SlideShare ist ein Scribd-Unternehmen logo
1 von 23
Privacy Issues in Technology Era
Nitya Nand Pandey
Assistant Professor
(Amity Law School)
Amity University Jaipur
Mo. 9415422181
Mail id. nnp.vns@gmail.com
What is Privacy?
• “Privacy may be defined as the claim of
individuals, groups or institutions to
determine when, how and to what extent
information about them is communicated to
others”.
• In simple words privacy can be defined as a
right to be let alone.
Types of Privacy
• The term privacy can have different meaning
in different context. Peoples have different
opinion and views on what they can term as
the breach of their privacy rights. It may be-
a. Personal Privacy
b. Organizational Privacy
c. Privacy related to property
Privacy and the Internet
• Internet has almost changed the way one used to fear
from privacy invasion.
• Now you don’t know how and when you are been
monitored and by whom. One do not know that his
information is being sold over the internet for just 1 or
2 dollars.
• peoples are being murdered by the help of internet.
• peoples are harassed and blackmailed on social
networking sites. Their photos are downloaded,
morphed and misused.
• Though Internet has revolutionized the world and it
has become a global village now, on the other hand we
cannot deny the negative aspects of it.
• We need to understand the fact that everything
that we do on internet can be noticed or
revealed because it leaves digital traces.
• The use of smart phones is another emerging dan
ger to online privacy.
• Every device that is connected to Internet has a
unique IP address attached to it, whether it is a
computer, mobile, play station or anything else
which means it can be traced.
Legal Regime to Combat Cyber
Privacy in India
• We have looked upon the threats to cyber
privacy and their results. But what can we do
if someone breaches our privacy.
• What can we do, what are the legal rights of
an Indian citizen in context with privacy? Let
us understand that.
Information Technology Amendment
Act, 2008
• Information Technology Act is an act of Indian
Parliament notified on 17, October, 2000.
• It was further amended and came into force
on October 27, 2009.
• It regulates the cyberspace in India and
provides rules and regulations regarding
different aspects of cyber law.
Section 43(A): Compensation for
failure to protect data
• Where a body corporate, possessing, dealing or
handling any sensitive personal data or
information in a computer resource which it
owns controls or operates, is negligent in
implementing and maintaining reasonable
security practices and procedures and thereby
causes wrongful loss or wrongful gain to any
person, such body corporate shall be liable to pay
damages by way of compensation, to the person
so affected.
Section 66(E): Punishment for
violation of privacy.
• Whoever, intentionally or knowingly captures,
publishes or transmits the image of a private
area of any person without his or her consent,
under circumstances violating the privacy of
that person,
• shall be punished with imprisonment which
may extend to three years or with fine not
exceeding two lakh rupees, or with both.
Explanation
• For the purposes of section 66 (E)--
• (a) “transmit” means to electronically send a
visual image with the intent that it be viewed by a
person or persons;
• (b) “capture”, with respect to an image, means to
videotape, photograph, film or record by any
means;
• (c) “private area” means the naked or
undergarment clad genitals, pubic area, buttocks
or female breast;
Explanation…………
• d) “publishes” means reproduction in the printed or
electronic form and making it available for public;
• (e) “under circumstances violating privacy” means
circumstances in which a person can have a reasonable
expectation that—
• (i) he or she could disrobe in privacy, without being
concerned that an image of his private area was being
captured; or
• (ii) any part of his or her private area would not be
visible to the public, regardless of whether that person
