25.01.2018 Views

white_paper_on_data_protection_in_india_171127_final_v2

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

PART III<br />

GROUNDS OF PROCESSING, OBLIGATION ON ENTITIES AND INDIVIDUAL<br />

RIGHTS<br />

CHAPTER 1: CONSENT<br />

1.1 Introducti<strong>on</strong><br />

C<strong>on</strong>sent forms the foundati<strong>on</strong> of <strong>data</strong> protecti<strong>on</strong> law <strong>in</strong> many jurisdicti<strong>on</strong>s. There is great<br />

value <strong>in</strong> us<strong>in</strong>g c<strong>on</strong>sent as a validat<strong>in</strong>g mechanism for <strong>data</strong> process<strong>in</strong>g. It satisfies two needs.<br />

First, c<strong>on</strong>sent is <strong>in</strong>tuitively c<strong>on</strong>sidered as the most appropriate method to ensure the<br />

protecti<strong>on</strong> of an <strong>in</strong>dividual‘s aut<strong>on</strong>omy. 392 Allow<strong>in</strong>g an <strong>in</strong>dividual to have aut<strong>on</strong>omy over her<br />

pers<strong>on</strong>al <strong>in</strong>formati<strong>on</strong> allows her to enjoy ―<strong>in</strong>formati<strong>on</strong>al privacy‖. Informati<strong>on</strong>al privacy may<br />

be broadly understood as the <strong>in</strong>dividual‘s ability to exercise c<strong>on</strong>trol over the manner <strong>in</strong> which<br />

her <strong>in</strong>formati<strong>on</strong> may be collected and used. 393 Sec<strong>on</strong>d, c<strong>on</strong>sent provides a ―morally<br />

transformative‖ value as it justifies c<strong>on</strong>duct, which might otherwise be c<strong>on</strong>sidered<br />

wr<strong>on</strong>gful. 394 For <strong>in</strong>stance, seek<strong>in</strong>g c<strong>on</strong>sent is what differentiates enter<strong>in</strong>g some<strong>on</strong>e‘s house<br />

with permissi<strong>on</strong>, from trespass.<br />

Recently, the Puttaswamy judgment, held that the right to privacy would encompass the right<br />

to <strong>in</strong>formati<strong>on</strong>al privacy, which recognises that an <strong>in</strong>dividual should have c<strong>on</strong>trol over the use<br />

and dissem<strong>in</strong>ati<strong>on</strong> of <strong>in</strong>formati<strong>on</strong> that is pers<strong>on</strong>al to her. 395 Unauthorised use of pers<strong>on</strong>al<br />

<strong>in</strong>formati<strong>on</strong> would lead to an <strong>in</strong>fr<strong>in</strong>gement of this right.<br />

C<strong>on</strong>sent has largely been c<strong>on</strong>sidered to be an efficient means of protect<strong>in</strong>g an <strong>in</strong>dividual‘s<br />

<strong>in</strong>formati<strong>on</strong>. 396 Operati<strong>on</strong>alis<strong>in</strong>g c<strong>on</strong>sent is d<strong>on</strong>e through the mechanism of ―notice and<br />

choice‖. Through this, the <strong>in</strong>dividual is put <strong>in</strong> charge of the collecti<strong>on</strong> and use of her pers<strong>on</strong>al<br />

<strong>in</strong>formati<strong>on</strong>. This is believed to be a more flexible, <strong>in</strong>expensive and easily enforceable<br />

mechanism of protect<strong>in</strong>g pers<strong>on</strong>al <strong>data</strong> of <strong>in</strong>dividuals, rather than strict regulati<strong>on</strong> over how<br />

<strong>in</strong>dividuals‘ <strong>data</strong> may be used. 397 Seek<strong>in</strong>g c<strong>on</strong>sent allows the <strong>in</strong>dividual to be resp<strong>on</strong>sible for<br />

manag<strong>in</strong>g her own <strong>in</strong>formati<strong>on</strong>, thereby result<strong>in</strong>g <strong>in</strong> ―privacy self-management‖ 398 .<br />

392 ―In democratic societies, there is a fundamental belief <strong>in</strong> the uniqueness of the <strong>in</strong>dividual, <strong>in</strong> his basic dignity<br />

and worth…and <strong>in</strong> the need to ma<strong>in</strong>ta<strong>in</strong> social processes that safeguard his sacred <strong>in</strong>dividuality.‖ See: Alan<br />

West<strong>in</strong>, ‗Privacy and Freedom‘, (Atheneum, 1967).<br />

393 Adam Moore, ‗Toward Informati<strong>on</strong>al Privacy Rights‘, 44 San Diego Law Review 809 (2007).<br />

394 John Kle<strong>in</strong>ig, ‗The Nature of C<strong>on</strong>sent‘ <strong>in</strong> ‗The Ethics of C<strong>on</strong>sent- Theory and Practice‘, 4 (Alan Wertheimer<br />

and Frankl<strong>in</strong> Miller (eds.), Oxford University Press, 2009).<br />

395 Justice K.S. Puttaswamy (Retd.) & Anr. v. Uni<strong>on</strong> of India & Ors., (2017) 10 SCALE 1.<br />

396 Joel R. Reidenberg et al., ‗Privacy Harms and the Effectiveness of the Notice and Choice Framework‘, 11<br />

Journal of Law and Policy for the Informati<strong>on</strong> Society, 485, 489, (2015).<br />

397 Ryan M. Calo, ‗Aga<strong>in</strong>st Notice Skepticism <strong>in</strong> Privacy (and Elsewhere)‘, 87(3) Notre Dame Law Review<br />

1027 (2012), available at: http://scholarship.law.nd.edu/cgi/viewc<strong>on</strong>tent.cgi?article=1020&c<strong>on</strong>text=ndlr, (last<br />

accessed 21 October 2017).<br />

398 Privacy self-management has its orig<strong>in</strong>s <strong>in</strong> the Fair Informati<strong>on</strong> Practices (FIPPs), which were created <strong>in</strong> the<br />

1970s <strong>in</strong> order to address c<strong>on</strong>cerns about the <strong>in</strong>creas<strong>in</strong>g digitisati<strong>on</strong> of <strong>data</strong>. These pr<strong>in</strong>ciples also helped shape<br />

the OECD Privacy Guidel<strong>in</strong>es. See Daniel Solove, ‗Privacy Self-management and the C<strong>on</strong>sent Dilemma‘, 126<br />

Harvard Law Review 1880, 1881, (2013).<br />

78

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!