SlideShare a Scribd company logo
1 of 23
Privacy Issues in Technology Era
Nitya Nand Pandey
Assistant Professor
(Amity Law School)
Amity University Jaipur
Mo. 9415422181
Mail id. nnp.vns@gmail.com
What is Privacy?
• “Privacy may be defined as the claim of
individuals, groups or institutions to
determine when, how and to what extent
information about them is communicated to
others”.
• In simple words privacy can be defined as a
right to be let alone.
Types of Privacy
• The term privacy can have different meaning
in different context. Peoples have different
opinion and views on what they can term as
the breach of their privacy rights. It may be-
a. Personal Privacy
b. Organizational Privacy
c. Privacy related to property
Privacy and the Internet
• Internet has almost changed the way one used to fear
from privacy invasion.
• Now you don’t know how and when you are been
monitored and by whom. One do not know that his
information is being sold over the internet for just 1 or
2 dollars.
• peoples are being murdered by the help of internet.
• peoples are harassed and blackmailed on social
networking sites. Their photos are downloaded,
morphed and misused.
• Though Internet has revolutionized the world and it
has become a global village now, on the other hand we
cannot deny the negative aspects of it.
• We need to understand the fact that everything
that we do on internet can be noticed or
revealed because it leaves digital traces.
• The use of smart phones is another emerging dan
ger to online privacy.
• Every device that is connected to Internet has a
unique IP address attached to it, whether it is a
computer, mobile, play station or anything else
which means it can be traced.
Legal Regime to Combat Cyber
Privacy in India
• We have looked upon the threats to cyber
privacy and their results. But what can we do
if someone breaches our privacy.
• What can we do, what are the legal rights of
an Indian citizen in context with privacy? Let
us understand that.
Information Technology Amendment
Act, 2008
• Information Technology Act is an act of Indian
Parliament notified on 17, October, 2000.
• It was further amended and came into force
on October 27, 2009.
• It regulates the cyberspace in India and
provides rules and regulations regarding
different aspects of cyber law.
Section 43(A): Compensation for
failure to protect data
• Where a body corporate, possessing, dealing or
handling any sensitive personal data or
information in a computer resource which it
owns controls or operates, is negligent in
implementing and maintaining reasonable
security practices and procedures and thereby
causes wrongful loss or wrongful gain to any
person, such body corporate shall be liable to pay
damages by way of compensation, to the person
so affected.
Section 66(E): Punishment for
violation of privacy.
• Whoever, intentionally or knowingly captures,
publishes or transmits the image of a private
area of any person without his or her consent,
under circumstances violating the privacy of
that person,
• shall be punished with imprisonment which
may extend to three years or with fine not
exceeding two lakh rupees, or with both.
Explanation
• For the purposes of section 66 (E)--
• (a) “transmit” means to electronically send a
visual image with the intent that it be viewed by a
person or persons;
• (b) “capture”, with respect to an image, means to
videotape, photograph, film or record by any
means;
• (c) “private area” means the naked or
undergarment clad genitals, pubic area, buttocks
or female breast;
Explanation…………
• d) “publishes” means reproduction in the printed or
electronic form and making it available for public;
• (e) “under circumstances violating privacy” means
circumstances in which a person can have a reasonable
expectation that—
• (i) he or she could disrobe in privacy, without being
concerned that an image of his private area was being
captured; or
• (ii) any part of his or her private area would not be
visible to the public, regardless of whether that person
is in a public or private place.
Section 72: Breach of confidentiality
and privacy
• Save as otherwise provided in this Act or any other law for
the time being in force,
• any person who, in pursuant of any of the powers conferred
under this Act, rules or regulations made there under,
• has secured access to any electronic record, book, register,
correspondence, information, document or other material
• without the consent of the person concerned
• discloses such electronic record, book, register,
correspondence, information, document or other material
to any other person
• shall be punished with imprisonment for a term
which may extend to two years, or with fine which may
extend to one lakh rupees, or with both.
Punishment for Disclosure of information
in breach of lawful contract (72 A)
• Save as otherwise provided in this Act or any other law
for the time being in force,
• any person including an intermediary who, while
providing services under the terms of lawful contract,
has secured access to any material containing personal
information about another person, with the intent to
cause or knowing that he is likely to cause wrongful
loss or wrongful gain discloses,
• without the consent of the person concerned, or in
breach of a lawful contract, such material to any other
person
• shall be punished with imprisonment for a term which
may extend to three years, or with a fine which may
extend to five lakh rupees, or with both.
• These are the sections which provide a citizen
some rights to fight for his privacy in IT Act.
Also it provides some procedure and rules for
monitoring and collecting traffic data or
information.
Indian Penal Code, 1860
• There are some sections in IPC which deals with privacy.
They are not directly related with cyber privacy but can be
helpful for an individual to claim his or her rights.
• Section 499 & 500- Defamation
• Section 292. Sale, etc., of obscene books etc.,
• Section 447. Punishment for Criminal Trespass,
• Section 509 - Word, gesture or act intended to insult the
modesty of a woman.
Right to Information Act, 2005
• Section 8 - Exemption from disclosure of
information.
Judiciary & Right to Privacy
R. Rajgopal v. State of Tamilnadu 1994 SC,
Right to privacy or right to be let alone is
guaranteed by Art. 21.
State of Maharashtra v. Madhulkar Narain
1991 SC, right to privacy is available even to a
women of easy virtue and no one can invade
her privacy.
Mr. “X” v. Hospital “Z”
• It is not a absolute fundamental right and
restrictions can be imposed on it for the-
I. Prevention of crime
II. Disorder or protection of health
III. Protection of rights
IV. Freedom of others
Surjit Singh Thind v. Kanwaljit Kaur
2003 P&H
• Virginity test violates Right to privacy under
Art. 21
Rayala M. Bhuvaneswari v.
Nagaphander Rayala 2008 AP
• Husband tapping conversation of his wife with
others seeking to produce in court, violates
her right to privacy under Art. 21.
Conclusion
• First, Right to privacy is a fundamental right as
guaranteed by Indian Constitution in Article
21, so every individual has a right to privacy
but with some limitations.
• Though new methods of tracking and tracing
a person are available, also new types of
Personally Identifiable Information can be
retrieved; government should take
responsibility of a person’s privacy and
personal information from being invaded.
Conclusion……
• Government has also prescribed the method and
rules form monitoring and collecting data or
information in IT Act but it should also be
implemented.
• Second, it’s also our responsibility to know that
as internet is a global platform we should try to
regulate or minimize the amount of information
we usually share without being aware about
the possible risks and threats related to it.
• Because as it is always said that, “precaution is
better than cure.”
That is the End of Right to Privacy
Nitya Nand Pandey
Assistant Professor
(Amity Law School)
Amity University Jaipur
Mo. 9415422181
Mail id. nnp.vns@gmail.com

