{"id":255060,"date":"2021-10-01T17:00:11","date_gmt":"2021-10-01T11:30:11","guid":{"rendered":"https:\/\/www.scconline.com\/blog\/?p=255060"},"modified":"2021-10-01T17:07:17","modified_gmt":"2021-10-01T11:37:17","slug":"right-to-digital-privacy","status":"publish","type":"post","link":"https:\/\/www.scconline.com\/blog\/post\/2021\/10\/01\/right-to-digital-privacy\/","title":{"rendered":"Right to Digital Privacy:\u00a0 A Critical and Comparative Analysis of the Draft Data Protection Bill and Role of Government Autonomy in Using Persuasive Technology to Affect Democracy"},"content":{"rendered":"<p><a href=\"#_ftn1\" name=\"_ftnref1\"><\/a><\/p>\n<h3 style=\"text-align: justify;\"><span style=\"color: #000080;\"><strong>Introduction<\/strong><\/span><\/h3>\n<p style=\"text-align: justify;\">The phenomenon of technological advancement has led private and government entities to collect personal data of citizens, traces of which are inadvertently left by users while browsing the internet. Such personal information collected without consent of the user is then used to influence the behaviour and action of the citizen through persuasive technology resulting in transgression of the liberty granted to each Indian citizen by the Constitution.<\/p>\n<p style=\"text-align: justify;\">Although the need<a href=\"#_ftn2\" name=\"_ftnref2\">1<\/a> for a dedicated legislation<a href=\"#_ftn3\" name=\"_ftnref3\">2<\/a> on data protection and privacy was previously stated by Standing and Parliamentary<a href=\"#_ftn4\" name=\"_ftnref4\">4<\/a> Committees in their Reports, a major breakthrough did not arrive until the recent <em>Puttaswamy<\/em><a href=\"#_ftn5\" name=\"_ftnref5\">5<\/a> judgment pronounced by the Supreme Court of India which recognised the Right to Privacy as a fundamental right and informational privacy, a postulate of human dignity emanating from liberty and right to life<a href=\"#_ftn6\" name=\"_ftnref6\">6<\/a>. Placing the accountability on the State, the Court held that the individual at the center stage and directed the Central Government to put a robust mechanism in place.<\/p>\n<h3 style=\"text-align: justify;\"><span style=\"color: #000080;\"><strong>Draft Data Protection Bill \u2013 Critical overview <\/strong><\/span><\/h3>\n<p style=\"text-align: justify;\">\u00a0In accordance with direction of the Supreme Court, Justice B.N. Srikrishna Committee<a href=\"#_ftn7\" name=\"_ftnref7\">7<\/a> was set up which presented the Draft Personal Data Protection Bill, 2019<a href=\"#_ftn8\" name=\"_ftnref8\">8<\/a> currently under consideration of a Joint Parliamentary Committee of the Parliament<a href=\"#_ftn9\" name=\"_ftnref9\">9<\/a>. While the Bill elaborately discusses the categories of data<a href=\"#_ftn10\" name=\"_ftnref10\">10<\/a>, inclusion of Government as a responsible party<a href=\"#_ftn11\" name=\"_ftnref11\">11<\/a>, restriction of retention of personal data<a href=\"#_ftn12\" name=\"_ftnref12\">12<\/a> and process of obtaining consent<a href=\"#_ftn13\" name=\"_ftnref13\">13<\/a>; particular important aspects of right to collection of such data evade through the voluminous white paper leaving emphasis only on secondary aspects of its usage. This view is corroborated by the letter written by eminent jurist, Justice M. Jagannadha Rao (retd.) to the Justice Krishna Committee where he questions the extent of permissible surveillance by the State. The Bill discusses the constitution of the regulatory authority<a href=\"#_ftn14\" name=\"_ftnref14\">14<\/a> which is to be appointed solely by the Central Government but does not specify the Committee members after laying down the selection criterion. Giving a free hand to the government entities it grants exemptions<a href=\"#_ftn15\" name=\"_ftnref15\">15<\/a> where the government agency shall elude from the consent procedure laid down as per the Act. The Parliamentary Committee presently considering the Bill is unbalanced in its composition with no diverse perspective present. Absence of dissent in the Committee with majority of the members aligned with the government view, steers the way free for the Bill to be passed with least or no amendments.