An Analysis of Puttaswamy: The Supreme Court's Privacy Verdict

By Vrinda Bhandari, Amba Kak, Smriti Parsheera and Faiza Rahman

By Vrinda Bhandari, Amba Kak, Smriti Parsheera and Faiza Rahman

An Analysis of Puttaswamy: The Supreme Court's Privacy Verdict

Introduction


On 24th August 2017, a nine-judge bench of the Supreme Court in Justice K.S. Puttaswamy vs  Union of India passed a historic judgment affirming the constitutional right to privacy. It declared privacy to be an integral component of Part III of the Constitution of India, which lays down our fundamental rights, ranging from rights relating to equality (Articles 14 to 18); freedom of speech and expression (Article 19(1)(a)); freedom of movement (Article 19(1)(d)); protection of life and personal liberty (Article 21) and others. These fundamental rights cannot be given or taken away by law, and all laws and executive actions must abide by them.

The Supreme Court has, however, clarified that like most other fundamental rights, the right to privacy is not an "absolute right". Subject to the satisfaction of certain tests and benchmarks, a person's privacy interests can be overridden by competing state and individual interests. This post discusses the tests that have been laid down by the Supreme Court in the Puttaswamy case, against which privacy infringements will be evaluated going forward. Based on this analysis, the post argues that a majority of the judges in this decision have agreed that the European standard of proportionality shall be applied to test privacy infringements in the future. However, the rigor and technicality with which this doctrine is applied will depend on the nature of the competing interests in question and will evolve on a case by case basis. At the very least, any impugned action will continue to be tested on the "just, fair and reasonable" standard evolved under Article 21 of the Constitution. However, before we delve into the standards laid down by the Court, it is important to understand why the Supreme Court was called upon to decide if we have a fundamental right to privacy and how to read the decision it finally delivered.

Why was a nine-judge bench constituted to decide upon the right to privacy?


The question of whether or not privacy is a fundamental right first arose in 2015 before a three-judge bench of the Supreme Court considering the constitutional challenge to the Aadhaar framework. The Attorney General had then argued that although a number of Supreme Court decisions had recognised the right to privacy, Part III of the Constitution does not guarantee such a fundamental right since larger benches of the Court in M.P Sharma (8 judge bench) and Kharak Singh (6 judge bench), had refused to accept that the right to privacy was constitutionally protected. Consequently, this bench referred the matter to a five-judge bench to ensure "institutional integrity and judicial discipline". Thereafter, the five-judge bench referred the constitutional question to an even larger bench of nine judges to pronounce authoritatively on the status of the right to privacy.

How do we read the Puttaswamy judgment?


The judgment, spanning 547 pages, contains six opinions and a lot of interesting observations. At the outset, however, it is important to note that only the majority opinion in a judgment is binding on future cases. In this case, Chandrachud J. wrote the plurality opinion, on behalf of four judges (Kehar C.J., Agrawal J., Nazeer J., and himself), while the remaining five judges (Nariman J., Kaul J., Bobde J., Sapre J., and Chelameswar J.) wrote concurring opinions. Thus, while Justice Chandrachud's opinion is the "plurality" opinion, it does not constitute the majority, since it has not been signed by a total of five or more judges. Similarly, the concurring opinions too, are not binding and do not constitute 'precedent' for future cases. Thus, the operative part of the judgment, i.e. the binding part, is only the order that has been signed by all nine judges, which holds: 

The eight-judge bench decision in M P Sharma (1954), which held that the right to privacy is not protected by the Constitution stands over-ruled;

The Court's subsequent decision in Kharak Singh (1962) also stands over-ruled to the extent that it holds that the right to privacy is not protected under the Constitution;

The right to privacy is protected as an intrinsic part of the right to life and personal liberty under Article 21 and as a part of the freedoms guaranteed by Part III of the Constitution; and

The body of case law that developed subsequent to Kharak Singh, recognizing the right to privacy, enunciated the correct position of law.

It is a well-settled legal principle that a case is only an authority for what it actually decides, not any observations made in the course of the judgment or any propositions that may logically follow from it. Hence, to determine what aspects of the judgment are binding, it is important to examine each opinion and see the point of agreement amongst a majority of the nine judges. So, if any judge agrees with a view taken by Chandrachud J. on any proposition, that would result in a majority of five out of nine, and hence, be binding on smaller benches and other courts. For instance, since a majority of the judges agree that privacy is an inalienable, natural right, that forms part of the binding element of the case.

