Emerging Challenges and Judicial Limitations
While the judiciary has championed privacy rights in several landmark cases, its role in balancing these rights against national security has limits. Government surveillance laws such as the Information Technology Act, 2000 and the Indian Telegraph Act, 1885 offer many avenues for interference in telecommunications. Although judicial intervention, as in People’s Union for Civil Liberties v. Union of India (1997), established procedural safeguards for telephone tapping, those safeguards are still not strongly enough designed.4 Courts have often refrained from declaring such laws unconstitutional but have instead imposed procedural requirements to mitigate the risk of abuse.
Encryption as a Fundamental Privacy Tool
Encryption is the process of changing readable data into unreadable code so that it can only be accessed using the decryption key. Encryption is most commonly applied in communications, banking, and e-commerce to avoid third-party interceptions of sensitive information. In India, encouraging encryption is the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011, which mandates companies to install reasonable security practices and procedures that may include encryption for protection of personal data.
Such a claim, however is tested by government agencies that seem to argue the case that encryption thwarts law enforcement and national security. Governments across the globe pressed for “backdoor” access to encrypted data, which was opposed by privacy advocates, warning that such access may open backdoors to malevolent individuals. India also joined this debate. Section 69 of the Information Technology Act, 2000, empowers the government in India to intercept, monitor, and decrypt any information in pursuit of national security and public order. The complex privacy implications of this are especially concerning in light of the obvious lack of judicial safeguards that could strengthen the process and prevent such powers from being misused.
Anonymization and Data Masking
Anonymization refers to a process whose objective is to eliminate personally identifiable information that is capable of tracing individuals back to any given data sets. Particularly, this is very useful in fields such as research and data analytics where large data analysis processes are done without infringing on individual privacy. The proposed Personal Data Protection (PDP) Bill, 2019, recognizes anonymization as an approach to minimize privacy risks by allowing the processing of anonymized data that is not considered personal data, which falls outside the regulatory scope.
However, anonymization is not fool proof. Innovations in data re-identification technologies have shown that anonymized data may sometimes be re-associated with people with the aid of cross-references to other data collections. Thus, anonymization should be layered with other privacy-preserving technologies to ensure complete data protection.
Differential Privacy and Homomorphic Encryption
The technique is called differential privacy, which is emerging and used to mask individual identities in datasets by adding statistical “noise” to hide particular points of data. The technique had originally been developed by tech companies Apple and Google. With differential privacy, organizations can derive valuable information from data analytics without divulging user details. In India, differential privacy might be particularly helpful for government data projects such as the Aadhaar programme.
Homomorphic encryption is an advanced technique that enables computation to be performed on encrypted data without decrypting it. The method is promising for applications related to privacy-preserving in a decentralized manner, especially in the context of cloud computing, as processes can enable calculations not revealing data to the service provider. It is still relatively immature but this promises significant developments in realms dealing with highly sensitive data concerning health and finance, allowing the possibility to analyze confidential data without compromising privacy.
PETs are promising but not enough to initiate generalisation alone. What is needed in India is a robust legal framework to ensure proper protections towards privacy and clear boundaries on the use of technology. PDP Bill, in many ways, is the base foundation to encourage PET adoption, yet more explicit guidelines and greater safeguards are required. In addition, in Puttaswamy v. Union of India, the court has highlighted the importance of privacy and implied that legislative progress should preserve the rights of the individual in addition to technological advancements.
It is essential in a digital society to secure personal information through privacy-enhancing technologies-in particular, encryption, anonymization, differential privacy, and homomorphic encryption. Such technologies, however, should be supported by very strong legal frameworks that safeguard privacy rights and prevent government overreach. India can play a trailblazer role in developing the much-needed standards balancing technological innovation with safeguarding individual rights in the age of transformation.
Empowering Citizens: Raise Public Awareness of Privacy Rights
Public awareness of privacy rights forms the bedrock for a citizenry to be able to conduct their personal lives, resistant to unwarranted intrusions into it. In India, privacy was formally recognized as a fundamental right with K.S. Puttaswamy v. Union of India : The Supreme Court held that the right to privacy is intrinsic to life and personal liberty under Article 21 of the Indian Constitution.[i] Yet, still, after this momentous judgment, citizens across the country know little about their rights of privacy and how the government is watching over them.