More Related Content

What's hot

trademark issues in cyberspace
 trademark issues in cyberspace trademark issues in cyberspace
trademark issues in cyberspacePanjab University
 
Jurisdiction issues in cyberspace
Jurisdiction issues in cyberspaceJurisdiction issues in cyberspace
Jurisdiction issues in cyberspaceatuljaybhaye
 
Roots of Indian IT ACT 2000- UNCITRAL
Roots of Indian IT ACT 2000-  UNCITRALRoots of Indian IT ACT 2000-  UNCITRAL
Roots of Indian IT ACT 2000- UNCITRALRahul Gurnani
 
Information Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakInformation Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakDipayan Sarkar
 
Intermediary liability
Intermediary liabilityIntermediary liability
Intermediary liabilityAltacit Global
 
Data protection in_india
Data protection in_indiaData protection in_india
Data protection in_indiaAltacit Global
 
Digital signatures
Digital signaturesDigital signatures
Digital signaturesatuljaybhaye
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000Akash Varaiya
 
Public interest litigation
Public interest litigationPublic interest litigation
Public interest litigationAltacit Global
 
Jurisdictional issues of e commerce and consumer protection
Jurisdictional issues of e commerce and consumer protectionJurisdictional issues of e commerce and consumer protection
Jurisdictional issues of e commerce and consumer protectionAkshay Sharma
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000Dr. Heera Lal IAS
 
