce workable
and useful recommendations for achieving the goal of building a strong data protection
framework in India.
The Information Technology Act of 2000, the SDPI Rules of 2011, and the Personal Data
Protection Bill of 2019 will all be examined by the researcher in order to evaluate the claim
that "India's legal framework for data protection is insufficient to protect citizens' right to
privacy."
As a result, the discussions in the following sections will only focus on analyzing the
provisions of the current and proposed data protection laws in bill and their implications for
the future data protection regime in India. We have already taken into consideration the
approach that the Indian judiciary has taken with regard to various aspects of the right to
privacy. The conclusion of the research will be determined in part by a thorough examination
Comparing India's data protection legislation with those of the European Union, the US, the
UK, and several of the BRICS nations would be the main goal of the study. In order to create
a synergy between the study effort and the practicalities, the researcher has opted to compare
the peace-meal law that now governs data protection in India with the complete text of the
It's safe to assume that India's current data protection regime is nearing its end, and within the
next year, a completely new one may take its place. For this reason, it's critical to monitor
how the nation's data protection laws are evolving. With this normative consideration in
mind, the researcher will contrast some of the most important features of Indian data
69
5.2.Scope of The Indian Data Protection Laws in India and Elsewhere
The goal of the GDPR's passage is outlined in over 168 recitals in its incredibly long
preamble . The recitals acknowledge the basic right to privacy in the clearest possible terms
while outlining the need of adopting the measures. Similarly, "An Act to make provision for
connection with the Information Commissioner's functions under certain regulations relating
to information; to make provision for a direct marketing code of practice; and for connected
It is said that a bill's preamble establishes the general direction and voice of the law, and that
it serves more than just as a formality. It is also a primary source used by judges to interpret
any law's requirements. Therefore, it is essential that the preamble includes a wide range of
auxiliary goals in its description without straying from the spirit and core of the law.
Nonetheless, the right to privacy is never mentioned once in the preamble of the IT Act 2000.
A comparison between the GDPR and the IT Act and the IT norms will not be fair given that
India does not currently have comprehensive data protection laws. With this normative
component of the study in mind, the researcher, for the purpose of The numerous sections of
the proposed Data Protection Bill within the framework of the Indian data protection system
will be considered in the quality of analysis. The goal of the so-called Personal Data
Protection Bill, 2019 is to establish a strong data protection framework in the nation that
would grant citizens the right to their personal data. For this reason, it is imperative that the
law's preamble clearly state the goals for which it is being brought. Additionally, it states that
protecting personal data is required by the constitution and is "an essential facet of
informational privacy."
70
It should be noted that, in contrast to the GDPR, the preamble of the proposed Indian Act
promotes digital governance and the digital economy rather than emphasizing the value of
informational privacy. It also acknowledges that data has become a vital communication tool
in the digital age and should be protected to a higher extent. However, it is concerning that
too much emphasis is placed on advancing the digital economy at the expense of
There are significant concerns regarding the efficacy of the proposed data protection regime
in India, as the Personal Data Protection Bill 2019, which is meant to be the cornerstone of
the country's upcoming data protection regime, fails to specifically acknowledge the right to
The bill, among other things, aims to establish a comprehensive framework for the creation of
a data protection regime that does not acknowledge the data principal as the owner of their
data, but rather guarantees the implementation of structural and technical safeguards to
control the processing of personal data and prevent its unauthorized use. To achieve these
goals, the proposed bill also aims to create a data protection authority, but neglects to
emphasize the degree of autonomy provided to the authority . An ideal preamble of a data
protection law in a country like India should have been liberal in its approach towards
because the data protection regime in that country is still in its infancy and there are no
.. India lacks the benefit enjoyed by the European Union, where a substantial body of data
protection jurisprudence has already been produced by the judiciary. The preamble of the
proposed bill, however, makes no mention of the admirable goal of prioritizing the rights of
71
the data principals over any other aspect of data processing. In contrast, even the various US
laws attest to the provision of an adequate degree of protection to citizens' right to privacy.
Analysing the several other data protection laws in the US, such the Fair Credit Reporting
Act and the Health Insurance Portability and Accountability Act of 1996, leads to a similar
conclusion.
The proposed measure prioritizes innovation and the development of a digital economy over
the preservation of individual rights. It is argued that the absence of a clear mention of
protecting data subjects' rights from state intrusion in the bill's preamble, given that the state
serves as the data controller in the vast majority of these cases, could be harmful to efforts to
In contrast to the GDPR, the measure as it stands now offers the explicit ways in which the
The data's economic component takes precedence over the data principals' rights. A data
protection regime that treats citizen data more as a tool of commercialization is indicated by
the preamble's disregard for the need to establish an open surveillance regime that would be
subject to the rule of law, as well as its excessive emphasis on fostering a digital economy
.It is recommended that the fundamental component of the proposed data protection regime
be the bill's inclusion of the idea that the data principal is the genuine owner of their data and
that their right to informational self-determination and decisional autonomy falls under its
purview. Although the government's strategy may be focused on developing the digital
economy and digital governance, these goals shouldn't be permitted to take precedence over
72
The pledge of protection against governmental intervention in an individual's private sphere
and the case for surveillance reform in India should be made clear in the preamble. When
comparing the preamble of the law to that of the GDPR, it becomes clear that there are
inherent weaknesses that have existed since the development of a strong data protection
policy in India.
Individuals' personal information is not protected in any way by the Information Technology
Act of 20000 or the SDPI Rules of 2011 unless it is considered sensitive information.
Notably, the Telegraph Act addresses several issues of informational privacy. The Telegraph
Act and Rules, which include clauses that make illegal communication interception illegal
and punishable. Moreover, telecom service providers' (TSPs') licenses TSPs are required by
this Act to take precautions to protect their customers' privacy and communication
secrecy.427 Furthermore, governmental institutions are exempt from the Act's restrictions. It
is argued that the promise of data protection is rendered meaningless and ephemeral by these
exclusions. In stark contrast, the GDPR recognizes the right to personal data privacy as a
basic right and provides total protection for people' personal data.
