Privaycy N It Act CH 1
Privaycy N It Act CH 1
Introduction
1.1 Introduction
1.2 Rationale of study
1.3 Object of the study
1.4 Scope and delimitation of the study
1.5 Hypothesis/Research questions
formulated to conduct the research
1.6 Research Methodology
1.7 Review of the related Literature
1.8 Implication of the Reviewed
Literature
1.9 Chapter Structure
1
1.1 Introduction
Today the internet and information technology has all pervasive growth which
almost abolished the system of law relating to established norms in the society.
The legal systems are trying to cope up with the speed and innovation in which
it is affecting the settled norms. Experts and lawmakers are taking efforts to
abrogate or reduce the effects on the rights. The most affected right of a person
is ‘right to privacy’ because of technology. The ‘personal space’ of an individual
is encroached or invaded by use of technology. This ‘right to personal space’ is
termed as ‘right to be let alone’ by J. Cooley1 and explored afterwards by Warren
and Brandeis2. It is termed as right to be in seclusion. Though this right is
associated with the human being from his birth, people were unaware about the
right to privacy and rarely demanded it.
1
J. Cooley, Thomas, “Treaties on Law of Torts” (1879)
2
Warren and Brandeis, “Right to Privacy”, (1890)Harvard Law Review, Vol. IV, no.5,
2
For providing protection, difficulty arises with the meaning of the term
‘privacy’. The term ‘privacy’ is fluid. It is so in the sense its meaning does not
remain same in all the situations. It is multifaceted concept. Man in early society
associated privacy with his obvious possession i.e. with property and any
encroachment or disturbance to the enjoyment of property termed as breach of
right to privacy. But with the progress in the technology, the meaning has
changed encompassing the protection in innovative way for new ways for
breach and invasion of privacy.
In most of the countries courts were the strong protector of this right. As there
was no specific recognition under any law, right to privacy was recognised
under constitutional provisions. In United States of America, by interpreting the
rights provided in Amendments to the Constitution, the courts protected it. In
India also the Constitutional provisions relating to fundamental rights are
interpreted to prevent breach and invasion on the right to privacy by the court.
3
Different legal systems tried to protect this right by enacting legislations and by
amending existing provisions by enlarging their scope. In United States the
evolution of right to privacy was first observed. It was shaped up be courts along
with the jurists. In the beginning, courts in United States of America protected
privacy in terms of property which slowly shifted towards accessing and
disclosure of information unauthorised. Afterwards it has enacted various sector
specific legislations for protection of information.
But guiding torch is provided by European Union vary concretely. It has issued
guide lines for protection of privacy to its member countries by issuing
Organisation for Economic Co-operation and Development (OECD) principles.
Personal data provided to entities including government can also be accessed by
the entities through service providers. To protect this data from illegal
processing, the new regulation was issued by the European Union in 1995 i.e.
Directive 95/46/EC. This directive is replaced by new regulation General Data
Protection Regulation in 2018. It has illuminated the path to many countries in
respect of protection of privacy of information.
4
India has also drafted legislations for privacy of information. Privacy Bills 2011,
and 2014 were drafted. Personal privacy and data privacy was provided under
them. But they were not finalised and assented by parliament. The Personal Data
(Protection) Bill, 2013, Personal Data Protection Bill, 2018 were also drafted.
But it was not assented by Parliament. The government has introduced The
Personal Data Protection Bill, 2019. It is pending before joint select committee.
1. Lack of provisions for protection of privacy and data privacy in the IT Act, 2000.
2. Protection of bodily privacy is protected but right to live an unobstructed life is
not provided for.
3. S. 66A declared unconstitutional by Supreme Court but there is no other
provision for protection against ‘annoyance’ or ‘inconvenience’ using
communication devices through information technology in IT Act, 2000.
4. S. 43 A protects the handling of the ‘sensitive personal data’ by body corporate,
but Government which is handling such data is out of the purview of this section.
5. Definition of ‘sensitive personal data’ other than provided under the rules are
decided in consultation with Central Government which is subjective opinion of
the government.
5
6. Use of CCTV surveillance, Biometric systems and data gathered by such uses
are not covered under the protection to right to privacy of person.
7. Law is silent on the methods of collection of personal data and information.
8. Consent of the person whose information is collected is not provided for under
the law.
9. No check is provided when government itself is gathering information from
service providers, intermediaries, data centres and body corporates.
10. Privacy is infringed by tracing or gathering electronic footprints but such
provision is not provided in IT Act, 2000 and under any of the personal data
privacy bills.
