top of page
  • Mahek Bardiya

“Balancing Innovation of Data Privacy and Legal Standards in the Age of AI”

Mahek Bardiya,

Navrachana University

Balancing Innovation of Data Privacy and Legal Standards in the Age of AI

INTRODUCTION

Data Privacy and Surveillance Laws have currently been a vital issue at the nexus of law, technology and society in an era distinguished by unrivaled advances in technology and digital proliferation. A huge amount of data about individuals has been preserved, collected and analyzed as people who engage in a growing number of digital activities.This generates significant questions regarding security, privacy and ethical utilization of data.

The conflict between safeguarding people’s right to privacy in the age of technology and permitting appropriate methods of surveillance creates significant obstacles for authorities all over the world. In a period of incredible technical progress and universal digital connectivity, challenges regarding data privacy as well as surveillance have been taken on a paramount significance. Considering the growing reliance of society on digital technology ensuring one’s privacy is now recognised as a critical issue.

Original documents also need to be protected from dangers hence, document safety applies beyond electronic information. Physical documents can be secured from loss or damage with the help of secure storage facilities like lockable filing cabinets. Placing the documents safely and securely can also help in making it simpler to organize, share and have access to records.

LANDMARK JUDGEMENTS REGARDING DATA PRIVACY

· In the landmark judgment of Justice K.S. Puttuswamy v. Union of India[i], the Supreme Court held that the right to privacy is intrinsic to the right to life and liberty guaranteed by Article 21[ii]. The impact of this laid the foundation for the creation of comprehensive data protection legislation in India and influenced subsequent legal and policy developments that included drafting the Personnel Data Protection Bill and imposing strict limitations on the Aadhar Scheme.

· In another leading case of Shreya Singhal v. Union of India[iii], where the constitutionality of Section 66A[iv] of the Information Technology Act, 2000 was been challenged. The Supreme Court criminalized the sending of “offensive” messages through communication services. It struck down Section 66A, deeming it vague, overly broad and a violation of the right to freedom of speech and expression under Article 19(1)(a)[v] of a Constitution. The implications of this also showed the importance of protecting freedom of expression in the digital realm and emphasized the need for clear and precise laws that do not infringe on fundamental rights, indirectly impacting data privacy considerations.

· The Court overruled Shreya Singhal and reinforced the importance of internet access as a part of fundamental rights and set guidelines for imposing restrictions, contributing to the broader discourse on digital rights and data privacy in the case of Anuradha Bhasin v. Union of India[vi]. The Supreme Court ruled that the freedom to access the internet is a fundamental right under Article 19(1)(a) and also Article 19(1)(g) of the Constitution. The court stated that any restrictions must be temporary, necessary and proportionate and must be periodic reviews.

EVOLVING PRIVACY LANDSCAPES

These landmark judgments reflect the Indian judiciary's evolving approach to data privacy, balancing state interests with individual rights. They highlight the need for strong legislative frameworks to protect personal data and ensure that privacy is respected in the digital age. The accelerating pace of virtual innovation provides giant demanding situations to current privacy laws, necessitating sensitive stability among technological development and the safety of man or woman rights.[vii]

Discussing in regards to “Biometric Data and Privacy Concerns” – Biometric identification structures are enchanting for their promise of extraordinary security and convenience. They authorize personnel features uniquely like your fingerprints, voice, face, iris and even stride which are tough to a greater extent to borrow or replicate in contrast to standard Passwords or PINs.[viii] This has set in motion the quick adoption of biometric authentication throughout sectors, from regulation enforcement and border management to company safety and patron electronics. Technological leaps have coupled with consumer enthusiasm for greater seamless and incorporated experiences, fueling this fast integration. Unquestionably, biometrics can streamline identity techniques and pose a hurdle for ability hackers, however, this innovation additionally comes at an ability value that calls for eager attention. In recent years, data breaches have become a global concern, intensifying the focus on data protection and leading to more stringent enforcement measures worldwide.[ix] Also, the proliferation of more modern-era developments like AI and IoT has sparked discussions around new styles of private data, necessitating extra legislative measures.

CORNERSTONES OF DATA PRIVACY REGULATIONS

To safeguard and develop legislative frameworks, the principles of Consent, Trust and Value have critical significance in the realm of data privacy and surveillance laws.[x]

Primarily, Consent is a fundamental component of data privacy regulations, ensuring that the users maintain control over their data. Individuals have the authority to determine how their data is been collected, utilized, shared or gathered through transparent and clear consent methods.[xi] These principles foster assurance within individuals and organizations that manage personal details by emphasizing openness and accountability in data management procedures. In addition, the successful application of the security of information requires trust. Firms ought to establish that they are committed to safeguarding citizen’s right to privacy while adhering to ethical standards while handling information. Trust can be built and sustained within entities and their patrons, the general public and clients through compliance with legal obligations or restrictions. Along with, acting as a fundamental component of privacy protection, trust is also an important variable in promoting user trust.

