Deprecated (16384): The ArrayAccess methods will be removed in 4.0.0.Use getParam(), getData() and getQuery() instead. - /home/brlfuser/public_html/src/Controller/ArtileDetailController.php, line: 73 You can disable deprecation warnings by setting `Error.errorLevel` to `E_ALL & ~E_USER_DEPRECATED` in your config/app.php. [CORE/src/Core/functions.php, line 311]Code Context
trigger_error($message, E_USER_DEPRECATED);
}
$message = 'The ArrayAccess methods will be removed in 4.0.0.Use getParam(), getData() and getQuery() instead. - /home/brlfuser/public_html/src/Controller/ArtileDetailController.php, line: 73 You can disable deprecation warnings by setting `Error.errorLevel` to `E_ALL & ~E_USER_DEPRECATED` in your config/app.php.' $stackFrame = (int) 1 $trace = [ (int) 0 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/ServerRequest.php', 'line' => (int) 2421, 'function' => 'deprecationWarning', 'args' => [ (int) 0 => 'The ArrayAccess methods will be removed in 4.0.0.Use getParam(), getData() and getQuery() instead.' ] ], (int) 1 => [ 'file' => '/home/brlfuser/public_html/src/Controller/ArtileDetailController.php', 'line' => (int) 73, 'function' => 'offsetGet', 'class' => 'Cake\Http\ServerRequest', 'object' => object(Cake\Http\ServerRequest) {}, 'type' => '->', 'args' => [ (int) 0 => 'catslug' ] ], (int) 2 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Controller/Controller.php', 'line' => (int) 610, 'function' => 'printArticle', 'class' => 'App\Controller\ArtileDetailController', 'object' => object(App\Controller\ArtileDetailController) {}, 'type' => '->', 'args' => [] ], (int) 3 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/ActionDispatcher.php', 'line' => (int) 120, 'function' => 'invokeAction', 'class' => 'Cake\Controller\Controller', 'object' => object(App\Controller\ArtileDetailController) {}, 'type' => '->', 'args' => [] ], (int) 4 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/ActionDispatcher.php', 'line' => (int) 94, 'function' => '_invoke', 'class' => 'Cake\Http\ActionDispatcher', 'object' => object(Cake\Http\ActionDispatcher) {}, 'type' => '->', 'args' => [ (int) 0 => object(App\Controller\ArtileDetailController) {} ] ], (int) 5 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/BaseApplication.php', 'line' => (int) 235, 'function' => 'dispatch', 'class' => 'Cake\Http\ActionDispatcher', 'object' => object(Cake\Http\ActionDispatcher) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {} ] ], (int) 6 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/Runner.php', 'line' => (int) 65, 'function' => '__invoke', 'class' => 'Cake\Http\BaseApplication', 'object' => object(App\Application) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {}, (int) 2 => object(Cake\Http\Runner) {} ] ], (int) 7 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Routing/Middleware/RoutingMiddleware.php', 'line' => (int) 162, 'function' => '__invoke', 'class' => 'Cake\Http\Runner', 'object' => object(Cake\Http\Runner) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {} ] ], (int) 8 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/Runner.php', 'line' => (int) 65, 'function' => '__invoke', 'class' => 'Cake\Routing\Middleware\RoutingMiddleware', 'object' => object(Cake\Routing\Middleware\RoutingMiddleware) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {}, (int) 2 => object(Cake\Http\Runner) {} ] ], (int) 9 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Routing/Middleware/AssetMiddleware.php', 'line' => (int) 88, 'function' => '__invoke', 'class' => 'Cake\Http\Runner', 'object' => object(Cake\Http\Runner) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {} ] ], (int) 10 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/Runner.php', 'line' => (int) 65, 'function' => '__invoke', 'class' => 'Cake\Routing\Middleware\AssetMiddleware', 'object' => object(Cake\Routing\Middleware\AssetMiddleware) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {}, (int) 2 => object(Cake\Http\Runner) {} ] ], (int) 11 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Error/Middleware/ErrorHandlerMiddleware.php', 'line' => (int) 96, 'function' => '__invoke', 'class' => 'Cake\Http\Runner', 'object' => object(Cake\Http\Runner) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {} ] ], (int) 12 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/Runner.php', 'line' => (int) 65, 'function' => '__invoke', 'class' => 'Cake\Error\Middleware\ErrorHandlerMiddleware', 'object' => object(Cake\Error\Middleware\ErrorHandlerMiddleware) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {}, (int) 2 => object(Cake\Http\Runner) {} ] ], (int) 13 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/Runner.php', 'line' => (int) 51, 'function' => '__invoke', 'class' => 'Cake\Http\Runner', 'object' => object(Cake\Http\Runner) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {} ] ], (int) 14 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/Server.php', 'line' => (int) 98, 'function' => 'run', 'class' => 'Cake\Http\Runner', 'object' => object(Cake\Http\Runner) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\MiddlewareQueue) {}, (int) 1 => object(Cake\Http\ServerRequest) {}, (int) 2 => object(Cake\Http\Response) {} ] ], (int) 15 => [ 'file' => '/home/brlfuser/public_html/webroot/index.php', 'line' => (int) 39, 'function' => 'run', 'class' => 'Cake\Http\Server', 'object' => object(Cake\Http\Server) {}, 'type' => '->', 'args' => [] ] ] $frame = [ 'file' => '/home/brlfuser/public_html/src/Controller/ArtileDetailController.php', 'line' => (int) 73, 'function' => 'offsetGet', 'class' => 'Cake\Http\ServerRequest', 'object' => object(Cake\Http\ServerRequest) { trustProxy => false [protected] params => [ [maximum depth reached] ] [protected] data => [[maximum depth reached]] [protected] query => [[maximum depth reached]] [protected] cookies => [ [maximum depth reached] ] [protected] _environment => [ [maximum depth reached] ] [protected] url => 'latest-news-updates/the-basis-of-privacy-apar-gupta-4678980/print' [protected] base => '' [protected] webroot => '/' [protected] here => '/latest-news-updates/the-basis-of-privacy-apar-gupta-4678980/print' [protected] trustedProxies => [[maximum depth reached]] [protected] _input => null [protected] _detectors => [ [maximum depth reached] ] [protected] _detectorCache => [ [maximum depth reached] ] [protected] stream => object(Zend\Diactoros\PhpInputStream) {} [protected] uri => object(Zend\Diactoros\Uri) {} [protected] session => object(Cake\Http\Session) {} [protected] attributes => [[maximum depth reached]] [protected] emulatedAttributes => [ [maximum depth reached] ] [protected] uploadedFiles => [[maximum depth reached]] [protected] protocol => null [protected] requestTarget => null [private] deprecatedProperties => [ [maximum depth reached] ] }, 'type' => '->', 'args' => [ (int) 0 => 'catslug' ] ]deprecationWarning - CORE/src/Core/functions.php, line 311 Cake\Http\ServerRequest::offsetGet() - CORE/src/Http/ServerRequest.php, line 2421 App\Controller\ArtileDetailController::printArticle() - APP/Controller/ArtileDetailController.php, line 73 Cake\Controller\Controller::invokeAction() - CORE/src/Controller/Controller.php, line 610 Cake\Http\ActionDispatcher::_invoke() - CORE/src/Http/ActionDispatcher.php, line 120 Cake\Http\ActionDispatcher::dispatch() - CORE/src/Http/ActionDispatcher.php, line 94 Cake\Http\BaseApplication::__invoke() - CORE/src/Http/BaseApplication.php, line 235 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Routing\Middleware\RoutingMiddleware::__invoke() - CORE/src/Routing/Middleware/RoutingMiddleware.php, line 162 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Routing\Middleware\AssetMiddleware::__invoke() - CORE/src/Routing/Middleware/AssetMiddleware.php, line 88 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Error\Middleware\ErrorHandlerMiddleware::__invoke() - CORE/src/Error/Middleware/ErrorHandlerMiddleware.php, line 96 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Http\Runner::run() - CORE/src/Http/Runner.php, line 51 Cake\Http\Server::run() - CORE/src/Http/Server.php, line 98
Deprecated (16384): The ArrayAccess methods will be removed in 4.0.0.Use getParam(), getData() and getQuery() instead. - /home/brlfuser/public_html/src/Controller/ArtileDetailController.php, line: 74 You can disable deprecation warnings by setting `Error.errorLevel` to `E_ALL & ~E_USER_DEPRECATED` in your config/app.php. [CORE/src/Core/functions.php, line 311]Code Context
trigger_error($message, E_USER_DEPRECATED);
}
$message = 'The ArrayAccess methods will be removed in 4.0.0.Use getParam(), getData() and getQuery() instead. - /home/brlfuser/public_html/src/Controller/ArtileDetailController.php, line: 74 You can disable deprecation warnings by setting `Error.errorLevel` to `E_ALL & ~E_USER_DEPRECATED` in your config/app.php.' $stackFrame = (int) 1 $trace = [ (int) 0 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/ServerRequest.php', 'line' => (int) 2421, 'function' => 'deprecationWarning', 'args' => [ (int) 0 => 'The ArrayAccess methods will be removed in 4.0.0.Use getParam(), getData() and getQuery() instead.' ] ], (int) 1 => [ 'file' => '/home/brlfuser/public_html/src/Controller/ArtileDetailController.php', 'line' => (int) 74, 'function' => 'offsetGet', 'class' => 'Cake\Http\ServerRequest', 'object' => object(Cake\Http\ServerRequest) {}, 'type' => '->', 'args' => [ (int) 0 => 'artileslug' ] ], (int) 2 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Controller/Controller.php', 'line' => (int) 610, 'function' => 'printArticle', 'class' => 'App\Controller\ArtileDetailController', 'object' => object(App\Controller\ArtileDetailController) {}, 'type' => '->', 'args' => [] ], (int) 3 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/ActionDispatcher.php', 'line' => (int) 120, 'function' => 'invokeAction', 'class' => 'Cake\Controller\Controller', 'object' => object(App\Controller\ArtileDetailController) {}, 'type' => '->', 'args' => [] ], (int) 4 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/ActionDispatcher.php', 'line' => (int) 94, 'function' => '_invoke', 'class' => 'Cake\Http\ActionDispatcher', 'object' => object(Cake\Http\ActionDispatcher) {}, 'type' => '->', 'args' => [ (int) 0 => object(App\Controller\ArtileDetailController) {} ] ], (int) 5 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/BaseApplication.php', 'line' => (int) 235, 'function' => 'dispatch', 'class' => 'Cake\Http\ActionDispatcher', 'object' => object(Cake\Http\ActionDispatcher) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {} ] ], (int) 6 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/Runner.php', 'line' => (int) 65, 'function' => '__invoke', 'class' => 'Cake\Http\BaseApplication', 'object' => object(App\Application) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {}, (int) 2 => object(Cake\Http\Runner) {} ] ], (int) 7 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Routing/Middleware/RoutingMiddleware.php', 'line' => (int) 162, 'function' => '__invoke', 'class' => 'Cake\Http\Runner', 'object' => object(Cake\Http\Runner) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {} ] ], (int) 8 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/Runner.php', 'line' => (int) 65, 'function' => '__invoke', 'class' => 'Cake\Routing\Middleware\RoutingMiddleware', 'object' => object(Cake\Routing\Middleware\RoutingMiddleware) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {}, (int) 2 => object(Cake\Http\Runner) {} ] ], (int) 9 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Routing/Middleware/AssetMiddleware.php', 'line' => (int) 88, 'function' => '__invoke', 'class' => 'Cake\Http\Runner', 'object' => object(Cake\Http\Runner) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {} ] ], (int) 10 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/Runner.php', 'line' => (int) 65, 'function' => '__invoke', 'class' => 'Cake\Routing\Middleware\AssetMiddleware', 'object' => object(Cake\Routing\Middleware\AssetMiddleware) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {}, (int) 2 => object(Cake\Http\Runner) {} ] ], (int) 11 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Error/Middleware/ErrorHandlerMiddleware.php', 'line' => (int) 96, 'function' => '__invoke', 'class' => 'Cake\Http\Runner', 'object' => object(Cake\Http\Runner) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {} ] ], (int) 12 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/Runner.php', 'line' => (int) 65, 'function' => '__invoke', 'class' => 'Cake\Error\Middleware\ErrorHandlerMiddleware', 'object' => object(Cake\Error\Middleware\ErrorHandlerMiddleware) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {}, (int) 2 => object(Cake\Http\Runner) {} ] ], (int) 13 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/Runner.php', 'line' => (int) 51, 'function' => '__invoke', 'class' => 'Cake\Http\Runner', 'object' => object(Cake\Http\Runner) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {} ] ], (int) 14 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/Server.php', 'line' => (int) 98, 'function' => 'run', 'class' => 'Cake\Http\Runner', 'object' => object(Cake\Http\Runner) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\MiddlewareQueue) {}, (int) 1 => object(Cake\Http\ServerRequest) {}, (int) 2 => object(Cake\Http\Response) {} ] ], (int) 15 => [ 'file' => '/home/brlfuser/public_html/webroot/index.php', 'line' => (int) 39, 'function' => 'run', 'class' => 'Cake\Http\Server', 'object' => object(Cake\Http\Server) {}, 'type' => '->', 'args' => [] ] ] $frame = [ 'file' => '/home/brlfuser/public_html/src/Controller/ArtileDetailController.php', 'line' => (int) 74, 'function' => 'offsetGet', 'class' => 'Cake\Http\ServerRequest', 'object' => object(Cake\Http\ServerRequest) { trustProxy => false [protected] params => [ [maximum depth reached] ] [protected] data => [[maximum depth reached]] [protected] query => [[maximum depth reached]] [protected] cookies => [ [maximum depth reached] ] [protected] _environment => [ [maximum depth reached] ] [protected] url => 'latest-news-updates/the-basis-of-privacy-apar-gupta-4678980/print' [protected] base => '' [protected] webroot => '/' [protected] here => '/latest-news-updates/the-basis-of-privacy-apar-gupta-4678980/print' [protected] trustedProxies => [[maximum depth reached]] [protected] _input => null [protected] _detectors => [ [maximum depth reached] ] [protected] _detectorCache => [ [maximum depth reached] ] [protected] stream => object(Zend\Diactoros\PhpInputStream) {} [protected] uri => object(Zend\Diactoros\Uri) {} [protected] session => object(Cake\Http\Session) {} [protected] attributes => [[maximum depth reached]] [protected] emulatedAttributes => [ [maximum depth reached] ] [protected] uploadedFiles => [[maximum depth reached]] [protected] protocol => null [protected] requestTarget => null [private] deprecatedProperties => [ [maximum depth reached] ] }, 'type' => '->', 'args' => [ (int) 0 => 'artileslug' ] ]deprecationWarning - CORE/src/Core/functions.php, line 311 Cake\Http\ServerRequest::offsetGet() - CORE/src/Http/ServerRequest.php, line 2421 App\Controller\ArtileDetailController::printArticle() - APP/Controller/ArtileDetailController.php, line 74 Cake\Controller\Controller::invokeAction() - CORE/src/Controller/Controller.php, line 610 Cake\Http\ActionDispatcher::_invoke() - CORE/src/Http/ActionDispatcher.php, line 120 Cake\Http\ActionDispatcher::dispatch() - CORE/src/Http/ActionDispatcher.php, line 94 Cake\Http\BaseApplication::__invoke() - CORE/src/Http/BaseApplication.php, line 235 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Routing\Middleware\RoutingMiddleware::__invoke() - CORE/src/Routing/Middleware/RoutingMiddleware.php, line 162 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Routing\Middleware\AssetMiddleware::__invoke() - CORE/src/Routing/Middleware/AssetMiddleware.php, line 88 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Error\Middleware\ErrorHandlerMiddleware::__invoke() - CORE/src/Error/Middleware/ErrorHandlerMiddleware.php, line 96 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Http\Runner::run() - CORE/src/Http/Runner.php, line 51 Cake\Http\Server::run() - CORE/src/Http/Server.php, line 98
Warning (512): Unable to emit headers. Headers sent in file=/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Error/Debugger.php line=853 [CORE/src/Http/ResponseEmitter.php, line 48]Code Contextif (Configure::read('debug')) {
trigger_error($message, E_USER_WARNING);
} else {
