SlideShare uma empresa Scribd logo
1 de 1
Legislation to protect Individual Privacy<br />The Right to privacy is recognition of the individual's right to be let alone and to have his personal space inviolate. India does not have a constitutional right to privacy, although the courts have found an implicit right to privacy in the constitution. No one has a right to peep into one’s privacy and the law of privacy is a recognition of the of the individual's right to be let alone and to have his personal space inviolate. Right to Privacy is a ‘right to be let alone’ and a citizen has a right ‘to safeguard the privacy of his own, his family, marriage, procreation, motherhood, child-bearing and education among other matters’. Right to privacy is not enumerated as a fundamental right in our Constitution but has been inferred from Article 21. The Right to Privacy has been developed by the Supreme Court over a period of time and with the expansive interpretation of the phrase `personal liberty', this right has been read into Article 21. <br />Amid going concern over possible misuse of data under government control, the government has set up a panel comprising of senior babus to prepare a blueprint laying down the ground rules for privacy and data protection and fixing the criminal liability of offenders. The government has moved forward to enact new legislation on privacy in the backdrop of Aadhaar, the project to provide unique identity cards to residents of the country, and the National Intelligence Grid (Natgrid) which will give access to 21 categories of database like rail and air travel, income tax, phone calls, bank account details, credit card transactions, visa and immigration records, driving licenses of all citizens. The NIG database will be accessed by a total of 11 agencies, including the recently set-up National Investigation Agency (NIA). The Civil Right Activists made a huge cry over the possible misuse of the individual privacy and insisted on legislative measure to stop the possible misuse and punish the violators of the privacy, including the government. <br />The present Information Technology Act, 2000 does contain some provisions which deal with data base security and privacy for instance Section 43, 43 A, 66E and 72A. However, these provisions deals with the security of the electronic records, e-commerce transactions, and web content alone and do not address “individual privacy”. As the organizations, government non government acquires more personal information store in electronic form, privacy and confidentiality have become urgent issues. This author feels that the privacy of an individual be given due respect and should be protected by uniform, national legislation. Privacy legislation needs to be constructed carefully and prudently to protect the privacy of individuals, while facilitating the ongoing national mission to ensure the security of the state that can benefit us all. <br /> HYPERLINK quot;
http://www.neerajaarora.com/quot;
 Neraj Aarora<br />(Advocate)<br />

Mais conteúdo relacionado

Mais de Neeraj Aarora

SHA-1 OFFICIAL DEAD: Authenticity Challenge in Electronic Evidence Cases
SHA-1 OFFICIAL DEAD: Authenticity Challenge in Electronic Evidence CasesSHA-1 OFFICIAL DEAD: Authenticity Challenge in Electronic Evidence Cases
SHA-1 OFFICIAL DEAD: Authenticity Challenge in Electronic Evidence CasesNeeraj Aarora
 
I want to be a cyber forensic examiner
I want to be a cyber forensic examinerI want to be a cyber forensic examiner
I want to be a cyber forensic examinerNeeraj Aarora
 
Neeraj aarora cyber_lawyer_section 65b_evidence act
Neeraj aarora cyber_lawyer_section 65b_evidence actNeeraj aarora cyber_lawyer_section 65b_evidence act
Neeraj aarora cyber_lawyer_section 65b_evidence actNeeraj Aarora
 
Neeraj aarora cyber_lawyer_internet_safety_strategies_for_students
Neeraj aarora cyber_lawyer_internet_safety_strategies_for_studentsNeeraj aarora cyber_lawyer_internet_safety_strategies_for_students
Neeraj aarora cyber_lawyer_internet_safety_strategies_for_studentsNeeraj Aarora
 
Neeraj aarora cyber_lawyer_internet_crime_-_law_and_patents
Neeraj aarora cyber_lawyer_internet_crime_-_law_and_patentsNeeraj aarora cyber_lawyer_internet_crime_-_law_and_patents
Neeraj aarora cyber_lawyer_internet_crime_-_law_and_patentsNeeraj Aarora
 
