The document discusses the right to privacy in India. It defines the right to privacy as protecting individuals from unwarranted intrusion into their personal lives. The right to privacy is recognized under Article 21 of the Indian Constitution. Key issues regarding privacy today include the use of Aadhaar and surveillance technologies, as well as recent laws like the Personal Data Protection Bill aimed at regulating personal data collection. The conclusion emphasizes that privacy is a fundamental right and important to protect in the digital age.
iSPIRT’s Response- White Paper on Data Protection Framework for IndiaProductNation/iSPIRT
It is widely known that the amount of data generated daily worldwide is rising at an incredibly exponential rate. Yet, what remains shrouded is how this data, particularly those data types concerning or generated by us, as individuals, are being used and stored by both the public and private sector. As we move into a data-driven world, it is crucial that the laws developed around Data center on the premise of both empowering and protecting the individual. In fact, the main purpose of the 4th layer of India Stack, the “consent layer”, is just this: to provide for a set of tools and utilities, as part of the Data Empowerment and Protection Architecture (DEPA), that empower citizens to assert control over their data.
The Justice Srikrishna led committee of experts has released a White Paper articulating their provisional thoughts on the Data Protection Framework, and are seeking public comments on the subject. iSPIRT has submitted a formal response to the White Paper. You can also read the blog post lays out our current views regarding Data Protection here: http://pn.ispirt.in/india-in-a-digital-world/
we are here to help you in the duration of your preparation
feel free to contact us for any query regarding your exam
contact us at : 9454721860, 0522-4241011
or log on to our website : www.iasnext.com
An Indian Outline on Database ProtectionSinghania2015
One Business Processing Outsourcing company of India was in the eye of storm when one of its employees sold confidential financial information relating to customers of few British banks to an undercover reporter from the British tabloid ‘The Sun’. The incident sparked off a debate among the offshore industry circles, media and the legal world for the need of specific legislation for the protection for personal data in India which is absent currently.
iSPIRT’s Response- White Paper on Data Protection Framework for IndiaProductNation/iSPIRT
It is widely known that the amount of data generated daily worldwide is rising at an incredibly exponential rate. Yet, what remains shrouded is how this data, particularly those data types concerning or generated by us, as individuals, are being used and stored by both the public and private sector. As we move into a data-driven world, it is crucial that the laws developed around Data center on the premise of both empowering and protecting the individual. In fact, the main purpose of the 4th layer of India Stack, the “consent layer”, is just this: to provide for a set of tools and utilities, as part of the Data Empowerment and Protection Architecture (DEPA), that empower citizens to assert control over their data.
The Justice Srikrishna led committee of experts has released a White Paper articulating their provisional thoughts on the Data Protection Framework, and are seeking public comments on the subject. iSPIRT has submitted a formal response to the White Paper. You can also read the blog post lays out our current views regarding Data Protection here: http://pn.ispirt.in/india-in-a-digital-world/
we are here to help you in the duration of your preparation
feel free to contact us for any query regarding your exam
contact us at : 9454721860, 0522-4241011
or log on to our website : www.iasnext.com
An Indian Outline on Database ProtectionSinghania2015
One Business Processing Outsourcing company of India was in the eye of storm when one of its employees sold confidential financial information relating to customers of few British banks to an undercover reporter from the British tabloid ‘The Sun’. The incident sparked off a debate among the offshore industry circles, media and the legal world for the need of specific legislation for the protection for personal data in India which is absent currently.
Right to Information acts as a great tool to effect transparency and fix accountability on the concerned public authorities. We must understand how to file RTI to get empowered
Aadhaar and Personal Sensitive Information in the centralised database maintained by UIDAI is "Janamkundali" of an individual. It must be protected by Central Government like valuable Jewellery, diamond and white Gold.
RIGHT TO INFORMATION ACT 2005 ,FULL THEORY-MANPREET SINGH (B.COM)MANPREETSINGHPANESAR1
Right to information act 2005, all theory considered features ,merits ,demerits and functions etc.in briefly explained in this content . thanks for viewing this topic and do not forget to hit the like button ....
iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)ProductNation/iSPIRT
We believe that India is at a unique tipping point where only a fraction of its users have gone online, and a majority are yet to do so. Therefore, it is critical that we build the right set of protections and empowerments for these users as they enter the digital world.