With this in mind, let us now examine each of the opinions in Puttaswamy to see what they hold, how they construe the right to privacy, and what standard of judicial review they apply.

The Court's (multiple) views on privacy


Writing the plurality opinion, Chandrachud J., holds that the right to privacy is not independent of the other freedoms guaranteed by Part III of the Constitution. It is an element of human dignity and is an inalienable natural right. He focuses on the informational aspect of privacy, its connection with human dignity and autonomy, and rejects the argument that privacy is an elitist construct. During the course of his opinion, Chandrachud J. makes several observations about privacy in the digital economy, dangers of data mining, positive obligations on the State, and the need for a data protection law. He also raises an important point about the negative and positive elements of privacy. The former restricts the State from unfairly interfering in the privacy of individuals, while the latter obliges it to put in place a legislative framework to restrict others from doing so.

Chelameswar J. on the other hand, grounds the right to privacy, as comprising of three facets, namely repose (freedom from unwarranted stimuli), sanctuary (protection from intrusive observation) and intimate decision (autonomy to make personal life decisions). Nariman J. too endorses Gary Bostwick's conceptual understanding of privacy as encompassing "repose, sanctuary, and intimate decision". He gives further content to the right by classifying it into three categories: (1) that which involves invasion by the State into a person's physical body, (2) information privacy which captures unauthorised uses of personal information, and (3) privacy of choice, or "individual autonomy over fundamental personal choices".

For Bobde J., fundamental rights have two aspects - first, to restrict legislative powers and second, to provide the conditions for the development and dignity of individuals. Thus, similar to Chandrachud J., he recognizes both the positive and negative aspects of enforcing fundamental rights, although he is clear that fundamental rights claims (as opposed to other laws) fall squarely on the State.

Kaul J., on the other hand, recognizes the claims of privacy against the State and non-State actors. In respect of the State, he identifies concerns of surveillance and profiling, whereas, in respect of non-State actors, he emphasizes on the impact of technology, in the form of pervasive data generation, collection, and use in a digital economy. Kaul J. also elaborates on the influence of big data, in particular, its impact on the actions of an individual and the resultant chilling effect it may have on free speech and expression. He thus observes the need to protect certain information from both the State as well as private actors. Finally, Sapre J. focuses his opinion on the importance of the Preamble to the Constitution, and the principles of liberty, dignity, and fraternity enshrined therein.

Given the Court's varying conceptions of privacy, it is easy to understand why the suggested standards for evaluating an infringement of the right also varied so widely. We turn to this in the next section.

Tests for infringement of privacy


After a bumpy start in the MP Singh and Kharak Singh cases referred to above, the Supreme Court's jurisprudence on privacy evolved to accept that privacy forms an integral part of "personal liberty" under Article 21 of the Constitution, which cannot be denied except through a "procedure established by law". The Supreme Court has clarified this to mean that the procedure prescribed by law must necessarily be "just, fair and reasonable". How this, and other standards of judicial review, will apply in the case of intrusion by the State into the right privacy, was the subject matter of much discussion in the various opinions in Puttaswamy. This section discusses some of the key observations.

The judgment written by Chelameswar J. provides a good overview by highlighting that the requirement of reasonableness pervades throughout Part III, albeit operating slightly differently for different fundamental rights. Accordingly, he suggests a "menu" of tests that can be used in privacy cases, depending on the underlying rights that are affected. Thus, a violation of privacy in the context of an arbitrary State action would attract a "reasonableness" enquiry under Article 14; similarly, privacy invasions that implicate Article 19 freedoms would have to fall under the specified restrictions under this constitutional provision like public order, obscenity etc; and finally, intrusion into life or personal liberty under Article 21, which forms the "bedrock of the privacy guarantee", would have to be just, fair and reasonable. For instance, over-broad telephone-tapping regulations would implicate both a citizen's freedom of speech (Article 19(1)(a)) as well as her personal liberty (Article 21). Under the Court's analysis, such a law would have to be justifiable under one of the specific restrictions in Article 19(2), in addition to being "fair, just and reasonable" as required by Article 21, as was held in the PUCL case.

Notably, Justice Chelameswar also includes a fourth test for privacy claims which deserve the "highest standard of scrutiny" and can be justified only in case of a "compelling state interest". Borrowing the strict scrutiny standard, typically reserved for discrimination cases in the U.S., he notes that there exists a category of privacy claims which must satisfy not just the tests of being "just, fair and reasonable" under Article 21, but also a higher level of importance in terms of the government's interest in the privacy intrusion. While laying down this higher standard of scrutiny, Chelameswar J., however, stops short of illustrating what sort of actions could fall under this category, and what would be the trigger for the application of this test. These issues have been left open for future Courts to deal with.

