SlideShare a Scribd company logo
1 of 15
Download to read offline
Privacy and Data
Protection in the
realm of Internet
Governance
Advocate Santosh Sigdel
Internet Society Nepal
@sigdelsantosh
Internet Governance
• Internet governance is the development
and application by governments, the
private sector, and civil society, in their
respective roles, of shared principles,
norms, rules, decision-making
procedures, and programmes that
shape the evolution and use of the
Internet.
Baskets of Internet Governance
Infrastructure
Basket
Security
Basket
Legal Basket
Economic
Basket
Human Rights
Basket
Social
Cultural
Basket
Source: Diplo Foundation
Stakeholders
Governments
Intergovernmental
organizations
Technical Community
Business
Communities/Private
Sectors
Civil Society
organizations
(I/NGOs)
Academia and
Research institutes
Source: Diplo Foundation
Human Rights Basket
Freedom of expression
and the right to seek,
receive, and impart
information
Privacy and data
protection
Children’s rights in the
digital world
Rights of persons with
disabilities
Gender and human
rights online
Privacy
Privacy: the right of citizens to control their own
personal information and to decide whether or not to
disclose it.
Privacy concerns exist wherever personally identifiable
information is collected and stored in digital form or
otherwise.
Data privacy issues can arise in response to
information from a wide range of sources, such as
healthcare records, criminal justice investigations and
proceedings, financial institutions and transactions,
residence and geographic records, race and ethnicity.
Data
Protection
• Data protection is a legal mechanism that
ensures privacy.
• Data Protection refers to the set of privacy
laws, policies and procedures that aim to
minimize intrusion into one's privacy caused by
the collection, processing, storage and
dissemination of personal data.
• Personal data generally refers to the
information or data that relate to a person who
can be identified from that information or data
whether collected by any Government or any
private organization or an agency.
Relevance of the Issue
• The issues of privacy and data protections have become very sensitive.
• Smart Driving License Card
• Embossed number plate in Nepal
• National ID
• Aadhar Card in India (Privacy is a fundamental Right: SC)
• Ranabahadur Chand Murder Case
• Decision of the Supreme Court
• Law enforcement agencies are encroaching the privacy domain in the name of
investigation and protection of national interest.
• If we shape our digital future, our data and privacies are to be protected.
Privacy Principle from IG perspective
• NOTICE
• CHOICE AND CONSENT
• COLLECTION
• USE, RETENTION, AND DISPOSAL
• ACCESS
• DISCLOSURE TO THIRD PARTIES
• SECURITY FOR PRIVACY
• QUALITY
• MONITORING AND ENFORCEMENT
International Mechanism
• Universal Declaration of Human Rights (UDHR), 1948
• No one shall be subjected to arbitrary interference with his privacy, family, home or
correspondence, nor to attacks upon his honour and reputation. Everyone has the right
to the protection of the law against such interference or attacks
• International Covenant on Civil and Political Rights
• "No one shall be subjected to arbitrary or unlawful interference with his privacy, family,
home or correspondence, nor to unlawful attacks on his honor and reputation and
everyone has the right to the protection of the law against such interference or attacks"
• The July 2015 appointment of the first UN Special Rapporteur on the Right to Privacy in the
Digital Age reflects the rising importance of privacy in global digital policy, and the
recognition of the need to address privacy rights issues at the global, as well as national
levels.
• Resolution on the Right to Privacy in the Digital Age (A/RES/68/167), 2013
• “unlawful or arbitrary surveillance and/or interception of communications, as well as
unlawful or arbitrary collection of personal data, as highly intrusive acts, violate the rights to
privacy and to freedom of expression and may contradict the tenets of a democratic society.”
Nepal Scenario
• Right to Privacy is protected in Constitution
• Constitution of 1990, first constitution to protect Right
• Constitution of 2015 also guarantees Right to Privacy
• But no regulation is enacted yet to ensure privacy and data protection
• The Supreme Court of Nepal recently has ordered the government to
compulsorily seek permission from the district court if the police or other
authorities concerned need to access telephone call records and SMS details for
the purpose of criminal investigations.
Global Trend
• Pakistan, police/government department are allowed to directly
access cellular user's information without need of any warrant.
• Power to conduct legitimate surveillance/interception after 9/11
• A warrant is a necessity for UK police, but even without it using the
controversial Regulation of Investigatory Powers Act (RIPA), they can
access phone calls and emails.
• Under Electronic Communication Privacy Act (ECPA) of USA, upon
fulfilling the "specific and articulable facts" requirement related to an
investigation, investigators can get a court order allowing real time
access/phone record/IP address.
• Right to be forgotten
4/2/2018 Advocate Babu Ram Aryal, Chairman, Center for Law and Technology 13
Way forward: What can be done
• Enact Privacy Law (provide Intl. standard protection)
• Government : Individual
• Business : Individual
• Individual: Individual
• Involvement of CSOs, private sector in law making process
• Enact Data Protection Law
• Involvement of CSOs, private sector in law making process
• Awareness programs
• Multi-stakeholder Discussion on Privacy and Data Protection
THANK YOU
Santosh Sigdel
Email: santoshsigdel@gmail.com
Twitter: @sigdelsantosh

