white_paper_on_data_protection_in_india_171127_final_v2
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
PART III<br />
GROUNDS OF PROCESSING, OBLIGATION ON ENTITIES AND INDIVIDUAL<br />
RIGHTS<br />
CHAPTER 1: CONSENT<br />
1.1 Introducti<strong>on</strong><br />
C<strong>on</strong>sent forms the foundati<strong>on</strong> of <strong>data</strong> protecti<strong>on</strong> law <strong>in</strong> many jurisdicti<strong>on</strong>s. There is great<br />
value <strong>in</strong> us<strong>in</strong>g c<strong>on</strong>sent as a validat<strong>in</strong>g mechanism for <strong>data</strong> process<strong>in</strong>g. It satisfies two needs.<br />
First, c<strong>on</strong>sent is <strong>in</strong>tuitively c<strong>on</strong>sidered as the most appropriate method to ensure the<br />
protecti<strong>on</strong> of an <strong>in</strong>dividual‘s aut<strong>on</strong>omy. 392 Allow<strong>in</strong>g an <strong>in</strong>dividual to have aut<strong>on</strong>omy over her<br />
pers<strong>on</strong>al <strong>in</strong>formati<strong>on</strong> allows her to enjoy ―<strong>in</strong>formati<strong>on</strong>al privacy‖. Informati<strong>on</strong>al privacy may<br />
be broadly understood as the <strong>in</strong>dividual‘s ability to exercise c<strong>on</strong>trol over the manner <strong>in</strong> which<br />
her <strong>in</strong>formati<strong>on</strong> may be collected and used. 393 Sec<strong>on</strong>d, c<strong>on</strong>sent provides a ―morally<br />
transformative‖ value as it justifies c<strong>on</strong>duct, which might otherwise be c<strong>on</strong>sidered<br />
wr<strong>on</strong>gful. 394 For <strong>in</strong>stance, seek<strong>in</strong>g c<strong>on</strong>sent is what differentiates enter<strong>in</strong>g some<strong>on</strong>e‘s house<br />
with permissi<strong>on</strong>, from trespass.<br />
Recently, the Puttaswamy judgment, held that the right to privacy would encompass the right<br />
to <strong>in</strong>formati<strong>on</strong>al privacy, which recognises that an <strong>in</strong>dividual should have c<strong>on</strong>trol over the use<br />
and dissem<strong>in</strong>ati<strong>on</strong> of <strong>in</strong>formati<strong>on</strong> that is pers<strong>on</strong>al to her. 395 Unauthorised use of pers<strong>on</strong>al<br />
<strong>in</strong>formati<strong>on</strong> would lead to an <strong>in</strong>fr<strong>in</strong>gement of this right.<br />
C<strong>on</strong>sent has largely been c<strong>on</strong>sidered to be an efficient means of protect<strong>in</strong>g an <strong>in</strong>dividual‘s<br />
<strong>in</strong>formati<strong>on</strong>. 396 Operati<strong>on</strong>alis<strong>in</strong>g c<strong>on</strong>sent is d<strong>on</strong>e through the mechanism of ―notice and<br />
choice‖. Through this, the <strong>in</strong>dividual is put <strong>in</strong> charge of the collecti<strong>on</strong> and use of her pers<strong>on</strong>al<br />
<strong>in</strong>formati<strong>on</strong>. This is believed to be a more flexible, <strong>in</strong>expensive and easily enforceable<br />
mechanism of protect<strong>in</strong>g pers<strong>on</strong>al <strong>data</strong> of <strong>in</strong>dividuals, rather than strict regulati<strong>on</strong> over how<br />
<strong>in</strong>dividuals‘ <strong>data</strong> may be used. 397 Seek<strong>in</strong>g c<strong>on</strong>sent allows the <strong>in</strong>dividual to be resp<strong>on</strong>sible for<br />
manag<strong>in</strong>g her own <strong>in</strong>formati<strong>on</strong>, thereby result<strong>in</strong>g <strong>in</strong> ―privacy self-management‖ 398 .<br />
392 ―In democratic societies, there is a fundamental belief <strong>in</strong> the uniqueness of the <strong>in</strong>dividual, <strong>in</strong> his basic dignity<br />
and worth…and <strong>in</strong> the need to ma<strong>in</strong>ta<strong>in</strong> social processes that safeguard his sacred <strong>in</strong>dividuality.‖ See: Alan<br />
West<strong>in</strong>, ‗Privacy and Freedom‘, (Atheneum, 1967).<br />
393 Adam Moore, ‗Toward Informati<strong>on</strong>al Privacy Rights‘, 44 San Diego Law Review 809 (2007).<br />
394 John Kle<strong>in</strong>ig, ‗The Nature of C<strong>on</strong>sent‘ <strong>in</strong> ‗The Ethics of C<strong>on</strong>sent- Theory and Practice‘, 4 (Alan Wertheimer<br />
and Frankl<strong>in</strong> Miller (eds.), Oxford University Press, 2009).<br />
395 Justice K.S. Puttaswamy (Retd.) & Anr. v. Uni<strong>on</strong> of India & Ors., (2017) 10 SCALE 1.<br />
396 Joel R. Reidenberg et al., ‗Privacy Harms and the Effectiveness of the Notice and Choice Framework‘, 11<br />
Journal of Law and Policy for the Informati<strong>on</strong> Society, 485, 489, (2015).<br />
397 Ryan M. Calo, ‗Aga<strong>in</strong>st Notice Skepticism <strong>in</strong> Privacy (and Elsewhere)‘, 87(3) Notre Dame Law Review<br />
1027 (2012), available at: http://scholarship.law.nd.edu/cgi/viewc<strong>on</strong>tent.cgi?article=1020&c<strong>on</strong>text=ndlr, (last<br />
accessed 21 October 2017).<br />
398 Privacy self-management has its orig<strong>in</strong>s <strong>in</strong> the Fair Informati<strong>on</strong> Practices (FIPPs), which were created <strong>in</strong> the<br />
1970s <strong>in</strong> order to address c<strong>on</strong>cerns about the <strong>in</strong>creas<strong>in</strong>g digitisati<strong>on</strong> of <strong>data</strong>. These pr<strong>in</strong>ciples also helped shape<br />
the OECD Privacy Guidel<strong>in</strong>es. See Daniel Solove, ‗Privacy Self-management and the C<strong>on</strong>sent Dilemma‘, 126<br />
Harvard Law Review 1880, 1881, (2013).<br />
78