Skip to main content

Data Privacy Breach in India

                                                      Data privacy breach in India


Introduction

The Right to Privacy is a constitutional right that allows an individual to govern the use and dissemination of their personal information. It is guaranteed under Article 21 of the Constitution. An individual can use this right to prevent their personal information from being collected, used, or disclosed.

 An individual can acquire and use a variety of different forms of personal information. Medical records, financial information, and habits and activities are just a few examples.There is a danger that the existence of computerized data about an individual could be used to create inaccurate or misleading information about him or her. This could be exploited by unauthorized third parties.

The Supreme Court stated in the State of Maharashtra v. Bharat Shanti Lai Shah 2008 that though interception of conversation constitutes an invasion of privacy, it can still be curtailed by following legal procedures. In order for the court to make the appropriate ruling, the procedure itself must be fair, just, and reasonable, and should not be arbitrary, frivolous, or oppressive. A person’s right to privacy cannot be infringed by an unrestrained authority. [Directorate of Revenue v. Mohd. NisarHolia .


What is a data privacy breach


A data breach occurs when someone's personal information is accessed without their permission. As a result, a data breach is defined as the disclosure of sensitive, confidential, or protected information. According to a research, India ranked third in the world in terms of data breaches from November 2016 to November 2021, with 86.63 million Indian consumers affected. Given the financial and security risks that a data breach might pose, this is a big worry. Criminals can use the information to create false ID cards, make fraudulent bank calls, and other criminal actions.

Smartphones, laptops, tabs, etc. have become indispensable products in the 21st century. It is very easy for anyone to gather details after a consumer downloads an app. The details often submitted are age, qualification, gender, location, interests, and Aadhar number. This is quite often sold for hefty amounts. Therefore, it is very crucial that there are stringent laws and their implementation to prevent such data breaches and transmission without consent. 

A data breach can result in the leak of several types of information such as:

Financial Data—such as credit card numbers, bank details, tax forms, invoices, financial statements

Medical or Personal Health Information (PHI)—as defined in the US HIPAA standard, “information that is created by a health care provider [and] relates to the past, present, or future physical or mental health or condition of any individual”

Personally Identifiable Information (PII)—information that can be used to identify, contact or locate a person

Intellectual property—such as patents, trade secrets, blueprints, customer lists, contracts

Vulnerable and sensitive information (usually of military or political nature)—such as meeting recordings or protocols, agreements, classified documents



Data privacy and protection


For the sake of privacy and data protection, a person's personal information should not be made readily available to other individuals and organisations on an automatic basis. Each individual must have a significant amount of control over the data. Individual information is legally protected from misuse on any medium, including computers. Administrative, technical, and physical safeguards are used to protect personal data. Data security and privacy are intertwined. Names, addresses, phone numbers, professions, families, interests, and other personal information can usually be found in a variety of places, including schools, colleges, banks, directories, surveys, and numerous websites. When such information is shared to interested parties, it might result in privacy invasions such as constant commercial calls.



Comments

Popular posts from this blog

Understanding Counterclaims: A Comprehensive Guide

  Understanding Counterclaims: A Comprehensive Guide In legal proceedings, a counterclaim is a vital tool that allows defendants to assert their own claims against the plaintiff. This strategic maneuver not only defends against the plaintiff's allegations but also enables defendants to seek their own relief. In this comprehensive guide, we delve into the intricacies of counterclaims, exploring their purpose, procedures, and implications in various legal contexts. Introduction to Counterclaims Definition A counterclaim is a legal claim brought by a defendant against the plaintiff in response to the plaintiff's initial complaint. It serves as a means for defendants to assert their own rights, defenses, or causes of action arising from the same transaction or occurrence as the plaintiff's claim. Purpose The primary purpose of a counterclaim is to allow defendants to present their side of the story and seek appropriate remedies or relief. By filing a counterclaim, defendants ca...

Title: Legal Recourse Against Electronic Harassment, Including V2K: Understanding Options and Rights

  Title: Legal Recourse Against Electronic Harassment, Including V2K: Understanding Options and Rights Electronic harassment, including technologies like Voice-to-Skull (V2K) and other forms of electronic harassment, can inflict significant psychological and emotional harm on individuals. Victims of such harassment often wonder if there are legal avenues available to seek redress and hold perpetrators accountable for their actions. While navigating legal action in cases of electronic harassment can be complex, understanding available options and rights is crucial. Here's a detailed exploration of the possibility of taking legal action against individuals engaged in electronic harassment: Understanding Electronic Harassment (0-7 days) : Electronic harassment encompasses a range of behaviors involving the use of electronic devices or technologies to inflict harm, including V2K, electronic surveillance, cyberstalking, and cyberbullying. V2K, in particular, refers to the transmission o...

Title: Understanding "Your Complaint has been Disposed under a Closed Complaint"

  Title: Understanding "Your Complaint has been Disposed under a Closed Complaint" When you receive a notification stating "Your complaint has been disposed under a closed complaint," it signifies the closure of the complaint you filed with the respective entity or organization. This phrase is commonly used by customer service departments, grievance redressal cells, regulatory bodies, or complaint management systems to inform complainants about the resolution status of their complaint. Here's a detailed explanation of what it means and its implications: Disposition of Complaint (0-7 days) : "Disposed" indicates that the complaint has been addressed, reviewed, and resolved by the concerned authority or entity. The closure of the complaint signifies that the responsible party has taken appropriate action to address the issues raised in the complaint. Closure Status (0-7 days) : "Closed complaint" indicates that the complaint resolution process ...