The Act's application is both extraterritorial and territorial, and it also covers organizations
located outside of India if their processing of personal data involves any particular activity or
business conducted in India. Regarding how the act is applied, the GDPR's scope, US data
protection regulations, and the UK Data Protection Act are comparable. The following
The information is handled by the State, any Indian-based business, or any other Indian legal
entity; • The information is gathered, processed, kept, or released inside the borders of India.
The processing of data by fiduciaries or data processors who are not physically present in
73
India, if the processing is related to business conducted there or any other particular activity. •
The processing of data involves profiling of data within the Indian Territory.
Even if the proposed law eliminates many of the significant shortcomings of the prior
application of the rules to non-sensitive personal data, there are still several gaps that make
the forthcoming data protection regime less effective than the GDPR at protecting
individuals' right to privacy. Among the strangest features of theThe proposed measure would
exclude "non-personal" data from the Act's protections, giving the Central government the
right to refuse these data's access to the Act's safeguards. It is argued that the phrase "non-
personal data" has a very ambiguous and misleading meaning. It is argued that legislation
aimed at safeguarding citizens' personal information and establishing a robust data protection
framework should not allow for the infringement of informational privacy through the use of
provisions such as "non-personal" data. and excluding them from the proposed Act's
possible to turn data that lacks characteristics of a specific individual into personal data. It is
argued that one shouldn't completely rule out the potential of non-personal data being
misused. However, no such categorization is provided by the GDPR, the US Privacy Act, or
And disqualifying them from the application of the proposed Act. Data without particular
individual traits may now be transformed into personal data thanks to artificial intelligence
and other technology advancements. There is a contention that non-personal data misuse
should not be entirely ruled out. Nevertheless, neither THE UK Data Protection Act nor THE
approach is weaker since it includes the idea of non-personal data. According to the Draft
Bill, the terms "personal data" and "non-personal data" are clearly defined, and sensitive data
is also distinguished. The definition of personal data in the proposed bill is predicated on the
same logic, as the study heavily drew from Puttaswamy's observations and argued that the
"sphere of privacy includes a right to protect one's identity." According to the bill's proposed
language
either directly or indirectly, based on any feature of their identity, whether they are found
online or offline, or by combining those features with other information. It also includes any
conclusions that are made about them for the purpose of profiling.
The word "personal data" has been interpreted extremely broadly, encompassing any
personally identifiable information that can be used, directly or indirectly, to identify a real
person. It also includes in its purview all information that, when put together, can be linked to
any feature or attribute of a real person.. The BN Srikrishna Committee report, which
supported by the proposed bill. The study also made it clear that the flexible definition must
be compatible with new technological advancements that might change the data categories
thorough understanding of how its scope is contingent upon the context in which the pertinent
data is being processed. In light of this, we think that a wide and accommodating definition of
75
All of the committee's suggestions regarding the scope of the definition of personal data are
included in the proposed law, and it is important to note that the legislature has heavily
data. It is said that the GDPR and the proposed Indian law have a similar stance when it
comes to defining personal data. The United States' legal precedents appear to be going in the
same direction.
5.4.2.Sensitive Data
Only sensitive personal data is granted protection under the IT Act of 2000 and the SDPI
Rules of 2011. In Puttaswamy, the Supreme Court upheld increased protection for data that
dignity inherent in the right to privacy under the constitutional framework. The BN
Srikrishna Committee report emphasized the necessity for distinct definition of specific types
of personal data, stating that they "may be likely to cause greater harm, or harm of a graver
nature."
Rama Vedashree states that the "concept of Sensitive Personal Data is primarily used for
providing higher level protection to the data subject against instances of identity-driven harm,
discrimination, and profiling." Sensitive information is defined under the proposed measure
belief, sex, sexual orientation, political affiliation, caste, intersex status or any other officially
identifiable information.
5.4.3.Financial Data
The current regulations in India on the right to data protection classify financial data as
sensitive data, shielding it from unjustified interference. Financial data is likewise recognized
76
as sensitive data under the 2019 Personal Data Protection Bill. According to the Bill, every
number or other piece of personal information used to identify an account created byas well
as any personal information pertaining to the connection between a financial institution and a
data principle, such as financial condition and credit history, or card or payment instrument
provided by a financial institution to a data principal. This implies that a higher degree of
security will be given to the PAN, income tax information, bank information, insurance
information, and associated information since they are deemed sensitive data..
The United States' Fair Credit Reporting Act (FCRA)439 requires credit rating organizations
to ensure the confidentiality of consumer financial information while also providing a high
level of security for individuals' financial data. Additionally, as required by the Act, credit
agencies must notify clients of any data that may be used against them.. “Lenders have a duty
to tell customers of any information used against them. This offers the consumers a chance to
know and, if feasible, contest the information. Additionally, the Act requires rating agencies
to notify customers about the specifics of the information. Ensuring the secrecy of the data is
one of the many ways the FCRA works to protect consumer privacy.”.
5.4.5.Health Data
Individuals' personal health data is well protected by the Health Insurance Portability and
Accountability Act (HIPAA), which prohibits processing of such data without consent. Their
preservation is an essential component of the right to privacy since medical histories contain
sensitive information about a person's past health and medical conditions. The HIPAA
regulations give sufficient security for sensitive data pertaining to the right to privacy.
. However, there is a discrepancy in the laws regarding the validity of the processing of health
data, as we have seen in the Medical Council of India's numerous rules, the SDPI Rules,
2011, and the IT Act 2000. Even though medical history data is classified as sensitive data by
77
the SDPI Rules, 2011, there is still a significant risk of privacy breach since the restrictions
As we've seen in earlier chapters, the European Court of Human Rights' extensive body of
rulings has also demonstrated how crucial it is to adequately safeguard personal health
information in the EU441. The proposed bill includes a fairly thorough description of the
health data and proceeds cautiously in including all relevant information about an individual's
medical history.
