Beruflich Dokumente
Kultur Dokumente
6
SHRADDHA KULHARI, BUILDING-BLOCKS OF A DATA PROTECTION
REVOLUTION: THE UNEASY CASE FOR BLOCKCHAIN TECHNOLOGY TO
SECURE PRIVACY AND IDENTITY, 23, (2018). JSTOR
7
Samuel Warren and Louis Brandeis, The Right to Privacy, 4, HARVARD L.J. (1890) [as
cited in Judith DeCew, Privacy, The Stanford Encyclopedia of Philosophy, Spring 2015
<https: plato.stanford.edu/archives spring2015 entries privacy > accessed on 11 July 2019
International Journal of Socio-Legal Research 110
Volume 5| Issue 3|August 2019 |ISSN-2393-8250
8
http://egazette.nic.in/WriteReadData/2018/194066.pdf
9
Ram Narain, Sec 69 of the IT Act: Fears of violation of privacy may not be unfounded,
HINDUSTAN TIMES, (July 11, 2019, 01:51 PM),
https://m.hindustantimes.com/editorials/sec-69-of-the-it-act-fears-of-violation-of-privacy-
may-not-be-unfounded/story-CLqIDix78GTVpHSqaaMJaO_amp.html
10
https://barandbench.com/wp-content/uploads/2019/01/Saurabh-Pandey-v-UOI-PIL.pdf
International Journal of Socio-Legal Research 111
Volume 5| Issue 3|August 2019 |ISSN-2393-8250
11
Section 5(2) of the Official Secrets Act, 1923 - If any person voluntarily receives any secret
official code or pass word or any sketch, plan, model, article, note, document or information
knowing or having reasonable ground to believe, at the time when he receives it, that the
code, pass word, sketch, plan, model, article, note, document or information is communicated
in contravention of this Act, he shall be guilty of an offence under this section.
12
Anita Gurumurthy, Are India’s laws on surveillance a threat to privacy?, THE HINDU,
(July 12, 2019, 02:10 PM), https://www.thehindu.com/opinion/op-ed/are-indias-laws-on-
surveillance-a-threat-to-privacy/article25858338.ece/amp/
13
Period within which direction shall remain in force.— The direction for interception or
monitoring or decryption shall remain in force, unless revoked earlier, for a period not
exceeding sixty days from the date of its issue and may be renewed from time to time for
such period not exceeding the total period of one hundred and eighty days.
14
https://www.meity.gov.in/writereaddata/files/Personal_Data_Protection_Bill,2018.pdf
International Journal of Socio-Legal Research 112
Volume 5| Issue 3|August 2019 |ISSN-2393-8250
15
Art. 12 of UDHR - No one shall be subjected to arbitrary interference with his privacy,
family, home or correspondence, nor to attacks upon his honour and reputation. Everyone
has the right to the protection of the law against such interference or attacks.
16
Art. 17 of ICCPR - No one shall be subjected to arbitrary or unlawful interference with his
privacy, family, home or correspondence, nor to unlawful attacks on his honour and
reputation.
17
K. S. Puttaswamy v. Union of India, Writ Petition (Civil) No. 494 of 2012 (Sup. Ct. India
Aug. 24, 2017).
18
https://cis-india.org/internet-governance/blog/state-of-cyber-security-and-surveillance-in-
india.pdf/view
19
Shreya Singhal v. Union Of India [AIR 2015 SC 1523]- The Supreme Court struck down
Section 66A of the IT Act, 2000, as unconstitutional on grounds of violating Article 19(1)(a)
of the Constitution of India.
International Journal of Socio-Legal Research 113
Volume 5| Issue 3|August 2019 |ISSN-2393-8250
20
Supra note 19
21
Allen, Anita L. Gender and Privacy in Cyberspace, 52, STANFORD L.R., 1175, 1195
(2000). JSTOR
22
Dominik Eisenhut, Sovereignty, National Security and International Treaty Law, 48,
ARCHIV DES VÖLKERRECHTS, 431, 431, (2010). JSTOR
23
Supra note 2
International Journal of Socio-Legal Research 114
Volume 5| Issue 3|August 2019 |ISSN-2393-8250
state. In the era of cyber warfare, the security and sovereignty of a state in the
cyber space plays a significant role in protecting its citizen from external
cyber security threats. It is the duty of a responsible sovereign state to apply
all the possible measures to ensure the safety of its masses. Sometimes for the
purpose of preventive measures or for investigation of any offence that
challenges the integrity and sovereignty of state, it becomes necessary for the
state to take into account the data of citizens. Since criminal activities also
have become digitized, law enforcement must visibly patrol the Internet. In
addition, the police may need to operate covertly. To investigate serious crime
and predict crime or terror attacks, predictive analysis, access to social media
accounts and big data analytics could provide significant aid for law
enforcement.24 For this purpose, section 69 of IT act regulates the actions of
cyber surveillance by government agencies to the data of citizens.
