25.01.2018 Views

white_paper_on_data_protection_in_india_171127_final_v2

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

C. OFFENCES<br />

There are certa<strong>in</strong> types of breaches of <strong>data</strong> protecti<strong>on</strong> obligati<strong>on</strong>s, which, by their very nature<br />

and the impact they create, are extremely serious and may cause significant harm to<br />

<strong>in</strong>dividuals. In these <strong>in</strong>stances, it may be imperative to prescribe crim<strong>in</strong>al sancti<strong>on</strong>s <strong>in</strong> the<br />

form of punishment and severe f<strong>in</strong>es <strong>on</strong> the <strong>data</strong> c<strong>on</strong>troller.<br />

4.9 Issues<br />

The IT Act deals extensively with several types of offences or cybercrimes and prescribes<br />

penalty <strong>in</strong> the form of f<strong>in</strong>es or impris<strong>on</strong>ment or both. 878 Specifically <strong>in</strong> the c<strong>on</strong>text of <strong>data</strong><br />

protecti<strong>on</strong>, Secti<strong>on</strong>s 72 879 and 72A 880 of the IT Act offer some redress. Secti<strong>on</strong> 72 of the IT<br />

Act is limited <strong>in</strong> scope as it prescribes a penalty <strong>on</strong>ly aga<strong>in</strong>st those pers<strong>on</strong>s who have been<br />

given the power under the IT Act or the rules and regulati<strong>on</strong>s made thereunder to access any<br />

electr<strong>on</strong>ic resource. As such, it may be limited to functi<strong>on</strong>aries who have been granted<br />

specific powers under the provisi<strong>on</strong>s of the IT Act. 881 Secti<strong>on</strong> 72A of the IT Act is broader <strong>in</strong><br />

scope as it imposes a penalty <strong>on</strong> any pers<strong>on</strong>, whether a private or public entity, for the<br />

disclosure of pers<strong>on</strong>al <strong>in</strong>formati<strong>on</strong> without the c<strong>on</strong>sent of the pers<strong>on</strong> c<strong>on</strong>cerned. However,<br />

Secti<strong>on</strong> 72A of the IT Act is triggered <strong>on</strong>ly <strong>in</strong> those <strong>in</strong>stances where the pers<strong>on</strong> (who has<br />

disclosed the pers<strong>on</strong>al <strong>in</strong>formati<strong>on</strong>) has secured access to such pers<strong>on</strong>al <strong>in</strong>formati<strong>on</strong> while<br />

provid<strong>in</strong>g services under the terms of a lawful c<strong>on</strong>tract.<br />

Rapid growth of technological advancements which may be utilised towards process<strong>in</strong>g of<br />

pers<strong>on</strong>al <strong>in</strong>formati<strong>on</strong> <strong>in</strong>creases the risk of <strong>data</strong> protecti<strong>on</strong> violati<strong>on</strong>s. C<strong>on</strong>sequently, provisi<strong>on</strong>s<br />

<strong>in</strong> a <strong>data</strong> protecti<strong>on</strong> legal framework may be required to carefully set out crim<strong>in</strong>al liability <strong>in</strong><br />

cases of <strong>data</strong> protecti<strong>on</strong> violati<strong>on</strong>. Moreover, crim<strong>in</strong>al sancti<strong>on</strong> <strong>in</strong> the form of impris<strong>on</strong>ment<br />

and f<strong>in</strong>es may be prescribed to ensure that it adversely affects the <strong>data</strong> c<strong>on</strong>troller f<strong>in</strong>ancially<br />

and reputati<strong>on</strong>ally thereby serv<strong>in</strong>g some deterrent value.<br />

878 This <strong>in</strong>cludes Secti<strong>on</strong> 65 (tamper<strong>in</strong>g with computer source documents), Secti<strong>on</strong> 66 (computer related<br />

offences), Secti<strong>on</strong> 66B (punishment for dish<strong>on</strong>estly receiv<strong>in</strong>g stolen computer resource or communicati<strong>on</strong><br />

device), Secti<strong>on</strong> 66C (punishment for identity theft), Secti<strong>on</strong> 66D (punishment for cheat<strong>in</strong>g by pers<strong>on</strong>ati<strong>on</strong> by<br />

us<strong>in</strong>g computer resource), Secti<strong>on</strong> 66E (punishment for violati<strong>on</strong> of privacy), Secti<strong>on</strong> 66F (punishment for cyber<br />

terrorism) and Secti<strong>on</strong> 67 (punishment for publish<strong>in</strong>g or transmitt<strong>in</strong>g obscene material <strong>in</strong> electr<strong>on</strong>ic form).<br />

879 Secti<strong>on</strong> 72, IT Act provides as follows:<br />

―Save as otherwise provided <strong>in</strong> this Act or any other law for the time be<strong>in</strong>g <strong>in</strong> force, if any pers<strong>on</strong> who, <strong>in</strong><br />

pursuance of any of the powers c<strong>on</strong>ferred under this Act, rules or regulati<strong>on</strong>s made thereunder, has secured<br />

access to any electr<strong>on</strong>ic record, book, register, corresp<strong>on</strong>dence, <strong>in</strong>formati<strong>on</strong>, document or other material<br />

without the c<strong>on</strong>sent of the pers<strong>on</strong> c<strong>on</strong>cerned discloses such electr<strong>on</strong>ic record, book, register, corresp<strong>on</strong>dence,<br />

<strong>in</strong>formati<strong>on</strong>, document or other material to any other pers<strong>on</strong> shall be punished with impris<strong>on</strong>ment for a term<br />

which may extend to two years, or with f<strong>in</strong>e which may extend to <strong>on</strong>e lakh rupees, or with both.‖<br />

880 Secti<strong>on</strong> 72A, IT Act provides as follows:<br />

―Save as otherwise provided <strong>in</strong> this Act or any other law for the time be<strong>in</strong>g <strong>in</strong> force, any pers<strong>on</strong> <strong>in</strong>clud<strong>in</strong>g an<br />

<strong>in</strong>termediary who, while provid<strong>in</strong>g services under the terms of lawful c<strong>on</strong>tract, has secured access to any<br />

material c<strong>on</strong>ta<strong>in</strong><strong>in</strong>g pers<strong>on</strong>al <strong>in</strong>formati<strong>on</strong> about another pers<strong>on</strong>, with the <strong>in</strong>tent to cause or know<strong>in</strong>g that he is<br />

likely to cause wr<strong>on</strong>gful loss or wr<strong>on</strong>gful ga<strong>in</strong> discloses, without the c<strong>on</strong>sent of the pers<strong>on</strong> c<strong>on</strong>cerned, or <strong>in</strong><br />

breach of a lawful c<strong>on</strong>tract, such material to any other pers<strong>on</strong>, shall be punished with impris<strong>on</strong>ment for a term<br />

which may extend to three years, or with f<strong>in</strong>e which may extend to five lakh rupees, or with both.‖<br />

881 Apar Gupta, Commentary <strong>on</strong> Informati<strong>on</strong> Technology Act, 269 (Lexis Nexis, 2013).<br />

201

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!