More Related Content

What's hot

Copyright and privacy by design - what lessons have we learned?
Copyright and privacy by design - what lessons have we learned?Copyright and privacy by design - what lessons have we learned?
Copyright and privacy by design - what lessons have we learned?blogzilla
 
Privacy post-Snowden
Privacy post-SnowdenPrivacy post-Snowden
Privacy post-Snowdenblogzilla
 
Introduction to the Freedom of Information and Data Protection Act Trinidad a...
Introduction to the Freedom of Information and Data Protection Act Trinidad a...Introduction to the Freedom of Information and Data Protection Act Trinidad a...
Introduction to the Freedom of Information and Data Protection Act Trinidad a...EquiGov Institute
 
Freedom of Information - Implementation and Statutory Provisions of the Act (...
Freedom of Information - Implementation and Statutory Provisions of the Act (...Freedom of Information - Implementation and Statutory Provisions of the Act (...
Freedom of Information - Implementation and Statutory Provisions of the Act (...EquiGov Institute
 
Data legislation, governance and policy/Abraham M Keetshabe
Data legislation, governance and policy/Abraham M KeetshabeData legislation, governance and policy/Abraham M Keetshabe
Data legislation, governance and policy/Abraham M KeetshabeAfrican Open Science Platform
 
David Menken - Fire Dept. Use of Social Media - The Legal Issues
David Menken - Fire Dept. Use of Social Media - The Legal IssuesDavid Menken - Fire Dept. Use of Social Media - The Legal Issues
David Menken - Fire Dept. Use of Social Media - The Legal IssuesDavid Menken
 
IT Governance: Privacy and Intellectual Property
IT Governance: Privacy and Intellectual PropertyIT Governance: Privacy and Intellectual Property
IT Governance: Privacy and Intellectual PropertyCharles Mok
 
Protection of Personal Information
Protection of Personal InformationProtection of Personal Information
Protection of Personal InformationFrancois Naude Jr.
 
Privacy and Data Protection in South Africa
Privacy and Data Protection in South AfricaPrivacy and Data Protection in South Africa
Privacy and Data Protection in South Africablogzilla
 
Legal restraints on media companies
Legal restraints on media companiesLegal restraints on media companies
Legal restraints on media companiesSophia Gent
 
Introduction privacy and drones130902.pptx (alleen lezen)
Introduction privacy and drones130902.pptx (alleen lezen)Introduction privacy and drones130902.pptx (alleen lezen)
Introduction privacy and drones130902.pptx (alleen lezen)schermerbw
 
Otieno antony rethinking internet shutdown
Otieno antony   rethinking internet shutdownOtieno antony   rethinking internet shutdown
Otieno antony rethinking internet shutdownOtieno Antony
 
Overview of privacy and data protection considerations for DEVELOP
Overview of privacy and data protection considerations for DEVELOPOverview of privacy and data protection considerations for DEVELOP
Overview of privacy and data protection considerations for DEVELOPTrilateral Research
 
The Great Firewall of China
The Great Firewall of ChinaThe Great Firewall of China
The Great Firewall of Chinaguest00df536
 
The Right to be Forgotten - It's About Time, or is it? (CPDP2014)
The Right to be Forgotten - It's About Time, or is it? (CPDP2014)The Right to be Forgotten - It's About Time, or is it? (CPDP2014)
The Right to be Forgotten - It's About Time, or is it? (CPDP2014)Jausloos
 

What's hot (20)

Copyright and privacy by design - what lessons have we learned?
Copyright and privacy by design - what lessons have we learned?Copyright and privacy by design - what lessons have we learned?
Copyright and privacy by design - what lessons have we learned?
 
