You are here: Home Contents V6 N2 V6N2_Subramanian.html
Personal tools

Security, Privacy and Politics in India: A Historical Review



Full text

Journal of Information System Security
Volume 6, Number 2 (2010)
Pages 6887
ISSN 1551-0123
Ramesh Subramanian — Quinnipiac University and Yale Law School, USA
Information Institute Publishing, Washington DC, USA




Much is discussed about privacy laws in developed economies such as The US, EU, Japan, Canada, and Australia. However, not many studies have focused on privacy laws that are evolving in emerging economies such as India. As the economy becomes global and companies resort to global outsourcing, much of the data of clients, customers and common citizens are slowly being dispersed around the world for processing, analyzing and simple storage. Therefore, developing countries that handle such data are no longer exempt from the privacy concerns associated with them. This paper studies and critically analyzes the evolution of privacy laws in India. India, being a democracy of 1.2 billion people, is an especially interesting 'subject' to study in this regard. The study offers an illustration of the interactions of security, privacy and politics of its citizens, interest groups, security agencies and politicians - as they all mash together, constantly reposition themselves, pressure and compromise with each other to arrive at ways to define and protect privacy while not compromising on security.




Information Security, Privacy, Politics, Legal History, Law and Society




Agrawal, Rachika, 2004. "Privacy and emerging technology: Are Indian laws catching up?" Lawyers Collective, February 2004. Retrieved April 17, 2006 from

Agarwala, B.D. 1996. "Right to privacy: A case-by-case development." Practical Lawyer, Eastern Book Company. Retrieved on April 17, 2006 from

Dhavan, R, 2000. "Tapping Mr. Cronje," from The Hindu, retrieved January 12, 2009 from

Economist, 2007. "India on Fire," February 1, 2007. Retrieved January 12, 2009 from

Gagn, C, 2005. "POTA: Lessons learned from India's anti-terror Act," in Boston College Third World Law Journal, Volume 25, Number 1, 2005. Retrieved January 12, 2009 from

Headrick, D. (1998). The tentacles of progress: Technology transfer in the age of imperialism, 1880-1940. New York: Oxford University Press.

Hindu, The. "Phone tapping issues," Editorial, The Hindu, January 6, 2006. Retrieved on January 12, 2009 from

Human Rights Watch report, 1999. "Selected Articles of the Indian Constitution." Retrieved on April 17, 2006 from

Indian Express, 2006. "Tips for a tap," Indian Express, January 4, 2006. Retrieved January 12, 2009 from

Indian Express, 2005. "Need for an effective privacy policy," Indian Express, May 30, 2005. Retrieved on April 17, 2006 from

IT Task Force, 1999. Recommendations of the IT Task Force. Retrieved Jan 12, 2009 from

Iype, G, 2004. "It is goodbye to POTA,"- The Rediff Special,, September 18, 2004. Retrieved Jan 12, 2009 from

Lal, V. (2008). Battle of Plassey. Retrieved July 11, 2008, from Manas:

Menon, A. (1999). India: Adopting a Pro-Competitive Policy for Telecommunications. Retrieved july 11, 2008, from Institute for Trade & Commercial Diplomacy:

Naavi, 2007. "Recipe for killing journalistic ethics" Opinion piece. Retrieved January 12,2009 from _ita_ 2006_ standing_committee.htm

NASSCOM, 2006. "Information Security and Privacy - Overview." Retrieved on April 17, 2006 from

Patel, N, 1998. "The Sepoy War of 1857 - Mutiny or First Indian War of Independence?" Retrieved Januray 12, 2008 from

Ponnurangam, K and Lorie Cranor, 2005. Privacy in India: Attitudes and Awareness. In Proceedings of the 2005 Workshop on Privacy Enhancing Technologies (PET2005), 30 May - 1 June 2005, Dubrovnik, Croatia.

Privacy International, 2003a. "Privacy and Human Rights Report - Republic of India, 2003. Para 7. Retrieved April 17, 2006 from

Privacy International, 2003b. "Privacy and Human Rights Report, 2003," Excerpted from Information Technology Action Plan, Special Web site on National Taskforce on Information Technology and Software Development, 1998. Retrieved on April 17, 2006 from

Privacy International, 2003c. "Privacy and Human Rights Report, 2003," Excerpted from IT for all -2008, Special Web site on National Taskforce on Information Technology and Software Development, 1998.Retrievd on April 17, 2006 from

Sachar, R, 2006. "Telephone-tapping an invasion of individual's privacy," PUCL Bulletin, Retrieved January 12, 2009 from

Sharma, V, 2005. "White Paper on Privacy protection in India". Retrieved January 12, 2009 from %202007.pdf.

Sinha, K and Singh, MK, 2008. "New law will let govt snoop on your PC" Economic Times, 25 Dec 2008, TNN. Retrieved January 12, 2008 from New_law_will_let_govt_snoop_on_your_PC/articleshow/3890519.cms"

The Gazette of India, 2000. "The Information Technology Act 2000." Retrieved January 12, 2009 from

Stone, Christopher, 1975. Where the Law Ends:T he Social Control of Corporate Behavior. New York: Harper and Row.

Yolande C, Mary C, Kathleen G, Gary L and H. J. Smith, 2005. "Information Privacy: Management, marketplace, and legal challenges," Communications of the Association for Information Systems, Volume 16, 2005.