DATA PRIVACY
DATA PRIVACY
DATA PRIVACY
INTRODUCTION
The term ‘Liberty’ as used in the Constitutional provisions connotes something more than mere
freedom from physical restraints or the chains of a prison. Charles Warren & Louis D.
Brandeis, while dealing with the concept of right to privacy though that law should provide
both a criminal and private law remedy to protect man’s ‘inviolate personality’ against the
intrusive behaviour of State. Once a civilization has made a distinction between the ‘outer’
and the ‘inner’ man, between the life of the soul and the life of the body, between the spiritual
and the material, between the sacred and the profane, between the realm of God and the realm
of Caesar, between Church and State, between rights inherent and inalienable and rights that
are in the power of government to give and take away between public and private, between
society and solitude, it becomes impossible to avoid the idea of privacy by whatever name it
may be called the idea of a private space in which man may become and remain himself
According to Black’s Law Dictionary ‘Right to Privacy’ means “right to be let alone; the right
of a person to be free from any unwarranted publicity; the right to live without any un-
warranted interference by the public in matters with which the public is not necessarily
concerned”. The right to privacy derives from an English Common Law maxim which asserts
that “Every man’s house is his castle”. Article 21 of the Con-situation of India states that “No
person shall be deprived of his life or personal liberty except according to procedure established
by law”. The spirit of law under Article 21 of constitution of India refers that the term ‘life’
includes all those aspects of life which go to make a man’s life meaningful, complete and worth
living. Right to Privacy, becomes a burning issues regarding to concerns raised against
government’s initiatives to collect personal data from citizens, is not a fundamental right
in the Constitution of India but privacy now seen as an ingredient of personal liberty.
Most definitions of privacy agree on a core concept that privacy is the claim of an individual
to determine what information about himself or herself should be known to others. This also
involves when such information will be communicated or obtained and others will make what
uses of it. In addition, many definitions of privacy would add a claim to privacy by social
groups and associations, and also a limited (largely temporary) right of privacy for
government bodies. The law of privacy is recognition of the individual’s right to be let alone
and to have his personal space inviolate. The need for privacy and its recognition as a right is
a modern phenomenon. It is the product of an increasingly individualistic society in which the
focus has shifted from society to the individual. In early times, the law afforded protection only
against physical interference with a person or his property. As civilization progressed, the
personal, intellectual and spiritual facets of the human personality gained recognition and the
scope of the law expanded to give protection to these needs.
The essence of the law derives from a right to privacy, defined broadly as “the right to be let
alone.” It usually excludes personal matters or activities which may reasonably be of public
interest, like those of celebrities or participants in newsworthy events. Invasion of the right to
privacy can be the basis for a lawsuit for damages against the person or entity violating the
right.
Information privacy is the right to have some control over how your personal information is
collected and used. With speed-of-light technological innovation, information privacy is
becoming more complex by the minute as more data is being collected and exchanged. As the
technology gets more sophisticated (indeed, invasive), so do the uses of data. And that leaves
organizations facing an incredibly complex risk matrix for ensuring that personal information
is protected. As a result, privacy has fast-emerged as perhaps the most significant consumer
protection issue—if not citizen protection issue—in the global information economy
According to Justice Krishna Iyer, “Personal liberty makes for the worth of human
person”. Hence, the notion of dignity and liberty are not independent of privacy.
The concept of Privacy is not at all new and it does not need any; it just needs a legal
recognition as it is as old as common law and is basically a result of the common laws. It is
so deeply embedded with liberty and dignity of an individual that it cannot be denied the
status of a fundamental right. In the words of the Jurists like Arthur Miller it is difficult to
define privacy because it is ephemeral. Whereas Jurists Aristotle and William Blackstone
while trying to define privacy go on to differentiate between private wrong and public
wrong. Public wrong means wrong against the society and private wrong means wrong
against the individual. The Greeks were the first to recognize the relationship between an
individual and a State and also gave an overview that how the relationship between the two
is shaped. Privacy is such a right which is inalienable from the personality of the human
beings and it primarily forms a part of the basic Human right. Right to privacy is a right
which an individual possesses by birth. Privacy simply means the right of an individual to
be left alone which is recognized by the common law.
It is essentially important to consider the other view as well and according to this view right
to privacy is considered to be a natural right and such rights are those divine rights which
are considered supreme to all other rights. The social contract theorists like John Locke in
his book titled “Two Treatises on Civil Government” sowed the seeds of “right to privacy”
by advocating the theory of natural rights which according to him were inviolable and
inalienable. Thus, privacy finds its origin in the natural law theories.