According to the proposed bill, "health data" is defined as information pertaining to the
physical or mental health of the data principal, including records about the data principal's
past, present, or future health as well as information gathered during the registration process
or while providing healthcare services, as well as information linking the data principal to the
provision of particular health services. It should be noted that the clause fully supported the
idea that even the most little information about a person's medical history might be harmful to
their dignity and thus require further protection. Right now at this point, the ruling in Mr. X
v. Hospital Z443, in which the SC said that the clause had been accepted in text and spirit,
"Private facts may constitute an infringement on one's right to privacy, which may
occasionally result in a conflict between one person's "right to be let alone" and another
person's right to information." Even genuine private information disclosed has the potential to
upset someone's peace of mind. It might cause him to develop a lot of complexes and
The proposed measure provides a higher level of security for health-related data by
classifying it as sensitive data. The purpose of the bill is to address the present gap in the
security of sensitive medical data, which is now covered by IMC regulations that are
insufficient to provide effective protection and safeguards.. Additionally, the current data
78
protection framework provides no protection at all for personal data in public sector medical
facilities. However, the Preamble of the proposed law states that this would no longer be the
case, meaning that the public sector will also be subject to similar protections.
5.5.Data Anonymization
The current Indian data protection laws provide very little guidance on the presence of an
anonymized data policy. There are no requirements for data anonymization under either the
SDPI Rules 2011 or the Information Technology Act of 2000. However, there is a wealth of
well-developed global law regarding the principles of data anonymization. However, the
GDPR also states that anonymized data that cannot be restored to its original form should not
. The data anonymization concept is incorporated into the proposed bills to alter the
characteristics of the personal data. in accordance with the suggestions made by the B N Sri
Krishna committee, which recommended following the data anonymization principle in order
to prevent the improper use of personally identifiable information. The Act gives data
“In line with the recommendations of the B N Sri Krishna committee, which suggested
adhering to the data anonymization principle in order to prevent the improper use of
personally identifiable information, the data anonymization concept is incorporated into the
proposed bills to alter the characteristics of the personal data. The Act provides broad
Although the idea of data anonymization is not unique to any one data protection legislation
in the world, the state's intricate network of betrayal in handling personal data most definitely
is. In the first place, the proposed bill makes the unscientific assumption that any processor
79
will be forced to share anonymized personal data in order to improve service targeting,
despite the possibility that such data may become de-anonymized in the future due to
technological advancements.
In layman's words, this means that the central government can demand that the data
fiduciaries provide the citizens' anonymized, non-personal data in order to support evidence-
based policymaking and improved service targeting. It is argued that a thorough definition of
anonymized data and non-personal data is absent from the draft statute.
Additionally, the method by which the non-personal, anonymized data might become
personally identifiable data is disregarded by the law. The ability of the central government to
Chandrachud's dissenting opinion in the adhaar judgment had also expressed doubts over
The potential for anonymized data in particular and non-personal data in general to be
converted into personally identifiable information is the most urgent worry. Although
anonymized data, the bill introduces an additional avenue for introducing uncertainty into the
data protection regime by involving non-personal data, even as it ignores these concerns.
.. The researcher would want to state up front that terms such as non-personal data were not
needed at all and should not be included in a data protection framework. It is quite possible
that the Central government would use the gap to violate peoples' privacy about their
80
The potential for reversibility is the most serious issue raised by the so-called anonymized
data. It should be mentioned right away that the Bill's definition of anonymized data is
incorrect. The clause should clearly state that in order for data to be considered anonymized,
"all the means likely reasonably to be used" to identify a natural person must no longer be
able to be used to do so
The laws leave it up to the Data Protection Authority to define the standards for determining
the standards of data rather than developing an impartial and healthy standard for identifying
the nature of data. Invisibility. Furthermore, there are risks involved in the anonymization
process. It should be highlighted that over time, non-personal data in the existing
Thus, it can be seen that the legislature has left open a broad loophole through which
personally identifiable information may evade the implementation of the data protection
anonymized data. The ability of the federal government to designate data as sensitive data is
another unsettling feature of the law; this will be discussed in more detail later. Nonetheless,
the legislature's disregard for the dangers associated with drawing a clear distinction between
personal and anonymized data raises grave concerns over the efficacy of the proposed data
protection framework.
disregarded by the Personal Data Protection Bill, 2019, which defines biometric data as
information that "allows or confirms the unique identification of the individual." The
“Biometric data refers to any similar personal information obtained through measurements or
”The underlying assumption of the proposed bill's definition of biometric data is that it only
refers to information that permits the verification of a natural person's identity. By doing this,
the proposed measure effectively opens the door for the exclusion of a significant amount of
personal data under the guise that it lacks sufficient information to establish an individual's
identity. However, the bill incorporates biometric data under the definition of sensitive data
in accordance with the committee's recommendations, which calls for a higher level of
5.6Conclusion
Numerous problems that still afflict the Indian data protection framework have been brought
to light by the comparative study of the data protection regimes in India, the United States,
the United Kingdom, and several of the BRICS nations. Even the planned data protection
framework does not offer a solid firewall against the unauthorised incursion inside the
citizens' private sphere, despite the fact that the State and its agencies are totally exempt from
The following points summarize the primary distinction between the approaches used in the
analysis by the participating nations and Indiana: The proposed Personal Data Protection Bill
2019 aims to narrow the current gap by implementing the fundamental data protection
principles, even if India's current data protection laws are far from meeting international best
practices.
82
Nevertheless, the Indian legislature has created a broad window of exemption provisions that
would allow the state agencies to violate the rights of the data owners on a variety of reasons,
despite the fact that there are clear indications of data breaches in the Aadhar program.
A significant divergence from the basic characteristics of the data protection legislation of
the nations under consideration illustrates an effort by the lawmakers to exclude the central
government's agencies from the act's requirements. The proposed Indian law contains
extensive exemption clauses, in contrast to the GDPR and the UK Data Protection Act, 2018
The way in which the rights granted by law are enforced is yet another noteworthy
divergence from the Indian approach to data protection. The safeguards against the state and
its agents are rendered inapplicable by the provisions of the Information Technology Act of
2000 and the Information Technology Rules of 2011. This significantly reduces the efficacy
CHAPTER 6:
83
CONCLUSIONS AND SUGGESTIONS
6.0. Introduction
Some of the most important problems that jeopardize India's chances of becoming a secure
jurisdiction for data protection have been brought to light by the talks in the preceding
chapter. To address the current shortcomings in the draft bill, this chapter effectively
incorporates the recommendations that might be included in the proposed Personal Data
The study's six chapters, which cover the many facets of data protection laws in India and
elsewhere, have been loosely separated. To arrive at an equitable evaluation of the study
hypothesis, the investigator allegedly categorized the chapters in a way that would facilitate
the best comprehension of the significance of a strong data protection legislation in the
nation.