Neeraj aarora cyber_lawyer_forensic audit
Neeraj aarora cyber_lawyer_forensic auditNeeraj aarora cyber_lawyer_forensic audit
Neeraj aarora cyber_lawyer_forensic auditNeeraj Aarora
 
Neeraj aarora cyber_lawyer_current trends in cyber crime scenario
Neeraj aarora cyber_lawyer_current trends in cyber crime scenarioNeeraj aarora cyber_lawyer_current trends in cyber crime scenario
Neeraj aarora cyber_lawyer_current trends in cyber crime scenarioNeeraj Aarora
 
Neeraj aarora cyber_lawyer_article - uncitral arbitration rules, 2010
Neeraj aarora cyber_lawyer_article - uncitral arbitration rules, 2010Neeraj aarora cyber_lawyer_article - uncitral arbitration rules, 2010
Neeraj aarora cyber_lawyer_article - uncitral arbitration rules, 2010Neeraj Aarora
 
Current trends in cyber crime scenario
Current trends in cyber crime scenarioCurrent trends in cyber crime scenario
Current trends in cyber crime scenarioNeeraj Aarora
 
State cannot claim sovereign immunity in motor accident cases says delhi high...
State cannot claim sovereign immunity in motor accident cases says delhi high...State cannot claim sovereign immunity in motor accident cases says delhi high...
State cannot claim sovereign immunity in motor accident cases says delhi high...Neeraj Aarora
 
DOCTRINE OF SOVEREIGN IMMUNITY
DOCTRINE OF SOVEREIGN IMMUNITYDOCTRINE OF SOVEREIGN IMMUNITY
DOCTRINE OF SOVEREIGN IMMUNITYNeeraj Aarora
 
Forensic Accountant: Reliability & admissibility as Expert Witness
Forensic Accountant: Reliability & admissibility as Expert WitnessForensic Accountant: Reliability & admissibility as Expert Witness
Forensic Accountant: Reliability & admissibility as Expert WitnessNeeraj Aarora
 
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009Neeraj Aarora
 

Mais de Neeraj Aarora (14)

SHA-1 OFFICIAL DEAD: Authenticity Challenge in Electronic Evidence Cases
SHA-1 OFFICIAL DEAD: Authenticity Challenge in Electronic Evidence CasesSHA-1 OFFICIAL DEAD: Authenticity Challenge in Electronic Evidence Cases
SHA-1 OFFICIAL DEAD: Authenticity Challenge in Electronic Evidence Cases
 
I want to be a cyber forensic examiner
I want to be a cyber forensic examinerI want to be a cyber forensic examiner
I want to be a cyber forensic examiner
 
Neeraj aarora cyber_lawyer_section 65b_evidence act
Neeraj aarora cyber_lawyer_section 65b_evidence actNeeraj aarora cyber_lawyer_section 65b_evidence act
Neeraj aarora cyber_lawyer_section 65b_evidence act
 
Neeraj aarora cyber_lawyer_internet_safety_strategies_for_students
Neeraj aarora cyber_lawyer_internet_safety_strategies_for_studentsNeeraj aarora cyber_lawyer_internet_safety_strategies_for_students
Neeraj aarora cyber_lawyer_internet_safety_strategies_for_students
 
Neeraj aarora cyber_lawyer_internet_crime_-_law_and_patents
Neeraj aarora cyber_lawyer_internet_crime_-_law_and_patentsNeeraj aarora cyber_lawyer_internet_crime_-_law_and_patents
Neeraj aarora cyber_lawyer_internet_crime_-_law_and_patents
 
Neeraj aarora cyber_lawyer_forensic audit
Neeraj aarora cyber_lawyer_forensic auditNeeraj aarora cyber_lawyer_forensic audit
Neeraj aarora cyber_lawyer_forensic audit
 