11. S. 69 provides the unlimited power to the government for interception of the
communication which is against the freedom guaranteed by art. 19 (1) (a) of the
Constitution of India. It should be more restrictive.
The main objective of this research is to find out the right to privacy with
reference to Information Technology Act, 2000. While finding out this the
researcher also conducts the study with following objectives.
1. To analyse the privacy bills and data protection bills towards protecting the
right to privacy.
2. To identify the preventive measures of infringement of interests and rights
of persons.
3. To identify global issues and challenges particularly in countries like U.S.A.,
U.K, European Union and also national policy in Cyber Laws.
4. To study the opinion of the stake holders.
5. To examine the role of judiciary in protecting the right to privacy of
individuals with reference to IT Act, 2000.
6
1. The Scope of study includes determining the privacy rights of the persons,
protection of personal data and sensitive personal information as of
technologically developed countries like U.K, U.S.A, and European Union.
2. To analyse the existing Information Technology Act, 2000 and Bills on
Privacy and Personal Data Protection.
3. The Researcher has been limiting the research on the privacy rights of the
persons in India on the backdrop of general history and existing laws of
different technologically developed countries regarding privacy and data
protection.
The main purpose of this research is to study the right to privacy with reference
to Information Technology Act, 2000 in India. The research was conducted on
the following hypothesis:
1. Due to lack of sensitivity and political wish for enacting the law for protection
of Right to Privacy, it is difficult to achieve justice or prevent failure of justice.
2. In absence of the clear provisions for protection of Right to Privacy, the judiciary
cannot deliver justice and prevent infringement of the rights.
3. The lack of awareness among people about the clear provisions of Information
Technology Act, 2000, will result in to infringement of Right to Privacy of
individuals.
4. As there is an absence of any check on the government or any entity for gathering
and dissemination of information of a person, it is not possible to guard rights of
person relating to his privacy
5. Due to lack of the provisions regarding responsibility of intermediaries, service
providers, there is a possibility that intermediaries, service providers misuse the
power.
Research questions:
1. Is it possible to achieve justice or to prevent failure of justice as there is less
sensitivity and political wish to enact law for protection of right to privacy?
2. Can a judiciary deliver justice and prevent infringement of the rights, in
absence of clear provisions protecting Right to Privacy?
7
3. Does lack of awareness among people about the clear provisions of
Information Technology Act, 2000, will result in to infringement of Right
to Privacy?
4. In absence of the any check on the Government or any other entity for
gathering and dissemination of information of a person, is it possible to
guard the right of person to his privacy?
5. As there is lack of provisions regarding responsibility of intermediaries,
service providers, is there a possibility that intermediaries, service providers
misuse the power?
Need for protection of privacy of a person in its all possible dimensions growing
rapidly with advancement of technology. Surveillance is used through CCTV
and Biometric devices to gather the personal information. Development in the
existing technology raises new issues regarding violation of the right. Pace of
development is much faster than enactment of a legislation. This provides a
8
serious threat to right to privacy of a person. So to have clear insight of the right
to privacy to a person in India, a researcher has gone through sources available
like books, reports, journals, research work, and tried to obtain the finding
related to topic.
Daniel Susser (2019)3 in his study discussed the concept of notice and obtaining
consent of the end users of using their personal information below the privacy
policy of any entity. He has shown with the examples of the studies done that
obtaining consent does not provide much protection for the individual using
such services because choice is either to accept the terms and condition fully or
do not avail the services. They are also too technical to understand for a common
person about the all consequences of sharing personal information to an entity
to disseminate. So this makes privacy choices complicated and personal
information is at stake even if the care is taken by the individual.
Rahul Matthan (2018)4 in his study discussed the concept with reference to
‘Aadhar’ regulations. After ‘Aadhar’, other identity papers earlier recognised by
the government are now derecognised and now are not considered as an identity
documents. But he has raised issue of person’s privacy and privacy of his
information as biometric information is also registered with the government. He
has discussed the problems regarding breach of privacy, misuse or hacking of
personal data, lack of awareness in public and also of authorities, no strict
liability of service providers. He also focussed the non- personal data when
combined with unique profiles, the identity and privacy of a person is revealed.
He has suggested that instead of focussing on awareness of people, the liability
shall be imposed on data collectors, data controllers and intermediaries.