The primary objective of the research was to conduct a critical analysis of the proposed data
protection bill's provisions, with the ultimate goal of addressing the thesis's hypothesis. The
researcher has concluded that the research hypothesis is answered in the affirmative
following a thorough examination of some of the most important components of the proposed
law. This result was more or less implied by the conversations in each of the chapters.
It is undeniably true that some of the most important concerns about data protection
regulations in a free and democratic society are not addressed by the Personal Data Protection
Bill, 2019. The researcher will categorically underline the elements of the proposed law in the
following sections that support the conclusions drawn by the researcher in relation to the
hypothesis.
84
One of the most important elements affecting how the courts will read a piece of law is its
preamble. As a result, having a prelude that is clear and forceful about its goal becomes ideal.
Ensuring the inhabitants of India have the right to privacy regarding their data and developing
a data protection framework that is attentive to even the smallest infringements on that right
The preamble should include a clear government pledge to prevent unauthorized access to
The preamble ought to consider the urgent necessity of raising national understanding of the
parameters of the right to privacy and fostering a culture that values privacy. The following
changes are suggested to the preamble of the Data Protection Bill, 2019:
The preamble, which succinctly and substantively includes these goals, will expand the scope
of the rights stipulated in the law. It is argued that policies that promote the digital economy
and place an excessive focus on data's commercial benefits would not advance people's right
to privacy. The promotion of the digital economy should not come at the expense of
protecting people's right to privacy, even though these goals may be incidental to a strong
The prologue has to "call a spade a spade," acknowledge the urgent need for surveillance
reform in the nation, and put forth a plan for a system that would ultimately defend people's
right to privacy. The preamble should unequivocally support the need for the establishment of
a fully independent authority to enforce the basic right to privacy, as well as the imperative of
6.1. Conclusion
85
The chapter provides a summary of the findings from the previous chapters' analysis and
makes recommendations for a solid framework that would serve as the cornerstone of India's
future comprehensive data protection laws. The recommendations include modifying the
draft data protection law's main clauses in order to include internationally recognized data
protection concepts into India's data protection framework.The Chapter addresses the legality
and justification for global data protection legislation. The chapter outlines the components of
an efficient data protection framework with a focus on the necessity of providing sufficient
The Chapter also addresses the several data protection principles that have been established
globally, discerning analytically where the idea of data protection as a component of the right
necessity of finding the ideal balance between achieving informational self-determination and
catering to the demands of a world that is becoming more and more digitalized.
PRINCIPLES" examines the many data protection principles that are accepted by
origins.
.The study that was conducted gives the researcher insight into the essential components of a
strong data protection policy in a democracy. In the next chapters, the researcher attempts to
develop the best possible data protection model for the Indian scheme, paying particular
attention to the OCED Principles. • The study has made it possible for the researcher to
pinpoint the essential components of a strong data protection policy. •Numerous problems
that still afflict the Indian data protection framework have been brought to light by the
comparative study of the data protection regimes in India, the United States, the United
legislation currently in place governing data protection in the United States, the United
Kingdom, and the European Union has been conducted. It is essential to carry out a full data
protection assessment because the European Union has had one in place for more than thirty
The evaluation of the current data protection laws in developed data protection regimes such
as the US and the EU aims to create a standard that will direct Indian policy makers regarding
the different forms of an ideal data protection regime, of course with the modifications
required to fit Indian society. The goal of the BRICS study on data protection laws was to
draw comparisons between the approaches taken by authoritarian communist regimes and
liberal democracies in this area. The study emphasized the importance of having a strong data
A thorough analysis of the current laws and court rulings pertaining to the right to privacy
and data protection within the Indian legal system is conducted in the Chapter on Data
Protection Regime in Indian Legal System.The analysis reveals a wide range of shortcomings
in the Indian data protection system, which makes it unable to address the threats to
informational privacy resulting from widespread digitalization. It also highlights the fact that
the nation's current laws do not include important data protection concepts.
The analysis presented in this chapter emphasizes even more how urgent it is to pass a
comprehensive data protection law that has the idea of informational self-determination at its
core. The proposed Personal Data Protection Bill 2019 aims to narrow the current gap by
87
implementing the fundamental data protection principles, even though India's current data
Despite clear evidence of data breaches in the Aadhar program, the Indian legislature created
a broad window of exemption provisions that allow state entities to violate the rights of data
principals for a variety of reasons. A significant divergence from the basic characteristics of
the data protection legislation of the nations under consideration illustrates an effort by the
lawmakers to exclude the central government's agencies from the act's requirements.
The protections against the state and its agents are rendered inapplicable by the provisions of
the Information Technology Act of 2000 and the Information Technology Rules of 2011.
This significantly reduces the efficacy of the Indian data protection laws. •In order to predict
the stance that Indian constitutional courts would adopt when interpreting the terms of the
new data protection bill, the researcher has also conducted a thorough analysis of the
These exemptions are quite broad in their scope and application, and the central government
shall be able to exempt any agency from the application of the Act's provisions for offenses
like "preventing incitement to the commission of any cognizable offence relating to public
order.600" The exemption clauses in the Personal Data Protection Bill, 2019 do not follow
the doctrine of proportionality while justifying the non-application of the proposed law's
provisions to any central agencies on the absolutely wide grounds of the sovereignty of India
The Comparative Analysis of India's Data Protection Laws Chapter makes a thorough
comparison between the data protection laws of India and those in the EU, UK, and USA
with reference to these countries. The researcher has also incorporated the proposed Personal
88
Data Protection Bill, 2019 provisions for the comparison study in order to get a beneficial
analytical output.
