Non - Doctrine - Cyber Security Laws and Data Protection
Non - Doctrine - Cyber Security Laws and Data Protection
ROLL NO. 03
SUBMITTED TO:
I/C PRINCIPAL
Cyber security laws are critical in the modern digital landscape, aiming to protect
networks, systems, and data from cyber threats such as hacking, data breaches, and
cyber espionage. These laws establish a legal framework that mandates
organizations to implement security measures, respond to incidents, and notify
relevant authorities and affected individuals in case of a breach. By defining
cybercrimes and outlining penalties, these laws help deter malicious activities and
ensure the protection of information technology infrastructure.
Information security protects the integrity and privacy of data, both in storage
and in transit.
Operational security includes the processes and decisions for handling and
protecting data assets. The permissions users have when accessing a network and
the procedures that determine how and where data may be stored or shared all fall
under this umbrella.
Data protection laws are designed to safeguard personal data from misuse and
unauthorized access, ensuring that individuals retain control over their
information. These laws require organizations to handle personal data responsibly,
including collecting data legally, securing it adequately, and using it only for
specified purposes. Data protection regulations also grant individuals rights such
as accessing their data, correcting inaccuracies, and, in some instances, having
their data deleted, thereby promoting transparency and trust in data handling
practices.
At the core of data protection laws are several key principles designed to ensure
the responsible handling of personal data. These include data minimization, which
limits the amount of data collected to what is necessary; purpose limitation,
ensuring data is used only for specified purposes; and data accuracy, requiring that
personal information is kept up to date. Additionally, data protection laws mandate
appropriate security measures to protect data from breaches and unauthorized
access, and enforce the rights of individuals to access, correct, and delete their
data.1
Data protection, on the other hand, is the legal safeguarding of data against any
loss, damage or corruption. As data is now collected at an unprecedented rate,
there is a serious issue of protecting the data collected from unauthorised sources.
2. Historical Background:
The evolution of cyber security laws can be traced back to the late 20th century,
coinciding with the rapid growth of the internet and digital technologies. In the
early days, the focus was primarily on protecting computer systems from
unauthorized access and ensuring the security of sensitive government and military
data. One of the first significant laws in this area was the Computer Fraud and
Abuse Act (CFAA) of 1986 in the United States, which made it illegal to access a
related offenses.
As the internet became more widespread and integral to business operations, the
need for comprehensive cyber security legislation grew. The late 1990s and early
1
What is Cyber Security? | Definition, Types, and User Protection (kaspersky.co.in)
2000s saw a series of laws aimed at addressing the growing threat of cybercrime.
For example, the UK introduced the Computer Misuse Act in 1990, which
The 21st century has seen a continued expansion and refinement of cyber security
the world have introduced more stringent regulations. The EU’s Network and
Information Systems (NIS) Directive (2016) set security standards for critical
Data protection laws have their roots in the mid-20th century, emerging in
of the earliest data protection laws was the German Federal Data Protection Act of
1970, which aimed to protect personal data processed by public authorities. This
was followed by similar legislation in other countries, including Sweden's Data
Act (1973) and the United States' Privacy Act (1974), which regulated the use of
protection with the adoption of the Organisation for Economic Co-operation and
Flows of Personal Data. These guidelines established basic principles for the
protection of personal data and aimed to harmonize data protection laws across
In 1995, the European Union introduced the Data Protection Directive, which set
out comprehensive rules for the processing of personal data within the EU. This
implement national laws that protected personal data and ensured free movement
of such data within the EU. The directive also established the concept of data
The most significant recent development in data protection law is the EU's General
Data Protection Regulation (GDPR), which came into effect in 2018. The GDPR
replaced the 1995 directive and introduced stricter requirements for data
Overall, the historical development of cyber security and data protection laws
further to address new challenges and ensure the security and privacy of data in an
Evolution of cybersecurity :-
The evolution of cybersecurity is a fascinating journey that has closely followed the
milestones in the history of cybersecurity and offers insights into its future outlook:
1. Early Beginnings (1940s-1960s): The field of cybersecurity has its roots in the
early days of computing when security concerns were limited to the physical
interest in exploiting vulnerabilities. The 1970s and 1980s saw the emergence of
the first hackers, like Kevin Mitnick, who gained notoriety for their exploits. This
4. Y2K and Cybersecurity Awareness (2000s): The fear of the Y2K bug
emergence of more sophisticated malware and the need for improved defense
High-profile breaches, like those at Target and Sony, highlighted the importance of
cybersecurity. This period also saw the growth of the cybersecurity industry, with
detection.
Things (IoT) devices and the shift to cloud computing, new attack vectors emerged.
Ensuring the security of these technologies became a top priority for organizations.
7. The Future Outlook (2020s and beyond): Looking ahead, several trends are
detection and response will become more prevalent, both for cybersecurity
and in the hands of attackers.
access controls.
quantum-resistant cryptography.
compliance.
proactive measures, strong collaboration between public and private sectors, and
ongoing innovation in the field.
early foundations were laid in the 1970s when countries began recognizing the need
Federal Data Protection Act of 1970, which focused on safeguarding personal data
processed by public authorities. Sweden followed with its Data Act in 1973, setting
International Standards and Guidelines: The 1980s saw significant strides in the
and security safeguards, aiming to balance the protection of privacy with the free
national data protection laws and set a framework for international cooperation.
of data protection was the European Union's Data Protection Directive (95/46/EC),
adopted in 1995. This directive aimed to harmonize data protection laws across EU
member states, ensuring both high standards of privacy protection and the free
movement of personal data within the EU. The directive introduced key concepts
such as the rights of data subjects, obligations of data controllers, and the
protection came with the introduction of the General Data Protection Regulation
(GDPR) in the European Union, which came into effect on May 25, 2018. The
GDPR replaced the 1995 directive, reflecting the need to address modern data
processing challenges and the digital economy. The GDPR introduced stricter
requirements for obtaining consent, enhanced data subject rights (including the
right to be forgotten), and mandated rigorous security measures for data protection.