Public awareness programs, curriculum education at academic levels, and programs at community levels which make citizens aware of the importance of data protection, implications of surveillance, and redress avenues for citizens can facilitate privacy education. For example, the government and civil society organizations could develop outreach programs explaining data protection laws, such as the proposed Personal Data Protection (PDP) Bill, which seeks to regulate data collection and processing by both private entities and the state.2 Informing citizens about the legal safeguards in place empowers them to hold entities accountable for data misuse or overreach. Lastly, the tech companies can play the role of being educators; they can make their users understand what collection practices are being done with their information and be promising privacypreserving features such as encryption and data anonymization.
The public education of the digital literacy can, therefore be of the case of how the PETs work: they protect personal information. Consider encryption and anonymization techniques, where an individual can secure his communications at the same time limit his exposure to surveillance. Knowing how to use such technologies can empower citizens to better protect their privacy. But education should not only address the technical aspects; it also extends to discussing the broader meaning of surveillance in the context of rights within a democratic society-including freedom of expression and association.
Finding a Middle Road: Privacy and Security in the Digital Age
In navigating the digital era, India faces the challenge of finding equilibrium between privacy and security, where both individual rights and national interests are protected. The judiciary has attempted to balance these interests, but a comprehensive legislative approach is essential to address current and future challenges. To this end, several strategies and policy recommendations may help achieve a balanced path.
1. Clearly Define the Limitations of Surveillance Legislations such as the Information Technology Act, 2000, and the Indian Telegraph Act, 1885, confer various powers on the government to intercept and monitor communications based upon national security grounds. However, most of these legislations lack clear definitions of “public safety” or “public emergency,” which increases the likelihood of abuse. Newer laws should set stringent limits of surveillance, specify conditions under which it can be allowed and assign accountability mechanisms for deterrence of misuse of power.3
2. Effectuate Strong Data Protection Laws: The PDP Bill proposed in 2019 is one step towards complete data protection, that proposes regulation of collection, storage and process of personal data. By setting out clear guidelines and restrictions on data processing, the PDP Bill can help curb excessive surveillance. However, the bill’s current exemptions for government agencies on grounds of national security could undermine privacy protections. Lawmakers should consider revisiting these exemptions to ensure that surveillance is both necessary and proportionate, as established in Puttaswamy.
3. Implement PETs: The use of PETs, including differential privacy, homomorphic encryption, and anonymization, minimizes the occurrence of direct surveillance since data can be analyzed without divulging identities. Differential privacy introduces statistical “noise” into data sets so that their individual identities are protected even as useful information can be gleaned from them. As such, these technologies can be used to further extend privacy protection and complement both public and private processes in collecting data so that risks of privacy do not occur.
4. Public-Private Partnerships on Data Security: As data grow in value, the responsibility of the government, tech companies, and civil society is to work together in setting up privacy-respecting systems that are secure. Essentially, tech companies can collaborate with governments to design secure communication channels that protect individual privacy but enable law enforcement agencies to effectively conduct proper lawful investigations through defined and transparent protocols.
5. Independent Oversight Mechanisms : Independent oversight should be sustained regarding reviewing surveillance activities and making such activities accountable. A regulatory body may observe the state’s surveillance practices and enforce them to be in consonance with privacy standards. The Indian model of independent oversight is to be adopted as followed by the General Data Protection Regulation of the European Union, wherein the data protection authorities enforce compliance and penalize violation.
References
- Obermeyer, Z. & Emanuel, E.J., Predicting the Future — Big Data, Machine Learning, and Clinical Medicine, 375 New Eng. J. Med. 1216 (2016).
- Topol, E.J., High-Performance Medicine: The Convergence of Human and Artificial Intelligence, 25 Nature Med. 44 (2019).
- Davenport, T.H. & Kalakota, R., The Potential for Artificial Intelligence in Healthcare, 6 Future Healthcare J. 94 (2019).
- World Health Organization, Ethics and Governance of Artificial Intelligence for Health (2021), https://www.who.int/publications/i/item/9789240029200.