Ginger Zhe Jin (2018)5 explored the concept in her paper on ‘Artificial
Intelligence and consumer Privacy’. She stressed that consumers are sufferers
as their data in public domain is used by commercial organisations, Because of
this, consumers lose their freedom to choose with whom to trade, what sites to
browse. It was also shown in her paper that these commercial organisations do
3
Susser, Daniel (2019), “Notice after Notice-And-Consent: Why Privacy Disclosure are Valuable Even If
Consent Framework Are Not”, Journal of Information Policy, Vol. 9. Pp. 37-62.
4
Matthan Rahul (2018), “Privacy, 3.0 Unlocking Our Data Driven Future”, Harper Collins Publishers, India.
5
Ginger Zhe Jin, (2018). “Artificial Intelligence and Consumer Privacy”, Available at
www.nber.org/papers/w24253 (Last visited on October 19, 2016)
9
not provide true information regarding the use of consumer’s personal
information currently or in future. They also fail to install the protective
technology preventing hacking or data leakage and discussed the ways to
combat consumer privacy breaches. But did not cover the individuals who are
not consumers but only availing services of some service providers. She stressed
framing of the new laws for this.
Solove Daniel J (2017)6 in his article explored the situations when consent is
obtained for collection of data for use and disclosure. He termed the rights of
notice, access and consent regarding collection, use and disclosure of personal
data as bundle of rights of a person. The person can himself decide for
themselves about cost, harm, advantages about giving the consent. This
regulation about privacy by the person himself is termed as ‘privacy self-
management’. He compared the data privacy laws of EU and USA. Though
USA has accepted gist of privacy principles as per the OECD principles but in
EU self- management principles are component but it requires much more
stringent and explicit form of consent than USA privacy law. EU law is more
restrictive of data collection, use and disclosure, it requires legal base before
personal data can be processed. In USA, data can be generally processed ‘unless
law specifically forbids the activity. In EU restriction may not have connection
to the harm. In USA processing is generally allowed unless it is harmful. He
suggested that coherent approach to consent is to be developed that accounts for
the social science discoveries about how people make decisions about personal
data. He also pointed out that it should be recognised that people can engage in
privacy self-management only selectively and privacy laws should be adjusted
for their timing to focus on downstream uses and more substantive privacy rules
should be developed.
6
Solove, Daniel J, (2017), “Introduction: Privacy, Self-Management and the Consent Dilemma”. Harvard Law
Review, Vol. 126, No. 7.
7
Zezulka, Ondr’ej, (2016), “The Digital Footprint and Principles of Personality Protection in European Union,
Charles University in Prague. Faculty of Law research paper no. 26/11/12.2016/III/02, available on
https://ssrn.com/abstract=2896864 ( Last visited on October 16, 2016)
10
movement of such data on natural persons. It came in to effect in 2018. Also the
directive 2002/58/EC was adopted concerning processing of personal data and
protection of privacy in electronic communication sector. Regulations
recommending the anonymity and right to be forgotten were also discussed. The
real situation regarding obtaining the consent of the user and safety of his
personal information in browsing is highlighted and need is emphasized to
provide some strong legal remedies.
Gaurav Goyal, Dr. Ravindra Kumar (2016)8 have studied the concept which
discussed the evolution of the concept ‘Privacy’. It was argued that the concept
changes according to the culture, upbringing and economic conditions of the
person and this concept is differently treated in India. They pointed out that
absence of legislation on privacy in India is the outcome of lack of political
wish. The argued that people of certain class enjoy more privacy than others
because of their economic conditions. They also stressed that technology
changes rapidly and therefore the concept of privacy also changes.
8
Goyal Gaurav, Kumar Ravindra, (2016), “The Right to Privacy in India: Concept and Evolution”. Partridge
Publication.
9
Desai Prashant S.(2013), “Legal Protection of Right to Privacy in era of Information Technology- a critique.
Retrieved from http://shodhganga.inflibnet.ac.in/handle/10603/98806 (Last visited on October 16, 2016)
11
Singh, Lakhwinder (2013)10 explored the concept ‘privacy’ thoroughly in
various provisions. The privacy provisions in India are compared with the
provisions of different countries in detail. He conducted the research and came
to the conclusion that there is no awareness among people about the privacy of
person.
Solove Daniel J(2011)12 explored the misconceptions about the argument which
is always done while in response of the privacy threat by surveillance that ‘I
have nothing to hide’. This surveillance is done to protect the state. But he
questions that whether this surveillance is necessary on every common citizen.
10
Shah Lakhwinder (2013), “Expanding Horizons of Right to Privacy: A Study”. Retrieved from
http://shodhganga.inflibnet.ac.in/handle/10603/87489. (Last visited on October 16, 2016)
11
Abraham, Sunil (2013), “Freedom from Monitoring: India Inc Should Push for Privacy Laws”. Available at
www.cis-india.org/internet-governance/blog/forbesindia-article-Aug-21-2013 (Last visited on October 16,
2016)
12
Solove Daniel, (2011), “Nothing to Hide: The False Trade-Off between Privacy and Security in New Heaven
and London”. Yale University Press.