Global Influence and Adoption: The GDPR set a global benchmark for data
protection, influencing legislation beyond the EU. Countries around the world
began adopting similar frameworks to protect personal data and align with
international standards. For instance, Brazil enacted the General Data Protection
Law (LGPD) in 2018, and Japan amended its Act on the Protection of Personal
residents rights similar to those under the GDPR, such as the right to know what
personal data is collected and the ability to opt out of data sales.
such as health care and finance, and the increasing focus on protecting data in
emerging technologies like artificial intelligence and the Internet of Things (IoT).
with initiatives such as the EU-U.S. Privacy Shield (and its successor frameworks)
protections.
Looking forward, the future of data protection will likely involve more adaptive
and dynamic regulatory frameworks that can keep pace with technological
ethics, and the integration of privacy by design principles into the development of
new technologies are expected to shape the landscape of data protection in the
will remain crucial in safeguarding individual privacy and fostering trust in the
digital economy.
2
Types of Cybercrime
This is one of the top arenas covered by cyber law, in general. Large websites are
usually a target for hackers looking to steal data or extort money from site owners.
Hackers do so by generating traffic beyond the site’s capacity, which, eventually,
crashes the site. When the site is not functioning, the hackers steal the data or
contact the site owner and demand money to restore the site.
This type of attack is known as a DDoS attack and is done via the botnet system.
Identity theft
Identity theft, as per cyber law, is the stealing of someone’s identity and passing it
off as your own in an online forum. This is a serious concern in cyber law because
hackers steal your private and confidential information and use the same for
malicious gains.
Cyberstalking:
2
The Evolution of Cybersecurity | Codecademy
3.https://legaldesire.com/cyber-law-in-india-meaning-introduction-history-need-important-terms-
and-amendments/
Cyberstalking, as per cyber law, is the usage of an entity’s social media or online
information to threaten, stalk, or extort money from them. The data collected by
the attacker is, generally, sensitive and can cause issues such as security breaches,
defamation, and more.
Social engineering
1. PUPs
This mode of gaining access or stealing data via adware, spyware, etc., is known
as potentially unwanted programs (PUPs.) This is why it is common to advise
cyber law and computer experts to make use of authorized service centers only.
2. Phishing
Phishing is a crime where the hackers gain access to a person’s device via a link;
the link, in a simple glance, would look authentic. The link can include gift cards,
games, etc. Sometimes, links come via mail claiming that your data is stolen, and
by clicking the link you can restore it.
The above-mentioned are a few of the many crimes that are identified by cyber
law experts around the globe.
3. Fraud
Cyber law in India identifies the theft of identities, credit cards, and other finance-
based crimes as fraud; these cybercrime offenses may lead to fines, imprisonment,
or both.
4. Copyright
Cyber law in India protects copyrighted works present in online forums. The
accused are punished based on the Copyright Act and other applicable acts, rules,
and regulations.
5. Defamation
The Indian constitution ensures the right to speech, but it comes with limitations;
when the limitations are crossed, it constitutes defamation. A person who defames
another person or an organization will be punished under cyber law.
But, What constitutes defamation activity online? In brief, according to cyber law,
spreading false information or information without evidence online constitutes
defamation activity.
Indeed, with the growth of social media usage, stronger cyber law protection is
required against defamation.
Cyber law in India protects online users from harassment and stalking. When
someone speaks in a targeted way against you online, it would constitute
harassment. The factors of harassment are circumstantial.
Harassment and stalking are serious offenses in India that have repercussions in
both civil law and criminal law.
7. Trade secrets
8. Child Pornography
It is one of the most serious offences. Abusers utilise the Internet to reach out to
and sexually abuse youngsters all around the world. The proliferation of the
internet has made children a tempting target for cybercriminals. Paedophiles use
their phoney identities to lure children into their traps, including contacting them
in chat rooms where they befriend them and steal personal information from their
helpless victims. These paedophiles lure children onto the internet in order to
9. Hacking
system owners.
a server.
computer sabotage.
Involves altering raw data just before a computer processes it and then
worms do not require a host to attach to. They simply generate working
clones of themselves and repeat the process until all of the accessible
clearest example is the Chernobyl virus, which was dormant for most of
intentions.
This is when an unauthorised person uses Internet hours that have been
paid for by another person. Until the victim reported it, this type of
cybercrime had never been heard of. This crime is normally prosecuted
under the Indian Penal Code5 and the Indian Telegraph Act6.
There are several types of cyber laws, each addressing specific aspects of digital
activities and cybersecurity. Here are some common categories of cyber laws:
1. Privacy Laws:
o Privacy laws govern the collection, use, and protection of
individuals’ personal information online.
o Examples include the General Data Protection Regulation (GDPR)
in Europe and the California Consumer Privacy Act (CCPA) in the
3
What is Cyber Crime? Types, Examples, and Prevention - CyberTalents
Cyber Security, Types and Importance - GeeksforGeeks
United States.
2. Cybercrime Laws:
o Cybercrime laws focus on criminal activities conducted online,
including hacking, identity theft, online fraud, and cyberbullying.
o These laws define offenses, penalties, and procedures for
investigation and prosecution.
3. Data Breach Notification Laws:
o Data breach notification laws mandate that organizations inform
affected individuals and authorities when a data breach occurs.
o These laws aim to ensure transparency and help individuals take
necessary actions to protect themselves.
4. Intellectual Property Laws:
o Intellectual property laws protect digital content, patents,
trademarks, and copyrights in the digital realm.
o They address issues like copyright infringement and online piracy.
5. Cybersecurity Laws:
o Cybersecurity laws require organizations to implement measures to
protect their digital infrastructure and sensitive data.
o These laws often set standards and requirements for data security
practices.
6. E-Commerce and Online Contracts:
o Laws related to e-commerce and online contracts establish legal
frameworks for online transactions, electronic signatures, and
consumer rights.
o They provide a basis for resolving disputes in the digital
marketplace.