is in a public or private place.
Section 72: Breach of confidentiality
and privacy
• Save as otherwise provided in this Act or any other law for
the time being in force,
• any person who, in pursuant of any of the powers conferred
under this Act, rules or regulations made there under,
• has secured access to any electronic record, book, register,
correspondence, information, document or other material
• without the consent of the person concerned
• discloses such electronic record, book, register,
correspondence, information, document or other material
to any other person
• shall be punished with imprisonment for a term
which may extend to two years, or with fine which may
extend to one lakh rupees, or with both.
Punishment for Disclosure of information
in breach of lawful contract (72 A)
• Save as otherwise provided in this Act or any other law
for the time being in force,
• any person including an intermediary who, while
providing services under the terms of lawful contract,
has secured access to any material containing personal
information about another person, with the intent to
cause or knowing that he is likely to cause wrongful
loss or wrongful gain discloses,
• without the consent of the person concerned, or in
breach of a lawful contract, such material to any other
person
• shall be punished with imprisonment for a term which
may extend to three years, or with a fine which may
extend to five lakh rupees, or with both.
• These are the sections which provide a citizen
some rights to fight for his privacy in IT Act.
Also it provides some procedure and rules for
monitoring and collecting traffic data or
information.
Indian Penal Code, 1860
• There are some sections in IPC which deals with privacy.
They are not directly related with cyber privacy but can be
helpful for an individual to claim his or her rights.
• Section 499 & 500- Defamation
• Section 292. Sale, etc., of obscene books etc.,
• Section 447. Punishment for Criminal Trespass,
• Section 509 - Word, gesture or act intended to insult the
modesty of a woman.
Right to Information Act, 2005
• Section 8 - Exemption from disclosure of
information.
Judiciary & Right to Privacy
R. Rajgopal v. State of Tamilnadu 1994 SC,
Right to privacy or right to be let alone is
guaranteed by Art. 21.
State of Maharashtra v. Madhulkar Narain
1991 SC, right to privacy is available even to a
women of easy virtue and no one can invade
her privacy.
Mr. “X” v. Hospital “Z”
• It is not a absolute fundamental right and
restrictions can be imposed on it for the-
I. Prevention of crime
II. Disorder or protection of health
III. Protection of rights
IV. Freedom of others
Surjit Singh Thind v. Kanwaljit Kaur
2003 P&H
• Virginity test violates Right to privacy under
Art. 21
Rayala M. Bhuvaneswari v.
Nagaphander Rayala 2008 AP
• Husband tapping conversation of his wife with
others seeking to produce in court, violates
her right to privacy under Art. 21.
Conclusion
• First, Right to privacy is a fundamental right as
guaranteed by Indian Constitution in Article
21, so every individual has a right to privacy
but with some limitations.
• Though new methods of tracking and tracing
a person are available, also new types of
Personally Identifiable Information can be
retrieved; government should take
responsibility of a person’s privacy and
personal information from being invaded.
Conclusion……
• Government has also prescribed the method and
rules form monitoring and collecting data or
information in IT Act but it should also be
implemented.
• Second, it’s also our responsibility to know that
as internet is a global platform we should try to
regulate or minimize the amount of information
we usually share without being aware about
the possible risks and threats related to it.
• Because as it is always said that, “precaution is
better than cure.”
That is the End of Right to Privacy
Nitya Nand Pandey
Assistant Professor
(Amity Law School)
Amity University Jaipur
Mo. 9415422181
Mail id. nnp.vns@gmail.com