Privacy post-Snowden
Privacy post-SnowdenPrivacy post-Snowden
Privacy post-Snowden
 
Introduction to the Freedom of Information and Data Protection Act Trinidad a...
Introduction to the Freedom of Information and Data Protection Act Trinidad a...Introduction to the Freedom of Information and Data Protection Act Trinidad a...
Introduction to the Freedom of Information and Data Protection Act Trinidad a...
 
Freedom of Information - Implementation and Statutory Provisions of the Act (...
Freedom of Information - Implementation and Statutory Provisions of the Act (...Freedom of Information - Implementation and Statutory Provisions of the Act (...
Freedom of Information - Implementation and Statutory Provisions of the Act (...
 
Data legislation, governance and policy/Abraham M Keetshabe
Data legislation, governance and policy/Abraham M KeetshabeData legislation, governance and policy/Abraham M Keetshabe
Data legislation, governance and policy/Abraham M Keetshabe
 
Hannes astok data protection agency
Hannes astok data protection agencyHannes astok data protection agency
Hannes astok data protection agency
 
David Menken - Fire Dept. Use of Social Media - The Legal Issues
David Menken - Fire Dept. Use of Social Media - The Legal IssuesDavid Menken - Fire Dept. Use of Social Media - The Legal Issues
David Menken - Fire Dept. Use of Social Media - The Legal Issues
 
POPI Seminar FINAL
POPI Seminar FINALPOPI Seminar FINAL
POPI Seminar FINAL
 
IT Governance: Privacy and Intellectual Property
IT Governance: Privacy and Intellectual PropertyIT Governance: Privacy and Intellectual Property
IT Governance: Privacy and Intellectual Property
 
Protection of Personal Information
Protection of Personal InformationProtection of Personal Information
Protection of Personal Information
 
Privacy and Data Protection in South Africa
Privacy and Data Protection in South AfricaPrivacy and Data Protection in South Africa
Privacy and Data Protection in South Africa
 
Legal restraints on media companies
Legal restraints on media companiesLegal restraints on media companies
Legal restraints on media companies
 
Introduction privacy and drones130902.pptx (alleen lezen)
Introduction privacy and drones130902.pptx (alleen lezen)Introduction privacy and drones130902.pptx (alleen lezen)
Introduction privacy and drones130902.pptx (alleen lezen)
 
POPI_Overview_E
POPI_Overview_EPOPI_Overview_E
POPI_Overview_E
 
POPI_Overview_E
POPI_Overview_EPOPI_Overview_E
POPI_Overview_E
 
Otieno antony rethinking internet shutdown
Otieno antony   rethinking internet shutdownOtieno antony   rethinking internet shutdown
Otieno antony rethinking internet shutdown
 
Overview of privacy and data protection considerations for DEVELOP
Overview of privacy and data protection considerations for DEVELOPOverview of privacy and data protection considerations for DEVELOP
Overview of privacy and data protection considerations for DEVELOP
 
POPI Update 2013
POPI Update 2013POPI Update 2013
POPI Update 2013
 
The Great Firewall of China
The Great Firewall of ChinaThe Great Firewall of China
The Great Firewall of China
 
The Right to be Forgotten - It's About Time, or is it? (CPDP2014)
The Right to be Forgotten - It's About Time, or is it? (CPDP2014)The Right to be Forgotten - It's About Time, or is it? (CPDP2014)
The Right to be Forgotten - It's About Time, or is it? (CPDP2014)
 

Similar to Privacy and data protection in the realm of Internet Governance by Santosh Sigdel

Privacy, human rights and Location Based Services
Privacy, human rights and Location Based ServicesPrivacy, human rights and Location Based Services
Privacy, human rights and Location Based Servicesblogzilla
 
Rti resoucebook for cs os workers & media
Rti resoucebook for cs os workers & mediaRti resoucebook for cs os workers & media
Rti resoucebook for cs os workers & mediaMohammad Ismail
 
Privacy In Emerging Technology
Privacy In Emerging TechnologyPrivacy In Emerging Technology
Privacy In Emerging Technologyorrenprunckun
 
Freedom of Information and Data Protection
Freedom of Information and Data ProtectionFreedom of Information and Data Protection
Freedom of Information and Data ProtectionEquiGov Institute
 
