Deprecated (16384): The ArrayAccess methods will be removed in 4.0.0.Use getParam(), getData() and getQuery() instead. - /home/brlfuser/public_html/src/Controller/ArtileDetailController.php, line: 73 You can disable deprecation warnings by setting `Error.errorLevel` to `E_ALL & ~E_USER_DEPRECATED` in your config/app.php. [CORE/src/Core/functions.php, line 311]Code Context
trigger_error($message, E_USER_DEPRECATED);
}
$message = 'The ArrayAccess methods will be removed in 4.0.0.Use getParam(), getData() and getQuery() instead. - /home/brlfuser/public_html/src/Controller/ArtileDetailController.php, line: 73 You can disable deprecation warnings by setting `Error.errorLevel` to `E_ALL & ~E_USER_DEPRECATED` in your config/app.php.' $stackFrame = (int) 1 $trace = [ (int) 0 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/ServerRequest.php', 'line' => (int) 2421, 'function' => 'deprecationWarning', 'args' => [ (int) 0 => 'The ArrayAccess methods will be removed in 4.0.0.Use getParam(), getData() and getQuery() instead.' ] ], (int) 1 => [ 'file' => '/home/brlfuser/public_html/src/Controller/ArtileDetailController.php', 'line' => (int) 73, 'function' => 'offsetGet', 'class' => 'Cake\Http\ServerRequest', 'object' => object(Cake\Http\ServerRequest) {}, 'type' => '->', 'args' => [ (int) 0 => 'catslug' ] ], (int) 2 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Controller/Controller.php', 'line' => (int) 610, 'function' => 'printArticle', 'class' => 'App\Controller\ArtileDetailController', 'object' => object(App\Controller\ArtileDetailController) {}, 'type' => '->', 'args' => [] ], (int) 3 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/ActionDispatcher.php', 'line' => (int) 120, 'function' => 'invokeAction', 'class' => 'Cake\Controller\Controller', 'object' => object(App\Controller\ArtileDetailController) {}, 'type' => '->', 'args' => [] ], (int) 4 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/ActionDispatcher.php', 'line' => (int) 94, 'function' => '_invoke', 'class' => 'Cake\Http\ActionDispatcher', 'object' => object(Cake\Http\ActionDispatcher) {}, 'type' => '->', 'args' => [ (int) 0 => object(App\Controller\ArtileDetailController) {} ] ], (int) 5 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/BaseApplication.php', 'line' => (int) 235, 'function' => 'dispatch', 'class' => 'Cake\Http\ActionDispatcher', 'object' => object(Cake\Http\ActionDispatcher) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {} ] ], (int) 6 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/Runner.php', 'line' => (int) 65, 'function' => '__invoke', 'class' => 'Cake\Http\BaseApplication', 'object' => object(App\Application) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {}, (int) 2 => object(Cake\Http\Runner) {} ] ], (int) 7 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Routing/Middleware/RoutingMiddleware.php', 'line' => (int) 162, 'function' => '__invoke', 'class' => 'Cake\Http\Runner', 'object' => object(Cake\Http\Runner) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {} ] ], (int) 8 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/Runner.php', 'line' => (int) 65, 'function' => '__invoke', 'class' => 'Cake\Routing\Middleware\RoutingMiddleware', 'object' => object(Cake\Routing\Middleware\RoutingMiddleware) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {}, (int) 2 => object(Cake\Http\Runner) {} ] ], (int) 9 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Routing/Middleware/AssetMiddleware.php', 'line' => (int) 88, 'function' => '__invoke', 'class' => 'Cake\Http\Runner', 'object' => object(Cake\Http\Runner) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {} ] ], (int) 10 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/Runner.php', 'line' => (int) 65, 'function' => '__invoke', 'class' => 'Cake\Routing\Middleware\AssetMiddleware', 'object' => object(Cake\Routing\Middleware\AssetMiddleware) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {}, (int) 2 => object(Cake\Http\Runner) {} ] ], (int) 11 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Error/Middleware/ErrorHandlerMiddleware.php', 'line' => (int) 96, 'function' => '__invoke', 'class' => 'Cake\Http\Runner', 'object' => object(Cake\Http\Runner) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {} ] ], (int) 12 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/Runner.php', 'line' => (int) 65, 'function' => '__invoke', 'class' => 'Cake\Error\Middleware\ErrorHandlerMiddleware', 'object' => object(Cake\Error\Middleware\ErrorHandlerMiddleware) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {}, (int) 2 => object(Cake\Http\Runner) {} ] ], (int) 13 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/Runner.php', 'line' => (int) 51, 'function' => '__invoke', 'class' => 'Cake\Http\Runner', 'object' => object(Cake\Http\Runner) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {} ] ], (int) 14 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/Server.php', 'line' => (int) 98, 'function' => 'run', 'class' => 'Cake\Http\Runner', 'object' => object(Cake\Http\Runner) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\MiddlewareQueue) {}, (int) 1 => object(Cake\Http\ServerRequest) {}, (int) 2 => object(Cake\Http\Response) {} ] ], (int) 15 => [ 'file' => '/home/brlfuser/public_html/webroot/index.php', 'line' => (int) 39, 'function' => 'run', 'class' => 'Cake\Http\Server', 'object' => object(Cake\Http\Server) {}, 'type' => '->', 'args' => [] ] ] $frame = [ 'file' => '/home/brlfuser/public_html/src/Controller/ArtileDetailController.php', 'line' => (int) 73, 'function' => 'offsetGet', 'class' => 'Cake\Http\ServerRequest', 'object' => object(Cake\Http\ServerRequest) { trustProxy => false [protected] params => [ [maximum depth reached] ] [protected] data => [[maximum depth reached]] [protected] query => [[maximum depth reached]] [protected] cookies => [ [maximum depth reached] ] [protected] _environment => [ [maximum depth reached] ] [protected] url => 'latest-news-updates/privacy-law-framework-may-lead-to-domain-issues-by-surabhi-agarwal-shauvik-ghosh-11096/print' [protected] base => '' [protected] webroot => '/' [protected] here => '/latest-news-updates/privacy-law-framework-may-lead-to-domain-issues-by-surabhi-agarwal-shauvik-ghosh-11096/print' [protected] trustedProxies => [[maximum depth reached]] [protected] _input => null [protected] _detectors => [ [maximum depth reached] ] [protected] _detectorCache => [ [maximum depth reached] ] [protected] stream => object(Zend\Diactoros\PhpInputStream) {} [protected] uri => object(Zend\Diactoros\Uri) {} [protected] session => object(Cake\Http\Session) {} [protected] attributes => [[maximum depth reached]] [protected] emulatedAttributes => [ [maximum depth reached] ] [protected] uploadedFiles => [[maximum depth reached]] [protected] protocol => null [protected] requestTarget => null [private] deprecatedProperties => [ [maximum depth reached] ] }, 'type' => '->', 'args' => [ (int) 0 => 'catslug' ] ]deprecationWarning - CORE/src/Core/functions.php, line 311 Cake\Http\ServerRequest::offsetGet() - CORE/src/Http/ServerRequest.php, line 2421 App\Controller\ArtileDetailController::printArticle() - APP/Controller/ArtileDetailController.php, line 73 Cake\Controller\Controller::invokeAction() - CORE/src/Controller/Controller.php, line 610 Cake\Http\ActionDispatcher::_invoke() - CORE/src/Http/ActionDispatcher.php, line 120 Cake\Http\ActionDispatcher::dispatch() - CORE/src/Http/ActionDispatcher.php, line 94 Cake\Http\BaseApplication::__invoke() - CORE/src/Http/BaseApplication.php, line 235 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Routing\Middleware\RoutingMiddleware::__invoke() - CORE/src/Routing/Middleware/RoutingMiddleware.php, line 162 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Routing\Middleware\AssetMiddleware::__invoke() - CORE/src/Routing/Middleware/AssetMiddleware.php, line 88 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Error\Middleware\ErrorHandlerMiddleware::__invoke() - CORE/src/Error/Middleware/ErrorHandlerMiddleware.php, line 96 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Http\Runner::run() - CORE/src/Http/Runner.php, line 51 Cake\Http\Server::run() - CORE/src/Http/Server.php, line 98
Deprecated (16384): The ArrayAccess methods will be removed in 4.0.0.Use getParam(), getData() and getQuery() instead. - /home/brlfuser/public_html/src/Controller/ArtileDetailController.php, line: 74 You can disable deprecation warnings by setting `Error.errorLevel` to `E_ALL & ~E_USER_DEPRECATED` in your config/app.php. [CORE/src/Core/functions.php, line 311]Code Context
trigger_error($message, E_USER_DEPRECATED);
}
$message = 'The ArrayAccess methods will be removed in 4.0.0.Use getParam(), getData() and getQuery() instead. - /home/brlfuser/public_html/src/Controller/ArtileDetailController.php, line: 74 You can disable deprecation warnings by setting `Error.errorLevel` to `E_ALL & ~E_USER_DEPRECATED` in your config/app.php.' $stackFrame = (int) 1 $trace = [ (int) 0 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/ServerRequest.php', 'line' => (int) 2421, 'function' => 'deprecationWarning', 'args' => [ (int) 0 => 'The ArrayAccess methods will be removed in 4.0.0.Use getParam(), getData() and getQuery() instead.' ] ], (int) 1 => [ 'file' => '/home/brlfuser/public_html/src/Controller/ArtileDetailController.php', 'line' => (int) 74, 'function' => 'offsetGet', 'class' => 'Cake\Http\ServerRequest', 'object' => object(Cake\Http\ServerRequest) {}, 'type' => '->', 'args' => [ (int) 0 => 'artileslug' ] ], (int) 2 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Controller/Controller.php', 'line' => (int) 610, 'function' => 'printArticle', 'class' => 'App\Controller\ArtileDetailController', 'object' => object(App\Controller\ArtileDetailController) {}, 'type' => '->', 'args' => [] ], (int) 3 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/ActionDispatcher.php', 'line' => (int) 120, 'function' => 'invokeAction', 'class' => 'Cake\Controller\Controller', 'object' => object(App\Controller\ArtileDetailController) {}, 'type' => '->', 'args' => [] ], (int) 4 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/ActionDispatcher.php', 'line' => (int) 94, 'function' => '_invoke', 'class' => 'Cake\Http\ActionDispatcher', 'object' => object(Cake\Http\ActionDispatcher) {}, 'type' => '->', 'args' => [ (int) 0 => object(App\Controller\ArtileDetailController) {} ] ], (int) 5 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/BaseApplication.php', 'line' => (int) 235, 'function' => 'dispatch', 'class' => 'Cake\Http\ActionDispatcher', 'object' => object(Cake\Http\ActionDispatcher) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {} ] ], (int) 6 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/Runner.php', 'line' => (int) 65, 'function' => '__invoke', 'class' => 'Cake\Http\BaseApplication', 'object' => object(App\Application) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {}, (int) 2 => object(Cake\Http\Runner) {} ] ], (int) 7 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Routing/Middleware/RoutingMiddleware.php', 'line' => (int) 162, 'function' => '__invoke', 'class' => 'Cake\Http\Runner', 'object' => object(Cake\Http\Runner) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {} ] ], (int) 8 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/Runner.php', 'line' => (int) 65, 'function' => '__invoke', 'class' => 'Cake\Routing\Middleware\RoutingMiddleware', 'object' => object(Cake\Routing\Middleware\RoutingMiddleware) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {}, (int) 2 => object(Cake\Http\Runner) {} ] ], (int) 9 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Routing/Middleware/AssetMiddleware.php', 'line' => (int) 88, 'function' => '__invoke', 'class' => 'Cake\Http\Runner', 'object' => object(Cake\Http\Runner) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {} ] ], (int) 10 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/Runner.php', 'line' => (int) 65, 'function' => '__invoke', 'class' => 'Cake\Routing\Middleware\AssetMiddleware', 'object' => object(Cake\Routing\Middleware\AssetMiddleware) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {}, (int) 2 => object(Cake\Http\Runner) {} ] ], (int) 11 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Error/Middleware/ErrorHandlerMiddleware.php', 'line' => (int) 96, 'function' => '__invoke', 'class' => 'Cake\Http\Runner', 'object' => object(Cake\Http\Runner) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {} ] ], (int) 12 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/Runner.php', 'line' => (int) 65, 'function' => '__invoke', 'class' => 'Cake\Error\Middleware\ErrorHandlerMiddleware', 'object' => object(Cake\Error\Middleware\ErrorHandlerMiddleware) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {}, (int) 2 => object(Cake\Http\Runner) {} ] ], (int) 13 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/Runner.php', 'line' => (int) 51, 'function' => '__invoke', 'class' => 'Cake\Http\Runner', 'object' => object(Cake\Http\Runner) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {} ] ], (int) 14 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/Server.php', 'line' => (int) 98, 'function' => 'run', 'class' => 'Cake\Http\Runner', 'object' => object(Cake\Http\Runner) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\MiddlewareQueue) {}, (int) 1 => object(Cake\Http\ServerRequest) {}, (int) 2 => object(Cake\Http\Response) {} ] ], (int) 15 => [ 'file' => '/home/brlfuser/public_html/webroot/index.php', 'line' => (int) 39, 'function' => 'run', 'class' => 'Cake\Http\Server', 'object' => object(Cake\Http\Server) {}, 'type' => '->', 'args' => [] ] ] $frame = [ 'file' => '/home/brlfuser/public_html/src/Controller/ArtileDetailController.php', 'line' => (int) 74, 'function' => 'offsetGet', 'class' => 'Cake\Http\ServerRequest', 'object' => object(Cake\Http\ServerRequest) { trustProxy => false [protected] params => [ [maximum depth reached] ] [protected] data => [[maximum depth reached]] [protected] query => [[maximum depth reached]] [protected] cookies => [ [maximum depth reached] ] [protected] _environment => [ [maximum depth reached] ] [protected] url => 'latest-news-updates/privacy-law-framework-may-lead-to-domain-issues-by-surabhi-agarwal-shauvik-ghosh-11096/print' [protected] base => '' [protected] webroot => '/' [protected] here => '/latest-news-updates/privacy-law-framework-may-lead-to-domain-issues-by-surabhi-agarwal-shauvik-ghosh-11096/print' [protected] trustedProxies => [[maximum depth reached]] [protected] _input => null [protected] _detectors => [ [maximum depth reached] ] [protected] _detectorCache => [ [maximum depth reached] ] [protected] stream => object(Zend\Diactoros\PhpInputStream) {} [protected] uri => object(Zend\Diactoros\Uri) {} [protected] session => object(Cake\Http\Session) {} [protected] attributes => [[maximum depth reached]] [protected] emulatedAttributes => [ [maximum depth reached] ] [protected] uploadedFiles => [[maximum depth reached]] [protected] protocol => null [protected] requestTarget => null [private] deprecatedProperties => [ [maximum depth reached] ] }, 'type' => '->', 'args' => [ (int) 0 => 'artileslug' ] ]deprecationWarning - CORE/src/Core/functions.php, line 311 Cake\Http\ServerRequest::offsetGet() - CORE/src/Http/ServerRequest.php, line 2421 App\Controller\ArtileDetailController::printArticle() - APP/Controller/ArtileDetailController.php, line 74 Cake\Controller\Controller::invokeAction() - CORE/src/Controller/Controller.php, line 610 Cake\Http\ActionDispatcher::_invoke() - CORE/src/Http/ActionDispatcher.php, line 120 Cake\Http\ActionDispatcher::dispatch() - CORE/src/Http/ActionDispatcher.php, line 94 Cake\Http\BaseApplication::__invoke() - CORE/src/Http/BaseApplication.php, line 235 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Routing\Middleware\RoutingMiddleware::__invoke() - CORE/src/Routing/Middleware/RoutingMiddleware.php, line 162 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Routing\Middleware\AssetMiddleware::__invoke() - CORE/src/Routing/Middleware/AssetMiddleware.php, line 88 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Error\Middleware\ErrorHandlerMiddleware::__invoke() - CORE/src/Error/Middleware/ErrorHandlerMiddleware.php, line 96 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Http\Runner::run() - CORE/src/Http/Runner.php, line 51 Cake\Http\Server::run() - CORE/src/Http/Server.php, line 98
Warning (512): Unable to emit headers. Headers sent in file=/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Error/Debugger.php line=853 [CORE/src/Http/ResponseEmitter.php, line 48]Code Contextif (Configure::read('debug')) {
trigger_error($message, E_USER_WARNING);
} else {
$response = object(Cake\Http\Response) { 'status' => (int) 200, 'contentType' => 'text/html', 'headers' => [ 'Content-Type' => [ [maximum depth reached] ] ], 'file' => null, 'fileRange' => [], 'cookies' => object(Cake\Http\Cookie\CookieCollection) {}, 'cacheDirectives' => [], 'body' => '<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <link rel="canonical" href="https://im4change.in/<pre class="cake-error"><a href="javascript:void(0);" onclick="document.getElementById('cakeErr67f22b6b50d94-trace').style.display = (document.getElementById('cakeErr67f22b6b50d94-trace').style.display == 'none' ? '' : 'none');"><b>Notice</b> (8)</a>: Undefined variable: urlPrefix [<b>APP/Template/Layout/printlayout.ctp</b>, line <b>8</b>]<div id="cakeErr67f22b6b50d94-trace" class="cake-stack-trace" style="display: none;"><a href="javascript:void(0);" onclick="document.getElementById('cakeErr67f22b6b50d94-code').style.display = (document.getElementById('cakeErr67f22b6b50d94-code').style.display == 'none' ? '' : 'none')">Code</a> <a href="javascript:void(0);" onclick="document.getElementById('cakeErr67f22b6b50d94-context').style.display = (document.getElementById('cakeErr67f22b6b50d94-context').style.display == 'none' ? '' : 'none')">Context</a><pre id="cakeErr67f22b6b50d94-code" class="cake-code-dump" style="display: none;"><code><span style="color: #000000"><span style="color: #0000BB"></span><span style="color: #007700"><</span><span style="color: #0000BB">head</span><span style="color: #007700">> </span></span></code> <span class="code-highlight"><code><span style="color: #000000"> <link rel="canonical" href="<span style="color: #0000BB"><?php </span><span style="color: #007700">echo </span><span style="color: #0000BB">Configure</span><span style="color: #007700">::</span><span style="color: #0000BB">read</span><span style="color: #007700">(</span><span style="color: #DD0000">'SITE_URL'</span><span style="color: #007700">); </span><span style="color: #0000BB">?><?php </span><span style="color: #007700">echo </span><span style="color: #0000BB">$urlPrefix</span><span style="color: #007700">;</span><span style="color: #0000BB">?><?php </span><span style="color: #007700">echo </span><span style="color: #0000BB">$article_current</span><span style="color: #007700">-></span><span style="color: #0000BB">category</span><span style="color: #007700">-></span><span style="color: #0000BB">slug</span><span style="color: #007700">; </span><span style="color: #0000BB">?></span>/<span style="color: #0000BB"><?php </span><span style="color: #007700">echo </span><span style="color: #0000BB">$article_current</span><span style="color: #007700">-></span><span style="color: #0000BB">seo_url</span><span style="color: #007700">; </span><span style="color: #0000BB">?