Weitere ähnliche Inhalte

Was ist angesagt?

Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000
Akash Varaiya
 
Effects of acknowledgement of limitation act
Effects of acknowledgement of limitation actEffects of acknowledgement of limitation act
Effects of acknowledgement of limitation act
Hinal Thakkar
 
Cyber defamation
Cyber defamationCyber defamation
Cyber defamation
Tuhin Batra
 

Was ist angesagt? (20)

Cyberspace jurisdiction meaning and concept
Cyberspace jurisdiction meaning and conceptCyberspace jurisdiction meaning and concept
Cyberspace jurisdiction meaning and concept
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000
 
Jurisdiction issues in cyberspace
Jurisdiction issues in cyberspaceJurisdiction issues in cyberspace
Jurisdiction issues in cyberspace
 
Cyber law & Intellectual property issues
Cyber law & Intellectual property issuesCyber law & Intellectual property issues
Cyber law & Intellectual property issues
 
Jurisdiction in cyberspace
Jurisdiction in cyberspaceJurisdiction in cyberspace
Jurisdiction in cyberspace
 
It act law ppt
It act law pptIt act law ppt
It act law ppt
 
Types of deviances
Types of deviancesTypes of deviances
Types of deviances
 
Official Secrete's Act
Official Secrete's Act Official Secrete's Act
Official Secrete's Act
 
Code of civil procedure 1908 parties to suit
Code of civil procedure 1908 parties to suitCode of civil procedure 1908 parties to suit
Code of civil procedure 1908 parties to suit
 
Electronic evidence digital evidence in india
Electronic evidence  digital evidence in indiaElectronic evidence  digital evidence in india
Electronic evidence digital evidence in india
 
Information Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakInformation Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K Pathak
 
it act 2000
it act 2000it act 2000
it act 2000
 
LLB LAW NOTES ON CRIMINOLOGY AND PENOLOGY
LLB LAW NOTES ON CRIMINOLOGY AND PENOLOGYLLB LAW NOTES ON CRIMINOLOGY AND PENOLOGY
LLB LAW NOTES ON CRIMINOLOGY AND PENOLOGY
 
Cyber appellate tribunal
Cyber appellate tribunalCyber appellate tribunal
Cyber appellate tribunal
 
Casus omissus, interpretation of statutes
Casus omissus, interpretation of statutesCasus omissus, interpretation of statutes
Casus omissus, interpretation of statutes
 
Effects of acknowledgement of limitation act
Effects of acknowledgement of limitation actEffects of acknowledgement of limitation act
Effects of acknowledgement of limitation act
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
Right to privacy – a bird’s eyeview
Right to privacy – a bird’s eyeviewRight to privacy – a bird’s eyeview
Right to privacy – a bird’s eyeview
 
Section 66 of Information Technology Act.
Section 66 of Information Technology Act.Section 66 of Information Technology Act.
Section 66 of Information Technology Act.
 
Cyber defamation
Cyber defamationCyber defamation
Cyber defamation
 

Andere mochten auch

Violation of privacy
Violation of privacyViolation of privacy
Violation of privacy
Lauren2342
 
Social network privacy & security
Social network privacy & securitySocial network privacy & security
Social network privacy & security
nadikari123
 
Elements & Principles of Art Design PowerPoint
Elements & Principles of Art Design PowerPointElements & Principles of Art Design PowerPoint
Elements & Principles of Art Design PowerPoint
emurfield
 
Basic layout principles
Basic layout principlesBasic layout principles
Basic layout principles
Sherwin Manual
 
Intellectual Property Rights
Intellectual Property RightsIntellectual Property Rights
Intellectual Property Rights
harshhanu
 

Andere mochten auch (19)

Complete Notes on The Trade Union Act, 1926
Complete Notes on The Trade Union Act, 1926Complete Notes on The Trade Union Act, 1926
Complete Notes on The Trade Union Act, 1926
 
Violation of privacy
Violation of privacyViolation of privacy
Violation of privacy
 
Cyber law and password protection
Cyber law and password protectionCyber law and password protection
Cyber law and password protection
 
12 Social Media Fears and overcoming them now!
12 Social Media Fears and overcoming them now!12 Social Media Fears and overcoming them now!
12 Social Media Fears and overcoming them now!
 
Right to privacy
Right to privacyRight to privacy
Right to privacy
 
Legal Implications Of Social Media
Legal Implications Of Social MediaLegal Implications Of Social Media
Legal Implications Of Social Media
 
Violation of ethics By Pakistani Media In Election 2013
Violation of ethics By Pakistani Media In Election 2013Violation of ethics By Pakistani Media In Election 2013
Violation of ethics By Pakistani Media In Election 2013
 
Copy right act
Copy right actCopy right act
Copy right act
 
Copy right act
Copy right actCopy right act
Copy right act
 
Social network privacy & security
Social network privacy & securitySocial network privacy & security
Social network privacy & security
 
The Development of Printing (LIS 51)
The Development of Printing (LIS 51)The Development of Printing (LIS 51)
The Development of Printing (LIS 51)
 