Beyond just complying with the regulations, privacy rights are necessary as they promote the basic morals of freedom, autonomy and dignity. By imposing obligations on accumulating, using and storing the data, privacy laws seek to uphold these rights while seeking freedom for people as well as prevention against unauthorized access to private affairs.[xii] The basic importance of privacy underscores the crucialness of supervising mechanisms with legislative reforms in order to maintain the place of these rights as the world is becoming more dependent on data. Therefore, the efficacy of data privacy and surveillance laws is highly dependent on the concepts of Consent, Trust and Value. Legal structures might successfully achieve a balance between the need for data-driven innovation and the upkeep of the individual’s right to privacy by prioritizing informed consent, establishing trust through open and reliable steps and recognizing the intrinsic importance of privacy rights.[xiii] These recommendations provide an outline of how to make data privacy laws remain to be needed, efficient and adapted to the shifting needs of the “contemporary dight age”,

PREREQUISITES FOR ENSURING DATA CONFIDENTIALITY

The security of information includes – a person’s privacy and intellectual knowledge along with procedures to avoid illegal access and exposure of shared data. Lapses of data confidentiality can also result in a data breach that can impact the organization’s cash flows, reputation and finances.[xiv]

Discussing in regards with how synthetic data helps in promoting data confidentiality – “Artificial data created to approximate the features and arrangement of the actual information are termed Synthetic Data”. Synthetic data exploration has demonstrated interest in constructing the implementation of some governmental statistics that are inappropriate for open data. Without endangering the data confidentiality and privacy of and individual through the use of a synthetic database, scholars and policymakers may obtain and evaluate limited or highly classified information without any fear.[xv] Synthetic data also promotes the validation and exploration the novel ideas and methodologies by generating realistic statistical attributes of raw data.[xvi]

ROLE OF AI IN DATA COMPLIANCES AND SURVEILLANCE REGULATIONS

As per the observations, AI can become a trouble-makers in our day-to-day life and risk in business. As algorithms based on machine learning techniques, which analyse and foresee consumer behaviour are instances of AI that have been using for a while, generative AI learning models provide new, revolutionary capabilities which are packaged as a user-friendly interface that anyone can use since all that needs to be a straightforward written prompt or instruction.[xvii]

AI is utilized in confirming invoice surveillance on distributed chains and ensuring healthcare conformity in order to guarantee those requirements are being followed. Forecasting risk assessment improves with things like evaluating risk for borrowing guidelines through the use of prior collected data/ information for estimating possible threats. AI has also been used in enhancing the safety protocols in fraud prevention by transactional tracking, verifying the identity or money laundering.[xviii] Regulations have been dynamic as they transform the changes in societal needs, to interaction with emerging threats and technical breakouts.[xix] Enterprises have to participate in continuous analysis, monitoring and adjustment to ensure with some of the most adherence to new laws and regulations that are required to stay functional.

CONCLUSION

Essentially, laws dealing with the Data Privacy and Surveillance are crucial in modern society, accepting the safeguarding the citizen’s privacy while enabling the necessary surveillance activities required to guarantee public safety and security in a world that is becoming more correlated and data-driven. Appropriate rules and regulations should ultimately establish a careful relationship between an individual’s privacy rights and security imperatives.

Despite the importance of upholding an individual’s privacy right in these digital ages, “encryption” is under threat. The report recommends the government refrain themselves from adopting methods that might undermine encryption, such as mandating backdoors, that offer access to a person’s encrypted data or utilizing client – side screening,  the meticulous screening of people’s devices. [xx]

REFERENCES

[i] Justice K.S. Puttuswamy&Anr. v. Union of India &Ors. 2017 10 SCC 1.

[ii] INDIAN CONST, art. 21. (“Protection of life and personal liberty - No person shall be deprived of his life or personal liberty except according to procedure established by law.”)

[iii] Shreya Singhal v. Union of India AIR 2015 SC 1523.

[iv] ITA 2000, Sec. 66A. (“Any person who sends, by means of a computer resource or a communication device,-

(a) any information that is grossly offensive or has menacing character; or

(b) any information which he knows to be false, but for the purpose of causing annoyance, inconvenience, danger, obstruction, insult, injury, criminal intimidation, enmity, hatred or ill will, persistently by making use of such computer resource or a communication device; or

(c) any electronic mail or electronic mail message for the purpose of causing annoyance or inconvenience or to deceive or to mislead the addressee or recipient about the origin of such messages,

shall be punishable with imprisonment for a term which may extend to three years and with fine.”)