7. Social Media and Online Content Regulations:
o Regulations governing social media and online content address
issues such as hate speech, defamation, and harmful content.
o They set guidelines for the removal or restriction of such content.
8. Computer Crime Laws:
o Computer crime laws specifically target offenses involving
computer systems and networks.
o They encompass unauthorized access, malware distribution, and
cyberattacks on critical infrastructure.
9. Cryptocurrency and Blockchain Regulations:
o As digital currencies and blockchain technology gain prominence,
regulations address issues like cryptocurrency trading, initial coin
offerings (ICOs), and blockchain-based contracts.
10. International Cybersecurity Agreements:
o Some laws and agreements focus on international cooperation in
combating cybercrimes and promoting cybersecurity best practices.
o Examples include the Budapest Convention on Cybercrime and
bilateral cybersecurity agreements between nations.
These are just a few examples of the types of cyber laws that exist to govern and
regulate various aspects of digital activities, protect individuals’ rights, and ensure
cybersecurity in the digital age. The specific laws and regulations can vary
significantly from one jurisdiction to another.
3. Scope of Research
Purpose and Scope of the Research Paper: The purpose of this research paper is to
comprehensively analyze the impact of emerging technologies on Indian Cyber
Law and to identify areas where the legal framework may need refinement. By
examining the implications of AI, Blockchain, IoT, and Quantum Computing, the
paper aims to provide insights into the evolving nature of cyber threats and the
preparedness of Indian Cyber Law to tackle these challenges. The scope of this
research extends to the exploration of specific legal nuances associated with each
emerging technology. It includes an in-depth analysis of how these technologies
4
What is Cyber Crime? Types, Examples, and Prevention - CyberTalents
Cyber Security, Types and Importance - GeeksforGeeks
affect cybersecurity, privacy, and legal liability. Additionally, the research will
assess the adequacy of the current legal framework in addressing the complexities
introduced by these technologies and propose recommendations for potential legal
reforms. The findings of this research aim to inform policymakers, legal
professionals, and other stakeholders about the evolving landscape of Indian Cyber
Law. By highlighting potential gaps and challenges, the paper seeks to contribute
to the ongoing dialogue on adapting the legal framework to effectively govern the
digital realm. As technology continues to advance, this research serves as a guide
for anticipating future legal needs and ensuring the resilience of the legal
framework in the face of emerging technological paradigms.
4. Objectives:-
The objectives of cyber security law, also known as information security law or
cybercrime law, are designed to address the legal and regulatory challenges posed
by cyber threats and digital vulnerabilities. These objectives include:
1. Protecting Critical Infrastructure: Cyber security law aims to protect
critical infrastructure, including telecommunications networks, power
grids, transportation systems, and financial institutions, from cyber threats
5
What is Cyber Crime? Types, Examples, and Prevention - CyberTalents
and attacks. By establishing legal requirements and standards for the
security of critical infrastructure, cyber security law seeks to safeguard
essential services and promote national security and public safety.
2. Preventing Cybercrime: eOne of the primary objectives of cyber security
law is to prevent and combat cybercrime, including hacking, malware
attacks, data breaches, identity theft, fraud, and online scams. By defining
cybercrimes, imposing penalties for offenders, and enhancing law
enforcement capabilities, cyber security law aims to deter criminal
activities and promote a safe and secure online environment.
3. Promoting Data Protection: Cyber security law seeks to protect personal
and sensitive data from unauthorized access, disclosure, and misuse by
regulating the collection, processing, and storage of data. By establishing
data protection laws, regulations, and standards, cyber security law aims to
safeguard privacy, confidentiality, and integrity and mitigate the risk of
data breaches and identity theft.
4. Ensuring Regulatory Compliance: Cyber security law sets out legal
requirements and obligations for individuals, organizations, and
governments engaged in digital activities. By ensuring compliance with
relevant laws, regulations, and industry standards, cyber security law
promotes accountability, transparency, and responsible conduct in
cyberspace.
5. Facilitating Incident Response: Cyber security law aims to facilitate
incident response and cyber incident management by establishing legal
frameworks and procedures for detecting, reporting, and responding to
cyber incidents. By providing guidance on incident handling, information
sharing, and coordination, cyber security law helps organizations and
governments effectively manage cyber threats and minimize the impact of
cyber attacks.
6. Enhancing International Cooperation: Cyber security law encourages
international cooperation and collaboration among countries, governments,
and stakeholders to address global cyber threats, share best practices, and
promote cybersecurity capacity building. By fostering dialogue,
cooperation, and information sharing, cyber security law aims to enhance
cyber governance and promote a safer and more secure cyberspace for all.
7. Protecting Intellectual Property: Cyber security law seeks to protect
intellectual property rights in digital environments by regulating copyright,
trademarks, patents, and other forms of intellectual property. By
establishing legal protections and enforcement mechanisms, cyber security
law aims to prevent infringement, piracy, and cyber espionage and promote
innovation and creativity in digital content and technology.
8. Safeguarding National Interests: Cyber security law addresses national
security concerns by regulating the use of information and communication
technologies (ICTs) in cyberspace and defending against cyber threats and
attacks. By establishing legal frameworks for cybersecurity, critical
infrastructure protection, and cyber defense, cyber security law aims to
safeguard national interests, promote sovereignty, and protect against cyber
warfare and cyber espionage.
The objectives of cyber security law are aimed at promoting a safe, secure, and
resilient cyberspace that fosters innovation, economic growth, and social
development while protecting individuals' rights, interests, and values. By
addressing legal and regulatory challenges, cyber security law seeks to harness the
benefits of digital technologies while mitigating the risks and vulnerabilities
associated with their use.