Industrial dispute act 1947
Industrial dispute act 1947Industrial dispute act 1947
Industrial dispute act 1947
 
Trade union act, 1926
Trade union act, 1926Trade union act, 1926
Trade union act, 1926
 
Elements & Principles of Art Design PowerPoint
Elements & Principles of Art Design PowerPointElements & Principles of Art Design PowerPoint
Elements & Principles of Art Design PowerPoint
 
Principles of Design - Graphic Design Theory
Principles of Design - Graphic Design TheoryPrinciples of Design - Graphic Design Theory
Principles of Design - Graphic Design Theory
 
Basic layout principles
Basic layout principlesBasic layout principles
Basic layout principles
 
Text features
Text featuresText features
Text features
 
Intellectual Property Rights
Intellectual Property RightsIntellectual Property Rights
Intellectual Property Rights
 
2017 Digital Yearbook
2017 Digital Yearbook2017 Digital Yearbook
2017 Digital Yearbook
 

Ähnlich wie Privacy right under it act, 2000 and under other law

Ronit Mathur Cyber Security assesment.pptx
Ronit Mathur Cyber Security assesment.pptxRonit Mathur Cyber Security assesment.pptx
Ronit Mathur Cyber Security assesment.pptx
ManuGupta344215
 
Freedom of Information and Data Protection
Freedom of Information and Data ProtectionFreedom of Information and Data Protection
Freedom of Information and Data Protection
EquiGov Institute
 

Ähnlich wie Privacy right under it act, 2000 and under other law (20)

Privacy versus Security: A Legal Perspective
Privacy versus Security: A Legal PerspectivePrivacy versus Security: A Legal Perspective
Privacy versus Security: A Legal Perspective
 
Ronit Mathur Cyber Security assesment.pptx
Ronit Mathur Cyber Security assesment.pptxRonit Mathur Cyber Security assesment.pptx
Ronit Mathur Cyber Security assesment.pptx
 
Freedom of Information and Data Protection
Freedom of Information and Data ProtectionFreedom of Information and Data Protection
Freedom of Information and Data Protection
 
Cie 2 cyber law
Cie 2  cyber lawCie 2  cyber law
Cie 2 cyber law
 
Internet censorship by ronak
Internet censorship by ronakInternet censorship by ronak
Internet censorship by ronak
 
Privacy and data protection in the realm of Internet Governance by Santosh Si...
Privacy and data protection in the realm of Internet Governance by Santosh Si...Privacy and data protection in the realm of Internet Governance by Santosh Si...
Privacy and data protection in the realm of Internet Governance by Santosh Si...
 
Reasonable Security Practices And Procedures And Sensitive Personala 24 06 2...
Reasonable Security Practices And Procedures And Sensitive Personala  24 06 2...Reasonable Security Practices And Procedures And Sensitive Personala  24 06 2...
Reasonable Security Practices And Procedures And Sensitive Personala 24 06 2...
 
Vonnegut's Narrator
Vonnegut's NarratorVonnegut's Narrator
Vonnegut's Narrator
 
What happens to our virtual account or digital asset or data after our death ?
What happens to our virtual account or digital asset or data after our death ?What happens to our virtual account or digital asset or data after our death ?
What happens to our virtual account or digital asset or data after our death ?
 
4-Privacy1.pptx
4-Privacy1.pptx4-Privacy1.pptx
4-Privacy1.pptx
 
PERSONAL-DATA-PROTECTION-BILL-2018.pptx
PERSONAL-DATA-PROTECTION-BILL-2018.pptxPERSONAL-DATA-PROTECTION-BILL-2018.pptx
PERSONAL-DATA-PROTECTION-BILL-2018.pptx
 
An Indian Outline on Database Protection
An Indian Outline on Database ProtectionAn Indian Outline on Database Protection
An Indian Outline on Database Protection
 
Ethical Issues and Relevant Laws on Computing
Ethical Issues and Relevant Laws on ComputingEthical Issues and Relevant Laws on Computing
Ethical Issues and Relevant Laws on Computing
 
Analysis of cyber crime bill 2016
Analysis of cyber crime bill 2016 Analysis of cyber crime bill 2016
Analysis of cyber crime bill 2016
 
Lorson Resources Limited - Records & Information Presentation: Data Protectio...
Lorson Resources Limited - Records & Information Presentation: Data Protectio...Lorson Resources Limited - Records & Information Presentation: Data Protectio...
Lorson Resources Limited - Records & Information Presentation: Data Protectio...
 
