25.01.2018 Views

white_paper_on_data_protection_in_india_171127_final_v2

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

1.2 Types of Enforcement Models<br />

There have been c<strong>on</strong>cerns <strong>in</strong> the past regard<strong>in</strong>g the strength and effectiveness of enforcement<br />

mechanisms <strong>in</strong> the Indian c<strong>on</strong>text, especially when it comes to technology-related laws. 661<br />

Appropriate c<strong>on</strong>siderati<strong>on</strong> must thus be given to the enforcement model that is to be<br />

employed. Generally, <strong>on</strong>e may c<strong>on</strong>sider three different variati<strong>on</strong>s: 662<br />

(i)<br />

‗Command and c<strong>on</strong>trol‘ regulati<strong>on</strong><br />

This approach requires the State to provide legal rules or clear prescripti<strong>on</strong>s for regulated<br />

entities, with no room for discreti<strong>on</strong>. If these prescripti<strong>on</strong>s are not followed, the State<br />

exercises its power to sancti<strong>on</strong>. Where elements of a ‗command and c<strong>on</strong>trol‘ system are<br />

adopted, necessary features <strong>in</strong>clude the <strong>in</strong>volvement of some governmental authority or the<br />

other, whether this <strong>in</strong>volvement is through the establishment of a s<strong>in</strong>gle, specialized agency<br />

or the creati<strong>on</strong> of a federated, sectoral framework.<br />

A number of issues are raised <strong>on</strong> this po<strong>in</strong>t, <strong>in</strong>clud<strong>in</strong>g whether the state mach<strong>in</strong>ery <strong>in</strong>volved<br />

should be unified, how <strong>in</strong>dependent it should be from governmental c<strong>on</strong>trol and <strong>in</strong>dustry<br />

<strong>in</strong>fluence, whether it should have regi<strong>on</strong>al spread, what regulatory tools and forms of sancti<strong>on</strong><br />

it should have at its disposal etc. Most jurisdicti<strong>on</strong>s do not have <strong>data</strong> protecti<strong>on</strong> frameworks<br />

that are purely ‗command and c<strong>on</strong>trol‘ <strong>in</strong> nature and create some room for <strong>in</strong>dustry<br />

<strong>in</strong>volvement.<br />

(ii)<br />

Self-regulati<strong>on</strong><br />

This approach <strong>in</strong>volves private organisati<strong>on</strong>s comply<strong>in</strong>g with standards they set for<br />

themselves without any enforcement by the State. 663 In a self-regulatory framework, norms<br />

become established either through market forces (such as demand for privacy from<br />

c<strong>on</strong>sumers), through <strong>in</strong>dustry standard-sett<strong>in</strong>g or through some limited facilitati<strong>on</strong> of market<br />

transacti<strong>on</strong>s <strong>in</strong> the form of choice-enhanc<strong>in</strong>g legal rules such as <strong>in</strong>formati<strong>on</strong> disclosure norms.<br />

Legal obligati<strong>on</strong>s that enhance the fairness of transacti<strong>on</strong>s such as notice and privacy policy<br />

requirements may require governmental enforcement mach<strong>in</strong>ery and do not always fit<br />

comfortably <strong>in</strong> the self-regulati<strong>on</strong> rubric. The US is a good example of a jurisdicti<strong>on</strong> with<br />

largely self-regulatory elements, though a few sector-specific and state-specific laws are also<br />

<strong>in</strong> place. As these rules are a threshold requirement for achiev<strong>in</strong>g regulatory effectiveness,<br />

661 Deborah Roach Gaut and Barbara Crutchfield George, ‗Offshore Outsourc<strong>in</strong>g to India by U.S. and E.U.<br />

Companies Legal and Cross-Cultural Issues that Affect Data Privacy Regulati<strong>on</strong> <strong>in</strong> Bus<strong>in</strong>ess Process<br />

Outsourc<strong>in</strong>g‘, 6 UC Davis Bus<strong>in</strong>ess Law Journal 13 (2006).<br />

662 Dennis D. Hirsch, ‗The Law and Policy of Onl<strong>in</strong>e Privacy: Regulati<strong>on</strong>, Self-Regulati<strong>on</strong>, or Co-Regulati<strong>on</strong>?‘<br />

34 Seattle University Law Review 439, 440-41 (2011).<br />

663 Reuben B<strong>in</strong>ns, ‗Data Protecti<strong>on</strong> Impact Assessments: A meta-regulatory approach,‘ 7(1) Internati<strong>on</strong>al Data<br />

Privacy Law 22, 25-29 (2017); Cary Coglienese and Evan Mendels<strong>on</strong>, ‗Meta-regulati<strong>on</strong> and Self-Regulati<strong>on</strong>‘ <strong>in</strong><br />

Oxford Handbook of Regulati<strong>on</strong>, 146, 147-148 (Robert Baldw<strong>in</strong> et al eds., 2010).<br />

144

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!