India's approach to cyber laws has evolved over time, primarily governed by the
Information Technology Act, 2000, which marked a significant milestone in
addressing electronic transactions and cybercrimes. The Act provides legal
recognition for electronic documents, facilitates e-governance, and outlines
offenses related to computer systems, data breaches, and cyber fraud. Subsequent
amendments, such as those in 2008, expanded the legal framework to encompass
emerging challenges.
Apart from the Information Technology Act, other legislations supplement the
legal framework. The Indian Penal Code includes sections that pertain to
cybercrimes, covering offenses like hacking, identity theft, and online fraud.
Additionally, the Right to Privacy, recognized as a fundamental right by the
Supreme Court, influences the legal approach to data protection in the digital age.
The literature review identifies the strengths and limitations of existing cyber laws,
setting the stage for an in-depth analysis of their adaptability to emerging
technologies. As technology continues to advance, the legal framework must
evolve to address novel challenges posed by Artificial Intelligence, Blockchain,
Internet of Things, and Quantum Computing. The subsequent sections of this
research will delve into these technologies' implications and assess the
preparedness of Indian Cyber Law to meet the demands of the digital age.
RESEARCH DESIGN
The study aimed to collect responses with regards to the knowledge and awareness
of respondents towards cyberlaws in India. A three point structured questionnaire
was designed to find the results. Such data were collected from the
students/teachers and employee .An individual participant constituted the sampling
unit whereas probability sampling (random sampling) techniques were used to
select the sample Table 1 shows the break-up of the sample: Table 1 Break-up of
sample Gender Category Male Female Total Unemployed 150 100 Employed 80
70 250 Total 150 230 170 400.
Sampling methods under cybersecurity and data protection law are crucial for
assessing compliance, identifying risks, and ensuring the effectiveness of security
measures. Here's an overview of sampling methods commonly used in this
context:
1. Random Sampling:
2. Stratified Sampling:
Dividing the population into distinct groups (strata) based on
specific characteristics, such as data types, system criticality, or
departmental divisions. This method allows for targeted assessment
of high-risk areas while ensuring representation across different
segments.
3. Systematic Sampling:
Selecting samples at regular intervals from a sorted list or sequence.
This method provides a structured approach and ensures every data
or system element has an equal chance of being included, making it
useful for large datasets or systematic evaluations of controls.
4. Cluster Sampling:
Grouping the population into clusters (e.g., departments, locations)
and randomly selecting entire clusters for evaluation. Cluster
sampling is efficient for assessing compliance and security
measures within specific organizational units or geographical areas.
5. Convenience Sampling:
Selecting samples based on their accessibility or convenience,
which may not represent the entire population objectively. While
not ideal for rigorous assessments, convenience sampling can
provide insights into immediate concerns or issues.
6. Judgment Sampling:
Choosing samples based on expert judgment or predefined criteria,
such as selecting high-value data assets or critical systems for in-
depth analysis. This method is valuable for focusing resources on
areas of greatest importance or risk.
7. Purposive Sampling:
Selecting samples based on specific objectives or criteria, such as
targeting systems with known vulnerabilities or assessing
compliance with particular legal requirements. Purposive sampling
allows for tailored assessments aligned with the organization's
priorities. 7
When conducting sampling under cybersecurity and data protection law, it's
essential to consider the scope of assessment, the objectives of the sampling
exercise, and the potential implications for compliance and risk management.
Additionally, ensuring transparency, documentation, and adherence to best
practices throughout the sampling process is crucial for maintaining integrity and
credibility.
7
https://intellipaat.com/blog/what-is-cyber-law/
7. Limitations to current research
The proliferation of Internet of Things (IoT) devices has transformed the way we
interact with the digital world, introducing a multitude of interconnected devices
that communicate and share data. In the context of Indian Cyber Law,
understanding the legal implications of IoT is essential. The interconnected nature
of IoT devices poses significant cybersecurity concerns, as vulnerabilities in one
device can potentially compromise the entire network.
Cybersecurity challenges associated with IoT include the risk of unauthorized
access, data breaches, and the potential exploitation of poorly secured devices.
Compromised IoT devices can be weaponized to launch large-scale cyber attacks,
posing threats to critical infrastructure, personal privacy, and national security.
The legal framework must adapt to address these evolving threats, establishing
robust measures to secure IoT ecosystems.
Purpose of limitation: The DPDP Bill provides certain bases which collecting
entities can rely upon to process personal data. These include: consent having
been given as mentioned under “deemed consent” for responding to a medical
emergency; for purposes related to employment, including prevention of corporate
espionage, maintenance of confidentiality of trade secrets, intellectual property,
classified information, recruitment, termination of employment, provision of any
service or benefit sought by a Data Principal who is an employee, verification of
attendance and assessment of performance; and in the public interest and other
reasonable purposes giving liberty to the Central Government, as mentioned under
“Exemptions” Section 18 of the proposed bill. The DPDP Bill has limited the
processing of data for lawful purposes only as explained in the principles above.
The widespread adoption of IoT devices raises intricate privacy concerns, as these
devices continuously collect and transmit vast amounts of data. Individuals may
unknowingly expose sensitive information, leading to potential privacy
infringements. In the context of Indian Cyber Law, safeguarding privacy in the age
of IoT becomes a critical consideration.
Legal frameworks must navigate the tension between the benefits of IoT-enabled
services and the protection of individual privacy rights. Consent mechanisms, data
ownership, and transparency become pivotal in shaping legal responses to privacy
issues. Striking a balance between fostering innovation and protecting individual
privacy is a key challenge that the legal framework must address.
In addressing privacy concerns, the legal framework can enforce stringent data
protection regulations. Clear guidelines on data collection, storage, and sharing
practices, along with transparent privacy policies, empower individuals to make
informed choices. Legal mechanisms can prescribe penalties for non-compliance,
creating a deterrent for organizations that neglect privacy safeguards.
The compromise of current encryption standards also raises concerns about the
integrity of digital signatures and certificates. Malicious actors armed with
quantum capabilities could potentially forge digital signatures, leading to
fraudulent transactions, unauthorized access, and a breakdown of trust in digital
communication. As Quantum Computing advances, the urgency to address these
threats within the legal framework becomes apparent.