The right to privacy emerges primarily from Article 21 of the Indian Constitution which
states that “No person shall be deprived of his life or personal liberty except according to
the procedure established by law”. The Constitution of India does not specifically
recognize ‘right to privacy’ as a fundamental right, it is, however, implicit in the provisions
of Article 21 of the Constitution of India as is now evident from judicial pronouncements
discussed here. The following are the series of judicial decisions where the term privacy
has been dealt with time and again by the courts. With these judicial decisions, the birth of
'Right to privacy' as a Fundamental Right can be traced.
Whether the ‘right to privacy’ is a fundamental right was first considered by the Hon’ble
Supreme Court in the case of M. P. Sharma and Ors. v Satish Chandra, District
Magistrate, Delhi and Ors.4, wherein the warrant issued for search and seizure under
Sections 94 and 96 (1) of the Code of Criminal Procedure was challenged. The Hon’ble
Supreme Court had held that the power of search and seizure was not in contravention of
any constitutional provision. Further, the Hon’ble Supreme Court refrained from giving
recognition to the right to privacy as a fundamental right guaranteed by the Constitution of
India by observing as under
17. A power of search and seizure is in any system of power of the State for the protection
of social security and that power is necessarily regulated by law. When the constitution makers
have thought fit not to subject such regulation to constitutional limitations by recognition of a
fundamental right to privacy, analogous to the Fourth Amendment, we have no justification to
import it, into a totally different fundamental right, by some process of strained
construction. Nor is it legitimate to assume that the constitutional protection under Article
20(3) would be defeatedby the statutory provisions for searches.”
Thereafter, in the case of Kharak Singh v State of Uttar Pradesh and Ors., the matter
considered by the Hon’ble Supreme Court was, whether the surveillance by domiciliary
visits at night against an accused would be an abuse of the right guaranteed under Article 21
of the Constitution of India, thus raising the question as to whether Article 21 was
inclusive of the right to privacy. The Hon’ble Supreme Court held that such surveillance
was, in fact, in contravention of Article 21. The majority judges further went on to hold
Article 21 does not expressly provide for a privacy provision, and thus the right to privacy
could not be construed as a fundamental right.
Subsequently, in the case of Gobind v State of M.P.,6 the right of the police to make
domiciliary surveillance was challenged to be inconsistent with the right to privacy
embodied under Article 21 of the Constitution of India. The Hon’ble Supreme Court held
that the police regulations were not in compliance with the essence of personal freedom and
also accepted the right to privacy as a fundamental right guaranteed by the Constitution of
India but favoured the evolution of the right to privacy on case to case basis and negated it
to be absolute in nature. The Hon’ble Supreme Court observed as under:-
4. Cloud Computing
a. Benefits and Risks
Cloud computing enables scalable data storage and processing, making it indispensable for
businesses and governments. However, it introduces privacy risks:
• Jurisdictional Ambiguities: Data stored on cloud servers often crosses national
borders, complicating jurisdictional claims and regulatory oversight.
• Data Breaches: High-profile breaches, such as the 2021 Facebook data leak,
underscore the vulnerabilities of cloud-based systems.
b. Indian Context
The IT Act provides limited guidance on cross-border data transfers, leaving businesses
reliant on internal policies or contractual agreements. The proposed Data Protection Bill aims
to address this gap but remains in draft form.
c. Comparative Frameworks
• GDPR: Mandates strict data transfer protocols, including adequacy decisions for non-
EU countries.
• United States: The CLOUD Act facilitates law enforcement access to data stored on
U.S.-based servers, raising concerns about extraterritorial reach.
6. IT-IP Interface
The intersection of information technology (IT) and intellectual property (IP) raises unique
challenges in protecting privacy. For instance, companies often use copyright and patent
protections to withhold transparency about their data practices. Reforms in IP laws are
necessary to balance innovation with accountability.
Data privacy is not just a technical or legal issue but a fundamental human right intricately
linked to dignity, autonomy, and security. The challenges posed by COVID-19, IoT, AI, and
other emerging technologies underscore the urgency of robust legislative reforms and global
collaboration. By adopting comprehensive frameworks and fostering public awareness, India
can pave the way for a secure digital future.
HEALTH AND DATA PRIVACY
"The duty of confidentiality in healthcare is not just about protecting data—it is about
preserving the trust that is the cornerstone of the doctor-patient relationship."
— Dr. Deborah Peel, Founder of Patient Privacy Rights
The intersection of data privacy and the health sector has gained significant prominence in
the digital era, particularly during the COVID-19 pandemic. The healthcare sector's reliance
on sensitive personal data, coupled with the urgency to mitigate global health crises, has
amplified concerns regarding the ethical, legal, and policy frameworks for data protection.