Research on Digital Security Act 2018
Research on Digital Security Act 2018Research on Digital Security Act 2018
Research on Digital Security Act 2018
 
Indian IT Act - Cybersecurity
Indian IT Act - CybersecurityIndian IT Act - Cybersecurity
Indian IT Act - Cybersecurity
 
Philippine Data Privacy Act of 2012 (RA 10173)
Philippine Data Privacy Act of 2012 (RA 10173)Philippine Data Privacy Act of 2012 (RA 10173)
Philippine Data Privacy Act of 2012 (RA 10173)
 
Information Security: The Trinidad & Tobago Legal Context
Information Security: The Trinidad & Tobago Legal ContextInformation Security: The Trinidad & Tobago Legal Context
Information Security: The Trinidad & Tobago Legal Context
 
Reasonable security practices and procedures and sensitive personal data or i...
Reasonable security practices and procedures and sensitive personal data or i...Reasonable security practices and procedures and sensitive personal data or i...
Reasonable security practices and procedures and sensitive personal data or i...
 

Kürzlich hochgeladen

一比一原版(UCB毕业证书)英国伯明翰大学学院毕业证如何办理
一比一原版(UCB毕业证书)英国伯明翰大学学院毕业证如何办理一比一原版(UCB毕业证书)英国伯明翰大学学院毕业证如何办理
一比一原版(UCB毕业证书)英国伯明翰大学学院毕业证如何办理
e9733fc35af6
 
Code_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.pptCode_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.ppt
JosephCanama
 
一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理
Airst S
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
Airst S
 
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
F La
 
一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理
Airst S
 
一比一原版(AUT毕业证书)新西兰奥克兰理工大学毕业证如何办理
一比一原版(AUT毕业证书)新西兰奥克兰理工大学毕业证如何办理一比一原版(AUT毕业证书)新西兰奥克兰理工大学毕业证如何办理
一比一原版(AUT毕业证书)新西兰奥克兰理工大学毕业证如何办理
e9733fc35af6
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
bd2c5966a56d
 
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
e9733fc35af6
 

Kürzlich hochgeladen (20)

Hely-Hutchinson v. Brayhead Ltd .pdf
Hely-Hutchinson v. Brayhead Ltd         .pdfHely-Hutchinson v. Brayhead Ltd         .pdf
Hely-Hutchinson v. Brayhead Ltd .pdf
 
一比一原版(UCB毕业证书)英国伯明翰大学学院毕业证如何办理
一比一原版(UCB毕业证书)英国伯明翰大学学院毕业证如何办理一比一原版(UCB毕业证书)英国伯明翰大学学院毕业证如何办理
一比一原版(UCB毕业证书)英国伯明翰大学学院毕业证如何办理
 
Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...
Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...
Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...
 
Code_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.pptCode_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.ppt
 
Navigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptxNavigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptx
 
一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
 
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURYA SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
 
Performance of contract-1 law presentation
Performance of contract-1 law presentationPerformance of contract-1 law presentation
Performance of contract-1 law presentation
 
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
 
ARTICLE 370 PDF about the indian constitution.
ARTICLE 370 PDF about the  indian constitution.ARTICLE 370 PDF about the  indian constitution.
ARTICLE 370 PDF about the indian constitution.
 
一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理
 
Who is Spencer McDaniel? And Does He Actually Exist?
Who is Spencer McDaniel? And Does He Actually Exist?Who is Spencer McDaniel? And Does He Actually Exist?
Who is Spencer McDaniel? And Does He Actually Exist?
 