Legal mechanisms can also play a role in promoting quantum research and
development. Government incentives, grants, and partnerships with private entities
can encourage the creation of quantum-safe technologies. By fostering an
ecosystem that prioritizes quantum-resistant solutions, the legal framework can
contribute to building a more secure digital infrastructure.
8
https://www.researchgate.net/publication/377473599_EMERGING_TECHNOLOGIES_AND_F
UTURE_CHALLENGES_IN_INDIAN_CYBER_LAW/link/65a90442f323f74ff1c8480d/
download?
_tp=eyJjb250ZXh0Ijp7ImZpcnN0UGFnZSI6InB1YmxpY2F0aW9uIiwicGFnZSI6InB1YmxpY2F
0aW9uIn19
Addressing these challenges requires a multifaceted approach that involves legal
reforms, international collaboration, and the enhancement of law enforcement
capabilities. The subsequent sections of this research paper will delve into
recommendations for legal reforms in Indian Cyber Law, proposing measures to
address the gaps highlighted in the literature review and challenges posed by
emerging technologies.
With the unprecedented significance that data has taken in recent times, abiding by
the principles that aim to protect data protection and privacy has become
paramount. Let’s take a quick look at the indispensable principles governing data
protection laws.
Data minimization: Considered to be one of the most crucial principles that aims
to minimise data collection, this principle forms the bedrock of recent legal
developments throughout the world. The purpose of the principle is to focus on the
collection of the required data alone and disallow any such gathering if it has no
purpose to serve. The reason behind this is that any unnecessary data increases
potential societal risks and might breach an individual’s privacy. Following this
approach, it’s significant for the data collectors to mention the reason for their data
collection too, so that the data isn’t collected for one reason and then used for
another without the valid consent of the data principle. This principle tries to
strengthen the trust and faith posed by people in organisations that collect their
personal data.
Valid consent: Consent is undoubtedly the cornerstone of any data collection. For
the collection of private data by any person to be legit, it must be accompanied by
a valid and express consent. The user can only give valid consent when they are
not kept in the dark about the data collection, their usage, their rights, etc. Once
the relevant information is given to them, only then can the data principles offer
their explicit consent for any purpose. It is for this reason that most of the laws
now have preferred opt in clauses over opt out clauses.
It means that every individual has the power to select if they wish to share their
information; their inaction doesn’t substitute for explicit consent. This promotes
proper transparency between the concerned parties and allows users to make well-
informed decisions about their information. This principle has recently been
recognized in the recently enacted Indian privacy law in Section 4, to be read with
Section 6. It states that the consent given should be a free, specific, informed and
unambiguous indication of one’s wishes.
Lawful data collection: This principle states that the purpose of data collection
should be lawful and fair. Whatever the reason for data collection, it should be
legit and not contrary to the law. For example, data collection in furtherance of
contractual purposes or legal obligations is considered lawful. The collection
should not result in discrimination or any harm or injury to individuals. This
doesn’t mean that only the purpose of collection should be lawful but also that the
data collection should have strict adherence to local and global laws that may
impact data collection. This data aims to promote ethical standards and practices
that must be followed for data collection and processing. This principle also finds
place in the Indian privacy law under Sections 4 and 7 of the DPDP Act. The
Section explains that a lawful purpose means any purpose that’s not expressly
forbidden by law.
Accuracy: The collected data should also be accurate and up to date. The data
controller should make an effort to ascertain that the data collected, if inaccurate,
must be corrected with regard to the purpose for which the data was collected. The
data controller should take active measures to ensure that the information isn’t
only correct but also complete and reliable. Any data collection can serve its true
purpose only if the information is reliable and correct. This also means that the
data should be verified time and again. There should be mechanisms in place to
regularly review and update the information. Proper documentation of accuracy
measures also must be maintained. Section 8 of the DPDP Act also states a similar
principle. It states that the Data Fiduciary should make reasonable efforts to ensure
its completeness, accuracy and constancy.
Limitations on the storage of the data: This principle makes sure that the data is
collected only for a limited duration and isn’t kept for infinity. The data should be
gathered, stored for minimum time and later disposed of safely. The data should
not be kept for a time that’s longer than necessary so once the purpose for which
the data was collected is fulfilled, the data should be accordingly disposed of. So,
when the data has reached the end of its retention period, it can be disposed of
using secure methods such as data shredding, encryption or other secure methods.
The principle of data retention can be seen in Section 8 of the DPDP Act as well. It
was mentioned that the Data Fiduciary shall delete the retained data when the
consent for the same is withdrawn or when it serves the purpose for which it was
collected.
Rights of data principals: In this digital era, our data flows quite smoothly
through different channels for different purposes, even if we are not aware of it.
Data privacy laws fulfil quite an essential purpose in this situation, which is
safeguarding the right to privacy of individuals. The individuals are generally
referred to as the data subjects. As our societies become more and more reliant on
digitalisation, there is a growing need to recognize certain principles that ensure
that our data is treated carefully. These laws thus have a plethora of rights
accorded to individuals for better handling and processing of their personal
information. These rights may differ from jurisdiction to jurisdiction. However,
there are a few common rights that are provided under Chapter 3 of the DPDP Act,
which include the following:
Right to access: The individuals also have a right to access their personal data,
even when it has been collected by the organisation. This gives them power over
their acquired data and ensures that the information they have collected is true and
accurate. The companies that collect the personal data are obligated to give them
access to their data, too, within a reasonable time period. This right doesn’t just
guarantee them a right to get all the requisite information but also a copy of it. It
gives the individual crucial information such as the purpose of data collection,
categories of data, period for which it will be stored, if it’s used for automated
processing, source of data collection, etc.