Sensitive health information, including Electronic Health Records (EHRs), telemedicine
data, and vaccination records, represents an invaluable resource for healthcare advancements
while simultaneously necessitating stringent privacy safeguards.
Data protection laws globally, such as the General Data Protection Regulation (GDPR) in
the EU and the Health Insurance Portability and Accountability Act (HIPAA) in the US,
emphasize balancing privacy with public health needs. In India, emerging legislation like the
Digital Personal Data Protection Bill (DPDP) and earlier frameworks like DISHA reflect
ongoing efforts to safeguard health data. However, incidents like the 2022 ransomware
attack on AIIMS, which exposed millions of patient records to unauthorized access,
highlight the critical need for robust data protection frameworks in the healthcare sector.
Such breaches underscore the delicate balance between leveraging digital innovation and
safeguarding individual privacy
The legal frameworks governing health data in India are characterized by a mix of sector-
specific regulations, general data protection laws, and guidelines issued by various
authorities. However, the lack of a comprehensive and unified health data protection law has
led to fragmented governance, raising significant concerns about data privacy and security.
This section explores the historical and contemporary legal landscape of health data
protection in India, highlighting existing laws, their limitations, and evolving frameworks.
Historical Context and the Evolution of Health Data Governance in India
The governance of health data in India has undergone a significant transformation, evolving
from a reliance on physical records and ethical codes to grappling with the complexities of
digital health platforms and electronic medical records (EMRs). While the foundations of
health data protection were laid through professional ethical guidelines like the Indian
Medical Council (Professional Conduct, Etiquette, and Ethics) Regulations, 2002 (IMC
Code), technological advancements have necessitated legal and policy frameworks to address
new challenges, including data breaches, misuse of sensitive information, and the increasing
vulnerability of digital healthcare systems.
The evolution of health data governance reflects the interplay between ethical principles,
legal frameworks, and the growing reliance on technology in healthcare delivery. This
development has been shaped by landmark judgments, policy initiatives, and global
influences, all of which have highlighted the critical importance of safeguarding patient data
while enabling innovation in healthcare.
The IMC Code, 2002, introduced by the Medical Council of India (now succeeded by the
National Medical Commission), provided the initial regulatory framework for the handling of
patient data. The code emphasized the following:
1. Physician-Patient Confidentiality:
Physicians are ethically obligated to maintain the confidentiality of their patients’
medical information. Clause 7.14 of the IMC Code specifically states:
“The registered medical practitioner shall not disclose the secrets of a patient
that have been learned in the exercise of his/her profession.”
2. Permitted Exceptions:
Confidentiality could be breached only under specific circumstances, such as when
required by a court of law, for public health emergencies, or when disclosure is in the
patient’s best interest.
While these ethical principles provided a solid foundation, they lacked enforceability and did
not account for the complexities introduced by digitalization.
Shift Toward Digitalization: Emergence of EMRs and the EHR Standards, 2016
The transition from physical to digital records marked a turning point in health data
governance in India. The adoption of Electronic Medical Records (EMRs) and Electronic
Health Records (EHRs) brought unprecedented efficiency to healthcare delivery but also
exposed significant vulnerabilities in terms of data privacy and security.
1. Electronic Health Record (EHR) Standards, 2016:
To address the challenges of standardizing and securing digital health records, the
Ministry of Health and Family Welfare introduced the EHR Standards, 2016. These
standards aimed to:
o Establish interoperability between healthcare providers.
o Ensure the security and confidentiality of patient data.
o Define protocols for the collection, storage, and sharing of health information.
2. Limitations and Gaps in the EHR Standards:
Despite its forward-looking provisions, the implementation of the EHR Standards
remains voluntary, limiting its impact. Scholars have criticized the standards for their
lack of enforceability and the absence of penalties for non-compliance.
Justice D.Y. Chandrachud, in the landmark judgment of Justice K.S. Puttaswamy v.
Union of India (2017), observed:
The growing reliance on digital healthcare platforms, telemedicine, and mobile health
applications has exposed several vulnerabilities in India’s health data governance framework:
India’s evolving framework has been influenced by international practices and standards,
particularly:
Legal scholars and healthcare experts have offered critical insights into the evolution and
challenges of health data governance in India:
1. Gautam Bhatia:
In his analysis of the Puttaswamy judgment, Bhatia argued that the recognition of
privacy as a fundamental right imposes a constitutional duty on the state to enact
comprehensive data protection laws, particularly in sectors like healthcare where the
risks of misuse are high.