$response = object(Cake\Http\Response) { 'status' => (int) 200, 'contentType' => 'text/html', 'headers' => [ 'Content-Type' => [ [maximum depth reached] ] ], 'file' => null, 'fileRange' => [], 'cookies' => object(Cake\Http\Cookie\CookieCollection) {}, 'cacheDirectives' => [], 'body' => '<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <link rel="canonical" href="https://im4change.in/<pre class="cake-error"><a href="javascript:void(0);" onclick="document.getElementById('cakeErr67f1002354cf1-trace').style.display = (document.getElementById('cakeErr67f1002354cf1-trace').style.display == 'none' ? '' : 'none');"><b>Notice</b> (8)</a>: Undefined variable: urlPrefix [<b>APP/Template/Layout/printlayout.ctp</b>, line <b>8</b>]<div id="cakeErr67f1002354cf1-trace" class="cake-stack-trace" style="display: none;"><a href="javascript:void(0);" onclick="document.getElementById('cakeErr67f1002354cf1-code').style.display = (document.getElementById('cakeErr67f1002354cf1-code').style.display == 'none' ? '' : 'none')">Code</a> <a href="javascript:void(0);" onclick="document.getElementById('cakeErr67f1002354cf1-context').style.display = (document.getElementById('cakeErr67f1002354cf1-context').style.display == 'none' ? '' : 'none')">Context</a><pre id="cakeErr67f1002354cf1-code" class="cake-code-dump" style="display: none;"><code><span style="color: #000000"><span style="color: #0000BB"></span><span style="color: #007700"><</span><span style="color: #0000BB">head</span><span style="color: #007700">> </span></span></code> <span class="code-highlight"><code><span style="color: #000000"> <link rel="canonical" href="<span style="color: #0000BB"><?php </span><span style="color: #007700">echo </span><span style="color: #0000BB">Configure</span><span style="color: #007700">::</span><span style="color: #0000BB">read</span><span style="color: #007700">(</span><span style="color: #DD0000">'SITE_URL'</span><span style="color: #007700">); </span><span style="color: #0000BB">?><?php </span><span style="color: #007700">echo </span><span style="color: #0000BB">$urlPrefix</span><span style="color: #007700">;</span><span style="color: #0000BB">?><?php </span><span style="color: #007700">echo </span><span style="color: #0000BB">$article_current</span><span style="color: #007700">-></span><span style="color: #0000BB">category</span><span style="color: #007700">-></span><span style="color: #0000BB">slug</span><span style="color: #007700">; </span><span style="color: #0000BB">?></span>/<span style="color: #0000BB"><?php </span><span style="color: #007700">echo </span><span style="color: #0000BB">$article_current</span><span style="color: #007700">-></span><span style="color: #0000BB">seo_url</span><span style="color: #007700">; </span><span style="color: #0000BB">?></span>.html"/> </span></code></span> <code><span style="color: #000000"><span style="color: #0000BB"> </span><span style="color: #007700"><</span><span style="color: #0000BB">meta http</span><span style="color: #007700">-</span><span style="color: #0000BB">equiv</span><span style="color: #007700">=</span><span style="color: #DD0000">"Content-Type" </span><span style="color: #0000BB">content</span><span style="color: #007700">=</span><span style="color: #DD0000">"text/html; charset=utf-8"</span><span style="color: #007700">/> </span></span></code></pre><pre id="cakeErr67f1002354cf1-context" class="cake-context" style="display: none;">$viewFile = '/home/brlfuser/public_html/src/Template/Layout/printlayout.ctp' $dataForView = [ 'article_current' => object(App\Model\Entity\Article) { 'id' => (int) 30913, 'title' => 'The Basis Of Privacy -Apar Gupta', 'subheading' => '', 'description' => '<div align="justify"> -The Indian Express<br /> <br /> <em>Aadhaar legislation points to the need for a comprehensive privacy law.<br /> </em><br /> Most of the debate on the Aadhaar bill has centred on the right to privacy. All five amendments suggested by the Rajya Sabha, subsequently rejected by the Lok Sabha, had an element of this right within them. But the core deficiency rested not in the lack of protections in the Aadhaar bill but in the absence of a comprehensive privacy statute to develop and enforce them.<br /> <br /> We must look at both substantive protections and the procedure available to enforce them. Many people regard privacy as an amorphous concept, which is also why it is hard for them to visualise any harm to it. Recognising this problem, in 2012, the Justice A.P. Shah Committee suggested nine distinct principles canonising the right to privacy. An analysis of the Aadhaar bill shows that it does not even recognise some of these nine principles. For instance, take the principle of access; a person cannot in any instance demand access to their core biometric information under the Aadhaar bill.<br /> <br /> But greater difficulty exists in enforcing the laconic safeguards of the bill. Broadly, the three forms of judicial remedy usually enforced are civil, criminal and the writ jurisdiction of high courts and the Supreme Court. The Aadhaar bill makes all these three remedies ineffective for individuals.<br /> <br /> The civil remedies under the bill oust the jurisdiction of civil courts in favour of the system set up for penalties under the Information Technology Act. The existing penalties under the IT Act are deficient, as they were never intended to provide comprehensive privacy legislation. Even if they are amended, enforcement under the IT Act has never worked properly and shows no promise of improvement. Under it, the jurisdiction of civil courts is barred in favour of &ldquo;adjudicating officers&rdquo;. These officers are usually a serving IT secretary of the state government given additional charge to adjudicate cases under the IT Act. Though persons of high competence, a lack of resources and training handicaps not only their capacity but also the quality of judicial orders necessary to withstand review. Such scrutiny would naturally arise in appeal as provided under the IT Act &mdash; but, for the last three years, the Cyber Appellate Tribunal that hears such appeals has not been properly constituted and is not functioning.<br /> <br /> The problems with enforcement of criminal remedies are more straightforward: Only the UIDAI can make complaints for the offences contained under the Aadhaar bill. Not only is this a conflict of interest but it also takes away the Aadhaar user&rsquo;s recourse to a criminal remedy. It may be argued that penal provisions under the IT Act and the IPC can be invoked by individuals. But such an assertion must consider the absence of any notification mechanism. The Aadhaar user is never informed when a crime relating to their data occurs. They will never have the particulars necessary to register a criminal complaint.<br /> <br /> This brings us to the final remedy of writs that can be availed of to enforce the fundamental and statutory rights available to a person. It would normally be expected that a person would be able to approach an HC for the enforcement of rights under the Aadhaar bill. Especially if the UIDAI does not provide authentication as it is intended to do, or fails to correct the data records. Most people know the poor quality of data entry in government IDs. Aadhaar requires a safeguard clearly conferring a right than can be enforced through a writ. However, these rights are problematically phrased as &ldquo;requests&rdquo; for supplying and correcting information. This dilution is made clear by the absence of the requirement of a hearing, a reasoned order or an appellate process under the bill.<br /> <br /> It is not without reason that the Justice Shah report suggested a comprehensive legislation to safeguard privacy and also the office of a central privacy commissioner to develop and apply it. Even when suggesting the establishment of a privacy commissioner, who could impose penalties for violations, it recognised the central role of existing judicial forums by retaining the jurisdiction of civil courts. While many may see privacy as the core issue in the Aadhaar programme, privacy itself transcends it. As our everyday lives become connected, a comprehensive privacy legislation is an essential safeguard. </div>', 'credit_writer' => 'The Indian Express, 29 March, 2016, http://indianexpress.com/article/opinion/columns/aadhaar-bill-the-basis-of-privacy/', 'article_img' => '', 'article_img_thumb' => '', 'status' => (int) 1, 'show_on_home' => (int) 1, 'lang' => 'EN', 'category_id' => (int) 16, 'tag_keyword' => '', 'seo_url' => 'the-basis-of-privacy-apar-gupta-4678980', 'meta_title' => null, 'meta_keywords' => null, 'meta_description' => null, 'noindex' => (int) 0, 'publish_date' => object(Cake\I18n\FrozenDate) {}, 'most_visit_section_id' => null, 'article_big_img' => null, 'liveid' => (int) 4678980, 'created' => object(Cake\I18n\FrozenTime) {}, 'modified' => object(Cake\I18n\FrozenTime) {}, 'edate' => '', 'tags' => [ [maximum depth reached] ], 'category' => object(App\Model\Entity\Category) {}, '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[hasErrors]' => false, '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'Articles' }, 'articleid' => (int) 30913, 'metaTitle' => 'LATEST NEWS UPDATES | The Basis Of Privacy -Apar Gupta', 'metaKeywords' => 'Privacy,Privacy Rights,aadhaar,Aadhaar (Targeted Delivery of Financial and Other Subsidies Benefits and Services) Bill (2016),UIDAI,uid', 'metaDesc' => ' -The Indian Express Aadhaar legislation points to the need for a comprehensive privacy law. Most of the debate on the Aadhaar bill has centred on the right to privacy. All five amendments suggested by the Rajya Sabha, subsequently rejected by the Lok...', 'disp' => '<div align="justify">-The Indian Express<br /><br /><em>Aadhaar legislation points to the need for a comprehensive privacy law.<br /></em><br />Most of the debate on the Aadhaar bill has centred on the right to privacy. All five amendments suggested by the Rajya Sabha, subsequently rejected by the Lok Sabha, had an element of this right within them. But the core deficiency rested not in the lack of protections in the Aadhaar bill but in the absence of a comprehensive privacy statute to develop and enforce them.<br /><br />We must look at both substantive protections and the procedure available to enforce them. Many people regard privacy as an amorphous concept, which is also why it is hard for them to visualise any harm to it. Recognising this problem, in 2012, the Justice A.P. Shah Committee suggested nine distinct principles canonising the right to privacy. An analysis of the Aadhaar bill shows that it does not even recognise some of these nine principles. For instance, take the principle of access; a person cannot in any instance demand access to their core biometric information under the Aadhaar bill.<br /><br />But greater difficulty exists in enforcing the laconic safeguards of the bill. Broadly, the three forms of judicial remedy usually enforced are civil, criminal and the writ jurisdiction of high courts and the Supreme Court. The Aadhaar bill makes all these three remedies ineffective for individuals.<br /><br />The civil remedies under the bill oust the jurisdiction of civil courts in favour of the system set up for penalties under the Information Technology Act. The existing penalties under the IT Act are deficient, as they were never intended to provide comprehensive privacy legislation. Even if they are amended, enforcement under the IT Act has never worked properly and shows no promise of improvement. Under it, the jurisdiction of civil courts is barred in favour of &ldquo;adjudicating officers&rdquo;. These officers are usually a serving IT secretary of the state government given additional charge to adjudicate cases under the IT Act. Though persons of high competence, a lack of resources and training handicaps not only their capacity but also the quality of judicial orders necessary to withstand review. Such scrutiny would naturally arise in appeal as provided under the IT Act &mdash; but, for the last three years, the Cyber Appellate Tribunal that hears such appeals has not been properly constituted and is not functioning.<br /><br />The problems with enforcement of criminal remedies are more straightforward: Only the UIDAI can make complaints for the offences contained under the Aadhaar bill. Not only is this a conflict of interest but it also takes away the Aadhaar user&rsquo;s recourse to a criminal remedy. It may be argued that penal provisions under the IT Act and the IPC can be invoked by individuals. But such an assertion must consider the absence of any notification mechanism. The Aadhaar user is never informed when a crime relating to their data occurs. They will never have the particulars necessary to register a criminal complaint.<br /><br />This brings us to the final remedy of writs that can be availed of to enforce the fundamental and statutory rights available to a person. It would normally be expected that a person would be able to approach an HC for the enforcement of rights under the Aadhaar bill. Especially if the UIDAI does not provide authentication as it is intended to do, or fails to correct the data records. Most people know the poor quality of data entry in government IDs. Aadhaar requires a safeguard clearly conferring a right than can be enforced through a writ. However, these rights are problematically phrased as &ldquo;requests&rdquo; for supplying and correcting information. This dilution is made clear by the absence of the requirement of a hearing, a reasoned order or an appellate process under the bill.<br /><br />It is not without reason that the Justice Shah report suggested a comprehensive legislation to safeguard privacy and also the office of a central privacy commissioner to develop and apply it. Even when suggesting the establishment of a privacy commissioner, who could impose penalties for violations, it recognised the central role of existing judicial forums by retaining the jurisdiction of civil courts. While many may see privacy as the core issue in the Aadhaar programme, privacy itself transcends it. As our everyday lives become connected, a comprehensive privacy legislation is an essential safeguard.</div>', 'lang' => 'English', 'SITE_URL' => 'https://im4change.in/', 'site_title' => 'im4change', 'adminprix' => 'admin' ] $article_current = object(App\Model\Entity\Article) { 'id' => (int) 30913, 'title' => 'The Basis Of Privacy -Apar Gupta', 'subheading' => '', 'description' => '<div align="justify"> -The Indian Express<br /> <br /> <em>Aadhaar legislation points to the need for a comprehensive privacy law.<br /> </em><br /> Most of the debate on the Aadhaar bill has centred on the right to privacy. All five amendments suggested by the Rajya Sabha, subsequently rejected by the Lok Sabha, had an element of this right within them. But the core deficiency rested not in the lack of protections in the Aadhaar bill but in the absence of a comprehensive privacy statute to develop and enforce them.<br /> <br /> We must look at both substantive protections and the procedure available to enforce them. Many people regard privacy as an amorphous concept, which is also why it is hard for them to visualise any harm to it. Recognising this problem, in 2012, the Justice A.P. Shah Committee suggested nine distinct principles canonising the right to privacy. An analysis of the Aadhaar bill shows that it does not even recognise some of these nine principles. For instance, take the principle of access; a person cannot in any instance demand access to their core biometric information under the Aadhaar bill.<br /> <br /> But greater difficulty exists in enforcing the laconic safeguards of the bill. Broadly, the three forms of judicial remedy usually enforced are civil, criminal and the writ jurisdiction of high courts and the Supreme Court. The Aadhaar bill makes all these three remedies ineffective for individuals.<br /> <br /> The civil remedies under the bill oust the jurisdiction of civil courts in favour of the system set up for penalties under the Information Technology Act. The existing penalties under the IT Act are deficient, as they were never intended to provide comprehensive privacy legislation. Even if they are amended, enforcement under the IT Act has never worked properly and shows no promise of improvement. Under it, the jurisdiction of civil courts is barred in favour of &ldquo;adjudicating officers&rdquo;. These officers are usually a serving IT secretary of the state government given additional charge to adjudicate cases under the IT Act. Though persons of high competence, a lack of resources and training handicaps not only their capacity but also the quality of judicial orders necessary to withstand review. Such scrutiny would naturally arise in appeal as provided under the IT Act &mdash; but, for the last three years, the Cyber Appellate Tribunal that hears such appeals has not been properly constituted and is not functioning.<br /> <br /> The problems with enforcement of criminal remedies are more straightforward: Only the UIDAI can make complaints for the offences contained under the Aadhaar bill. Not only is this a conflict of interest but it also takes away the Aadhaar user&rsquo;s recourse to a criminal remedy. It may be argued that penal provisions under the IT Act and the IPC can be invoked by individuals. But such an assertion must consider the absence of any notification mechanism. The Aadhaar user is never informed when a crime relating to their data occurs. They will never have the particulars necessary to register a criminal complaint.<br /> <br /> This brings us to the final remedy of writs that can be availed of to enforce the fundamental and statutory rights available to a person. It would normally be expected that a person would be able to approach an HC for the enforcement of rights under the Aadhaar bill. Especially if the UIDAI does not provide authentication as it is intended to do, or fails to correct the data records. Most people know the poor quality of data entry in government IDs. Aadhaar requires a safeguard clearly conferring a right than can be enforced through a writ. However, these rights are problematically phrased as &ldquo;requests&rdquo; for supplying and correcting information. This dilution is made clear by the absence of the requirement of a hearing, a reasoned order or an appellate process under the bill.<br /> <br /> It is not without reason that the Justice Shah report suggested a comprehensive legislation to safeguard privacy and also the office of a central privacy commissioner to develop and apply it. Even when suggesting the establishment of a privacy commissioner, who could impose penalties for violations, it recognised the central role of existing judicial forums by retaining the jurisdiction of civil courts. While many may see privacy as the core issue in the Aadhaar programme, privacy itself transcends it. As our everyday lives become connected, a comprehensive privacy legislation is an essential safeguard. </div>', 'credit_writer' => 'The Indian Express, 29 March, 2016, http://indianexpress.com/article/opinion/columns/aadhaar-bill-the-basis-of-privacy/', 'article_img' => '', 'article_img_thumb' => '', 'status' => (int) 1, 'show_on_home' => (int) 1, 'lang' => 'EN', 'category_id' => (int) 16, 'tag_keyword' => '', 'seo_url' => 'the-basis-of-privacy-apar-gupta-4678980', 'meta_title' => null, 'meta_keywords' => null, 'meta_description' => null, 'noindex' => (int) 0, 'publish_date' => object(Cake\I18n\FrozenDate) {}, 'most_visit_section_id' => null, 'article_big_img' => null, 'liveid' => (int) 4678980, 'created' => object(Cake\I18n\FrozenTime) {}, 'modified' => object(Cake\I18n\FrozenTime) {}, 'edate' => '', 'tags' => [ (int) 0 => object(Cake\ORM\Entity) {}, (int) 1 => object(Cake\ORM\Entity) {}, (int) 2 => object(Cake\ORM\Entity) {}, (int) 3 => object(Cake\ORM\Entity) {}, (int) 4 => object(Cake\ORM\Entity) {}, (int) 5 => object(Cake\ORM\Entity) {} ], 'category' => object(App\Model\Entity\Category) {}, '[new]' => false, '[accessible]' => [ '*' => true, 'id' => false ], '[dirty]' => [], '[original]' => [], '[virtual]' => [], '[hasErrors]' => false, '[errors]' => [], '[invalid]' => [], '[repository]' => 'Articles' } $articleid = (int) 30913 $metaTitle = 'LATEST NEWS UPDATES | The Basis Of Privacy -Apar Gupta' $metaKeywords = 'Privacy,Privacy Rights,aadhaar,Aadhaar (Targeted Delivery of Financial and Other Subsidies Benefits and Services) Bill (2016),UIDAI,uid' $metaDesc = ' -The Indian Express Aadhaar legislation points to the need for a comprehensive privacy law. Most of the debate on the Aadhaar bill has centred on the right to privacy. All five amendments suggested by the Rajya Sabha, subsequently rejected by the Lok...' $disp = '<div align="justify">-The Indian Express<br /><br /><em>Aadhaar legislation points to the need for a comprehensive privacy law.