<\/p>\n<h3 style=\"text-align: justify;\"><span style=\"color: #000080;\"><strong>Government autonomy in draft Bill \u2014 Absolute power corrupts absolutely <\/strong><\/span><\/h3>\n<p style=\"text-align: justify;\">The combined factors of structure of draft Bill and the lack of strong opposition in the Committee considering it, work towards autonomy remaining in hands of the Government, and the possibility of potential misuse by State surveillance. While persuasive technology has potentially affected the Indian democracy in the past<a href=\"#_ftn16\" name=\"_ftnref16\">16<\/a> such unrestricted power may well destroy the constitutional fabric by influencing voters using their data, instances of which have already occurred in some parts of the world<a href=\"#_ftn17\" name=\"_ftnref17\">17<\/a>. If the current model is followed, a government in power can use persuasive technology to drive voters to vote in their favour and can escape the liability under the veil of exemptions or easily receive a clean chit from a favourable regulatory authority.<\/p>\n<h3 style=\"text-align: justify;\"><span style=\"color: #000080;\"><strong>Affect of persuasive technology on elections \u2014 Deleting reoccurrence of Cambridge Analytica episode<\/strong><\/span><\/h3>\n<p style=\"text-align: justify;\">The potential misuse of technology in elections through accessing personal data bits of the voter is an episode telecasted in India in the recent past too. Although an Indian citizen as per law<a href=\"#_ftn18\" name=\"_ftnref18\">18<\/a> is to be compensated for unauthorised access or leakage of personal information, no compensation was awarded when information from over thousands of facebook accounts were extracted to manipulate election results. Cambridge Analytica, a political consultancy firm based in the UK has shown us a prequel as to the search engine manipulation effect<a href=\"#_ftn19\" name=\"_ftnref19\">19<\/a> while its business brochure boasts experience of working in elections and political events from around the globe, speculations of it affecting the US elections leading to the victory of Trump, stirring political conundrums is a speculation which cannot be entirely put to rest. While the former employee of the company admitted to harvesting unsolicited personal information<a href=\"#_ftn20\" name=\"_ftnref20\">20<\/a> and claimed to work with national political parties in India the exemption clause to government entities in the Draft Data Protection Bill, 2019 shall make sure that such manipulation is masked and no evidence of manipulation remains. Linking the dots together we paint ourselves a tarnished image of democracy where choice of the people, by the people and of the people are all directed by the data holding puppeteer. Various studies<a href=\"#_ftn21\" name=\"_ftnref21\">21<\/a> conducted on the affect of persuasive technology across the globe have shown that direct response advertisements and personally targeted messages on the screens of the social media user were common around the months of election. For instance, \u201cOur recovery will be made in America\u201d surfaced on the screens of maximum American voters in region which were predominantly democrat. Thus, a legislation exempting the government entities to access sensitive personal data of its citizens will not only affect power play in politics but will also corrode the democratic structure.<\/p>\n<h3 style=\"text-align: justify;\"><span style=\"color: #000080;\"><strong>Adjudging vicarious liability<\/strong><\/span><\/h3>\n<p style=\"text-align: justify;\">The UK Supreme Court in a recent case of <em>Various Claimants <\/em>v.<em> W.M. Morrison Supermarkets Plc<\/em><a href=\"#_ftn22\" name=\"_ftnref22\">22<\/a> decided on the vicarious liability of the employer Morrisons as his employee, Mr. Skelton, disclosed confidential data of over thousand employees. The Supreme Court held that as it was an act of personal vendetta and as the data was given for a legitimate task, the wrongdoing was not in the nature of employment of the employee the principle of vicarious liability shall not apply. The Draft Data Protection Bill is silent on this perspective. It is unclear whether a government employee in possession of sensitive personal information will be treated as an extension of the term government entity or will be labelled as an agent in case data is illegally outsourced for financial considerations. Will the Government be held vicariously responsible in case sensitive data of voters is traded to manipulate election outcome by any of its employees. This issue needs to be recognised and addressed in the light of the principle of vicarious liability and precedents on data breach.