12
He conducted study through questionnaires and received responses against it.
He argued that it is dangerous as there is possibility that individual interest is
harmed in terms of his privacy. He stressed that privacy is threatened not by
single act but by slow series of relatively minor acts which gradually begin to
add.
Apar Gupta (2010)13 in his article examined the issues of online privacy using
two taxonomies. One which is provided by Prosser in terms of four privacy torts
and secondly Solove’s taxonomy that privacy harms in terms of information
gathering, information dissemination or processing, publishing or disclosure of
information and invasion. He observed that Indian people are sensitive in
gathering of information and not for dissemination. But privacy is important for
both of these issues. Publication of information comes after that. He evaluated
the s. 69 and 69A of the IT Act, which provides power to government for
interception. He advocated that the statute shall provide clear provisions
regarding all the three. He stressed that there should be safeguards against such
data privacy breach by interception or otherwise. But it is not done so in the
Information technology Act.
13
Apar Gupta, (2010), “Balancing Online Privacy in India”, Indian Journal of Law and Technology, Vol. 6.
Available at www.ssrn.com/abstract=1682465. (Last visited on October 16, 2016)
14
Parveen Rehana, (2010), “Protection of Privacy in India: Law and Juridical concerns.” Retrieved from
http://shodhganga.inflibnet.ac.in/handle/10603/52364 (Last visited on January 12, 2017)
13
studied. Publishing the material which is harmful to individual’s interest and
exposure of the wrongdoer with sting operations are examined in her study.
15
Kumar, Santosh (2010), “Development of Information Technology and its impact on Right to Privacy- a critical
Study”. Retrieved from http://shodhganga.inflibnet.ac.in/handle/10603/56320 (Last visited on October 20,
2017)
16
Solove Daniel, (2009), “Understanding Privacy”, Harvard University Press.
14
Kiran Chauhan (2007)17 in her critical study of right to privacy upheld by
judicial decisions discussed the types of privacy like intimacy and privacy,
family privacy, community privacy, political/legal privacy, social privacy and
professional privacy. Functions of privacy were also discussed that it gives
personal autonomy, emotional release, self-evaluation and limited and protected
communication. Privacy in Hindu period, Muslim period, British and post
British period was also discussed. The legal framework in India under different
statutes and constitutional provisions were explored. Judicial response for this
right under situations like search and seizure, women’s rights, freedom of press,
telephone tapping, restitution of conjugal rights, protection of AIDS patients and
right to abortion was explained and discussed. Limitations on the right that
under certain circumstances this right may be denied are also provided. She has
suggested that the right shall be added by separate clause in Art. 19 to provide
protection and also disclosure by the government shall be prohibited.
The researcher above had concentrated his efforts for exploration of right
provided by the judiciary. For his suggestion that right to privacy shall be added
as separate clause under art. 19 is not much useful. Instead researcher in this
study shown the circumstances for which the threat to privacy shall be dealt with
the strong data protection legislation.
Solove Daniel (2006)18 has supplied the framework for understanding privacy
in pluralistic and contextual manner. He concentrated on the privacy problems
rather than ‘what is privacy’, its definition. He pointed out that there.should be
society for the privacy. Without society there is no need for privacy and privacy
is relief from the frictions of society. He explained that the data is handled in
four ways and he focussed on the activities which affect data. I) Information
collection –includes surveillance/ interrogation, II) Information processing-
includes aggregation, identification, insecurity in secondary use, and exclusion
17
Chauhan Kiran, (2007), “Right to Privacy- a Critical Study with Special Reference to Judicial Approach in
India”. Retrieved from http://shodhganga.inflibnet.ac.in/handle/10603/27846 . (Last visited on October 16,
2016)
18
Solove Daniel, (2006), “A Taxonomy of Privacy”, University of Pennsylvania Law Review.
15
of data, III) Information dissemination- includes breach of confidentiality,
disclosure, exposure, increased accessibility, blackmail, appropriation and
distort, IV) Invasion-includes intrusion, decisional interference.
He explained that against the each step there is a possibility of its breach in
different ways. Law should provide for redressal of them. He concluded that
policymakers struggle with identifying the presence of privacy problem due to
conceptual confusion. It requires to attain balance between privacy and other
interests.