></span>.html"/> </span></code></span> <code><span style="color: #000000"><span style="color: #0000BB"> </span><span style="color: #007700"><</span><span style="color: #0000BB">meta http</span><span style="color: #007700">-</span><span style="color: #0000BB">equiv</span><span style="color: #007700">=</span><span style="color: #DD0000">"Content-Type" </span><span style="color: #0000BB">content</span><span style="color: #007700">=</span><span style="color: #DD0000">"text/html; charset=utf-8"</span><span style="color: #007700">/> </span></span></code></pre><pre id="cakeErr67f22b6b50d94-context" class="cake-context" style="display: none;">$viewFile = '/home/brlfuser/public_html/src/Template/Layout/printlayout.ctp' $dataForView = [ 'article_current' => object(App\Model\Entity\Article) { 'id' => (int) 10982, 'title' => 'Privacy law framework may lead to domain issues by Surabhi Agarwal &amp; Shauvik Ghosh', 'subheading' => '', 'description' => '<div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> The government is in a dilemma as it grapples with the expanded scope of India&rsquo;s proposed privacy law: Should it scrap all existing provisions on lawful interceptions and fold them under the new legislation, or strengthen the various laws under different ministries so their turfs remain undisturbed? </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> The right to privacy Bill aims to uphold the right of all Indians against any misuse of their personal information, interception of personal communication, unlawful surveillance and unwanted commercial communication. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> But its scope has been expanded beyond data protection to include provisions on lawful interception, surveillance and illegal commercial communication. </div> <div style="text-align: justify"> &nbsp; </div> <div style="text-align: justify"> Several of these additions are governed by different ministries. For instance, the Indian Telegraph Act, the Wireless Act, the Information Technology Act, the Prevention of Terrorism Act and provisions of the Code of Criminal Procedure all contain sections on lawful interception. The IT Act is controlled by the department of information technology, and the Telegraph Act and the Wireless Act by the department of telecom as lawful interception requires technological expertise. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> The department of personal and training, mandated with framing the law, has come out with a draft legislation that lays out its own provisions on lawful interception, some of these similar to existing laws. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> Mint has reviewed a copy of the draft Bill and minutes of various meetings on the issue. According to one such document, Attorney General G.E. Vahanvati is of the view that &ldquo;provisions about the authorization of interception of communications (Web/IT-based) should be so drafted that it may have overriding effect over similar provisions in Telegraph Act, IT Act or any other Act&rdquo;. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> That could trigger an inter-departmental conflict. &ldquo;That is the question which is still bothering us and we need to find a fix to the problem,&rdquo; said a government official, who has been involved in the talks. Some of the existing provisions under various ministries, he says, are either obsolete or inadequate. The Telegraph Act of 1885 talks of interception of telegrams. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> &ldquo;There was no satellite communication or Internet then. Even the IT Act of 2000 permits interception which is of Internet-based communication. We need one legislation which is for the current scenario as the ambit of these provisions is so small,&rdquo; said the official, requesting anonymity because of the sensitivity of the matter. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> Another official with a security establishment, who is also involved in the talks, said provisions in the Bill should not disturb the existing regime of lawful interception that&rsquo;s critical to intelligence gathering. &ldquo;The draft privacy Bill is positive in that direction. But it should be stated in categorical terms,&rdquo; the official said, on condition of anonymity. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> Under present laws, central agencies require the Union home secretary&rsquo;s permission to intercept phone calls and emails. In states, the permission is granted by the state home secretaries. On an average, central agencies intercept 6,500 phone numbers daily. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> Former Union home secretary G.K. Pillai says a comprehensive regime on lawful interception will not create operational hindrances in the functioning of law enforcement agencies. &ldquo;Otherwise also the existing laws like Telegraph Act need some modification,&rdquo; he said. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> The first official said the overlaps in the draft Bill are only on lawful interceptions as India does not have laws governing surveillance and commercial communication. The Telecom Regulatory Authority of India recently came out with guidelines on spam text messages, but these are not law. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> The privacy Act was originally mooted to ensure that data collected by the government under the Unique Identification project, or Aadhaar, is not misused. Aadhaar, as part of providing unique digital identities to all Indian residents, collects various personal information, including biometric data and iris scans. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> But recent incidents such as the tapping of phone conversations involving lobbyist Niira Radia prompted the government to relook the privacy law. &ldquo;It exposed the weakness in the country&rsquo;s privacy regime and it was felt that a law just on data protection won&rsquo;t be enough,&rdquo; said the first official. &ldquo;It has to be comprehensive enough to address at least the basic privacy requirements.&rdquo; </div> <div style="text-align: justify"> <br /> </div>', 'credit_writer' => 'Live Mint, 8 November, 2011, http://www.livemint.com/2011/11/08005448/Privacy-law-framework-may-lead.html', 'article_img' => '', 'article_img_thumb' => '', 'status' => (int) 1, 'show_on_home' => (int) 1, 'lang' => 'EN', 'category_id' => (int) 16, 'tag_keyword' => '', 'seo_url' => 'privacy-law-framework-may-lead-to-domain-issues-by-surabhi-agarwal-shauvik-ghosh-11096', 'meta_title' => null, 'meta_keywords' => null, 'meta_description' => null, 'noindex' => (int) 0, 'publish_date' => object(Cake\I18n\FrozenDate) {}, 'most_visit_section_id' => null, 'article_big_img' => null, 'liveid' => (int) 11096, 'created' => object(Cake\I18n\FrozenTime) {}, 'modified' => object(Cake\I18n\FrozenTime) {}, 'edate' => '', 'tags' => [ [maximum depth reached] ], 'category' => object(App\Model\Entity\Category) {}, '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[hasErrors]' => false, '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'Articles' }, 'articleid' => (int) 10982, 'metaTitle' => 'LATEST NEWS UPDATES | Privacy law framework may lead to domain issues by Surabhi Agarwal &amp; Shauvik Ghosh', 'metaKeywords' => 'Human Rights,Privacy', 'metaDesc' => ' The government is in a dilemma as it grapples with the expanded scope of India&rsquo;s proposed privacy law: Should it scrap all existing provisions on lawful interceptions and fold them under the new legislation, or strengthen the various laws under...', 'disp' => '<div style="text-align: justify"><br /></div><div style="text-align: justify">The government is in a dilemma as it grapples with the expanded scope of India&rsquo;s proposed privacy law: Should it scrap all existing provisions on lawful interceptions and fold them under the new legislation, or strengthen the various laws under different ministries so their turfs remain undisturbed?</div><div style="text-align: justify"><br /></div><div style="text-align: justify">The right to privacy Bill aims to uphold the right of all Indians against any misuse of their personal information, interception of personal communication, unlawful surveillance and unwanted commercial communication.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">But its scope has been expanded beyond data protection to include provisions on lawful interception, surveillance and illegal commercial communication.</div><div style="text-align: justify">&nbsp;</div><div style="text-align: justify">Several of these additions are governed by different ministries. For instance, the Indian Telegraph Act, the Wireless Act, the Information Technology Act, the Prevention of Terrorism Act and provisions of the Code of Criminal Procedure all contain sections on lawful interception. The IT Act is controlled by the department of information technology, and the Telegraph Act and the Wireless Act by the department of telecom as lawful interception requires technological expertise.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">The department of personal and training, mandated with framing the law, has come out with a draft legislation that lays out its own provisions on lawful interception, some of these similar to existing laws.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">Mint has reviewed a copy of the draft Bill and minutes of various meetings on the issue. According to one such document, Attorney General G.E. Vahanvati is of the view that &ldquo;provisions about the authorization of interception of communications (Web/IT-based) should be so drafted that it may have overriding effect over similar provisions in Telegraph Act, IT Act or any other Act&rdquo;.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">That could trigger an inter-departmental conflict. &ldquo;That is the question which is still bothering us and we need to find a fix to the problem,&rdquo; said a government official, who has been involved in the talks. Some of the existing provisions under various ministries, he says, are either obsolete or inadequate. The Telegraph Act of 1885 talks of interception of telegrams.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">&ldquo;There was no satellite communication or Internet then. Even the IT Act of 2000 permits interception which is of Internet-based communication. We need one legislation which is for the current scenario as the ambit of these provisions is so small,&rdquo; said the official, requesting anonymity because of the sensitivity of the matter.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">Another official with a security establishment, who is also involved in the talks, said provisions in the Bill should not disturb the existing regime of lawful interception that&rsquo;s critical to intelligence gathering. &ldquo;The draft privacy Bill is positive in that direction. But it should be stated in categorical terms,&rdquo; the official said, on condition of anonymity.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">Under present laws, central agencies require the Union home secretary&rsquo;s permission to intercept phone calls and emails. In states, the permission is granted by the state home secretaries. On an average, central agencies intercept 6,500 phone numbers daily.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">Former Union home secretary G.K. Pillai says a comprehensive regime on lawful interception will not create operational hindrances in the functioning of law enforcement agencies. &ldquo;Otherwise also the existing laws like Telegraph Act need some modification,&rdquo; he said.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">The first official said the overlaps in the draft Bill are only on lawful interceptions as India does not have laws governing surveillance and commercial communication. The Telecom Regulatory Authority of India recently came out with guidelines on spam text messages, but these are not law.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">The privacy Act was originally mooted to ensure that data collected by the government under the Unique Identification project, or Aadhaar, is not misused. Aadhaar, as part of providing unique digital identities to all Indian residents, collects various personal information, including biometric data and iris scans.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">But recent incidents such as the tapping of phone conversations involving lobbyist Niira Radia prompted the government to relook the privacy law. &ldquo;It exposed the weakness in the country&rsquo;s privacy regime and it was felt that a law just on data protection won&rsquo;t be enough,&rdquo; said the first official. &ldquo;It has to be comprehensive enough to address at least the basic privacy requirements.&rdquo;</div><div style="text-align: justify"><br /></div>', 'lang' => 'English', 'SITE_URL' => 'https://im4change.in/', 'site_title' => 'im4change', 'adminprix' => 'admin' ] $article_current = object(App\Model\Entity\Article) { 'id' => (int) 10982, 'title' => 'Privacy law framework may lead to domain issues by Surabhi Agarwal &amp; Shauvik Ghosh', 'subheading' => '', 'description' => '<div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> The government is in a dilemma as it grapples with the expanded scope of India&rsquo;s proposed privacy law: Should it scrap all existing provisions on lawful interceptions and fold them under the new legislation, or strengthen the various laws under different ministries so their turfs remain undisturbed? </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> The right to privacy Bill aims to uphold the right of all Indians against any misuse of their personal information, interception of personal communication, unlawful surveillance and unwanted commercial communication. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> But its scope has been expanded beyond data protection to include provisions on lawful interception, surveillance and illegal commercial communication. </div> <div style="text-align: justify"> &nbsp; </div> <div style="text-align: justify"> Several of these additions are governed by different ministries. For instance, the Indian Telegraph Act, the Wireless Act, the Information Technology Act, the Prevention of Terrorism Act and provisions of the Code of Criminal Procedure all contain sections on lawful interception. The IT Act is controlled by the department of information technology, and the Telegraph Act and the Wireless Act by the department of telecom as lawful interception requires technological expertise. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> The department of personal and training, mandated with framing the law, has come out with a draft legislation that lays out its own provisions on lawful interception, some of these similar to existing laws. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> Mint has reviewed a copy of the draft Bill and minutes of various meetings on the issue. According to one such document, Attorney General G.E. Vahanvati is of the view that &ldquo;provisions about the authorization of interception of communications (Web/IT-based) should be so drafted that it may have overriding effect over similar provisions in Telegraph Act, IT Act or any other Act&rdquo;. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> That could trigger an inter-departmental conflict. &ldquo;That is the question which is still bothering us and we need to find a fix to the problem,&rdquo; said a government official, who has been involved in the talks. Some of the existing provisions under various ministries, he says, are either obsolete or inadequate. The Telegraph Act of 1885 talks of interception of telegrams. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> &ldquo;There was no satellite communication or Internet then. Even the IT Act of 2000 permits interception which is of Internet-based communication. We need one legislation which is for the current scenario as the ambit of these provisions is so small,&rdquo; said the official, requesting anonymity because of the sensitivity of the matter. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> Another official with a security establishment, who is also involved in the talks, said provisions in the Bill should not disturb the existing regime of lawful interception that&rsquo;s critical to intelligence gathering. &ldquo;The draft privacy Bill is positive in that direction. But it should be stated in categorical terms,&rdquo; the official said, on condition of anonymity. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> Under present laws, central agencies require the Union home secretary&rsquo;s permission to intercept phone calls and emails. In states, the permission is granted by the state home secretaries. On an average, central agencies intercept 6,500 phone numbers daily. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> Former Union home secretary G.K. Pillai says a comprehensive regime on lawful interception will not create operational hindrances in the functioning of law enforcement agencies. &ldquo;Otherwise also the existing laws like Telegraph Act need some modification,&rdquo; he said. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> The first official said the overlaps in the draft Bill are only on lawful interceptions as India does not have laws governing surveillance and commercial communication. The Telecom Regulatory Authority of India recently came out with guidelines on spam text messages, but these are not law. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> The privacy Act was originally mooted to ensure that data collected by the government under the Unique Identification project, or Aadhaar, is not misused. Aadhaar, as part of providing unique digital identities to all Indian residents, collects various personal information, including biometric data and iris scans. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> But recent incidents such as the tapping of phone conversations involving lobbyist Niira Radia prompted the government to relook the privacy law. &ldquo;It exposed the weakness in the country&rsquo;s privacy regime and it was felt that a law just on data protection won&rsquo;t be enough,&rdquo; said the first official. &ldquo;It has to be comprehensive enough to address at least the basic privacy requirements.&rdquo; </div> <div style="text-align: justify"> <br /> </div>', 'credit_writer' => 'Live Mint, 8 November, 2011, http://www.livemint.com/2011/11/08005448/Privacy-law-framework-may-lead.html', 'article_img' => '', 'article_img_thumb' => '', 'status' => (int) 1, 'show_on_home' => (int) 1, 'lang' => 'EN', 'category_id' => (int) 16, 'tag_keyword' => '', 'seo_url' => 'privacy-law-framework-may-lead-to-domain-issues-by-surabhi-agarwal-shauvik-ghosh-11096', 'meta_title' => null, 'meta_keywords' => null, 'meta_description' => null, 'noindex' => (int) 0, 'publish_date' => object(Cake\I18n\FrozenDate) {}, 'most_visit_section_id' => null, 'article_big_img' => null, 'liveid' => (int) 11096, 'created' => object(Cake\I18n\FrozenTime) {}, 'modified' => object(Cake\I18n\FrozenTime) {}, 'edate' => '', 'tags' => [ (int) 0 => object(Cake\ORM\Entity) {}, (int) 1 => object(Cake\ORM\Entity) {} ], 'category' => object(App\Model\Entity\Category) {}, '[new]' => false, '[accessible]' => [ '*' => true, 'id' => false ], '[dirty]' => [], '[original]' => [], '[virtual]' => [], '[hasErrors]' => false, '[errors]' => [], '[invalid]' => [], '[repository]' => 'Articles' } $articleid = (int) 10982 $metaTitle = 'LATEST NEWS UPDATES | Privacy law framework may lead to domain issues by Surabhi Agarwal &amp; Shauvik Ghosh' $metaKeywords = 'Human Rights,Privacy' $metaDesc = ' The government is in a dilemma as it grapples with the expanded scope of India&rsquo;s proposed privacy law: Should it scrap all existing provisions on lawful interceptions and fold them under the new legislation, or strengthen the various laws under...' $disp = '<div style="text-align: justify"><br /></div><div style="text-align: justify">The government is in a dilemma as it grapples with the expanded scope of India&rsquo;s proposed privacy law: Should it scrap all existing provisions on lawful interceptions and fold them under the new legislation, or strengthen the various laws under different ministries so their turfs remain undisturbed?</div><div style="text-align: justify"><br /></div><div style="text-align: justify">The right to privacy Bill aims to uphold the right of all Indians against any misuse of their personal information, interception of personal communication, unlawful surveillance and unwanted commercial communication.