It is equally important not to limit our thinking to simply “protection” of data. We must also question how we can “empower” individuals, who will be data rich before they are economically rich, with better access to their own healthcare data such that they can become more engaged participants and managers of their health care.
We welcome the proposed DISHA Act that seeks to Protect and Empower Individuals in regards to their electronic health data - we have provided our feedback on the DISHA Act and have also proposed technological approaches in this response
Data has emerged as one of the most important resources of today's world. However, there does not exist clear rules on how to make use of this resource. There are spillover effects and negative externalities in the form of privacy breaches while exploiting this resource. In such a situation, what should be the legal remedy?
The law should find a balance between the interests of the customers and the corporations. The customers want safety and privacy, whereas corporations want commercial use of data which risks the customer's interests.
What are the new laws under Canada Digital Privacy Act.pdfRiley Claire
The introduction of a new bill by the Canadian government indicates a significant overhaul of the country's privacy laws. Businesses in Canada are obligated to report data breaches affecting customers' personal information. All regulated Canadian businesses in the country's key industries—including banking, insurance, healthcare, and transportation—must abide by the Act's regulations or guiding principles. You may learn more about the new laws under the Canada Digital Privacy Act in this pdf.
Critical Analysis of Technology Law in India with Reference to Foreign Mechanismijtsrd
During the past few decades, we have witness some of the most exponential growth in our field of technology, whether it is a matter of law, social framework, economic or any other manner in which it has intersected various disciplines. Starting from the UN General Assembly Resolution leading to the approval of the Information Technology Act, further leading to the enactment of the Modern Electronic Trade Law. In reference to which we observed that how the right to privacy modified by the growth of information technology, and after which the technology has changed its contents for the protection of their legal interests. In this technologically evolved world, data is the new currency. As India, has no comprehensive data protection legislation and privacy legislation. The existing policies and laws are, in essence, sectoral in nature. These Sectoral Laws pertain to the IT Law, 2000. It is also observed that how the amendment to the Information Technology Act which entered into force in February 2009 with the presidential assent, has made a crucial impact in India in reference to the IT Laws, stated that information confidentiality constitutes as a part of our privacy right and stated that confidentiality included the right to preserve the personal identify. Jyotirmoy Banerjee | Pooja Banerjee "Critical Analysis of Technology Law in India with Reference to Foreign Mechanism" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-6 | Issue-3 , April 2022, URL: https://www.ijtsrd.com/papers/ijtsrd49462.pdf Paper URL: https://www.ijtsrd.com/humanities-and-the-arts/other/49462/critical-analysis-of-technology-law-in-india-with-reference-to-foreign-mechanism/jyotirmoy-banerjee
RTI India -Development factors and the loopholes in itSrikanth Kuthuru
This presentation includes the details about the development in india using RTI , the drawbacks of it and some suggestions for the improvement of the act.
Right to Information acts as a great tool to effect transparency and fix accountability on the concerned public authorities. We must understand how to file RTI to get empowered
Aadhaar and Personal Sensitive Information in the centralised database maintained by UIDAI is "Janamkundali" of an individual. It must be protected by Central Government like valuable Jewellery, diamond and white Gold.
RIGHT TO INFORMATION ACT 2005 ,FULL THEORY-MANPREET SINGH (B.COM)MANPREETSINGHPANESAR1
Right to information act 2005, all theory considered features ,merits ,demerits and functions etc.in briefly explained in this content . thanks for viewing this topic and do not forget to hit the like button ....
iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)ProductNation/iSPIRT
We believe that India is at a unique tipping point where only a fraction of its users have gone online, and a majority are yet to do so. Therefore, it is critical that we build the right set of protections and empowerments for these users as they enter the digital world.
It is equally important not to limit our thinking to simply “protection” of data. We must also question how we can “empower” individuals, who will be data rich before they are economically rich, with better access to their own healthcare data such that they can become more engaged participants and managers of their health care.