Cyber Obscenity
Cyber ObscenityCyber Obscenity
Cyber Obscenitysneha164
 

What's hot (20)

trademark issues in cyberspace
 trademark issues in cyberspace trademark issues in cyberspace
trademark issues in cyberspace
 
Plea bargaining
Plea bargainingPlea bargaining
Plea bargaining
 
Jurisdiction issues in cyberspace
Jurisdiction issues in cyberspaceJurisdiction issues in cyberspace
Jurisdiction issues in cyberspace
 
Roots of Indian IT ACT 2000- UNCITRAL
Roots of Indian IT ACT 2000-  UNCITRALRoots of Indian IT ACT 2000-  UNCITRAL
Roots of Indian IT ACT 2000- UNCITRAL
 
Arrest
ArrestArrest
Arrest
 
Information Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakInformation Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K Pathak
 
Intermediary liability
Intermediary liabilityIntermediary liability
Intermediary liability
 
Parole in india
Parole in indiaParole in india
Parole in india
 
Data protection in_india
Data protection in_indiaData protection in_india
Data protection in_india
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
 
Right to privacy
Right to privacyRight to privacy
Right to privacy
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000
 
Limitation act
Limitation actLimitation act
Limitation act
 
Anti defection laws
Anti defection lawsAnti defection laws
Anti defection laws
 
General clauses act
General clauses actGeneral clauses act
General clauses act
 
Public interest litigation
Public interest litigationPublic interest litigation
Public interest litigation
 
Jurisdictional issues of e commerce and consumer protection
Jurisdictional issues of e commerce and consumer protectionJurisdictional issues of e commerce and consumer protection
Jurisdictional issues of e commerce and consumer protection
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
Cyber Obscenity
Cyber ObscenityCyber Obscenity
Cyber Obscenity
 
Admin presentation
Admin presentationAdmin presentation
Admin presentation
 

Viewers also liked

Complete Notes on The Trade Union Act, 1926
Complete Notes on The Trade Union Act, 1926Complete Notes on The Trade Union Act, 1926
Complete Notes on The Trade Union Act, 1926Nitya Nand Pandey
 
Violation of privacy
Violation of privacyViolation of privacy
Violation of privacyLauren2342
 
Cyber law and password protection
Cyber law and password protectionCyber law and password protection
Cyber law and password protectionBavijesh Thaliyil
 
12 Social Media Fears and overcoming them now!
12 Social Media Fears and overcoming them now!12 Social Media Fears and overcoming them now!
12 Social Media Fears and overcoming them now!New Media Lab
 
Legal Implications Of Social Media
Legal Implications Of Social MediaLegal Implications Of Social Media
Legal Implications Of Social MediaDaliahSaper
 
Violation of ethics By Pakistani Media In Election 2013
Violation of ethics By Pakistani Media In Election 2013Violation of ethics By Pakistani Media In Election 2013
Violation of ethics By Pakistani Media In Election 2013Saqib Naveed
 
Copy right act
Copy right actCopy right act
Copy right actZaid Khan
 
Social network privacy & security
Social network privacy & securitySocial network privacy & security
Social network privacy & securitynadikari123
 
The Development of Printing (LIS 51)
The Development of Printing (LIS 51)The Development of Printing (LIS 51)
The Development of Printing (LIS 51)Roy Santos Necesario
 
Industrial dispute act 1947
Industrial dispute act 1947Industrial dispute act 1947
Industrial dispute act 1947Mohit Shukla
 
Elements & Principles of Art Design PowerPoint
Elements & Principles of Art Design PowerPointElements & Principles of Art Design PowerPoint
Elements & Principles of Art Design PowerPointemurfield
 
Principles of Design - Graphic Design Theory
Principles of Design - Graphic Design TheoryPrinciples of Design - Graphic Design Theory
Principles of Design - Graphic Design TheoryAbanoub Hanna
 
Basic layout principles
Basic layout principlesBasic layout principles
Basic layout principlesSherwin Manual
 
Intellectual Property Rights
Intellectual Property RightsIntellectual Property Rights
Intellectual Property Rightsharshhanu
 

Viewers also liked (18)

Complete Notes on The Trade Union Act, 1926
Complete Notes on The Trade Union Act, 1926Complete Notes on The Trade Union Act, 1926
Complete Notes on The Trade Union Act, 1926
 
Violation of privacy
Violation of privacyViolation of privacy
Violation of privacy
 
Cyber law and password protection
Cyber law and password protectionCyber law and password protection
Cyber law and password protection
 
12 Social Media Fears and overcoming them now!
12 Social Media Fears and overcoming them now!12 Social Media Fears and overcoming them now!
12 Social Media Fears and overcoming them now!
 