OVERVIEW OF DATA PROTECTION AND PRIVACY.pptx
OVERVIEW OF DATA PROTECTION AND PRIVACY.pptxOVERVIEW OF DATA PROTECTION AND PRIVACY.pptx
OVERVIEW OF DATA PROTECTION AND PRIVACY.pptxUsmanMAmeer
 
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdfPRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdflinda gichohi
 
ethcpp04-Unit 3.ppt
ethcpp04-Unit 3.pptethcpp04-Unit 3.ppt
ethcpp04-Unit 3.pptAnil Yadav
 
ethcpp04-Unit 3.ppt
ethcpp04-Unit 3.pptethcpp04-Unit 3.ppt
ethcpp04-Unit 3.pptAnil Yadav
 
Kasita's presentation
Kasita's presentationKasita's presentation
Kasita's presentationChande Kasita
 
Research on Digital Security Act 2018
Research on Digital Security Act 2018Research on Digital Security Act 2018
Research on Digital Security Act 2018Nilima Tariq
 
Chapter 08 – Data Protection, Privacy and Freedom of Information - BIT IT5104
Chapter 08 – Data Protection, Privacy and Freedom of Information - BIT IT5104 Chapter 08 – Data Protection, Privacy and Freedom of Information - BIT IT5104
Chapter 08 – Data Protection, Privacy and Freedom of Information - BIT IT5104 Upekha Vandebona
 
Presentation 4.3 Use of FOI acts
Presentation 4.3 Use of FOI actsPresentation 4.3 Use of FOI acts
Presentation 4.3 Use of FOI actsjohnabutterworth
 
Privacy in a Human Rights and Social Justice Context
Privacy in a Human Rights and Social Justice ContextPrivacy in a Human Rights and Social Justice Context
Privacy in a Human Rights and Social Justice ContextInfo_Studies_Aberystwyth
 

Similar to Privacy and data protection in the realm of Internet Governance by Santosh Sigdel (20)

Privacy, human rights and Location Based Services
Privacy, human rights and Location Based ServicesPrivacy, human rights and Location Based Services
Privacy, human rights and Location Based Services
 
Internet rights.pdf
Internet rights.pdfInternet rights.pdf
Internet rights.pdf
 
Rti resoucebook for cs os workers & media
Rti resoucebook for cs os workers & mediaRti resoucebook for cs os workers & media
Rti resoucebook for cs os workers & media
 
Privacy In Emerging Technology
Privacy In Emerging TechnologyPrivacy In Emerging Technology
Privacy In Emerging Technology
 
Freedom of Information and Data Protection
Freedom of Information and Data ProtectionFreedom of Information and Data Protection
Freedom of Information and Data Protection
 
Rti sensitization-k.c.b
Rti sensitization-k.c.bRti sensitization-k.c.b
Rti sensitization-k.c.b
 
Const law
Const lawConst law
Const law
 
OVERVIEW OF DATA PROTECTION AND PRIVACY.pptx
OVERVIEW OF DATA PROTECTION AND PRIVACY.pptxOVERVIEW OF DATA PROTECTION AND PRIVACY.pptx
OVERVIEW OF DATA PROTECTION AND PRIVACY.pptx
 
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdfPRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
 
ethcpp04-Unit 3.ppt
ethcpp04-Unit 3.pptethcpp04-Unit 3.ppt
ethcpp04-Unit 3.ppt
 
ethcpp04-Unit 3.ppt
ethcpp04-Unit 3.pptethcpp04-Unit 3.ppt
ethcpp04-Unit 3.ppt
 
4-Privacy1.pptx
4-Privacy1.pptx4-Privacy1.pptx
4-Privacy1.pptx
 
Rti sensitization-k.c.b
Rti sensitization-k.c.bRti sensitization-k.c.b
Rti sensitization-k.c.b
 
Kasita's presentation
Kasita's presentationKasita's presentation
Kasita's presentation
 
Gary Davis
Gary DavisGary Davis
Gary Davis
 
Research on Digital Security Act 2018
Research on Digital Security Act 2018Research on Digital Security Act 2018
Research on Digital Security Act 2018
 
Digitisation, democracy and the regulation of personal data use for political...
Digitisation, democracy and the regulation of personal data use for political...Digitisation, democracy and the regulation of personal data use for political...
Digitisation, democracy and the regulation of personal data use for political...
 