Right to rectify the information: The data subjects also have a right to correct
the information if it is inaccurate or old. This right has been included in the DPDP
Act under Section 12. It states that a data collector or fiduciary, as the Act
provides, shall be bound to correct the incorrect or misleading personal data or
complete any incomplete personal data. He is also bound to update any
information that may be outdated.
Right to data portability: The individuals have another right to request a copy of
their personal data in a readable format that also allows them to transfer the data to
another person. This right as well tries to uplift the rights and control of
individuals over their own data so that they can facilitate the sharing of their data
as per their needs and wishes.
Right to object to the processing of the data: The data subject also has the right
to object to the processing of their data. If there are legit grounds to deny such
processing, then they can object to the processing of the information. This right
grants the individual ownership over their data so that they can curtail its access
and limit unwanted users of their data. Their rights give a similar consequence to
the case when the individual withdraws his/her consent. The reasons for such
withdrawal should be accompanied by the objection application.
Data Protection Impact Assessment (DPIA): The data privacy laws also provide
for organisations to conduct data protection assessments for any activities that may
pose a high threat to the privacy of individuals. These assessments are aimed at
analysing the necessity, proportionality and compliance of the companies with the
data privacy laws. By means of these assessments, companies that collect our data
can take active measures to identify any data privacy risks and address those risks
before they result in major breaches.
Right to lodge complaint: The individuals have a right to lodge complaints with
the data protection authorities. In the DPDP Act, Section 13 grants the right of
grievance redressal to individuals, where they can register their grievances with
the Data Fiduciary. The DPDP Act also provides that if the data principal isn’t
satisfied with the response of the data fiduciary, he may, within seven days,
register a complaint with the Data Protection Board. Though the data protection
laws grant individuals these rights, there are certain points that must be kept in
mind while exercising these rights to reap their maximum benefits. While
exercising these rights, you should act in a spontaneous manner, without any
delay. Whenever your right arises, try exercising it as soon as possible. Sitting
over your breaches creates an estoppel against you.
8. Critical analysis:-
1. Critical Analysis:
Critical analysis involves examining cybersecurity and data
protection issues from multiple perspectives, considering the
technical, legal, ethical, and societal implications. It entails
questioning assumptions, evaluating evidence, and assessing the
validity of arguments to form well-informed opinions and
recommendations.
Key areas for critical analysis may include assessing the
effectiveness of existing cybersecurity measures, identifying
emerging threats and vulnerabilities, evaluating the impact of new
technologies on privacy rights, and analyzing the ethical
considerations surrounding data collection, processing, and sharing
practices.
In the instant case, the validity of Section 66A of the IT Act was challenged before
the Supreme Court.
Facts:
Two women were arrested under Section 66A of the IT Act after they posted
allegedly offensive and objectionable comments on Facebook concerning the
complete shutdown of Mumbai after the demise of a political leader. Section 66A
of the IT Act provides punishment if any person using a computer resource or
communication, such information which is offensive, false, or causes annoyance,
inconvenience, danger, insult, hatred, injury, or ill will.
Court Decision:
The Supreme Court based its decision on three concepts namely: discussion,
advocacy, and incitement. It observed that mere discussion or even advocacy of a
cause, no matter how unpopular, is at the heart of the freedom of speech and
expression. It was found that Section 66A was capable of restricting all forms of
communication and it contained no distinction between mere advocacy or
discussion on a particular cause which is offensive to some and incitement by such
words leading to a causal connection to public disorder, security, health, and so on.
However, the Court also noted that Section 66A of the IT Act is not violative of
Article 14 of the Indian Constitution because there existed an intelligible
difference between information communicated through the internet and through
other forms of speech. Also, the Apex Court did not even address the challenge of
procedural unreasonableness because it is unconstitutional on substantive grounds.
In this case, the accused preferred an appeal before the Supreme Court
after the High Court rejected the application of the accused to exhibit the
Compact Disc filed in defence and to get it proved from the Forensic
Science Laboratory.
Facts:
Facts:
The petitioner approached the Court under Section 482, CrPC to quash the charge
sheet filed against him. The petitioner secured unauthorized access to the protected
system of the Legal Advisor of Directorate of Vigilance and Anti-Corruption
(DVAC) and was charged under Sections 66, 70, and 72 of the IT Act.
Court Decision:
The Court observed that the charge sheet filed against the petitioner cannot be
quashed with respect to the law concerning non-granting of sanction of
prosecution under Section 72 of the IT Act.
Facts:
The question before the Court was whether the defendant’s use of the plaintiff’s
mark, logos, and image are protected under Section 79 of the IT Act.
Court Decision:
The Court observed that the defendant is more than an intermediary on the ground
that the website has full control over the products being sold via its platform. It
first identifies and then promotes third parties to sell their products. The Court
further said that active participation by an e-commerce platform would exempt it
from the rights provided to intermediaries under Section 79 of the IT Act.
Facts:
Avnish Bajaj, the CEO of Bazee.com was arrested under Section 67 of the IT Act
for the broadcasting of cyber pornography. Someone else had sold copies of a CD
containing pornographic material through the bazee.com website.
Court Decision:
The Court noted that Mr. Bajaj was nowhere involved in the broadcasting of
pornographic material. Also, the pornographic material could not be viewed on the
Bazee.com website. But Bazee.com receives a commission from the sales and
earns revenue for advertisements carried on via its web pages.
The Court further observed that the evidence collected indicates that the offence of
cyber pornography cannot be attributed to Bazee.com but to some other person.
The Court granted bail to Mr. Bajaj subject to the furnishing of 2 sureties Rs. 1
lakh each. However, the burden lies on the accused that he was merely the service
provider and does not provide content.
6. State of Tamil Nadu v. Suhas Katti
The instant case is a landmark case in the Cyber Law regime for its efficient
handling made the conviction possible within 7 months from the date of filing the
FIR.
Facts:
The accused was a family friend of the victim and wanted to marry her but she
married another man which resulted in a Divorce. After her divorce, the accused
persuaded her again and on her reluctance to marrying him, he took the course of
harassment through the Internet. The accused opened a false e-mail account in the
name of the victim and posted defamatory, obscene, and annoying information
about the victim.
A charge-sheet was filed against the accused person under Section 67 of the IT Act
and Section 469 and 509 of the Indian Penal Code, 1860.
Court Decision:
Facts:
Court Decision: The Court observed that the accused in this case are the ex-
employees of the MphasiS call center. The employees there are checked whenever
they enter or exit. Therefore, it is clear that the employees must have memorized
the numbers. The service that was used to transfer the funds was SWIFT i.e.
society for worldwide interbank financial telecommunication. The crime was
committed using unauthorized access to the electronic accounts of the customers.
Therefore this case falls within the domain of ‘cyber crimes”. The IT Act is broad
enough to accommodate these aspects of crimes and any offense under the IPC
with the use of electronic documents can be put at the same level as the crimes
with written documents.
The court held that section 43(a) of the IT Act, 2000 is applicable because of the
presence of the nature of unauthorized access that is involved to commit
transactions. The accused were also charged under section 66 of the IT Act, 2000
and section 420 i.e. cheating, 465,467 and 471 of The Indian Penal Code, 1860.
Facts:
Court Decision:
The plaintiffs are not entitled to relief of perpetual injunction as prayed because
the court did not qualify as certified evidence under section 65B of the Indian
Evidence Act. Due to the absence of direct evidence that it was the defendant who
was sending these emails, the court was not in a position to accept even the
strongest evidence. The court also restrained the defendant from publishing,
transmitting any information in the Cyberspace which is derogatory or abusive of
the plaintiffs.
Facts:
The case’s facts are simple and straightforward. The dilemma occurs when
Mr. Vasant Dattatreya Gujar’s Marathi poetry “Gandhi Mala Bhetala” was
published by a distributor Devidas Ramachandra Tuljapurkar in a journal
intended for private circulation among the members of the All-India Bank
Association Union. A member of the Patit Pawan Sangathan i.e., Mr.
V.V.Anaskar determined that certain words and phrases in the poem were
inappropriate or offensive and that they deserved some harsh punishments.
Some of these offending phrases are, “I saw Gandhi masturbating in the
memory of Hema Malini on a public street; I saw Gandhi at Bhagwan
Rajneesh’s meditation session saying satisfaction through sex”. Mr. V.V.
Anaskar then filed a complaint under Sections 153-A and 153-B read with
Section 34, and Section 292 of Indian Penal Code (IPC), 1860 . The Chief
Magistrate in Latur rejected all charges except one under Section 292 of
the Indian Penal Code, 1860 after hearing the evidence. Then the matter
was dismissed by the High Court of Bombay. Eventually, the matter was
taken to the Supreme Court of India via a Special Leave Petition. The poet
defended himself by claiming the right to freedom of speech and
expression protected under Article 19 of the Indian Constitution, and also
by explaining the fact that his poem mourned the loss of Gandhian values
and was not meant to mock or defame him. To reach the final decision,
Justice Dipak Misra as well as Justice Prafulla C. Pant referred back to the
case of Ranjit Udeshi v. The State of Maharashtra.
Court Decision:
The Supreme Court has delivered a judgment that argues for the
establishment of a separate category of “historically respectable persons,”
which has effectively rendered Mahatma Gandhi and others by the general
public. In essence, such historical figures cannot be exploited in any kind
of art that lowers them, even if they symbolize something greater than
themselves in a literary work. At the smallest intimation of mocking,
religion and national leaders, the two invincible components of a society,
swell with intolerance. The decision establishes a framework for regulating
the content of articles, poetry, and other literary works. The Court’s higher
threshold for applying the contemporary community test is likely to
negatively impact creative satire and commentary.
Court's Decision:
The Karnataka High Court acknowledged the prolonged vacancy and the
government's efforts but emphasized the urgency of the matter. The court
recorded the government's commitment to appoint a chairperson within six
months and dismissed the petition on this basis, without issuing a direct
order. However, the court expected the appointment process to be
expedited in public interest.
The case of Lloyd v Google LLC centers around allegations that Google
unlawfully processed personal data of Apple iPhone users in England and Wales
between 2011 and 2012, using a method known as the "Safari workaround."
Richard Lloyd sought to represent over 4 million affected users in a class action,
claiming compensation for the loss of control over their personal data under the
Data Protection Act 1998 (DPA 1998).
Facts:
Claim: Lloyd argued that Google breached its duties under the DPA 1998
by collecting users' browser-generated information without their consent,
violating data protection principles.
Class Action: Lloyd aimed to use a representative action under the Civil
Procedure Rules (CPR 19.6), claiming a uniform sum for each affected
user without the need for individualized damage assessment.
Legal Argument: He asserted that the unauthorized use of personal data
warranted compensation without proving specific damage (financial loss or
distress) for each individual.
Court Decisions
High Court: Initially, the High Court ruled in favor of Google, stating the
claims had no real prospect of success.
Court of Appeal: This decision was overturned, allowing Lloyd to pursue
the representative claim.
Supreme Court: In November 2021, the Supreme Court ultimately sided
with Google, dismissing Lloyd's claims for several reasons:
1. Interpretation of Damage: The court held that under section 13 of
the DPA 1998, compensation requires proof of material damage or
distress caused by the breach, not merely a contravention of the act.
This meant that each claimant would need to provide evidence of
specific damage suffered, which was incompatible with a uniform
sum approach for a representative action (Supreme Court UK) (Hill
Dickinson).
2. Representative Action Suitability: The Supreme Court determined
that the "same interest" requirement for a representative action was
not met. Given that the extent of the breach varied among users,
individual circumstances would necessitate separate assessments of
damage, thus conflicting with the uniform nature of the proposed
class action (Global Freedom of Expression) (Taylor Wessing).
Facts:
This case involved the transfer of 1.6 million patient medical records to
DeepMind, a subsidiary of Google, to develop an application for detecting
acute kidney injury. Andrew Prismall, representing affected patients,
claimed this data transfer without specific consent was a misuse of private
information.
Decision: The court dismissed the claim, stating there was no realistic
expectation of privacy among the patients. The diverse nature of the class
members' circumstances also made a representative action unfeasible. This
decision is pending appeal (Reed Smith LLP).
Facts:
Facts:
Court Decision:
Facts:
Court Decision:
Facts:
Court Decision:
Next, the collected data is assessed for compliance with relevant data
protection laws and regulations, such as the GDPR or CCPA. This involves
examining data handling practices, consent mechanisms, and security
safeguards to identify any instances of non-compliance or gaps in data
protection measures.
Leman
19%
Corporates & MNC
42%
Educations Sector
33%
Self tested questionnaire has contained some of the questions which has been
answered in the form of don’t know, yes, no. It has been designed with the
objective to assess the awareness for Indian cyberlaw for cybercrime of the
respondents. It was having maximum score of 69 and minimum score of 23.
Table 1. indicates that the mean scores of male for the awareness for Indian cyber
law and role of the police for cybercrime and related legal provision is 49.32 and
the mean score of female for the awareness for Indian cyberlaw is 36.50 and their
SD values are 9.14 and 2.42 respectively.
I. REVIEW OF LITERATURE
This section reports a brief review of research literature wherein the researchers
have dealt with the related topics of cybersecurity, cybervictimisation etc. Bhushan
(2012) has revealed that awareness of cybernetics in India is abysmally low and
thus has gained a reputation as a country where foreign investors can do business
in cybersecurity and have been investing heavily in cybersecurity.
Shivam Pandey: concluded that lack of awareness about internet and low level of
internet security is fast making Indore 1 a heaven for cybercriminals. There has
been a steady increase in the number of cybercrimes as people are not aware about
the rapid developments in the cyberworld. Increasing dependence of common
citizens on cybernetics without proper security has made the job easy for
cybercriminals. In the absence of experts and cybersleuths, Indore has become
more vulnerable to cybercriminals, the researcher concluded.
Nilesh Dalal: one area that requires special attention is the cyberlaw awareness in
India. Very few users, practitioners and organizations are aware about disputes
arising out of IT Act, 2000 and its various amendments. Nappinai (2010) found
that cybercrime prosecution is not resorted in many instances due to lack of
awareness amongst both the victims and the enforcement authorities about the
applicability of general laws to cybercrimes. Saxena et al. (2012) have concluded
that proactive actions on the part of Government and enhanced participation of
education system in the cybersecurity awareness approach may lead to a strongly
secured nation.
Jamil and Khan: while comparing the data protection act in India with that of
European countries have concluded that the Indian cyberlaws are very poor and it
is very necessary to actually bring in the appropriate cyberlaw and awareness
about them. There is not much of awareness regarding protecting the data. There is
a continuous rise in cybercrime as there is huge population but lesser resources to
manage the population and the cybercrimes that take place.
Dev Seth: has noticed that with increasing awareness and provision of training on
the subject of cybercrime, enhanced technological and legislative steps being taken
to further strengthen the IT laws and enforcement framework, India will
effectively succeed in combating the problem of cybercrimes.
II. REVIEW OF ILITERATURE
Poonam Shukla: Poonam Shukla not done schooling and not aware
about the operating mobile phone and other electronic data. So there is
no questions to ask about cyber law and data protection.
10. CONCLUSIONS:
The two fronted approaches discussed above is necessary for not just the common
Indian citizen but the security of the Indian nation. In light of the above, it may be
surmised that while the Indian IT Act and the supplementary legislation, rules and
regulations have been developed and come a long way since their original
inception, they are not enough to secure data protection and guard against cyber
threats.
There are numerous difficulties and instances to consider in providing for data
protection and privacy laws in India, such as the paradoxical issue of preserving
the anonymity of personal data while striving to identify the true culprit of an
online crime due to identity theft and spoofing, thereby allowing anyone sitting
anywhere in the world to conduct crimes to the point where they endanger the
nation’s security.
While there is a need for new data protection law in India and a strong argument to
be made in the favor of the PDP Bill, at the same time, it may be said that over the
years the Indian government has advanced from minimal policing of cyber and
data security in India to over-policing. Many critics have vocalised their concerns
over the over-reaching powers granted to the Indian government under the PDP
Bill, for instance, to prescribe what constitutes critical personal data and many
foreign entities consider the changes proposed thereunder to be too strict for
compliance. Thus, while the Indian government may be likely to adopt the version
of the PDP Bill recommended by the joint parliamentary committee, several major
issues remain to be debated on the front of data protection in India.
the data privacy and protection laws in India reflect the global landscape of the
emerging supremacy of data in a digitally advanced age. The implementation of
the DPDP Act is a step forward to protect personal data, allow greater autonomy
for Data Principals over their data and establish accountability for data protection
authorities. The Act emphasises key principles such as data minimisation,
accuracy, accountability, purpose limitation, etc. and also introduces the rights of
Data Principals. It keeps a check on the execution of obligations of Data
Fiduciaries and imposes a penalty for non compliance with provisions. In its
entirety, the DPDP Act serves the purposes for which it was made, but it is also
not immune from criticism. The provisions on sensitive personal data have
disappeared from the original bill while making it an Act. Many claim that the
DPDP Act is ambiguous on how consent is collected and how data is processed
and it creates wide exemptions for the government, so it is basically a missed
opportunity. It is expected that the Act would find the right balance between its
achievements and criticism and uphold the Supreme Court’s judgement on
privacy.
Cybercrime and Data Privacy have become major concerns in the Indian legal
system as the country continues to move towards a more digital future. While the
government has taken steps to address these issues through various laws and
regulations, more needs to be done to ensure that individual privacy
_____________________________________________________________
9
Strengthening Cyber Security and Data Protection in India: An Analysis of Legal Frameworks
and Case Studies (legalbites.in)