Nariman J. adds to this analysis by giving several examples to emphasize that the restrictions on privacy will need to be tested based on the combination of rights being infringed. For example, if the violation is of Article 21 read with Article 14 (right to equality), then tests of arbitrariness and unreasonableness will apply; or under Article 21 read with Article 19(1) (a) (freedom of speech), then the impugned law/policy will have to relate to the reasonable restrictions specified in Article 19(2), as described in the wiretapping example above. Thus, Nariman J., rather than elucidating a test, only clarifies that the analysis will be case by case - based on existing jurisprudence under the relevant fundamental right that is invoked. In a similar vein, Bobde J. states that privacy infringements will have to answer the tests under those particular freedoms "in addition to the one applicable to Article 21".

Borrowing vaguely from the restrictions on the right to privacy as specified under the European Convention on Human Rights (Article 8), Sapre J. brings in a slightly different perspective. He notes that the State can impose reasonable restrictions on the right to privacy "on the basis of social, moral and compelling public interest in accordance with law". If Sapre J. is indeed articulating a new test, it is unclear where its textual basis lies in the Indian Constitution, given that many fundamental rights, such as the freedom of speech and expression, do not recognize public interest as a valid restriction. Moreover, such an articulation lacks clarity on what standards will apply to judge the "social, moral, and compelling public interest" or how this would interact with Chelameshwar J's "compelling state interest" test. It may thus be better understood as a general articulation of the Article 19 standard for reasonable restrictions, which will apply differently based on the specific right that has been infringed.

Interestingly, two of the judgments (representing the views of five judges) provide more teeth in terms of how existing tests under Article 21 should be interpreted. Drawing from the concept of proportionality that is used to balance rights and competing interests under European law, Chandrachud J., notes that any invasion of life or personal liberty must meet the three requirements of (a) legality, i.e. there must be a law in existence; (b) legitimate aim, which he illustrates as including goals like national security, proper deployment of national resources, and protection of revenue; and (c) proportionality of the legitimate aims with the object sought to be achieved. Although Chandrachud J. has used the term "proportionality", he stops short of actually adopting the very technical European proportionality standard, with its focus on narrow tailoring and least restrictive means.

Kaul J.'s "proportionality" test differs slightly from Chandrachud J. It requires (a) legality, (b) necessity (narrow tailoring) and (c) proportionality, which is closer to the European standard. He adds to this the fourth element of (d) procedural safeguards against abuse of interference with rights, which echoes Article 21's central requirement of having a "procedure established by law".

How then do we read the majority opinion on the judicial review standard adopted in Puttaswamy? One way of reading the judgment could be through the proportionality standard espoused by Chandrachud J. and elaborated by Kaul J. According to this, the four elements of the judicial review standard are as follows, although it is relevant to note that the additional observations made by Kaul J. do not constitute part of the "majority view":

Legality: The existence of a law.

Legitimate Goal: The law should seek to achieve a legitimate state aim (Chandrachud J.). The proposed action must be necessary for a democratic society for a legitimate aim (Kaul J.). Justice Kaul's opinion can be read to espouse the EU narrow tailoring test.

Proportionality: There should be a rational nexus between the objects and the means adopted to achieve them (Chandrachud J.). The extent of interference must be proportionate to its need (Kaul J.).

Procedural Guarantees: To check against the abuse of State interference (Kaul J.)

There was unanimity amongst the nine judges that privacy is not an absolute right, although the basis for assessing violations is less clear. While the content and applicability of the aforesaid proportionality test will be determined by subsequent decisions, what is certain is that privacy claims will be tested against the existing standards applicable under the Constitution or developed by Courts for different categories of fundamental rights. At the very least, the impugned action should satisfy the test of "just, fair and reasonable" procedure under Article 21 of the Constitution.