2. Usha Ramanathan:
Ramanathan, a leading voice on data privacy in India, has criticized the government’s
approach to digital health for prioritizing technological adoption over privacy
safeguards. She notes that:
India's journey toward a robust health data protection framework has been characterized by
fragmented and evolving legislative efforts. As digital health technologies become integral to
healthcare delivery, the legal framework must balance innovation with the rights and privacy
of individuals. Proposed frameworks like the Digital Information Security in Healthcare Act
(DISHA) and the Digital Personal Data Protection (DPDP) Bill reflect attempts to address
these challenges, but significant gaps persist.
The Digital Information Security in Healthcare Act (DISHA) was a significant attempt to
create a specialized legal framework for protecting health data. DISHA proposed a
groundbreaking shift by recognizing individuals as the owners of their health data, while
healthcare establishments were to act as custodians. This ownership model empowered
patients by granting them control over their data, including the ability to withdraw consent
for its use or transfer. DISHA also envisioned a robust consent framework, emphasizing that
individuals must be informed whenever their health data was accessed or transferred.
Additionally, it included provisions for stringent penalties in cases of non-compliance or
breaches, ensuring accountability for stakeholders involved in health data processing.
Despite its promising features, DISHA was eventually subsumed under broader data
protection frameworks, specifically the Personal Data Protection Bill, 2019. This shift diluted
DISHA's health-specific focus, relegating the nuanced needs of health data protection to a
more generalized regulatory framework. The absence of a dedicated health data law remains
a critical challenge, as health data carries unique sensitivities that warrant specialized
treatment.
The Digital Personal Data Protection (DPDP) Bill, 2023, represents India’s most recent
legislative effort to address data protection comprehensively. While it introduces general data
protection principles, its provisions for health data are less defined compared to DISHA. One
of the most contentious aspects of the DPDP Bill is the concept of "deemed consent," which
allows data processing without explicit consent in scenarios deemed necessary, such as public
health emergencies. This provision, though practical in exigent circumstances, risks
undermining individual autonomy and could be prone to misuse.
Additionally, the DPDP Bill eliminates the earlier category of "sensitive personal data,"
which previously included health data. This omission raises concerns about the adequacy of
protections for such data, especially when considered alongside the increasing volume and
sensitivity of health information being processed digitally. The DPDP Bill’s focus on a
unified framework, while valuable for standardization, may overlook the distinct
requirements of sectors like healthcare, where stricter consent and security measures are
essential.
It is evident that the lack of a specific legislative focus on health data undercuts efforts to
address the sector’s unique challenges. There is a pressing need for India to revisit and
strengthen its legal framework to ensure that health data protection is not an afterthought but
a central concern.
In the absence of a unified legal framework, sector-specific guidelines and standards have
played a critical role in shaping health data governance in India. These regulations, while
valuable, often lack enforceability or comprehensive coverage, leading to a fragmented
approach to health data protection.
The Telemedicine Practice Guidelines, 2020, introduced during the COVID-19 pandemic,
were a pivotal step in regulating remote healthcare delivery. These guidelines underscored
the importance of patient confidentiality, data security, and informed consent in telemedicine
consultations. By requiring healthcare providers to use secure communication channels and
maintain encrypted records, the guidelines aimed to address the growing reliance on digital
platforms for healthcare delivery. However, enforcement challenges and the lack of specific
penalties for non-compliance have limited their impact. Furthermore, the guidelines do not
adequately address the cross-border use of telemedicine, a critical gap in an increasingly
globalized digital healthcare ecosystem.
The National Digital Health Mission (NDHM) and its accompanying Health Data
Management Policy represent a more holistic approach to digital healthcare. The NDHM
aims to create an integrated digital health ecosystem by issuing unique health IDs to
individuals and linking their health records across providers. The Health Data Management
Policy further outlines principles of consent, interoperability, and data security, aiming to
empower patients while promoting efficient healthcare delivery. Despite its forward-looking
objectives, the centralized storage and potential vulnerabilities of such a large-scale digital
system have sparked concerns about data breaches and misuse. Additionally, the policy’s
voluntary nature limits its enforceability, particularly among smaller healthcare providers.
India's fragmented and evolving approach to health data protection contrasts starkly with
more established frameworks in other jurisdictions. Examining global best practices offers
valuable insights into the strengths and weaknesses of India’s current legal and regulatory
landscape.
The General Data Protection Regulation (GDPR) of the European Union is often cited as
the gold standard for data protection. Under the GDPR, health data is classified as a special
category of personal data, warranting enhanced protections. Article 9 of the GDPR explicitly
restricts the processing of health data, allowing it only under specific conditions, such as
explicit consent, legal obligations, or public health needs. The GDPR also grants individuals
robust rights, including the right to access, rectify, and erase their data. These provisions
ensure a high level of transparency and control for data subjects while imposing strict
accountability measures on data controllers. For India, the GDPR’s emphasis on informed
consent and clear limitations on data processing offers a blueprint for creating sector-specific
safeguards for health data.