Solove (2004)19 has described here the definition of digital Person whose
complete life is captured in data and stored in digital dossier on electronic
network. He described that how the technology takes hold of every individual
for the benefit to the commercial organisation.
19
Solove Daniel, (2004), “The Digital Person, Technology and Privacy in Information Age”, New York
University Press, New York and London.
20
Solove Daniel, (2002), “Conceptualising Privacy”, California Law Review, Vol.90, No.4.
16
injury to different sets of practices. By different examples he proposes that
privacy is not found but constructed. He propounded that privacy should be
valued as instrument to achieve certain valuable ends and therefore should be
understood in context.
Jajodia (Mozika) Jyoti (2002)21 has explored the right to privacy with broader
perspective and verified it under situations like right in terms of home which
include marriage, procreation, etc. She has discussed the right of privacy of
accused and criminal persons, innocent persons, prostitutes and also remedies
available for protection of this right. She discussed privacy of communication
and inviolability of person. She has concentrated more on general terms than
the threat with computer technology. But exploring and understanding the
different situations where the right to privacy can be breached by any tool is
important contribution.
On the basis of the review of related literature, the researcher has come to the
conclusion that there is need to know whether the existing laws, rules,
enactments and regulations dealing with the right to privacy in all its possible
contours of a person in India will be effective and well developed to provide
remedies to protect it. Therefore, the researcher through present study wants to
make an attempt to highlight and bring forth the lacunas in present Act and bills.
For the purpose of study the present position of right to privacy, the researcher
will analyse the laws, reports, bills, rules, and enactments on it and which shall
include the following namely Conventions of European Union Commission in
1981 regarding privacy, 1995 regarding data protection and privacy and 2018
regarding privacy while processing the personal data within and outside
European Union, privacy laws and data protection legislations of USA, UK,
Information Technology act, 2000, and various bills in India.
21
Jajodia (Mozika) Jyoti, (2002), “Emerging Right to Privacy in India”.
Retrieved from http://shodhganga.inflibnet.ac.in/handle/10603/137097. (Last visited on October 16, 2016)
17
1.9 Chapter Structure
Information about the person i.e. personal data is collected and processed
without his consent, also jeopardise the other rights and interests of the person.
This impacts decisional and physical privacy. Therefore data protection is also
an important aspect of privacy. Though all information is not necessarily private
and is to be protected, but it is to be decided by strong, fair and just legislation.
In the beginning of the chapter, the researcher discussed meaning, scope and
development of the concept ‘Privacy,’ that helped to understand the concept.
The researcher discussed the development of the concept in some of the
18
technologically developed countries like U.S.A. U.K, European Union that
helped to know the gradual development and history of the concept in different
periods and in different legal systems and various laws being enacted and
adapted by them for protection of privacy and how the same would be helpful
in codifying the laws in India. This chapter also discussed these gradual
development and history of data protection and to understand its development
and to examine the necessity to codify the laws pertaining to it.
The researcher, in this chapter, studied the IT Act, 2000 with international
scenario regarding right to privacy and data protection and studied the various
resolutions, conventions of United Nations, regulations and directions of
European Union and enactments and provisions involving various laws in
technologically developed countries like U.S.A, U.K involving various laws
pertaining to privacy and data protection. The researcher has interpreted the
codified enactments, provisions, laws and bills on privacy and data protection.
The researcher has further analysed whether there is need of new or improved
law or present provisions regarding privacy and data protection in the IT Act are
sufficient with some of the amendments to be made.
This chapter dealt with the important case laws highlighting the benefits of a
well codified and comprehensive legislation on privacy and personal data
protection. Case laws were important to discuss because they showed the actual
face and implication of prevailing law. The purpose of this chapter to find out
the law in force, but also to find out how different privacy and data protection
principles in earlier chapters are balanced with the rights and interests of the
individuals and if the current legislation allows some shift in this balance. In this
chapter, the researcher studied various judicial pronouncements deciding the
case laws regarding privacy.
The chapter dealt with the analysis and interpretation of data collected during
the research work based on semi structured questionnaire via homogeneous
19
purposive sampling of various stake holders in Mumbai, Maharashtra. Tool of
face to face conversation was used for interviewing the stakeholders. By that
data of stakeholders, using computer, mobile and internet have been collected
for homogeneous purposive sampling and that allowed the researcher to infer
information about population, without having to investigate every stakeholder.
This is the concluding chapter of the Research Work carried out by the
researcher. This Chapter has the major findings of the Study and the suggestions
of the Researcher to provide a better legal tool to protect privacy in India.
20