<br /></em><br />Most of the debate on the Aadhaar bill has centred on the right to privacy. All five amendments suggested by the Rajya Sabha, subsequently rejected by the Lok Sabha, had an element of this right within them. But the core deficiency rested not in the lack of protections in the Aadhaar bill but in the absence of a comprehensive privacy statute to develop and enforce them.<br /><br />We must look at both substantive protections and the procedure available to enforce them. Many people regard privacy as an amorphous concept, which is also why it is hard for them to visualise any harm to it. Recognising this problem, in 2012, the Justice A.P. Shah Committee suggested nine distinct principles canonising the right to privacy. An analysis of the Aadhaar bill shows that it does not even recognise some of these nine principles. For instance, take the principle of access; a person cannot in any instance demand access to their core biometric information under the Aadhaar bill.<br /><br />But greater difficulty exists in enforcing the laconic safeguards of the bill. Broadly, the three forms of judicial remedy usually enforced are civil, criminal and the writ jurisdiction of high courts and the Supreme Court. The Aadhaar bill makes all these three remedies ineffective for individuals.<br /><br />The civil remedies under the bill oust the jurisdiction of civil courts in favour of the system set up for penalties under the Information Technology Act. The existing penalties under the IT Act are deficient, as they were never intended to provide comprehensive privacy legislation. Even if they are amended, enforcement under the IT Act has never worked properly and shows no promise of improvement. Under it, the jurisdiction of civil courts is barred in favour of &ldquo;adjudicating officers&rdquo;. These officers are usually a serving IT secretary of the state government given additional charge to adjudicate cases under the IT Act. Though persons of high competence, a lack of resources and training handicaps not only their capacity but also the quality of judicial orders necessary to withstand review. Such scrutiny would naturally arise in appeal as provided under the IT Act &mdash; but, for the last three years, the Cyber Appellate Tribunal that hears such appeals has not been properly constituted and is not functioning.<br /><br />The problems with enforcement of criminal remedies are more straightforward: Only the UIDAI can make complaints for the offences contained under the Aadhaar bill. Not only is this a conflict of interest but it also takes away the Aadhaar user&rsquo;s recourse to a criminal remedy. It may be argued that penal provisions under the IT Act and the IPC can be invoked by individuals. But such an assertion must consider the absence of any notification mechanism. The Aadhaar user is never informed when a crime relating to their data occurs. They will never have the particulars necessary to register a criminal complaint.<br /><br />This brings us to the final remedy of writs that can be availed of to enforce the fundamental and statutory rights available to a person. It would normally be expected that a person would be able to approach an HC for the enforcement of rights under the Aadhaar bill. Especially if the UIDAI does not provide authentication as it is intended to do, or fails to correct the data records. Most people know the poor quality of data entry in government IDs. Aadhaar requires a safeguard clearly conferring a right than can be enforced through a writ. However, these rights are problematically phrased as &ldquo;requests&rdquo; for supplying and correcting information. This dilution is made clear by the absence of the requirement of a hearing, a reasoned order or an appellate process under the bill.<br /><br />It is not without reason that the Justice Shah report suggested a comprehensive legislation to safeguard privacy and also the office of a central privacy commissioner to develop and apply it. Even when suggesting the establishment of a privacy commissioner, who could impose penalties for violations, it recognised the central role of existing judicial forums by retaining the jurisdiction of civil courts. While many may see privacy as the core issue in the Aadhaar programme, privacy itself transcends it. As our everyday lives become connected, a comprehensive privacy legislation is an essential safeguard.</div>' $lang = 'English' $SITE_URL = 'https://im4change.in/' $site_title = 'im4change' $adminprix = 'admin'</pre><pre class="stack-trace">include - APP/Template/Layout/printlayout.ctp, line 8 Cake\View\View::_evaluate() - CORE/src/View/View.php, line 1413 Cake\View\View::_render() - CORE/src/View/View.php, line 1374 Cake\View\View::renderLayout() - CORE/src/View/View.php, line 927 Cake\View\View::render() - CORE/src/View/View.php, line 885 Cake\Controller\Controller::render() - CORE/src/Controller/Controller.php, line 791 Cake\Http\ActionDispatcher::_invoke() - CORE/src/Http/ActionDispatcher.php, line 126 Cake\Http\ActionDispatcher::dispatch() - CORE/src/Http/ActionDispatcher.php, line 94 Cake\Http\BaseApplication::__invoke() - CORE/src/Http/BaseApplication.php, line 235 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Routing\Middleware\RoutingMiddleware::__invoke() - CORE/src/Routing/Middleware/RoutingMiddleware.php, line 162 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Routing\Middleware\AssetMiddleware::__invoke() - CORE/src/Routing/Middleware/AssetMiddleware.php, line 88 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Error\Middleware\ErrorHandlerMiddleware::__invoke() - CORE/src/Error/Middleware/ErrorHandlerMiddleware.php, line 96 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Http\Runner::run() - CORE/src/Http/Runner.php, line 51</pre></div></pre>latest-news-updates/the-basis-of-privacy-apar-gupta-4678980.html"/> <meta http-equiv="Content-Type" content="text/html; charset=utf-8"/> <link href="https://im4change.in/css/control.css" rel="stylesheet" type="text/css" media="all"/> <title>LATEST NEWS UPDATES | The Basis Of Privacy -Apar Gupta | Im4change.org</title> <meta name="description" content=" -The Indian Express Aadhaar legislation points to the need for a comprehensive privacy law. Most of the debate on the Aadhaar bill has centred on the right to privacy. All five amendments suggested by the Rajya Sabha, subsequently rejected by the Lok..."/> <script src="https://im4change.in/js/jquery-1.10.2.js"></script> <script type="text/javascript" src="https://im4change.in/js/jquery-migrate.min.js"></script> <script language="javascript" type="text/javascript"> $(document).ready(function () { var img = $("img")[0]; // Get my img elem var pic_real_width, pic_real_height; $("<img/>") // Make in memory copy of image to avoid css issues .attr("src", $(img).attr("src")) .load(function () { pic_real_width = this.width; // Note: $(this).width() will not pic_real_height = this.height; // work for in memory images. }); }); </script> <style type="text/css"> @media screen { div.divFooter { display: block; } } @media print { .printbutton { display: none !important; } } </style> </head> <body> <table cellpadding="0" cellspacing="0" border="0" width="98%" align="center"> <tr> <td class="top_bg"> <div class="divFooter"> <img src="https://im4change.in/images/logo1.jpg" height="59" border="0" alt="Resource centre on India's rural distress" style="padding-top:14px;"/> </div> </td> </tr> <tr> <td id="topspace"> </td> </tr> <tr id="topspace"> <td> </td> </tr> <tr> <td height="50" style="border-bottom:1px solid #000; padding-top:10px;" class="printbutton"> <form><input type="button" value=" Print this page " onclick="window.print();return false;"/></form> </td> </tr> <tr> <td width="100%"> <h1 class="news_headlines" style="font-style:normal"> <strong>The Basis Of Privacy -Apar Gupta</strong></h1> </td> </tr> <tr> <td width="100%" style="font-family:Arial, 'Segoe Script', 'Segoe UI', sans-serif, serif"><font size="3"> <div align="justify">-The Indian Express<br /><br /><em>Aadhaar legislation points to the need for a comprehensive privacy law.<br /></em><br />Most of the debate on the Aadhaar bill has centred on the right to privacy. All five amendments suggested by the Rajya Sabha, subsequently rejected by the Lok Sabha, had an element of this right within them. But the core deficiency rested not in the lack of protections in the Aadhaar bill but in the absence of a comprehensive privacy statute to develop and enforce them.<br /><br />We must look at both substantive protections and the procedure available to enforce them. Many people regard privacy as an amorphous concept, which is also why it is hard for them to visualise any harm to it. Recognising this problem, in 2012, the Justice A.P. Shah Committee suggested nine distinct principles canonising the right to privacy. An analysis of the Aadhaar bill shows that it does not even recognise some of these nine principles. For instance, take the principle of access; a person cannot in any instance demand access to their core biometric information under the Aadhaar bill.<br /><br />But greater difficulty exists in enforcing the laconic safeguards of the bill. Broadly, the three forms of judicial remedy usually enforced are civil, criminal and the writ jurisdiction of high courts and the Supreme Court. The Aadhaar bill makes all these three remedies ineffective for individuals.<br /><br />The civil remedies under the bill oust the jurisdiction of civil courts in favour of the system set up for penalties under the Information Technology Act. The existing penalties under the IT Act are deficient, as they were never intended to provide comprehensive privacy legislation. Even if they are amended, enforcement under the IT Act has never worked properly and shows no promise of improvement. Under it, the jurisdiction of civil courts is barred in favour of “adjudicating officers”. These officers are usually a serving IT secretary of the state government given additional charge to adjudicate cases under the IT Act. Though persons of high competence, a lack of resources and training handicaps not only their capacity but also the quality of judicial orders necessary to withstand review. Such scrutiny would naturally arise in appeal as provided under the IT Act — but, for the last three years, the Cyber Appellate Tribunal that hears such appeals has not been properly constituted and is not functioning.<br /><br />The problems with enforcement of criminal remedies are more straightforward: Only the UIDAI can make complaints for the offences contained under the Aadhaar bill. Not only is this a conflict of interest but it also takes away the Aadhaar user’s recourse to a criminal remedy. It may be argued that penal provisions under the IT Act and the IPC can be invoked by individuals. But such an assertion must consider the absence of any notification mechanism. The Aadhaar user is never informed when a crime relating to their data occurs. They will never have the particulars necessary to register a criminal complaint.<br /><br />This brings us to the final remedy of writs that can be availed of to enforce the fundamental and statutory rights available to a person. It would normally be expected that a person would be able to approach an HC for the enforcement of rights under the Aadhaar bill. Especially if the UIDAI does not provide authentication as it is intended to do, or fails to correct the data records. Most people know the poor quality of data entry in government IDs. Aadhaar requires a safeguard clearly conferring a right than can be enforced through a writ. However, these rights are problematically phrased as “requests” for supplying and correcting information. This dilution is made clear by the absence of the requirement of a hearing, a reasoned order or an appellate process under the bill.<br /><br />It is not without reason that the Justice Shah report suggested a comprehensive legislation to safeguard privacy and also the office of a central privacy commissioner to develop and apply it. Even when suggesting the establishment of a privacy commissioner, who could impose penalties for violations, it recognised the central role of existing judicial forums by retaining the jurisdiction of civil courts. While many may see privacy as the core issue in the Aadhaar programme, privacy itself transcends it. As our everyday lives become connected, a comprehensive privacy legislation is an essential safeguard.</div> </font> </td> </tr> <tr> <td> </td> </tr> <tr> <td height="50" style="border-top:1px solid #000; border-bottom:1px solid #000;padding-top:10px;"> <form><input type="button" value=" Print this page " onclick="window.print();return false;"/></form> </td> </tr> </table></body> </html>' } $maxBufferLength = (int) 8192 $file = '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Error/Debugger.php' $line = (int) 853 $message = 'Unable to emit headers. Headers sent in file=/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Error/Debugger.php line=853'Cake\Http\ResponseEmitter::emit() - CORE/src/Http/ResponseEmitter.php, line 48 Cake\Http\Server::emit() - CORE/src/Http/Server.php, line 141 [main] - ROOT/webroot/index.php, line 39
Warning (2): Cannot modify header information - headers already sent by (output started at /home/brlfuser/public_html/vendor/cakephp/cakephp/src/Error/Debugger.php:853) [CORE/src/Http/ResponseEmitter.php, line 148]Code Context$response->getStatusCode(),
($reasonPhrase ? ' ' . $reasonPhrase : '')
));
$response = object(Cake\Http\Response) { 'status' => (int) 200, 'contentType' => 'text/html', 'headers' => [ 'Content-Type' => [ [maximum depth reached] ] ], 'file' => null, 'fileRange' => [], 'cookies' => object(Cake\Http\Cookie\CookieCollection) {}, 'cacheDirectives' => [], 'body' => '<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <link rel="canonical" href="https://im4change.in/<pre class="cake-error"><a href="javascript:void(0);" onclick="document.getElementById('cakeErr67f1002354cf1-trace').style.display = (document.getElementById('cakeErr67f1002354cf1-trace').style.display == 'none' ? '' : 'none');"><b>Notice</b> (8)</a>: Undefined variable: urlPrefix [<b>APP/Template/Layout/printlayout.ctp</b>, line <b>8</b>]<div id="cakeErr67f1002354cf1-trace" class="cake-stack-trace" style="display: none;"><a href="javascript:void(0);" onclick="document.getElementById('cakeErr67f1002354cf1-code').style.display = (document.getElementById('cakeErr67f1002354cf1-code').style.display == 'none' ? '' : 'none')">Code</a> <a href="javascript:void(0);" onclick="document.getElementById('cakeErr67f1002354cf1-context').style.display = (document.getElementById('cakeErr67f1002354cf1-context').style.display == 'none' ? '' : 'none')">Context</a><pre id="cakeErr67f1002354cf1-code" class="cake-code-dump" style="display: none;"><code><span style="color: #000000"><span style="color: #0000BB"></span><span style="color: #007700"><</span><span style="color: #0000BB">head</span><span style="color: #007700">> </span></span></code> <span class="code-highlight"><code><span style="color: #000000"> <link rel="canonical" href="<span style="color: #0000BB"><?php </span><span style="color: #007700">echo </span><span style="color: #0000BB">Configure</span><span style="color: #007700">::</span><span style="color: #0000BB">read</span><span style="color: #007700">(</span><span style="color: #DD0000">'SITE_URL'</span><span style="color: #007700">); </span><span style="color: #0000BB">?><?php </span><span style="color: #007700">echo </span><span style="color: #0000BB">$urlPrefix</span><span style="color: #007700">;</span><span style="color: #0000BB">?><?php </span><span style="color: #007700">echo </span><span style="color: #0000BB">$article_current</span><span style="color: #007700">-></span><span style="color: #0000BB">category</span><span style="color: #007700">-></span><span style="color: #0000BB">slug</span><span style="color: #007700">; </span><span style="color: #0000BB">?></span>/<span style="color: #0000BB"><?php </span><span style="color: #007700">echo </span><span style="color: #0000BB">$article_current</span><span style="color: #007700">-></span><span style="color: #0000BB">seo_url</span><span style="color: #007700">; </span><span style="color: #0000BB">?></span>.html"/> </span></code></span> <code><span style="color: #000000"><span style="color: #0000BB"> </span><span style="color: #007700"><</span><span style="color: #0000BB">meta http</span><span style="color: #007700">-</span><span style="color: #0000BB">equiv</span><span style="color: #007700">=</span><span style="color: #DD0000">"Content-Type" </span><span style="color: #0000BB">content</span><span style="color: #007700">=</span><span style="color: #DD0000">"text/html; charset=utf-8"</span><span style="color: #007700">/> </span></span></code></pre><pre id="cakeErr67f1002354cf1-context" class="cake-context" style="display: none;">$viewFile = '/home/brlfuser/public_html/src/Template/Layout/printlayout.ctp' $dataForView = [ 'article_current' => object(App\Model\Entity\Article) { 'id' => (int) 30913, 'title' => 'The Basis Of Privacy -Apar Gupta', 'subheading' => '', 'description' => '<div align="justify"> -The Indian Express<br /> <br /> <em>Aadhaar legislation points to the need for a comprehensive privacy law.<br /> </em><br /> Most of the debate on the Aadhaar bill has centred on the right to privacy. All five amendments suggested by the Rajya Sabha, subsequently rejected by the Lok Sabha, had an element of this right within them. But the core deficiency rested not in the lack of protections in the Aadhaar bill but in the absence of a comprehensive privacy statute to develop and enforce them.