In the United States, the Health Insurance Portability and Accountability Act (HIPAA)
governs health data protection. HIPAA requires healthcare providers, insurers, and other
covered entities to implement stringent administrative, physical, and technical safeguards for
electronic health information. The Act also mandates regular risk assessments and audits,
ensuring compliance with data security standards. A notable feature of HIPAA is its focus
on penalties for violations, which acts as a strong deterrent against non-compliance. For
India, adopting similar enforcement mechanisms could enhance the effectiveness of its health
data protection efforts.
Singapore’s National Electronic Health Record (NEHR) system provides another
compelling example of a centralized approach to health data management. The NEHR system
ensures that patients’ health records are accessible across public and private healthcare
institutions, facilitating seamless care. It incorporates robust encryption and access controls,
allowing patients to determine who can access their data. This emphasis on patient
empowerment and data interoperability aligns closely with the objectives of India’s NDHM,
offering a practical model for implementation.
India can draw several lessons from these international frameworks. First, it must prioritize
health data as a distinct and sensitive category, requiring higher levels of protection.
Second, enforcement mechanisms must be strengthened, with clear penalties for non-
compliance. Finally, patient empowerment should be central to any legal framework,
ensuring that individuals retain control over their health information.
Conclusion
The COVID-19 pandemic underscored the importance of robust data privacy frameworks,
particularly during health emergencies. India’s experiences highlighted significant gaps in its
legal and ethical protections for health data. Moving forward, India must prioritize the
enactment of a comprehensive health data protection law that balances public health
objectives with individual rights. By learning from global best practices and strengthening its
regulatory framework, India can build a resilient system capable of addressing future
pandemics while upholding data privacy and trust.
‘
IRAC Analysis of Justice K.S. Puttaswamy v. Union of India (2017)
Introduction to IRAC Framework
The IRAC method—Issue, Rule, Application, and Conclusion—provides a structured
approach to analyzing legal cases. This framework is particularly suited to dissecting the
Justice K.S. Puttaswamy v. Union of India (2017) case, a landmark judgment that recognized
privacy as a fundamental right under the Indian Constitution. The case marked a turning point
in Indian constitutional jurisprudence and catalyzed significant legal, social, and political
developments. The judgment not only acknowledged the fundamental right to privacy but
also shaped the discourse on the Aadhaar Act and its implications for informational privacy.
This analysis examines the Aadhaar Act, its legislative intent, the judicial reasoning, and the
diverse views of the judges in the Puttaswamy case. The case’s impact, criticism, and the
evolving understanding of privacy are explored through the lens of the IRAC method.
Issue
The central issue before the Supreme Court in Justice K.S. Puttaswamy v. Union of India was
whether the right to privacy is a fundamental right under the Indian Constitution. The
petitioners argued that the mandatory collection of biometric data under the Aadhaar project
violated the constitutional right to privacy.
1. Primary Issue:
Is the right to privacy a fundamental right under the Constitution, and if so, to what
extent can it be restricted by the state for purposes such as welfare schemes and
national security?
2. Sub-Issues:
o Whether the Aadhaar project, which involves the collection of biometric data,
is unconstitutional due to privacy concerns.
o Whether the imposition of privacy restrictions can be justified under the
proportionality test.
o Whether informational privacy should be included as a part of the right to
privacy.
The judgment had far-reaching implications not only for the Aadhaar project but also for the
scope of privacy rights under the Indian Constitution.
Rule
The legal principles considered by the Court were derived from various constitutional
provisions, precedents, and doctrines of privacy law.
Constitutional Provisions
1. Article 14: Right to Equality—ensures protection from arbitrary state actions.
2. Article 19: Right to Freedom—encompasses freedom of expression and autonomy in
personal choices.
3. Article 21: Right to Life and Personal Liberty—interpreted broadly to include the
right to live with dignity.
Key Precedents
The Court had to reconsider previous decisions that denied privacy as a fundamental right.
The cases of M.P. Sharma v. Satish Chandra (1954) and Kharak Singh v. State of Uttar
Pradesh (1962) had earlier held that privacy was not a fundamental right. The Puttaswamy
Bench, however, took a fresh approach, overturning these precedents and asserting the
constitutional importance of privacy.
The Court also referenced international jurisprudence, notably:
• Universal Declaration of Human Rights (UDHR): Article 12 protects the right to
privacy.
