You are on page 1of 23

AN ARMISTICE BETWEEN RIGHT TO PRIVACY AND RIGHT OF

SURVEILLANCE

Varun Kalra and Ramisha Jain*

announcement of the Aadhar Card Scheme, the


ABSTRACT
tussle between the two has been gaining ground.
The Supreme Court on 24 August, 2017 upheld
This paper aims at critically analysing the legal
the Right to Privacy.1 Despite this proclamation,
position of right to privacy in India by tracing
a major question remains still unanswered that
the case- by- case development of this newly
“What does privacy mean for India”.
acknowledged right. Also, this paper seeks to
“What would be the impact of the change in discuss the controversies involving the right to
WhatsApp's privacy policy on the users? Is privacy, understand the need for a
Aadhar a surveillance mechanism? These are comprehensive privacy policy and to assess the
the issues which are still dominating the cause use and abuse of right of surveillance.
list of Supreme Court of India today. The object of this paper is to offer
The Indian Judiciary has recently answered a recommendations to end the tussle between the
question which will have a lingering effect on right to privacy and right of surveillance, by
the Indian democracy, that is, do the Indian clearly laying down the restrictions on right to
citizens have a right to privacy? According to privacy, by recognising surveillance agencies
Black’s law dictionary, right to privacy is, and providing for a code to limit and prevent
“right to be let alone; the right to live without the abuse of their powers and ultimately,
any unwarranted interference by the public in establishing an interface between the right to
matters with which the public is not necessarily privacy of the citizens of India and the right of
concerned”. However, this right has been in surveillance by the government of India.
conflict with the right of surveillance by the
sovereign since time immemorial. And since the INTRODUCTION

The Ghost of Christmas Past, Right to Privacy,


* Authors are fourth year B.A.LLB. (Hons.) students at
Amity Law School, Noida. had decided to reappear with the Aadhar case.
1
Justice K.S. Puttaswamy and Ors. v. Union of India
(UOI) and Ors., (2017) 6 MLJ 267.

Published in Articles section of www.manupatra.com


Not only did this issue once again sparked off interference or attacks.”
the debate that whether the right to privacy is
Right to Privacy is guaranteed in the American
guaranteed under Article 21 of the constitution
Constitution under the Fourth Amendment.
or not, but had also renewed the fierce battle
The Fourth Amendment to the United States
between right to privacy and right of
Constitution prohibits unreasonable searches
surveillance.
and seizures and requires any warrant to be
With the recent change in WhatsApp’s privacy judicially sanctioned and supported by probable
policy, questionable use of information by cause. It is part of the Bill of Rights and was
UIDAI and the growing tussle between the adopted in response to the abuse of the writ of
government agencies for more lethal assistance, a type of general search
surveillance systems, demand for privacy and warrant issued by the British government and a
freedom of speech and expression has been major source of tension in pre-Revolutionary
gaining ground. The right of privacy of the America.
citizens and the right of surveillance of the State
However, until recently, there was no such
are once again at loggerheads.
explicit guarantee, under the Indian Constitution
The need for privacy flows from the growing or so it was argued. According to Article 21,
individualistic society, a modern phenomenon. “No person can be deprived of his life and
personal liberty except according to the
According to Black’s Law Dictionary, right to
procedure established by law”. The question is
privacy is, “right to be let alone; the right of a
whether Right to life and Personal Liberty
person to be free from any unwarranted
include the Right to Privacy.
publicity; the right to live without any
unwarranted interference by the public in Amidst the controversy between National
matters with which the public is not necessarily Security and the Fundamental Rights of the
concerned”. people, it’s the Indian citizen who is in a no-win
situation.
As per Article 12 of the Universal Declaration
of Human Rights: “No one shall be subjected to It is a widespread idea that terrorism is a
arbitrary interference with his privacy, family, product of globalization and the Internet is a
home or correspondence, nor to attacks upon his tool used by the terrorists to communicate.
honor and reputation. Everyone has the right to Hence governments all around the world believe
the protection of the law against such that surveillance is the most effective methods

Published in Articles section of www.manupatra.com


of detecting and prosecuting terrorists. All the two above stated rights is brought to an end.
movements, actions, interests, ideas and
everything else that could define a common man
RIGHT TO PRIVACY IN INDIA AND ITS
or an individual can be known by surveillance. LEGAL POSITION
Mass-surveillance as we know today has been in
Right to Privacy is not enumerated in the Indian
practice since many years. Today, whatever we
Constitution, but the Indian Judiciary has from
do, from the moment we switch on our cell
time- to- time debated on the existence of this
phones, to navigating to a location using Google
right in the Indian Legal Framework and has
Maps, to catching a metro/bus with CCTV
culled the same from Article 21.
cameras, to using our credit cards for an online
(A) 1950- 2000
or offline purchase, we leave a digital trail
behind us. The government is capable of In, M. P. Sharma v. Satish Chandra2, it was held
knowing our medical history, routine, that, when the constitutional makers themselves
preference of food, religion, places of visit, the did not recognise the fundamental right to
movies we watch, the place we shop from, what privacy, then an analogy needn’t be drawn with
we purchase, whether we are having an affair or American Constitution in order to import this
not, everything. All these things are easily right “by some process of strained construction”
accessible through our digital trails, some of and thus, the existence of right to privacy in
which we ourselves provide to them by updating India was denied.
our statuses on WhatsApp, Snapchat, Facebook
However, in Kharak Singh v. State of UP3, the
etc. It is the appalling truth behind constant
apex court while acknowledging the existence
surveillance that the government carries out on
of right to privacy held that, despite the right not
us.
being expressly declared as a fundamental right,
Moreover, with the global surveillance it is “an essential ingredient of personal liberty”.
disclosures, right to privacy has become a The legal position of the disputed right was
subject of international debate. To combat upheld in Gobind v. State of Madhya Pradesh 4,
terrorism, government agencies are undermining wherein the bench held that “the right to privacy
this right. Another question which now needs in any event will necessarily have to go through
answering is that whether privacy needs to be
forfeited as a part of social contract. Hence, it is 2
AIR 1954 SC 300.
3
AIR 1963 SC 1295.
of utmost importance that the battle between the 4
AIR 1975 SC 1378.