We welcome the proposed DISHA Act that seeks to Protect and Empower Individuals in regards to their electronic health data - we have provided our feedback on the DISHA Act and have also proposed technological approaches in this response
Data has emerged as one of the most important resources of today's world. However, there does not exist clear rules on how to make use of this resource. There are spillover effects and negative externalities in the form of privacy breaches while exploiting this resource. In such a situation, what should be the legal remedy?
The law should find a balance between the interests of the customers and the corporations. The customers want safety and privacy, whereas corporations want commercial use of data which risks the customer's interests.
What are the new laws under Canada Digital Privacy Act.pdfRiley Claire
The introduction of a new bill by the Canadian government indicates a significant overhaul of the country's privacy laws. Businesses in Canada are obligated to report data breaches affecting customers' personal information. All regulated Canadian businesses in the country's key industries—including banking, insurance, healthcare, and transportation—must abide by the Act's regulations or guiding principles. You may learn more about the new laws under the Canada Digital Privacy Act in this pdf.
Critical Analysis of Technology Law in India with Reference to Foreign Mechanismijtsrd
During the past few decades, we have witness some of the most exponential growth in our field of technology, whether it is a matter of law, social framework, economic or any other manner in which it has intersected various disciplines. Starting from the UN General Assembly Resolution leading to the approval of the Information Technology Act, further leading to the enactment of the Modern Electronic Trade Law. In reference to which we observed that how the right to privacy modified by the growth of information technology, and after which the technology has changed its contents for the protection of their legal interests. In this technologically evolved world, data is the new currency. As India, has no comprehensive data protection legislation and privacy legislation. The existing policies and laws are, in essence, sectoral in nature. These Sectoral Laws pertain to the IT Law, 2000. It is also observed that how the amendment to the Information Technology Act which entered into force in February 2009 with the presidential assent, has made a crucial impact in India in reference to the IT Laws, stated that information confidentiality constitutes as a part of our privacy right and stated that confidentiality included the right to preserve the personal identify. Jyotirmoy Banerjee | Pooja Banerjee "Critical Analysis of Technology Law in India with Reference to Foreign Mechanism" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-6 | Issue-3 , April 2022, URL: https://www.ijtsrd.com/papers/ijtsrd49462.pdf Paper URL: https://www.ijtsrd.com/humanities-and-the-arts/other/49462/critical-analysis-of-technology-law-in-india-with-reference-to-foreign-mechanism/jyotirmoy-banerjee
RTI India -Development factors and the loopholes in itSrikanth Kuthuru
This presentation includes the details about the development in india using RTI , the drawbacks of it and some suggestions for the improvement of the act.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
1. Fundamentals of Indian Constitution
Topic: Right to Privacy
CYCLE CHEMISTRY
BRANCH ELECTRONICS AND COMMUNICATION
Experiential Learning Phase 2
2. Team Introduction
Roll number USN Name Email ID
10 1RV22EC076 K Spoorthi kspoorthi.ec22@rvce.edu.in
26 1RV22EC092 Megha M K meghamk.ec22@rvce,edu,in
32 1RV22EC098 Mustafa Patwari mustafapatwari.ec22@rvce.edu.in
56 1RV22EC122 Raj Hingar rajhingar.ec222rvce.edu.in
3. Introduction
In today's world, where technology has become an integral part of our lives, the right
to privacy has become a crucial issue. Our personal information could be used against
us in ways we never imagined. The Indian Constitution recognizes the right to privacy
as a fundamental right, and it is essential that we understand its importance.