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">But its scope has been expanded beyond data protection to include provisions on lawful interception, surveillance and illegal commercial communication.</div><div style="text-align: justify">&nbsp;</div><div style="text-align: justify">Several of these additions are governed by different ministries. For instance, the Indian Telegraph Act, the Wireless Act, the Information Technology Act, the Prevention of Terrorism Act and provisions of the Code of Criminal Procedure all contain sections on lawful interception. The IT Act is controlled by the department of information technology, and the Telegraph Act and the Wireless Act by the department of telecom as lawful interception requires technological expertise.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">The department of personal and training, mandated with framing the law, has come out with a draft legislation that lays out its own provisions on lawful interception, some of these similar to existing laws.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">Mint has reviewed a copy of the draft Bill and minutes of various meetings on the issue. According to one such document, Attorney General G.E. Vahanvati is of the view that &ldquo;provisions about the authorization of interception of communications (Web/IT-based) should be so drafted that it may have overriding effect over similar provisions in Telegraph Act, IT Act or any other Act&rdquo;.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">That could trigger an inter-departmental conflict. &ldquo;That is the question which is still bothering us and we need to find a fix to the problem,&rdquo; said a government official, who has been involved in the talks. Some of the existing provisions under various ministries, he says, are either obsolete or inadequate. The Telegraph Act of 1885 talks of interception of telegrams.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">&ldquo;There was no satellite communication or Internet then. Even the IT Act of 2000 permits interception which is of Internet-based communication. We need one legislation which is for the current scenario as the ambit of these provisions is so small,&rdquo; said the official, requesting anonymity because of the sensitivity of the matter.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">Another official with a security establishment, who is also involved in the talks, said provisions in the Bill should not disturb the existing regime of lawful interception that&rsquo;s critical to intelligence gathering. &ldquo;The draft privacy Bill is positive in that direction. But it should be stated in categorical terms,&rdquo; the official said, on condition of anonymity.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">Under present laws, central agencies require the Union home secretary&rsquo;s permission to intercept phone calls and emails. In states, the permission is granted by the state home secretaries. On an average, central agencies intercept 6,500 phone numbers daily.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">Former Union home secretary G.K. Pillai says a comprehensive regime on lawful interception will not create operational hindrances in the functioning of law enforcement agencies. &ldquo;Otherwise also the existing laws like Telegraph Act need some modification,&rdquo; he said.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">The first official said the overlaps in the draft Bill are only on lawful interceptions as India does not have laws governing surveillance and commercial communication. The Telecom Regulatory Authority of India recently came out with guidelines on spam text messages, but these are not law.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">The privacy Act was originally mooted to ensure that data collected by the government under the Unique Identification project, or Aadhaar, is not misused. Aadhaar, as part of providing unique digital identities to all Indian residents, collects various personal information, including biometric data and iris scans.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">But recent incidents such as the tapping of phone conversations involving lobbyist Niira Radia prompted the government to relook the privacy law. &ldquo;It exposed the weakness in the country&rsquo;s privacy regime and it was felt that a law just on data protection won&rsquo;t be enough,&rdquo; said the first official. &ldquo;It has to be comprehensive enough to address at least the basic privacy requirements.&rdquo;</div><div style="text-align: justify"><br /></div>' $lang = 'English' $SITE_URL = 'https://im4change.in/' $site_title = 'im4change' $adminprix = 'admin'</pre><pre class="stack-trace">include - APP/Template/Layout/printlayout.ctp, line 8 Cake\View\View::_evaluate() - CORE/src/View/View.php, line 1413 Cake\View\View::_render() - CORE/src/View/View.php, line 1374 Cake\View\View::renderLayout() - CORE/src/View/View.php, line 927 Cake\View\View::render() - CORE/src/View/View.php, line 885 Cake\Controller\Controller::render() - CORE/src/Controller/Controller.php, line 791 Cake\Http\ActionDispatcher::_invoke() - CORE/src/Http/ActionDispatcher.php, line 126 Cake\Http\ActionDispatcher::dispatch() - CORE/src/Http/ActionDispatcher.php, line 94 Cake\Http\BaseApplication::__invoke() - CORE/src/Http/BaseApplication.php, line 235 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Routing\Middleware\RoutingMiddleware::__invoke() - CORE/src/Routing/Middleware/RoutingMiddleware.php, line 162 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Routing\Middleware\AssetMiddleware::__invoke() - CORE/src/Routing/Middleware/AssetMiddleware.php, line 88 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Error\Middleware\ErrorHandlerMiddleware::__invoke() - CORE/src/Error/Middleware/ErrorHandlerMiddleware.php, line 96 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Http\Runner::run() - CORE/src/Http/Runner.php, line 51</pre></div></pre>latest-news-updates/privacy-law-framework-may-lead-to-domain-issues-by-surabhi-agarwal-shauvik-ghosh-11096.html"/> <meta http-equiv="Content-Type" content="text/html; charset=utf-8"/> <link href="https://im4change.in/css/control.css" rel="stylesheet" type="text/css" media="all"/> <title>LATEST NEWS UPDATES | Privacy law framework may lead to domain issues by Surabhi Agarwal & Shauvik Ghosh | Im4change.org</title> <meta name="description" content=" The government is in a dilemma as it grapples with the expanded scope of India’s proposed privacy law: Should it scrap all existing provisions on lawful interceptions and fold them under the new legislation, or strengthen the various laws under..."/> <script src="https://im4change.in/js/jquery-1.10.2.js"></script> <script type="text/javascript" src="https://im4change.in/js/jquery-migrate.min.js"></script> <script language="javascript" type="text/javascript"> $(document).ready(function () { var img = $("img")[0]; // Get my img elem var pic_real_width, pic_real_height; $("<img/>") // Make in memory copy of image to avoid css issues .attr("src", $(img).attr("src")) .load(function () { pic_real_width = this.width; // Note: $(this).width() will not pic_real_height = this.height; // work for in memory images. }); }); </script> <style type="text/css"> @media screen { div.divFooter { display: block; } } @media print { .printbutton { display: none !important; } } </style> </head> <body> <table cellpadding="0" cellspacing="0" border="0" width="98%" align="center"> <tr> <td class="top_bg"> <div class="divFooter"> <img src="https://im4change.in/images/logo1.jpg" height="59" border="0" alt="Resource centre on India's rural distress" style="padding-top:14px;"/> </div> </td> </tr> <tr> <td id="topspace"> </td> </tr> <tr id="topspace"> <td> </td> </tr> <tr> <td height="50" style="border-bottom:1px solid #000; padding-top:10px;" class="printbutton"> <form><input type="button" value=" Print this page " onclick="window.print();return false;"/></form> </td> </tr> <tr> <td width="100%"> <h1 class="news_headlines" style="font-style:normal"> <strong>Privacy law framework may lead to domain issues by Surabhi Agarwal & Shauvik Ghosh</strong></h1> </td> </tr> <tr> <td width="100%" style="font-family:Arial, 'Segoe Script', 'Segoe UI', sans-serif, serif"><font size="3"> <div style="text-align: justify"><br /></div><div style="text-align: justify">The government is in a dilemma as it grapples with the expanded scope of India’s proposed privacy law: Should it scrap all existing provisions on lawful interceptions and fold them under the new legislation, or strengthen the various laws under different ministries so their turfs remain undisturbed?</div><div style="text-align: justify"><br /></div><div style="text-align: justify">The right to privacy Bill aims to uphold the right of all Indians against any misuse of their personal information, interception of personal communication, unlawful surveillance and unwanted commercial communication.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">But its scope has been expanded beyond data protection to include provisions on lawful interception, surveillance and illegal commercial communication.</div><div style="text-align: justify"> </div><div style="text-align: justify">Several of these additions are governed by different ministries. For instance, the Indian Telegraph Act, the Wireless Act, the Information Technology Act, the Prevention of Terrorism Act and provisions of the Code of Criminal Procedure all contain sections on lawful interception. The IT Act is controlled by the department of information technology, and the Telegraph Act and the Wireless Act by the department of telecom as lawful interception requires technological expertise.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">The department of personal and training, mandated with framing the law, has come out with a draft legislation that lays out its own provisions on lawful interception, some of these similar to existing laws.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">Mint has reviewed a copy of the draft Bill and minutes of various meetings on the issue. According to one such document, Attorney General G.E. Vahanvati is of the view that “provisions about the authorization of interception of communications (Web/IT-based) should be so drafted that it may have overriding effect over similar provisions in Telegraph Act, IT Act or any other Act”.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">That could trigger an inter-departmental conflict. “That is the question which is still bothering us and we need to find a fix to the problem,” said a government official, who has been involved in the talks. Some of the existing provisions under various ministries, he says, are either obsolete or inadequate. The Telegraph Act of 1885 talks of interception of telegrams.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">“There was no satellite communication or Internet then. Even the IT Act of 2000 permits interception which is of Internet-based communication. We need one legislation which is for the current scenario as the ambit of these provisions is so small,” said the official, requesting anonymity because of the sensitivity of the matter.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">Another official with a security establishment, who is also involved in the talks, said provisions in the Bill should not disturb the existing regime of lawful interception that’s critical to intelligence gathering. “The draft privacy Bill is positive in that direction. But it should be stated in categorical terms,” the official said, on condition of anonymity.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">Under present laws, central agencies require the Union home secretary’s permission to intercept phone calls and emails. In states, the permission is granted by the state home secretaries. On an average, central agencies intercept 6,500 phone numbers daily.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">Former Union home secretary G.K. Pillai says a comprehensive regime on lawful interception will not create operational hindrances in the functioning of law enforcement agencies. “Otherwise also the existing laws like Telegraph Act need some modification,” he said.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">The first official said the overlaps in the draft Bill are only on lawful interceptions as India does not have laws governing surveillance and commercial communication. The Telecom Regulatory Authority of India recently came out with guidelines on spam text messages, but these are not law.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">The privacy Act was originally mooted to ensure that data collected by the government under the Unique Identification project, or Aadhaar, is not misused. Aadhaar, as part of providing unique digital identities to all Indian residents, collects various personal information, including biometric data and iris scans.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">But recent incidents such as the tapping of phone conversations involving lobbyist Niira Radia prompted the government to relook the privacy law. “It exposed the weakness in the country’s privacy regime and it was felt that a law just on data protection won’t be enough,” said the first official. “It has to be comprehensive enough to address at least the basic privacy requirements.”</div><div style="text-align: justify"><br /></div> </font> </td> </tr> <tr> <td> </td> </tr> <tr> <td height="50" style="border-top:1px solid #000; border-bottom:1px solid #000;padding-top:10px;"> <form><input type="button" value=" Print this page " onclick="window.print();return false;"/></form> </td> </tr> </table></body> </html>' } $maxBufferLength = (int) 8192 $file = '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Error/Debugger.php' $line = (int) 853 $message = 'Unable to emit headers. Headers sent in file=/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Error/Debugger.php line=853'Cake\Http\ResponseEmitter::emit() - CORE/src/Http/ResponseEmitter.php, line 48 Cake\Http\Server::emit() - CORE/src/Http/Server.php, line 141 [main] - ROOT/webroot/index.php, line 39
Warning (2): Cannot modify header information - headers already sent by (output started at /home/brlfuser/public_html/vendor/cakephp/cakephp/src/Error/Debugger.php:853) [CORE/src/Http/ResponseEmitter.php, line 148]Code Context$response->getStatusCode(),
($reasonPhrase ? ' ' . $reasonPhrase : '')
));
$response = object(Cake\Http\Response) { 'status' => (int) 200, 'contentType' => 'text/html', 'headers' => [ 'Content-Type' => [ [maximum depth reached] ] ], 'file' => null, 'fileRange' => [], 'cookies' => object(Cake\Http\Cookie\CookieCollection) {}, 'cacheDirectives' => [], 'body' => '<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <link rel="canonical" href="https://im4change.in/<pre class="cake-error"><a href="javascript:void(0);" onclick="document.getElementById('cakeErr67f22b6b50d94-trace').style.display = (document.getElementById('cakeErr67f22b6b50d94-trace').style.display == 'none' ? '' : 'none');"><b>Notice</b> (8)</a>: Undefined variable: urlPrefix [<b>APP/Template/Layout/printlayout.ctp</b>, line <b>8</b>]<div id="cakeErr67f22b6b50d94-trace" class="cake-stack-trace" style="display: none;"><a href="javascript:void(0);" onclick="document.getElementById('cakeErr67f22b6b50d94-code').style.display = (document.getElementById('cakeErr67f22b6b50d94-code').style.display == 'none' ? '' : 'none')">Code</a> <a href="javascript:void(0);" onclick="document.getElementById('cakeErr67f22b6b50d94-context').style.display = (document.getElementById('cakeErr67f22b6b50d94-context').style.display == 'none' ? '' : 'none')">Context</a><pre id="cakeErr67f22b6b50d94-code" class="cake-code-dump" style="display: none;"><code><span style="color: #000000"><span style="color: #0000BB"></span><span style="color: #007700"><</span><span style="color: #0000BB">head</span><span style="color: #007700">> </span></span></code> <span class="code-highlight"><code><span style="color: #000000"> <link rel="canonical" href="<span style="color: #0000BB"><?php </span><span style="color: #007700">echo </span><span style="color: #0000BB">Configure</span><span style="color: #007700">::</span><span style="color: #0000BB">read</span><span style="color: #007700">(</span><span style="color: #DD0000">'SITE_URL'</span><span style="color: #007700">); </span><span style="color: #0000BB">?><?php </span><span style="color: #007700">echo </span><span style="color: #0000BB">$urlPrefix</span><span style="color: #007700">;</span><span style="color: #0000BB">?><?php </span><span style="color: #007700">echo </span><span style="color: #0000BB">$article_current</span><span style="color: #007700">-></span><span style="color: #0000BB">category</span><span style="color: #007700">-></span><span style="color: #0000BB">slug</span><span style="color: #007700">; </span><span style="color: #0000BB">?></span>/<span style="color: #0000BB"><?php </span><span style="color: #007700">echo </span><span style="color: #0000BB">$article_current</span><span style="color: #007700">-></span><span style="color: #0000BB">seo_url</span><span style="color: #007700">; </span><span style="color: #0000BB">?></span>.html"/> </span></code></span> <code><span style="color: #000000"><span style="color: #0000BB"> </span><span style="color: #007700"><</span><span style="color: #0000BB">meta http</span><span style="color: #007700">-</span><span style="color: #0000BB">equiv</span><span style="color: #007700">=</span><span style="color: #DD0000">"Content-Type" </span><span style="color: #0000BB">content</span><span style="color: #007700">=</span><span style="color: #DD0000">"text/html; charset=utf-8"</span><span style="color: #007700">/> </span></span></code></pre><pre id="cakeErr67f22b6b50d94-context" class="cake-context" style="display: none;">$viewFile = '/home/brlfuser/public_html/src/Template/Layout/printlayout.ctp' $dataForView = [ 'article_current' => object(App\Model\Entity\Article) { 'id' => (int) 10982, 'title' => 'Privacy law framework may lead to domain issues by Surabhi Agarwal &amp; Shauvik Ghosh', 'subheading' => '', 'description' => '<div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> The government is in a dilemma as it grapples with the expanded scope of India&rsquo;s proposed privacy law: Should it scrap all existing provisions on lawful interceptions and fold them under the new legislation, or strengthen the various laws under different ministries so their turfs remain undisturbed? </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> The right to privacy Bill aims to uphold the right of all Indians against any misuse of their personal information, interception of personal communication, unlawful surveillance and unwanted commercial communication. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> But its scope has been expanded beyond data protection to include provisions on lawful interception, surveillance and illegal commercial communication. </div> <div style="text-align: justify"> &nbsp; </div> <div style="text-align: justify"> Several of these additions are governed by different ministries. For instance, the Indian Telegraph Act, the Wireless Act, the Information Technology Act, the Prevention of Terrorism Act and provisions of the Code of Criminal Procedure all contain sections on lawful interception. The IT Act is controlled by the department of information technology, and the Telegraph Act and the Wireless Act by the department of telecom as lawful interception requires technological expertise. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> The department of personal and training, mandated with framing the law, has come out with a draft legislation that lays out its own provisions on lawful interception, some of these similar to existing laws. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> Mint has reviewed a copy of the draft Bill and minutes of various meetings on the issue. According to one such document, Attorney General G.E. Vahanvati is of the view that &ldquo;provisions about the authorization of interception of communications (Web/IT-based) should be so drafted that it may have overriding effect over similar provisions in Telegraph Act, IT Act or any other Act&rdquo;. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> That could trigger an inter-departmental conflict. &ldquo;That is the question which is still bothering us and we need to find a fix to the problem,&rdquo; said a government official, who has been involved in the talks. Some of the existing provisions under various ministries, he says, are either obsolete or inadequate. The Telegraph Act of 1885 talks of interception of telegrams. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> &ldquo;There was no satellite communication or Internet then. Even the IT Act of 2000 permits interception which is of Internet-based communication. We need one legislation which is for the current scenario as the ambit of these provisions is so small,&rdquo; said the official, requesting anonymity because of the sensitivity of the matter. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> Another official with a security establishment, who is also involved in the talks, said provisions in the Bill should not disturb the existing regime of lawful interception that&rsquo;s critical to intelligence gathering. &ldquo;The draft privacy Bill is positive in that direction. But it should be stated in categorical terms,&rdquo; the official said, on condition of anonymity. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> Under present laws, central agencies require the Union home secretary&rsquo;s permission to intercept phone calls and emails. In states, the permission is granted by the state home secretaries. On an average, central agencies intercept 6,500 phone numbers daily. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> Former Union home secretary G.K. Pillai says a comprehensive regime on lawful interception will not create operational hindrances in the functioning of law enforcement agencies. &ldquo;Otherwise also the existing laws like Telegraph Act need some modification,&rdquo; he said. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> The first official said the overlaps in the draft Bill are only on lawful interceptions as India does not have laws governing surveillance and commercial communication. The Telecom Regulatory Authority of India recently came out with guidelines on spam text messages, but these are not law. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> The privacy Act was originally mooted to ensure that data collected by the government under the Unique Identification project, or Aadhaar, is not misused. Aadhaar, as part of providing unique digital identities to all Indian residents, collects various personal information, including biometric data and iris scans. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> But recent incidents such as the tapping of phone conversations involving lobbyist Niira Radia prompted the government to relook the privacy law. &ldquo;It exposed the weakness in the country&rsquo;s privacy regime and it was felt that a law just on data protection won&rsquo;t be enough,&rdquo; said the first official. &ldquo;It has to be comprehensive enough to address at least the basic privacy requirements.&rdquo; </div> <div style="text-align: justify"> <br /> </div>', 'credit_writer' => 'Live Mint, 8 November, 2011, http://www.livemint.com/2011/11/08005448/Privacy-law-framework-may-lead.html', 'article_img' => '', 'article_img_thumb' => '', 'status' => (int) 1, 'show_on_home' => (int) 1, 'lang' => 'EN', 'category_id' => (int) 16, 'tag_keyword' => '', 'seo_url' => 'privacy-law-framework-may-lead-to-domain-issues-by-surabhi-agarwal-shauvik-ghosh-11096', 'meta_title' => null, 'meta_keywords' => null, 'meta_description' => null, 'noindex' => (int) 0, 'publish_date' => object(Cake\I18n\FrozenDate) {}, 'most_visit_section_id' => null, 'article_big_img' => null, 'liveid' => (int) 11096, 'created' => object(Cake\I18n\FrozenTime) {}, 'modified' => object(Cake\I18n\FrozenTime) {}, 'edate' => '', 'tags' => [ [maximum depth reached] ], 'category' => object(App\Model\Entity\Category) {}, '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[hasErrors]' => false, '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'Articles' }, 'articleid' => (int) 10982, 'metaTitle' => 'LATEST NEWS UPDATES | Privacy law framework may lead to domain issues by Surabhi Agarwal &amp; Shauvik Ghosh', 'metaKeywords' => 'Human Rights,Privacy', 'metaDesc' => ' The government is in a dilemma as it grapples with the expanded scope of India&rsquo;s proposed privacy law: Should it scrap all existing provisions on lawful interceptions and fold them under the new legislation, or strengthen the various laws under...', 'disp' => '<div style="text-align: justify"><br /></div><div style="text-align: justify">The government is in a dilemma as it grapples with the expanded scope of India&rsquo;s proposed privacy law: Should it scrap all existing provisions on lawful interceptions and fold them under the new legislation, or strengthen the various laws under different ministries so their turfs remain undisturbed?</div><div style="text-align: justify"><br /></div><div style="text-align: justify">The right to privacy Bill aims to uphold the right of all Indians against any misuse of their personal information, interception of personal communication, unlawful surveillance and unwanted commercial communication.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">But its scope has been expanded beyond data protection to include provisions on lawful interception, surveillance and illegal commercial communication.</div><div style="text-align: justify">&nbsp;</div><div style="text-align: justify">Several of these additions are governed by different ministries. For instance, the Indian Telegraph Act, the Wireless Act, the Information Technology Act, the Prevention of Terrorism Act and provisions of the Code of Criminal Procedure all contain sections on lawful interception. The IT Act is controlled by the department of information technology, and the Telegraph Act and the Wireless Act by the department of telecom as lawful interception requires technological expertise.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">The department of personal and training, mandated with framing the law, has come out with a draft legislation that lays out its own provisions on lawful interception, some of these similar to existing laws.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">Mint has reviewed a copy of the draft Bill and minutes of various meetings on the issue. According to one such document, Attorney General G.E. Vahanvati is of the view that &ldquo;provisions about the authorization of interception of communications (Web/IT-based) should be so drafted that it may have overriding effect over similar provisions in Telegraph Act, IT Act or any other Act&rdquo;.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">That could trigger an inter-departmental conflict. &ldquo;That is the question which is still bothering us and we need to find a fix to the problem,&rdquo; said a government official, who has been involved in the talks. Some of the existing provisions under various ministries, he says, are either obsolete or inadequate. The Telegraph Act of 1885 talks of interception of telegrams.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">&ldquo;There was no satellite communication or Internet then. Even the IT Act of 2000 permits interception which is of Internet-based communication. We need one legislation which is for the current scenario as the ambit of these provisions is so small,&rdquo; said the official, requesting anonymity because of the sensitivity of the matter.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">Another official with a security establishment, who is also involved in the talks, said provisions in the Bill should not disturb the existing regime of lawful interception that&rsquo;s critical to intelligence gathering. &ldquo;The draft privacy Bill is positive in that direction. But it should be stated in categorical terms,&rdquo; the official said, on condition of anonymity.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">Under present laws, central agencies require the Union home secretary&rsquo;s permission to intercept phone calls and emails. In states, the permission is granted by the state home secretaries. On an average, central agencies intercept 6,500 phone numbers daily.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">Former Union home secretary G.K. Pillai says a comprehensive regime on lawful interception will not create operational hindrances in the functioning of law enforcement agencies. &ldquo;Otherwise also the existing laws like Telegraph Act need some modification,&rdquo; he said.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">The first official said the overlaps in the draft Bill are only on lawful interceptions as India does not have laws governing surveillance and commercial communication. The Telecom Regulatory Authority of India recently came out with guidelines on spam text messages, but these are not law.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">The privacy Act was originally mooted to ensure that data collected by the government under the Unique Identification project, or Aadhaar, is not misused. Aadhaar, as part of providing unique digital identities to all Indian residents, collects various personal information, including biometric data and iris scans.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">But recent incidents such as the tapping of phone conversations involving lobbyist Niira Radia prompted the government to relook the privacy law. &ldquo;It exposed the weakness in the country&rsquo;s privacy regime and it was felt that a law just on data protection won&rsquo;t be enough,&rdquo; said the first official. &ldquo;It has to be comprehensive enough to address at least the basic privacy requirements.&rdquo;</div><div style="text-align: justify"><br /></div>', 'lang' => 'English', 'SITE_URL' => 'https://im4change.in/', 'site_title' => 'im4change', 'adminprix' => 'admin' ] $article_current = object(App\Model\Entity\Article) { 'id' => (int) 10982, 'title' => 'Privacy law framework may lead to domain issues by Surabhi Agarwal &amp; Shauvik Ghosh', 'subheading' => '', 'description' => '<div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> The government is in a dilemma as it grapples with the expanded scope of India&rsquo;s proposed privacy law: Should it scrap all existing provisions on lawful interceptions and fold them under the new legislation, or strengthen the various laws under different ministries so their turfs remain undisturbed? </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> The right to privacy Bill aims to uphold the right of all Indians against any misuse of their personal information, interception of personal communication, unlawful surveillance and unwanted commercial communication. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> But its scope has been expanded beyond data protection to include provisions on lawful interception, surveillance and illegal commercial communication. </div> <div style="text-align: justify"> &nbsp; </div> <div style="text-align: justify"> Several of these additions are governed by different ministries. For instance, the Indian Telegraph Act, the Wireless Act, the Information Technology Act, the Prevention of Terrorism Act and provisions of the Code of Criminal Procedure all contain sections on lawful interception. The IT Act is controlled by the department of information technology, and the Telegraph Act and the Wireless Act by the department of telecom as lawful interception requires technological expertise. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> The department of personal and training, mandated with framing the law, has come out with a draft legislation that lays out its own provisions on lawful interception, some of these similar to existing laws. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> Mint has reviewed a copy of the draft Bill and minutes of various meetings on the issue. According to one such document, Attorney General G.E. Vahanvati is of the view that &ldquo;provisions about the authorization of interception of communications (Web/IT-based) should be so drafted that it may have overriding effect over similar provisions in Telegraph Act, IT Act or any other Act&rdquo;. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> That could trigger an inter-departmental conflict. &ldquo;That is the question which is still bothering us and we need to find a fix to the problem,&rdquo; said a government official, who has been involved in the talks. Some of the existing provisions under various ministries, he says, are either obsolete or inadequate. The Telegraph Act of 1885 talks of interception of telegrams. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> &ldquo;There was no satellite communication or Internet then. Even the IT Act of 2000 permits interception which is of Internet-based communication. We need one legislation which is for the current scenario as the ambit of these provisions is so small,&rdquo; said the official, requesting anonymity because of the sensitivity of the matter. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> Another official with a security establishment, who is also involved in the talks, said provisions in the Bill should not disturb the existing regime of lawful interception that&rsquo;s critical to intelligence gathering. &ldquo;The draft privacy Bill is positive in that direction. But it should be stated in categorical terms,&rdquo; the official said, on condition of anonymity. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> Under present laws, central agencies require the Union home secretary&rsquo;s permission to intercept phone calls and emails. In states, the permission is granted by the state home secretaries. On an average, central agencies intercept 6,500 phone numbers daily. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> Former Union home secretary G.K. Pillai says a comprehensive regime on lawful interception will not create operational hindrances in the functioning of law enforcement agencies. &ldquo;Otherwise also the existing laws like Telegraph Act need some modification,&rdquo; he said. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> The first official said the overlaps in the draft Bill are only on lawful interceptions as India does not have laws governing surveillance and commercial communication. The Telecom Regulatory Authority of India recently came out with guidelines on spam text messages, but these are not law. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> The privacy Act was originally mooted to ensure that data collected by the government under the Unique Identification project, or Aadhaar, is not misused. Aadhaar, as part of providing unique digital identities to all Indian residents, collects various personal information, including biometric data and iris scans. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> But recent incidents such as the tapping of phone conversations involving lobbyist Niira Radia prompted the government to relook the privacy law. &ldquo;It exposed the weakness in the country&rsquo;s privacy regime and it was felt that a law just on data protection won&rsquo;t be enough,&rdquo; said the first official. &ldquo;It has to be comprehensive enough to address at least the basic privacy requirements.&rdquo; </div> <div style="text-align: justify"> <br /> </div>', 'credit_writer' => 'Live Mint, 8 November, 2011, http://www.livemint.com/2011/11/08005448/Privacy-law-framework-may-lead.html', 'article_img' => '', 'article_img_thumb' => '', 'status' => (int) 1, 'show_on_home' => (int) 1, 'lang' => 'EN', 'category_id' => (int) 16, 'tag_keyword' => '', 'seo_url' => 'privacy-law-framework-may-lead-to-domain-issues-by-surabhi-agarwal-shauvik-ghosh-11096', 'meta_title' => null, 'meta_keywords' => null, 'meta_description' => null, 'noindex' => (int) 0, 'publish_date' => object(Cake\I18n\FrozenDate) {}, 'most_visit_section_id' => null, 'article_big_img' => null, 'liveid' => (int) 11096, 'created' => object(Cake\I18n\FrozenTime) {}, 'modified' => object(Cake\I18n\FrozenTime) {}, 'edate' => '', 'tags' => [ (int) 0 => object(Cake\ORM\Entity) {}, (int) 1 => object(Cake\ORM\Entity) {} ], 'category' => object(App\Model\Entity\Category) {}, '[new]' => false, '[accessible]' => [ '*' => true, 'id' => false ], '[dirty]' => [], '[original]' => [], '[virtual]' => [], '[hasErrors]' => false, '[errors]' => [], '[invalid]' => [], '[repository]' => 'Articles' } $articleid = (int) 10982 $metaTitle = 'LATEST NEWS UPDATES | Privacy law framework may lead to domain issues by Surabhi Agarwal &amp; Shauvik Ghosh' $metaKeywords = 'Human Rights,Privacy' $metaDesc = ' The government is in a dilemma as it grapples with the expanded scope of India&rsquo;s proposed privacy law: Should it scrap all existing provisions on lawful interceptions and fold them under the new legislation, or strengthen the various laws under...' $disp = '<div style="text-align: justify"><br /></div><div style="text-align: justify">The government is in a dilemma as it grapples with the expanded scope of India&rsquo;s proposed privacy law: Should it scrap all existing provisions on lawful interceptions and fold them under the new legislation, or strengthen the various laws under different ministries so their turfs remain undisturbed?</div><div style="text-align: justify"><br /></div><div style="text-align: justify">The right to privacy Bill aims to uphold the right of all Indians against any misuse of their personal information, interception of personal communication, unlawful surveillance and unwanted commercial communication.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">But its scope has been expanded beyond data protection to include provisions on lawful interception, surveillance and illegal commercial communication.</div><div style="text-align: justify">&nbsp;</div><div style="text-align: justify">Several of these additions are governed by different ministries. For instance, the Indian Telegraph Act, the Wireless Act, the Information Technology Act, the Prevention of Terrorism Act and provisions of the Code of Criminal Procedure all contain sections on lawful interception. The IT Act is controlled by the department of information technology, and the Telegraph Act and the Wireless Act by the department of telecom as lawful interception requires technological expertise.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">The department of personal and training, mandated with framing the law, has come out with a draft legislation that lays out its own provisions on lawful interception, some of these similar to existing laws.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">Mint has reviewed a copy of the draft Bill and minutes of various meetings on the issue. According to one such document, Attorney General G.E. Vahanvati is of the view that &ldquo;provisions about the authorization of interception of communications (Web/IT-based) should be so drafted that it may have overriding effect over similar provisions in Telegraph Act, IT Act or any other Act&rdquo;.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">That could trigger an inter-departmental conflict. &ldquo;That is the question which is still bothering us and we need to find a fix to the problem,&rdquo; said a government official, who has been involved in the talks. Some of the existing provisions under various ministries, he says, are either obsolete or inadequate. The Telegraph Act of 1885 talks of interception of telegrams.