<br /> <br /> We must look at both substantive protections and the procedure available to enforce them. Many people regard privacy as an amorphous concept, which is also why it is hard for them to visualise any harm to it. Recognising this problem, in 2012, the Justice A.P. Shah Committee suggested nine distinct principles canonising the right to privacy. An analysis of the Aadhaar bill shows that it does not even recognise some of these nine principles. For instance, take the principle of access; a person cannot in any instance demand access to their core biometric information under the Aadhaar bill.<br /> <br /> But greater difficulty exists in enforcing the laconic safeguards of the bill. Broadly, the three forms of judicial remedy usually enforced are civil, criminal and the writ jurisdiction of high courts and the Supreme Court. The Aadhaar bill makes all these three remedies ineffective for individuals.<br /> <br /> The civil remedies under the bill oust the jurisdiction of civil courts in favour of the system set up for penalties under the Information Technology Act. The existing penalties under the IT Act are deficient, as they were never intended to provide comprehensive privacy legislation. Even if they are amended, enforcement under the IT Act has never worked properly and shows no promise of improvement. Under it, the jurisdiction of civil courts is barred in favour of &ldquo;adjudicating officers&rdquo;. These officers are usually a serving IT secretary of the state government given additional charge to adjudicate cases under the IT Act. Though persons of high competence, a lack of resources and training handicaps not only their capacity but also the quality of judicial orders necessary to withstand review. Such scrutiny would naturally arise in appeal as provided under the IT Act &mdash; but, for the last three years, the Cyber Appellate Tribunal that hears such appeals has not been properly constituted and is not functioning.<br /> <br /> The problems with enforcement of criminal remedies are more straightforward: Only the UIDAI can make complaints for the offences contained under the Aadhaar bill. Not only is this a conflict of interest but it also takes away the Aadhaar user&rsquo;s recourse to a criminal remedy. It may be argued that penal provisions under the IT Act and the IPC can be invoked by individuals. But such an assertion must consider the absence of any notification mechanism. The Aadhaar user is never informed when a crime relating to their data occurs. They will never have the particulars necessary to register a criminal complaint.<br /> <br /> This brings us to the final remedy of writs that can be availed of to enforce the fundamental and statutory rights available to a person. It would normally be expected that a person would be able to approach an HC for the enforcement of rights under the Aadhaar bill. Especially if the UIDAI does not provide authentication as it is intended to do, or fails to correct the data records. Most people know the poor quality of data entry in government IDs. Aadhaar requires a safeguard clearly conferring a right than can be enforced through a writ. However, these rights are problematically phrased as &ldquo;requests&rdquo; for supplying and correcting information. This dilution is made clear by the absence of the requirement of a hearing, a reasoned order or an appellate process under the bill.<br /> <br /> It is not without reason that the Justice Shah report suggested a comprehensive legislation to safeguard privacy and also the office of a central privacy commissioner to develop and apply it. Even when suggesting the establishment of a privacy commissioner, who could impose penalties for violations, it recognised the central role of existing judicial forums by retaining the jurisdiction of civil courts. While many may see privacy as the core issue in the Aadhaar programme, privacy itself transcends it. As our everyday lives become connected, a comprehensive privacy legislation is an essential safeguard. </div>', 'credit_writer' => 'The Indian Express, 29 March, 2016, http://indianexpress.com/article/opinion/columns/aadhaar-bill-the-basis-of-privacy/', 'article_img' => '', 'article_img_thumb' => '', 'status' => (int) 1, 'show_on_home' => (int) 1, 'lang' => 'EN', 'category_id' => (int) 16, 'tag_keyword' => '', 'seo_url' => 'the-basis-of-privacy-apar-gupta-4678980', 'meta_title' => null, 'meta_keywords' => null, 'meta_description' => null, 'noindex' => (int) 0, 'publish_date' => object(Cake\I18n\FrozenDate) {}, 'most_visit_section_id' => null, 'article_big_img' => null, 'liveid' => (int) 4678980, 'created' => object(Cake\I18n\FrozenTime) {}, 'modified' => object(Cake\I18n\FrozenTime) {}, 'edate' => '', 'tags' => [ [maximum depth reached] ], 'category' => object(App\Model\Entity\Category) {}, '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[hasErrors]' => false, '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'Articles' }, 'articleid' => (int) 30913, 'metaTitle' => 'LATEST NEWS UPDATES | The Basis Of Privacy -Apar Gupta', 'metaKeywords' => 'Privacy,Privacy Rights,aadhaar,Aadhaar (Targeted Delivery of Financial and Other Subsidies Benefits and Services) Bill (2016),UIDAI,uid', 'metaDesc' => ' -The Indian Express Aadhaar legislation points to the need for a comprehensive privacy law. Most of the debate on the Aadhaar bill has centred on the right to privacy. All five amendments suggested by the Rajya Sabha, subsequently rejected by the Lok...', 'disp' => '<div align="justify">-The Indian Express<br /><br /><em>Aadhaar legislation points to the need for a comprehensive privacy law.<br /></em><br />Most of the debate on the Aadhaar bill has centred on the right to privacy. All five amendments suggested by the Rajya Sabha, subsequently rejected by the Lok Sabha, had an element of this right within them. But the core deficiency rested not in the lack of protections in the Aadhaar bill but in the absence of a comprehensive privacy statute to develop and enforce them.<br /><br />We must look at both substantive protections and the procedure available to enforce them. Many people regard privacy as an amorphous concept, which is also why it is hard for them to visualise any harm to it. Recognising this problem, in 2012, the Justice A.P. Shah Committee suggested nine distinct principles canonising the right to privacy. An analysis of the Aadhaar bill shows that it does not even recognise some of these nine principles. For instance, take the principle of access; a person cannot in any instance demand access to their core biometric information under the Aadhaar bill.<br /><br />But greater difficulty exists in enforcing the laconic safeguards of the bill. Broadly, the three forms of judicial remedy usually enforced are civil, criminal and the writ jurisdiction of high courts and the Supreme Court. The Aadhaar bill makes all these three remedies ineffective for individuals.<br /><br />The civil remedies under the bill oust the jurisdiction of civil courts in favour of the system set up for penalties under the Information Technology Act. The existing penalties under the IT Act are deficient, as they were never intended to provide comprehensive privacy legislation. Even if they are amended, enforcement under the IT Act has never worked properly and shows no promise of improvement. Under it, the jurisdiction of civil courts is barred in favour of &ldquo;adjudicating officers&rdquo;. These officers are usually a serving IT secretary of the state government given additional charge to adjudicate cases under the IT Act. Though persons of high competence, a lack of resources and training handicaps not only their capacity but also the quality of judicial orders necessary to withstand review. Such scrutiny would naturally arise in appeal as provided under the IT Act &mdash; but, for the last three years, the Cyber Appellate Tribunal that hears such appeals has not been properly constituted and is not functioning.<br /><br />The problems with enforcement of criminal remedies are more straightforward: Only the UIDAI can make complaints for the offences contained under the Aadhaar bill. Not only is this a conflict of interest but it also takes away the Aadhaar user&rsquo;s recourse to a criminal remedy. It may be argued that penal provisions under the IT Act and the IPC can be invoked by individuals. But such an assertion must consider the absence of any notification mechanism. The Aadhaar user is never informed when a crime relating to their data occurs. They will never have the particulars necessary to register a criminal complaint.<br /><br />This brings us to the final remedy of writs that can be availed of to enforce the fundamental and statutory rights available to a person. It would normally be expected that a person would be able to approach an HC for the enforcement of rights under the Aadhaar bill. Especially if the UIDAI does not provide authentication as it is intended to do, or fails to correct the data records. Most people know the poor quality of data entry in government IDs. Aadhaar requires a safeguard clearly conferring a right than can be enforced through a writ. However, these rights are problematically phrased as &ldquo;requests&rdquo; for supplying and correcting information. This dilution is made clear by the absence of the requirement of a hearing, a reasoned order or an appellate process under the bill.<br /><br />It is not without reason that the Justice Shah report suggested a comprehensive legislation to safeguard privacy and also the office of a central privacy commissioner to develop and apply it. Even when suggesting the establishment of a privacy commissioner, who could impose penalties for violations, it recognised the central role of existing judicial forums by retaining the jurisdiction of civil courts. While many may see privacy as the core issue in the Aadhaar programme, privacy itself transcends it. As our everyday lives become connected, a comprehensive privacy legislation is an essential safeguard.</div>', 'lang' => 'English', 'SITE_URL' => 'https://im4change.in/', 'site_title' => 'im4change', 'adminprix' => 'admin' ] $article_current = object(App\Model\Entity\Article) { 'id' => (int) 30913, 'title' => 'The Basis Of Privacy -Apar Gupta', 'subheading' => '', 'description' => '<div align="justify"> -The Indian Express<br /> <br /> <em>Aadhaar legislation points to the need for a comprehensive privacy law.<br /> </em><br /> Most of the debate on the Aadhaar bill has centred on the right to privacy. All five amendments suggested by the Rajya Sabha, subsequently rejected by the Lok Sabha, had an element of this right within them. But the core deficiency rested not in the lack of protections in the Aadhaar bill but in the absence of a comprehensive privacy statute to develop and enforce them.<br /> <br /> We must look at both substantive protections and the procedure available to enforce them. Many people regard privacy as an amorphous concept, which is also why it is hard for them to visualise any harm to it. Recognising this problem, in 2012, the Justice A.P. Shah Committee suggested nine distinct principles canonising the right to privacy. An analysis of the Aadhaar bill shows that it does not even recognise some of these nine principles. For instance, take the principle of access; a person cannot in any instance demand access to their core biometric information under the Aadhaar bill.<br /> <br /> But greater difficulty exists in enforcing the laconic safeguards of the bill. Broadly, the three forms of judicial remedy usually enforced are civil, criminal and the writ jurisdiction of high courts and the Supreme Court. The Aadhaar bill makes all these three remedies ineffective for individuals.<br /> <br /> The civil remedies under the bill oust the jurisdiction of civil courts in favour of the system set up for penalties under the Information Technology Act. The existing penalties under the IT Act are deficient, as they were never intended to provide comprehensive privacy legislation. Even if they are amended, enforcement under the IT Act has never worked properly and shows no promise of improvement. Under it, the jurisdiction of civil courts is barred in favour of &ldquo;adjudicating officers&rdquo;. These officers are usually a serving IT secretary of the state government given additional charge to adjudicate cases under the IT Act. Though persons of high competence, a lack of resources and training handicaps not only their capacity but also the quality of judicial orders necessary to withstand review. Such scrutiny would naturally arise in appeal as provided under the IT Act &mdash; but, for the last three years, the Cyber Appellate Tribunal that hears such appeals has not been properly constituted and is not functioning.<br /> <br /> The problems with enforcement of criminal remedies are more straightforward: Only the UIDAI can make complaints for the offences contained under the Aadhaar bill. Not only is this a conflict of interest but it also takes away the Aadhaar user&rsquo;s recourse to a criminal remedy. It may be argued that penal provisions under the IT Act and the IPC can be invoked by individuals. But such an assertion must consider the absence of any notification mechanism. The Aadhaar user is never informed when a crime relating to their data occurs. They will never have the particulars necessary to register a criminal complaint.<br /> <br /> This brings us to the final remedy of writs that can be availed of to enforce the fundamental and statutory rights available to a person. It would normally be expected that a person would be able to approach an HC for the enforcement of rights under the Aadhaar bill. Especially if the UIDAI does not provide authentication as it is intended to do, or fails to correct the data records. Most people know the poor quality of data entry in government IDs. Aadhaar requires a safeguard clearly conferring a right than can be enforced through a writ. However, these rights are problematically phrased as &ldquo;requests&rdquo; for supplying and correcting information. This dilution is made clear by the absence of the requirement of a hearing, a reasoned order or an appellate process under the bill.<br /> <br /> It is not without reason that the Justice Shah report suggested a comprehensive legislation to safeguard privacy and also the office of a central privacy commissioner to develop and apply it. Even when suggesting the establishment of a privacy commissioner, who could impose penalties for violations, it recognised the central role of existing judicial forums by retaining the jurisdiction of civil courts. While many may see privacy as the core issue in the Aadhaar programme, privacy itself transcends it. As our everyday lives become connected, a comprehensive privacy legislation is an essential safeguard. </div>', 'credit_writer' => 'The Indian Express, 29 March, 2016, http://indianexpress.com/article/opinion/columns/aadhaar-bill-the-basis-of-privacy/', 'article_img' => '', 'article_img_thumb' => '', 'status' => (int) 1, 'show_on_home' => (int) 1, 'lang' => 'EN', 'category_id' => (int) 16, 'tag_keyword' => '', 'seo_url' => 'the-basis-of-privacy-apar-gupta-4678980', 'meta_title' => null, 'meta_keywords' => null, 'meta_description' => null, 'noindex' => (int) 0, 'publish_date' => object(Cake\I18n\FrozenDate) {}, 'most_visit_section_id' => null, 'article_big_img' => null, 'liveid' => (int) 4678980, 'created' => object(Cake\I18n\FrozenTime) {}, 'modified' => object(Cake\I18n\FrozenTime) {}, 'edate' => '', 'tags' => [ (int) 0 => object(Cake\ORM\Entity) {}, (int) 1 => object(Cake\ORM\Entity) {}, (int) 2 => object(Cake\ORM\Entity) {}, (int) 3 => object(Cake\ORM\Entity) {}, (int) 4 => object(Cake\ORM\Entity) {}, (int) 5 => object(Cake\ORM\Entity) {} ], 'category' => object(App\Model\Entity\Category) {}, '[new]' => false, '[accessible]' => [ '*' => true, 'id' => false ], '[dirty]' => [], '[original]' => [], '[virtual]' => [], '[hasErrors]' => false, '[errors]' => [], '[invalid]' => [], '[repository]' => 'Articles' } $articleid = (int) 30913 $metaTitle = 'LATEST NEWS UPDATES | The Basis Of Privacy -Apar Gupta' $metaKeywords = 'Privacy,Privacy Rights,aadhaar,Aadhaar (Targeted Delivery of Financial and Other Subsidies Benefits and Services) Bill (2016),UIDAI,uid' $metaDesc = ' -The Indian Express Aadhaar legislation points to the need for a comprehensive privacy law. Most of the debate on the Aadhaar bill has centred on the right to privacy. All five amendments suggested by the Rajya Sabha, subsequently rejected by the Lok...' $disp = '<div align="justify">-The Indian Express<br /><br /><em>Aadhaar legislation points to the need for a comprehensive privacy law.<br /></em><br />Most of the debate on the Aadhaar bill has centred on the right to privacy. All five amendments suggested by the Rajya Sabha, subsequently rejected by the Lok Sabha, had an element of this right within them. But the core deficiency rested not in the lack of protections in the Aadhaar bill but in the absence of a comprehensive privacy statute to develop and enforce them.<br /><br />We must look at both substantive protections and the procedure available to enforce them. Many people regard privacy as an amorphous concept, which is also why it is hard for them to visualise any harm to it. Recognising this problem, in 2012, the Justice A.P. Shah Committee suggested nine distinct principles canonising the right to privacy. An analysis of the Aadhaar bill shows that it does not even recognise some of these nine principles. For instance, take the principle of access; a person cannot in any instance demand access to their core biometric information under the Aadhaar bill.<br /><br />But greater difficulty exists in enforcing the laconic safeguards of the bill. Broadly, the three forms of judicial remedy usually enforced are civil, criminal and the writ jurisdiction of high courts and the Supreme Court. The Aadhaar bill makes all these three remedies ineffective for individuals.