KEMBAR78
India's Data Privacy Revolution | PDF | Right To Privacy | Privacy
0% found this document useful (0 votes)
133 views8 pages

India's Data Privacy Revolution

The document discusses the Right to Privacy judgement in India. It summarizes that the judgement recognized privacy as a fundamental right, with informational privacy being a key aspect. It also describes how the judgement overturned previous rulings and established privacy protections under Articles 21 and 19 of the Indian Constitution. Additionally, it discusses the various types of privacy defined in the judgement, with informational privacy being especially relevant for data protection.

Uploaded by

Sanad Arora
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
133 views8 pages

India's Data Privacy Revolution

The document discusses the Right to Privacy judgement in India. It summarizes that the judgement recognized privacy as a fundamental right, with informational privacy being a key aspect. It also describes how the judgement overturned previous rulings and established privacy protections under Articles 21 and 19 of the Indian Constitution. Additionally, it discusses the various types of privacy defined in the judgement, with informational privacy being especially relevant for data protection.

Uploaded by

Sanad Arora
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

Data Protection Policy: India

In India, the State has become one of the largest consumers of data, considering how easy

it has become to store data in colossal amounts at a very low cost1. Since everything in

today’s era is digitised, whatever activity an individual undertakes involves some kind of

digital transaction leaving behind a digital print which remains on the internet forever. It

is this digital print which is stored and used by entities who have access to this data for

essentially creating an e-profile of the individual. In India, owing to the rapid pace of the

“Digital Revolution”, the State has started using personal data for welfare such as the

targeted delivery of social welfare benefits effective planning and implementation of

government schemes, counter-terrorism operations, etc. Such collection and use of data is

usually backed by law, though in the context of counter-terrorism and intelligence

gathering, it appears not to be the case2. As it is discussed above it is not just the State

which has access to such data, but it is both the public sector and the non-public sector

actors which use this data at an enormous scale, it is because of such exponential use of

data which has led to problems like centralisation of databases, profiling of individuals,

1
Joel Reidenberg, ‗Resolving Conflicting International Data Privacy Rules in Cyberspace‘, 52 Stanford Law
Review 1315 (1999).
2
Press Information Bureau, ‗Home minister proposes radical restructuring of security architecture‘, Ministry of
Home Affairs, Government of India (23 December 2009), available at
http://pib.nic.in/newsite/erelease.aspx?relid=56395 (last accessed 5 November 2017); Press Information Bureau,
‗Centralised System to Monitor Communications‘, Ministry of Communications, Government of India (26
November 2009), available at http://pib.nic.in/newsite/PrintRelease.aspx?relid=54679 (last accessed 16
November 2017); Udbhav Tiwari, ‗The Design and Technology behind India‘s Surveillance Programme‘,
Centre for Internet & Society, India (20 January 2017), available at https://cis-
india.org/internetgovernance/blog/the-design-technology-behind-india2019s-surveillance-programmes (last
accessed 16 November 2017).
increased surveillance and a consequent erosion of individual autonomy[whitepaper].

These issues were the main issues put forward in the Supreme Court case of Puttaswamy,

which recognised the Right to Privacy as a Fundamental Right, with Informational

Privacy being one of the fulcrums on which the Judges have very proficiently expounded

upon in the Landmark Judgement.

In India Justice K. Puttaswamy v Union of India overruled two judgments in two cases of

MP up to the extent to which they indicated that the Right to Privacy was not a

guaranteed right under the constitution. MP Sharma and Kharak Singh. Judgement in MP

Sharma essentially held that in the absence of a provision like the Fourth Amendment to

the US constitution, the right to privacy can’t be read under Article 20(3) of the Indian

Constitution. The Judgement does not specifically adjudicate on whether a right to

privacy would arise from any other provisions guaranteed by Part 3 of the Constitution

under Article 21 and Article 19. In Kharak Singh, it has correctly been held that under

Article 21 of the Indian Constitution means not only Right to personal animal existence

and that expression personal liberty is a guarantee against invasion of a personal home or

intrusion into personal security. Kharak Singh also correctly held that the dignity of the

individual must lend context to the meaning of personal liberty. The first part in Kharak

Singh which invalidated Domiciliary visits to at night on the ground that they violated

‘ordered liberty’ is an implicit recognition of the Right to Privacy. The second part of the
judgement which holds the Right to Privacy is not a guaranteed right under our

constitution, is not reflective of the corrective position. Both MP Sharma and Kharak

Singh were based on the principles of Ak Gopalan v State of Madras. It was Justice

Subba Rao’s dissenting view in the judgemenet of Kharak Singh that has been followed

by the nine judge bench in Puttaswamy that has led to Right to Privacy becoming a

Fundamental Right under Article 21 and Article 19 of the Constitution of India. It was put

under both Article 21 and Article 19 of the Constitution because it was held by Justice

DY Chandrachud that, “privacy facilitates freedom and is intrinsic to the exercise of

liberty”. The court struck down the part where it was held in Ak Gopalan v State of

Madras where it stated that the freedoms existing under Part III of the Constitution exited

in exclusivity. Justice Chandrachud held that a law restricting a freedom under Article 21

of the Constitution of India would also have to meet the reasonableness requirements

under Article 19 and Article 14 of the Constitution of India.