Legal Implications Of Social Media
Legal Implications Of Social MediaLegal Implications Of Social Media
Legal Implications Of Social Media
 
Violation of ethics By Pakistani Media In Election 2013
Violation of ethics By Pakistani Media In Election 2013Violation of ethics By Pakistani Media In Election 2013
Violation of ethics By Pakistani Media In Election 2013
 
Copy right act
Copy right actCopy right act
Copy right act
 
Copy right act
Copy right actCopy right act
Copy right act
 
Social network privacy & security
Social network privacy & securitySocial network privacy & security
Social network privacy & security
 
The Development of Printing (LIS 51)
The Development of Printing (LIS 51)The Development of Printing (LIS 51)
The Development of Printing (LIS 51)
 
Industrial dispute act 1947
Industrial dispute act 1947Industrial dispute act 1947
Industrial dispute act 1947
 
Trade union act, 1926
Trade union act, 1926Trade union act, 1926
Trade union act, 1926
 
Elements & Principles of Art Design PowerPoint
Elements & Principles of Art Design PowerPointElements & Principles of Art Design PowerPoint
Elements & Principles of Art Design PowerPoint
 
Principles of Design - Graphic Design Theory
Principles of Design - Graphic Design TheoryPrinciples of Design - Graphic Design Theory
Principles of Design - Graphic Design Theory
 
Basic layout principles
Basic layout principlesBasic layout principles
Basic layout principles
 
Text features
Text featuresText features
Text features
 
Intellectual Property Rights
Intellectual Property RightsIntellectual Property Rights
Intellectual Property Rights
 
2017 Digital Yearbook
2017 Digital Yearbook2017 Digital Yearbook
2017 Digital Yearbook
 

Similar to Privacy right under it act, 2000 and under other law

Privacy versus Security: A Legal Perspective
Privacy versus Security: A Legal PerspectivePrivacy versus Security: A Legal Perspective
Privacy versus Security: A Legal PerspectiveJason Nathu
 
Ronit Mathur Cyber Security assesment.pptx
Ronit Mathur Cyber Security assesment.pptxRonit Mathur Cyber Security assesment.pptx
Ronit Mathur Cyber Security assesment.pptxManuGupta344215
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protectionatuljaybhaye
 
Freedom of Information and Data Protection
Freedom of Information and Data ProtectionFreedom of Information and Data Protection
Freedom of Information and Data ProtectionEquiGov Institute
 
Internet censorship by ronak
Internet censorship by ronakInternet censorship by ronak
Internet censorship by ronakRonak Karanpuria
 
Privacy and data protection in the realm of Internet Governance by Santosh Si...
Privacy and data protection in the realm of Internet Governance by Santosh Si...Privacy and data protection in the realm of Internet Governance by Santosh Si...
Privacy and data protection in the realm of Internet Governance by Santosh Si...Santosh Sigdel
 
Reasonable Security Practices And Procedures And Sensitive Personala 24 06 2...
Reasonable Security Practices And Procedures And Sensitive Personala  24 06 2...Reasonable Security Practices And Procedures And Sensitive Personala  24 06 2...
Reasonable Security Practices And Procedures And Sensitive Personala 24 06 2...Vijay Dalmia
 
What happens to our virtual account or digital asset or data after our death ?
What happens to our virtual account or digital asset or data after our death ?What happens to our virtual account or digital asset or data after our death ?
What happens to our virtual account or digital asset or data after our death ?Bivas Chatterjee
 
PERSONAL-DATA-PROTECTION-BILL-2018.pptx
PERSONAL-DATA-PROTECTION-BILL-2018.pptxPERSONAL-DATA-PROTECTION-BILL-2018.pptx
PERSONAL-DATA-PROTECTION-BILL-2018.pptxssuser36d167
 