• International Covenant on Civil and Political Rights (ICCPR): Article 17
safeguards privacy against arbitrary interference.
Doctrines Applied
The proportionality test was applied to assess the constitutionality of privacy restrictions.
According to this test, any limitation on a fundamental right must satisfy the following:
1. Legality: The restriction must be backed by a law.
2. Necessity: The restriction must pursue a legitimate state aim.
3. Proportionality: The restriction must be necessary and proportionate to achieving the
aim.
Application
The application of legal principles by the Court in the Puttaswamy case was methodical and
significant. The judgment acknowledged the evolving nature of privacy, especially in the
digital age, and emphasized the need to balance state interests with individual freedoms.
1. Recognition of Privacy as a Fundamental Right
The Supreme Court’s most groundbreaking finding was the recognition of privacy as a
fundamental right under Articles\ 14, 19, and 21. Justice D.Y. Chandrachud, delivering the
majority opinion, stated:
“Privacy is the constitutional core of human dignity. It is inextricably linked to individual
autonomy and the right to make choices free from state interference.”
The Court concluded that privacy is not an isolated right but a part of the fabric of personal
dignity and autonomy that underpins the right to life and personal liberty guaranteed under
Article 21. This decision overruled previous judgments, particularly M.P. Sharma and
Kharak Singh, which had held that privacy was not a fundamental right.
2. Informational Privacy
One of the most significant aspects of the judgment was the recognition of informational
privacy as an integral part of the right to privacy. The Court held that individuals have the
right to control their personal data and its dissemination. Justice Kaul noted:
“The digital age necessitates stronger safeguards to protect informational privacy, given the
unprecedented scale of data collection and the potential for misuse.”
The Court articulated that individuals must have the ability to control who accesses their
personal information, how it is used, and how long it is retained. This was particularly
relevant to the Aadhaar scheme, which collected biometric data for identification purposes.
nalysis of the IT Act, 2000, Sections 43A and 72A on Data Protection, RTGS, NEFT,
and Payment & Settlement Act, and Online ADR Mechanisms
Introduction
The Information Technology Act, 2000 (IT Act) was India's first step toward formalizing
electronic commerce and digital communication in the country. It aimed to provide legal
recognition to electronic contracts, transactions, and digital signatures, alongside addressing
cybercrimes and data security issues. The Act also includes provisions for data protection
through Sections 43A and 72A, which are particularly relevant in the context of privacy and
security of personal data. However, as technology has evolved, new challenges related to
privacy, cybersecurity, and the digital financial system have emerged. Additionally, as the
digital economy has expanded, mechanisms like RTGS, NEFT, and Payment & Settlement
Act have become crucial for secure digital financial transactions. With the growing reliance
on technology, particularly during the pandemic, the need for robust online dispute resolution
(ODR) mechanisms has also come to the forefront.
This analysis explores Section 43A and Section 72A of the IT Act with respect to data
protection, the role of RTGS, NEFT, and the Payment & Settlement Act in securing digital
financial transactions, and the challenges in identity verification in the context of Online
ADR Mechanisms.
RTGS, NEFT, and the Payment & Settlement Act: Securing Digital Transactions
The Reserve Bank of India’s (RBI) RTGS (Real-Time Gross Settlement) and NEFT
(National Electronic Funds Transfer) systems, along with the Payment and Settlement
Systems Act, 2007, are the backbone of digital financial transactions in India. They are
designed to facilitate secure and reliable financial transfers in real time.
Link to the IT Act for Secure Digital Transactions
The IT Act, 2000, serves as a foundation for ensuring the legality and security of digital
financial transactions in India. Sections of the IT Act apply to electronic records, electronic
signatures, and the legal validity of electronic contracts, which are crucial for the functioning
of RTGS, NEFT, and other financial systems.
The Role of the IT Act in Securing Digital Transactions:
• Section 3 of the IT Act recognizes electronic contracts and signatures, giving legal
standing to digital transactions.
• Section 43 of the IT Act deals with penalties for hacking and unauthorized access,
which directly relates to securing online financial transactions against cybercrimes.
• The Payment and Settlement Systems Act, 2007, along with RBI guidelines,
provides regulatory frameworks that ensure secure and fraud-resistant systems for
electronic payment.
The Convention aims to harmonize national laws related to cybercrime, foster international
cooperation among law enforcement agencies, and establish procedural tools to address the
unique challenges posed by crimes in cyberspace. It stands as a critical framework for tackling
issues arising from the global and decentralized nature of the internet, which often complicates
traditional law enforcement methods. By providing a structured mechanism for cooperation,
the Budapest Convention addresses the difficulties associated with accessing data across
borders, ensuring that crimes committed online can be investigated and prosecuted effectively.