Elective Course on Forensic Science in Law
Elective Course on Forensic Science  in LawElective Course on Forensic Science  in Law
Elective Course on Forensic Science in Law
 
5-6-24 David Kennedy Article Law 360.pdf
5-6-24 David Kennedy Article Law 360.pdf5-6-24 David Kennedy Article Law 360.pdf
5-6-24 David Kennedy Article Law 360.pdf
 
一比一原版(AUT毕业证书)新西兰奥克兰理工大学毕业证如何办理
一比一原版(AUT毕业证书)新西兰奥克兰理工大学毕业证如何办理一比一原版(AUT毕业证书)新西兰奥克兰理工大学毕业证如何办理
一比一原版(AUT毕业证书)新西兰奥克兰理工大学毕业证如何办理
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
 
Chambers Global Practice Guide - Canada M&A
Chambers Global Practice Guide - Canada M&AChambers Global Practice Guide - Canada M&A
Chambers Global Practice Guide - Canada M&A
 
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
 
Reason Behind the Success of Law Firms in India
Reason Behind the Success of Law Firms in IndiaReason Behind the Success of Law Firms in India
Reason Behind the Success of Law Firms in India
 

Privacy right under it act, 2000 and under other law

  • 1. Privacy Issues in Technology Era Nitya Nand Pandey Assistant Professor (Amity Law School) Amity University Jaipur Mo. 9415422181 Mail id. nnp.vns@gmail.com
  • 2. What is Privacy? • “Privacy may be defined as the claim of individuals, groups or institutions to determine when, how and to what extent information about them is communicated to others”. • In simple words privacy can be defined as a right to be let alone.
  • 3. Types of Privacy • The term privacy can have different meaning in different context. Peoples have different opinion and views on what they can term as the breach of their privacy rights. It may be- a. Personal Privacy b. Organizational Privacy c. Privacy related to property
  • 4. Privacy and the Internet • Internet has almost changed the way one used to fear from privacy invasion. • Now you don’t know how and when you are been monitored and by whom. One do not know that his information is being sold over the internet for just 1 or 2 dollars. • peoples are being murdered by the help of internet. • peoples are harassed and blackmailed on social networking sites. Their photos are downloaded, morphed and misused. • Though Internet has revolutionized the world and it has become a global village now, on the other hand we cannot deny the negative aspects of it.
  • 5. • We need to understand the fact that everything that we do on internet can be noticed or revealed because it leaves digital traces. • The use of smart phones is another emerging dan ger to online privacy. • Every device that is connected to Internet has a unique IP address attached to it, whether it is a computer, mobile, play station or anything else which means it can be traced.
  • 6. Legal Regime to Combat Cyber Privacy in India • We have looked upon the threats to cyber privacy and their results. But what can we do if someone breaches our privacy. • What can we do, what are the legal rights of an Indian citizen in context with privacy? Let us understand that.
  • 7. Information Technology Amendment Act, 2008 • Information Technology Act is an act of Indian Parliament notified on 17, October, 2000. • It was further amended and came into force on October 27, 2009. • It regulates the cyberspace in India and provides rules and regulations regarding different aspects of cyber law.
  • 8. Section 43(A): Compensation for failure to protect data • Where a body corporate, possessing, dealing or handling any sensitive personal data or information in a computer resource which it owns controls or operates, is negligent in implementing and maintaining reasonable security practices and procedures and thereby causes wrongful loss or wrongful gain to any person, such body corporate shall be liable to pay damages by way of compensation, to the person so affected.
  • 9. Section 66(E): Punishment for violation of privacy. • Whoever, intentionally or knowingly captures, publishes or transmits the image of a private area of any person without his or her consent, under circumstances violating the privacy of that person, • shall be punished with imprisonment which may extend to three years or with fine not exceeding two lakh rupees, or with both.
  • 10. Explanation • For the purposes of section 66 (E)-- • (a) “transmit” means to electronically send a visual image with the intent that it be viewed by a person or persons; • (b) “capture”, with respect to an image, means to videotape, photograph, film or record by any means; • (c) “private area” means the naked or undergarment clad genitals, pubic area, buttocks or female breast;