An Indian Outline on Database Protection
An Indian Outline on Database ProtectionAn Indian Outline on Database Protection
An Indian Outline on Database ProtectionSinghania2015
 
Analysis of cyber crime bill 2016
Analysis of cyber crime bill 2016 Analysis of cyber crime bill 2016
Analysis of cyber crime bill 2016 Zohaib Arshid
 
Lorson Resources Limited - Records & Information Presentation: Data Protectio...
Lorson Resources Limited - Records & Information Presentation: Data Protectio...Lorson Resources Limited - Records & Information Presentation: Data Protectio...
Lorson Resources Limited - Records & Information Presentation: Data Protectio...Lorson Resources Limited
 
Research on Digital Security Act 2018
Research on Digital Security Act 2018Research on Digital Security Act 2018
Research on Digital Security Act 2018Nilima Tariq
 
Indian IT Act - Cybersecurity
Indian IT Act - CybersecurityIndian IT Act - Cybersecurity
Indian IT Act - CybersecurityGautam GR
 
Philippine Data Privacy Act of 2012 (RA 10173)
Philippine Data Privacy Act of 2012 (RA 10173)Philippine Data Privacy Act of 2012 (RA 10173)
Philippine Data Privacy Act of 2012 (RA 10173)Kirk Go
 
Information Security: The Trinidad & Tobago Legal Context
Information Security: The Trinidad & Tobago Legal ContextInformation Security: The Trinidad & Tobago Legal Context
Information Security: The Trinidad & Tobago Legal ContextJason Nathu
 

Similar to Privacy right under it act, 2000 and under other law (20)

Privacy versus Security: A Legal Perspective
Privacy versus Security: A Legal PerspectivePrivacy versus Security: A Legal Perspective
Privacy versus Security: A Legal Perspective
 
Ronit Mathur Cyber Security assesment.pptx
Ronit Mathur Cyber Security assesment.pptxRonit Mathur Cyber Security assesment.pptx
Ronit Mathur Cyber Security assesment.pptx
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protection
 
Freedom of Information and Data Protection
Freedom of Information and Data ProtectionFreedom of Information and Data Protection
Freedom of Information and Data Protection
 
Cie 2 cyber law
Cie 2  cyber lawCie 2  cyber law
Cie 2 cyber law
 
Internet censorship by ronak
Internet censorship by ronakInternet censorship by ronak
Internet censorship by ronak
 
Privacy and data protection in the realm of Internet Governance by Santosh Si...
Privacy and data protection in the realm of Internet Governance by Santosh Si...Privacy and data protection in the realm of Internet Governance by Santosh Si...
Privacy and data protection in the realm of Internet Governance by Santosh Si...
 
Reasonable Security Practices And Procedures And Sensitive Personala 24 06 2...
Reasonable Security Practices And Procedures And Sensitive Personala  24 06 2...Reasonable Security Practices And Procedures And Sensitive Personala  24 06 2...
Reasonable Security Practices And Procedures And Sensitive Personala 24 06 2...
 
Vonnegut's Narrator
Vonnegut's NarratorVonnegut's Narrator
Vonnegut's Narrator
 
What happens to our virtual account or digital asset or data after our death ?
What happens to our virtual account or digital asset or data after our death ?What happens to our virtual account or digital asset or data after our death ?
What happens to our virtual account or digital asset or data after our death ?
 
4-Privacy1.pptx
4-Privacy1.pptx4-Privacy1.pptx
4-Privacy1.pptx
 
PERSONAL-DATA-PROTECTION-BILL-2018.pptx
PERSONAL-DATA-PROTECTION-BILL-2018.pptxPERSONAL-DATA-PROTECTION-BILL-2018.pptx
PERSONAL-DATA-PROTECTION-BILL-2018.pptx
 
An Indian Outline on Database Protection
An Indian Outline on Database ProtectionAn Indian Outline on Database Protection
An Indian Outline on Database Protection
 
Ethical Issues and Relevant Laws on Computing
Ethical Issues and Relevant Laws on ComputingEthical Issues and Relevant Laws on Computing
Ethical Issues and Relevant Laws on Computing
 
Analysis of cyber crime bill 2016
Analysis of cyber crime bill 2016 Analysis of cyber crime bill 2016
Analysis of cyber crime bill 2016
 
Lorson Resources Limited - Records & Information Presentation: Data Protectio...
Lorson Resources Limited - Records & Information Presentation: Data Protectio...Lorson Resources Limited - Records & Information Presentation: Data Protectio...
Lorson Resources Limited - Records & Information Presentation: Data Protectio...
 