Conclusion


The Court's broad interpretation of the right to privacy has paved the way for a wide range of claims. While the exact boundaries of the right will continue to develop on a case by case basis, it is clear that privacy claims will often have to be weighed against other competing interests. In the absence of a defined hierarchy among the various rights guaranteed under Part III of the Constitution, the decision in each case will vary based on facts at hand and the judicial interpretation. For instance, can the dignity of a married woman, which is central to her privacy and liberty, be infringed by a law on marital rape so as to shield the "private affairs" of the family? Does the efficiency of having a meta-database of information on all citizens trump the autonomy of those who resist its adoption? Can an individual's "right to be forgotten" on the Internet override the open information needs of many others? In fact, just last week, a PIL was filed before the Delhi High Court that the restitution of conjugal rights provision in the Hindu Marriage Act and Special Marriage Act is violative of the right to privacy. The real test of privacy will lie in how subsequent Courts apply the Puttaswamy decision to determine these varied questions.

About the Authors:

Vrinda Bhandari is a practicing advocate in New Delhi.

Amba Kak is a Mozilla Technology Policy Fellow.

Smriti Parsheera and Faiza Rahman are researchers at the National Institute of Public Finance & Policy.

This research paper was first published at Dr. Ajay Shah’s Blog on September 20, 2017.