  • 11. Explanation………… • d) “publishes” means reproduction in the printed or electronic form and making it available for public; • (e) “under circumstances violating privacy” means circumstances in which a person can have a reasonable expectation that— • (i) he or she could disrobe in privacy, without being concerned that an image of his private area was being captured; or • (ii) any part of his or her private area would not be visible to the public, regardless of whether that person is in a public or private place.
  • 12. Section 72: Breach of confidentiality and privacy • Save as otherwise provided in this Act or any other law for the time being in force, • any person who, in pursuant of any of the powers conferred under this Act, rules or regulations made there under, • has secured access to any electronic record, book, register, correspondence, information, document or other material • without the consent of the person concerned • discloses such electronic record, book, register, correspondence, information, document or other material to any other person • shall be punished with imprisonment for a term which may extend to two years, or with fine which may extend to one lakh rupees, or with both.
  • 13. Punishment for Disclosure of information in breach of lawful contract (72 A) • Save as otherwise provided in this Act or any other law for the time being in force, • any person including an intermediary who, while providing services under the terms of lawful contract, has secured access to any material containing personal information about another person, with the intent to cause or knowing that he is likely to cause wrongful loss or wrongful gain discloses, • without the consent of the person concerned, or in breach of a lawful contract, such material to any other person • shall be punished with imprisonment for a term which may extend to three years, or with a fine which may extend to five lakh rupees, or with both.
  • 14. • These are the sections which provide a citizen some rights to fight for his privacy in IT Act. Also it provides some procedure and rules for monitoring and collecting traffic data or information.
  • 15. Indian Penal Code, 1860 • There are some sections in IPC which deals with privacy. They are not directly related with cyber privacy but can be helpful for an individual to claim his or her rights. • Section 499 & 500- Defamation • Section 292. Sale, etc., of obscene books etc., • Section 447. Punishment for Criminal Trespass, • Section 509 - Word, gesture or act intended to insult the modesty of a woman.
  • 16. Right to Information Act, 2005 • Section 8 - Exemption from disclosure of information.
  • 17. Judiciary & Right to Privacy R. Rajgopal v. State of Tamilnadu 1994 SC, Right to privacy or right to be let alone is guaranteed by Art. 21. State of Maharashtra v. Madhulkar Narain 1991 SC, right to privacy is available even to a women of easy virtue and no one can invade her privacy.
  • 18. Mr. “X” v. Hospital “Z” • It is not a absolute fundamental right and restrictions can be imposed on it for the- I. Prevention of crime II. Disorder or protection of health III. Protection of rights IV. Freedom of others
  • 19. Surjit Singh Thind v. Kanwaljit Kaur 2003 P&H • Virginity test violates Right to privacy under Art. 21
  • 20. Rayala M. Bhuvaneswari v. Nagaphander Rayala 2008 AP • Husband tapping conversation of his wife with others seeking to produce in court, violates her right to privacy under Art. 21.
  • 21. Conclusion • First, Right to privacy is a fundamental right as guaranteed by Indian Constitution in Article 21, so every individual has a right to privacy but with some limitations. • Though new methods of tracking and tracing a person are available, also new types of Personally Identifiable Information can be retrieved; government should take responsibility of a person’s privacy and personal information from being invaded.
  • 22. Conclusion…… • Government has also prescribed the method and rules form monitoring and collecting data or information in IT Act but it should also be implemented. • Second, it’s also our responsibility to know that as internet is a global platform we should try to regulate or minimize the amount of information we usually share without being aware about the possible risks and threats related to it. • Because as it is always said that, “precaution is better than cure.”
  • 23. That is the End of Right to Privacy Nitya Nand Pandey Assistant Professor (Amity Law School) Amity University Jaipur Mo. 9415422181 Mail id. nnp.vns@gmail.com