To illustrate the fundamental distinctions in the approaches to data protection, the chapter
compares and contrasts the salient features of the data protection laws of India and the three
other regimes. As it tests the research premise, the study reveals significant differences
between the Indian legislative and its counterparts in the study on the legislature's dedication
to establishing a strong data protection framework. • The goal of the research of the data
89
BIBLIOGRAPHY
STATUTES
Indian Contract Act, 1872, No. 09, Acts Of Parliament, 1872. (India)
Information Technology Act, 2000, No. 21, Acts Of Parliament, 2000. (India)
The Aadhaar (Targeted Delivery Of Financial And Other Subsidies, Benefits And Services)
90
Video Privacy Protection Act, 1988 Pub.L. 100–618
ARTICLES
Addison Litton, The State of Surveillance in India: The Central Monitoring System’s Chilling
Aimee Boram Yang, China in Global Trade: Proposed Data Protection Law and Encryption
Alan F. Westin, Privacy and Freedom 33 (1967); Andrew J. McClurg, Kiss and Tell:
Alina Savoiu & Catalin Capatina Basarabescu, The Right to Privacy, ANNALS
CONSTANTIN BRANCUSI U. TARGU JIU JURIDICAL SCI. SERIES 89, 101 (2013).
Andrew Jay McClurg, Bringing Privacy Law Out of the Closet: A Tort Theory of Liability for
to Privacy in the Digital Age, 53 INT’L LEGAL MATERIALS 727 735 (2014).
Asang Wankhede, Data Protection in India and the EU: Insights in Recent Trends and Issues
in the Protection of Personal Data, 2 EUR. DATA PROT.L. REV. 70, 73 (2016).
Asang Wankhede, Data Protection in India and the EU: Insights in Recent Trends and Issues
in the Protection of Personal Data, 2 EUR. DATA PROT. L. REV. 70, 86 (2016).
Balla, Stephen J., Administrative Procedures and Political Control of the Bureaucracy, 92
Brent Snook, Joseph Eastwood, Paul Gendreau, Claire Goggin & Richard M. Cullen, Taking
Stock of Criminal Profiling: A Narrative Review and Meta-Analysis, 34 CRIM. JUST. &
Cheng-Yun Tsang, From Industry Sandbox to Supervisory Control Box: Rethinking the
Role of Regulators in the Era of FinTech, 2019 U. ILL. J.L. TECH. &
Daniel Garrie and Irene Byhovsky, Privacy and Data Protection in Russia, 5(2) JOURNAL
Daniel Garrie & Irene, Byhovsky, Privacy and Data Protection in Russia,
92
5 J.L. & CYBER WARFARE 235, 243 (2017).
David Wallace & Mark Visger, Responding to the Call for a Digital Geneva Convention: An
Open Letter to Brad Smith and the Technology Community, 6 J.L. & CYBER
WARFARE 3, 5 (2018).
Dorothy A. Hertzel, Note: Don't Talk to Strangers: An Analysis of Government and Industry
Efforts to Protect a Child's Privacy Online, 52 FED. COMM. L.J. 429, 441 (2000).
Elliott, D., Opinions Data Protection is More Than Privacy, 5(1) EUROPEAN DATA
Frederik Zuiderveen Borgesius, Jonathan Gray & Mireille Van Eechoud, Open Data,
93
Privacy, and Fair Information Principles: Towards a Balancing Framework, 30
. M. Seervai, The emergency, future safeguards and the habeas corpus case: A Criticism, 21
Hallinan, D., 2019. Opinions ∙ Data Protection without Data: Could Data Protection Law
Apply without Personal Data Being Processed?, 5(3) EUROPEAN DATA PROTECTION
Henry Pearce, Systems Thinking, Big Data, and Data Protection Law, 18 EUR. J.L.
Ian Walden, Anonymising Personal Data, 10 INT’L J.L. & INFO. TECH. 224, 333 (2002).
Ilina Georgieva, The Right to Privacy under Fire-Foreign Surveillance under the
NSA and the GCHQ and Its Compatibility with Art. 17 ICCPR and Art. 8 ECHR, 31(80)
(2015).
Jakub Misek, Consent to Personal Data Processing - The Panacea or the Dead End,8
Joan M. Kiel, The Health Insurance Portability and Accountability Act (HIPAA)
Implementation Via Case Law, 20 J. CONTEMP. HEALTH L. & POL'Y 435, 448 (2004).
94
Jonathan Miller, S., How Did You Know That: Protecting Privacy Interests of Research
Jordan J. Paust, Can You Hear Me Now? Private Communications, National Security and the
Joseph A Cannataci & Jeanne Pia Mifsud-Bonnici, Data Protection Comes of Age: The Data
2007),
<https://www.tandfonline.com/action/showCitFormats?doi=10.1080%2F136008304
2000325274>
Joshua Warmund, Can COPPA Work - An Analysis of the Parental Consent Measures in the
Children's Online Privacy Protection Act, 11 FORDHAM INTELL. PROP. MEDIA & ENT.
Judy Meadows; Bob Oakley, Balancing Act - Reconciling Privacy with the Public's Right to
Kalyani Ramnath, ADM Jabalpur's Antecedents: Political Emergencies, Civil Liberties, and
Arguments from Colonial Continuities in India, 31 AM. U. INT’L L. REV. 209,225 (2016).
Kenbei Zhang, Incomplete Data Protection Law, 15 GERMAN L.J. 1071, 1081 (2014).
95
Kevin McGillivray, Conflicts in the Cloud: Contracts and Compliance with Data
Protection Law in the EU, 17 TUL. J. TECH. & INTELL. PROP. 217, 254 (2014).
Kevin McGillivray, Conflicts in the Cloud: Contracts and Compliance with Data Protection
Law in the EU, 17 TUL. J. TECH. & INTELL. PROP. 217, 230 (2014).
Latha R. Nair, Data Protection Efforts in India: Blind Leading the Blind, 4 INDIAN J.L.&
Laura F. Edwards, Rights That Made the World Right, 102 JUDICATURE 15, 20 (2018)
Lee A. Bygrave,Data Protection Pursuant to the Right to Privacy in Human Rights Treaties,
Lilian Edwards, Privacy, Security and Data Protection in Smart Cities: A Critical EU Law
Lina Jasmontaite, European Union: The European Data Protection Supervisor (EDPS)
Opinion 4/2015 Towards a New Digital Ethics, 2 EUR. DATA PROT.L. REV. 93, 112
(2016).