<br /><br />The civil remedies under the bill oust the jurisdiction of civil courts in favour of the system set up for penalties under the Information Technology Act. The existing penalties under the IT Act are deficient, as they were never intended to provide comprehensive privacy legislation. Even if they are amended, enforcement under the IT Act has never worked properly and shows no promise of improvement. Under it, the jurisdiction of civil courts is barred in favour of &ldquo;adjudicating officers&rdquo;. These officers are usually a serving IT secretary of the state government given additional charge to adjudicate cases under the IT Act. Though persons of high competence, a lack of resources and training handicaps not only their capacity but also the quality of judicial orders necessary to withstand review. Such scrutiny would naturally arise in appeal as provided under the IT Act &mdash; but, for the last three years, the Cyber Appellate Tribunal that hears such appeals has not been properly constituted and is not functioning.<br /><br />The problems with enforcement of criminal remedies are more straightforward: Only the UIDAI can make complaints for the offences contained under the Aadhaar bill. Not only is this a conflict of interest but it also takes away the Aadhaar user&rsquo;s recourse to a criminal remedy. It may be argued that penal provisions under the IT Act and the IPC can be invoked by individuals. But such an assertion must consider the absence of any notification mechanism. The Aadhaar user is never informed when a crime relating to their data occurs. They will never have the particulars necessary to register a criminal complaint.<br /><br />This brings us to the final remedy of writs that can be availed of to enforce the fundamental and statutory rights available to a person. It would normally be expected that a person would be able to approach an HC for the enforcement of rights under the Aadhaar bill. Especially if the UIDAI does not provide authentication as it is intended to do, or fails to correct the data records. Most people know the poor quality of data entry in government IDs. Aadhaar requires a safeguard clearly conferring a right than can be enforced through a writ. However, these rights are problematically phrased as &ldquo;requests&rdquo; for supplying and correcting information. This dilution is made clear by the absence of the requirement of a hearing, a reasoned order or an appellate process under the bill.<br /><br />It is not without reason that the Justice Shah report suggested a comprehensive legislation to safeguard privacy and also the office of a central privacy commissioner to develop and apply it. Even when suggesting the establishment of a privacy commissioner, who could impose penalties for violations, it recognised the central role of existing judicial forums by retaining the jurisdiction of civil courts. While many may see privacy as the core issue in the Aadhaar programme, privacy itself transcends it. As our everyday lives become connected, a comprehensive privacy legislation is an essential safeguard.</div>' $lang = 'English' $SITE_URL = 'https://im4change.in/' $site_title = 'im4change' $adminprix = 'admin'</pre><pre class="stack-trace">include - APP/Template/Layout/printlayout.ctp, line 8 Cake\View\View::_evaluate() - CORE/src/View/View.php, line 1413 Cake\View\View::_render() - CORE/src/View/View.php, line 1374 Cake\View\View::renderLayout() - CORE/src/View/View.php, line 927 Cake\View\View::render() - CORE/src/View/View.php, line 885 Cake\Controller\Controller::render() - CORE/src/Controller/Controller.php, line 791 Cake\Http\ActionDispatcher::_invoke() - CORE/src/Http/ActionDispatcher.php, line 126 Cake\Http\ActionDispatcher::dispatch() - CORE/src/Http/ActionDispatcher.php, line 94 Cake\Http\BaseApplication::__invoke() - CORE/src/Http/BaseApplication.php, line 235 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Routing\Middleware\RoutingMiddleware::__invoke() - CORE/src/Routing/Middleware/RoutingMiddleware.php, line 162 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Routing\Middleware\AssetMiddleware::__invoke() - CORE/src/Routing/Middleware/AssetMiddleware.php, line 88 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Error\Middleware\ErrorHandlerMiddleware::__invoke() - CORE/src/Error/Middleware/ErrorHandlerMiddleware.php, line 96 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Http\Runner::run() - CORE/src/Http/Runner.php, line 51</pre></div></pre>latest-news-updates/the-basis-of-privacy-apar-gupta-4678980.html"/> <meta http-equiv="Content-Type" content="text/html; charset=utf-8"/> <link href="https://im4change.in/css/control.css" rel="stylesheet" type="text/css" media="all"/> <title>LATEST NEWS UPDATES | The Basis Of Privacy -Apar Gupta | Im4change.org</title> <meta name="description" content=" -The Indian Express Aadhaar legislation points to the need for a comprehensive privacy law. Most of the debate on the Aadhaar bill has centred on the right to privacy. All five amendments suggested by the Rajya Sabha, subsequently rejected by the Lok..."/> <script src="https://im4change.in/js/jquery-1.10.2.js"></script> <script type="text/javascript" src="https://im4change.in/js/jquery-migrate.min.js"></script> <script language="javascript" type="text/javascript"> $(document).ready(function () { var img = $("img")[0]; // Get my img elem var pic_real_width, pic_real_height; $("<img/>") // Make in memory copy of image to avoid css issues .attr("src", $(img).attr("src")) .load(function () { pic_real_width = this.width; // Note: $(this).width() will not pic_real_height = this.height; // work for in memory images. }); }); </script> <style type="text/css"> @media screen { div.divFooter { display: block; } } @media print { .printbutton { display: none !important; } } </style> </head> <body> <table cellpadding="0" cellspacing="0" border="0" width="98%" align="center"> <tr> <td class="top_bg"> <div class="divFooter"> <img src="https://im4change.in/images/logo1.jpg" height="59" border="0" alt="Resource centre on India's rural distress" style="padding-top:14px;"/> </div> </td> </tr> <tr> <td id="topspace"> </td> </tr> <tr id="topspace"> <td> </td> </tr> <tr> <td height="50" style="border-bottom:1px solid #000; padding-top:10px;" class="printbutton"> <form><input type="button" value=" Print this page " onclick="window.print();return false;"/></form> </td> </tr> <tr> <td width="100%"> <h1 class="news_headlines" style="font-style:normal"> <strong>The Basis Of Privacy -Apar Gupta</strong></h1> </td> </tr> <tr> <td width="100%" style="font-family:Arial, 'Segoe Script', 'Segoe UI', sans-serif, serif"><font size="3"> <div align="justify">-The Indian Express<br /><br /><em>Aadhaar legislation points to the need for a comprehensive privacy law.<br /></em><br />Most of the debate on the Aadhaar bill has centred on the right to privacy. All five amendments suggested by the Rajya Sabha, subsequently rejected by the Lok Sabha, had an element of this right within them. But the core deficiency rested not in the lack of protections in the Aadhaar bill but in the absence of a comprehensive privacy statute to develop and enforce them.<br /><br />We must look at both substantive protections and the procedure available to enforce them. Many people regard privacy as an amorphous concept, which is also why it is hard for them to visualise any harm to it. Recognising this problem, in 2012, the Justice A.P. Shah Committee suggested nine distinct principles canonising the right to privacy. An analysis of the Aadhaar bill shows that it does not even recognise some of these nine principles. For instance, take the principle of access; a person cannot in any instance demand access to their core biometric information under the Aadhaar bill.<br /><br />But greater difficulty exists in enforcing the laconic safeguards of the bill. Broadly, the three forms of judicial remedy usually enforced are civil, criminal and the writ jurisdiction of high courts and the Supreme Court. The Aadhaar bill makes all these three remedies ineffective for individuals.<br /><br />The civil remedies under the bill oust the jurisdiction of civil courts in favour of the system set up for penalties under the Information Technology Act. The existing penalties under the IT Act are deficient, as they were never intended to provide comprehensive privacy legislation. Even if they are amended, enforcement under the IT Act has never worked properly and shows no promise of improvement. Under it, the jurisdiction of civil courts is barred in favour of “adjudicating officers”. These officers are usually a serving IT secretary of the state government given additional charge to adjudicate cases under the IT Act. Though persons of high competence, a lack of resources and training handicaps not only their capacity but also the quality of judicial orders necessary to withstand review. Such scrutiny would naturally arise in appeal as provided under the IT Act — but, for the last three years, the Cyber Appellate Tribunal that hears such appeals has not been properly constituted and is not functioning.<br /><br />The problems with enforcement of criminal remedies are more straightforward: Only the UIDAI can make complaints for the offences contained under the Aadhaar bill. Not only is this a conflict of interest but it also takes away the Aadhaar user’s recourse to a criminal remedy. It may be argued that penal provisions under the IT Act and the IPC can be invoked by individuals. But such an assertion must consider the absence of any notification mechanism. The Aadhaar user is never informed when a crime relating to their data occurs. They will never have the particulars necessary to register a criminal complaint.<br /><br />This brings us to the final remedy of writs that can be availed of to enforce the fundamental and statutory rights available to a person. It would normally be expected that a person would be able to approach an HC for the enforcement of rights under the Aadhaar bill. Especially if the UIDAI does not provide authentication as it is intended to do, or fails to correct the data records. Most people know the poor quality of data entry in government IDs. Aadhaar requires a safeguard clearly conferring a right than can be enforced through a writ. However, these rights are problematically phrased as “requests” for supplying and correcting information. This dilution is made clear by the absence of the requirement of a hearing, a reasoned order or an appellate process under the bill.<br /><br />It is not without reason that the Justice Shah report suggested a comprehensive legislation to safeguard privacy and also the office of a central privacy commissioner to develop and apply it. Even when suggesting the establishment of a privacy commissioner, who could impose penalties for violations, it recognised the central role of existing judicial forums by retaining the jurisdiction of civil courts. While many may see privacy as the core issue in the Aadhaar programme, privacy itself transcends it. As our everyday lives become connected, a comprehensive privacy legislation is an essential safeguard.</div> </font> </td> </tr> <tr> <td> </td> </tr> <tr> <td height="50" style="border-top:1px solid #000; border-bottom:1px solid #000;padding-top:10px;"> <form><input type="button" value=" Print this page " onclick="window.print();return false;"/></form> </td> </tr> </table></body> </html>' } $reasonPhrase = 'OK'header - [internal], line ?? Cake\Http\ResponseEmitter::emitStatusLine() - CORE/src/Http/ResponseEmitter.php, line 148 Cake\Http\ResponseEmitter::emit() - CORE/src/Http/ResponseEmitter.php, line 54 Cake\Http\Server::emit() - CORE/src/Http/Server.php, line 141 [main] - ROOT/webroot/index.php, line 39
Warning (2): Cannot modify header information - headers already sent by (output started at /home/brlfuser/public_html/vendor/cakephp/cakephp/src/Error/Debugger.php:853) [CORE/src/Http/ResponseEmitter.php, line 181]Notice (8): Undefined variable: urlPrefix [APP/Template/Layout/printlayout.ctp, line 8]Code Context$value
), $first);
$first = false;
$response = object(Cake\Http\Response) { 'status' => (int) 200, 'contentType' => 'text/html', 'headers' => [ 'Content-Type' => [ [maximum depth reached] ] ], 'file' => null, 'fileRange' => [], 'cookies' => object(Cake\Http\Cookie\CookieCollection) {}, 'cacheDirectives' => [], 'body' => '<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <link rel="canonical" href="https://im4change.in/<pre class="cake-error"><a href="javascript:void(0);" onclick="document.getElementById('cakeErr67f1002354cf1-trace').style.display = (document.getElementById('cakeErr67f1002354cf1-trace').style.display == 'none' ? '' : 'none');"><b>Notice</b> (8)</a>: Undefined variable: urlPrefix [<b>APP/Template/Layout/printlayout.ctp</b>, line <b>8</b>]<div id="cakeErr67f1002354cf1-trace" class="cake-stack-trace" style="display: none;"><a href="javascript:void(0);" onclick="document.getElementById('cakeErr67f1002354cf1-code').style.display = (document.getElementById('cakeErr67f1002354cf1-code').style.display == 'none' ? '' : 'none')">Code</a> <a href="javascript:void(0);" onclick="document.getElementById('cakeErr67f1002354cf1-context').style.display = (document.getElementById('cakeErr67f1002354cf1-context').style.display == 'none' ? '' : 'none')">Context</a><pre id="cakeErr67f1002354cf1-code" class="cake-code-dump" style="display: none;"><code><span style="color: #000000"><span style="color: #0000BB"></span><span style="color: #007700"><</span><span style="color: #0000BB">head</span><span style="color: #007700">> </span></span></code> <span class="code-highlight"><code><span style="color: #000000"> <link rel="canonical" href="<span style="color: #0000BB"><?php </span><span style="color: #007700">echo </span><span style="color: #0000BB">Configure</span><span style="color: #007700">::</span><span style="color: #0000BB">read</span><span style="color: #007700">(</span><span style="color: #DD0000">'SITE_URL'</span><span style="color: #007700">); </span><span style="color: #0000BB">?><?php </span><span style="color: #007700">echo </span><span style="color: #0000BB">$urlPrefix</span><span style="color: #007700">;</span><span style="color: #0000BB">?><?php </span><span style="color: #007700">echo </span><span style="color: #0000BB">$article_current</span><span style="color: #007700">-></span><span style="color: #0000BB">category</span><span style="color: #007700">-></span><span style="color: #0000BB">slug</span><span style="color: #007700">; </span><span style="color: #0000BB">?></span>/<span style="color: #0000BB"><?php </span><span style="color: #007700">echo </span><span style="color: #0000BB">$article_current</span><span style="color: #007700">-></span><span style="color: #0000BB">seo_url</span><span style="color: #007700">; </span><span style="color: #0000BB">?></span>.html"/> </span></code></span> <code><span style="color: #000000"><span style="color: #0000BB"> </span><span style="color: #007700"><</span><span style="color: #0000BB">meta http</span><span style="color: #007700">-</span><span style="color: #0000BB">equiv</span><span style="color: #007700">=</span><span style="color: #DD0000">"Content-Type" </span><span style="color: #0000BB">content</span><span style="color: #007700">=</span><span style="color: #DD0000">"text/html; charset=utf-8"</span><span style="color: #007700">/> </span></span></code></pre><pre id="cakeErr67f1002354cf1-context" class="cake-context" style="display: none;">$viewFile = '/home/brlfuser/public_html/src/Template/Layout/printlayout.ctp' $dataForView = [ 'article_current' => object(App\Model\Entity\Article) { 'id' => (int) 30913, 'title' => 'The Basis Of Privacy -Apar Gupta', 'subheading' => '', 'description' => '<div align="justify"> -The Indian Express<br /> <br /> <em>Aadhaar legislation points to the need for a comprehensive privacy law.<br /> </em><br /> Most of the debate on the Aadhaar bill has centred on the right to privacy. All five amendments suggested by the Rajya Sabha, subsequently rejected by the Lok Sabha, had an element of this right within them. But the core deficiency rested not in the lack of protections in the Aadhaar bill but in the absence of a comprehensive privacy statute to develop and enforce them.<br /> <br /> We must look at both substantive protections and the procedure available to enforce them. Many people regard privacy as an amorphous concept, which is also why it is hard for them to visualise any harm to it. Recognising this problem, in 2012, the Justice A.P. Shah Committee suggested nine distinct principles canonising the right to privacy. An analysis of the Aadhaar bill shows that it does not even recognise some of these nine principles. For instance, take the principle of access; a person cannot in any instance demand access to their core biometric information under the Aadhaar bill.<br /> <br /> But greater difficulty exists in enforcing the laconic safeguards of the bill. Broadly, the three forms of judicial remedy usually enforced are civil, criminal and the writ jurisdiction of high courts and the Supreme Court. The Aadhaar bill makes all these three remedies ineffective for individuals.<br /> <br /> The civil remedies under the bill oust the jurisdiction of civil courts in favour of the system set up for penalties under the Information Technology Act. The existing penalties under the IT Act are deficient, as they were never intended to provide comprehensive privacy legislation. Even if they are amended, enforcement under the IT Act has never worked properly and shows no promise of improvement. Under it, the jurisdiction of civil courts is barred in favour of &ldquo;adjudicating officers&rdquo;. These officers are usually a serving IT secretary of the state government given additional charge to adjudicate cases under the IT Act. Though persons of high competence, a lack of resources and training handicaps not only their capacity but also the quality of judicial orders necessary to withstand review. Such scrutiny would naturally arise in appeal as provided under the IT Act &mdash; but, for the last three years, the Cyber Appellate Tribunal that hears such appeals has not been properly constituted and is not functioning.<br /> <br /> The problems with enforcement of criminal remedies are more straightforward: Only the UIDAI can make complaints for the offences contained under the Aadhaar bill. Not only is this a conflict of interest but it also takes away the Aadhaar user&rsquo;s recourse to a criminal remedy. It may be argued that penal provisions under the IT Act and the IPC can be invoked by individuals. But such an assertion must consider the absence of any notification mechanism. The Aadhaar user is never informed when a crime relating to their data occurs. They will never have the particulars necessary to register a criminal complaint.