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">&ldquo;There was no satellite communication or Internet then. Even the IT Act of 2000 permits interception which is of Internet-based communication. We need one legislation which is for the current scenario as the ambit of these provisions is so small,&rdquo; said the official, requesting anonymity because of the sensitivity of the matter.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">Another official with a security establishment, who is also involved in the talks, said provisions in the Bill should not disturb the existing regime of lawful interception that&rsquo;s critical to intelligence gathering. &ldquo;The draft privacy Bill is positive in that direction. But it should be stated in categorical terms,&rdquo; the official said, on condition of anonymity.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">Under present laws, central agencies require the Union home secretary&rsquo;s permission to intercept phone calls and emails. In states, the permission is granted by the state home secretaries. On an average, central agencies intercept 6,500 phone numbers daily.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">Former Union home secretary G.K. Pillai says a comprehensive regime on lawful interception will not create operational hindrances in the functioning of law enforcement agencies. &ldquo;Otherwise also the existing laws like Telegraph Act need some modification,&rdquo; he said.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">The first official said the overlaps in the draft Bill are only on lawful interceptions as India does not have laws governing surveillance and commercial communication. The Telecom Regulatory Authority of India recently came out with guidelines on spam text messages, but these are not law.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">The privacy Act was originally mooted to ensure that data collected by the government under the Unique Identification project, or Aadhaar, is not misused. Aadhaar, as part of providing unique digital identities to all Indian residents, collects various personal information, including biometric data and iris scans.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">But recent incidents such as the tapping of phone conversations involving lobbyist Niira Radia prompted the government to relook the privacy law. &ldquo;It exposed the weakness in the country&rsquo;s privacy regime and it was felt that a law just on data protection won&rsquo;t be enough,&rdquo; said the first official. &ldquo;It has to be comprehensive enough to address at least the basic privacy requirements.&rdquo;</div><div style="text-align: justify"><br /></div>' $lang = 'English' $SITE_URL = 'https://im4change.in/' $site_title = 'im4change' $adminprix = 'admin'</pre><pre class="stack-trace">include - APP/Template/Layout/printlayout.ctp, line 8 Cake\View\View::_evaluate() - CORE/src/View/View.php, line 1413 Cake\View\View::_render() - CORE/src/View/View.php, line 1374 Cake\View\View::renderLayout() - CORE/src/View/View.php, line 927 Cake\View\View::render() - CORE/src/View/View.php, line 885 Cake\Controller\Controller::render() - CORE/src/Controller/Controller.php, line 791 Cake\Http\ActionDispatcher::_invoke() - CORE/src/Http/ActionDispatcher.php, line 126 Cake\Http\ActionDispatcher::dispatch() - CORE/src/Http/ActionDispatcher.php, line 94 Cake\Http\BaseApplication::__invoke() - CORE/src/Http/BaseApplication.php, line 235 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Routing\Middleware\RoutingMiddleware::__invoke() - CORE/src/Routing/Middleware/RoutingMiddleware.php, line 162 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Routing\Middleware\AssetMiddleware::__invoke() - CORE/src/Routing/Middleware/AssetMiddleware.php, line 88 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Error\Middleware\ErrorHandlerMiddleware::__invoke() - CORE/src/Error/Middleware/ErrorHandlerMiddleware.php, line 96 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Http\Runner::run() - CORE/src/Http/Runner.php, line 51</pre></div></pre>latest-news-updates/privacy-law-framework-may-lead-to-domain-issues-by-surabhi-agarwal-shauvik-ghosh-11096.html"/> <meta http-equiv="Content-Type" content="text/html; charset=utf-8"/> <link href="https://im4change.in/css/control.css" rel="stylesheet" type="text/css" media="all"/> <title>LATEST NEWS UPDATES | Privacy law framework may lead to domain issues by Surabhi Agarwal & Shauvik Ghosh | Im4change.org</title> <meta name="description" content=" The government is in a dilemma as it grapples with the expanded scope of India’s proposed privacy law: Should it scrap all existing provisions on lawful interceptions and fold them under the new legislation, or strengthen the various laws under..."/> <script src="https://im4change.in/js/jquery-1.10.2.js"></script> <script type="text/javascript" src="https://im4change.in/js/jquery-migrate.min.js"></script> <script language="javascript" type="text/javascript"> $(document).ready(function () { var img = $("img")[0]; // Get my img elem var pic_real_width, pic_real_height; $("<img/>") // Make in memory copy of image to avoid css issues .attr("src", $(img).attr("src")) .load(function () { pic_real_width = this.width; // Note: $(this).width() will not pic_real_height = this.height; // work for in memory images. }); }); </script> <style type="text/css"> @media screen { div.divFooter { display: block; } } @media print { .printbutton { display: none !important; } } </style> </head> <body> <table cellpadding="0" cellspacing="0" border="0" width="98%" align="center"> <tr> <td class="top_bg"> <div class="divFooter"> <img src="https://im4change.in/images/logo1.jpg" height="59" border="0" alt="Resource centre on India's rural distress" style="padding-top:14px;"/> </div> </td> </tr> <tr> <td id="topspace"> </td> </tr> <tr id="topspace"> <td> </td> </tr> <tr> <td height="50" style="border-bottom:1px solid #000; padding-top:10px;" class="printbutton"> <form><input type="button" value=" Print this page " onclick="window.print();return false;"/></form> </td> </tr> <tr> <td width="100%"> <h1 class="news_headlines" style="font-style:normal"> <strong>Privacy law framework may lead to domain issues by Surabhi Agarwal & Shauvik Ghosh</strong></h1> </td> </tr> <tr> <td width="100%" style="font-family:Arial, 'Segoe Script', 'Segoe UI', sans-serif, serif"><font size="3"> <div style="text-align: justify"><br /></div><div style="text-align: justify">The government is in a dilemma as it grapples with the expanded scope of India’s proposed privacy law: Should it scrap all existing provisions on lawful interceptions and fold them under the new legislation, or strengthen the various laws under different ministries so their turfs remain undisturbed?</div><div style="text-align: justify"><br /></div><div style="text-align: justify">The right to privacy Bill aims to uphold the right of all Indians against any misuse of their personal information, interception of personal communication, unlawful surveillance and unwanted commercial communication.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">But its scope has been expanded beyond data protection to include provisions on lawful interception, surveillance and illegal commercial communication.</div><div style="text-align: justify"> </div><div style="text-align: justify">Several of these additions are governed by different ministries. For instance, the Indian Telegraph Act, the Wireless Act, the Information Technology Act, the Prevention of Terrorism Act and provisions of the Code of Criminal Procedure all contain sections on lawful interception. The IT Act is controlled by the department of information technology, and the Telegraph Act and the Wireless Act by the department of telecom as lawful interception requires technological expertise.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">The department of personal and training, mandated with framing the law, has come out with a draft legislation that lays out its own provisions on lawful interception, some of these similar to existing laws.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">Mint has reviewed a copy of the draft Bill and minutes of various meetings on the issue. According to one such document, Attorney General G.E. Vahanvati is of the view that “provisions about the authorization of interception of communications (Web/IT-based) should be so drafted that it may have overriding effect over similar provisions in Telegraph Act, IT Act or any other Act”.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">That could trigger an inter-departmental conflict. “That is the question which is still bothering us and we need to find a fix to the problem,” said a government official, who has been involved in the talks. Some of the existing provisions under various ministries, he says, are either obsolete or inadequate. The Telegraph Act of 1885 talks of interception of telegrams.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">“There was no satellite communication or Internet then. Even the IT Act of 2000 permits interception which is of Internet-based communication. We need one legislation which is for the current scenario as the ambit of these provisions is so small,” said the official, requesting anonymity because of the sensitivity of the matter.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">Another official with a security establishment, who is also involved in the talks, said provisions in the Bill should not disturb the existing regime of lawful interception that’s critical to intelligence gathering. “The draft privacy Bill is positive in that direction. But it should be stated in categorical terms,” the official said, on condition of anonymity.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">Under present laws, central agencies require the Union home secretary’s permission to intercept phone calls and emails. In states, the permission is granted by the state home secretaries. On an average, central agencies intercept 6,500 phone numbers daily.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">Former Union home secretary G.K. Pillai says a comprehensive regime on lawful interception will not create operational hindrances in the functioning of law enforcement agencies. “Otherwise also the existing laws like Telegraph Act need some modification,” he said.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">The first official said the overlaps in the draft Bill are only on lawful interceptions as India does not have laws governing surveillance and commercial communication. The Telecom Regulatory Authority of India recently came out with guidelines on spam text messages, but these are not law.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">The privacy Act was originally mooted to ensure that data collected by the government under the Unique Identification project, or Aadhaar, is not misused. Aadhaar, as part of providing unique digital identities to all Indian residents, collects various personal information, including biometric data and iris scans.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">But recent incidents such as the tapping of phone conversations involving lobbyist Niira Radia prompted the government to relook the privacy law. “It exposed the weakness in the country’s privacy regime and it was felt that a law just on data protection won’t be enough,” said the first official. “It has to be comprehensive enough to address at least the basic privacy requirements.”</div><div style="text-align: justify"><br /></div> </font> </td> </tr> <tr> <td> </td> </tr> <tr> <td height="50" style="border-top:1px solid #000; border-bottom:1px solid #000;padding-top:10px;"> <form><input type="button" value=" Print this page " onclick="window.print();return false;"/></form> </td> </tr> </table></body> </html>' } $reasonPhrase = 'OK'header - [internal], line ?? Cake\Http\ResponseEmitter::emitStatusLine() - CORE/src/Http/ResponseEmitter.php, line 148 Cake\Http\ResponseEmitter::emit() - CORE/src/Http/ResponseEmitter.php, line 54 Cake\Http\Server::emit() - CORE/src/Http/Server.php, line 141 [main] - ROOT/webroot/index.php, line 39
Warning (2): Cannot modify header information - headers already sent by (output started at /home/brlfuser/public_html/vendor/cakephp/cakephp/src/Error/Debugger.php:853) [CORE/src/Http/ResponseEmitter.php, line 181]Notice (8): Undefined variable: urlPrefix [APP/Template/Layout/printlayout.ctp, line 8]Code Context$value
), $first);
$first = false;
$response = object(Cake\Http\Response) { 'status' => (int) 200, 'contentType' => 'text/html', 'headers' => [ 'Content-Type' => [ [maximum depth reached] ] ], 'file' => null, 'fileRange' => [], 'cookies' => object(Cake\Http\Cookie\CookieCollection) {}, 'cacheDirectives' => [], 'body' => '<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <link rel="canonical" href="https://im4change.in/<pre class="cake-error"><a href="javascript:void(0);" onclick="document.getElementById('cakeErr67f22b6b50d94-trace').style.display = (document.getElementById('cakeErr67f22b6b50d94-trace').style.display == 'none' ? '' : 'none');"><b>Notice</b> (8)</a>: Undefined variable: urlPrefix [<b>APP/Template/Layout/printlayout.ctp</b>, line <b>8</b>]<div id="cakeErr67f22b6b50d94-trace" class="cake-stack-trace" style="display: none;"><a href="javascript:void(0);" onclick="document.getElementById('cakeErr67f22b6b50d94-code').style.display = (document.getElementById('cakeErr67f22b6b50d94-code').style.display == 'none' ? '' : 'none')">Code</a> <a href="javascript:void(0);" onclick="document.getElementById('cakeErr67f22b6b50d94-context').style.display = (document.getElementById('cakeErr67f22b6b50d94-context').style.display == 'none' ? '' : 'none')">Context</a><pre id="cakeErr67f22b6b50d94-code" class="cake-code-dump" style="display: none;"><code><span style="color: #000000"><span style="color: #0000BB"></span><span style="color: #007700"><</span><span style="color: #0000BB">head</span><span style="color: #007700">> </span></span></code> <span class="code-highlight"><code><span style="color: #000000"> <link rel="canonical" href="<span style="color: #0000BB"><?php </span><span style="color: #007700">echo </span><span style="color: #0000BB">Configure</span><span style="color: #007700">::</span><span style="color: #0000BB">read</span><span style="color: #007700">(</span><span style="color: #DD0000">'SITE_URL'</span><span style="color: #007700">); </span><span style="color: #0000BB">?><?php </span><span style="color: #007700">echo </span><span style="color: #0000BB">$urlPrefix</span><span style="color: #007700">;</span><span style="color: #0000BB">?><?php </span><span style="color: #007700">echo </span><span style="color: #0000BB">$article_current</span><span style="color: #007700">-></span><span style="color: #0000BB">category</span><span style="color: #007700">-></span><span style="color: #0000BB">slug</span><span style="color: #007700">; </span><span style="color: #0000BB">?></span>/<span style="color: #0000BB"><?php </span><span style="color: #007700">echo </span><span style="color: #0000BB">$article_current</span><span style="color: #007700">-></span><span style="color: #0000BB">seo_url</span><span style="color: #007700">; </span><span style="color: #0000BB">?></span>.html"/> </span></code></span> <code><span style="color: #000000"><span style="color: #0000BB"> </span><span style="color: #007700"><</span><span style="color: #0000BB">meta http</span><span style="color: #007700">-</span><span style="color: #0000BB">equiv</span><span style="color: #007700">=</span><span style="color: #DD0000">"Content-Type" </span><span style="color: #0000BB">content</span><span style="color: #007700">=</span><span style="color: #DD0000">"text/html; charset=utf-8"</span><span style="color: #007700">/> </span></span></code></pre><pre id="cakeErr67f22b6b50d94-context" class="cake-context" style="display: none;">$viewFile = '/home/brlfuser/public_html/src/Template/Layout/printlayout.ctp' $dataForView = [ 'article_current' => object(App\Model\Entity\Article) { 'id' => (int) 10982, 'title' => 'Privacy law framework may lead to domain issues by Surabhi Agarwal &amp; Shauvik Ghosh', 'subheading' => '', 'description' => '<div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> The government is in a dilemma as it grapples with the expanded scope of India&rsquo;s proposed privacy law: Should it scrap all existing provisions on lawful interceptions and fold them under the new legislation, or strengthen the various laws under different ministries so their turfs remain undisturbed? </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> The right to privacy Bill aims to uphold the right of all Indians against any misuse of their personal information, interception of personal communication, unlawful surveillance and unwanted commercial communication. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> But its scope has been expanded beyond data protection to include provisions on lawful interception, surveillance and illegal commercial communication. </div> <div style="text-align: justify"> &nbsp; </div> <div style="text-align: justify"> Several of these additions are governed by different ministries. For instance, the Indian Telegraph Act, the Wireless Act, the Information Technology Act, the Prevention of Terrorism Act and provisions of the Code of Criminal Procedure all contain sections on lawful interception. The IT Act is controlled by the department of information technology, and the Telegraph Act and the Wireless Act by the department of telecom as lawful interception requires technological expertise. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> The department of personal and training, mandated with framing the law, has come out with a draft legislation that lays out its own provisions on lawful interception, some of these similar to existing laws. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> Mint has reviewed a copy of the draft Bill and minutes of various meetings on the issue. According to one such document, Attorney General G.E. Vahanvati is of the view that &ldquo;provisions about the authorization of interception of communications (Web/IT-based) should be so drafted that it may have overriding effect over similar provisions in Telegraph Act, IT Act or any other Act&rdquo;. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> That could trigger an inter-departmental conflict. &ldquo;That is the question which is still bothering us and we need to find a fix to the problem,&rdquo; said a government official, who has been involved in the talks. Some of the existing provisions under various ministries, he says, are either obsolete or inadequate. The Telegraph Act of 1885 talks of interception of telegrams. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> &ldquo;There was no satellite communication or Internet then. Even the IT Act of 2000 permits interception which is of Internet-based communication. We need one legislation which is for the current scenario as the ambit of these provisions is so small,&rdquo; said the official, requesting anonymity because of the sensitivity of the matter. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> Another official with a security establishment, who is also involved in the talks, said provisions in the Bill should not disturb the existing regime of lawful interception that&rsquo;s critical to intelligence gathering. &ldquo;The draft privacy Bill is positive in that direction. But it should be stated in categorical terms,&rdquo; the official said, on condition of anonymity. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> Under present laws, central agencies require the Union home secretary&rsquo;s permission to intercept phone calls and emails. In states, the permission is granted by the state home secretaries. On an average, central agencies intercept 6,500 phone numbers daily. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> Former Union home secretary G.K. Pillai says a comprehensive regime on lawful interception will not create operational hindrances in the functioning of law enforcement agencies. &ldquo;Otherwise also the existing laws like Telegraph Act need some modification,&rdquo; he said. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> The first official said the overlaps in the draft Bill are only on lawful interceptions as India does not have laws governing surveillance and commercial communication. The Telecom Regulatory Authority of India recently came out with guidelines on spam text messages, but these are not law. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> The privacy Act was originally mooted to ensure that data collected by the government under the Unique Identification project, or Aadhaar, is not misused. Aadhaar, as part of providing unique digital identities to all Indian residents, collects various personal information, including biometric data and iris scans. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> But recent incidents such as the tapping of phone conversations involving lobbyist Niira Radia prompted the government to relook the privacy law. &ldquo;It exposed the weakness in the country&rsquo;s privacy regime and it was felt that a law just on data protection won&rsquo;t be enough,&rdquo; said the first official. &ldquo;It has to be comprehensive enough to address at least the basic privacy requirements.&rdquo; </div> <div style="text-align: justify"> <br /> </div>', 'credit_writer' => 'Live Mint, 8 November, 2011, http://www.livemint.com/2011/11/08005448/Privacy-law-framework-may-lead.html', 'article_img' => '', 'article_img_thumb' => '', 'status' => (int) 1, 'show_on_home' => (int) 1, 'lang' => 'EN', 'category_id' => (int) 16, 'tag_keyword' => '', 'seo_url' => 'privacy-law-framework-may-lead-to-domain-issues-by-surabhi-agarwal-shauvik-ghosh-11096', 'meta_title' => null, 'meta_keywords' => null, 'meta_description' => null, 'noindex' => (int) 0, 'publish_date' => object(Cake\I18n\FrozenDate) {}, 'most_visit_section_id' => null, 'article_big_img' => null, 'liveid' => (int) 11096, 'created' => object(Cake\I18n\FrozenTime) {}, 'modified' => object(Cake\I18n\FrozenTime) {}, 'edate' => '', 'tags' => [ [maximum depth reached] ], 'category' => object(App\Model\Entity\Category) {}, '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[hasErrors]' => false, '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'Articles' }, 'articleid' => (int) 10982, 'metaTitle' => 'LATEST NEWS UPDATES | Privacy law framework may lead to domain issues by Surabhi Agarwal &amp; Shauvik Ghosh', 'metaKeywords' => 'Human Rights,Privacy', 'metaDesc' => ' The government is in a dilemma as it grapples with the expanded scope of India&rsquo;s proposed privacy law: Should it scrap all existing provisions on lawful interceptions and fold them under the new legislation, or strengthen the various laws under...', 'disp' => '<div style="text-align: justify"><br /></div><div style="text-align: justify">The government is in a dilemma as it grapples with the expanded scope of India&rsquo;s proposed privacy law: Should it scrap all existing provisions on lawful interceptions and fold them under the new legislation, or strengthen the various laws under different ministries so their turfs remain undisturbed?</div><div style="text-align: justify"><br /></div><div style="text-align: justify">The right to privacy Bill aims to uphold the right of all Indians against any misuse of their personal information, interception of personal communication, unlawful surveillance and unwanted commercial communication.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">But its scope has been expanded beyond data protection to include provisions on lawful interception, surveillance and illegal commercial communication.</div><div style="text-align: justify">&nbsp;</div><div style="text-align: justify">Several of these additions are governed by different ministries. For instance, the Indian Telegraph Act, the Wireless Act, the Information Technology Act, the Prevention of Terrorism Act and provisions of the Code of Criminal Procedure all contain sections on lawful interception. The IT Act is controlled by the department of information technology, and the Telegraph Act and the Wireless Act by the department of telecom as lawful interception requires technological expertise.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">The department of personal and training, mandated with framing the law, has come out with a draft legislation that lays out its own provisions on lawful interception, some of these similar to existing laws.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">Mint has reviewed a copy of the draft Bill and minutes of various meetings on the issue. According to one such document, Attorney General G.E. Vahanvati is of the view that &ldquo;provisions about the authorization of interception of communications (Web/IT-based) should be so drafted that it may have overriding effect over similar provisions in Telegraph Act, IT Act or any other Act&rdquo;.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">That could trigger an inter-departmental conflict. &ldquo;That is the question which is still bothering us and we need to find a fix to the problem,&rdquo; said a government official, who has been involved in the talks. Some of the existing provisions under various ministries, he says, are either obsolete or inadequate. The Telegraph Act of 1885 talks of interception of telegrams.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">&ldquo;There was no satellite communication or Internet then. Even the IT Act of 2000 permits interception which is of Internet-based communication. We need one legislation which is for the current scenario as the ambit of these provisions is so small,&rdquo; said the official, requesting anonymity because of the sensitivity of the matter.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">Another official with a security establishment, who is also involved in the talks, said provisions in the Bill should not disturb the existing regime of lawful interception that&rsquo;s critical to intelligence gathering. &ldquo;The draft privacy Bill is positive in that direction. But it should be stated in categorical terms,&rdquo; the official said, on condition of anonymity.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">Under present laws, central agencies require the Union home secretary&rsquo;s permission to intercept phone calls and emails. In states, the permission is granted by the state home secretaries. On an average, central agencies intercept 6,500 phone numbers daily.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">Former Union home secretary G.K. Pillai says a comprehensive regime on lawful interception will not create operational hindrances in the functioning of law enforcement agencies. &ldquo;Otherwise also the existing laws like Telegraph Act need some modification,&rdquo; he said.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">The first official said the overlaps in the draft Bill are only on lawful interceptions as India does not have laws governing surveillance and commercial communication. The Telecom Regulatory Authority of India recently came out with guidelines on spam text messages, but these are not law.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">The privacy Act was originally mooted to ensure that data collected by the government under the Unique Identification project, or Aadhaar, is not misused. Aadhaar, as part of providing unique digital identities to all Indian residents, collects various personal information, including biometric data and iris scans.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">But recent incidents such as the tapping of phone conversations involving lobbyist Niira Radia prompted the government to relook the privacy law. &ldquo;It exposed the weakness in the country&rsquo;s privacy regime and it was felt that a law just on data protection won&rsquo;t be enough,&rdquo; said the first official. &ldquo;It has to be comprehensive enough to address at least the basic privacy requirements.&rdquo;</div><div style="text-align: justify"><br /></div>', 'lang' => 'English', 'SITE_URL' => 'https://im4change.in/', 'site_title' => 'im4change', 'adminprix' => 'admin' ] $article_current = object(App\Model\Entity\Article) { 'id' => (int) 10982, 'title' => 'Privacy law framework may lead to domain issues by Surabhi Agarwal &amp; Shauvik Ghosh', 'subheading' => '', 'description' => '<div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> The government is in a dilemma as it grapples with the expanded scope of India&rsquo;s proposed privacy law: Should it scrap all existing provisions on lawful interceptions and fold them under the new legislation, or strengthen the various laws under different ministries so their turfs remain undisturbed? </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> The right to privacy Bill aims to uphold the right of all Indians against any misuse of their personal information, interception of personal communication, unlawful surveillance and unwanted commercial communication. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> But its scope has been expanded beyond data protection to include provisions on lawful interception, surveillance and illegal commercial communication. </div> <div style="text-align: justify"> &nbsp; </div> <div style="text-align: justify"> Several of these additions are governed by different ministries. For instance, the Indian Telegraph Act, the Wireless Act, the Information Technology Act, the Prevention of Terrorism Act and provisions of the Code of Criminal Procedure all contain sections on lawful interception. The IT Act is controlled by the department of information technology, and the Telegraph Act and the Wireless Act by the department of telecom as lawful interception requires technological expertise. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> The department of personal and training, mandated with framing the law, has come out with a draft legislation that lays out its own provisions on lawful interception, some of these similar to existing laws. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> Mint has reviewed a copy of the draft Bill and minutes of various meetings on the issue. According to one such document, Attorney General G.E. Vahanvati is of the view that &ldquo;provisions about the authorization of interception of communications (Web/IT-based) should be so drafted that it may have overriding effect over similar provisions in Telegraph Act, IT Act or any other Act&rdquo;. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> That could trigger an inter-departmental conflict. &ldquo;That is the question which is still bothering us and we need to find a fix to the problem,&rdquo; said a government official, who has been involved in the talks. Some of the existing provisions under various ministries, he says, are either obsolete or inadequate. The Telegraph Act of 1885 talks of interception of telegrams. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> &ldquo;There was no satellite communication or Internet then. Even the IT Act of 2000 permits interception which is of Internet-based communication. We need one legislation which is for the current scenario as the ambit of these provisions is so small,&rdquo; said the official, requesting anonymity because of the sensitivity of the matter. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> Another official with a security establishment, who is also involved in the talks, said provisions in the Bill should not disturb the existing regime of lawful interception that&rsquo;s critical to intelligence gathering. &ldquo;The draft privacy Bill is positive in that direction. But it should be stated in categorical terms,&rdquo; the official said, on condition of anonymity. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> Under present laws, central agencies require the Union home secretary&rsquo;s permission to intercept phone calls and emails. In states, the permission is granted by the state home secretaries. On an average, central agencies intercept 6,500 phone numbers daily. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> Former Union home secretary G.K. Pillai says a comprehensive regime on lawful interception will not create operational hindrances in the functioning of law enforcement agencies. &ldquo;Otherwise also the existing laws like Telegraph Act need some modification,&rdquo; he said. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> The first official said the overlaps in the draft Bill are only on lawful interceptions as India does not have laws governing surveillance and commercial communication. The Telecom Regulatory Authority of India recently came out with guidelines on spam text messages, but these are not law. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> The privacy Act was originally mooted to ensure that data collected by the government under the Unique Identification project, or Aadhaar, is not misused. Aadhaar, as part of providing unique digital identities to all Indian residents, collects various personal information, including biometric data and iris scans. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> But recent incidents such as the tapping of phone conversations involving lobbyist Niira Radia prompted the government to relook the privacy law. &ldquo;It exposed the weakness in the country&rsquo;s privacy regime and it was felt that a law just on data protection won&rsquo;t be enough,&rdquo; said the first official. &ldquo;It has to be comprehensive enough to address at least the basic privacy requirements.&rdquo; </div> <div style="text-align: justify"> <br /> </div>', 'credit_writer' => 'Live Mint, 8 November, 2011, http://www.livemint.com/2011/11/08005448/Privacy-law-framework-may-lead.html', 'article_img' => '', 'article_img_thumb' => '', 'status' => (int) 1, 'show_on_home' => (int) 1, 'lang' => 'EN', 'category_id' => (int) 16, 'tag_keyword' => '', 'seo_url' => 'privacy-law-framework-may-lead-to-domain-issues-by-surabhi-agarwal-shauvik-ghosh-11096', 'meta_title' => null, 'meta_keywords' => null, 'meta_description' => null, 'noindex' => (int) 0, 'publish_date' => object(Cake\I18n\FrozenDate) {}, 'most_visit_section_id' => null, 'article_big_img' => null, 'liveid' => (int) 11096, 'created' => object(Cake\I18n\FrozenTime) {}, 'modified' => object(Cake\I18n\FrozenTime) {}, 'edate' => '', 'tags' => [ (int) 0 => object(Cake\ORM\Entity) {}, (int) 1 => object(Cake\ORM\Entity) {} ], 'category' => object(App\Model\Entity\Category) {}, '[new]' => false, '[accessible]' => [ '*' => true, 'id' => false ], '[dirty]' => [], '[original]' => [], '[virtual]' => [], '[hasErrors]' => false, '[errors]' => [], '[invalid]' => [], '[repository]' => 'Articles' } $articleid = (int) 10982 $metaTitle = 'LATEST NEWS UPDATES | Privacy law framework may lead to domain issues by Surabhi Agarwal &amp; Shauvik Ghosh' $metaKeywords = 'Human Rights,Privacy' $metaDesc = ' The government is in a dilemma as it grapples with the expanded scope of India&rsquo;s proposed privacy law: Should it scrap all existing provisions on lawful interceptions and fold them under the new legislation, or strengthen the various laws under...' $disp = '<div style="text-align: justify"><br /></div><div style="text-align: justify">The government is in a dilemma as it grapples with the expanded scope of India&rsquo;s proposed privacy law: Should it scrap all existing provisions on lawful interceptions and fold them under the new legislation, or strengthen the various laws under different ministries so their turfs remain undisturbed?</div><div style="text-align: justify"><br /></div><div style="text-align: justify">The right to privacy Bill aims to uphold the right of all Indians against any misuse of their personal information, interception of personal communication, unlawful surveillance and unwanted commercial communication.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">But its scope has been expanded beyond data protection to include provisions on lawful interception, surveillance and illegal commercial communication.</div><div style="text-align: justify">&nbsp;</div><div style="text-align: justify">Several of these additions are governed by different ministries. For instance, the Indian Telegraph Act, the Wireless Act, the Information Technology Act, the Prevention of Terrorism Act and provisions of the Code of Criminal Procedure all contain sections on lawful interception. The IT Act is controlled by the department of information technology, and the Telegraph Act and the Wireless Act by the department of telecom as lawful interception requires technological expertise.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">The department of personal and training, mandated with framing the law, has come out with a draft legislation that lays out its own provisions on lawful interception, some of these similar to existing laws.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">Mint has reviewed a copy of the draft Bill and minutes of various meetings on the issue. According to one such document, Attorney General G.E. Vahanvati is of the view that &ldquo;provisions about the authorization of interception of communications (Web/IT-based) should be so drafted that it may have overriding effect over similar provisions in Telegraph Act, IT Act or any other Act&rdquo;.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">That could trigger an inter-departmental conflict. &ldquo;That is the question which is still bothering us and we need to find a fix to the problem,&rdquo; said a government official, who has been involved in the talks. Some of the existing provisions under various ministries, he says, are either obsolete or inadequate. The Telegraph Act of 1885 talks of interception of telegrams.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">&ldquo;There was no satellite communication or Internet then. Even the IT Act of 2000 permits interception which is of Internet-based communication. We need one legislation which is for the current scenario as the ambit of these provisions is so small,&rdquo; said the official, requesting anonymity because of the sensitivity of the matter.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">Another official with a security establishment, who is also involved in the talks, said provisions in the Bill should not disturb the existing regime of lawful interception that&rsquo;s critical to intelligence gathering. &ldquo;The draft privacy Bill is positive in that direction. But it should be stated in categorical terms,&rdquo; the official said, on condition of anonymity.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">Under present laws, central agencies require the Union home secretary&rsquo;s permission to intercept phone calls and emails. In states, the permission is granted by the state home secretaries. On an average, central agencies intercept 6,500 phone numbers daily.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">Former Union home secretary G.K. Pillai says a comprehensive regime on lawful interception will not create operational hindrances in the functioning of law enforcement agencies. &ldquo;Otherwise also the existing laws like Telegraph Act need some modification,&rdquo; he said.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">The first official said the overlaps in the draft Bill are only on lawful interceptions as India does not have laws governing surveillance and commercial communication. The Telecom Regulatory Authority of India recently came out with guidelines on spam text messages, but these are not law.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">The privacy Act was originally mooted to ensure that data collected by the government under the Unique Identification project, or Aadhaar, is not misused. Aadhaar, as part of providing unique digital identities to all Indian residents, collects various personal information, including biometric data and iris scans.