THE LAW OF RIGHT TO PRIVACY IN INDIA: PROTECTING PRIVACY IN THE DIGITAL ERA: CHALLENGES

Authors

  • Davesh Grover Research Scholar, MVN University, Palwal Haryana
  • Dr. Ramveer Singh Associate Professor, MVN University, Palwal Haryana

DOI:

https://doi.org/10.29121/shodhkosh.v5.i1.2024.3498

Keywords:

Digital Privacy, India, Reforms, Human Rights

Abstract [English]

The digital revolution has transformed India's socio-economic landscape but also compromised citizens' right to privacy. This research examines the challenges and vulnerabilities in India's existing legal framework, markedly in the perspective of digital technologies. It analyzes the constitutional and statutory provisions, judicial decisions, and international human rights instruments to identify gaps and propose reforms.
This research aims to address these concerns by examining the challenges and vulnerabilities in India's existing legal framework, specifically from the perspective of digital technologies. The study will analyze constitutional and statutory provisions, judicial decisions, and international human rights instruments to identify gaps and propose reforms. The rapid growth of digital technologies in India has led to a critical need for robust digital privacy protections. This research undertakes a comprehensive examination of the challenges and vulnerabilities in India's existing legal framework, highlighting the gaps and inconsistencies that compromise citizens' right to privacy. By analyzing constitutional and statutory provisions, judicial decisions, and international human rights instruments, this study identifies key areas for reform and proposes concrete recommendations to strengthen India's digital privacy landscape. The objective is to strengthen India's privacy laws, ensuring citizens' digital privacy is safeguarded. By finding areas for improvement and recommending reforms, this research contributes to the ongoing debate on privacy in India. This research endeavors to inform policy reforms and corrective actions, enhancing the protection of citizens' digital privacy in India

References

E. J. Bloustein, N. J. Pallone, Individual and Group Privacy, Routledge, New York, 2017. DOI: https://doi.org/10.4324/9781351319966

M. Oostveen, U. Irion, The golden age of personal data: How to regulate an enabling fundamental right?, in Personal Data in Competition, Consumer Protection and Intellectual Property Law (eds. M. Bakhoum, B. Conde Gallego, M. O. Mackenrodt, G. Surblytė-Namavičienė), Springer, (2018), 7-26. Available from: https://link.springer.com/chapter/10.1007/978-3-662-57646-5_2.

R. Romansky, A survey of digital world opportunities and challenges for user's privacy, Int. J. Inform. Technol. Secur., 9 (2017), 97-112.

Regulation (EU) 2916/679 of the European Parliament and the council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protect Regulation), European Commission, 2016. Available from: https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=celex%3A32016R0679.

J. J. Hanus, H. G. Relyea, A policy assessment of the privacy act of 1974, Am. Univ. Law Rev., 25 (1976), 555. DOI: https://doi.org/10.2307/1371980

M. Shabani, P. Borry, Rules for processing genetic data for research purposes in view of the new EU general data protection regulation, Eur. J. Human Genet., 26 (2018), 149-156. DOI: https://doi.org/10.1038/s41431-017-0045-7

A. V. Tsaregorodtsev, O. Ja. Kravets, O. N. Choporov, A. N. Zelenina, Information security risk estimation for cloud infrastructure, Int. J. Inform. Technol. Secur., 10 (2018), 67-76.

O. Yu. Zaslavskaya, l. A. Zaslavskiy, V. E. Bolnokin, O. Ja. Kravets, Features of ensuring information security when using cloud technologies in educational institutions, Int. J. Inform. Technol. Secur., 10 (2018), 93-102.

P. Wandra, H. Jie, DeepProfile: Finding fake profile in online social network using dynamic CNN, J. Inform. Secur. Appl., 52 (2020), article 102465. Available from: https://www.sciencedirect.com/science/article/abs/pii/S2214212619303801. DOI: https://doi.org/10.1016/j.jisa.2020.102465

V. Kharchenko, Big Data and Internet of Things for safety critical applications: Challenges, methodology and industry cases, Int. J. Inform. Technol. Secur., 10 (2018), 3-16.