Lokke Moerel; Ronan Tigner, Data Protection Implications of Brexit , 2 EUR. DATA
Lothar Determann & Chetan Gupta, India's Personal Data Protection Act, 2018:
Comparison with the General Data Protection Regulation and the California Consumer
96
MAJA BRKAN, EVANGELIA PSYCHOGIOPOULOU, COURTS, PRIVACY AND DATA
Marc Chase McAllister, Modernizing the Video Privacy Protection Act, 25 GEO. MASON L.
not so new right, 3(2) INTERNATIONAL DATA PRIVACY LAW 88, 99 (2013),
<https://doi.org/10.1093/idpl/ipt004>.
Matthias Berberich; Malgorzata Steiner, Blockchain Technology and the GDPR- How to
Reconcile Privacy and Distributed Ledgers, 2 EUR. DATA PROT.L. REV. 422, 431
(2016).S
Mike Hintze, Privacy Statements under the GDPR, 42 SEATTLE U. L. REV. 1129, 1134
(2019).
Mike Hintze, Privacy Statements under the GDPR, 42 SEATTLE U. L. REV. 1129,1132
(2019)
Monika Zalnieriute, An International Constitutional Moment for Data Privacy in the times of
Nandan Nilekani, Data to the People: India’s Inclusive Internet, 97 FOREIGN AFF. 19, 33
(2018).
Peter Blume, Practical Data Protection, 2 INT'L J.L. & INFO. TECH. 194 (1994); Rupert
Battcock, Data Protection: Where Next, 3 INT’L J.L. & INFO. TECH. 156 (1995); Anneliese
Roos, Core Principles Of Data Protection Law, 39 COMP. & INT’L L.J. S. AFR. 102,110
(2006).
Raghunath Ananthapur, India's New Data Protection Legislation, 8 SCRIPTED 192, 201
(2011)
Renato Opice Blum & Camila Rioja, Brazil's GDPR Sanctioned, 2 INT'L J.
(2018).
Rights in Conflict-Reconciling Privacy with the Public's Right to Know, 63 LAW LIBR. J.
Ryan M. Calo, Against Notice Skepticism in Privacy (and Elsewhere), 87(3) NOTRE
Samuel D. Warren; Louis D. Brandeis, Right to Privacy, 4 HARV. L. REV. 193, 201 (1890-
98
1891).
D McGoldrick, Developments in the Right to be Forgotten, 13(4) HRLR 76, 777 (2013).
Silvia Lucia Cristea & Viorel Banulescu, The Right to Personal Data Protection. The Right
(2018).
Singh, S., Privacy and Data Protection In India: A Critical Assessment., 110 JILI, VOL. 53,
57 (2020)
Sophie Stalla-Bourdillon & Alison Knight, Anonymous Data v. Personal Data - False
Susan Nevelow Mart, The Right to Receive Information, 95 LAW LIBR. J. 175, 190 (2003).
<http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2372088>.
99
Uchenna Jerome Orji, The African Union Convention on Cybersecurity: A Regional
Uchenna Jerome Orji, The African Union Convention on Cybersecurity: a Regional Response
Umang Joshi, Online Privacy and Data Protection in India: A Legal Perspective, 7 NUALS
Viktor Mayer-Schonberger & Yann Padova, Regime Change: Enabling Big Data through
Vinita Bali, Data Privacy, Data Piracy: Can India Provide Adequate Protection for
Electronically Transferred Data, 21 TEMP. INT'L & COMP. L.J. 103, 106 (2007).
Will Thomas DeVries, Protecting Privacy in the Digital Age, BERKELEY TECHNOLOGY
Wilson, B., Data Privacy in India: The Information Technology Act. 2 SSRN
BOOKS
(1989).
100
CHRSTOPHER KUNAR, EUROPEAN DATA PROTECTION LAW:
GWEN KENNEDY, DATA PRIVACY LAW AND PRACTICAL GUIDE 432, (2nd,
110 (2018)
101
CONSENT- THEORY AND PRACTICE (4th, Alan Wertheimer and Franklin Miller eds,
2009).
PAVLAKOS, 2010).
APPLICATIONS 35 (2010).
102
WOODROW BARFIELD, UGO PAGALLO, RESEARCH HANDBOOK ON LAW OF
ONLINE SOURCES
Abir Roy, Data Protection: Why A Comprehensive Law Is Needed., THE FINANCIAL
comprehensive-law-is-needed/1694205>
<https://www.refworld.org/docid/3ae6b3630.html>.
<https://www.business-standard.com/article/economy-policy/govt-messed-up- control-
mechanisms-b-n-srikrishna-on-data-protection-bill-120013001855_1.html>.
Amar Toor, Brazil and Germany make moves to protect Online Privacy, but Experts see
<http://www.theverge.com/2013/11/8/5080554/nsa-backlash-brazil-germany- raises-fears-of-
internet-balkanization/>.
<https://privacyinternational.org/state-privacy/1002/state-privacy- india>.
Apar Gupta, Notes from a Digital Republic, Internet Freedom Foundation , INTERNET
<https://www.medianama.com/2018/07/223-srikrishna-dissent/>.
Bauer et. al, The Costs of Data Localisation: A Friendly Fire on Economic Recovery,
MOKROSINSKA 2015)
Benjamin Wittes, Jonah Force Hill: The Growth of Data Localization Post- Snowden,
pm),<https://www.lawfareblog.com/jonah-force-hill-growth-data-localization-post- snowden-
lawfare-research-paper-series>.
Bhageshpur, K., Council Post: Data Is The New Oil And That's A Good Thing,
<https://www.forbes.com/sites/forbestechcouncil/2019/11/15/data-is-the-new-oil- and-thats-a-
good-thing/#4bd8a6473045>.