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">But recent incidents such as the tapping of phone conversations involving lobbyist Niira Radia prompted the government to relook the privacy law. &ldquo;It exposed the weakness in the country&rsquo;s privacy regime and it was felt that a law just on data protection won&rsquo;t be enough,&rdquo; said the first official. &ldquo;It has to be comprehensive enough to address at least the basic privacy requirements.&rdquo;</div><div style="text-align: justify"><br /></div>' $lang = 'English' $SITE_URL = 'https://im4change.in/' $site_title = 'im4change' $adminprix = 'admin'</pre><pre class="stack-trace">include - APP/Template/Layout/printlayout.ctp, line 8 Cake\View\View::_evaluate() - CORE/src/View/View.php, line 1413 Cake\View\View::_render() - CORE/src/View/View.php, line 1374 Cake\View\View::renderLayout() - CORE/src/View/View.php, line 927 Cake\View\View::render() - CORE/src/View/View.php, line 885 Cake\Controller\Controller::render() - CORE/src/Controller/Controller.php, line 791 Cake\Http\ActionDispatcher::_invoke() - CORE/src/Http/ActionDispatcher.php, line 126 Cake\Http\ActionDispatcher::dispatch() - CORE/src/Http/ActionDispatcher.php, line 94 Cake\Http\BaseApplication::__invoke() - CORE/src/Http/BaseApplication.php, line 235 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Routing\Middleware\RoutingMiddleware::__invoke() - CORE/src/Routing/Middleware/RoutingMiddleware.php, line 162 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Routing\Middleware\AssetMiddleware::__invoke() - CORE/src/Routing/Middleware/AssetMiddleware.php, line 88 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Error\Middleware\ErrorHandlerMiddleware::__invoke() - CORE/src/Error/Middleware/ErrorHandlerMiddleware.php, line 96 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Http\Runner::run() - CORE/src/Http/Runner.php, line 51</pre></div></pre>latest-news-updates/privacy-law-framework-may-lead-to-domain-issues-by-surabhi-agarwal-shauvik-ghosh-11096.html"/> <meta http-equiv="Content-Type" content="text/html; charset=utf-8"/> <link href="https://im4change.in/css/control.css" rel="stylesheet" type="text/css" media="all"/> <title>LATEST NEWS UPDATES | Privacy law framework may lead to domain issues by Surabhi Agarwal & Shauvik Ghosh | Im4change.org</title> <meta name="description" content=" The government is in a dilemma as it grapples with the expanded scope of India’s proposed privacy law: Should it scrap all existing provisions on lawful interceptions and fold them under the new legislation, or strengthen the various laws under..."/> <script src="https://im4change.in/js/jquery-1.10.2.js"></script> <script type="text/javascript" src="https://im4change.in/js/jquery-migrate.min.js"></script> <script language="javascript" type="text/javascript"> $(document).ready(function () { var img = $("img")[0]; // Get my img elem var pic_real_width, pic_real_height; $("<img/>") // Make in memory copy of image to avoid css issues .attr("src", $(img).attr("src")) .load(function () { pic_real_width = this.width; // Note: $(this).width() will not pic_real_height = this.height; // work for in memory images. }); }); </script> <style type="text/css"> @media screen { div.divFooter { display: block; } } @media print { .printbutton { display: none !important; } } </style> </head> <body> <table cellpadding="0" cellspacing="0" border="0" width="98%" align="center"> <tr> <td class="top_bg"> <div class="divFooter"> <img src="https://im4change.in/images/logo1.jpg" height="59" border="0" alt="Resource centre on India's rural distress" style="padding-top:14px;"/> </div> </td> </tr> <tr> <td id="topspace"> </td> </tr> <tr id="topspace"> <td> </td> </tr> <tr> <td height="50" style="border-bottom:1px solid #000; padding-top:10px;" class="printbutton"> <form><input type="button" value=" Print this page " onclick="window.print();return false;"/></form> </td> </tr> <tr> <td width="100%"> <h1 class="news_headlines" style="font-style:normal"> <strong>Privacy law framework may lead to domain issues by Surabhi Agarwal & Shauvik Ghosh</strong></h1> </td> </tr> <tr> <td width="100%" style="font-family:Arial, 'Segoe Script', 'Segoe UI', sans-serif, serif"><font size="3"> <div style="text-align: justify"><br /></div><div style="text-align: justify">The government is in a dilemma as it grapples with the expanded scope of India’s proposed privacy law: Should it scrap all existing provisions on lawful interceptions and fold them under the new legislation, or strengthen the various laws under different ministries so their turfs remain undisturbed?</div><div style="text-align: justify"><br /></div><div style="text-align: justify">The right to privacy Bill aims to uphold the right of all Indians against any misuse of their personal information, interception of personal communication, unlawful surveillance and unwanted commercial communication.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">But its scope has been expanded beyond data protection to include provisions on lawful interception, surveillance and illegal commercial communication.</div><div style="text-align: justify"> </div><div style="text-align: justify">Several of these additions are governed by different ministries. For instance, the Indian Telegraph Act, the Wireless Act, the Information Technology Act, the Prevention of Terrorism Act and provisions of the Code of Criminal Procedure all contain sections on lawful interception. The IT Act is controlled by the department of information technology, and the Telegraph Act and the Wireless Act by the department of telecom as lawful interception requires technological expertise.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">The department of personal and training, mandated with framing the law, has come out with a draft legislation that lays out its own provisions on lawful interception, some of these similar to existing laws.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">Mint has reviewed a copy of the draft Bill and minutes of various meetings on the issue. According to one such document, Attorney General G.E. Vahanvati is of the view that “provisions about the authorization of interception of communications (Web/IT-based) should be so drafted that it may have overriding effect over similar provisions in Telegraph Act, IT Act or any other Act”.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">That could trigger an inter-departmental conflict. “That is the question which is still bothering us and we need to find a fix to the problem,” said a government official, who has been involved in the talks. Some of the existing provisions under various ministries, he says, are either obsolete or inadequate. The Telegraph Act of 1885 talks of interception of telegrams.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">“There was no satellite communication or Internet then. Even the IT Act of 2000 permits interception which is of Internet-based communication. We need one legislation which is for the current scenario as the ambit of these provisions is so small,” said the official, requesting anonymity because of the sensitivity of the matter.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">Another official with a security establishment, who is also involved in the talks, said provisions in the Bill should not disturb the existing regime of lawful interception that’s critical to intelligence gathering. “The draft privacy Bill is positive in that direction. But it should be stated in categorical terms,” the official said, on condition of anonymity.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">Under present laws, central agencies require the Union home secretary’s permission to intercept phone calls and emails. In states, the permission is granted by the state home secretaries. On an average, central agencies intercept 6,500 phone numbers daily.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">Former Union home secretary G.K. Pillai says a comprehensive regime on lawful interception will not create operational hindrances in the functioning of law enforcement agencies. “Otherwise also the existing laws like Telegraph Act need some modification,” he said.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">The first official said the overlaps in the draft Bill are only on lawful interceptions as India does not have laws governing surveillance and commercial communication. The Telecom Regulatory Authority of India recently came out with guidelines on spam text messages, but these are not law.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">The privacy Act was originally mooted to ensure that data collected by the government under the Unique Identification project, or Aadhaar, is not misused. Aadhaar, as part of providing unique digital identities to all Indian residents, collects various personal information, including biometric data and iris scans.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">But recent incidents such as the tapping of phone conversations involving lobbyist Niira Radia prompted the government to relook the privacy law. “It exposed the weakness in the country’s privacy regime and it was felt that a law just on data protection won’t be enough,” said the first official. “It has to be comprehensive enough to address at least the basic privacy requirements.”</div><div style="text-align: justify"><br /></div> </font> </td> </tr> <tr> <td> </td> </tr> <tr> <td height="50" style="border-top:1px solid #000; border-bottom:1px solid #000;padding-top:10px;"> <form><input type="button" value=" Print this page " onclick="window.print();return false;"/></form> </td> </tr> </table></body> </html>' } $cookies = [] $values = [ (int) 0 => 'text/html; charset=UTF-8' ] $name = 'Content-Type' $first = true $value = 'text/html; charset=UTF-8'header - [internal], line ?? Cake\Http\ResponseEmitter::emitHeaders() - CORE/src/Http/ResponseEmitter.php, line 181 Cake\Http\ResponseEmitter::emit() - CORE/src/Http/ResponseEmitter.php, line 55 Cake\Http\Server::emit() - CORE/src/Http/Server.php, line 141 [main] - ROOT/webroot/index.php, line 39
<head>
<link rel="canonical" href="<?php echo Configure::read('SITE_URL'); ?><?php echo $urlPrefix;?><?php echo $article_current->category->slug; ?>/<?php echo $article_current->seo_url; ?>.html"/>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8"/>
$viewFile = '/home/brlfuser/public_html/src/Template/Layout/printlayout.ctp' $dataForView = [ 'article_current' => object(App\Model\Entity\Article) { 'id' => (int) 10982, 'title' => 'Privacy law framework may lead to domain issues by Surabhi Agarwal & Shauvik Ghosh', 'subheading' => '', 'description' => '<div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> The government is in a dilemma as it grapples with the expanded scope of India’s proposed privacy law: Should it scrap all existing provisions on lawful interceptions and fold them under the new legislation, or strengthen the various laws under different ministries so their turfs remain undisturbed? </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> The right to privacy Bill aims to uphold the right of all Indians against any misuse of their personal information, interception of personal communication, unlawful surveillance and unwanted commercial communication. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> But its scope has been expanded beyond data protection to include provisions on lawful interception, surveillance and illegal commercial communication. </div> <div style="text-align: justify"> </div> <div style="text-align: justify"> Several of these additions are governed by different ministries. For instance, the Indian Telegraph Act, the Wireless Act, the Information Technology Act, the Prevention of Terrorism Act and provisions of the Code of Criminal Procedure all contain sections on lawful interception. The IT Act is controlled by the department of information technology, and the Telegraph Act and the Wireless Act by the department of telecom as lawful interception requires technological expertise. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> The department of personal and training, mandated with framing the law, has come out with a draft legislation that lays out its own provisions on lawful interception, some of these similar to existing laws. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> Mint has reviewed a copy of the draft Bill and minutes of various meetings on the issue. According to one such document, Attorney General G.E. Vahanvati is of the view that “provisions about the authorization of interception of communications (Web/IT-based) should be so drafted that it may have overriding effect over similar provisions in Telegraph Act, IT Act or any other Act”. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> That could trigger an inter-departmental conflict. “That is the question which is still bothering us and we need to find a fix to the problem,” said a government official, who has been involved in the talks. Some of the existing provisions under various ministries, he says, are either obsolete or inadequate. The Telegraph Act of 1885 talks of interception of telegrams. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> “There was no satellite communication or Internet then. Even the IT Act of 2000 permits interception which is of Internet-based communication. We need one legislation which is for the current scenario as the ambit of these provisions is so small,” said the official, requesting anonymity because of the sensitivity of the matter. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> Another official with a security establishment, who is also involved in the talks, said provisions in the Bill should not disturb the existing regime of lawful interception that’s critical to intelligence gathering. “The draft privacy Bill is positive in that direction. But it should be stated in categorical terms,” the official said, on condition of anonymity. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> Under present laws, central agencies require the Union home secretary’s permission to intercept phone calls and emails. In states, the permission is granted by the state home secretaries. On an average, central agencies intercept 6,500 phone numbers daily. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> Former Union home secretary G.K. Pillai says a comprehensive regime on lawful interception will not create operational hindrances in the functioning of law enforcement agencies. “Otherwise also the existing laws like Telegraph Act need some modification,” he said. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> The first official said the overlaps in the draft Bill are only on lawful interceptions as India does not have laws governing surveillance and commercial communication. The Telecom Regulatory Authority of India recently came out with guidelines on spam text messages, but these are not law. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> The privacy Act was originally mooted to ensure that data collected by the government under the Unique Identification project, or Aadhaar, is not misused. Aadhaar, as part of providing unique digital identities to all Indian residents, collects various personal information, including biometric data and iris scans. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> But recent incidents such as the tapping of phone conversations involving lobbyist Niira Radia prompted the government to relook the privacy law. “It exposed the weakness in the country’s privacy regime and it was felt that a law just on data protection won’t be enough,” said the first official. “It has to be comprehensive enough to address at least the basic privacy requirements.” </div> <div style="text-align: justify"> <br /> </div>', 'credit_writer' => 'Live Mint, 8 November, 2011, http://www.livemint.com/2011/11/08005448/Privacy-law-framework-may-lead.html', 'article_img' => '', 'article_img_thumb' => '', 'status' => (int) 1, 'show_on_home' => (int) 1, 'lang' => 'EN', 'category_id' => (int) 16, 'tag_keyword' => '', 'seo_url' => 'privacy-law-framework-may-lead-to-domain-issues-by-surabhi-agarwal-shauvik-ghosh-11096', 'meta_title' => null, 'meta_keywords' => null, 'meta_description' => null, 'noindex' => (int) 0, 'publish_date' => object(Cake\I18n\FrozenDate) {}, 'most_visit_section_id' => null, 'article_big_img' => null, 'liveid' => (int) 11096, 'created' => object(Cake\I18n\FrozenTime) {}, 'modified' => object(Cake\I18n\FrozenTime) {}, 'edate' => '', 'tags' => [ [maximum depth reached] ], 'category' => object(App\Model\Entity\Category) {}, '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[hasErrors]' => false, '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'Articles' }, 'articleid' => (int) 10982, 'metaTitle' => 'LATEST NEWS UPDATES | Privacy law framework may lead to domain issues by Surabhi Agarwal & Shauvik Ghosh', 'metaKeywords' => 'Human Rights,Privacy', 'metaDesc' => ' The government is in a dilemma as it grapples with the expanded scope of India’s proposed privacy law: Should it scrap all existing provisions on lawful interceptions and fold them under the new legislation, or strengthen the various laws under...', 'disp' => '<div style="text-align: justify"><br /></div><div style="text-align: justify">The government is in a dilemma as it grapples with the expanded scope of India’s proposed privacy law: Should it scrap all existing provisions on lawful interceptions and fold them under the new legislation, or strengthen the various laws under different ministries so their turfs remain undisturbed?</div><div style="text-align: justify"><br /></div><div style="text-align: justify">The right to privacy Bill aims to uphold the right of all Indians against any misuse of their personal information, interception of personal communication, unlawful surveillance and unwanted commercial communication.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">But its scope has been expanded beyond data protection to include provisions on lawful interception, surveillance and illegal commercial communication.</div><div style="text-align: justify"> </div><div style="text-align: justify">Several of these additions are governed by different ministries. For instance, the Indian Telegraph Act, the Wireless Act, the Information Technology Act, the Prevention of Terrorism Act and provisions of the Code of Criminal Procedure all contain sections on lawful interception. The IT Act is controlled by the department of information technology, and the Telegraph Act and the Wireless Act by the department of telecom as lawful interception requires technological expertise.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">The department of personal and training, mandated with framing the law, has come out with a draft legislation that lays out its own provisions on lawful interception, some of these similar to existing laws.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">Mint has reviewed a copy of the draft Bill and minutes of various meetings on the issue. According to one such document, Attorney General G.E. Vahanvati is of the view that “provisions about the authorization of interception of communications (Web/IT-based) should be so drafted that it may have overriding effect over similar provisions in Telegraph Act, IT Act or any other Act”.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">That could trigger an inter-departmental conflict. “That is the question which is still bothering us and we need to find a fix to the problem,” said a government official, who has been involved in the talks. Some of the existing provisions under various ministries, he says, are either obsolete or inadequate. The Telegraph Act of 1885 talks of interception of telegrams.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">“There was no satellite communication or Internet then. Even the IT Act of 2000 permits interception which is of Internet-based communication. We need one legislation which is for the current scenario as the ambit of these provisions is so small,” said the official, requesting anonymity because of the sensitivity of the matter.