<\/p>\n<h3 style=\"text-align: justify;\"><span style=\"color: #000080;\"><strong>Suggestive recommendations \u2014 Mending the road ahead <\/strong><\/span><\/h3>\n<p style=\"text-align: justify;\">To prevent potential misuse, a methodical framework is to be adopted to thwart State surveillance. The first step would be to declare data of an individual as property and make it available on payment of consideration. It would be useful to consider the US senate hearings<a href=\"#_ftn23\" name=\"_ftnref23\">23<\/a> as a reference point to develop a framework whereby witnesses have accepted to social media websites like Facebook<a href=\"#_ftn24\" name=\"_ftnref24\">24<\/a>, eating election advertising to influence voter pool. Adopting norms of laissez-faire; similar to US; where consent of the citizen is required before usage of their personal data becomes essential in curbing abuse of State surveillance. Further setting up standard security measures to be met with all entities in possession of such data can be framed on the lines of EU GDPR<a href=\"#_ftn25\" name=\"_ftnref25\">25<\/a> laws which would ensure strong security protocol. With security protocols in place the next step would be to set out a timeline which places a cap on the time period beyond which data retention by entities would not be permitted while also providing a cut-off date to delete previously retained data. The concept of vicarious liability of the government and private sector entities needs to be infused in the present draft Bill. To bring about such changes the defect in the composition of the Parliamentary Committee is to be cured by introducing members of diverse view (opposition party) in equal number of government representatives to avoid polarisation of opinion and ensure democratic action in data collection while keeping State surveillance in check.<\/p>\n<hr \/>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref1\" name=\"_ftn1\">\u2020<\/a> <span style=\"color: #008000;\">Shivani Dewalla, Advocate Supreme Court of India and High Court of Delhi, presently associated with the chambers of Mr R.S. Suri, Additional Solicitor General of India, e-mail:<\/span> <a href=\"mailto:shivanidewalla5@gmail.com\">shivanidewalla5@gmail.com<\/a><u>.<\/u><\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref2\" name=\"_ftn2\">1<\/a> The 50th Report of the SCIT on the Information Technology (Amendment) Bill, 2006. See, &lt;https:\/\/eparlib.nic.in\/bitstream\/123456789\/63025\/1\/14_Information_Technology_50.pdf&gt;.<\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref3\" name=\"_ftn3\">2<\/a> 52nd Report of the SCIT on Cyber Crime, Cyber Security and Right to Privacy. See &lt;https:\/\/eparlib.nic.in\/bitstream\/123456789\/64330\/1\/15_Information_Technology_52.pdf&gt;.<\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref4\" name=\"_ftn4\">4<\/a> The A.P. Shah Committee Report in 2012. See, &lt;https:\/\/niti.gov.in\/planningcommission.gov.in\/docs\/reports\/genrep\/rep_privacy.pdf&gt;.<\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref5\" name=\"_ftn5\">5<\/a> <em>K.S. Puttaswamy<\/em> v. <em>Union of India<\/em>, <a href=\"http:\/\/www.scconline.com\/DocumentLink\/91Brhvd7\">(2017) 10 SCC 1<\/a>. This judgment overruled previous judgments of <em>M.P.<\/em> <em>Sharma<\/em> v. <em>Satish Chandra<\/em>, <a href=\"http:\/\/www.scconline.com\/DocumentLink\/68mt5dT9\">1954 SCR 1077<\/a> and <em>Kharak Singh<\/em> v. <em>State of U.P.<\/em>, <a href=\"http:\/\/www.scconline.com\/DocumentLink\/FD3qAsEl\">(1964) 1 SCR 332<\/a> to the extent to which they did not recognise right to privacy as a fundamental right.<\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref6\" name=\"_ftn6\">6<\/a> <em>K.S. Puttaswamy v. Union of India<\/em>, <a href=\"http:\/\/www.scconline.com\/DocumentLink\/91Brhvd7\">(2017) 10 SCC 1<\/a>, See, Per S.A. Bobde, J. at para 6; Per Chelameswar, J. at para 9; Per Dr D.Y. Chandrachud, J. at para 320.<\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref7\" name=\"_ftn7\">7<\/a> Report of the Committee, available on &lt;https:\/\/www.meity.gov.in\/writereaddata\/files\/white_paper_on_data_protection_in_india_171127_final_v2.pdf&gt;.<\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref8\" name=\"_ftn8\">8<\/a> &lt;<a href=\"http:\/\/www.scconline.com\/DocumentLink\/A3yGRo3e\">http:\/\/www.scconline.com\/DocumentLink\/A3yGRo3e<\/a>&gt;.<\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref9\" name=\"_ftn9\">9<\/a>&lt;https:\/\/www.meity.gov.in\/writereaddata\/files\/constitution_of_committee_of_experts_to_deliberate_on_data_governance-framework.pdf&gt;.