Chapter 08 – Data Protection, Privacy and Freedom of Information - BIT IT5104
Chapter 08 – Data Protection, Privacy and Freedom of Information - BIT IT5104 Chapter 08 – Data Protection, Privacy and Freedom of Information - BIT IT5104
Chapter 08 – Data Protection, Privacy and Freedom of Information - BIT IT5104
 
Presentation 4.3 Use of FOI acts
Presentation 4.3 Use of FOI actsPresentation 4.3 Use of FOI acts
Presentation 4.3 Use of FOI acts
 
Privacy in a Human Rights and Social Justice Context
Privacy in a Human Rights and Social Justice ContextPrivacy in a Human Rights and Social Justice Context
Privacy in a Human Rights and Social Justice Context
 

Recently uploaded

如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书SD DS
 
Succession (Articles 774-1116 Civil Code
Succession (Articles 774-1116 Civil CodeSuccession (Articles 774-1116 Civil Code
Succession (Articles 774-1116 Civil CodeMelvinPernez2
 
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝soniya singh
 
如何办理威斯康星大学密尔沃基分校毕业证学位证书
 如何办理威斯康星大学密尔沃基分校毕业证学位证书 如何办理威斯康星大学密尔沃基分校毕业证学位证书
如何办理威斯康星大学密尔沃基分校毕业证学位证书Fir sss
 
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书SD DS
 
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书Fir L
 
Special Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementSpecial Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementShubhiSharma858417
 
POLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptxPOLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptxAbhishekchatterjee248859
 
John Hustaix - The Legal Profession: A History
John Hustaix - The Legal Profession:  A HistoryJohn Hustaix - The Legal Profession:  A History
John Hustaix - The Legal Profession: A HistoryJohn Hustaix
 
Trial Tilak t 1897,1909, and 1916 sedition
Trial Tilak t 1897,1909, and 1916 seditionTrial Tilak t 1897,1909, and 1916 sedition
Trial Tilak t 1897,1909, and 1916 seditionNilamPadekar1
 
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》o8wvnojp
 
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书SD DS
 
Vanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 ShopsVanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 ShopsAbdul-Hakim Shabazz
 
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书srst S
 
Comparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesComparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesritwikv20
 
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书SD DS
 
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书SD DS
 
Test Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptxTest Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptxsrikarna235
 
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书Fir L
 
Good Governance Practices for protection of Human Rights (Discuss Transparen...
Good Governance Practices for protection  of Human Rights (Discuss Transparen...Good Governance Practices for protection  of Human Rights (Discuss Transparen...
Good Governance Practices for protection of Human Rights (Discuss Transparen...shubhuc963
 

Recently uploaded (20)

如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
 
Succession (Articles 774-1116 Civil Code
Succession (Articles 774-1116 Civil CodeSuccession (Articles 774-1116 Civil Code
Succession (Articles 774-1116 Civil Code
 
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
 
如何办理威斯康星大学密尔沃基分校毕业证学位证书
 如何办理威斯康星大学密尔沃基分校毕业证学位证书 如何办理威斯康星大学密尔沃基分校毕业证学位证书
如何办理威斯康星大学密尔沃基分校毕业证学位证书
 
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
 
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
 
Special Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementSpecial Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreement
 
POLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptxPOLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptx
 
John Hustaix - The Legal Profession: A History
John Hustaix - The Legal Profession:  A HistoryJohn Hustaix - The Legal Profession:  A History
John Hustaix - The Legal Profession: A History
 
Trial Tilak t 1897,1909, and 1916 sedition
Trial Tilak t 1897,1909, and 1916 seditionTrial Tilak t 1897,1909, and 1916 sedition
Trial Tilak t 1897,1909, and 1916 sedition
 
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
 
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
 
Vanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 ShopsVanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 Shops
 
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
 
Comparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesComparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use cases
 
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书
 
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
 
Test Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptxTest Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptx
 
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
 
Good Governance Practices for protection of Human Rights (Discuss Transparen...
Good Governance Practices for protection  of Human Rights (Discuss Transparen...Good Governance Practices for protection  of Human Rights (Discuss Transparen...
Good Governance Practices for protection of Human Rights (Discuss Transparen...
 

Privacy and data protection in the realm of Internet Governance by Santosh Sigdel

  • 1. Privacy and Data Protection in the realm of Internet Governance Advocate Santosh Sigdel Internet Society Nepal @sigdelsantosh
  • 2. Internet Governance • Internet governance is the development and application by governments, the private sector, and civil society, in their respective roles, of shared principles, norms, rules, decision-making procedures, and programmes that shape the evolution and use of the Internet.
  • 3. Baskets of Internet Governance Infrastructure Basket Security Basket Legal Basket Economic Basket Human Rights Basket Social Cultural Basket Source: Diplo Foundation
  • 6. Human Rights Basket Freedom of expression and the right to seek, receive, and impart information Privacy and data protection Children’s rights in the digital world Rights of persons with disabilities Gender and human rights online
  • 7. Privacy Privacy: the right of citizens to control their own personal information and to decide whether or not to disclose it. Privacy concerns exist wherever personally identifiable information is collected and stored in digital form or otherwise. Data privacy issues can arise in response to information from a wide range of sources, such as healthcare records, criminal justice investigations and proceedings, financial institutions and transactions, residence and geographic records, race and ethnicity.
  • 8. Data Protection • Data protection is a legal mechanism that ensures privacy. • Data Protection refers to the set of privacy laws, policies and procedures that aim to minimize intrusion into one's privacy caused by the collection, processing, storage and dissemination of personal data. • Personal data generally refers to the information or data that relate to a person who can be identified from that information or data whether collected by any Government or any private organization or an agency.
  • 9. Relevance of the Issue • The issues of privacy and data protections have become very sensitive. • Smart Driving License Card • Embossed number plate in Nepal • National ID • Aadhar Card in India (Privacy is a fundamental Right: SC) • Ranabahadur Chand Murder Case • Decision of the Supreme Court • Law enforcement agencies are encroaching the privacy domain in the name of investigation and protection of national interest. • If we shape our digital future, our data and privacies are to be protected.
  • 10. Privacy Principle from IG perspective • NOTICE • CHOICE AND CONSENT • COLLECTION • USE, RETENTION, AND DISPOSAL • ACCESS • DISCLOSURE TO THIRD PARTIES • SECURITY FOR PRIVACY • QUALITY • MONITORING AND ENFORCEMENT
  • 11. International Mechanism • Universal Declaration of Human Rights (UDHR), 1948 • No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honour and reputation. Everyone has the right to the protection of the law against such interference or attacks • International Covenant on Civil and Political Rights • "No one shall be subjected to arbitrary or unlawful interference with his privacy, family, home or correspondence, nor to unlawful attacks on his honor and reputation and everyone has the right to the protection of the law against such interference or attacks" • The July 2015 appointment of the first UN Special Rapporteur on the Right to Privacy in the Digital Age reflects the rising importance of privacy in global digital policy, and the recognition of the need to address privacy rights issues at the global, as well as national levels. • Resolution on the Right to Privacy in the Digital Age (A/RES/68/167), 2013 • “unlawful or arbitrary surveillance and/or interception of communications, as well as unlawful or arbitrary collection of personal data, as highly intrusive acts, violate the rights to privacy and to freedom of expression and may contradict the tenets of a democratic society.”
  • 12. Nepal Scenario • Right to Privacy is protected in Constitution • Constitution of 1990, first constitution to protect Right • Constitution of 2015 also guarantees Right to Privacy • But no regulation is enacted yet to ensure privacy and data protection • The Supreme Court of Nepal recently has ordered the government to compulsorily seek permission from the district court if the police or other authorities concerned need to access telephone call records and SMS details for the purpose of criminal investigations.
  • 13. Global Trend • Pakistan, police/government department are allowed to directly access cellular user's information without need of any warrant. • Power to conduct legitimate surveillance/interception after 9/11 • A warrant is a necessity for UK police, but even without it using the controversial Regulation of Investigatory Powers Act (RIPA), they can access phone calls and emails. • Under Electronic Communication Privacy Act (ECPA) of USA, upon fulfilling the "specific and articulable facts" requirement related to an investigation, investigators can get a court order allowing real time access/phone record/IP address. • Right to be forgotten 4/2/2018 Advocate Babu Ram Aryal, Chairman, Center for Law and Technology 13
  • 14. Way forward: What can be done • Enact Privacy Law (provide Intl. standard protection) • Government : Individual • Business : Individual • Individual: Individual • Involvement of CSOs, private sector in law making process • Enact Data Protection Law • Involvement of CSOs, private sector in law making process • Awareness programs • Multi-stakeholder Discussion on Privacy and Data Protection
  • 15. THANK YOU Santosh Sigdel Email: santoshsigdel@gmail.com Twitter: @sigdelsantosh