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">Another official with a security establishment, who is also involved in the talks, said provisions in the Bill should not disturb the existing regime of lawful interception that’s critical to intelligence gathering. “The draft privacy Bill is positive in that direction. But it should be stated in categorical terms,” the official said, on condition of anonymity.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">Under present laws, central agencies require the Union home secretary’s permission to intercept phone calls and emails. In states, the permission is granted by the state home secretaries. On an average, central agencies intercept 6,500 phone numbers daily.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">Former Union home secretary G.K. Pillai says a comprehensive regime on lawful interception will not create operational hindrances in the functioning of law enforcement agencies. “Otherwise also the existing laws like Telegraph Act need some modification,” he said.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">The first official said the overlaps in the draft Bill are only on lawful interceptions as India does not have laws governing surveillance and commercial communication. The Telecom Regulatory Authority of India recently came out with guidelines on spam text messages, but these are not law.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">The privacy Act was originally mooted to ensure that data collected by the government under the Unique Identification project, or Aadhaar, is not misused. Aadhaar, as part of providing unique digital identities to all Indian residents, collects various personal information, including biometric data and iris scans.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">But recent incidents such as the tapping of phone conversations involving lobbyist Niira Radia prompted the government to relook the privacy law. “It exposed the weakness in the country’s privacy regime and it was felt that a law just on data protection won’t be enough,” said the first official. “It has to be comprehensive enough to address at least the basic privacy requirements.”</div><div style="text-align: justify"><br /></div>', 'lang' => 'English', 'SITE_URL' => 'https://im4change.in/', 'site_title' => 'im4change', 'adminprix' => 'admin' ] $article_current = object(App\Model\Entity\Article) { 'id' => (int) 10982, 'title' => 'Privacy law framework may lead to domain issues by Surabhi Agarwal & Shauvik Ghosh', 'subheading' => '', 'description' => '<div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> The government is in a dilemma as it grapples with the expanded scope of India’s proposed privacy law: Should it scrap all existing provisions on lawful interceptions and fold them under the new legislation, or strengthen the various laws under different ministries so their turfs remain undisturbed? </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> The right to privacy Bill aims to uphold the right of all Indians against any misuse of their personal information, interception of personal communication, unlawful surveillance and unwanted commercial communication. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> But its scope has been expanded beyond data protection to include provisions on lawful interception, surveillance and illegal commercial communication. </div> <div style="text-align: justify"> </div> <div style="text-align: justify"> Several of these additions are governed by different ministries. For instance, the Indian Telegraph Act, the Wireless Act, the Information Technology Act, the Prevention of Terrorism Act and provisions of the Code of Criminal Procedure all contain sections on lawful interception. The IT Act is controlled by the department of information technology, and the Telegraph Act and the Wireless Act by the department of telecom as lawful interception requires technological expertise. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> The department of personal and training, mandated with framing the law, has come out with a draft legislation that lays out its own provisions on lawful interception, some of these similar to existing laws. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> Mint has reviewed a copy of the draft Bill and minutes of various meetings on the issue. According to one such document, Attorney General G.E. Vahanvati is of the view that “provisions about the authorization of interception of communications (Web/IT-based) should be so drafted that it may have overriding effect over similar provisions in Telegraph Act, IT Act or any other Act”. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> That could trigger an inter-departmental conflict. “That is the question which is still bothering us and we need to find a fix to the problem,” said a government official, who has been involved in the talks. Some of the existing provisions under various ministries, he says, are either obsolete or inadequate. The Telegraph Act of 1885 talks of interception of telegrams. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> “There was no satellite communication or Internet then. Even the IT Act of 2000 permits interception which is of Internet-based communication. We need one legislation which is for the current scenario as the ambit of these provisions is so small,” said the official, requesting anonymity because of the sensitivity of the matter. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> Another official with a security establishment, who is also involved in the talks, said provisions in the Bill should not disturb the existing regime of lawful interception that’s critical to intelligence gathering. “The draft privacy Bill is positive in that direction. But it should be stated in categorical terms,” the official said, on condition of anonymity. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> Under present laws, central agencies require the Union home secretary’s permission to intercept phone calls and emails. In states, the permission is granted by the state home secretaries. On an average, central agencies intercept 6,500 phone numbers daily. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> Former Union home secretary G.K. Pillai says a comprehensive regime on lawful interception will not create operational hindrances in the functioning of law enforcement agencies. “Otherwise also the existing laws like Telegraph Act need some modification,” he said. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> The first official said the overlaps in the draft Bill are only on lawful interceptions as India does not have laws governing surveillance and commercial communication. The Telecom Regulatory Authority of India recently came out with guidelines on spam text messages, but these are not law. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> The privacy Act was originally mooted to ensure that data collected by the government under the Unique Identification project, or Aadhaar, is not misused. Aadhaar, as part of providing unique digital identities to all Indian residents, collects various personal information, including biometric data and iris scans. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> But recent incidents such as the tapping of phone conversations involving lobbyist Niira Radia prompted the government to relook the privacy law. “It exposed the weakness in the country’s privacy regime and it was felt that a law just on data protection won’t be enough,” said the first official. “It has to be comprehensive enough to address at least the basic privacy requirements.” </div> <div style="text-align: justify"> <br /> </div>', 'credit_writer' => 'Live Mint, 8 November, 2011, http://www.livemint.com/2011/11/08005448/Privacy-law-framework-may-lead.html', 'article_img' => '', 'article_img_thumb' => '', 'status' => (int) 1, 'show_on_home' => (int) 1, 'lang' => 'EN', 'category_id' => (int) 16, 'tag_keyword' => '', 'seo_url' => 'privacy-law-framework-may-lead-to-domain-issues-by-surabhi-agarwal-shauvik-ghosh-11096', 'meta_title' => null, 'meta_keywords' => null, 'meta_description' => null, 'noindex' => (int) 0, 'publish_date' => object(Cake\I18n\FrozenDate) {}, 'most_visit_section_id' => null, 'article_big_img' => null, 'liveid' => (int) 11096, 'created' => object(Cake\I18n\FrozenTime) {}, 'modified' => object(Cake\I18n\FrozenTime) {}, 'edate' => '', 'tags' => [ (int) 0 => object(Cake\ORM\Entity) {}, (int) 1 => object(Cake\ORM\Entity) {} ], 'category' => object(App\Model\Entity\Category) {}, '[new]' => false, '[accessible]' => [ '*' => true, 'id' => false ], '[dirty]' => [], '[original]' => [], '[virtual]' => [], '[hasErrors]' => false, '[errors]' => [], '[invalid]' => [], '[repository]' => 'Articles' } $articleid = (int) 10982 $metaTitle = 'LATEST NEWS UPDATES | Privacy law framework may lead to domain issues by Surabhi Agarwal & Shauvik Ghosh' $metaKeywords = 'Human Rights,Privacy' $metaDesc = ' The government is in a dilemma as it grapples with the expanded scope of India’s proposed privacy law: Should it scrap all existing provisions on lawful interceptions and fold them under the new legislation, or strengthen the various laws under...' $disp = '<div style="text-align: justify"><br /></div><div style="text-align: justify">The government is in a dilemma as it grapples with the expanded scope of India’s proposed privacy law: Should it scrap all existing provisions on lawful interceptions and fold them under the new legislation, or strengthen the various laws under different ministries so their turfs remain undisturbed?</div><div style="text-align: justify"><br /></div><div style="text-align: justify">The right to privacy Bill aims to uphold the right of all Indians against any misuse of their personal information, interception of personal communication, unlawful surveillance and unwanted commercial communication.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">But its scope has been expanded beyond data protection to include provisions on lawful interception, surveillance and illegal commercial communication.</div><div style="text-align: justify"> </div><div style="text-align: justify">Several of these additions are governed by different ministries. For instance, the Indian Telegraph Act, the Wireless Act, the Information Technology Act, the Prevention of Terrorism Act and provisions of the Code of Criminal Procedure all contain sections on lawful interception. The IT Act is controlled by the department of information technology, and the Telegraph Act and the Wireless Act by the department of telecom as lawful interception requires technological expertise.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">The department of personal and training, mandated with framing the law, has come out with a draft legislation that lays out its own provisions on lawful interception, some of these similar to existing laws.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">Mint has reviewed a copy of the draft Bill and minutes of various meetings on the issue. According to one such document, Attorney General G.E. Vahanvati is of the view that “provisions about the authorization of interception of communications (Web/IT-based) should be so drafted that it may have overriding effect over similar provisions in Telegraph Act, IT Act or any other Act”.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">That could trigger an inter-departmental conflict. “That is the question which is still bothering us and we need to find a fix to the problem,” said a government official, who has been involved in the talks. Some of the existing provisions under various ministries, he says, are either obsolete or inadequate. The Telegraph Act of 1885 talks of interception of telegrams.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">“There was no satellite communication or Internet then. Even the IT Act of 2000 permits interception which is of Internet-based communication. We need one legislation which is for the current scenario as the ambit of these provisions is so small,” said the official, requesting anonymity because of the sensitivity of the matter.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">Another official with a security establishment, who is also involved in the talks, said provisions in the Bill should not disturb the existing regime of lawful interception that’s critical to intelligence gathering. “The draft privacy Bill is positive in that direction. But it should be stated in categorical terms,” the official said, on condition of anonymity.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">Under present laws, central agencies require the Union home secretary’s permission to intercept phone calls and emails. In states, the permission is granted by the state home secretaries. On an average, central agencies intercept 6,500 phone numbers daily.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">Former Union home secretary G.K. Pillai says a comprehensive regime on lawful interception will not create operational hindrances in the functioning of law enforcement agencies. “Otherwise also the existing laws like Telegraph Act need some modification,” he said.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">The first official said the overlaps in the draft Bill are only on lawful interceptions as India does not have laws governing surveillance and commercial communication. The Telecom Regulatory Authority of India recently came out with guidelines on spam text messages, but these are not law.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">The privacy Act was originally mooted to ensure that data collected by the government under the Unique Identification project, or Aadhaar, is not misused. Aadhaar, as part of providing unique digital identities to all Indian residents, collects various personal information, including biometric data and iris scans.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">But recent incidents such as the tapping of phone conversations involving lobbyist Niira Radia prompted the government to relook the privacy law. “It exposed the weakness in the country’s privacy regime and it was felt that a law just on data protection won’t be enough,” said the first official. “It has to be comprehensive enough to address at least the basic privacy requirements.”</div><div style="text-align: justify"><br /></div>' $lang = 'English' $SITE_URL = 'https://im4change.in/' $site_title = 'im4change' $adminprix = 'admin'
include - APP/Template/Layout/printlayout.ctp, line 8 Cake\View\View::_evaluate() - CORE/src/View/View.php, line 1413 Cake\View\View::_render() - CORE/src/View/View.php, line 1374 Cake\View\View::renderLayout() - CORE/src/View/View.php, line 927 Cake\View\View::render() - CORE/src/View/View.php, line 885 Cake\Controller\Controller::render() - CORE/src/Controller/Controller.php, line 791 Cake\Http\ActionDispatcher::_invoke() - CORE/src/Http/ActionDispatcher.php, line 126 Cake\Http\ActionDispatcher::dispatch() - CORE/src/Http/ActionDispatcher.php, line 94 Cake\Http\BaseApplication::__invoke() - CORE/src/Http/BaseApplication.php, line 235 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Routing\Middleware\RoutingMiddleware::__invoke() - CORE/src/Routing/Middleware/RoutingMiddleware.php, line 162 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Routing\Middleware\AssetMiddleware::__invoke() - CORE/src/Routing/Middleware/AssetMiddleware.php, line 88 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Error\Middleware\ErrorHandlerMiddleware::__invoke() - CORE/src/Error/Middleware/ErrorHandlerMiddleware.php, line 96 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Http\Runner::run() - CORE/src/Http/Runner.php, line 51
![]() |
Privacy law framework may lead to domain issues by Surabhi Agarwal & Shauvik Ghosh |
The government is in a dilemma as it grapples with the expanded scope of India’s proposed privacy law: Should it scrap all existing provisions on lawful interceptions and fold them under the new legislation, or strengthen the various laws under different ministries so their turfs remain undisturbed? The right to privacy Bill aims to uphold the right of all Indians against any misuse of their personal information, interception of personal communication, unlawful surveillance and unwanted commercial communication. But its scope has been expanded beyond data protection to include provisions on lawful interception, surveillance and illegal commercial communication. Several of these additions are governed by different ministries. For instance, the Indian Telegraph Act, the Wireless Act, the Information Technology Act, the Prevention of Terrorism Act and provisions of the Code of Criminal Procedure all contain sections on lawful interception. The IT Act is controlled by the department of information technology, and the Telegraph Act and the Wireless Act by the department of telecom as lawful interception requires technological expertise. The department of personal and training, mandated with framing the law, has come out with a draft legislation that lays out its own provisions on lawful interception, some of these similar to existing laws. Mint has reviewed a copy of the draft Bill and minutes of various meetings on the issue. According to one such document, Attorney General G.E. Vahanvati is of the view that “provisions about the authorization of interception of communications (Web/IT-based) should be so drafted that it may have overriding effect over similar provisions in Telegraph Act, IT Act or any other Act”. That could trigger an inter-departmental conflict. “That is the question which is still bothering us and we need to find a fix to the problem,” said a government official, who has been involved in the talks. Some of the existing provisions under various ministries, he says, are either obsolete or inadequate. The Telegraph Act of 1885 talks of interception of telegrams. “There was no satellite communication or Internet then. Even the IT Act of 2000 permits interception which is of Internet-based communication. We need one legislation which is for the current scenario as the ambit of these provisions is so small,” said the official, requesting anonymity because of the sensitivity of the matter. Another official with a security establishment, who is also involved in the talks, said provisions in the Bill should not disturb the existing regime of lawful interception that’s critical to intelligence gathering. “The draft privacy Bill is positive in that direction. But it should be stated in categorical terms,” the official said, on condition of anonymity. Under present laws, central agencies require the Union home secretary’s permission to intercept phone calls and emails. In states, the permission is granted by the state home secretaries. On an average, central agencies intercept 6,500 phone numbers daily. Former Union home secretary G.K. Pillai says a comprehensive regime on lawful interception will not create operational hindrances in the functioning of law enforcement agencies. “Otherwise also the existing laws like Telegraph Act need some modification,” he said. The first official said the overlaps in the draft Bill are only on lawful interceptions as India does not have laws governing surveillance and commercial communication. The Telecom Regulatory Authority of India recently came out with guidelines on spam text messages, but these are not law. The privacy Act was originally mooted to ensure that data collected by the government under the Unique Identification project, or Aadhaar, is not misused. Aadhaar, as part of providing unique digital identities to all Indian residents, collects various personal information, including biometric data and iris scans. But recent incidents such as the tapping of phone conversations involving lobbyist Niira Radia prompted the government to relook the privacy law. “It exposed the weakness in the country’s privacy regime and it was felt that a law just on data protection won’t be enough,” said the first official. “It has to be comprehensive enough to address at least the basic privacy requirements.” |