ISSN : 2583-2646

Use of Information Technology and Channels as a tool for Prevention of Violation of Right to Privacy – Challenges and Governance

ESP Journal of Engineering & Technology Advancements
© 2023 by ESP-JETA
Volume 3  Issue 4 No 1
Year of Publication : 2023
Authors : Hemant Jahav, Sameer D. Joshi
:10.56472/25832646/ICI2ETM-M119

Citation:

Hemant Jahav, Sameer D. Joshi, 2023. "Use of Information Technology and Channels as a tool for Prevention of Violation of Right to Privacy – Challenges and Governance" ESP Journal of Engineering & Technology Advancements  3(4)no1: 31-33.

Abstract:

There are enormous privacy threats and challenges in today’s technologically developing world. Different sections of the society are exposed to threats as to privacy. The 21st century has witnessed a number of cases on internet privacy, a peep into the personal life of citizens. Technological development could be like a sword which cuts, many cases are witnesses to this like Google map, right of being online anonymous, mobile phone tracking, surveillance etc which have close tie to safety and freedom of expression. The development of search engines and World Wide Web aid in users to infiltrate in order to seek the information, browse history; violate human rights such as freedom of privacy and compromise third parties rights. There have been many sex and MMS abuse leading to different types of scandals in India. Bulk messaging has also been used as a tool for phishing. There are many unsolicited telemarketing calls and text messages which pose a threat to privacy even if the number is has been listed under the DND Category. In cyberspace users’ rights to privacy and freedom of expression, are infringed by government monitoring and surveillance (authorities), Internet intermediaries, corporate sector, Banks and Financial Institutions in the form of data secrecies and other users.

References:


[1] UNESCO Report: A Global legal Survey of Internet Privacy, Available on https://www.google.co.in/?gfe_rd=cr&ei=gqKTVMHnEITV8geOw4GYAw&gws_rd=ssl#q=papers+on+privacy+on+internet.
[2] IBID.
[3] The Constitution of India.
[4] V.N.Shukla “Constitution of India”, Pg191, Eleventh Edition, Lucknow, 2010.
[5] Herman T. Tavani, “Privacy and the Internet”, April 19th 2000, presented at the Ethics & Technology Conference June 5, 1999, Available on http://www.bc.edu/bc_org/avp/law/st_org/iptf/commentary/content/2000041901.html.
[6] Dr. J.N. Pandey, “The Constitutional Law of India”, Pg247, 47th Edition Central Law Agency, Allahabad 2010.
[7] Declan, Anne Broache, Article dated December 1st 2006”- FBI Taps cell phone as an eves-dropping tool”.C-Net news.
[8] Odell, Mark (August 1, 2005). "Use of mobile helped police keep tabs on suspect". Financial Times. Retrieved 14 March 2009.
[9] Dr. J.N. Pandey “The Constitutional Law of India”, Pg 250,47th Edition Central Law Agency, Allahabad 2010.
[10] Christopher Bronk,”Web-tapping: Securing the internet to save us from transitional terror”.
[11] AIR 1991 SC 207.
[12] AIR 1995 SC 495
[13] AIR 1981 SC 760
[14] W.P. No. 587 of 2014, MANU/TN/0427/2014.
[15] MANU/MH/1827/2014 .
[16] Section 67B of the Information Technology Act of 2000, with the Amendments of 2008 & 2015,
[17] Section 66-E, Information Technology Act 2000, with the Amendments of 2008 & 2015.

Keywords:

Privacy Threats, Surveillance, Safety, Freedom of Expression, Monitoring.