Published in Articles section of www.manupatra.com


a process of case-by-case development.” right to privacy is Ram Jeth Milani v. Union of
Mathew, J. accepted “the right to privacy as an India8, wherein the ratio of the case was “Right
emanation from Art. 19(a), (d) and 21, but right to privacy is an integral part of right to life, a
to privacy is not absolute right.” Reiterating the cherished constitutional value and it is
same in R. Rajagopal v. State Of T.N.5, or better important that human beings be allowed
known as the Auto Shanker case, it was held domains of freedom that are free of public
that “A citizen has a right to safeguard the scrutiny unless they act in an unlawful manner.”
privacy of his own, his family, marriage, Another recent landmark judgement on the same
procreation, motherhood, child-bearing and is of Amar Singh v. Union of India9, where it
education among other matters. No one was upheld that it was the Court’s duty to
can publish anything concerning the above protect the right to privacy. Also in
matters without his consent, whether truthful or Thalappalam Ser. Coop. Bank Ltd. and Ors. v.
otherwise whether laudatory or critical. If he State of Kerala and Ors.10, the honourable Court
does so, he would be violating the right to held that right to privacy falling under Article
privacy of the person concerned and would be 21 of the Indian Constitution is not absolute and
liable in the action of damages.” needs to regulated in public interest as in the
modern state, no right can be absolute. But it
(B) 2000-2016
was finally in the Aadhaar card case i.e. Justice
6
It was held in Sharda v. Dharampal that the K.S.Puttaswamy(Retd)& Anr v. Union Of India
right to privacy is subject to restrictions. It is not & Ors.11, it was suggested that in order to settle
enshrined in the Indian Constitution but has the legal position of the right to privacy,a
been drawn out from the extensive interpretation constitutional bench must be established.
of article 21. Also, in District Registrar and
Collector, Hyderabad and another v. Canara
Bank and another7, another two-Judge Bench
held, while accepting the implicit existence of
(C) 2017
right to privacy in India, that the right to privacy
dealt with persons and not places. One of the The Apex Court on 24th August, 2017, while
most prominent and recent case dealing with reaching out to the foundation of constitutional
8
4 July, 2011, Supreme Court of India.
5 9
AIR 1995 SC 264. 11 May, 2011, Supreme Court of India.
6 10
AIR 2003 SC 3450. 2013 SCJ 7 862.
7 11
(2005) 1 SCC 496. 11 August, 2015, Supreme Court of India.

Published in Articles section of www.manupatra.com


culture of India, proclaimed Privacy as a nature with any man, woman or animal, shall be
postulate of human dignity. They acknowledged punished with [imprisonment for life], or with
that privacy lies across the spectrum of impris-onment of either description for a term
protected freedoms and is the ultimate which may extend to ten years, and shall also be
expression of the sanctity of an individual. liable to fine.”13
While commenting on the nature of privacy, the
The High Court of Delhi in 2009,
Court ruled that while the individual is entitled
decriminalised consensual homosexual sex in
to a zone of privacy, its extent is based not only
Naz Foundation v. NCT of Delhi14 and held,
on the subjective expectation of the individual
“The sphere of privacy allows persons to
but on an objective principle which defines a
develop human relations without interference
reasonable expectation. Inspite of having settled
from the outside community or from the State.
the legal position of this much disputed, a
The exercise of autonomy enables an individual
comprehensive privacy policy is needed to
to attain fulfilment, grow in self-esteem, build
establish a delicate balance between the
relationships of his or her choice and fulfil all
legitimate concern of the State and individual
legitimate goals that he or she may set. In the
interest12.
Indian Constitution, the right to live with dignity
and the right of privacy both are recognized as
RECENT CONTROVERSIES ON RIGHT TO
dimensions of Article 21. § 377 IPC denies a
PRIVACY
person's dignity and criminalizes his or her core
Currently there are many cases and appeals identity solely on account of his or her sexuality
pending in various courts in India the and thus violates Article 21 of the Constitution.
substratum of which is the right to privacy. As it stands, § 377 IPC denies a gay person a
right to full personhood which is implicit in
Firstly, in the Naz Foundation case, the Apex
notion of life under Article 21 of the
Court of India, is hearing a curative petition on
Constitution.”
§ 377 of Indian Penal Code, which criminalises
consensual homosexual sex between adults. The However, the Supreme Court of India, in appeal,
section reads as follows: “Whoever voluntarily overturned the judgment of the Delhi High
has carnal inter-course against the order of Court in the case of Suresh Kumar Koushal &

12
Justice Puttaswamy (Retd.) and Anr. v. Union of India
13
and Ors., W. P. (C) No. 494 of 2012 and W. P. (C) No. Indian Penal Code (45 of 1860), § 377.
14
000372/2017, 24 August, 2017, Supreme Court of India. 160 Delhi Law Times 277.

Published in Articles section of www.manupatra.com


Anr vs Naz Foundation & Ors15. it is being made mandatory for certain schemes,
for example it has been made mandatory for
In 2014, the Supreme Court, in a landmark
availing of minority students’ scholarships. In
judgement, directed the government to treat the
some ways, the policy decisions around Aadhar
transgenders as the ‘third gender’ and to include
can be seen as illustrative of erosion of
them in the OBC quota. But the matter
Parliament, for ex., Money Bill aspect of
pertaining to § 377 is still pending.
Aadhar card. Moreover the Standing Committee
Secondly, the Aadhar Card scheme has been of Finance of 15th Lok Sabha had observed that
under attack ever since its institution. However, the scheme was “ladled with lacunae” and was
the Apex Court, in the case of Justice ambiguous. The Committee was of the opinion
16
Puttaswamy v. Union of India , quelled the that a comprehensive privacy law is a
debate for a while by holding that the prerequisite of the scheme. It is also an erosion
information obtained by the authorities will of the rights of the citizens. Despite the defence
have restricted use i.e. for PDS Scheme, and and clarifications offered by Nandan Nilekani,
will not be sued for any other purpose, except the brain behind the UIDAI, it can be seen that
by the leave of the court for the purpose of this scheme is not only questionable but has
criminal investigation. Further, it recommended failed on several metrics. Recently, the Aadhar
the institution of a constitutional bench to details of 10 lakh citizens were made public by
determine the legal position of right to privacy. Jharkhand Directorate of Social Security due to
Yet, after some time, the Aadhar card issue a programming order, which further fuelled the
reared its head again. It is being referred to as an debate surrounding the scheme.
undemocratic way which is being used to take
away the right to privacy. Many believe that Thirdly, the WhatsApp Controversy,