<br /> <br /> This brings us to the final remedy of writs that can be availed of to enforce the fundamental and statutory rights available to a person. It would normally be expected that a person would be able to approach an HC for the enforcement of rights under the Aadhaar bill. Especially if the UIDAI does not provide authentication as it is intended to do, or fails to correct the data records. Most people know the poor quality of data entry in government IDs. Aadhaar requires a safeguard clearly conferring a right than can be enforced through a writ. However, these rights are problematically phrased as &ldquo;requests&rdquo; for supplying and correcting information. This dilution is made clear by the absence of the requirement of a hearing, a reasoned order or an appellate process under the bill.<br /> <br /> It is not without reason that the Justice Shah report suggested a comprehensive legislation to safeguard privacy and also the office of a central privacy commissioner to develop and apply it. Even when suggesting the establishment of a privacy commissioner, who could impose penalties for violations, it recognised the central role of existing judicial forums by retaining the jurisdiction of civil courts. While many may see privacy as the core issue in the Aadhaar programme, privacy itself transcends it. As our everyday lives become connected, a comprehensive privacy legislation is an essential safeguard. </div>', 'credit_writer' => 'The Indian Express, 29 March, 2016, http://indianexpress.com/article/opinion/columns/aadhaar-bill-the-basis-of-privacy/', 'article_img' => '', 'article_img_thumb' => '', 'status' => (int) 1, 'show_on_home' => (int) 1, 'lang' => 'EN', 'category_id' => (int) 16, 'tag_keyword' => '', 'seo_url' => 'the-basis-of-privacy-apar-gupta-4678980', 'meta_title' => null, 'meta_keywords' => null, 'meta_description' => null, 'noindex' => (int) 0, 'publish_date' => object(Cake\I18n\FrozenDate) {}, 'most_visit_section_id' => null, 'article_big_img' => null, 'liveid' => (int) 4678980, 'created' => object(Cake\I18n\FrozenTime) {}, 'modified' => object(Cake\I18n\FrozenTime) {}, 'edate' => '', 'tags' => [ [maximum depth reached] ], 'category' => object(App\Model\Entity\Category) {}, '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[hasErrors]' => false, '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'Articles' }, 'articleid' => (int) 30913, 'metaTitle' => 'LATEST NEWS UPDATES | The Basis Of Privacy -Apar Gupta', 'metaKeywords' => 'Privacy,Privacy Rights,aadhaar,Aadhaar (Targeted Delivery of Financial and Other Subsidies Benefits and Services) Bill (2016),UIDAI,uid', 'metaDesc' => ' -The Indian Express Aadhaar legislation points to the need for a comprehensive privacy law. Most of the debate on the Aadhaar bill has centred on the right to privacy. All five amendments suggested by the Rajya Sabha, subsequently rejected by the Lok...', 'disp' => '<div align="justify">-The Indian Express<br /><br /><em>Aadhaar legislation points to the need for a comprehensive privacy law.<br /></em><br />Most of the debate on the Aadhaar bill has centred on the right to privacy. All five amendments suggested by the Rajya Sabha, subsequently rejected by the Lok Sabha, had an element of this right within them. But the core deficiency rested not in the lack of protections in the Aadhaar bill but in the absence of a comprehensive privacy statute to develop and enforce them.<br /><br />We must look at both substantive protections and the procedure available to enforce them. Many people regard privacy as an amorphous concept, which is also why it is hard for them to visualise any harm to it. Recognising this problem, in 2012, the Justice A.P. Shah Committee suggested nine distinct principles canonising the right to privacy. An analysis of the Aadhaar bill shows that it does not even recognise some of these nine principles. For instance, take the principle of access; a person cannot in any instance demand access to their core biometric information under the Aadhaar bill.<br /><br />But greater difficulty exists in enforcing the laconic safeguards of the bill. Broadly, the three forms of judicial remedy usually enforced are civil, criminal and the writ jurisdiction of high courts and the Supreme Court. The Aadhaar bill makes all these three remedies ineffective for individuals.<br /><br />The civil remedies under the bill oust the jurisdiction of civil courts in favour of the system set up for penalties under the Information Technology Act. The existing penalties under the IT Act are deficient, as they were never intended to provide comprehensive privacy legislation. Even if they are amended, enforcement under the IT Act has never worked properly and shows no promise of improvement. Under it, the jurisdiction of civil courts is barred in favour of &ldquo;adjudicating officers&rdquo;. These officers are usually a serving IT secretary of the state government given additional charge to adjudicate cases under the IT Act. Though persons of high competence, a lack of resources and training handicaps not only their capacity but also the quality of judicial orders necessary to withstand review. Such scrutiny would naturally arise in appeal as provided under the IT Act &mdash; but, for the last three years, the Cyber Appellate Tribunal that hears such appeals has not been properly constituted and is not functioning.<br /><br />The problems with enforcement of criminal remedies are more straightforward: Only the UIDAI can make complaints for the offences contained under the Aadhaar bill. Not only is this a conflict of interest but it also takes away the Aadhaar user&rsquo;s recourse to a criminal remedy. It may be argued that penal provisions under the IT Act and the IPC can be invoked by individuals. But such an assertion must consider the absence of any notification mechanism. The Aadhaar user is never informed when a crime relating to their data occurs. They will never have the particulars necessary to register a criminal complaint.<br /><br />This brings us to the final remedy of writs that can be availed of to enforce the fundamental and statutory rights available to a person. It would normally be expected that a person would be able to approach an HC for the enforcement of rights under the Aadhaar bill. Especially if the UIDAI does not provide authentication as it is intended to do, or fails to correct the data records. Most people know the poor quality of data entry in government IDs. Aadhaar requires a safeguard clearly conferring a right than can be enforced through a writ. However, these rights are problematically phrased as &ldquo;requests&rdquo; for supplying and correcting information. This dilution is made clear by the absence of the requirement of a hearing, a reasoned order or an appellate process under the bill.<br /><br />It is not without reason that the Justice Shah report suggested a comprehensive legislation to safeguard privacy and also the office of a central privacy commissioner to develop and apply it. Even when suggesting the establishment of a privacy commissioner, who could impose penalties for violations, it recognised the central role of existing judicial forums by retaining the jurisdiction of civil courts. While many may see privacy as the core issue in the Aadhaar programme, privacy itself transcends it. As our everyday lives become connected, a comprehensive privacy legislation is an essential safeguard.</div>', 'lang' => 'English', 'SITE_URL' => 'https://im4change.in/', 'site_title' => 'im4change', 'adminprix' => 'admin' ] $article_current = object(App\Model\Entity\Article) { 'id' => (int) 30913, 'title' => 'The Basis Of Privacy -Apar Gupta', 'subheading' => '', 'description' => '<div align="justify"> -The Indian Express<br /> <br /> <em>Aadhaar legislation points to the need for a comprehensive privacy law.<br /> </em><br /> Most of the debate on the Aadhaar bill has centred on the right to privacy. All five amendments suggested by the Rajya Sabha, subsequently rejected by the Lok Sabha, had an element of this right within them. But the core deficiency rested not in the lack of protections in the Aadhaar bill but in the absence of a comprehensive privacy statute to develop and enforce them.<br /> <br /> We must look at both substantive protections and the procedure available to enforce them. Many people regard privacy as an amorphous concept, which is also why it is hard for them to visualise any harm to it. Recognising this problem, in 2012, the Justice A.P. Shah Committee suggested nine distinct principles canonising the right to privacy. An analysis of the Aadhaar bill shows that it does not even recognise some of these nine principles. For instance, take the principle of access; a person cannot in any instance demand access to their core biometric information under the Aadhaar bill.<br /> <br /> But greater difficulty exists in enforcing the laconic safeguards of the bill. Broadly, the three forms of judicial remedy usually enforced are civil, criminal and the writ jurisdiction of high courts and the Supreme Court. The Aadhaar bill makes all these three remedies ineffective for individuals.<br /> <br /> The civil remedies under the bill oust the jurisdiction of civil courts in favour of the system set up for penalties under the Information Technology Act. The existing penalties under the IT Act are deficient, as they were never intended to provide comprehensive privacy legislation. Even if they are amended, enforcement under the IT Act has never worked properly and shows no promise of improvement. Under it, the jurisdiction of civil courts is barred in favour of &ldquo;adjudicating officers&rdquo;. These officers are usually a serving IT secretary of the state government given additional charge to adjudicate cases under the IT Act. Though persons of high competence, a lack of resources and training handicaps not only their capacity but also the quality of judicial orders necessary to withstand review. Such scrutiny would naturally arise in appeal as provided under the IT Act &mdash; but, for the last three years, the Cyber Appellate Tribunal that hears such appeals has not been properly constituted and is not functioning.<br /> <br /> The problems with enforcement of criminal remedies are more straightforward: Only the UIDAI can make complaints for the offences contained under the Aadhaar bill. Not only is this a conflict of interest but it also takes away the Aadhaar user&rsquo;s recourse to a criminal remedy. It may be argued that penal provisions under the IT Act and the IPC can be invoked by individuals. But such an assertion must consider the absence of any notification mechanism. The Aadhaar user is never informed when a crime relating to their data occurs. They will never have the particulars necessary to register a criminal complaint.<br /> <br /> This brings us to the final remedy of writs that can be availed of to enforce the fundamental and statutory rights available to a person. It would normally be expected that a person would be able to approach an HC for the enforcement of rights under the Aadhaar bill. Especially if the UIDAI does not provide authentication as it is intended to do, or fails to correct the data records. Most people know the poor quality of data entry in government IDs. Aadhaar requires a safeguard clearly conferring a right than can be enforced through a writ. However, these rights are problematically phrased as &ldquo;requests&rdquo; for supplying and correcting information. This dilution is made clear by the absence of the requirement of a hearing, a reasoned order or an appellate process under the bill.<br /> <br /> It is not without reason that the Justice Shah report suggested a comprehensive legislation to safeguard privacy and also the office of a central privacy commissioner to develop and apply it. Even when suggesting the establishment of a privacy commissioner, who could impose penalties for violations, it recognised the central role of existing judicial forums by retaining the jurisdiction of civil courts. While many may see privacy as the core issue in the Aadhaar programme, privacy itself transcends it. As our everyday lives become connected, a comprehensive privacy legislation is an essential safeguard. </div>', 'credit_writer' => 'The Indian Express, 29 March, 2016, http://indianexpress.com/article/opinion/columns/aadhaar-bill-the-basis-of-privacy/', 'article_img' => '', 'article_img_thumb' => '', 'status' => (int) 1, 'show_on_home' => (int) 1, 'lang' => 'EN', 'category_id' => (int) 16, 'tag_keyword' => '', 'seo_url' => 'the-basis-of-privacy-apar-gupta-4678980', 'meta_title' => null, 'meta_keywords' => null, 'meta_description' => null, 'noindex' => (int) 0, 'publish_date' => object(Cake\I18n\FrozenDate) {}, 'most_visit_section_id' => null, 'article_big_img' => null, 'liveid' => (int) 4678980, 'created' => object(Cake\I18n\FrozenTime) {}, 'modified' => object(Cake\I18n\FrozenTime) {}, 'edate' => '', 'tags' => [ (int) 0 => object(Cake\ORM\Entity) {}, (int) 1 => object(Cake\ORM\Entity) {}, (int) 2 => object(Cake\ORM\Entity) {}, (int) 3 => object(Cake\ORM\Entity) {}, (int) 4 => object(Cake\ORM\Entity) {}, (int) 5 => object(Cake\ORM\Entity) {} ], 'category' => object(App\Model\Entity\Category) {}, '[new]' => false, '[accessible]' => [ '*' => true, 'id' => false ], '[dirty]' => [], '[original]' => [], '[virtual]' => [], '[hasErrors]' => false, '[errors]' => [], '[invalid]' => [], '[repository]' => 'Articles' } $articleid = (int) 30913 $metaTitle = 'LATEST NEWS UPDATES | The Basis Of Privacy -Apar Gupta' $metaKeywords = 'Privacy,Privacy Rights,aadhaar,Aadhaar (Targeted Delivery of Financial and Other Subsidies Benefits and Services) Bill (2016),UIDAI,uid' $metaDesc = ' -The Indian Express Aadhaar legislation points to the need for a comprehensive privacy law. Most of the debate on the Aadhaar bill has centred on the right to privacy. All five amendments suggested by the Rajya Sabha, subsequently rejected by the Lok...' $disp = '<div align="justify">-The Indian Express<br /><br /><em>Aadhaar legislation points to the need for a comprehensive privacy law.<br /></em><br />Most of the debate on the Aadhaar bill has centred on the right to privacy. All five amendments suggested by the Rajya Sabha, subsequently rejected by the Lok Sabha, had an element of this right within them. But the core deficiency rested not in the lack of protections in the Aadhaar bill but in the absence of a comprehensive privacy statute to develop and enforce them.<br /><br />We must look at both substantive protections and the procedure available to enforce them. Many people regard privacy as an amorphous concept, which is also why it is hard for them to visualise any harm to it. Recognising this problem, in 2012, the Justice A.P. Shah Committee suggested nine distinct principles canonising the right to privacy. An analysis of the Aadhaar bill shows that it does not even recognise some of these nine principles. For instance, take the principle of access; a person cannot in any instance demand access to their core biometric information under the Aadhaar bill.<br /><br />But greater difficulty exists in enforcing the laconic safeguards of the bill. Broadly, the three forms of judicial remedy usually enforced are civil, criminal and the writ jurisdiction of high courts and the Supreme Court. The Aadhaar bill makes all these three remedies ineffective for individuals.<br /><br />The civil remedies under the bill oust the jurisdiction of civil courts in favour of the system set up for penalties under the Information Technology Act. The existing penalties under the IT Act are deficient, as they were never intended to provide comprehensive privacy legislation. Even if they are amended, enforcement under the IT Act has never worked properly and shows no promise of improvement. Under it, the jurisdiction of civil courts is barred in favour of &ldquo;adjudicating officers&rdquo;. These officers are usually a serving IT secretary of the state government given additional charge to adjudicate cases under the IT Act. Though persons of high competence, a lack of resources and training handicaps not only their capacity but also the quality of judicial orders necessary to withstand review. Such scrutiny would naturally arise in appeal as provided under the IT Act &mdash; but, for the last three years, the Cyber Appellate Tribunal that hears such appeals has not been properly constituted and is not functioning.<br /><br />The problems with enforcement of criminal remedies are more straightforward: Only the UIDAI can make complaints for the offences contained under the Aadhaar bill. Not only is this a conflict of interest but it also takes away the Aadhaar user&rsquo;s recourse to a criminal remedy. It may be argued that penal provisions under the IT Act and the IPC can be invoked by individuals. But such an assertion must consider the absence of any notification mechanism. The Aadhaar user is never informed when a crime relating to their data occurs. They will never have the particulars necessary to register a criminal complaint.<br /><br />This brings us to the final remedy of writs that can be availed of to enforce the fundamental and statutory rights available to a person. It would normally be expected that a person would be able to approach an HC for the enforcement of rights under the Aadhaar bill. Especially if the UIDAI does not provide authentication as it is intended to do, or fails to correct the data records. Most people know the poor quality of data entry in government IDs. Aadhaar requires a safeguard clearly conferring a right than can be enforced through a writ. However, these rights are problematically phrased as &ldquo;requests&rdquo; for supplying and correcting information. This dilution is made clear by the absence of the requirement of a hearing, a reasoned order or an appellate process under the bill.<br /><br />It is not without reason that the Justice Shah report suggested a comprehensive legislation to safeguard privacy and also the office of a central privacy commissioner to develop and apply it. Even when suggesting the establishment of a privacy commissioner, who could impose penalties for violations, it recognised the central role of existing judicial forums by retaining the jurisdiction of civil courts. While many may see privacy as the core issue in the Aadhaar programme, privacy itself transcends it. As our everyday lives become connected, a comprehensive privacy legislation is an essential safeguard.