Research on Digital Security Act 2018
Research on Digital Security Act 2018Research on Digital Security Act 2018
Research on Digital Security Act 2018
 
Indian IT Act - Cybersecurity
Indian IT Act - CybersecurityIndian IT Act - Cybersecurity
Indian IT Act - Cybersecurity
 
Philippine Data Privacy Act of 2012 (RA 10173)
Philippine Data Privacy Act of 2012 (RA 10173)Philippine Data Privacy Act of 2012 (RA 10173)
Philippine Data Privacy Act of 2012 (RA 10173)
 
Information Security: The Trinidad & Tobago Legal Context
Information Security: The Trinidad & Tobago Legal ContextInformation Security: The Trinidad & Tobago Legal Context
Information Security: The Trinidad & Tobago Legal Context
 

Recently uploaded

CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual serviceanilsa9823
 
Cleades Robinson's Commitment to Service
Cleades Robinson's Commitment to ServiceCleades Robinson's Commitment to Service
Cleades Robinson's Commitment to ServiceCleades Robinson
 
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueAndrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueSkyLaw Professional Corporation
 
Mediation ppt for study materials. notes
Mediation ppt for study materials. notesMediation ppt for study materials. notes
Mediation ppt for study materials. notesPRATIKNAYAK31
 
如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书Fir L
 
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书Fir L
 
如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书
如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书
如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书Fir L
 
Ricky French: Championing Truth and Change in Midlothian
Ricky French: Championing Truth and Change in MidlothianRicky French: Championing Truth and Change in Midlothian
Ricky French: Championing Truth and Change in MidlothianRicky French
 
589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdfSUSHMITAPOTHAL
 
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书Fs Las
 
如何办理(Michigan文凭证书)密歇根大学毕业证学位证书
 如何办理(Michigan文凭证书)密歇根大学毕业证学位证书 如何办理(Michigan文凭证书)密歇根大学毕业证学位证书
如何办理(Michigan文凭证书)密歇根大学毕业证学位证书Sir Lt
 
The Active Management Value Ratio: The New Science of Benchmarking Investment...
The Active Management Value Ratio: The New Science of Benchmarking Investment...The Active Management Value Ratio: The New Science of Benchmarking Investment...
The Active Management Value Ratio: The New Science of Benchmarking Investment...James Watkins, III JD CFP®
 
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书Sir Lt
 
Legal Risks and Compliance Considerations for Cryptocurrency Exchanges in India
Legal Risks and Compliance Considerations for Cryptocurrency Exchanges in IndiaLegal Risks and Compliance Considerations for Cryptocurrency Exchanges in India
Legal Risks and Compliance Considerations for Cryptocurrency Exchanges in IndiaFinlaw Consultancy Pvt Ltd
 
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdfBPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdflaysamaeguardiano
 
Arbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaArbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaNafiaNazim
 
Indemnity Guarantee Section 124 125 and 126
Indemnity Guarantee Section 124 125 and 126Indemnity Guarantee Section 124 125 and 126
Indemnity Guarantee Section 124 125 and 126Oishi8
 
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULELITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULEsreeramsaipranitha
 
INVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptxINVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptxnyabatejosphat1
 

Recently uploaded (20)

CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
 
Cleades Robinson's Commitment to Service
Cleades Robinson's Commitment to ServiceCleades Robinson's Commitment to Service
Cleades Robinson's Commitment to Service
 
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueAndrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
 
Mediation ppt for study materials. notes
Mediation ppt for study materials. notesMediation ppt for study materials. notes
Mediation ppt for study materials. notes
 