In today’s digitized world, where an increasing volume of information is stored electronically,
the Convention’s relevance has grown exponentially. The interconnectedness of modern
societies and the borderless nature of cyberspace mean that cybercrimes frequently have
international dimensions. As a result, the Budapest Convention is vital not only for addressing
crimes with an inherently transnational character, such as hacking and cyber fraud, but also for
investigating domestic crimes where digital evidence may be located in another jurisdiction.
Procedural Measures
The Budapest Convention introduces procedural tools to enhance the capacity of law
enforcement agencies to investigate and prosecute cybercrime effectively. These measures are
framed to balance efficiency with respect for individual rights:
1. Expedited Preservation of Stored Data (Article 16)
o This measure ensures that critical evidence is preserved before it can be altered
or deleted. Preservation orders are time-limited and must be followed by formal
MLA requests.
2. Preservation and Disclosure of Traffic Data (Article 17)
o This provision applies specifically to traffic data, such as the origin and
destination of communications, which is crucial for tracing cybercrimes like
ransomware attacks.
3. Search and Seizure of Computer Data (Article 19)
o Law enforcement authorities are empowered to search and seize data stored in
computer systems, subject to judicial oversight. This includes accessing cloud-
based data and networks.
4. Real-Time Collection of Traffic Data (Article 20)
o Allows for the monitoring of traffic data in real time, a critical tool for tracking
ongoing cyberattacks or identifying malicious actors.
o Example: Monitoring the source of a live ransomware operation.
5. Interception of Content Data (Article 21)
o Permits the interception of communications content during investigations, such
as emails or voice calls, provided legal safeguards are in place.
6. Production Orders (Article 18)
o Enables authorities to compel individuals or service providers to produce stored
data, including subscriber information and user logs.
7. 24/7 Network for Immediate Assistance (Article 35)
o Member states are required to designate a point of contact available 24/7 to
facilitate rapid assistance in cybercrime investigations. This ensures timely
responses to cross-border threats.
These procedural powers are complemented by safeguards to prevent abuse, ensuring
compliance with domestic laws and international human rights standards.
Despite its role as a pivotal international framework for addressing cybercrime, the Budapest
Convention faces several significant challenges and criticisms. These issues, rooted in
sovereignty, inefficiencies, and evolving technological landscapes, highlight areas where the
treaty requires improvement.
1. Sovereignty Concerns
One of the most controversial provisions of the Budapest Convention is Article 32(b), which
allows for transborder access to data without the explicit consent of the state where the data is
located. This provision permits law enforcement agencies to access publicly available data or
data with the voluntary consent of the individual who has lawful authority over it, even if the
data resides in another jurisdiction.
Critics argue that this undermines the sovereignty of states by allowing foreign authorities to
bypass local governments and legal systems. Developing nations, in particular, view this as a
mechanism favoring technologically advanced countries, where most major service providers
are headquartered. For example, India has raised concerns that such provisions could be
exploited to access sensitive data stored within its borders without adequate oversight.
Additionally, while Article 32(b) was intended to streamline investigations, it creates
ambiguities regarding the boundaries of "voluntary consent" and what constitutes lawful
authority, further complicating its implementation.
5. Challenges in Implementation
Even among signatory states, implementation remains inconsistent. Developing nations often
face resource constraints, including the lack of technical expertise, infrastructure, and trained
personnel, making it difficult to enforce the Convention’s provisions effectively. Moreover,
disparities in the legal and regulatory frameworks of member states can hinder seamless
cooperation.
Impact and Future Directions
The Budapest Convention’s impact on international cybercrime regulation is undeniable, yet
its future effectiveness depends on addressing its limitations and evolving to meet new
challenges.
1. Impact on Cybercrime Regulation
The Convention has played a pivotal role in fostering global cooperation and setting a standard
for cybercrime legislation. Key impacts include:
• Harmonization of Laws: The Convention has encouraged countries to align their
cybercrime laws, reducing legal inconsistencies and improving the efficiency of cross-
border investigations.
• International Cooperation: Mechanisms for MLA, extradition, and real-time data
sharing have facilitated greater collaboration among member states.
• Strengthening Procedural Tools: The Convention’s provisions for data preservation,
search and seizure, and real-time monitoring have enhanced the investigative
capabilities of law enforcement agencies.
For example, the 24/7 network established under Article 35 has significantly improved the
speed and efficiency of international cooperation in urgent cases.