Neeraj aarora cyber_lawyer_current trends in cyber crime scenario
Neeraj aarora cyber_lawyer_current trends in cyber crime scenarioNeeraj aarora cyber_lawyer_current trends in cyber crime scenario
Neeraj aarora cyber_lawyer_current trends in cyber crime scenario
 
Neeraj aarora cyber_lawyer_article - uncitral arbitration rules, 2010
Neeraj aarora cyber_lawyer_article - uncitral arbitration rules, 2010Neeraj aarora cyber_lawyer_article - uncitral arbitration rules, 2010
Neeraj aarora cyber_lawyer_article - uncitral arbitration rules, 2010
 
Current trends in cyber crime scenario
Current trends in cyber crime scenarioCurrent trends in cyber crime scenario
Current trends in cyber crime scenario
 
Blowing the whistle
Blowing the whistleBlowing the whistle
Blowing the whistle
 
State cannot claim sovereign immunity in motor accident cases says delhi high...
State cannot claim sovereign immunity in motor accident cases says delhi high...State cannot claim sovereign immunity in motor accident cases says delhi high...
State cannot claim sovereign immunity in motor accident cases says delhi high...
 
DOCTRINE OF SOVEREIGN IMMUNITY
DOCTRINE OF SOVEREIGN IMMUNITYDOCTRINE OF SOVEREIGN IMMUNITY
DOCTRINE OF SOVEREIGN IMMUNITY
 
Forensic Accountant: Reliability & admissibility as Expert Witness
Forensic Accountant: Reliability & admissibility as Expert WitnessForensic Accountant: Reliability & admissibility as Expert Witness
Forensic Accountant: Reliability & admissibility as Expert Witness
 
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009
 

Último

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 

Último (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

Legislation to protect individual privacy

  • 1. Legislation to protect Individual Privacy<br />The Right to privacy is recognition of the individual's right to be let alone and to have his personal space inviolate. India does not have a constitutional right to privacy, although the courts have found an implicit right to privacy in the constitution. No one has a right to peep into one’s privacy and the law of privacy is a recognition of the of the individual's right to be let alone and to have his personal space inviolate. Right to Privacy is a ‘right to be let alone’ and a citizen has a right ‘to safeguard the privacy of his own, his family, marriage, procreation, motherhood, child-bearing and education among other matters’. Right to privacy is not enumerated as a fundamental right in our Constitution but has been inferred from Article 21. The Right to Privacy has been developed by the Supreme Court over a period of time and with the expansive interpretation of the phrase `personal liberty', this right has been read into Article 21. <br />Amid going concern over possible misuse of data under government control, the government has set up a panel comprising of senior babus to prepare a blueprint laying down the ground rules for privacy and data protection and fixing the criminal liability of offenders. The government has moved forward to enact new legislation on privacy in the backdrop of Aadhaar, the project to provide unique identity cards to residents of the country, and the National Intelligence Grid (Natgrid) which will give access to 21 categories of database like rail and air travel, income tax, phone calls, bank account details, credit card transactions, visa and immigration records, driving licenses of all citizens. The NIG database will be accessed by a total of 11 agencies, including the recently set-up National Investigation Agency (NIA). The Civil Right Activists made a huge cry over the possible misuse of the individual privacy and insisted on legislative measure to stop the possible misuse and punish the violators of the privacy, including the government. <br />The present Information Technology Act, 2000 does contain some provisions which deal with data base security and privacy for instance Section 43, 43 A, 66E and 72A. However, these provisions deals with the security of the electronic records, e-commerce transactions, and web content alone and do not address “individual privacy”. As the organizations, government non government acquires more personal information store in electronic form, privacy and confidentiality have become urgent issues. This author feels that the privacy of an individual be given due respect and should be protected by uniform, national legislation. Privacy legislation needs to be constructed carefully and prudently to protect the privacy of individuals, while facilitating the ongoing national mission to ensure the security of the state that can benefit us all. <br /> HYPERLINK quot; http://www.neerajaarora.com/quot; Neraj Aarora<br />(Advocate)<br />