如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书
 
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
 
如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书
如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书
如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书
 
Ricky French: Championing Truth and Change in Midlothian
Ricky French: Championing Truth and Change in MidlothianRicky French: Championing Truth and Change in Midlothian
Ricky French: Championing Truth and Change in Midlothian
 
589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf
 
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
 
如何办理(Michigan文凭证书)密歇根大学毕业证学位证书
 如何办理(Michigan文凭证书)密歇根大学毕业证学位证书 如何办理(Michigan文凭证书)密歇根大学毕业证学位证书
如何办理(Michigan文凭证书)密歇根大学毕业证学位证书
 
The Active Management Value Ratio: The New Science of Benchmarking Investment...
The Active Management Value Ratio: The New Science of Benchmarking Investment...The Active Management Value Ratio: The New Science of Benchmarking Investment...
The Active Management Value Ratio: The New Science of Benchmarking Investment...
 
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 
Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...
Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...
Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...
 
Legal Risks and Compliance Considerations for Cryptocurrency Exchanges in India
Legal Risks and Compliance Considerations for Cryptocurrency Exchanges in IndiaLegal Risks and Compliance Considerations for Cryptocurrency Exchanges in India
Legal Risks and Compliance Considerations for Cryptocurrency Exchanges in India
 
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdfBPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
 
Arbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaArbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in India
 
Indemnity Guarantee Section 124 125 and 126
Indemnity Guarantee Section 124 125 and 126Indemnity Guarantee Section 124 125 and 126
Indemnity Guarantee Section 124 125 and 126
 
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULELITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
 
INVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptxINVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptx
 