I. Alsmadi, R. Burdwell, A. Aleroud, A. Wahbeh, M. Al-Qudah, A. Al-Omari, Introduction to information security, in Practical Information Security (eds. I. Alsmadi, R. Burdwell, A. Aleroud, A. Wahbeh, M. Al-Qudah, A. Al-Omari), Springer, (2018), 1-16. Available from: https://www.springer.com/gp/book/9783319721187. DOI: https://doi.org/10.1007/978-3-319-72119-4_1

H. Paanen, M. Lapke, M. Siponen, State of the art in information security policy development. Comp. Secur., 88 (2020), article 101608. Available from: https://www.sciencedirect.com/science/article/pii/S0167404818313002. DOI: https://doi.org/10.1016/j.cose.2019.101608

M. A. Ferrag, H. Janicke, Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study, J. Inform. Secur. Appl., 50 (2020), article 102418. Available from: https://www.sciencedirect.com/science/article/pii/S2214212619305046. DOI: https://doi.org/10.1016/j.jisa.2019.102419

A. R. Mahlous, SSR: A framework for a secure software reuse, Int. J. Inform. Technol. Secur., 10 (2018), 87-98.

Y. A. Ivanova, Assessment of the probability of cyberattacks on Transport Management Systems, Int. J. Inform. Technol. Secur., 10 (2018), 99-106. DOI: https://doi.org/10.1007/s35764-018-0088-8

M. A. P. Chamikara, P. Bertok, D. Liu, S. Camtepe, I. Khalil, An efficient and scalable privacy preserving algorithm for big data and data streams. Comp. & Security, Special issue "Security and Privacy in Smart Cyber-physical Systems" (2019), article 101570. Available from: https://www.sciencedirect.com/journal/computers-and-security/special-issue/109XHWZ5JSX. DOI: https://doi.org/10.1016/j.cose.2019.101570

Tz. Tzolov, Data model in the context of the general data protection regulation, Int. J. Inform. Technol. Secur., 9 (2017), 113-122.

R. Romansky, I. Noninska, Principles of secure access and privacy in combined e-learnng environment: Architecture, formalization and modelling, in Multidisciplinary Perspectives on Human Capital and Information Technology Professionals (eds. V. Ahuja, S. Rathore), IGI Global Publ., USA (2018), 152-178. DOI: https://doi.org/10.4018/978-1-5225-5297-0.ch009

M. Aminzade, Confidentiality, integrity and availability—finding a balanced IT framework, Netw. Secur., 50 (2018), 9-11. Available from: https://www.sciencedirect.com/science/article/pii/S1353485818300436. DOI: https://doi.org/10.1016/S1353-4858(18)30043-6

Thales, 2020 Data Threat Report - Global Edition. Survey and Analysis from IDC, 2020. Available from: https://cpl.thalesgroup.com/data-threat-report.

Guidelines on the Use of Cloud Computing Services by the European Institutions and Bodies, European Data Protection Supervisor, 2018. Available from: https://edps.europa.eu/data-protection/our-ork/publications/guidelines/guidelines-use-cloud-computing-services-european_en.

Maximizing the value of your data privacy investments - data privacy benchmark study, CISCO Cybersecurity Series, 2019. Available from: https://www.cisco.com/c/dam/en_us/about/doing_business/trust-center/docs/dpbs-2019.pdf.

Casey Crane, 20 surprising IoT statistics you don't already know, Security Boulevard, 5 Sep 2019. Available from: https://securityboulevard.com/2019/09/20-surprising-iot-statistics-you-dont-already-know/.

A. Azmoodeh, A. Dehghantanha. Big data and privacy: Challenges and opportunities, in Handbook of Big Data Privacy (ed. K-K. R. Choo, A. Dehghantanha), Springer-Cham, Switzerland, (2020), 1-6. DOI: https://doi.org/10.1007/978-3-030-38557-6_1

Downloads

Published

2024-06-30

How to Cite

Grover, D., & Singh, R. (2024). THE LAW OF RIGHT TO PRIVACY IN INDIA: PROTECTING PRIVACY IN THE DIGITAL ERA: CHALLENGES. ShodhKosh: Journal of Visual and Performing Arts, 5(1), 367–372. https://doi.org/10.29121/shodhkosh.v5.i1.2024.3498