4. What is Right to Privacy?
• The right to privacy is a fundamental human right
that protects individuals from unwarranted
intrusion into their personal lives by the state,
corporations, or other entities
• It is enshrined in the Indian Constitution under
Article 21, which guarantees the right to life and
personal liberty
• It encompasses a broad range of interests, including
the right to be left alone, the right to control one's
personal information and the right to make
autonomous decisions about one's life without
interference from others
5. Historical Background
• The concept of right to privacy is not a new one. It has been
debated and discussed for centuries, with different cultures
and societies having their own views on the matter
• In India, the concept of privacy can be traced back to the
ancient texts of the Vedas and Upanishads, which
emphasize the importance of individual freedom and
dignity
• During the colonial era, the British government introduced
various laws that violated the privacy rights of Indian
citizens
• For example, the Bengal Regulation Act of 1818 allowed for
arbitrary arrests and searches without a warrant. This led to
widespread protests and demands for greater privacy
protections
6. Constitutional Provisions
• The right to privacy is not explicitly mentioned in the
Indian Constitution, but it has been interpreted by the
Supreme Court as a fundamental right under Article
21, which guarantees the right to life and personal
liberty
• In addition, Article 19(1)(a) guarantees the freedom of
speech and expression, which includes the right to
privacy. The court has also held that the right to
privacy is an integral part of the right to dignity, which
is protected under Article 21
7. Legal Framework
• In addition to this, there are several laws and
regulations that specifically protect an individual's
right to privacy. The Information Technology
(Reasonable Security Practices and Procedures and
Sensitive Personal Data or Information) Rules,
2011, and the Aadhaar Act, 2016, are two
examples of such laws
• The former governs the collection and storage of
sensitive personal data by companies, while the
latter regulates the use of Aadhaar, a unique
identification number issued by the government
8. Landmark Judgments
• Kharak Singh vs State of UP case: In this case, the Supreme Court of India
recognized that the right to privacy is a fundamental right, although it is not
explicitly mentioned in the Constitution. The court held that the right to privacy is
part of the right to life and personal liberty guaranteed under Article 21 of the
Constitution
• Puttaswamy judgment: In this case, the Supreme Court of India declared that the
right to privacy is a fundamental right under the Indian Constitution. The court held
that the right to privacy includes the right to control one's personal information,
the right to be left alone, and the right to bodily integrity
9. Landmark Judgments
• Aadhaar judgement, 2018: In this case, the Supreme Court declared that while Aadhaar
is constitutional, it cannot be made mandatory for certain services. This judgement was
significant as it addressed concerns related to privacy and data protection in the context
of Aadhaar, which is India's biometric identification system
10. Contemporary Issues
• Aadhaar, a biometric identification system :
One of the major contemporary issues related to the right to privacy in India is
the use of Aadhaar, a biometric identification system. While Aadhaar has been a
tool for improving access to government services and reducing fraud, concerns
have been raised about its potential misuse and violation of privacy rights. The
collection and storage of personal information, including biometric data, by
private companies and government agencies has raised questions about the
security and confidentiality of such data.
11. Contemporary Issues
• Surveillance technologies:
Another contemporary issue related to the right to privacy in India is the use of
surveillance technologies by the government. The widespread use of CCTV cameras,
facial recognition software, and other surveillance tools has led to concerns about the
infringement of privacy rights. The lack of clear guidelines and regulations regarding
the use of such technologies has further exacerbated these concerns.
12. Recently passed bills
• Personal Data Protection Bill :
In recent years, there have been several bills passed in India that aim to protect the
right to privacy of individuals. One such bill is the Personal Data Protection Bill,
which seeks to regulate the collection, storage, and processing of personal data by
both government and private entities. The bill also provides for the establishment
of a Data Protection Authority to oversee the implementation of these regulations.
13. Recently passed bills
• Right to Information (Amendment) Bill:
Another important bill is the Right to Information (Amendment) Bill, which has been
controversial as it allows the government to decide the tenure and salaries of
Information Commissioners. This could potentially undermine the independence of
the Information Commission, which is responsible for ensuring transparency and
accountability in government functioning. However, proponents of the bill argue that
it is necessary to balance the right to information with other fundamental rights.
14. Conclusion
• In conclusion, the right to privacy is a fundamental right enshrined in the Indian
Constitution. It is essential for protecting an individual's dignity and autonomy.
• The legal framework of right to privacy in India includes various laws and regulations
that protect this right. However, there are also challenges to this right, especially with
the advancement of technology
• In today's digital age, where personal data is being shared and collected on a massive
scale, it is more important than ever to protect the right to privacy. As responsible
citizens, we must be aware of our rights and take steps to safeguard them