</div>' $lang = 'English' $SITE_URL = 'https://im4change.in/' $site_title = 'im4change' $adminprix = 'admin'</pre><pre class="stack-trace">include - APP/Template/Layout/printlayout.ctp, line 8 Cake\View\View::_evaluate() - CORE/src/View/View.php, line 1413 Cake\View\View::_render() - CORE/src/View/View.php, line 1374 Cake\View\View::renderLayout() - CORE/src/View/View.php, line 927 Cake\View\View::render() - CORE/src/View/View.php, line 885 Cake\Controller\Controller::render() - CORE/src/Controller/Controller.php, line 791 Cake\Http\ActionDispatcher::_invoke() - CORE/src/Http/ActionDispatcher.php, line 126 Cake\Http\ActionDispatcher::dispatch() - CORE/src/Http/ActionDispatcher.php, line 94 Cake\Http\BaseApplication::__invoke() - CORE/src/Http/BaseApplication.php, line 235 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Routing\Middleware\RoutingMiddleware::__invoke() - CORE/src/Routing/Middleware/RoutingMiddleware.php, line 162 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Routing\Middleware\AssetMiddleware::__invoke() - CORE/src/Routing/Middleware/AssetMiddleware.php, line 88 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Error\Middleware\ErrorHandlerMiddleware::__invoke() - CORE/src/Error/Middleware/ErrorHandlerMiddleware.php, line 96 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Http\Runner::run() - CORE/src/Http/Runner.php, line 51</pre></div></pre>latest-news-updates/the-basis-of-privacy-apar-gupta-4678980.html"/> <meta http-equiv="Content-Type" content="text/html; charset=utf-8"/> <link href="https://im4change.in/css/control.css" rel="stylesheet" type="text/css" media="all"/> <title>LATEST NEWS UPDATES | The Basis Of Privacy -Apar Gupta | Im4change.org</title> <meta name="description" content=" -The Indian Express Aadhaar legislation points to the need for a comprehensive privacy law. Most of the debate on the Aadhaar bill has centred on the right to privacy. All five amendments suggested by the Rajya Sabha, subsequently rejected by the Lok..."/> <script src="https://im4change.in/js/jquery-1.10.2.js"></script> <script type="text/javascript" src="https://im4change.in/js/jquery-migrate.min.js"></script> <script language="javascript" type="text/javascript"> $(document).ready(function () { var img = $("img")[0]; // Get my img elem var pic_real_width, pic_real_height; $("<img/>") // Make in memory copy of image to avoid css issues .attr("src", $(img).attr("src")) .load(function () { pic_real_width = this.width; // Note: $(this).width() will not pic_real_height = this.height; // work for in memory images. }); }); </script> <style type="text/css"> @media screen { div.divFooter { display: block; } } @media print { .printbutton { display: none !important; } } </style> </head> <body> <table cellpadding="0" cellspacing="0" border="0" width="98%" align="center"> <tr> <td class="top_bg"> <div class="divFooter"> <img src="https://im4change.in/images/logo1.jpg" height="59" border="0" alt="Resource centre on India's rural distress" style="padding-top:14px;"/> </div> </td> </tr> <tr> <td id="topspace"> </td> </tr> <tr id="topspace"> <td> </td> </tr> <tr> <td height="50" style="border-bottom:1px solid #000; padding-top:10px;" class="printbutton"> <form><input type="button" value=" Print this page " onclick="window.print();return false;"/></form> </td> </tr> <tr> <td width="100%"> <h1 class="news_headlines" style="font-style:normal"> <strong>The Basis Of Privacy -Apar Gupta</strong></h1> </td> </tr> <tr> <td width="100%" style="font-family:Arial, 'Segoe Script', 'Segoe UI', sans-serif, serif"><font size="3"> <div align="justify">-The Indian Express<br /><br /><em>Aadhaar legislation points to the need for a comprehensive privacy law.<br /></em><br />Most of the debate on the Aadhaar bill has centred on the right to privacy. All five amendments suggested by the Rajya Sabha, subsequently rejected by the Lok Sabha, had an element of this right within them. But the core deficiency rested not in the lack of protections in the Aadhaar bill but in the absence of a comprehensive privacy statute to develop and enforce them.<br /><br />We must look at both substantive protections and the procedure available to enforce them. Many people regard privacy as an amorphous concept, which is also why it is hard for them to visualise any harm to it. Recognising this problem, in 2012, the Justice A.P. Shah Committee suggested nine distinct principles canonising the right to privacy. An analysis of the Aadhaar bill shows that it does not even recognise some of these nine principles. For instance, take the principle of access; a person cannot in any instance demand access to their core biometric information under the Aadhaar bill.<br /><br />But greater difficulty exists in enforcing the laconic safeguards of the bill. Broadly, the three forms of judicial remedy usually enforced are civil, criminal and the writ jurisdiction of high courts and the Supreme Court. The Aadhaar bill makes all these three remedies ineffective for individuals.<br /><br />The civil remedies under the bill oust the jurisdiction of civil courts in favour of the system set up for penalties under the Information Technology Act. The existing penalties under the IT Act are deficient, as they were never intended to provide comprehensive privacy legislation. Even if they are amended, enforcement under the IT Act has never worked properly and shows no promise of improvement. Under it, the jurisdiction of civil courts is barred in favour of “adjudicating officers”. These officers are usually a serving IT secretary of the state government given additional charge to adjudicate cases under the IT Act. Though persons of high competence, a lack of resources and training handicaps not only their capacity but also the quality of judicial orders necessary to withstand review. Such scrutiny would naturally arise in appeal as provided under the IT Act — but, for the last three years, the Cyber Appellate Tribunal that hears such appeals has not been properly constituted and is not functioning.<br /><br />The problems with enforcement of criminal remedies are more straightforward: Only the UIDAI can make complaints for the offences contained under the Aadhaar bill. Not only is this a conflict of interest but it also takes away the Aadhaar user’s recourse to a criminal remedy. It may be argued that penal provisions under the IT Act and the IPC can be invoked by individuals. But such an assertion must consider the absence of any notification mechanism. The Aadhaar user is never informed when a crime relating to their data occurs. They will never have the particulars necessary to register a criminal complaint.<br /><br />This brings us to the final remedy of writs that can be availed of to enforce the fundamental and statutory rights available to a person. It would normally be expected that a person would be able to approach an HC for the enforcement of rights under the Aadhaar bill. Especially if the UIDAI does not provide authentication as it is intended to do, or fails to correct the data records. Most people know the poor quality of data entry in government IDs. Aadhaar requires a safeguard clearly conferring a right than can be enforced through a writ. However, these rights are problematically phrased as “requests” for supplying and correcting information. This dilution is made clear by the absence of the requirement of a hearing, a reasoned order or an appellate process under the bill.<br /><br />It is not without reason that the Justice Shah report suggested a comprehensive legislation to safeguard privacy and also the office of a central privacy commissioner to develop and apply it. Even when suggesting the establishment of a privacy commissioner, who could impose penalties for violations, it recognised the central role of existing judicial forums by retaining the jurisdiction of civil courts. While many may see privacy as the core issue in the Aadhaar programme, privacy itself transcends it. As our everyday lives become connected, a comprehensive privacy legislation is an essential safeguard.</div> </font> </td> </tr> <tr> <td> </td> </tr> <tr> <td height="50" style="border-top:1px solid #000; border-bottom:1px solid #000;padding-top:10px;"> <form><input type="button" value=" Print this page " onclick="window.print();return false;"/></form> </td> </tr> </table></body> </html>' } $cookies = [] $values = [ (int) 0 => 'text/html; charset=UTF-8' ] $name = 'Content-Type' $first = true $value = 'text/html; charset=UTF-8'header - [internal], line ?? Cake\Http\ResponseEmitter::emitHeaders() - CORE/src/Http/ResponseEmitter.php, line 181 Cake\Http\ResponseEmitter::emit() - CORE/src/Http/ResponseEmitter.php, line 55 Cake\Http\Server::emit() - CORE/src/Http/Server.php, line 141 [main] - ROOT/webroot/index.php, line 39
<head>
<link rel="canonical" href="<?php echo Configure::read('SITE_URL'); ?><?php echo $urlPrefix;?><?php echo $article_current->category->slug; ?>/<?php echo $article_current->seo_url; ?>.html"/>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8"/>
$viewFile = '/home/brlfuser/public_html/src/Template/Layout/printlayout.ctp' $dataForView = [ 'article_current' => object(App\Model\Entity\Article) { 'id' => (int) 30913, 'title' => 'The Basis Of Privacy -Apar Gupta', 'subheading' => '', 'description' => '<div align="justify"> -The Indian Express<br /> <br /> <em>Aadhaar legislation points to the need for a comprehensive privacy law.<br /> </em><br /> Most of the debate on the Aadhaar bill has centred on the right to privacy. All five amendments suggested by the Rajya Sabha, subsequently rejected by the Lok Sabha, had an element of this right within them. But the core deficiency rested not in the lack of protections in the Aadhaar bill but in the absence of a comprehensive privacy statute to develop and enforce them.<br /> <br /> We must look at both substantive protections and the procedure available to enforce them. Many people regard privacy as an amorphous concept, which is also why it is hard for them to visualise any harm to it. Recognising this problem, in 2012, the Justice A.P. Shah Committee suggested nine distinct principles canonising the right to privacy. An analysis of the Aadhaar bill shows that it does not even recognise some of these nine principles. For instance, take the principle of access; a person cannot in any instance demand access to their core biometric information under the Aadhaar bill.<br /> <br /> But greater difficulty exists in enforcing the laconic safeguards of the bill. Broadly, the three forms of judicial remedy usually enforced are civil, criminal and the writ jurisdiction of high courts and the Supreme Court. The Aadhaar bill makes all these three remedies ineffective for individuals.<br /> <br /> The civil remedies under the bill oust the jurisdiction of civil courts in favour of the system set up for penalties under the Information Technology Act. The existing penalties under the IT Act are deficient, as they were never intended to provide comprehensive privacy legislation. Even if they are amended, enforcement under the IT Act has never worked properly and shows no promise of improvement. Under it, the jurisdiction of civil courts is barred in favour of “adjudicating officers”. These officers are usually a serving IT secretary of the state government given additional charge to adjudicate cases under the IT Act. Though persons of high competence, a lack of resources and training handicaps not only their capacity but also the quality of judicial orders necessary to withstand review. Such scrutiny would naturally arise in appeal as provided under the IT Act — but, for the last three years, the Cyber Appellate Tribunal that hears such appeals has not been properly constituted and is not functioning.<br /> <br /> The problems with enforcement of criminal remedies are more straightforward: Only the UIDAI can make complaints for the offences contained under the Aadhaar bill. Not only is this a conflict of interest but it also takes away the Aadhaar user’s recourse to a criminal remedy. It may be argued that penal provisions under the IT Act and the IPC can be invoked by individuals. But such an assertion must consider the absence of any notification mechanism. The Aadhaar user is never informed when a crime relating to their data occurs. They will never have the particulars necessary to register a criminal complaint.<br /> <br /> This brings us to the final remedy of writs that can be availed of to enforce the fundamental and statutory rights available to a person. It would normally be expected that a person would be able to approach an HC for the enforcement of rights under the Aadhaar bill. Especially if the UIDAI does not provide authentication as it is intended to do, or fails to correct the data records. Most people know the poor quality of data entry in government IDs. Aadhaar requires a safeguard clearly conferring a right than can be enforced through a writ. However, these rights are problematically phrased as “requests” for supplying and correcting information. This dilution is made clear by the absence of the requirement of a hearing, a reasoned order or an appellate process under the bill.<br /> <br /> It is not without reason that the Justice Shah report suggested a comprehensive legislation to safeguard privacy and also the office of a central privacy commissioner to develop and apply it. Even when suggesting the establishment of a privacy commissioner, who could impose penalties for violations, it recognised the central role of existing judicial forums by retaining the jurisdiction of civil courts. While many may see privacy as the core issue in the Aadhaar programme, privacy itself transcends it. As our everyday lives become connected, a comprehensive privacy legislation is an essential safeguard. </div>', 'credit_writer' => 'The Indian Express, 29 March, 2016, http://indianexpress.com/article/opinion/columns/aadhaar-bill-the-basis-of-privacy/', 'article_img' => '', 'article_img_thumb' => '', 'status' => (int) 1, 'show_on_home' => (int) 1, 'lang' => 'EN', 'category_id' => (int) 16, 'tag_keyword' => '', 'seo_url' => 'the-basis-of-privacy-apar-gupta-4678980', 'meta_title' => null, 'meta_keywords' => null, 'meta_description' => null, 'noindex' => (int) 0, 'publish_date' => object(Cake\I18n\FrozenDate) {}, 'most_visit_section_id' => null, 'article_big_img' => null, 'liveid' => (int) 4678980, 'created' => object(Cake\I18n\FrozenTime) {}, 'modified' => object(Cake\I18n\FrozenTime) {}, 'edate' => '', 'tags' => [ [maximum depth reached] ], 'category' => object(App\Model\Entity\Category) {}, '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[hasErrors]' => false, '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'Articles' }, 'articleid' => (int) 30913, 'metaTitle' => 'LATEST NEWS UPDATES | The Basis Of Privacy -Apar Gupta', 'metaKeywords' => 'Privacy,Privacy Rights,aadhaar,Aadhaar (Targeted Delivery of Financial and Other Subsidies Benefits and Services) Bill (2016),UIDAI,uid', 'metaDesc' => ' -The Indian Express Aadhaar legislation points to the need for a comprehensive privacy law. Most of the debate on the Aadhaar bill has centred on the right to privacy. All five amendments suggested by the Rajya Sabha, subsequently rejected by the Lok...', 'disp' => '<div align="justify">-The Indian Express<br /><br /><em>Aadhaar legislation points to the need for a comprehensive privacy law.<br /></em><br />Most of the debate on the Aadhaar bill has centred on the right to privacy. All five amendments suggested by the Rajya Sabha, subsequently rejected by the Lok Sabha, had an element of this right within them. But the core deficiency rested not in the lack of protections in the Aadhaar bill but in the absence of a comprehensive privacy statute to develop and enforce them.<br /><br />We must look at both substantive protections and the procedure available to enforce them. Many people regard privacy as an amorphous concept, which is also why it is hard for them to visualise any harm to it. Recognising this problem, in 2012, the Justice A.P. Shah Committee suggested nine distinct principles canonising the right to privacy. An analysis of the Aadhaar bill shows that it does not even recognise some of these nine principles. For instance, take the principle of access; a person cannot in any instance demand access to their core biometric information under the Aadhaar bill.<br /><br />But greater difficulty exists in enforcing the laconic safeguards of the bill. Broadly, the three forms of judicial remedy usually enforced are civil, criminal and the writ jurisdiction of high courts and the Supreme Court. The Aadhaar bill makes all these three remedies ineffective for individuals.<br /><br />The civil remedies under the bill oust the jurisdiction of civil courts in favour of the system set up for penalties under the Information Technology Act. The existing penalties under the IT Act are deficient, as they were never intended to provide comprehensive privacy legislation. Even if they are amended, enforcement under the IT Act has never worked properly and shows no promise of improvement. Under it, the jurisdiction of civil courts is barred in favour of “adjudicating officers”. These officers are usually a serving IT secretary of the state government given additional charge to adjudicate cases under the IT Act. Though persons of high competence, a lack of resources and training handicaps not only their capacity but also the quality of judicial orders necessary to withstand review. Such scrutiny would naturally arise in appeal as provided under the IT Act — but, for the last three years, the Cyber Appellate Tribunal that hears such appeals has not been properly constituted and is not functioning.<br /><br />The problems with enforcement of criminal remedies are more straightforward: Only the UIDAI can make complaints for the offences contained under the Aadhaar bill. Not only is this a conflict of interest but it also takes away the Aadhaar user’s recourse to a criminal remedy. It may be argued that penal provisions under the IT Act and the IPC can be invoked by individuals. But such an assertion must consider the absence of any notification mechanism. The Aadhaar user is never informed when a crime relating to their data occurs. They will never have the particulars necessary to register a criminal complaint.