Justice Nariman and Justice Chamleswar have defined privacy under three facets

‘repose’, ‘intimate decision’, ‘sanctuary’. ‘Repose’ refers to freedom from unwarranted

stimuli, “sanctuary” to protection against intrusive observation, and “intimate decision” to

autonomy with respect to the most personal life choices. Justice Chandrachud in his

Judgement has further extrapolated upon the definition of privacy by categorising it into
nine types the nine primary types of privacy are, according to the depiction given in the

‘Typology of Privacy3’ in the University of Pennsylvania Journal of International Law

depiction: (i) bodily privacy which reflects the privacy of the physical body. Implicit in

this is the negative freedom of being able to prevent others from violating one’s body

or from restraining the freedom of bodily movement; (ii) spatial privacy which is

reflected in the privacy of a private space through which access of others can be

restricted to the space; intimate relations and family life are an apt illustration of spatial

privacy; (iii) communicational privacy which is reflected in enabling an individual to

restrict access to communications or control the use of information which is

communicated to third parties; (iv) proprietary privacy which is reflected by the interest

of a person in utilising property as a means to shield facts, things or information from

others; (v) intellectual privacy which is reflected as an individual interest in the privacy

of thought and mind and the development of opinions and beliefs; (vi) decisional

privacy reflected by an ability to make intimate decisions primarily consisting one’s

sexual or procreative nature and decisions in respect of intimate relations; (vii)

associational privacy which is reflected in the ability of the individual to choose who

she wishes to interact with; (viii) behavioural privacy which recognises the privacy

interests of a person even while conducting publicly visible activities. Behavioural

3
Bert-Jaap Koops et al., “A Typology of Privacy”, University of Pennsylvania Journal of International Law
(2017), Vol. 38 Issue 2, at page 566
privacy postulates that even when access is granted to others, the individual is entitled

to control the extent of access and preserve to herself a measure of freedom from

unwanted intrusion; and (ix) informational privacy which reflects an interest in

preventing information about the self from being disseminated and controlling the

extent of access to information.

It is the category of ‘Informational Privacy’ which has been further stressed upon by

Justice Nariman, Justice Chandrachud, Justice Kaul in the above-mentioned Judgement.

Data Protection is mainly related to the category of ‘Informational Privacy’. Justice

Chandrachud very clearly points out that the need to protect the privacy of the being, is

no less than the development and technological change continuously threaten to place the

person into privilege and portend to submerge the individual into a web of seamless

interconnected lives. Justice Kaul also states in his Judgement that the knowledge about a

person gives power over that person and also weighs upon the importance of introducing

a system to regulate such information. In the case of State of Maharashtra vs Bharat

Shantilal Shah, Justice Chandrachud gives his own take on the courts Judgement stating

that: The safeguards that the court adverts to in the above extract section 14, which

require details of organisation crime being committed. The requirements also mandate

requiring the nature and location of the facilities from which the communication is to be

intercepted. The nature of the communication and the identity of the person. Statement is

also necessary on whether other modes of inquiry or intelligence. A statement is also


necessary on whether other modes of enquiry or intelligence gathering were tried or had

failed or why they reasonably appear to be unlikely to succeed if tried or whether they

would likely result in the identification of those connected with the operation. The

duration of the surveillance is restricted in time and the provision requires minimal

interception. The duration of the surveillance is restricted in time and the provision

requires minimal interception.

Justice Chamleswar in para 43 of his judgment has made a very vital clarification further

clearing the smoke surrounding the Right to Privacy. In this para he is providing us with a

very useful insight regarding the conditions which are to be met by the State for justifying

its violations against the privacy of individuals. He has done this by providing a

distinction between a standard just, fair and reasonable test and the compelling state

interest test which he called the highest standard of scrutiny. He has stated that, only in

privacy claims which deserve the strictest scrutiny is the standard of compelling state

interest to be used and as for others ordinary claims the just, fair and reasonable standard

under Article 21 of the Indian Constitution will apply. Justice Kaul for providing a

limitation measure to the Right to Privacy incorporated the three-pronged test given by

Justice Chandrachud and added a fourth requirement for justifying violations of privacy

by the State:

1. Presence of a legitimate state interest


2. Existence of Law

3. Proportionality [ the proportionality standard is used in European and international

human rights jurisprudence, apart from being applied by the courts in Canada and

South Africa]

4. The existence of procedural guarantees against the abuse of such interference

[ the last requirement was added by Justice Kaul]

Legislative Developments

Information Technology Act, 2000 [ IT Act] gave birth to The Information Technology

(Reasonable Security Practices and Sensitive Personal Data or Information) Rules, 2011

(SPDI Rules). The SPDI rules under 43A of the IT Act. Section 43A of the IT Act

pertains to “Compensation for Failure to Protect Data” and empowers the enactment of

“reasonable security practices and procedures for the protection of sensitive personal

data”. The SPDI Rules incorporate, to a limited extent, the OECD Guidelines,

specifically: collection limitation, purpose specification, use limitation and individual

participation. The SPDI Rules mandate certain requirements for the collection of

information and insist that it be done only for a lawful purpose connected with the

function of the organisation. In addition, every organisation is required to have a detailed

privacy policy. The SPDI Rules also set out instructions for the period of time

information can be retained and gives individuals the right to correct their information.
Disclosure is not permitted without consent of the provider of the individual, or unless

such disclosure is contractually permitted or necessary for legal compliance. When it

comes to sharing information with Government agencies, then the consent of the provider

is not required and such information can be shared for purposes such as verification of

identity, prevention, detection and investigation including of cyber incidents, prosecution,

and punishment of offences. The SPDI Rules apply only to corporate entities and leaves

the government and government bodies outside its ambit; the rules are restricted to

sensitive personal data ‘, which includes attributes like sexual orientation, medical

records and history, biometric information etc., and not to the larger category of personal

data. Further, the Cyber Appellate Tribunal (CyAT) which hears appeals under the IT Act

has issued its last order in 2011. The absence of an effective enforcement machinery

therefore raises concerns about the implementation of the SPDI Rules. The SPDI Rules

recognise financial information such as credit card, debit card and other payment

instrument details as sensitive personal data, thus to that extent regulating their use,

collection and disclosure.

You might also like