PREVENTION OF MISUSE OF CYBER SURVEILLANCE
PROVISION:
With the advent of state interference in individual privacy, the data protection
concerns take place with sufficient cause. It is indeed necessary to prevent the
misuse of cyber surveillance law because these laws contain sufficient
instruments to infringe the data privacy laws. Keeping in view the prospective
misuse of section 69, the central government made the rules under
Information Technology (Procedure and Safeguards for Interception,
Monitoring and Decryption of Information) Rules, 2009.
Rule 3 of this regulates the scope of power conferred to government agencies
so as to avoid the arbitrariness and provides the prerequision of an order by
the competent authority to intercept and monitor individual data. For this
purpose “competent authority” contains (i) the Secretary in the Ministry of
24
Stephanie K. Pell and Christopher Soghoian, Your Secret Stingray's No Secret Anymore:
The Vanishing Government Monopoly over Cell Phone Surveillance and Its Impact on
National Security and Consumer Privacy, 28, HARVARD J. LAW & TECH, 1-35 (2014).
JSTOR
International Journal of Socio-Legal Research 115
Volume 5| Issue 3|August 2019 |ISSN-2393-8250
25
Writ Petition (Civil) No. 494 of 2012 (Sup. Ct. India Aug. 24, 2017).
26
Supra note 19
International Journal of Socio-Legal Research 116
Volume 5| Issue 3|August 2019 |ISSN-2393-8250
make India a haven for Criminals, Naxalites and Terrorists. It will prevent
Police from undertaking any search or preventive arrests, impose restrictions
on public for prevention of offences etc., since all such provisions will be
restrictive of the Right to Privacy in one sense.27 Those who swear by the
constitution has to swear by the “Primacy” of “We the People” and cannot
ignore the security of people even before worrying about providing guarantee
of the Right to Privacy.28
RECOMMENDATIONS TO RECONCILE THE PRIVACY
CONFLICT :
The intricate challenge is that in-between the surveillance and the privacy
lays the personal data—the new gold from a commercial perspective, a
resource in the fight against terrorism from a security perspective, and a future
threat of human rights from an individual perspective. There is no simple
solution to the paradox.29
Laws enforcing Cyber surveillance and individual’s data privacy are two
sides of a coin. In every case, one would overshadow another. hence the
conflict is inevitable. It can be deduced that legal flexibility of conflicting
points shall be the possible reconciliation, that’s presented as below:
1. As per Rule 7 of Information Technology (Procedure and Safeguards
for Interception, Monitoring and Decryption of Information) Rules,
2009, every direction issued by competent authority to intercept or
monitor individual’s data shall contain the ‘reasons’ for such
direction. It is recommended that such ‘reasons’ should be
communicated to the person whose data is to be intercepted or
monitored, through reasonable means of communication. Provided
27
https://www.naavi.org/wp/allahabad-high-court-admits-pil-against-section-69-notice-2/
28
Ibid
29
Hagen, Janne, and Olav Lysne. Protecting the Digitized Society—the Challenge of
Balancing Surveillance and Privacy, 1, THE CYBER DEFENSE REVIEW, 75, 87, Spring
(2016). JSTOR
International Journal of Socio-Legal Research 117
Volume 5| Issue 3|August 2019 |ISSN-2393-8250
30
“Genetic data” means personal data relating to the inherited or acquired genetic
characteristics of a natural person which give unique information about the behavioural
characteristics, physiology or the health of that natural person and which result, in particular,
from an analysis of a biological sample from the natural person in question.
31
Gostin, Lawrence O., and James G. Hodge. “Genetic Privacy And The Law: An End To
Genetics Exceptionalism, 40, JURIMETRICS, 21, 23, (1999). JSTOR
32
Ronald M. Green 8: A Matthew Thomas, DNA' F W: Distinguishing Features for Policy
Analysts: ll HARVARD J. LAW & TECH, 57 (1998). JSTOR