<\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref10\" name=\"_ftn10\">10<\/a> Ss. 3 (19), (21), (28) and (36) of the Personal Data Protection Bill, 2019. &lt;http:\/\/www.scconline.com\/DocumentLink\/A3yGRo3e&gt;<\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref11\" name=\"_ftn11\">11<\/a> S. 2 of the Personal Data Protection Bill, 2019 &lt;http:\/\/www.scconline.com\/DocumentLink\/A3yGRo3e&gt;<\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref12\" name=\"_ftn12\">12<\/a> S. 9 of the Personal Data Protection Bill, 2019. &lt;http:\/\/www.scconline.com\/DocumentLink\/A3yGRo3e&gt;<\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref13\" name=\"_ftn13\">13<\/a> S. 11 of the Personal Data Protection Bill, 2019. &lt;http:\/\/www.scconline.com\/DocumentLink\/A3yGRo3e&gt;<\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref14\" name=\"_ftn14\">14<\/a> Ss. 41 and 42 of the Personal Data Protection Bill, 2019. &lt;http:\/\/www.scconline.com\/DocumentLink\/A3yGRo3e&gt;<\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref15\" name=\"_ftn15\">15<\/a> Ch. VIII, Cls. 35-40 of the Personal Data Protection Bill, 2019. &lt;http:\/\/www.scconline.com\/DocumentLink\/A3yGRo3e&gt;<\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref16\" name=\"_ftn16\">16<\/a> See, &lt;<a href=\"https:\/\/in.reuters.com\/article\/facebook-cambridge-analytica-india\/india-queries-cambridge-analytica-over-alleged-facebook-data-breach-idINKBN1H00B0\">https:\/\/in.reuters.com\/article\/facebook-cambridge-analytica-india\/india-queries-cambridge-analytica-over-alleged-facebook-data-breach-idINKBN1H00B0<\/a>&gt; to assess misuse of data over internet to affect Indian elections.<\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref17\" name=\"_ftn17\">17<\/a> US election affected by persuasive technology &lt;<a href=\"https:\/\/www.dni.gov\/files\/documents\/ICA_2017_01.pdf\">https:\/\/www.dni.gov\/files\/documents\/ICA_2017_01.pdf<\/a>&gt;.<\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref18\" name=\"_ftn18\">18<\/a> <a href=\"http:\/\/www.scconline.com\/DocumentLink\/hyzHNFyG\">S. 43-A Information Technology Act, 2000.<\/a><\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref19\" name=\"_ftn19\">19<\/a> See, &lt;<a href=\"https:\/\/www.pnas.org\/content\/112\/33\/E4512#sec-5\">https:\/\/www.pnas.org\/content\/112\/33\/E4512#sec-5<\/a>&gt;, to assess case studies proving potential misuse of search engines.<\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref20\" name=\"_ftn20\">20<\/a> See more information on, Ex-Cambridge Analytica boss admits getting Facebook data from researcher on &lt;https:\/\/www.reuters.com\/article\/facebook-privacy-britain-idINKCN1J222L?edition-redirect=in&gt;.<\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref21\" name=\"_ftn21\">21<\/a> See, &lt;<a href=\"https:\/\/adobservatory.org\/\">https:\/\/adobservatory.org\/<\/a>&gt;, New York University project on ad observatory providing information on spending on social media by President nominees in America.<\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref22\" name=\"_ftn22\">22<\/a> <a href=\"http:\/\/www.scconline.com\/DocumentLink\/ni21nBVr\">(2020) 2 WLR 941: 2020 UKSC 12.<\/a><\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref23\" name=\"_ftn23\">23<\/a> See, &lt;<a href=\"https:\/\/www.commerce.senate.gov\/services\/files\/20789C1F-12C1-400E-9936-092F6AC74EDC\">https:\/\/www.commerce.senate.gov\/services\/files\/20789C1F-12C1-400E-9936-092F6AC74EDC<\/a>&gt;, US Senate hearings \u2014 \u201cResponses to Written Questions submitted by Honorable John Thune to Tristan Harris\u201d, emphasising on digital well-being of the user.<\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref24\" name=\"_ftn24\">24<\/a> See, &lt;https:\/\/www.commerce.senate.gov\/services\/files\/96E3A739-DC8D-45F1-87D7-EC70A368371D&gt;. Mr. Tristan Harris \u2014 Co-Founder and Executive Director \u2014 Center for Humane Technology, Facebook \u201ceats\u201d election advertising.<\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref25\" name=\"_ftn25\">25<\/a> General Data Protection Regulation (EU) 2016\/679 (<strong>GDPR<\/strong>) came into force on 25-5-2018 as an umbrella regulation to safeguard data and privacy in the European Union (<strong>EU<\/strong>) and European Economic Area.