4. Expanding Inclusivity
To enhance its global reach and effectiveness, the Budapest Convention must encourage
broader participation from non-signatory states. This could involve:
• Addressing Sovereignty Concerns: Reassess contentious provisions like Article 32(b)
to provide clearer safeguards for state sovereignty.
• Engaging Stakeholders: Include non-signatory states in discussions on future
amendments to the Convention, fostering a sense of ownership and inclusivity.
• Promoting a UN-Led Framework: Consider complementary global frameworks under
the United Nations to ensure broader adoption and equitable participation.
Conclusion
The Budapest Convention has set the foundation for international collaboration in combating
cybercrime, harmonizing laws, and providing critical procedural tools. However, its limitations
in addressing sovereignty concerns, inefficiencies in mutual legal assistance, and emerging
technological challenges highlight the need for reform.
Future success lies in adapting the Convention to the evolving digital landscape, ensuring
inclusivity, and fostering trust among member and non-member states alike. By addressing
these issues, the Budapest Convention can solidify its role as the cornerstone of international
efforts to secure cyberspace against the ever-growing threat of cybercrime.
Conclusion
The Budapest Convention has laid the foundation for international cooperation in combating
cybercrime. While it is not without limitations, its provisions for harmonization, procedural
tools, and international collaboration have significantly strengthened the global fight against
cyber threats. As technology evolves, the Convention must adapt to ensure it remains a relevant
and effective instrument in securing the digital ecosystem.
• BUDEPEST CONVENTION
• 66-72 TO DO AGAIN
• 79 FINAL REVISION
• RIGHT TO PRIVACY REVISION ONLY
• DIGITAL SIGNATURE
REVISION
Sections 66 to 66F of the Information Technology Act, 2000 (IT Act) outline criminal
offenses relating to the misuse of computers, digital systems, and networks. They
introduce criminal liability for acts involving fraud, identity theft, privacy violations,
and cyber terrorism, emphasizing mens rea (criminal intent). Below is a
comprehensive explanation of these sections, with detailed legal provisions,
conditions, case laws, and comparisons.
Provision Text:
"If any person, dishonestly or fraudulently, does any act referred to in Section 43, he
shall be punishable with imprisonment for a term which may extend to three years or
with a fine which may extend to five lakh rupees or with both."
Key Elements:
Case Law:
Penalty:
Illustrations:
Provision Text:
"Whoever dishonestly receives or retains any stolen computer resource or
communication device, knowing or having reason to believe it to be stolen, shall be
punished with imprisonment for a term which may extend to three years or with fine
which may extend to one lakh rupees or with both."
Key Elements:
1. Dishonesty:
o Requires that the recipient knows or has reason to believe the resource
is stolen.
oMirrors Section 411, IPC (dishonestly receiving stolen property), but
tailored for digital resources.
2. Scope:
o Covers all types of computer resources, including hardware (e.g., stolen
laptops) and digital data (e.g., databases).
Practical Application:
Penalty:
Provision Text:
"Whoever, fraudulently or dishonestly, makes use of the electronic signature,
password, or any other unique identification feature of any other person shall be
punished with imprisonment for a term which may extend to three years and fine
which may extend to one lakh rupees."
Key Elements:
Case Law:
• Sanjay Jha v. State of Chhattisgarh:
o The accused used stolen credentials to generate false financial
documents, violating Section 66C.
Penalty:
Illustration:
Challenges:
Provision Text:
"Whoever, by means of any communication device or computer resource, cheats by
personation shall be punished with imprisonment for a term which may extend to
three years and with fine which may extend to one lakh rupees."
Key Elements:
Penalty:
Illustration:
• A person creating a fake bank website to deceive users into providing their
login credentials is liable under Section 66D.
Provision Text:
"Whoever intentionally or knowingly captures, publishes, or transmits the image of a
private area of any person without consent under circumstances violating their
privacy shall be punished with imprisonment for up to three years or a fine not
exceeding two lakh rupees, or both."
Key Elements:
1. Scope of Privacy:
o Protects against unauthorized photography, recording, or sharing of
intimate images.
o “Private area” includes parts of the body covered by clothing in public
or private spaces.
2. Circumstances Violating Privacy:
o Unauthorized images captured in restrooms, trial rooms, or private
residences.
Judicial Perspective:
• Court on Its Own Motion v. State:
o Observed that unauthorized recordings for sting operations could
violate Section 66E.
Penalty:
International Comparison:
• Mirrors the U.S. Video Voyeurism Prevention Act, 2004, which similarly
criminalizes voyeuristic acts.
Provision Text:
"Whoever commits or conspires to commit cyber terrorism shall be punishable with
imprisonment for life."
Key Elements:
Penalty:
Illustration: