Download as pdf or txt
Download as pdf or txt
You are on page 1of 24

DATE DOWNLOADED: Sat Jan 22 03:54:49 2022

SOURCE: Content Downloaded from HeinOnline

Citations:

Bluebook 21st ed.


Varun Kalra & Ramisha Jain, An Armistice between Right to Privacy and Right of
Surveillance, 4 INDIAN J.L. & PUB. POL'y 1 (2017).

ALWD 7th ed.


Varun Kalra & Ramisha Jain, An Armistice between Right to Privacy and Right of
Surveillance, 4 Indian J.L. & Pub. Pol'y 1 (2017).

APA 7th ed.


Kalra, V., & Jain, R. (2017). An Armistice between Right to Privacy and Right of
Surveillance. Indian Journal of Law & Public Policy, 4(1), 1-23.

Chicago 17th ed.


Varun Kalra; Ramisha Jain, "An Armistice between Right to Privacy and Right of
Surveillance," Indian Journal of Law & Public Policy 4, no. 1 (Winter 2017): 1-23

McGill Guide 9th ed.


Varun Kalra & Ramisha Jain, "An Armistice between Right to Privacy and Right of
Surveillance" (2017) 4:1 Indian JL & Pub Pol'y 1.

AGLC 4th ed.


Varun Kalra and Ramisha Jain, 'An Armistice between Right to Privacy and Right of
Surveillance' (2017) 4 Indian Journal of Law & Public Policy 1.

MLA 8th ed.


Kalra, Varun, and Ramisha Jain. "An Armistice between Right to Privacy and Right of
Surveillance." Indian Journal of Law & Public Policy, vol. 4, no. 1, Winter 2017, p.
1-23. HeinOnline.

OSCOLA 4th ed.


Varun Kalra & Ramisha Jain, 'An Armistice between Right to Privacy and Right of
Surveillance' (2017) 4 Indian JL & Pub Pol'y 1

-- Your use of this HeinOnline PDF indicates your acceptance of HeinOnline's Terms and
Conditions of the license agreement available at
https://heinonline.org/HOL/License
-- The search text of this PDF is generated from uncorrected OCR text.
-- To obtain permission to use this article beyond the scope of your license, please use:
Copyright Information
AN ARMISTICE BETWEEN RIGHT To PRIVACY AND RIGHT OF

SURVEILLANCE

Varun Kalra and Ramisha Jain*

announcement of the Aadhar Card Scheme, the


ABSTRACT
tussle between the two has been gainingground.
The Supreme Court on 24 August, 2017 upheld
This paper aims at criticallyanalysing the legal
the Right to Privacy.' Despite this proclamation,
position of right to privacy in India by tracing
a major question remains still unanswered that
the case- by- case development of this newly
"hat does privacy mean for India".
acknowledged right. Also, this paper seeks to
"hat would be the impact of the change in
discuss the controversies involving the right to
WhatsApp's privacy policy on the users? Is
privacy, understand the need for a
Aadhar a surveillance mechanism? These are
comprehensive privacy policy and to assess the
the issues which are still dominating the cause
use and abuse of right of surveillance.
list of Supreme Court of India today.
The object of this paper is to offer
The Indian Judiciary has recently answered a
recommendations to end the tussle between the
question which will have a lingering effect on
right to privacy and right of surveillance, by
the Indian democracy, that is, do the Indian
clearly laying down the restrictions on right to
citizens have a right to privacy? According to
privacy, by recognising surveillance agencies
Black's law dictionary, right to privacy is,
and providing for a code to limit and prevent
"right to be let alone; the right to live without
the abuse of their powers and ultimately,
any unwarranted interference by the public in
establishing an interface between the right to
matters with which the public is not necessarily
privacy of the citizens of India and the right of
concerned". However, this right has been in
surveillance by the government ofIndia.
conflict with the right of surveillance by the

sovereign since time immemorial. And since the INTRODUCTION

The Ghost of Christmas Past, Right to Privacy,


* Authors are fourth year B.A.LLB.(Hons.) students at
Amity Law School, Noida. had decided to reappear with the Aadhar case.
1 Justice K.S. Puttaswamy and Ors. v. Union of India
(UOI) and Ors., (2017) 6 MLJ 267.

1
Not only did this issue once again sparked off interference or attacks."
the debate that whether the right to privacy is
Right to Privacy is guaranteed in the American
guaranteed under Article 21 of the constitution
Constitution under the Fourth Amendment.
or not, but had also renewed the fierce battle
The Fourth Amendment to the United States
between right to privacy and right of
Constitution prohibits unreasonable searches
surveillance.
and seizures and requires any warrant to be
With the recent change in WhatsApp's privacy judicially sanctioned and supported by probable
policy, questionable use of information by cause. It is part of the Bill of Rights and was
UIDAI and the growing tussle between the adopted in response to the abuse of the writ of
government agencies for more lethal assistance, a type of general search
surveillance systems, demand for privacy and warrant issued by the British government and a
freedom of speech and expression has been major source of tension in pre-Revolutionary
gaining ground. The right of privacy of the America.
citizens and the right of surveillance of the State
However, until recently, there was no such
are once again at loggerheads.
explicit guarantee, under the Indian Constitution
The need for privacy flows from the growing or so it was argued. According to Article 21,
individualistic society, a modem phenomenon. "No person can be deprived of his life and
personal liberty except according to the
According to Black's Law Dictionary, right to
procedure established by law". The question is
privacy is, "right to be let alone; the right of a
whether Right to life and Personal Liberty
person to be free from any unwarranted
include the Right to Privacy.
publicity; the right to live without any
unwarranted interference by the public in Amidst the controversy between National
matters with which the public is not necessarily Security and the Fundamental Rights of the
concerned". people, it's the Indian citizen who is in a no-win
situation.
As per Article 12 of the Universal Declaration
of Human Rights: "No one shall be subjected to It is a widespread idea that terrorism is a
arbitrary interference with his privacy, family, product of globalization and the Internet is a
home or correspondence, nor to attacks upon his tool used by the terrorists to communicate.
honor and reputation. Everyone has the right to Hence governments all around the world believe
the protection of the law against such that surveillance is the most effective methods

2
of detecting and prosecuting terrorists. All the two above stated rights is brought to an end.
movements, actions, interests, ideas and
RIGHT To PRIVACY IN INDIA AND ITS
everything else that could define a common man
or an individual can be known by surveillance. LEGAL POSITION
Mass-surveillance as we know today has been in
Right to Privacy is not enumerated in the Indian
practice since many years. Today, whatever we
Constitution, but the Indian Judiciary has from
do, from the moment we switch on our cell
time- to- time debated on the existence of this
phones, to navigating to a location using Google
right in the Indian Legal Framework and has
Maps, to catching a metro/bus with CCTV
culled the same from Article 21.
cameras, to using our credit cards for an online
(A) 1950- 2000
or offline purchase, we leave a digital trail
behind us. The government is capable of In, M P. Sharma v. Satish Chandra2 , it was held
knowing our medical history, routine, that, when the constitutional makers themselves
preference of food, religion, places of visit, the did not recognise the fundamental right to
movies we watch, the place we shop from, what privacy, then an analogy needn't be drawn with
we purchase, whether we are having an affair or American Constitution in order to import this
not, everything. All these things are easily right "by some process of strained construction"
accessible through our digital trails, some of and thus, the existence of right to privacy in
which we ourselves provide to them by updating India was denied.
our statuses on WhatsApp, Snapchat, Facebook
However, in Kharak Singh v. State of UP 3, the
etc. It is the appalling truth behind constant
apex court while acknowledging the existence
surveillance that the government carries out on
of right to privacy held that, despite the right not
us.
being expressly declared as a fundamental right,
Moreover, with the global surveillance it is "an essential ingredient of personal liberty".
disclosures, right to privacy has become a The legal position of the disputed right was
subject of international debate. To combat upheld in Gobind v. State of Madhya Pradesh4
,

terrorism, government agencies are undermining wherein the bench held that "the right to privacy
this right. Another question which now needs
answering is that whether privacy needs to be 2 AIR 1954 SC 300.

forfeited as a part of social contract. Hence, it is 3AIR 1963 SC 1295.

of utmost importance that the battle between the 'AIR 1975 SC 1378.

3
in any event will necessarily have to go through dealt with persons and not places. One of the
a process of case-by-case development." most prominent and recent case dealing with
Mathew, J. accepted "the right to privacy as an right to privacy is Ram Jeth Milani v. Union of
emanation from Art. 19(a), (d) and 21, but right India', wherein the ratio of the case was "Right
to privacy is not absolute right." Reiterating the to privacy is an integralpart of right to lfe, a
same in R. Rajagopalv. State Of TN., or better cherished constitutional value and it is
known as the Auto Shanker case, it was held important that human beings be allowed
that "A citizen has a right to safeguard the domains of freedom that are free of public
privacy of his own, his family, marriage, scrutiny unless they act in an unlawful manner.
procreation, motherhood, child-bearing and Another recent landmark judgement on the same
education among other matters. No one is of Amar Singh v. Union of India9 , where it
can publish anything concerning the above was upheld that it was the Court's duty to
matters without his consent, whether truthful or protect the right to privacy. Also in
otherwise whether laudatory or critical. If he Thalappalam Ser. Coop. Bank Ltd. and Ors. v.
does so, he would be violating the right to State ofKerala and Ors. 1, the honourable Court
privacy of the person concerned and would be held that right to privacy falling under Article
liable in the action of damages." 21 of the Indian Constitution is not absolute and
needs to regulated in public interest as in the
(B) 2000-2016
modem state, no right can be absolute. But it
It was held in Sharda v. Dharampal6 that the was finally in the Aadhaar card case i.e. Justice
right to privacy is subject to restrictions. It is not KS.Puttaswamy(Retd)& Anr v. Union Of India
enshrined in the Indian Constitution but has & Ors.11 , it was suggested that in order to settle
been drawn out from the extensive interpretation the legal position of the right to privacy,a
of article 21. Also, in District Registrar and constitutional bench must be established.
Collector, Hyderabad and another v. Canara
Bank and another', another two-Judge Bench
held, while accepting the implicit existence of
right to privacy in India, that the right to privacy
84 July, 2011, Supreme Court of India.
5 AIR 1995 SC 264. 9 11 May, 2011, Supreme Court of India.
6 AIR 2003 SC 3450. 10 2013 SCJ 7 862.

7 (2005) 1 SCC 496. 11 11 August, 2015, Supreme Court of India.

4
(C) 2017 § 377 of Indian Penal Code, which criminalises
consensual homosexual sex between adults. The
The Apex Court on 24th August, 2017, while
section reads as follows: "Whoever voluntarily
reaching out to the foundation of constitutional
has carnal inter-course against the order of
culture of India, proclaimed Privacy as a
nature with any man, woman or animal, shall be
postulate of human dignity. They acknowledged
punished with [imprisonment for life], or with
that privacy lies across the spectrum of
impris-onment of either description for a term
protected freedoms and is the ultimate
which may extend to ten years, and shall also be
expression of the sanctity of an individual. 13
liable to fine."
While commenting on the nature of privacy, the
Court ruled that while the individual is entitled The High Court of Delhi in 2009,

to a zone of privacy, its extent is based not only decriminalised consensual homosexual sex in

on the subjective expectation of the individual Naz Foundationv. NCT ofDelhi1 4 and held,

but on an objective principle which defines a "The sphere of privacy allows persons to

reasonable expectation. Inspite of having settled develop human relations without interference

the legal position of this much disputed, a from the outside community or from the State.

comprehensive privacy policy is needed to The exercise of autonomy enables an individual

establish a delicate balance between the to attain fulfilment, grow in self-esteem, build

legitimate concern of the State and individual relationshipsof his or her choice and fulfil all
*
interest 12 legitimate goals that he or she may set. In the
Indian Constitution, the right to live with dignity
RECENT CONTROVERSIES ON RIGHT To and the right of privacy both are recognized as
PRIVACY dimensions of Article 21. § 377 IPC denies a
person's dignity and criminalizeshis or her core
Currently there are many cases and appeals
identity solely on account of his or her sexuality
pending in various courts in India the
and thus violates Article 21 of the Constitution.
substratum of which is the right to privacy.
As it stands, § 377 IPC denies a gay person a
Firstly, in the Naz Foundation case, the Apex right to full personhood which is implicit in
Court of India, is hearing a curative petition on notion of lfe under Article 21 of the

12 Justice Puttaswamy (Retd.) and Anr. v. Union of India 13 Indian Penal Code (45 of 1860), § 377.
and Ors., W. P. (C) No. 494 of 2012 and W. P. (C) No.
000372/2017, 24 August, 2017, Supreme Court of India. 14 160 Delhi Law Times 277.

5
Constitution. world's biggest surveillance system by

"
obtaining biometric and linking the card to
However, the Supreme Court of India, in appeal,
services such as filing of Tax Returns, Bank
overturned the judgment of the Delhi High
Accounts etc. A constitutional bench headed by
Court in the case of Suresh Kumar Koushal

&
the then CJI, H.L. Dattu, held that Aadhar card
Anr vs Naz Foundation& Ors

.
is to be voluntary and not mandatory, however,
In 2014, the Supreme Court, in a landmark it is being made mandatory for certain schemes,
judgement, directed the government to treat the for example it has been made mandatory for
transgenders as the 'third gender' and to include availing of minority students' scholarships. In
them in the OBC quota. But the matter some ways, the policy decisions around Aadhar
pertaining to § 377 is still pending. can be seen as illustrative of erosion of

Secondly, the Aadhar Card scheme has been Parliament, for ex., Money Bill aspect of

under attack ever since its institution. However, Aadhar card. Moreover the Standing Committee

the Apex Court, in the case of Justice of Finance of 15th Lok Sabha had observed that

Puttaswamy v. Union of Indial6 , quelled the the scheme was "ladled with lacunae" and was

debate for a while by holding that the ambiguous. The Committee was of the opinion

information obtained by the authorities will that a comprehensive privacy law is a

have restricted use i.e. for PDS Scheme, and prerequisite of the scheme. It is also an erosion

will not be sued for any other purpose, except of the rights of the citizens. Despite the defence

by the leave of the court for the purpose of and clarifications offered by Nandan Nilekani,

criminal investigation. Further, it recommended the brain behind the UIDAI, it can be seen that

the institution of a constitutional bench to this scheme is not only questionable but has

determine the legal position of right to privacy. failed on several metrics. Recently, the Aadhar

Yet, after some time, the Aadhar card issue details of 10 lakh citizens were made public by

reared its head again. It is being referred to as an Jharkhand Directorate of Social Security due to

undemocratic way which is being used to take a programming order, which further fuelled the

away the right to privacy. Many believe that debate surrounding the scheme.

Aadhar Card Scheme is being converted into the


Thirdly, the WhatsApp Controversy,
Karmanya Singh Sareen and Shreya Sethi had
15 11 December, 2013.
filed a PL with respect to change in privacy
16 11 August, 2015, Supreme Court of India.
policy of WhatsApp without informing users

6
which does not amount to fair practice and is Secondly, Venkata Challiah Commission, the
moreover, hit by the principle of estoppel. National Commission to review the working of
WhatsApp, after being acquired by Facebook the Constitution (NCRWC) also known as
had started sharing the information of the users Justice Manepalli Narayana Rao Venkatachaliah
with Facebook in order to improve Commission was set up on 22 February 2000 for
advertisements and product service. A bench of suggesting possible amendments to the
the Delhi High Court headed by the then CJ G. Constitution of India. The commission
Rohini, granted partial relief and ordered recommended the insertion of Article 21B in the
WhatsApp to delete all the user information till Indian Constitution, which would read as
25 September, 2016, however, the bench did not follows:
declare the sharing of information by the
"21-B. (1) Every person has a right to respect
enterprise in the future as illegal by stating that
for his private andfamily life, his home and his
the users who do not wish for their information
correspondence.
to be shared to opt for the deletion of WhatsApp
account. An appeal was filed with respect to the (2) Nothing in clause (1) shallprevent the State

latter part of the judgment, which is currently from making any law imposing reasonable

pending before the constitution bench of the restrictions on the exercise of the right

Supreme Court. conferred by clause (1), in the interests of


security of the State, public safety or for the
LEGISLATIVE ATTEMPTS TOWARDS prevention of disorder or crime, or for the
SECURING RIGHT To PRIVACY protection of health or morals, or for the
protection of the rights and freedoms of
There have been various legislative attempts to
others. "1
secure the right to privacy, however, they have
not been very successful. Firstly, as per the Unfortunately, it took fifteen years from the date

Information Technology Act, 2000, when a of submission of this report to accept Right to

body corporate fails to protect personal data it Privacy as a Fundamental Right, and yet, a

owns or controls, such body corporate shall be comprehensive privacy policy is yet to be

liable to pay damages by way of devised.

compensation".

18 Justice Venkata Challiah Committee Report, Vol. 1,


" Information Technology Amendment Act, 2008, § 43A. 3.12, http://lawmin.nic.in/ncrwc/finalreport/vlch3.htm.

7
Finally, despite there being three Right To Democracies survive on a delicate balance of
Privacy Bills, neither of the bills have been power between the government - and the
given the status of a statute. As per the bills, citizens. The more power citizens get, the more
Right to privacy could not be infringed except robust the democracy. As the government
according to provisions of the act or law. The accrues more power to itself, it erodes
grounds for infringing the right to privacy democracy to a point where it ceases to exist.
included: (a) sovereignty and security of India, Thus, privacy is essential to a democracy as it
technical and economic interests (b) preventing provides for personal autonomy, gives an
incitement to the commission of an offence (c) opportunity for emotional release and self-
prevention of public order or for detecting crime evaluation. Therefore, there's a need for a
(d) protection of freedom and rights of others comprehensive privacy policy. Firstly, to offer
(d) in the interest of friendly relations with protection from surveillance, search and
foreign states (e) any other purpose specifically seizure. The issue of protection from
mentioned in the actl 9. As per the bills, (a) surveillance was dealt with in Kharak Singh v
collection, storage, processing and disclosure of State of UP2 1, wherein the Police abused its
personal data, (b) interception or monitoring of power of surveillance, by forcibly entering the
communication of individuals, (c) surveillance plaintiffs house and searching it, keeping a
of individual constitute the infringement of right close watch on him, dragging him at times to the
20
to privacy . Provisions were made for the police station etc. Hence, the citizens need to be
establishment of Data Protection Authority of protected from such arbitrary exercise and abuse
India, National Data Control Registry and of power.
Appellate Tribunals. Penalties for violating right
Secondly, for the privacy of the body. The
to privacy have also been incorporated in the
citizens have an exclusive right over their body,
bill, for example, penalty for undertaking
they need to be given the liberty to choose and
surveillance in certain cases would be
decide what's correct for them. For example, the
imprisonment for five years.
Medical termination of Pregnancy Act prevents

NEED FOR A COMPREHENSIVE PRIVACY a woman from exercising her right of abortion
by permitting abortion under certain
POLICY
circumstances only. The other issues which fall
19 Right to Privacy Bill, 2011.
20 Supra. 21 AIR 1963 SC 1295.

8
under the ambit of Medical Privacy are: the When in 2013, the whistle-blower contractor of
ability of the state to order persons to undergo USA's National Security Agency (NSA),
medical-examination and to submit to DNA Edward Snowden, quivered the world by
testing in civil suits, to undergo a range of 'truth disclosing the extensive global surveillance
technologies' including narco analysis, brain programs by the US Government; the
mapping, etc., Thirdly, to Protect reputation. worldwide perception of the common man, that
This issue emanates from the Auto Shanker even the world's largest democracies are free
case2 2 . With the growing technology and from governmental interference was shattered.
increasing role of media, a mechanism for the Little did we know that even India had its own
protection of reputation is of utmost importance. surveillance program, like NSA, since 2007. It
And finally, for the protection of records, enables the Indian Government to keep track in
communication and protection from real time of 900 million mobile phones and
interception in the digital age: It was in landlines and 160 million internet users.
People's Union for Civil Liberties v. Union of
STATE AGENCIES AND SURVEILLANCE
India 23 , or better known as the Telephone-
tapping case, that the question of intimate and ORGANISATIONS

confidential nature of communications was After the perturbing 26/11 terrorist attacks in
brought under the scanner, and the right to Mumbai, the government of India introduced
privacy was upheld. Therefore, in this digital many data sharing and surveillance systems.
age, with the increasing rate of cybercrime, a The data sharing schemes being the National
comprehensive privacy policy is inevitable. Intelligence Grid (NATGRID) and the Crime
and Criminal Tracking Network & Systems
SURVEILLANCE
(CCTNS) while the surveillance systems being
"Arguing that you don't care about the right to the Central Monitoring System (CMS), Lawful
privacy because you have nothing to hide is no Intercept and Monitoring (LIM) system and the
different than saying you don't care about free Network Traffic Analysis system (NETRA) and
speech because you have nothing to say." many other state Internet Monitoring Systems.

- Edward Snowden The purpose of these bodies is to increase public


safety and national security by tackling crime

22 AIR 1995 SC 264. and terrorism.


23 (1997) 1 SCC 30.
National Intelligence Grid (NATGRID) is an

9
intelligence grid which will consolidate data creating a hub of criminal information collected
gathered from various agencies and will link the and stored by various police officers.2 6 The
databases of various departments and ministries access of the same will be provided to the police
of the government of India. It will serve as a stations and to intelligence and national security
one-stop shop for accessing the linked data by agencies.
the intelligence agencies. Under NATGRID, 21
Central Monitoring System (CMS) is an
sets of databases will be networked to achieve
interception system that enables government
quick, seamless and secure access to desired
agencies to intercept communications without
information for intelligence/enforcement
requiring court orders or needing to
agencies 2 4
communicate with the telecom service
Crime and Criminal Tracking Network and providers. It is the most important surveillance
System (CCTNS) on the other hand is a network system that monitors text messages, social-
that allows the collection, storage, retrieval, media engagement and phone calls on landlines
analysis, transfer and sharing of information and cell phones, among other communications.
relation to crimes and criminals across the Once fully implemented, CMS will allow the
country.2 5 Since there used to be no database for government to "listen and tape phone
the police officers to refer to, to gather and share conversations, read e-mails and text messages,
any information about a criminal and store it monitor posts on Facebook, Twitter, or
virtually, CCTNS was implemented as an Linkedln, and track searches on Google." 2 7 It
ambitious scheme by the Government of India, will also empower the government to keep a real
to maintain a record of crimes and criminals and time track of our whereabouts using GPS
to share the information with other police embedded in our mobile phones.
stations using computer and maintaining a
Lawful Intercept & Monitoring (LIM) Systems
connectivity between various police stations
26P. Chidambaram, Ex-Union Home Minister, Ex-Union
24 Government of India, Ministry of Home Affairs, PRESS Home Minister's mission statement for NCRB under
CCTNS, CRIME AND CRIMINAL TRACKING NETWORK
&

INFORMATION BUREAU, Home Minister proposes radical SYSTEM (CCTNS), National Crime Records Bureau,
restructuring of security architecture, (December 23, Ministry of Home Affairs, http://ncrb.nic.in/cctns.htm.
2009),
http://www.pib.nic.in/newsite/erelease.aspx?relid=56395. 27 Editorial, "India sets up elaborate system to tap phone
NATIONAL
calls, e-mail" The Reuters, June 20, 2013, 2:46 AM,
25 CRIME RECORDS BUREAU, Ministry of
http://www.reuters.com/article/2013/06/20/us-india-
Home Affairs, surveillance-idUSBRE95JO5G2 0130620
http://ncrb.gov.in/BureauDivisions/CCTNS/cctns.htm
(April 30, 2017).

10
were deployed by the Government of India to (b) forecasting cyber security incidents by
monitor records of voice, SMS, GPRS data, making use of information available on
details of a subscriber's application and recharge cyber space
history and call detail record (CDR), emails, (c) handling cyber security incidents
web browsing, Skype and any other internet (d) issuing guidelines, advisories,
activity. The LIM Program consists of installing vulnerability notes and whitepapers
interception, monitoring and storage programs relating to information security
at international gateways, internet exchange practices, procedures, prevention,
hubs as well as ISP nodes across the country. response and reporting of cyber
These programs help the government have an incidents.
unfettered access to petabytes of user data on a CERT-In has access to all the information
daily basis. available on cyberspace and the power to
regulate the same.
Network Traffic Analysis (NETRA) is real time
surveillance software developed by the Centre Unique Identification Authority of India (UTD
for Artificial Intelligence and Robotics (CAIR) scheme) or Aadhaar, currently referred to as a
at the Defence Research and Development ticking time bomb, is a 12 digit unique-identity
Organization (DRDO). It is used to detect voice number issued to all Indian residents. It is based
traffic from Skype, Google Talk etc. as well as on their biometric and demographic data which
detection of real time keywords and key phrases is collected by the Unique Identification
such as bomb, blast, attack etc. on social media, Authority of India (UIDAI), a statutory
blogs, tweets, emails and instant messaging authority established under the Aadhaar Act
services. It is mainly used for tackling crime and 2016. It is the world's largest biometric ID
terrorism in India. system, with over 1.133 billion enrolled
members as of 31 March 2017. The government
Indian Computer Emergency Response Team
by linking all the services with the UID number
(CERT-In) has been established under § 70B of
can easily monitor anyone continuously. 28
IT(Amendment) Act 2008 to serve as an agency
to regulate the cyber space and provide for Lastly, the National Counter Terrorism Centre
cyber security by (NCTC). The 26/11 attacks led to the genesis of

(a) collecting, analysing and disseminating


28 Binoy Viswam v. Union of India,
information on cyber incidents MANU/SC/0693/2017.

11
NCTC. Based on the model of American NCTC direct that any message or class of messages to
and British Joint Terrorism Analysis Centre, the or from any person or class of persons, or
Indian NCTC, derives it powers from Unlawful relating to any particular subject, brought for
Activities Prevention Act, 1967. However, the transmission by or transmitted or received by
establishment of the NCTC would lead to any telegraph, shall not be transmitted, or shall
concentration of powers pertaining to be intercepted or detained, or shall be disclosed
intelligence and operation, which would disrupt to the Government making the order or an
the autonomy of the states and would add to the officer thereof mentioned in the order: Provided
bureaucratic tangle. that the press messages intended to be published
in India of correspondents accredited to the
LEGISILATIONS SUPPORTING
Central Government or a State Government
SURVEILLANCE shall not be intercepted or detained, unless their

Erstwhile, the only substantive law supporting transmission has been prohibited under this sub-

the state surveillance activities was the Indian section."

Telegraph Act, 1855; however, with the While § 5(2) forms the substantive part of the
technological boom and revolution, the law, the procedure for the same is prescribed
Information Technology Act, 2000 was under Rule 419A of the Indian Telegraph
introduced to facilitate internet surveillance. Rules, 1951, introduced via amendment Act of

According to § 5(2) of the Indian Telegraph 2007. As per this rule, the direction for

Act, 1885, "On the occurrence of any public interception, as specified in § 5(2) of the Indian

emergency, or in the interest of the public Telegraph Act, can only be given by Union/

safety, the Central Government or a State State Home Secretary. However, in unavoidable

Government or any officer specially authorised circumstances, a lawful order may be issued by,

in this behalf by the Central Government or a with the prior permission of the Union or State

State Government may, if satisfied that it is Home Secretary, an officer not below the rank

necessary or expedient so to do in the interests of Joint Secretary to Gol. Pursuant to Rule

of the sovereignty and integrity of India, the 419A, service providers required by law

security of the State, friendly relations with enforcement to intercept communications are

foreign states or public order or for preventing mandated to comply with certain provisions

incitement to the commission of an offence, for which include the appointment of nodal officers

reasons to be recorded in writing, by order, to deal with interception requests and to prevent

12
its unauthorised usage. The licenses of the As per Rule 6 of Information Technology
service providers stand to be revoked on non- (Reasonable Security Practices and
compliance of these rules, resulting in breach of Procedures and Sensitive Personal Data or
secrecy. Information) Rules, 2011, a body corporate
though disallowed from divesting information to
Sections 69 and 69B of Information
a third party without the consent of the provider,
Technology Act, 2000 pertain to matters of web
may disclose the same without consent of the
surveillance. § 69, is similar to § 5(2) of the
provider to the government agencies mandated
Indian Telegraph Act, 1855. It provides for
under law for the purpose of verification,
interception, monitoring and decryption of
investigation etc.
computer sources by Central and State
Governments in national interest. While § 69B, Rule 3(7) of Information Technology
grants the Central Government the "power to (Intermediaries Guidelines) Rules, 2011,
authorize to monitor and collect traffic data or requires the ISP's etc., under a lawful order to
information through any computer resource for provide authorized government agencies with
,,29
Cyber Security information for identity verification etc.

Information Technology (Procedure and As per Rule 7, Information Technology


Safeguards for Interception, Monitoring and (Guidelines for Cyber Cafe) Rules, 2011, an
Decryption of Information) Rules, 2009 lay officer may investigate the records of a cyber
down the procedure for invoking § 69 of the cafe and the owner has to comply with same and
Information Technology Act, 2000 and is a provide all the records, search history etc.
replica of Rule 419A (as stated above).
Aadhar Act, 2016 is one of the most
Information Technology (Procedure and controversial acts, it was passed by the Lok
Safeguards for Monitoring and Collecting Sabha in March, 2016 to provide a legal backing
Traffic Data or Information) Rules, 2009 to the UIDAI Scheme.
prescribe the procedure for invoking § 69B of
The government is in the process of developing
the Information Technology Act, 2000 and is
rules for the compliance of § 67C of the IT Act,
near- identical to rule 419A.
2000, which may require the ISP's and
Applications like Facebook etc. to store and
29 Information Technology Act, 2000 (Act 21 of 2000), § collect data. For this purpose, the Data
69B.
Retention Rules Bill has been drafted.

13
These rules put in place several checks and report according to which several mobile phones
balances and try to ensure that there is an were under scanner.30
established "chain of custody" and paperwork
Moreover in 2011, Mr Milind Deora, had (in
for each and every detection and interception
Rajya Sabha) informed that the government had
request. The assumption is that with a clearly
acquired technology to monitor contents on
defined chain of due diligence and paperwork,
internet and had started surveillance on
the possibility of unauthorized interception is
Facebook and Twitter.3 1
reduced, which ensures that the powers of the
interception are not misused. However, although CONSTITUTIONALITY OF RIGHT OF
these checks and balances exist on paper, there SURVEILILANCE
is not enough information in the public domain
Ever since their inception, the surveillance
about the whole mechanism of the interception
systems have had to navigate through muddy
for anyone to make a clear judgment as to
waters, with their constitutionality being
whether the system in fact reduces the number
questioned time and again. Various international
of unauthorized interceptions.
statutes provide for the protection of rights and
INCIDENTS freedoms of citizens.

Surveillance in India can be traced back to the Article 19 of UDHR and ICCPR guarantee the

A. K. Gopalan case, however, the issue of mass right to freedom of opinion and expression.

surveillance was raised in the "Telephone- These articles hold that everybody has the right

tapping" case. Recently, apart from the to hold opinions without interference and to

WhatsApp and Aadhar card issue, surveillance obtain and convey information and ideas

reared its head in the BBM case (2012). through any media, regardless of the boundaries.
Unrestricted freedom of expression and
Blackberry allowed the government agencies
expression, as provided by the UDHR and the
access to personal messages on the messenger
ICCPR will be impossible if people have to live
post certain proposal from the Government of
India. Next, in 2012, The Hindu released a 30 Editorial, 10000 phones and 1000 email Ids under
scanner, THE HINDU REPORT, (October 12, 2012),
http://www.theindu.com/news/national/10000-phones-
1000-email-ids-under-the-scanner/article3992185.ece.
31 Ranjit Sur, People under surveillance, privacy law for
whom?, (November 5, 2012),
http://sanhati.com/excerpted/5753/.

14
in constant fear of the sanction for their unconstitutional by the American Union for
unpopular opinions or information, even in Civil Liberties in the case of ACLU v.
private forums. Furthermore, Articles 12 and 17 Clapper 3 3 . This is directly relevant to India, in
of the UDHR and the ICCPR guarantee the view of our own Central Monitoring System
Right to Privacy. General Comment No. 16 (CMS) which goes much further. In addition to
(1988) by the Centre of Civil and Political the submission of right to privacy, ACLU also
Rights (CCPR) adopted by the United Nations argued that mass surveillance violated the
Human Rights Council (CCPR) states that freedom of association, implicitly mentioned in
Surveillance, whether it was electronic or the American First Amendment and confirmed
otherwise, interception of telephone, telegraphic by a long series of cases. In India, this right is
and other communication forms, wire-tapping expressly guaranteed by the Constitution.
and recording of conversations, should be
Alexander Abdo, Council for ACLU, stated in
prohibited. The storage of information on
his arguments that "Imagine the government
computers, databases and other devices, whether
coming to your home every evening and forcing
by public bodies or individuals or corporations,
you to hand in all your calls for that day. Is not
must be regulated by law. No one should be
that a clear violation of the Fourth and First
subjected to arbitrary interference with privacy,
Amendments?" By repercussion, of course, this
family, home or correspondence or to attacks
whole argument holds with the same force for
upon his honour or his prestige. Everyone has
Free Expression (Article 19 (1) (a)). There are,
the right to the protection of the law against
therefore, two questions which we must take
such interventions or attacks.3 2
into account: to what extent do Article 19 (1) (a)
Thus, the Indian Surveillance Systems must be and Article 19 (1) (c) embody the Doctrine of
formatted and reviewed, so that they are in the Chilling Effect; and what is the standard of
conformity and in no in breach of these security applicable according to Articles 19(2)
International Statutes and Standards. and 19(4). There is a considerable amount of
jurisprudence and precedents interpreting the
In United States of America, the mass
"reasonable restrictions in the interests of
surveillance program of the National Security
sovereignty and integrity of India", and most of
Agency (NSA) has been challenged as being
them point to a general proportionality test.

32 UNIVERSAL DECLARATION OF HUMAN RIGHTS, (January


27, 1997), http://www.hrweb.org/legal/udhr.html. 33 No. 13-3994 (S.D. New York December 28, 2013).

15
However, the sheer scale and the degree of mass is an essential part of these rules. With these
monitoring require a more precise examination. instruments, European Union also enacted two
directives which provide the citizens with wide
Various countries across the globe have
range of rights and protections against misuse of
expressly recognised the right to privacy. The
their data. It also enunciates right to know
emergence of modem legislation in this area can
where the data originated, right to have
be traced back to 1970. The first data protection
erroneous data rectified and right to withhold
law in the world was passed in the state of
grant and permission to use the data in certain
Hesse in Germany. This was followed by
circumstances.
Sweden (1973), the United States (1974),
Germany (1977) and France (1978). Europe, in The crippled surveillance systems devised in
this crucial time developed two important India, not only violate human and fundamental
instruments i.e. The Council of Europe's 1981 rights, but also are an epitome of arbitrary use of
Convention for the Protection of Individuals power. §. 5 (2) of the Telegraph Act and §. 26
with regard to the Automatic Processing of (2) of the Indian Post Office Act outline a two-
Personal Data 3 4 and the Organization for stage examination before the tapping of
Economic Cooperation and Development's telegraph or postal articles. The first stage
Guidelines Governing the Protection of Privacy consists of sine qua nons in the form of an
and Transborder Data Flows of Personal Data 35 'occurrence of the public emergency" or "in the
which enunciated specific rules for the handling interests of public security". The second set of
of electronic data. The rules in these two requirements according to the provisions is "the
documents form the core of the data protection interests of the sovereignty and integrity of
laws of dozens of countries. These rules India, the security of the state, the friendly
describe personal data as data which seeks to relations with the foreign states or the public
provide protection at every step i.e. from order or the prevention of incitement to commit
collection till storage and dissemination. The a crime." The sections consider a legal fiction in
right of a person to access and change their data which a public emergency exists and it is the
interest of the sovereignty, the integrity, the
3 Convention for the Protection of Individuals with
security of the state or the maintenance of public
regard to the Automatic Processing of Personal Data
Convention, ETS No. 108, Stasbourg, 1981. order / friendly relations with foreign states.
3 OECD, Guidelines governing the Protectionof Privacy
However, the term "public emergency" has not
and Transborder Data Flows of Personal Data , Paris,
1981 been clearly defined by the legislature or the

16
courts. It, therefore, vests arbitrary powers in an And the same has been disregarded by those
official to order the interception of framing the surveillance legislations.
communication which violates fundamental
Though the Right of Surveillance of the State
rights. The Supreme Court in State of MP v.
for national protection is not per se
Baldeo Prasad3 6 considered that a statute must
unconstitutional, but the arbitrary and
not only provide adequate safeguards for the
unregulated use of this right is unconstitutional.
protection of innocent citizens, but also the
The Indian Legislation, hence, suffer from
administrative authority must be satisfied of the
various loopholes.
existence of the (clearly laid down) prerequisites
before issuing an order with respect to the same. USE AND ABUSE OF SURVEILLANCE
If the statute failed to do so in respect to any
The Central Monitoring System (CMS) was
condition precedent, then the law suffered from
approved by the Cabinet Committee on Security
a weakness and was deprecated as invalid. [17]
(CCS) on 16 June 2011. Since then, the CMS
The question of the existence of the public
has been operated by India's Telecom
emergency which is left to the sole
Enforcement Resource and Monitoring (TERM)
determination of an administrative officer can
cells and has been implemented by the Centre
be challenged on the ground of being arbitrary
for Development of Telematics (C-DOT). The
and in contravention to Article 14 of the Indian
government uses surveillance for intelligence
Constitution.
gathering, prevention of crime, the protection of
Moreover, Surveillance, as practiced in India, a process, person, group or object, or the
violates Article 19 of the Indian Constitution. investigation of crime. Basically is it used to
The fundamental rights referred to in Article maintain national security and prevention of
19(1) cannot be shortened in any way outside terrorism. But is it justified to do so while taking
the relevant provisions of Cls. 2-6.37 The a toll on the fundamental and human rights of
restrictive clauses in Cls. (2) - (6) of Article 19 the citizens? Will it be justified if an unfettered
38
are exhaustive and must be interpreted strictly. power is given to the government officials
without any responsibility and liability? Who
36 AIR 1961 (SC) 293 (296).
will be held liable for any misuse of such
37Ghosh O.K. v. Joseph E.X. AIR 1963 SC 812; 1963
Supp. (1) SCR 789.
arbitrary power? How will they be punished?
38Sakal Papers (P) Ltd. v. Union of India, AIR 1962 SC
305 (315); 1962 (3) SCR 842.

17
The existing Indian laws do not answer all these online system for filing and processing of all
questions. The Central Monitoring System lawful interception requests, an electronic audit
(CMS) was announced in 2011, but there was trail will be in place for each phone number put
40
no public debate on it and the government has under surveillance." It is still unclear that who
given little thought about how it will work or will audit the audit trail? The same ministry
how it will ensure that the system will not be which authorizes the surveillance requests?
abused. The surveillance agencies have got Moreover, the surveillance cameras in public
unfettered access to all our personal data with places can be misused by officials who want to
no reliability for the misuse of the same. "No harass or blackmail their political enemies or
information has been made available about opponents. And the lack of any privacy laws in
whose data will be collected, how the collected India makes the systems more vulnerable to
will be used, or how long the data will be misuse.
39
retained." There is no statutory redressal
Thus, what we have here is a country with an
mechanism in case of illegal interception and
extremely high level of corruption, no data
monitoring of information and communications
protection laws, no strict privacy policy and an
by the State. These agencies are exempted from
unregulated monitoring system which lacks
disclosing information about themselves as per
public and parliamentary debate prior to its
§. 8 of the Right to Information Act, 2005 and
implementation.4 1 "If India doesn't want to look
hence operate without judicial or legislative
like an authoritarian regime, it needs to be
purview. Moreover, these Surveillance
transparent about who will be authorized to
programs are not in conformity with any of the
collect data, what data will be collected, how it
'International Principles on the Application of
will be used, and how the right to privacy will
Human Rights to Communications
be protected, "42 Hence, the introduction of
Surveillance'. Hence, it is natural to presume
that the Surveillance system might be abused.
40 Editorial, Govt tightens control for phone tapping,
Its present vagueness and excessive control over TIMEs OF INDIA, (Jun 18, 2013),
http://timesofindia.indiatimes.com/india/Govt-tightens-
communication can create a potential for control-for-phone-
tapping/articleshow/20640273.cms?referral=PM.
unprecedented abuse. "CMS will involve an
41 Maria Xynou, (January 30, 2014), https://cis-
india.org/intemet-governance/blog/india-central-
monitoring-system-something-to-worry-about.
39 Stakeholder Report by the INTERNET DEMOCRACY
PROJECT on India's Universal Periodic Review: Third 42 Cynthia Wong, an Internet researcher at New York-
cycle based Human Rights Watch.

18
privacy legislations is the need of the hour. A the right to privacy and data protection. Even
solid framework and proper legislations are also though the security concerns of the Indian
needed to give a legitimate backing and to Government may be justified, the protection of
control all the functions of the Surveillance data and privacy can't be ensured by the
systems in India so as to make sure that the government with such flawed schemes having
power is not misused or used arbitrarily. The no framework, set rules and regulations, penal
legislations need to entail laws on the provisions or accountability for the same.
repercussions of misuse of data, to ensure the Further, the UID Project as of now does not
protection of rights of citizens against illegal provide for any safeguards for the protection of
interception of calls and messages, a basic privacy nor does it prescribe any obligations on
framework and guidelines for deciding whose the government agencies.
conversations and activities will be intercepted
Talking about the conflict between the right to
and also making an independent body to audit
privacy and surveillance, the latter subjugates
the interception of data. Without these measures
the civil and fundamental rights of the people,
the abuse of power can't have sighted and
who are left with no remedies. This can be
rectified.
proved by the fact that India hitherto does not
Thus, to secure the safety of the nation and to have any Privacy legislations and the only
balance the same with the rights of the elderly Privacy Bill is yet to see the light of the
individuals in a democratic nation, a regulated day, accentuating the conflict between Right to
use of surveillance needs to be encouraged Privacy and Surveillance.
while its abuse should be discouraged.
It poses an even greater threat on the privacy of

CONFLICT BETWEEN RIGHT To the citizens because, albeit the right to privacy
has been held to be the part of Article 21, the
PRIVACY AND SURVEILILANCE
citizens won't be able to enforce it because most
The Surveillance programs of the Indian of these surveillance agencies require the
Government are having pejorative impact on the Network Operators, Internet Service Providers
civil and fundamental rights of the people. The (ISPs) and Telecommunications Service
right to Privacy has been held to be a part and Providers (TSPs) like Bharti Airtel, Jio, Idea
parcel of Article 21 and has now been and Vodafone to intercept the data and are the
acknowledged as a Fundamental Right flowing actual ones who invade our privacy, yet not
from Right to Life. The IT Act also provides for

19
falling within the definition of 'State' under the people, ensure rightful surveillance for the
Article 12. purposes of maintaining national security. The
'Council of Europe's 1981 Convention for the
It's not just India, but these fundamental right
Protection of Individuals' regarding the
violations are carried out in most of the
'Automatic Processing of Personal Data' and
democratic countries in the name of national
the 'Organization for Economic Cooperation
security and public emergency. US State
and Development's Guidelines Governing the
Department in its annual review found out that
Protection of Privacy and Transborder Data
there are about 90 countries which are engaged
Flows of Personal Data' articulated the specific
in illegally monitoring the communications of
rules with respect to handling of electronic data.
political opponents, human right workers,
The rules have been given force by these two
journalists and suspected people. This poses a
accords to ensure that the personal information
threat to the rights of the innocent people, so
gets protection at every step, from collection till
much so that for example, in Japan, the police
its dissemination. The Conventions also allow
were fined 2.5 million for illegally tapping the
the people to access and amend their personal
phones of the members of the Communist Party.
data. These laws require the personal
Amidst the controversies like these in so many
information to the obtained fairly and lawfully,
countries, there are countries who have
and to be used only for the original specified
successfully tackled this conflict. While dealing
purpose while making sure that the data
with the increasing surveillance practices, many
collected is adequate, relevant and not excessive
countries have reacted by introducing specific
to purpose it is collected for. They also require
rules governing the collection and handling of
the data to be accurate and up to date and most
personal information. In these countries, the
importantly ensure that it's destroyed after its
constitutional provisions pertaining to
purpose has been completed.
surveillance and privacy have been amended
Thus, it is crystal clear that national security is a
accordingly. One of the first legislations in this
priority and must not be compromised due to the
regard was passed in the Land of Hesse in
rights of few private individuals, however due
Germany in 1970, followed by the laws in
consideration must be paid to the implications it
Sweden, 1973; USA, 1974; Germany, 1977 and
has on the civil and fundamental rights of the
France, 1978. The European Union had a major
innocent citizens.
role to play in bringing about all these
legislations which while protecting the rights of

20
IDENTIFICATION OF ISSUES AND lay down the justifiable reasons for

RECOMMENDATIONS infringing the Right to Privacy.


3. § 5(2) of Indian telegraph Act, 1855
The dispute over the existence of Right to
and Sections 69 and 69B of
Privacy in India and concerns over abuse of
Information Technology Act, 2000:
surveillance power by administrative authorities
These sections support surveillance for
have existed since before independence. Thus,
protection of sovereignty, security of
in order to protect the Indian democracy, to
state, friendly relations, public order and
safeguard the fundamental rights and to
prevention of offences, however, they
exterminate threats to national peace and
fail to clearly define these terms. Hence,
security and sovereignty, several changes need
to prevent miscarriage of justice in the
to be introduced. The recommendations are as
future, these sections should be amended
follows:
and the explanations for the above
1. Comprehensive Privacy Legislation: mentioned terms should be incorporated.
According to Article 21 no one can be 4. Rule 419A of the Indian Telegraph
deprived of their right to life except by Rules, 1951: The said rule refers to
'unavoidable circumstances' however,
the procedure established by law. Thus,
the Indian Legislature should table, fails to offer an explanation of the same.
amend the Privacy Bills drafted in 2011, Thus, this rule must be amended to
2014 and 2016 to close all the loopholes explain the above phrase.
and pass the same in order to provide the 5. Information Technology
citizens of India with a cosmic privacy (Intermediaries Guidelines) Rules,
policy and to provide for a mechanism 2011: Rule 3(7) uses the terms 'lawful
for the encroachment of privacy in order' and 'request in writing'
certain cases. interchangeably, which leads to
2. Justifiable reasons for impinging confusion and seemingly implies that a
privacy: While establishing a nexus 'lawful order' as envisioned is a written
between need and legitimate state aim letter from the government agencies and
and ensuring that means are proportional does not bear the force of law, thus
to object, the legislature should clearly inordinately simplifying the process and
thereby, increasing the chances of abuse

21
of power. Therefore, it is essential to composition, duties and powers; also,
amend this rule prevent the future abuse the circumstances in which such
of this rule. surveillance may be permitted, and the
6. Aadhar Act: The Aadhar Act must be procedure for surveillance must be
amended and provisions should be codified. Provisions should be laid down
incorporated to safeguard the rights and to ensure accountability of surveillance
information of the citizens, and to agencies and officers and penalty should
increase the confidence of the citizens in be imposed for abuse of power and for
the scheme. "failure to protect data"4 3
7. Development of strong encryption and 10. Establish interface between the two
data protection system: The executive rights: Right to privacy and right of
should focus on the development of a surveillance are two conflicting rights,
strong encryption and data protection yet, they need to coexist so that
system to safeguard the personal data of democracy can flourish and sovereignty
the citizens and to promote financial, and security of the nation can be
medical, technical and generic privacy. maintained. Hence, the pillars of our
8. Limiting discretionary powers of democracy need to focus on paving a
authority with respect to usage of way for the coexistence of the two above
personal data of individuals: All the stated rights by establishing interface
laws, as mentioned above, need to be between them.
amended to limit the discretionary
CONCLUSION
powers of the concerned authorities with
respect to the procurement and usage of After so many years and numerous judgments,
personal data of the citizens. Right to Privacy has been acknowledged.
9. Enactment of statutes with respect to However, a clear picture is yet to emerge with
surveillance: The confusion respect to its extent. India is a democratic
surrounding surveillance is leading to republic, and accordingly this right flows from
the development of fear amongst the the Constitution itself. Right to Privacy is not
citizens. Hence, statutes should be only implicit in but forms the backbone of
enacted to provide for Surveillance
agencies by clearly stating their
4Information Technology Amendment Act, 2008 (No. 10
OF 2009), § 43A.

22
Article 21. If there is no privacy, then how can end - by giving the ruling oligarchy unbridled
personal liberty be recognized. Also, if there is power to keep the citizens under watch so that
no privacy then isn't the concept of life they are rendered incapable of questioning
equivalent to mere animal existence? Thus, the them. Moreover, this is the age of information,
Supreme Court while recognising privacy as a wherein, information is power and internet is all
fundamental right held that pursuit of happiness pervasive. Thus, there are stark implications on
is founded upon autonomy and dignity. the position of the individual where data is
ubiquitous.
It is through brute force and guile, unrestricted
surveillance ensures an omnipotent and Thus, an interface needs to be established
omnipresent government that will have between the rights after clarifying their legal
suspicion of its citizens as the default option, position, imposing limitations and reasonable
which is exactly how democracies come to an restrictions on them.

23

You might also like