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>by Shivani Dewalla\u2020<\/p>\n","protected":false},"author":67011,"featured_media":255061,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[42503,1191],"tags":[44349,29785,47348,47349,20481],"class_list":["post-255060","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-legal-analysis","category-op-ed","tag-data-protection-bill","tag-law","tag-right-to-digital-privacy","tag-technological-advancement","tag-vicarious-liability"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Right to Digital Privacy:\u00a0 A Critical and Comparative Analysis of the Draft Data Protection Bill and Role of Government Autonomy in Using Persuasive Technology to Affect Democracy | SCC Times<\/title>\n<meta name=\"description\" content=\"Right to Digital Privacy\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.scconline.com\/blog\/post\/2021\/10\/01\/right-to-digital-privacy\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Right to Digital Privacy:\u00a0 A Critical and Comparative Analysis of the Draft Data Protection Bill and Role of Government Autonomy in Using Persuasive Technology to Affect Democracy\" \/>\n<meta property=\"og:description\" content=\"Right to Digital Privacy\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.scconline.com\/blog\/post\/2021\/10\/01\/right-to-digital-privacy\/\" \/>\n<meta property=\"og:site_name\" content=\"SCC Times\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/scc.online\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-10-01T11:30:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-10-01T11:37:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.scconline.com\/blog\/wp-content\/uploads\/2021\/10\/MicrosoftTeams-image-101.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1331\" \/>\n\t<meta property=\"og:image:height\" content=\"888\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Editor\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Editor\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.scconline.com\\\/blog\\\/post\\\/2021\\\/10\\\/01\\\/right-to-digital-privacy\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.scconline.com\\\/blog\\\/post\\\/2021\\\/10\\\/01\\\/right-to-digital-privacy\\\/\"},\"author\":{\"name\":\"Editor\",\"@id\":\"https:\\\/\\\/www.scconline.com\\\/blog\\\/#\\\/schema\\\/person\\\/84e42bab48238baf12c7e33b3d9761fe\"},\"headline\":\"Right to Digital Privacy:\u00a0 A Critical and Comparative Analysis of the Draft Data Protection Bill and Role of Government Autonomy in Using Persuasive Technology to Affect Democracy\",\"datePublished\":\"2021-10-01T11:30:11+00:00\",\"dateModified\":\"2021-10-01T11:37:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.scconline.com\\\/blog\\\/post\\\/2021\\\/10\\\/01\\\/right-to-digital-privacy\\\/\"},\"wordCount\":1855,\"commentCount\":1,\"image\":{\"@id\":\"https:\\\/\\\/www.scconline.com\\\/blog\\\/post\\\/2021\\\/10\\\/01\\\/right-to-digital-privacy\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.scconline.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/10\\\/MicrosoftTeams-image-101.jpg\",\"keywords\":[\"Data Protection Bill\",\"law\",\"Right to Digital Privacy\",\"Technological Advancement\",\"vicarious liability\"],\"articleSection\":[\"Op Eds\",\"OP. ED.\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.scconline.com\\\/blog\\\/post\\\/2021\\\/10\\\/01\\\/right-to-digital-privacy\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.scconline.com\\\/blog\\\/post\\\/2021\\\/10\\\/01\\\/right-to-digital-privacy\\\/\",\"url\":\"https:\\\/\\\/www.scconline.com\\\/blog\\\/post\\\/2021\\\/10\\\/01\\\/right-to-digital-privacy\\\/\",\"name\":\"Right to Digital Privacy:\u00a0 A Critical and Comparative Analysis of the Draft Data Protection Bill and Role of Government Autonomy in Using Persuasive Technology to Affect Democracy | SCC Times\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.scconline.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.scconline.com\\\/blog\\\/post\\\/2021\\\/10\\\/01\\\/right-to-digital-privacy\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.scconline.com\\\/blog\\\/post\\\/2021\\\/10\\\/01\\\/right-to-digital-privacy\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.scconline.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/10\\\/MicrosoftTeams-image-101.jpg\",\"datePublished\":\"2021-10-01T11:30:11+00:00\",\"dateModified\":\"2021-10-01T11:37:17+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.scconline.com\\\/blog\\\/#\\\/schema\\\/person\\\/84e42bab48238baf12c7e33b3d9761fe\"},\"description\":\"Right to Digital Privacy\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.scconline.com\\\/blog\\\/post\\\/2021\\\/10\\\/01\\\/right-to-digital-privacy\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.scconline.com\\\/blog\\\/post\\\/2021\\\/10\\\/01\\\/right-to-digital-privacy\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.scconline.com\\\/blog\\\/post\\\/2021\\\/10\\\/01\\\/right-to-digital-privacy\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.scconline.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/10\\\/MicrosoftTeams-image-101.jpg\",\"contentUrl\":\"https:\\\/\\\/www.scconline.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/10\\\/MicrosoftTeams-image-101.jpg\",\"width\":1331,\"height\":888},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.scconline.com\\\/blog\\\/post\\\/2021\\\/10\\\/01\\\/right-to-digital-privacy\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.scconline.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Right to Digital Privacy:\u00a0 A Critical and Comparative Analysis of the Draft Data Protection Bill and Role of Government Autonomy in Using Persuasive Technology to Affect Democracy\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.scconline.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.scconline.com\\\/blog\\\/\",\"name\":\"SCC Times\",\"description\":\"Bringing you the Best Analytical Legal News\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.scconline.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.scconline.com\\\/blog\\\/#\\\/schema\\\/person\\\/84e42bab48238baf12c7e33b3d9761fe\",\"name\":\"Editor\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/34e366be721c41333586de05faa13743195f5b142dcd7a015c6fabd2389521d0?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/34e366be721c41333586de05faa13743195f5b142dcd7a015c6fabd2389521d0?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/34e366be721c41333586de05faa13743195f5b142dcd7a015c6fabd2389521d0?s=96&d=mm&r=g\",\"caption\":\"Editor\"},\"url\":\"https:\\\/\\\/www.scconline.com\\\/blog\\\/post\\\/author\\\/editor_4\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Right to Digital Privacy:\u00a0 A Critical and Comparative Analysis of the Draft Data Protection Bill and Role of Government Autonomy in Using Persuasive Technology to Affect Democracy | SCC Times","description":"Right to Digital Privacy","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.scconline.com\/blog\/post\/2021\/10\/01\/right-to-digital-privacy\/","og_locale":"en_US","og_type":"article","og_title":"Right to Digital Privacy:\u00a0 A Critical and Comparative Analysis of the Draft Data Protection Bill and Role of Government Autonomy in Using Persuasive Technology to Affect Democracy","og_description":"Right to Digital Privacy","og_url":"https:\/\/www.scconline.com\/blog\/post\/2021\/10\/01\/right-to-digital-privacy\/","og_site_name":"SCC Times","article_publisher":"https:\/\/www.facebook.com\/scc.online\/","article_published_time":"2021-10-01T11:30:11+00:00","article_modified_time":"2021-10-01T11:37:17+00:00","og_image":[{"width":1331,"height":888,"url":"https:\/\/www.scconline.com\/blog\/wp-content\/uploads\/2021\/10\/MicrosoftTeams-image-101.jpg","type":"image\/jpeg"}],"author":"Editor","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Editor","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.scconline.com\/blog\/post\/2021\/10\/01\/right-to-digital-privacy\/#article","isPartOf":{"@id":"https:\/\/www.scconline.com\/blog\/post\/2021\/10\/01\/right-to-digital-privacy\/"},"author":{"name":"Editor","@id":"https:\/\/www.scconline.com\/blog\/#\/schema\/person\/84e42bab48238baf12c7e33b3d9761fe"},"headline":"Right to Digital Privacy:\u00a0 A Critical and Comparative Analysis of the Draft Data Protection Bill and Role of Government Autonomy in Using Persuasive Technology to Affect Democracy","datePublished":"2021-10-01T11:30:11+00:00","dateModified":"2021-10-01T11:37:17+00:00","mainEntityOfPage":{"@id":"https:\/\/www.scconline.com\/blog\/post\/2021\/10\/01\/right-to-digital-privacy\/"},"wordCount":1855,"commentCount":1,"image":{"@id":"https:\/\/www.scconline.com\/blog\/post\/2021\/10\/01\/right-to-digital-privacy\/#primaryimage"},"thumbnailUrl":"https:\/\/www.scconline.com\/blog\/wp-content\/uploads\/2021\/10\/MicrosoftTeams-image-101.jpg","keywords":["Data Protection Bill","law","Right to Digital Privacy","Technological Advancement","vicarious liability"],"articleSection":["Op Eds","OP. ED."],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.scconline.com\/blog\/post\/2021\/10\/01\/right-to-digital-privacy\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.scconline.com\/blog\/post\/2021\/10\/01\/right-to-digital-privacy\/","url":"https:\/\/www.scconline.com\/blog\/post\/2021\/10\/01\/right-to-digital-privacy\/","name":"Right to Digital Privacy:\u00a0 A Critical and Comparative Analysis of the Draft Data Protection Bill and Role of Government Autonomy in Using Persuasive Technology to Affect Democracy | SCC Times","isPartOf":{"@id":"https:\/\/www.scconline.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.scconline.com\/blog\/post\/2021\/10\/01\/right-to-digital-privacy\/#primaryimage"},"image":{"@id":"https:\/\/www.scconline.com\/blog\/post\/2021\/10\/01\/right-to-digital-privacy\/#primaryimage"},"thumbnailUrl":"https:\/\/www.scconline.com\/blog\/wp-content\/uploads\/2021\/10\/MicrosoftTeams-image-101.jpg","datePublished":"2021-10-01T11:30:11+00:00","dateModified":"2021-10-01T11:37:17+00:00","author":{"@id":"https:\/\/www.scconline.com\/blog\/#\/schema\/person\/84e42bab48238baf12c7e33b3d9761fe"},"description":"Right to Digital Privacy","breadcrumb":{"@id":"https:\/\/www.scconline.com\/blog\/post\/2021\/10\/01\/right-to-digital-privacy\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.scconline.com\/blog\/post\/2021\/10\/01\/right-to-digital-privacy\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.scconline.com\/blog\/post\/2021\/10\/01\/right-to-digital-privacy\/#primaryimage","url":"https:\/\/www.scconline.com\/blog\/wp-content\/uploads\/2021\/10\/MicrosoftTeams-image-101.jpg","contentUrl":"https:\/\/www.scconline.com\/blog\/wp-content\/uploads\/2021\/10\/MicrosoftTeams-image-101.jpg","width":1331,"height":888},{"@type":"BreadcrumbList","@id":"https:\/\/www.scconline.com\/blog\/post\/2021\/10\/01\/right-to-digital-privacy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.scconline.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Right to Digital Privacy:\u00a0 A Critical and Comparative Analysis of the Draft Data Protection Bill and Role of Government Autonomy in Using Persuasive Technology to Affect Democracy"}]},{"@type":"WebSite","@id":"https:\/\/www.scconline.com\/blog\/#website","url":"https:\/\/www.scconline.com\/blog\/","name":"SCC Times","description":"Bringing you the Best Analytical Legal News","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.scconline.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.scconline.com\/blog\/#\/schema\/person\/84e42bab48238baf12c7e33b3d9761fe","name":"Editor","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/34e366be721c41333586de05faa13743195f5b142dcd7a015c6fabd2389521d0?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/34e366be721c41333586de05faa13743195f5b142dcd7a015c6fabd2389521d0?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/34e366be721c41333586de05faa13743195f5b142dcd7a015c6fabd2389521d0?s=96&d=mm&r=g","caption":"Editor"},"url":"https:\/\/www.scconline.com\/blog\/post\/author\/editor_4\/"}]}},"jetpack_featured_media_url":"https:\/\/www.scconline.com\/blog\/wp-content\/uploads\/2021\/10\/MicrosoftTeams-image-101.jpg","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":281680,"url":"https:\/\/www.scconline.com\/blog\/post\/2023\/01\/16\/understanding-the-ultimatum-analysing-the-new-vpn-rules\/","url_meta":{"origin":255060,"position":0},"title":"Understanding the Ultimatum: Analysing the New VPN Rules","author":"Bhumika Indulia","date":"January 16, 2023","format":false,"excerpt":"by Sanchit Sinha\u2020 and Sufian Ahmed\u2020\u2020","rel":"","context":"In &quot;Op Eds&quot;","block_context":{"text":"Op Eds","link":"https:\/\/www.scconline.com\/blog\/post\/category\/op-ed\/legal-analysis\/"},"img":{"alt_text":"VPN Rules","src":"https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2023\/01\/MicrosoftTeams-image-89.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":235167,"url":"https:\/\/www.scconline.com\/blog\/post\/2020\/09\/01\/data-privacy-need-for-stronger-laws\/","url_meta":{"origin":255060,"position":1},"title":"Data Privacy: Need for stronger laws","author":"Bhumika Indulia","date":"September 1, 2020","format":false,"excerpt":"Bhumesh Verma, Managing Partner and Paruchuri Baswanth Mohan, Research Associate, Corp Comm Legal Cite as: (2020) PL (CL) August 60","rel":"","context":"In &quot;Op Eds&quot;","block_context":{"text":"Op Eds","link":"https:\/\/www.scconline.com\/blog\/post\/category\/op-ed\/legal-analysis\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2018\/03\/Corp-Comm-Legal-1.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2018\/03\/Corp-Comm-Legal-1.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2018\/03\/Corp-Comm-Legal-1.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2018\/03\/Corp-Comm-Legal-1.jpg?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2018\/03\/Corp-Comm-Legal-1.jpg?resize=1050%2C600&ssl=1 3x"},"classes":[]},{"id":249813,"url":"https:\/\/www.scconline.com\/blog\/post\/2021\/06\/15\/protection-of-personal-data\/","url_meta":{"origin":255060,"position":2},"title":"Protection of personal data: A legal perspective","author":"Editor","date":"June 15, 2021","format":false,"excerpt":"by Gurleen Kaur\u2020","rel":"","context":"In &quot;Op Eds&quot;","block_context":{"text":"Op Eds","link":"https:\/\/www.scconline.com\/blog\/post\/category\/op-ed\/legal-analysis\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2021\/06\/MicrosoftTeams-image-5-3.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2021\/06\/MicrosoftTeams-image-5-3.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2021\/06\/MicrosoftTeams-image-5-3.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2021\/06\/MicrosoftTeams-image-5-3.jpg?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2021\/06\/MicrosoftTeams-image-5-3.jpg?resize=1050%2C600&ssl=1 3x"},"classes":[]},{"id":230004,"url":"https:\/\/www.scconline.com\/blog\/post\/2020\/05\/22\/personal-data-protection-bill-2019-examined-through-the-prism-of-fundamental-right-to-privacy-a-critical-study\/","url_meta":{"origin":255060,"position":3},"title":"Personal Data Protection Bill, 2019 \u2013Examined through the Prism of\u00a0 Fundamental Right to Privacy \u2013 A Critical Study","author":"Bhumika Indulia","date":"May 22, 2020","format":false,"excerpt":"by Renjith Mathew*","rel":"","context":"In &quot;Op Eds&quot;","block_context":{"text":"Op Eds","link":"https:\/\/www.scconline.com\/blog\/post\/category\/op-ed\/legal-analysis\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2017\/08\/data-protection.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2017\/08\/data-protection.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2017\/08\/data-protection.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2017\/08\/data-protection.jpg?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2017\/08\/data-protection.jpg?resize=1050%2C600&ssl=1 3x"},"classes":[]},{"id":264616,"url":"https:\/\/www.scconline.com\/blog\/post\/2022\/03\/28\/personal-data-protection-bill\/","url_meta":{"origin":255060,"position":4},"title":"Civil Remedies for Data Protection: A Critical Analysis of the Tortious Provision in Personal Data Protection Bill, 2019","author":"Editor","date":"March 28, 2022","format":false,"excerpt":"by Kumar Aryan*","rel":"","context":"In &quot;Op Eds&quot;","block_context":{"text":"Op Eds","link":"https:\/\/www.scconline.com\/blog\/post\/category\/op-ed\/legal-analysis\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2022\/03\/Data-Protection.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2022\/03\/Data-Protection.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2022\/03\/Data-Protection.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2022\/03\/Data-Protection.jpg?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2022\/03\/Data-Protection.jpg?resize=1050%2C600&ssl=1 3x"},"classes":[]},{"id":258435,"url":"https:\/\/www.scconline.com\/blog\/post\/2021\/12\/13\/facilitating-trust-and-inclusion-important-building-blocks-of-a-data-protection-framework\/","url_meta":{"origin":255060,"position":5},"title":"Facilitating Trust and Inclusion \u2013 Important Building Blocks of a Data Protection Framework","author":"Bhumika Indulia","date":"December 13, 2021","format":false,"excerpt":"by Shefali Mehta\u2020","rel":"","context":"In &quot;Op Eds&quot;","block_context":{"text":"Op Eds","link":"https:\/\/www.scconline.com\/blog\/post\/category\/op-ed\/legal-analysis\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2021\/12\/MicrosoftTeams-image-166.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2021\/12\/MicrosoftTeams-image-166.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2021\/12\/MicrosoftTeams-image-166.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2021\/12\/MicrosoftTeams-image-166.jpg?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2021\/12\/MicrosoftTeams-image-166.jpg?resize=1050%2C600&ssl=1 3x"},"classes":[]}],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/www.scconline.com\/blog\/wp-json\/wp\/v2\/posts\/255060","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.scconline.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.scconline.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.scconline.com\/blog\/wp-json\/wp\/v2\/users\/67011"}],"replies":[{"embeddable":true,"href":"https:\/\/www.scconline.com\/blog\/wp-json\/wp\/v2\/comments?post=255060"}],"version-history":[{"count":0,"href":"https:\/\/www.scconline.com\/blog\/wp-json\/wp\/v2\/posts\/255060\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.scconline.com\/blog\/wp-json\/wp\/v2\/media\/255061"}],"wp:attachment":[{"href":"https:\/\/www.scconline.com\/blog\/wp-json\/wp\/v2\/media?parent=255060"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.scconline.com\/blog\/wp-json\/wp\/v2\/categories?post=255060"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.scconline.com\/blog\/wp-json\/wp\/v2\/tags?post=255060"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}