<br /><br />This brings us to the final remedy of writs that can be availed of to enforce the fundamental and statutory rights available to a person. It would normally be expected that a person would be able to approach an HC for the enforcement of rights under the Aadhaar bill. Especially if the UIDAI does not provide authentication as it is intended to do, or fails to correct the data records. Most people know the poor quality of data entry in government IDs. Aadhaar requires a safeguard clearly conferring a right than can be enforced through a writ. However, these rights are problematically phrased as “requests” for supplying and correcting information. This dilution is made clear by the absence of the requirement of a hearing, a reasoned order or an appellate process under the bill.<br /><br />It is not without reason that the Justice Shah report suggested a comprehensive legislation to safeguard privacy and also the office of a central privacy commissioner to develop and apply it. Even when suggesting the establishment of a privacy commissioner, who could impose penalties for violations, it recognised the central role of existing judicial forums by retaining the jurisdiction of civil courts. While many may see privacy as the core issue in the Aadhaar programme, privacy itself transcends it. As our everyday lives become connected, a comprehensive privacy legislation is an essential safeguard.</div>', 'lang' => 'English', 'SITE_URL' => 'https://im4change.in/', 'site_title' => 'im4change', 'adminprix' => 'admin' ] $article_current = object(App\Model\Entity\Article) { 'id' => (int) 30913, 'title' => 'The Basis Of Privacy -Apar Gupta', 'subheading' => '', 'description' => '<div align="justify"> -The Indian Express<br /> <br /> <em>Aadhaar legislation points to the need for a comprehensive privacy law.<br /> </em><br /> Most of the debate on the Aadhaar bill has centred on the right to privacy. All five amendments suggested by the Rajya Sabha, subsequently rejected by the Lok Sabha, had an element of this right within them. But the core deficiency rested not in the lack of protections in the Aadhaar bill but in the absence of a comprehensive privacy statute to develop and enforce them.<br /> <br /> We must look at both substantive protections and the procedure available to enforce them. Many people regard privacy as an amorphous concept, which is also why it is hard for them to visualise any harm to it. Recognising this problem, in 2012, the Justice A.P. Shah Committee suggested nine distinct principles canonising the right to privacy. An analysis of the Aadhaar bill shows that it does not even recognise some of these nine principles. For instance, take the principle of access; a person cannot in any instance demand access to their core biometric information under the Aadhaar bill.<br /> <br /> But greater difficulty exists in enforcing the laconic safeguards of the bill. Broadly, the three forms of judicial remedy usually enforced are civil, criminal and the writ jurisdiction of high courts and the Supreme Court. The Aadhaar bill makes all these three remedies ineffective for individuals.<br /> <br /> The civil remedies under the bill oust the jurisdiction of civil courts in favour of the system set up for penalties under the Information Technology Act. The existing penalties under the IT Act are deficient, as they were never intended to provide comprehensive privacy legislation. Even if they are amended, enforcement under the IT Act has never worked properly and shows no promise of improvement. Under it, the jurisdiction of civil courts is barred in favour of “adjudicating officers”. These officers are usually a serving IT secretary of the state government given additional charge to adjudicate cases under the IT Act. Though persons of high competence, a lack of resources and training handicaps not only their capacity but also the quality of judicial orders necessary to withstand review. Such scrutiny would naturally arise in appeal as provided under the IT Act — but, for the last three years, the Cyber Appellate Tribunal that hears such appeals has not been properly constituted and is not functioning.<br /> <br /> The problems with enforcement of criminal remedies are more straightforward: Only the UIDAI can make complaints for the offences contained under the Aadhaar bill. Not only is this a conflict of interest but it also takes away the Aadhaar user’s recourse to a criminal remedy. It may be argued that penal provisions under the IT Act and the IPC can be invoked by individuals. But such an assertion must consider the absence of any notification mechanism. The Aadhaar user is never informed when a crime relating to their data occurs. They will never have the particulars necessary to register a criminal complaint.<br /> <br /> This brings us to the final remedy of writs that can be availed of to enforce the fundamental and statutory rights available to a person. It would normally be expected that a person would be able to approach an HC for the enforcement of rights under the Aadhaar bill. Especially if the UIDAI does not provide authentication as it is intended to do, or fails to correct the data records. Most people know the poor quality of data entry in government IDs. Aadhaar requires a safeguard clearly conferring a right than can be enforced through a writ. However, these rights are problematically phrased as “requests” for supplying and correcting information. This dilution is made clear by the absence of the requirement of a hearing, a reasoned order or an appellate process under the bill.<br /> <br /> It is not without reason that the Justice Shah report suggested a comprehensive legislation to safeguard privacy and also the office of a central privacy commissioner to develop and apply it. Even when suggesting the establishment of a privacy commissioner, who could impose penalties for violations, it recognised the central role of existing judicial forums by retaining the jurisdiction of civil courts. While many may see privacy as the core issue in the Aadhaar programme, privacy itself transcends it. As our everyday lives become connected, a comprehensive privacy legislation is an essential safeguard. </div>', 'credit_writer' => 'The Indian Express, 29 March, 2016, http://indianexpress.com/article/opinion/columns/aadhaar-bill-the-basis-of-privacy/', 'article_img' => '', 'article_img_thumb' => '', 'status' => (int) 1, 'show_on_home' => (int) 1, 'lang' => 'EN', 'category_id' => (int) 16, 'tag_keyword' => '', 'seo_url' => 'the-basis-of-privacy-apar-gupta-4678980', 'meta_title' => null, 'meta_keywords' => null, 'meta_description' => null, 'noindex' => (int) 0, 'publish_date' => object(Cake\I18n\FrozenDate) {}, 'most_visit_section_id' => null, 'article_big_img' => null, 'liveid' => (int) 4678980, 'created' => object(Cake\I18n\FrozenTime) {}, 'modified' => object(Cake\I18n\FrozenTime) {}, 'edate' => '', 'tags' => [ (int) 0 => object(Cake\ORM\Entity) {}, (int) 1 => object(Cake\ORM\Entity) {}, (int) 2 => object(Cake\ORM\Entity) {}, (int) 3 => object(Cake\ORM\Entity) {}, (int) 4 => object(Cake\ORM\Entity) {}, (int) 5 => object(Cake\ORM\Entity) {} ], 'category' => object(App\Model\Entity\Category) {}, '[new]' => false, '[accessible]' => [ '*' => true, 'id' => false ], '[dirty]' => [], '[original]' => [], '[virtual]' => [], '[hasErrors]' => false, '[errors]' => [], '[invalid]' => [], '[repository]' => 'Articles' } $articleid = (int) 30913 $metaTitle = 'LATEST NEWS UPDATES | The Basis Of Privacy -Apar Gupta' $metaKeywords = 'Privacy,Privacy Rights,aadhaar,Aadhaar (Targeted Delivery of Financial and Other Subsidies Benefits and Services) Bill (2016),UIDAI,uid' $metaDesc = ' -The Indian Express Aadhaar legislation points to the need for a comprehensive privacy law. Most of the debate on the Aadhaar bill has centred on the right to privacy. All five amendments suggested by the Rajya Sabha, subsequently rejected by the Lok...' $disp = '<div align="justify">-The Indian Express<br /><br /><em>Aadhaar legislation points to the need for a comprehensive privacy law.<br /></em><br />Most of the debate on the Aadhaar bill has centred on the right to privacy. All five amendments suggested by the Rajya Sabha, subsequently rejected by the Lok Sabha, had an element of this right within them. But the core deficiency rested not in the lack of protections in the Aadhaar bill but in the absence of a comprehensive privacy statute to develop and enforce them.<br /><br />We must look at both substantive protections and the procedure available to enforce them. Many people regard privacy as an amorphous concept, which is also why it is hard for them to visualise any harm to it. Recognising this problem, in 2012, the Justice A.P. Shah Committee suggested nine distinct principles canonising the right to privacy. An analysis of the Aadhaar bill shows that it does not even recognise some of these nine principles. For instance, take the principle of access; a person cannot in any instance demand access to their core biometric information under the Aadhaar bill.<br /><br />But greater difficulty exists in enforcing the laconic safeguards of the bill. Broadly, the three forms of judicial remedy usually enforced are civil, criminal and the writ jurisdiction of high courts and the Supreme Court. The Aadhaar bill makes all these three remedies ineffective for individuals.<br /><br />The civil remedies under the bill oust the jurisdiction of civil courts in favour of the system set up for penalties under the Information Technology Act. The existing penalties under the IT Act are deficient, as they were never intended to provide comprehensive privacy legislation. Even if they are amended, enforcement under the IT Act has never worked properly and shows no promise of improvement. Under it, the jurisdiction of civil courts is barred in favour of “adjudicating officers”. These officers are usually a serving IT secretary of the state government given additional charge to adjudicate cases under the IT Act. Though persons of high competence, a lack of resources and training handicaps not only their capacity but also the quality of judicial orders necessary to withstand review. Such scrutiny would naturally arise in appeal as provided under the IT Act — but, for the last three years, the Cyber Appellate Tribunal that hears such appeals has not been properly constituted and is not functioning.<br /><br />The problems with enforcement of criminal remedies are more straightforward: Only the UIDAI can make complaints for the offences contained under the Aadhaar bill. Not only is this a conflict of interest but it also takes away the Aadhaar user’s recourse to a criminal remedy. It may be argued that penal provisions under the IT Act and the IPC can be invoked by individuals. But such an assertion must consider the absence of any notification mechanism. The Aadhaar user is never informed when a crime relating to their data occurs. They will never have the particulars necessary to register a criminal complaint.<br /><br />This brings us to the final remedy of writs that can be availed of to enforce the fundamental and statutory rights available to a person. It would normally be expected that a person would be able to approach an HC for the enforcement of rights under the Aadhaar bill. Especially if the UIDAI does not provide authentication as it is intended to do, or fails to correct the data records. Most people know the poor quality of data entry in government IDs. Aadhaar requires a safeguard clearly conferring a right than can be enforced through a writ. However, these rights are problematically phrased as “requests” for supplying and correcting information. This dilution is made clear by the absence of the requirement of a hearing, a reasoned order or an appellate process under the bill.<br /><br />It is not without reason that the Justice Shah report suggested a comprehensive legislation to safeguard privacy and also the office of a central privacy commissioner to develop and apply it. Even when suggesting the establishment of a privacy commissioner, who could impose penalties for violations, it recognised the central role of existing judicial forums by retaining the jurisdiction of civil courts. While many may see privacy as the core issue in the Aadhaar programme, privacy itself transcends it. As our everyday lives become connected, a comprehensive privacy legislation is an essential safeguard.</div>' $lang = 'English' $SITE_URL = 'https://im4change.in/' $site_title = 'im4change' $adminprix = 'admin'
include - APP/Template/Layout/printlayout.ctp, line 8 Cake\View\View::_evaluate() - CORE/src/View/View.php, line 1413 Cake\View\View::_render() - CORE/src/View/View.php, line 1374 Cake\View\View::renderLayout() - CORE/src/View/View.php, line 927 Cake\View\View::render() - CORE/src/View/View.php, line 885 Cake\Controller\Controller::render() - CORE/src/Controller/Controller.php, line 791 Cake\Http\ActionDispatcher::_invoke() - CORE/src/Http/ActionDispatcher.php, line 126 Cake\Http\ActionDispatcher::dispatch() - CORE/src/Http/ActionDispatcher.php, line 94 Cake\Http\BaseApplication::__invoke() - CORE/src/Http/BaseApplication.php, line 235 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Routing\Middleware\RoutingMiddleware::__invoke() - CORE/src/Routing/Middleware/RoutingMiddleware.php, line 162 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Routing\Middleware\AssetMiddleware::__invoke() - CORE/src/Routing/Middleware/AssetMiddleware.php, line 88 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Error\Middleware\ErrorHandlerMiddleware::__invoke() - CORE/src/Error/Middleware/ErrorHandlerMiddleware.php, line 96 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Http\Runner::run() - CORE/src/Http/Runner.php, line 51
![]() |
The Basis Of Privacy -Apar Gupta |
-The Indian Express
Aadhaar legislation points to the need for a comprehensive privacy law. Most of the debate on the Aadhaar bill has centred on the right to privacy. All five amendments suggested by the Rajya Sabha, subsequently rejected by the Lok Sabha, had an element of this right within them. But the core deficiency rested not in the lack of protections in the Aadhaar bill but in the absence of a comprehensive privacy statute to develop and enforce them. We must look at both substantive protections and the procedure available to enforce them. Many people regard privacy as an amorphous concept, which is also why it is hard for them to visualise any harm to it. Recognising this problem, in 2012, the Justice A.P. Shah Committee suggested nine distinct principles canonising the right to privacy. An analysis of the Aadhaar bill shows that it does not even recognise some of these nine principles. For instance, take the principle of access; a person cannot in any instance demand access to their core biometric information under the Aadhaar bill. But greater difficulty exists in enforcing the laconic safeguards of the bill. Broadly, the three forms of judicial remedy usually enforced are civil, criminal and the writ jurisdiction of high courts and the Supreme Court. The Aadhaar bill makes all these three remedies ineffective for individuals. The civil remedies under the bill oust the jurisdiction of civil courts in favour of the system set up for penalties under the Information Technology Act. The existing penalties under the IT Act are deficient, as they were never intended to provide comprehensive privacy legislation. Even if they are amended, enforcement under the IT Act has never worked properly and shows no promise of improvement. Under it, the jurisdiction of civil courts is barred in favour of “adjudicating officers”. These officers are usually a serving IT secretary of the state government given additional charge to adjudicate cases under the IT Act. Though persons of high competence, a lack of resources and training handicaps not only their capacity but also the quality of judicial orders necessary to withstand review. Such scrutiny would naturally arise in appeal as provided under the IT Act — but, for the last three years, the Cyber Appellate Tribunal that hears such appeals has not been properly constituted and is not functioning. The problems with enforcement of criminal remedies are more straightforward: Only the UIDAI can make complaints for the offences contained under the Aadhaar bill. Not only is this a conflict of interest but it also takes away the Aadhaar user’s recourse to a criminal remedy. It may be argued that penal provisions under the IT Act and the IPC can be invoked by individuals. But such an assertion must consider the absence of any notification mechanism. The Aadhaar user is never informed when a crime relating to their data occurs. They will never have the particulars necessary to register a criminal complaint. This brings us to the final remedy of writs that can be availed of to enforce the fundamental and statutory rights available to a person. It would normally be expected that a person would be able to approach an HC for the enforcement of rights under the Aadhaar bill. Especially if the UIDAI does not provide authentication as it is intended to do, or fails to correct the data records. Most people know the poor quality of data entry in government IDs. Aadhaar requires a safeguard clearly conferring a right than can be enforced through a writ. However, these rights are problematically phrased as “requests” for supplying and correcting information. This dilution is made clear by the absence of the requirement of a hearing, a reasoned order or an appellate process under the bill. It is not without reason that the Justice Shah report suggested a comprehensive legislation to safeguard privacy and also the office of a central privacy commissioner to develop and apply it. Even when suggesting the establishment of a privacy commissioner, who could impose penalties for violations, it recognised the central role of existing judicial forums by retaining the jurisdiction of civil courts. While many may see privacy as the core issue in the Aadhaar programme, privacy itself transcends it. As our everyday lives become connected, a comprehensive privacy legislation is an essential safeguard. |