Aadhar Card Scheme is being converted into the Karmanya Singh Sareen and Shreya Sethi had

world’s biggest surveillance system by filed a PIL with respect to change in privacy

obtaining biometric and linking the card to policy of WhatsApp without informing users

services such as filing of Tax Returns, Bank which does not amount to fair practice and is

Accounts etc. A constitutional bench headed by moreover, hit by the principle of estoppel.

the then CJI, H.L. Dattu, held that Aadhar card WhatsApp, after being acquired by Facebook

is to be voluntary and not mandatory, however, had started sharing the information of the users
with Facebook in order to improve
15
11 December, 2013.
16
11 August, 2015, Supreme Court of India. advertisements and product service. A bench of
6

Published in Articles section of www.manupatra.com


the Delhi High Court headed by the then CJ G. Constitution of India. The commission
Rohini, granted partial relief and ordered recommended the insertion of Article 21B in the
WhatsApp to delete all the user information till Indian Constitution, which would read as
25 September, 2016, however, the bench did not follows:
declare the sharing of information by the
“21-B. (1) Every person has a right to respect
enterprise in the future as illegal by stating that
for his private and family life, his home and his
the users who do not wish for their information
correspondence.
to be shared to opt for the deletion of WhatsApp
account. An appeal was filed with respect to the (2) Nothing in clause (1) shall prevent the State

latter part of the judgment, which is currently from making any law imposing reasonable

pending before the constitution bench of the restrictions on the exercise of the right

Supreme Court. conferred by clause (1), in the interests of


security of the State, public safety or for the
LEGISLATIVE ATTEMPTS TOWARDS prevention of disorder or crime, or for the
SECURING RIGHT TO PRIVACY protection of health or morals, or for the
protection of the rights and freedoms of
There have been various legislative attempts to
others.”18
secure the right to privacy, however, they have
not been very successful. Firstly, as per the Unfortunately, it took fifteen years from the date
Information Technology Act, 2000, when a of submission of this report to accept Right to
body corporate fails to protect personal data it Privacy as a Fundamental Right, and yet, a
owns or controls, such body corporate shall be comprehensive privacy policy is yet to be
liable to pay damages by way of devised.
compensation17.
Finally, despite there being three Right To
Secondly, Venkata Challiah Commission, the Privacy Bills, neither of the bills have been
National Commission to review the working of given the status of a statute. As per the bills,
the Constitution (NCRWC) also known as Right to privacy could not be infringed except
Justice Manepalli Narayana Rao Venkatachaliah according to provisions of the act or law. The
Commission was set up on 22 February 2000 for grounds for infringing the right to privacy
suggesting possible amendments to the included: (a) sovereignty and security of India,

18
Justice Venkata Challiah Committee Report, Vol. 1,
17
Information Technology Amendment Act, 2008, § 43A. 3.12, http://lawmin.nic.in/ncrwc/finalreport/v1ch3.htm.

Published in Articles section of www.manupatra.com


technical and economic interests (b) preventing provides for personal autonomy, gives an
incitement to the commission of an offence (c) opportunity for emotional release and self-
prevention of public order or for detecting crime evaluation. Therefore, there’s a need for a
(d) protection of freedom and rights of others comprehensive privacy policy. Firstly, to offer
(d) in the interest of friendly relations with protection from surveillance, search and
foreign states (e) any other purpose specifically seizure. The issue of protection from
mentioned in the act19. As per the bills, (a) surveillance was dealt with in Kharak Singh v
collection, storage, processing and disclosure of State of UP21, wherein the Police abused its
personal data, (b) interception or monitoring of power of surveillance, by forcibly entering the
communication of individuals, (c) surveillance plaintiff’s house and searching it, keeping a
of individual constitute the infringement of right close watch on him, dragging him at times to the
to privacy20. Provisions were made for the police station etc. Hence, the citizens need to be
establishment of Data Protection Authority of protected from such arbitrary exercise and abuse
India, National Data Control Registry and of power.
Appellate Tribunals. Penalties for violating right
Secondly, for the privacy of the body. The
to privacy have also been incorporated in the
citizens have an exclusive right over their body,
bill, for example, penalty for undertaking
they need to be given the liberty to choose and
surveillance in certain cases would be
decide what’s correct for them. For example, the
imprisonment for five years.
Medical termination of Pregnancy Act prevents

NEED FOR A COMPREHENSIVE PRIVACY a woman from exercising her right of abortion
by permitting abortion under certain
POLICY
circumstances only. The other issues which fall
Democracies survive on a delicate balance of under the ambit of Medical Privacy are: the
power between the government – and the ability of the state to order persons to undergo
citizens. The more power citizens get, the more medical-examination and to submit to DNA
robust the democracy. As the government testing in civil suits, to undergo a range of 'truth
accrues more power to itself, it erodes technologies' including narco analysis, brain
democracy to a point where it ceases to exist. mapping, etc., Thirdly, to Protect reputation.
Thus, privacy is essential to a democracy as it This issue emanates from the Auto Shanker

19
Right to Privacy Bill, 2011.
20 21
Supra. AIR 1963 SC 1295.

Published in Articles section of www.manupatra.com


case22. With the growing technology and from governmental interference was shattered.
increasing role of media, a mechanism for the Little did we know that even India had its own
protection of reputation is of utmost importance. surveillance program, like NSA, since 2007. It
And finally, for the protection of records, enables the Indian Government to keep track in
communication and protection from real time of 900 million mobile phones and
interception in the digital age: It was in landlines and 160 million internet users.
People's Union for Civil Liberties v. Union of
STATE AGENCIES AND SURVEILLANCE
India23, or better known as the Telephone-
tapping case, that the question of intimate and ORGANISATIONS
confidential nature of communications was After the perturbing 26/11 terrorist attacks in
brought under the scanner, and the right to Mumbai, the government of India introduced
privacy was upheld. Therefore, in this digital many data sharing and surveillance systems.
age, with the increasing rate of cybercrime, a The data sharing schemes being the National
comprehensive privacy policy is inevitable. Intelligence Grid (NATGRID) and the Crime
and Criminal Tracking Network & Systems
SURVEILLANCE
(CCTNS) while the surveillance systems being
“Arguing that you don't care about the right to the Central Monitoring System (CMS), Lawful
privacy because you have nothing to hide is no Intercept and Monitoring (LIM) system and the
different than saying you don't care about free Network Traffic Analysis system (NETRA) and
speech because you have nothing to say.” many other state Internet Monitoring Systems.

― Edward Snowden The purpose of these bodies is to increase public


safety and national security by tackling crime
When in 2013, the whistle-blower contractor of
and terrorism.
USA’s National Security Agency (NSA),
Edward Snowden, quivered the world by National Intelligence Grid (NATGRID) is an

disclosing the extensive global surveillance intelligence grid which will consolidate data

programs by the US Government; the gathered from various agencies and will link the

worldwide perception of the common man, that databases of various departments and ministries

even the world’s largest democracies are free of the government of India. It will serve as a
one-stop shop for accessing the linked data by
the intelligence agencies. Under NATGRID, 21
22
AIR 1995 SC 264.
23
(1997) 1 SCC 30. sets of databases will be networked to achieve
9

Published in Articles section of www.manupatra.com


quick, seamless and secure access to desired Central Monitoring System (CMS) is an
information for intelligence/enforcement interception system that enables government
agencies24 agencies to intercept communications without
requiring court orders or needing to
Crime and Criminal Tracking Network and
communicate with the telecom service
System (CCTNS) on the other hand is a network
providers. It is the most important surveillance
that allows the collection, storage, retrieval,
system that monitors text messages, social-
analysis, transfer and sharing of information
media engagement and phone calls on landlines
relation to crimes and criminals across the
and cell phones, among other communications.
country.25 Since there used to be no database for
Once fully implemented, CMS will allow the
the police officers to refer to, to gather and share
government to “listen and tape phone
any information about a criminal and store it
conversations, read e-mails and text messages,
virtually, CCTNS was implemented as an
monitor posts on Facebook, Twitter, or
ambitious scheme by the Government of India,
LinkedIn, and track searches on Google.”27 It
to maintain a record of crimes and criminals and
will also empower the government to keep a real
to share the information with other police
time track of our whereabouts using GPS
stations using computer and maintaining a
embedded in our mobile phones.
connectivity between various police stations
creating a hub of criminal information collected Lawful Intercept & Monitoring (LIM) Systems
and stored by various police officers. 26 The were deployed by the Government of India to
access of the same will be provided to the police monitor records of voice, SMS, GPRS data,
stations and to intelligence and national security details of a subscriber's application and recharge
agencies. history and call detail record (CDR), emails,
web browsing, Skype and any other internet
24
Government of India, Ministry of Home Affairs, PRESS activity. The LIM Program consists of installing
INFORMATION BUREAU, Home Minister proposes radical
restructuring of security architecture, (December 23, interception, monitoring and storage programs
2009),
http://www.pib.nic.in/newsite/erelease.aspx?relid=56395 .
at international gateways, internet exchange
25
NATIONAL CRIME RECORDS BUREAU, Ministry of hubs as well as ISP nodes across the country.
Home Affairs,
http://ncrb.gov.in/BureauDivisions/CCTNS/cctns.htm
(April 30, 2017).
26 27
P. Chidambaram, Ex-Union Home Minister, Ex-Union Editorial, “India sets up elaborate system to tap phone
Home Minister's mission statement for NCRB under calls, e-mail” The Reuters, June 20, 2013, 2:46 AM,
CCTNS, CRIME AND CRIMINAL TRACKING NETWORK & http://www.reuters.com/article/2013/06/20/us-india-
SYSTEM (CCTNS), National Crime Records Bureau, surveillance-idUSBRE95J05G2 0130620
Ministry of Home Affairs, http://ncrb.nic.in/cctns.htm.

10

Published in Articles section of www.manupatra.com


These programs help the government have an incidents.
unfettered access to petabytes of user data on a CERT-In has access to all the information
daily basis. available on cyberspace and the power to
regulate the same.
Network Traffic Analysis (NETRA) is real time
surveillance software developed by the Centre Unique Identification Authority of India (UID
for Artificial Intelligence and Robotics (CAIR) scheme) or Aadhaar, currently referred to as a
at the Defence Research and Development ticking time bomb, is a 12 digit unique-identity
Organization (DRDO). It is used to detect voice number issued to all Indian residents. It is based
traffic from Skype, Google Talk etc. as well as on their biometric and demographic data which
detection of real time keywords and key phrases is collected by the Unique Identification
such as bomb, blast, attack etc. on social media, Authority of India (UIDAI), a statutory
blogs, tweets, emails and instant messaging authority established under the Aadhaar Act
services. It is mainly used for tackling crime and 2016. It is the world's largest biometric ID
terrorism in India. system, with over 1.133 billion enrolled
members as of 31 March 2017. The government
Indian Computer Emergency Response Team
by linking all the services with the UID number
(CERT-In) has been established under § 70B of
can easily monitor anyone continuously. 28
IT(Amendment) Act 2008 to serve as an agency
to regulate the cyber space and provide for Lastly, the National Counter Terrorism Centre
cyber security by (NCTC). The 26/11 attacks led to the genesis of
NCTC. Based on the model of American NCTC
(a) collecting, analysing and disseminating
and British Joint Terrorism Analysis Centre, the
information on cyber incidents
Indian NCTC, derives it powers from Unlawful
(b) forecasting cyber security incidents by
Activities Prevention Act, 1967. However, the
making use of information available on
establishment of the NCTC would lead to
cyber space
concentration of powers pertaining to
(c) handling cyber security incidents
intelligence and operation, which would disrupt
(d) issuing guidelines, advisories,
the autonomy of the states and would add to the
vulnerability notes and whitepapers
bureaucratic tangle.
relating to information security
practices, procedures, prevention,
28
response and reporting of cyber Binoy Viswam v. Union of India,
MANU/SC/0693/2017.

11

Published in Articles section of www.manupatra.com


LEGISLATIONS SUPPORTING in India of correspondents accredited to the

SURVEILLANCE Central Government or a State Government


shall not be intercepted or detained, unless their
Erstwhile, the only substantive law supporting
transmission has been prohibited under this sub-
the state surveillance activities was the Indian
section."
Telegraph Act, 1855; however, with the
technological boom and revolution, the While § 5(2) forms the substantive part of the

Information Technology Act, 2000 was law, the procedure for the same is prescribed

introduced to facilitate internet surveillance. under Rule 419A of the Indian Telegraph
Rules, 1951, introduced via amendment Act of
According to § 5(2) of the Indian Telegraph
2007. As per this rule, the direction for
Act, 1885, "On the occurrence of any public
interception, as specified in § 5(2) of the Indian
emergency, or in the interest of the public
Telegraph Act, can only be given by Union/
safety, the Central Government or a State
State Home Secretary. However, in unavoidable
Government or any officer specially authorised
circumstances, a lawful order may be issued by,
in this behalf by the Central Government or a
with the prior permission of the Union or State
State Government may, if satisfied that it is
Home Secretary, an officer not below the rank
necessary or expedient so to do in the interests
of Joint Secretary to GoI. Pursuant to Rule
of the sovereignty and integrity of India, the
419A, service providers required by law
security of the State, friendly relations with
enforcement to intercept communications are
foreign states or public order or for preventing
mandated to comply with certain provisions
incitement to the commission of an offence, for
which include the appointment of nodal officers
reasons to be recorded in writing, by order,
to deal with interception requests and to prevent
direct that any message or class of messages to
its unauthorised usage. The licenses of the
or from any person or class of persons, or
service providers stand to be revoked on non-
relating to any particular subject, brought for
compliance of these rules, resulting in breach of
transmission by or transmitted or received by
secrecy.
any telegraph, shall not be transmitted, or shall
be intercepted or detained, or shall be disclosed Sections 69 and 69B of Information

to the Government making the order or an Technology Act, 2000 pertain to matters of web

officer thereof mentioned in the order: Provided surveillance. § 69, is similar to § 5(2) of the

that the press messages intended to be published Indian Telegraph Act, 1855. It provides for

12

Published in Articles section of www.manupatra.com


interception, monitoring and decryption of under law for the purpose of verification,
computer sources by Central and State investigation etc.
Governments in national interest. While § 69B,
Rule 3(7) of Information Technology
grants the Central Government the "power to
(Intermediaries Guidelines) Rules, 2011,
authorize to monitor and collect traffic data or
requires the ISP's etc., under a lawful order to
information through any computer resource for
provide authorized government agencies with
Cyber Security"29.
information for identity verification etc.
Information Technology (Procedure and
As per Rule 7, Information Technology
Safeguards for Interception, Monitoring and
(Guidelines for Cyber Cafe) Rules, 2011, an
Decryption of Information) Rules, 2009 lay
officer may investigate the records of a cyber
down the procedure for invoking § 69 of the
cafe and the owner has to comply with same and
Information Technology Act, 2000 and is a
provide all the records, search history etc.
replica of Rule 419A (as stated above).
Aadhar Act, 2016 is one of the most
Information Technology (Procedure and
controversial acts, it was passed by the Lok
Safeguards for Monitoring and Collecting
Sabha in March, 2016 to provide a legal backing
Traffic Data or Information) Rules, 2009
to the UIDAI Scheme.
prescribe the procedure for invoking § 69B of
the Information Technology Act, 2000 and is The government is in the process of developing

near- identical to rule 419A. rules for the compliance of § 67C of the IT Act,
2000, which may require the ISP's and
As per Rule 6 of Information Technology
Applications like Facebook etc. to store and
(Reasonable Security Practices and
collect data. For this purpose, the Data
Procedures and Sensitive Personal Data or
Retention Rules Bill has been drafted.
Information) Rules, 2011, a body corporate
though disallowed from divesting information to These rules put in place several checks and

a third party without the consent of the provider, balances and try to ensure that there is an

may disclose the same without consent of the established "chain of custody" and paperwork

provider to the government agencies mandated for each and every detection and interception
request. The assumption is that with a clearly
defined chain of due diligence and paperwork,
29
Information Technology Act, 2000 (Act 21 of 2000), § the possibility of unauthorized interception is
69B.

13

Published in Articles section of www.manupatra.com


reduced, which ensures that the powers of the internet and had started surveillance on
interception are not misused. However, although Facebook and Twitter.31
these checks and balances exist on paper, there
CONSTITUTIONALITY OF RIGHT OF
is not enough information in the public domain
about the whole mechanism of the interception SURVEILLANCE
for anyone to make a clear judgment as to Ever since their inception, the surveillance
whether the system in fact reduces the number systems have had to navigate through muddy
of unauthorized interceptions. waters, with their constitutionality being
questioned time and again. Various international
INCIDENTS
statutes provide for the protection of rights and
Surveillance in India can be traced back to the freedoms of citizens.
A. K. Gopalan case, however, the issue of mass
Article 19 of UDHR and ICCPR guarantee the
surveillance was raised in the “Telephone-
right to freedom of opinion and expression.
tapping” case. Recently, apart from the
These articles hold that everybody has the right
WhatsApp and Aadhar card issue, surveillance
to hold opinions without interference and to
reared its head in the BBM case (2012).
obtain and convey information and ideas
Blackberry allowed the government agencies through any media, regardless of the boundaries.
access to personal messages on the messenger Unrestricted freedom of expression and
post certain proposal from the Government of expression, as provided by the UDHR and the
India. Next, in 2012, The Hindu released a ICCPR will be impossible if people have to live
report according to which several mobile phones in constant fear of the sanction for their
30
were under scanner. unpopular opinions or information, even in

Moreover in 2011, Mr Milind Deora, had (in private forums. Furthermore, Articles 12 and 17

Rajya Sabha) informed that the government had of the UDHR and the ICCPR guarantee the

acquired technology to monitor contents on Right to Privacy. General Comment No. 16


(1988) by the Centre of Civil and Political
Rights (CCPR) adopted by the United Nations
Human Rights Council (CCPR) states that

30
Editorial, 10000 phones and 1000 email Ids under
31
scanner, THE HINDU REPORT, (October 12, 2012), Ranjit Sur, People under surveillance, privacy law for
http://www.thehindu.com/news/national/10000-phones- whom?, (November 5, 2012),
1000-email-ids-under-the-scanner/article3992185.ece. http://sanhati.com/excerpted/5753/.

14

Published in Articles section of www.manupatra.com


Surveillance, whether it was electronic or the American First Amendment and confirmed
otherwise, interception of telephone, telegraphic by a long series of cases. In India, this right is
and other communication forms, wire-tapping expressly guaranteed by the Constitution.
and recording of conversations, should be
Alexander Abdo, Council for ACLU, stated in
prohibited. The storage of information on
his arguments that "Imagine the government
computers, databases and other devices, whether
coming to your home every evening and forcing
by public bodies or individuals or corporations,
you to hand in all your calls for that day. Is not
must be regulated by law. No one should be
that a clear violation of the Fourth and First
subjected to arbitrary interference with privacy,
Amendments?" By repercussion, of course, this
family, home or correspondence or to attacks
whole argument holds with the same force for
upon his honour or his prestige. Everyone has
Free Expression (Article 19 (1) (a)). There are,
the right to the protection of the law against
therefore, two questions which we must take
such interventions or attacks.32
into account: to what extent do Article 19 (1) (a)
Thus, the Indian Surveillance Systems must be and Article 19 (1) (c) embody the Doctrine of
formatted and reviewed, so that they are in the Chilling Effect; and what is the standard of
conformity and in no in breach of these security applicable according to Articles 19(2)
International Statutes and Standards. and 19(4). There is a considerable amount of
jurisprudence and precedents interpreting the
In United States of America, the mass
"reasonable restrictions in the interests of
surveillance program of the National Security
sovereignty and integrity of India", and most of
Agency (NSA) has been challenged as being
them point to a general proportionality test.
unconstitutional by the American Union for
However, the sheer scale and the degree of mass
Civil Liberties in the case of ACLU v.
monitoring require a more precise examination.
Clapper33. This is directly relevant to India, in
view of our own Central Monitoring System Various countries across the globe have
(CMS) which goes much further. In addition to expressly recognised the right to privacy. The
the submission of right to privacy, ACLU also emergence of modern legislation in this area can
argued that mass surveillance violated the be traced back to 1970. The first data protection
freedom of association, implicitly mentioned in law in the world was passed in the state of
Hesse in Germany. This was followed by
32
UNIVERSAL DECLARATION OF HUMAN RIGHTS, (January Sweden (1973), the United States (1974),
27, 1997), http://www.hrweb.org/legal/udhr.html.
33
No. 13-3994 (S.D. New York December 28, 2013).

15

Published in Articles section of www.manupatra.com


Germany (1977) and France (1978). Europe, in The crippled surveillance systems devised in
this crucial time developed two important India, not only violate human and fundamental
instruments i.e. The Council of Europe's 1981 rights, but also are an epitome of arbitrary use of
Convention for the Protection of Individuals power. §. 5 (2) of the Telegraph Act and §. 26
with regard to the Automatic Processing of (2) of the Indian Post Office Act outline a two-
Personal Data34and the Organization for stage examination before the tapping of
Economic Cooperation and Development's telegraph or postal articles. The first stage
Guidelines Governing the Protection of Privacy consists of sine qua nons in the form of an
and Transborder Data Flows of Personal Data35 "occurrence of the public emergency" or "in the
which enunciated specific rules for the handling interests of public security". The second set of
of electronic data. The rules in these two requirements according to the provisions is "the
documents form the core of the data protection interests of the sovereignty and integrity of
laws of dozens of countries. These rules India, the security of the state, the friendly
describe personal data as data which seeks to relations with the foreign states or the public
provide protection at every step i.e. from order or the prevention of incitement to commit
collection till storage and dissemination. The a crime." The sections consider a legal fiction in
right of a person to access and change their data which a public emergency exists and it is the
is an essential part of these rules. With these interest of the sovereignty, the integrity, the
instruments, European Union also enacted two security of the state or the maintenance of public
directives which provide the citizens with wide order / friendly relations with foreign states.
range of rights and protections against misuse of However, the term "public emergency" has not
their data. It also enunciates right to know been clearly defined by the legislature or the
where the data originated, right to have courts. It, therefore, vests arbitrary powers in an
erroneous data rectified and right to withhold official to order the interception of
grant and permission to use the data in certain communication which violates fundamental
circumstances. rights. The Supreme Court in State of MP v.
Baldeo Prasad36 considered that a statute must
not only provide adequate safeguards for the
34
Convention for the Protection of Individuals with protection of innocent citizens, but also the
regard to the Automatic Processing of Personal Data
Convention , ETS No. 108, Stasbourg, 1981. administrative authority must be satisfied of the
35
OECD, Guidelines governing the Protection of Privacy
and Transborder Data Flows of Personal Data , Paris,
36
1981 AIR 1961 (SC) 293 (296).

16

Published in Articles section of www.manupatra.com


existence of the (clearly laid down) prerequisites The Central Monitoring System (CMS) was
before issuing an order with respect to the same. approved by the Cabinet Committee on Security
If the statute failed to do so in respect to any (CCS) on 16 June 2011. Since then, the CMS
condition precedent, then the law suffered from has been operated by India's Telecom
a weakness and was deprecated as invalid. [17] Enforcement Resource and Monitoring (TERM)
The question of the existence of the public cells and has been implemented by the Centre
emergency which is left to the sole for Development of Telematics (C-DOT). The
determination of an administrative officer can government uses surveillance for intelligence
be challenged on the ground of being arbitrary gathering, prevention of crime, the protection of
and in contravention to Article 14 of the Indian a process, person, group or object, or the
Constitution. investigation of crime. Basically is it used to
maintain national security and prevention of
Moreover, Surveillance, as practiced in India,
terrorism. But is it justified to do so while taking
violates Article 19 of the Indian Constitution.
a toll on the fundamental and human rights of
The fundamental rights referred to in Article
the citizens? Will it be justified if an unfettered
19(1) cannot be shortened in any way outside
power is given to the government officials
the relevant provisions of Cls. 2-6.37 The
without any responsibility and liability? Who
restrictive clauses in Cls. (2) - (6) of Article 19
will be held liable for any misuse of such
are exhaustive and must be interpreted strictly.38
arbitrary power? How will they be punished?
And the same has been disregarded by those
framing the surveillance legislations. The existing Indian laws do not answer all these
questions. The Central Monitoring System
Though the Right of Surveillance of the State
(CMS) was announced in 2011, but there was
for national protection is not per se
no public debate on it and the government has
unconstitutional, but the arbitrary and
given little thought about how it will work or
unregulated use of this right is unconstitutional.
how it will ensure that the system will not be
The Indian Legislation, hence, suffer from
abused. The surveillance agencies have got
various loopholes.
unfettered access to all our personal data with
USE AND ABUSE OF SURVEILLANCE no reliability for the misuse of the same. “No
information has been made available about
37
Ghosh O.K. v. Joseph E.X. AIR 1963 SC 812; 1963
Supp. (1) SCR 789. whose data will be collected, how the collected
38
Sakal Papers (P) Ltd. v. Union of India, AIR 1962 SC
305 (315); 1962 (3) SCR 842.
will be used, or how long the data will be

17

Published in Articles section of www.manupatra.com


retained.”39 There is no statutory redressal India makes the systems more vulnerable to
mechanism in case of illegal interception and misuse.
monitoring of information and communications
Thus, what we have here is a country with an
by the State. These agencies are exempted from
extremely high level of corruption, no data
disclosing information about themselves as per
protection laws, no strict privacy policy and an
§. 8 of the Right to Information Act, 2005 and
unregulated monitoring system which lacks
hence operate without judicial or legislative
public and parliamentary debate prior to its
purview. Moreover, these Surveillance
implementation.41 “If India doesn’t want to look
programs are not in conformity with any of the
like an authoritarian regime, it needs to be
‘International Principles on the Application of
transparent about who will be authorized to
Human Rights to Communications
collect data, what data will be collected, how it
Surveillance’. Hence, it is natural to presume
will be used, and how the right to privacy will
that the Surveillance system might be abused.
be protected,”42 Hence, the introduction of
Its present vagueness and excessive control over
privacy legislations is the need of the hour. A
communication can create a potential for
solid framework and proper legislations are also
unprecedented abuse. “CMS will involve an
needed to give a legitimate backing and to
online system for filing and processing of all
control all the functions of the Surveillance
lawful interception requests, an electronic audit
systems in India so as to make sure that the
trail will be in place for each phone number put
power is not misused or used arbitrarily. The
40
under surveillance.” It is still unclear that who
legislations need to entail laws on the
will audit the audit trail? The same ministry
repercussions of misuse of data, to ensure the
which authorizes the surveillance requests?
protection of rights of citizens against illegal
Moreover, the surveillance cameras in public
interception of calls and messages, a basic
places can be misused by officials who want to
framework and guidelines for deciding whose
harass or blackmail their political enemies or
conversations and activities will be intercepted
opponents. And the lack of any privacy laws in
and also making an independent body to audit

39
the interception of data. Without these measures
Stakeholder Report by the INTERNET DEMOCRACY
PROJECT on India’s Universal Periodic Review: Third
cycle
40 41
Editorial, Govt tightens control for phone tapping, Maria Xynou, (January 30, 2014), https://cis-
TIMES OF INDIA, (Jun 18, 2013), india.org/internet-governance/blog/india-central-
http://timesofindia.indiatimes.com/india/Govt-tightens- monitoring-system-something-to-worry-about.
42
control-for-phone- Cynthia Wong, an Internet researcher at New York-
tapping/articleshow/20640273.cms?referral=PM. based Human Rights Watch.

18

Published in Articles section of www.manupatra.com


the abuse of power can’t have sighted and the civil and fundamental rights of the people,
rectified. who are left with no remedies. This can be
proved by the fact that India hitherto does not
Thus, to secure the safety of the nation and to
have any Privacy legislations and the only
balance the same with the rights of the
elderly Privacy Bill is yet to see the light of the
individuals in a democratic nation, a regulated
day, accentuating the conflict between Right to
use of surveillance needs to be encouraged
Privacy and Surveillance.
while its abuse should be discouraged.
It poses an even greater threat on the privacy of
CONFLICT BETWEEN RIGHT TO
the citizens because, albeit the right to privacy
PRIVACY AND SURVEILLANCE has been held to be the part of Article 21, the

The Surveillance programs of the Indian citizens won’t be able to enforce it because most

Government are having pejorative impact on the of these surveillance agencies require the

civil and fundamental rights of the people. The Network Operators, Internet Service Providers

right to Privacy has been held to be a part and (ISPs) and Telecommunications Service

parcel of Article 21 and has now been Providers (TSPs) like Bharti Airtel, Jio, Idea

acknowledged as a Fundamental Right flowing and Vodafone to intercept the data and are the

from Right to Life. The IT Act also provides for actual ones who invade our privacy, yet not

the right to privacy and data protection. Even falling within the definition of ‘State’ under

though the security concerns of the Indian Article 12.

Government may be justified, the protection of It’s not just India, but these fundamental right
data and privacy can’t be ensured by the violations are carried out in most of the
government with such flawed schemes having democratic countries in the name of national
no framework, set rules and regulations, penal security and public emergency. US State
provisions or accountability for the same. Department in its annual review found out that
Further, the UID Project as of now does not there are about 90 countries which are engaged
provide for any safeguards for the protection of in illegally monitoring the communications of
privacy nor does it prescribe any obligations on political opponents, human right workers,
the government agencies. journalists and suspected people. This poses a

Talking about the conflict between the right to threat to the rights of the innocent people, so

privacy and surveillance, the latter subjugates much so that for example, in Japan, the police

19

Published in Articles section of www.manupatra.com


were fined 2.5 million for illegally tapping the its dissemination. The Conventions also allow
phones of the members of the Communist Party. the people to access and amend their personal
Amidst the controversies like these in so many data. These laws require the personal
countries, there are countries who have information to the obtained fairly and lawfully,
successfully tackled this conflict. While dealing and to be used only for the original specified
with the increasing surveillance practices, many purpose while making sure that the data
countries have reacted by introducing specific collected is adequate, relevant and not excessive
rules governing the collection and handling of to purpose it is collected for. They also require
personal information. In these countries, the the data to be accurate and up to date and most
constitutional provisions pertaining to importantly ensure that it’s destroyed after its
surveillance and privacy have been amended purpose has been completed.
accordingly. One of the first legislations in this Thus, it is crystal clear that national security is a
regard was passed in the Land of Hesse in priority and must not be compromised due to the
Germany in 1970, followed by the laws in rights of few private individuals, however due
Sweden, 1973; USA, 1974; Germany, 1977 and consideration must be paid to the implications it
France, 1978. The European Union had a major has on the civil and fundamental rights of the
role to play in bringing about all these innocent citizens.
legislations which while protecting the rights of
IDENTIFICATION OF ISSUES AND
the people, ensure rightful surveillance for the
purposes of maintaining national security. The RECOMMENDATIONS
‘Council of Europe's 1981 Convention for the The dispute over the existence of Right to
Protection of Individuals’ regarding the Privacy in India and concerns over abuse of
‘Automatic Processing of Personal Data’ and surveillance power by administrative authorities
the ‘Organization for Economic Cooperation have existed since before independence. Thus,
and Development's Guidelines Governing the in order to protect the Indian democracy, to
Protection of Privacy and Transborder Data safeguard the fundamental rights and to
Flows of Personal Data’ articulated the specific exterminate threats to national peace and
rules with respect to handling of electronic data. security and sovereignty, several changes need
The rules have been given force by these two to be introduced. The recommendations are as
accords to ensure that the personal information follows:
gets protection at every step, from collection till

20

Published in Articles section of www.manupatra.com


1. Comprehensive Privacy Legislation: 4. Rule 419A of the Indian Telegraph
According to Article 21 no one can be Rules, 1951: The said rule refers to
deprived of their right to life except by ‘unavoidable circumstances’ however,
the procedure established by law. Thus, fails to offer an explanation of the same.
the Indian Legislature should table, Thus, this rule must be amended to
amend the Privacy Bills drafted in 2011, explain the above phrase.
2014 and 2016 to close all the loopholes 5. Information Technology
and pass the same in order to provide the (Intermediaries Guidelines) Rules,
citizens of India with a cosmic privacy 2011: Rule 3(7) uses the terms ‘lawful
policy and to provide for a mechanism order’ and ‘request in writing’
for the encroachment of privacy in interchangeably, which leads to
certain cases. confusion and seemingly implies that a
2. Justifiable reasons for impinging ‘lawful order’ as envisioned is a written
privacy: While establishing a nexus letter from the government agencies and
between need and legitimate state aim does not bear the force of law, thus
and ensuring that means are proportional inordinately simplifying the process and
to object, the legislature should clearly thereby, increasing the chances of abuse
lay down the justifiable reasons for of power. Therefore, it is essential to
infringing the Right to Privacy. amend this rule prevent the future abuse
3. § 5(2) of Indian telegraph Act, 1855 of this rule.
and Sections 69 and 69B of 6. Aadhar Act: The Aadhar Act must be
Information Technology Act, 2000: amended and provisions should be
These sections support surveillance for incorporated to safeguard the rights and
protection of sovereignty, security of information of the citizens, and to
state, friendly relations, public order and increase the confidence of the citizens in
prevention of offences, however, they the scheme.
fail to clearly define these terms. Hence, 7. Development of strong encryption and
to prevent miscarriage of justice in the data protection system: The executive
future, these sections should be amended should focus on the development of a
and the explanations for the above strong encryption and data protection
mentioned terms should be incorporated. system to safeguard the personal data of

21

Published in Articles section of www.manupatra.com


the citizens and to promote financial, yet, they need to coexist so that
medical, technical and generic privacy. democracy can flourish and sovereignty
8. Limiting discretionary powers of and security of the nation can be
authority with respect to usage of maintained. Hence, the pillars of our
personal data of individuals: All the democracy need to focus on paving a
laws, as mentioned above, need to be way for the coexistence of the two above
amended to limit the discretionary stated rights by establishing interface
powers of the concerned authorities with between them.
respect to the procurement and usage of
CONCLUSION
personal data of the citizens.
9. Enactment of statutes with respect to After so many years and numerous judgments,
surveillance: The confusion Right to Privacy has been acknowledged.
surrounding surveillance is leading to However, a clear picture is yet to emerge with
the development of fear amongst the respect to its extent. India is a democratic
citizens. Hence, statutes should be republic, and accordingly this right flows from
enacted to provide for Surveillance the Constitution itself. Right to Privacy is not
agencies by clearly stating their only implicit in but forms the backbone of
composition, duties and powers; also, Article 21. If there is no privacy, then how can
the circumstances in which such personal liberty be recognized. Also, if there is
surveillance may be permitted, and the no privacy then isn’t the concept of life
procedure for surveillance must be equivalent to mere animal existence? Thus, the
codified. Provisions should be laid down Supreme Court while recognising privacy as a
to ensure accountability of surveillance fundamental right held that pursuit of happiness
agencies and officers and penalty should is founded upon autonomy and dignity.
be imposed for abuse of power and for
It is through brute force and guile, unrestricted
“failure to protect data”43.
surveillance ensures an omnipotent and
10. Establish interface between the two
omnipresent government that will have
rights: Right to privacy and right of
suspicion of its citizens as the default option,
surveillance are two conflicting rights,
which is exactly how democracies come to an

43
Information Technology Amendment Act, 2008 (No. 10
OF 2009), § 43A.

22

Published in Articles section of www.manupatra.com


end – by giving the ruling oligarchy unbridled
power to keep the citizens under watch so that
they are rendered incapable of questioning
them. Moreover, this is the age of information,
wherein, information is power and internet is all
pervasive. Thus, there are stark implications on
the position of the individual where data is
ubiquitous.

Thus, an interface needs to be established


between the rights after clarifying their legal
position, imposing limitations and reasonable
restrictions on them.

23

Published in Articles section of www.manupatra.com

You might also like