Bureau, E., Biggest Data Leaks Of 2019 That Hit Indian Users Hard - What Causes Data
<https://economictimes.indiatimes.com/industry/tech/8-biggest-data-leaks-of-2019- that-hit-
104
indian-users-hard/what-causes-data-breach/slideshow/72839190.cms>
CCPR General Comment No. 16: Article 17); The Right to Respect of Privacy, Family, Home
and Correspondence, and Protection of Honour and Reputation, UNHRC (April, 8, 1988),
<https://www.refworld.org/docid/453883f922.html>.
Chander, A. et. al, Breaking the Web: Data Localization vs. the Global Internet, SSRN
(2014), <http://dx.doi.org/10.2139/ssrn.2407858>.
Chandrashekhar, A.,German Firm Finds One Million Files Of Indian Patients Leaked,
<https://economictimes.indiatimes.com/tech/internet/german-firm-finds-one- million-files-of-
indian-patients-leaked/articleshow/73921423.cms?from=mdr>.
LEADERSHIP(2019),
<https://www.informationpolicycentre.com/uploads/5/7/1/0/57104281/cipl_wh
ite_paper_on_regulatory_sandboxes_in_data_protection_constructive_engage
ment_and_innovative_regulation_in_practice 8_march_2019_.pdf>.
Ciso Mag | Cyber Security Magazine. 2019.In 3 Indian Firms Suffer High Financial Losses
P.M),<https://www.cisomag.com/survey-reveals-1-in-3-indian-companies-suffered-huge-
financial-costs-from-hacking/>.
Committee of Experts under the Chairmanship of Justice B.N. Srikrishna,, A Free and Fair
Digital Economy Protecting Privacy Empowering Indians, PRS INDIA (July 27,
105
2018)<https://www.prsindia.org/sites/default/files/parliament_or_policy_pdfs/Free%
20and%20Fare%20Srikrishna%20Committee%20Report%20Summary.pdf>
<http://meity.gov.in/writereaddata/files/white_paper_on_data_protection_in_india_
171127_final_v2.pdf>.
Communication From The Commission To The European Parliament And The Council
uri=COM%3A2017%3A7%3AFIN>.
Dana Polatin-Reuben and Joss Wright. An internet with BRICS characteristics: Data
<https://pdfs.semanticscholar.org/b139/318d4b752dbc6c0383775323edc5823d 9449.pdf>.
(2006),
<https://scholarship.law.gwu.edu/cgi/viewcontent.cgi?article=2076&contex
t=faculty_publications>
De hert p. & gutwirth s., ‘Data Protection in the Case Law of Strasbourg and Luxemburg:
file:///C:/Users/dell/Downloads/fulltext_stamped.pdf
106
Draft Report, Study on the Harmonization of Telecommunication and Information and
<https://www.itu.int/ITU-
D/projects/ITU_EC_ACP/hipssa/docs/2_Draft_Report_Study_on_Telecom_ICT_Po
licy_31_March_08.pdf>.
Eben Moglen & Mishi Choudhary, Huffpost Is Now A Part Of Verizon Media.,
),<https://www.huffingtonpost.in/2018/09/07/the-draft-data-protection-bill-is- flawed-here-s-
how-to-fix-it_a_23520171/>.
<https://ec.europa.eu/commission/presscorner/detail/en/MEMO_15_6385>.
Expert Committee Report, A Free and Fair Digital Economy Protecting Privacy,
<https://meity.gov.in/writereaddata/files/Data_Protection_Committee_Report. pdf>.
107
Expert Committee, Report of the Financial Sector Legislative Reforms Commission,
<https://dea.gov.in/sites/default/files/fslrc_report_vol1_1.pdf>.
WORDPRESS(Oct22,2019),
<https://indconlawphil.wordpress.com/category/privacy/>.
GDPR Associates., GDPR And Brexit - Does The UK Still Need To Comply?,
(2019), <https://www.gdpr.associates/gdpr-brexit/>.
321(2014).
INTERNATIONAL
(2017),<https://gratanet.com/laravelfilemanager/files/3/Data%20Protection%2 0in%20Russia
%202018%20final.pdf>.
GREENLEAF, G., ASIAN DATA PRIVACY LAWS: TRADE AND HUMAN RIGHTS
Gupta, A., Summary Of The Report On Privacy Law By The Group Of Experts Headed By
Justice A.P. Shah,, INDIAN LAW AND TECHNOLOGY BLOG (Nov 15, 2012),
<https://iltb.net/summary-of-the-report-on-privacy-law-by-the-group-of- experts-headed-by-
justice-a-p-shah-6e5917ea9c18>.
Ilya Khrennikov. Google to visa face Russia rules, Boon to Local Data Centers
108
BLOOMBERG (2014), <http://www.bloomberg.com/news/2014-09-25/ google-to-visa-face-
russia-data-rules-in-boon-to-local-operators.html>.
Indra Spiecker , Olivia Tambou, Paul Bernal & Margaret Hu, The Regulation of
Commercial Profiling - A Comparative Analysis, 2 EUR. DATA PROT. L. REV. 535, 540
(2016).
James Manyika, Susan Lund, Jacques Bughin,Jonathan Woetzel, Kalin Stamenov, and
Dhruv Dhingra, Digital Globalization: The New Era of Global Flows, MCKINSEY
mckinsey.com/business-functions/mckinsey-digital/our-insights/digital- globalization-the-
new-era-of-global-flows>.
(2020),<http://www.twobirds.com/en/news/articles/2016/uk/brexit-data- protection-and-cyber-
security-law-implications>.
Jflrgen Schaaf and Thomas Meyer, Outsourcing to India: Crouching Tiger Set to Pounce,
<http://www.dbresearch.com/PROD/DBRINTERNETENPROD/PROD00000
00000192125.pdf>.
digitalisation/article16938094.ece>.
Kaushik Basu. India’s Digital Transformation., THE HINDU (FEBRUARY 12, 2016 00:57),
<https://www.thehindu.com/opinion/op-ed/indias-digital- transformation/article8224206.ece>.
Khaira, R., Rs 500, 10 Minutes, And You Have Access to Billion Aadhaar Details.,
<https://www.tribuneindia.com/news/archive/nation/rs-500-10-minutes-and-you- have-access-
to-billion-aadhaar-details-523361>.