[v] INDIAN CONST, art. 19(1)(a). (“Protection of certain rights regarding freedom of speech, etc.

(1) All citizens shall have the right-

(a) to freedom of speech and expression.

[vi] Anuradha Bhasin v. Union of India 2020 3 SCC 637.

[vii] Arun Singla, The Evolving Landscape of Privacy Law: Balancing Digital Innovation and Individual Rights, Indian Journal of Law, Vol. 2 No. 1 (2024): Volume 2, (Feb 2024), https://law.shodhsagar.com/index.php/j/article/view/13.

[viii] Ivan Reyes, The Rise of Biometric Identification, Biometric Privacy: Balancing Security and User Rights, (Jan 25, 2024), https://bioconnect.com/2024/01/25/biometric-privacy-balancing-security-and-user-rights/.

[ix]Digital Privacy, Emerging Trends in Global Privacy Standards, Emerging Data Privacy Laws and Regulations Around the World, (Jan 22),https://digitalprivacy.ieee.org/publications/topics/emerging-data-privacy-laws-and-regulations-around-the-world.

[x] HIVO, Discover the significance of data privacy in consent management and how it plays a crucial role in safeguarding personal information, The Importance of Data Privacy in Consent Management, (Oct 15, 2023), https://hivo.co/blog/the-importance-of-data-privacy-in-consent-management - :~:text=Consent%20serves%20as%20the%20foundation%20for%20ethical%20data,can%20be%20considered%20a%20violation%20of%20privacy%20rights.

[xi] Griet Verheneman, Chapter I – Informed Consent, a Means to Empower the Patient? CAMBRIDGE UNIVERSITY PRESS, (May 25, 2021), https://www.cambridge.org/core/books/patient-data-protection-and-changing-healthcare-models/informed-consent-a-means-to-empower-the-patient/9E7B52E4C4366E259091FFD6D42F5791.

[xii] THE DIGITAL PERSONAL DATA PROTECTION ACT, 2023 Act 22 of 2023.

[xiii] Isabel Ebert, Isabelle Wildhaber, Jeremias Adams-Prassl, Big Data in the workplace: Privacy due to Diligence as a human rights-based approach to employee privacy protection, (May 05, 2021) https://journals.sagepub.com/doi/10.1177/20539517211013051.

[xiv]Data Confidentiality: Identifying and Protecting Assets Against Data Breaches, National Cybersecurity Centre of Excellence,NCCoE, (Feb 23, 2024),https://www.nccoe.nist.gov/data-confidentiality-identifying-and-protecting-assets-against-data-breaches.

[xv]General Publications, Digital financial services: synthetic data ensures compliance with confidentiality requirements, JOINT RESEARCH CENTRE (Mar 20, 2024) https://joint-research-centre.ec.europa.eu/jrc-news-and-updates/digital-financial-services-synthetic-data-ensures-compliance-confidentiality-requirements-2024-03-20_en.

[xvi]Enabling Data-driven Innovation, Unleashing the Power of Privacy – Preserving Insights with Synthetic Data, HYPERSCIENCE (May 18, 2023) https://www.hyperscience.com/blog/unleashing-the-power-of-privacy-preserving-insights-with-synthetic-data/.

[xvii] Schellman, What is Artificial Intelligence, Artificial Intelligence and Cybersecurity: What to Know Right Now, CLOUD SECURITY ALLIANCE, (Mar 03, 2024), https://cloudsecurityalliance.org/articles/artificial-intelligence-and-cybersecurity-what-to-know-right-now.

[xix]LeewayHertz, The Continuous evolution of regulations, Transforming Compliance Management: The Role of Generative AI in Navigating Regulatory Complexity, Nerd For Tech (Dec 28, 2023) https://medium.com/nerd-for-tech/transforming-compliance-management-the-role-of-generative-ai-in-navigating-regulatory-complexity-08913e5ea713.

[xx]Spyware and surveillance: Threats to privacy and human rights growing, UN report warns, UNITED NATIONS,  (Sept 16, 2022), https://www.ohchr.org/en/press-releases/2022/09/spyware-and-surveillance-threats-privacy-and-human-rights-growing-un-report.

64 views1 comment

Recent Posts

See All

1 Comment


Arham jain
Arham jain
Jul 16

Great research and very informative. Good content

Like
bottom of page