Privacy right under it act, 2000 and under other law

  • 1. Privacy Issues in Technology Era Nitya Nand Pandey Assistant Professor (Amity Law School) Amity University Jaipur Mo. 9415422181 Mail id. nnp.vns@gmail.com
  • 2. What is Privacy? • “Privacy may be defined as the claim of individuals, groups or institutions to determine when, how and to what extent information about them is communicated to others”. • In simple words privacy can be defined as a right to be let alone.
  • 3. Types of Privacy • The term privacy can have different meaning in different context. Peoples have different opinion and views on what they can term as the breach of their privacy rights. It may be- a. Personal Privacy b. Organizational Privacy c. Privacy related to property
  • 4. Privacy and the Internet • Internet has almost changed the way one used to fear from privacy invasion. • Now you don’t know how and when you are been monitored and by whom. One do not know that his information is being sold over the internet for just 1 or 2 dollars. • peoples are being murdered by the help of internet. • peoples are harassed and blackmailed on social networking sites. Their photos are downloaded, morphed and misused. • Though Internet has revolutionized the world and it has become a global village now, on the other hand we cannot deny the negative aspects of it.
  • 5. • We need to understand the fact that everything that we do on internet can be noticed or revealed because it leaves digital traces. • The use of smart phones is another emerging dan ger to online privacy. • Every device that is connected to Internet has a unique IP address attached to it, whether it is a computer, mobile, play station or anything else which means it can be traced.
  • 6. Legal Regime to Combat Cyber Privacy in India • We have looked upon the threats to cyber privacy and their results. But what can we do if someone breaches our privacy. • What can we do, what are the legal rights of an Indian citizen in context with privacy? Let us understand that.
  • 7. Information Technology Amendment Act, 2008 • Information Technology Act is an act of Indian Parliament notified on 17, October, 2000. • It was further amended and came into force on October 27, 2009. • It regulates the cyberspace in India and provides rules and regulations regarding different aspects of cyber law.
  • 8. Section 43(A): Compensation for failure to protect data • Where a body corporate, possessing, dealing or handling any sensitive personal data or information in a computer resource which it owns controls or operates, is negligent in implementing and maintaining reasonable security practices and procedures and thereby causes wrongful loss or wrongful gain to any person, such body corporate shall be liable to pay damages by way of compensation, to the person so affected.
  • 9. Section 66(E): Punishment for violation of privacy. • Whoever, intentionally or knowingly captures, publishes or transmits the image of a private area of any person without his or her consent, under circumstances violating the privacy of that person, • shall be punished with imprisonment which may extend to three years or with fine not exceeding two lakh rupees, or with both.
  • 10. Explanation • For the purposes of section 66 (E)-- • (a) “transmit” means to electronically send a visual image with the intent that it be viewed by a person or persons; • (b) “capture”, with respect to an image, means to videotape, photograph, film or record by any means; • (c) “private area” means the naked or undergarment clad genitals, pubic area, buttocks or female breast;
  • 11. Explanation………… • d) “publishes” means reproduction in the printed or electronic form and making it available for public; • (e) “under circumstances violating privacy” means circumstances in which a person can have a reasonable expectation that— • (i) he or she could disrobe in privacy, without being concerned that an image of his private area was being captured; or • (ii) any part of his or her private area would not be visible to the public, regardless of whether that person is in a public or private place.
  • 12. Section 72: Breach of confidentiality and privacy • Save as otherwise provided in this Act or any other law for the time being in force, • any person who, in pursuant of any of the powers conferred under this Act, rules or regulations made there under, • has secured access to any electronic record, book, register, correspondence, information, document or other material • without the consent of the person concerned • discloses such electronic record, book, register, correspondence, information, document or other material to any other person • shall be punished with imprisonment for a term which may extend to two years, or with fine which may extend to one lakh rupees, or with both.
  • 13. Punishment for Disclosure of information in breach of lawful contract (72 A) • Save as otherwise provided in this Act or any other law for the time being in force, • any person including an intermediary who, while providing services under the terms of lawful contract, has secured access to any material containing personal information about another person, with the intent to cause or knowing that he is likely to cause wrongful loss or wrongful gain discloses, • without the consent of the person concerned, or in breach of a lawful contract, such material to any other person • shall be punished with imprisonment for a term which may extend to three years, or with a fine which may extend to five lakh rupees, or with both.
  • 14. • These are the sections which provide a citizen some rights to fight for his privacy in IT Act. Also it provides some procedure and rules for monitoring and collecting traffic data or information.
  • 15. Indian Penal Code, 1860 • There are some sections in IPC which deals with privacy. They are not directly related with cyber privacy but can be helpful for an individual to claim his or her rights. • Section 499 & 500- Defamation • Section 292. Sale, etc., of obscene books etc., • Section 447. Punishment for Criminal Trespass, • Section 509 - Word, gesture or act intended to insult the modesty of a woman.
  • 16. Right to Information Act, 2005 • Section 8 - Exemption from disclosure of information.
  • 17. Judiciary & Right to Privacy R. Rajgopal v. State of Tamilnadu 1994 SC, Right to privacy or right to be let alone is guaranteed by Art. 21. State of Maharashtra v. Madhulkar Narain 1991 SC, right to privacy is available even to a women of easy virtue and no one can invade her privacy.
  • 18. Mr. “X” v. Hospital “Z” • It is not a absolute fundamental right and restrictions can be imposed on it for the- I. Prevention of crime II. Disorder or protection of health III. Protection of rights IV. Freedom of others
  • 19. Surjit Singh Thind v. Kanwaljit Kaur 2003 P&H • Virginity test violates Right to privacy under Art. 21
  • 20. Rayala M. Bhuvaneswari v. Nagaphander Rayala 2008 AP • Husband tapping conversation of his wife with others seeking to produce in court, violates her right to privacy under Art. 21.
  • 21. Conclusion • First, Right to privacy is a fundamental right as guaranteed by Indian Constitution in Article 21, so every individual has a right to privacy but with some limitations. • Though new methods of tracking and tracing a person are available, also new types of Personally Identifiable Information can be retrieved; government should take responsibility of a person’s privacy and personal information from being invaded.
  • 22. Conclusion…… • Government has also prescribed the method and rules form monitoring and collecting data or information in IT Act but it should also be implemented. • Second, it’s also our responsibility to know that as internet is a global platform we should try to regulate or minimize the amount of information we usually share without being aware about the possible risks and threats related to it. • Because as it is always said that, “precaution is better than cure.”
  • 23. That is the End of Right to Privacy Nitya Nand Pandey Assistant Professor (Amity Law School) Amity University Jaipur Mo. 9415422181 Mail id. nnp.vns@gmail.com