Maneesh Chhibber, 35 Years Later: A Former Chief Justice of India Pleads Guilty,
<http://indianexpress.com/article/>.
Meera Kosambi, Gender Reform and Competing State Controls over Women: TheRakhmabai
<https://doi.org/10.1177/0069966795029001013>.
Megha Mandavia., India Has Second Highest Number Of Internet Users After China:
<https://economictimes.indiatimes.com/tech/internet/india-has-second-highest- number-of-
internet-users-after-china- report/articleshow/71311705.cms?from=mdr>.
Meghna Mandavia, Personal Data Protection Bill can turn India into ‘Orwellian State’:
protection-bill-can-turn-india-into-orwellian-state-justice-bn-
srikrishna/articleshow/72483355.cms?utm_source=contentofinterest&utm_me
dium=text&utm_campaign=cppst>.
Ministry of Law and Justice, Committee of Experts under the Chairmanship of Justice B.N.
Srikrishna, A Free and Fair Digital Economy Protecting Privacy, Empowering Indians,
<https://meity.gov.in/writereaddata/files/Data_Protection_Committee_Report. pdf>.
Nandta Mathur, India Now Has Over 500 Million Active Internet Users: IAMAI.,
over-500-million-active-internet-users-iamai-11588679804774.html >
(2013),
<https://www.oecd.org/internet/ieconomy/oecdguidelinesontheprotectionofprivacya
ndtransborderflowsofpersonaldata.html>.
<https://www.oecd.org/corporate/principles-corporate-governance/>.
Bell.com/action/showCitFormats?doi=10.1080%/survey>.
Parry Aftab & Nancy Savitt, Children, Data and the Web; New Rules Stress Privacy, Safety,
Peter Hustinx., EDPS Speeches & Articles, EU Data Protection Law: the Review of Directive
<https://gegevensbeschermingsrecht.nl/onewebmedia/peter.pdf>
Peter Margulies, The NSA in the Global Perspective: Surveillance: Human Rights and
Press Trust of India, India Recorded 37% Of Total Global Data Breaches Second Only To
The US: Report- Technology News, FIRSTPOST. (OCT 16, 2018 09:19 A.M.),
<https://www.firstpost.com/tech/news-analysis/india-recorded-37-of-total- global-data-
breaches-second-only-to-the-us-report-5384941.html>.
<https://economictimes.indiatimes.com/news/economy/policy/some-reforms- in-india-show-
benefits-of-digitalisation- imf/articleshow/68806028.cms?from=mdr>
Report of the Justice AP Shah Committee, White Paper of The Committee Of Experts On A
Data Protection Framework For India, PLANNING COMMISSION (October 16, 2012),
<https://www.meity.gov.in/writereaddata/files/white_paper_on_data_protection_in_
india_171127_final_v2.pdf>.
Report of the United Nations High Commissioner for Human Rights Council The right to
112
privacy in the digital age, (UNGA RES 28/16), OHCR, 39TH SESSION UN DOC
ddsny.un.org/doc/UNDOC/LTD/N13/544/07/ PDF/N1354407/>.
Constitutional Change, In A Less Than Perfect Union: Alternative Perspectives on THE U.S.
Robinson, Neil, Hans Graux, Maarten Botterman, and Lorenzo Valeri, Review of the
(2009),
<https://www.rand.org/pubs/technical_reports/TR710.html>.
<https://ccdcoe.org/uploads/2018/10/InternationalCyberNorms_Ch4.pdf>
FRONTIERS(2019),<https://www.orfonline.org/expert- speak/easing-us-india-
divergence-data-localisation-53256/>.
Smith, D., BRICS eye infrastructure funding through New Development Bank, THE
development/2013/mar/28/bricscountries-infrastructure-spendingdevelopment- bank?.
Sohini Bagchi, Data Privacy Day: India’s PDP Bill Needs Clarification, CX TODAY (Jan.
bill-needs-clarification/>.
113
Soldatov, A., and Borogan, I., Russia’s Surveillance State, World Policy Journal, WORLD
Sreenidhi Srinivasan and Namrata Mukherjee, Building an effective data protection regime,
<https://www.livemint.com/Industry/32kLqMlXEh0w4GhvLKxGkN/Indian- data-protection-
norms-insufficient-report.html>.
Swathi Moorthy, Data Protection Authority Will Be A Government Stooge And Weaken
Personal Data Bill: Justice BN Srikrishna, FIRST POST (January 30, 2020,
12:18IST),<https://www.firstpost.com/tech/news-analysis/data- protection-authority-
will-be-a-government-stooge-and-weaken-personal-data- bill-justice-bn-srikrishna-
7976651.html>.
The ET bureau,. Justice Srikrishna Committee Submits Report On Data Protection. Here're
Its Top 10 Suggestions. THE ECONOMIC TIMES (Jul 28, 2018, 04:35 PM),
<https://economictimes.indiatimes.com/news/politics-and-nation/justice-bn- srikrishna-
committee-submits-report-on-data-protection-herere-the-
highlights/articleshow/65164663.cms?from=mdr.>
The Hindu (Staff Reporter) Experts Raise Concern Over Draft Data Protection Bill., THE
<https://www.thehindu.com/news/cities/Hyderabad/experts-raise-concern-over- draft-data-
protection-bill/article24547899.ece>.
114
The Hindu. What Is The Right Way Of Regulating Social Media? OPINION (AUGUST 30,
regulating-social-media/article29291424.ece>.
UNHR, The Right to Privacy in a Digital Age, YOUR HUMAN RIGHTS (Nov. 1, 2013),
<http://daccess-ddsny.un.org/doc/UNDOC/LTD/N13/544/07/ PDF/N1354407>.
Yamini Aiyar , Shrayana Bhattacharya , Lant Pritchett,The Solutions State: Why The Digital
Needs The Human ,INDIAN EXPRESS (March 14, 2019 8:54:07 am),
<https://indianexpress.com/article/explained/the-solutions-state-why-the- digital-needs-the-
human-5625290/>.
Yuxiao Duan Renmin, China’s Private Law Approach to Personal Data Protection
SSRN (2019),
<https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3484725>.
115