All rights reserved by the author and original publisher.
Name

-51,1,3D Technology,2,5G,9,Abkhazia,2,Abortion Laws,1,Academics,10,Accidents,21,Activism,1,Adani Group,5,ADB,13,ADIZ,1,Adults,1,Advertising,31,Advisory,2,Aerial Reconnaissance,13,Aerial Warfare,35,Aerospace,5,Afghanistan,88,Africa,112,Agile Methodology,2,Agriculture,20,AI Policy,1,Air Crash,10,Air Defence Identification Zone,1,Air Defense,7,Air Force,29,Air Pollution,1,Airbus,5,Aircraft Carriers,5,Aircraft Systems,5,Al Nusra,1,Al Qaida,4,Al Shabab,1,Alaska,1,ALBA,1,Albania,2,Algeria,3,Alibaba,1,American History,4,AmritaJash,10,Antarctic,1,Antarctica,1,Anthropology,7,Anti Narcotics,12,Anti Tank,1,Anti-Corruption,4,Anti-dumping,1,Anti-Piracy,2,Anti-Submarine,1,Anti-Terrorism Legislation,1,Antitrust,2,APEC,1,Apple,2,Applied Sciences,2,AQAP,2,Arab League,3,Architecture,3,Arctic,6,Argentina,7,Armenia,30,Army,3,Art,3,Artificial Intelligence,81,Artillery,2,Arunachal Pradesh,2,ASEAN,12,Asia,70,Asia Pacific,23,Assassination,2,Asset Management,1,Astrophysics,2,ATGM,1,Atmospheric Science,1,Atomic.Atom,1,Augmented Reality,7,Australia,57,Austria,1,Automation,13,Automotive,129,Autonomous Flight,2,Autonomous Vehicle,3,Aviation,63,AWACS,2,Awards,17,Azerbaijan,16,Azeri,1,B2B,1,Bahrain,9,Balance of Payments,2,Balance of Trade,3,Balkan,10,Balochistan,2,Baltic,3,Baluchistan,8,Bangladesh,28,Banking,53,Bankruptcy,2,Basel,1,Bashar Al Asad,1,Battery Technology,3,Bay of Bengal,5,BBC,2,Beijing,1,Belarus,3,Belgium,1,Belt Road Initiative,3,Beto O'Rourke,1,BFSI,1,Bhutan,13,Big Data,30,Big Tech,1,Bilateral Cooperation,19,BIMSTEC,1,Biography,1,Biotechnology,3,Birth,1,BISA,1,Bitcoin,9,Black Lives Matter,1,Black Money,3,Black Sea,2,Blockchain,32,Blood Diamonds,1,Bloomberg,1,Boeing,21,Boko Haram,7,Bolivia,6,Bomb,3,Bond Market,2,Book,11,Book Review,24,Border Conflicts,11,Border Control and Surveillance,7,Bosnia,1,Brand Management,14,Brazil,104,Brexit,22,BRI,5,BRICS,20,British,3,Broadcasting,16,Brunei,3,Brussels,1,Buddhism,1,Budget,4,Build Back Better,1,Bulgaria,1,Burma,2,Business & Economy,1203,C-UAS,1,California,5,Call for Proposals,1,Cambodia,7,Cameroon,1,Canada,54,Canadian Security Intelligence Service (CSIS),1,Carbon Economy,9,CAREC,1,Caribbean,10,CARICOM,1,Caspian Sea,2,Catalan,3,Catholic Church,1,Caucasus,9,CBRN,1,Cement,1,Central African Republic,1,Central Asia,82,Central Asian,3,Central Eastern Europe,48,Certification,1,Chad,2,Chanakya,1,Charity,2,Chatbots,2,Chemicals,7,Child Labor,1,Child Marriage,1,Children,4,Chile,10,China,580,Christianity,1,CIA,1,CIS,5,Citizenship,2,Civil Engineering,2,Civil Liberties,5,Civil Rights,2,Civil Society,5,Civil Unrest,1,Civilization,1,Clean Energy,5,Climate,67,Climate Change,24,Climate Finance,2,Clinical Research,3,Clinton,1,Cloud Computing,44,Coal,6,Coast Guard,3,Cocoa,1,Cognitive Computing,12,Cold War,5,Colombia,15,Commodities,4,Communication,11,Communism,3,Compliance,1,Computers,40,Computing,1,Conferences,1,Conflict,109,Conflict Diamonds,1,Conflict Resolution,48,Conflict Resources,1,Congo,1,Construction,5,Consumer Behavior,4,Consumer Price Index,5,COP26,4,COP28,1,COP29,1,Copper,2,Coronavirus,107,Corporate Communication,1,Corporate Governance,4,Corporate Social Responsibility,4,Corruption,4,Costa Rica,2,Counter Intelligence,15,Counter Terrorism,81,COVID,9,COVID Vaccine,6,CPEC,8,CPG,4,Credit,2,Credit Rating,1,Credit Score,1,Crimea,4,CRM,1,Croatia,2,Crypto Currency,16,Cryptography,1,CSTO,1,Cuba,7,Culture,5,Currency,8,Customer Relationship Management,1,Cyber Attack,7,Cyber Crime,2,Cyber Security & Warfare,115,Cybernetics,5,Cyberwarfare,16,Cyclone,1,Cyprus,5,Czech Republic,3,DACA,1,DARPA,3,Data,9,Data Analytics,36,Data Center,2,Data Science,2,Database,3,Daughter.Leslee,1,Davos,1,DEA,1,DeBeers,1,Debt,13,Decision Support System,5,Defense,12,Defense Deals,8,Deforestation,2,Deloitte,1,Democracy,22,Democrats,2,Demographic Studies,1,Demonetization,6,Denmark. F-35,1,Denuclearization,1,Diamonds,1,Digital,39,Digital Currency,1,Digital Economy,10,Digital Marketing,6,Digital Transformation,11,Diplomacy,14,Diplomatic Row,3,Disaster Management,4,Disinformation,2,Diversity & Inclusion,1,Djibouti,2,Documentary,3,Doklam,2,Dokolam,1,Dominica,2,Donald Trump,48,Donetsk,2,Dossier,2,Drones,14,E-Government,2,E-International Relations,1,Earning Reports,3,Earth Science,1,Earthquake,8,East Africa,2,East China Sea,9,eBook,1,ECB,1,eCommerce,11,Econometrics,2,Economic Justice,1,Economics,43,Economy,109,ECOWAS,2,Ecuador,4,Edge Computing,2,Editor's Opinion,53,Education,65,EFTA,1,Egypt,27,Election Disinformation,1,Elections,44,Electric Vehicle,15,Electricity,7,Electronics,8,Emerging Markets,1,Employment,19,Energy,316,Energy Policy,28,Energy Politics,27,Engineering,24,England,2,Enterprise Software Solutions,8,Entrepreneurship,15,Environment,47,ePayments,13,Epidemic,6,ESA,1,Ethiopia,3,Eulogy,4,Eurasia,3,Euro,6,Europe,14,European Union,234,EuroZone,5,Exchange-traded Funds,1,Exclusive,2,Exhibitions,2,Explosives,1,Export Import,6,F-35,6,Facebook,9,Fake News,3,Fallen,1,FARC,2,Farnborough. United Kingdom,2,FATF,1,FDI,5,Featured,1374,Federal Reserve,2,Fidel Castro,1,FIFA World Cup,1,Fiji,1,Finance,18,Financial Markets,59,Financial Planning,1,Financial Statement,2,Finland,5,Fintech,14,Fiscal Policy,14,Fishery,3,Five Eyes,1,Floods,1,Food Security,27,Forces,1,Forecasting,3,Foreign Policy,13,Forex,4,France,33,Free Market,1,Free Syrian Army,4,Free Trade Agreement,1,Freedom,3,Freedom of Press,1,Freedom of Speech,2,Frigate,1,FTC,1,Fujairah,97,Fund Management,1,Funding,22,Future,1,G20,10,G24,1,G7,4,Gaddafi,1,Gambia,2,Gaming,1,Garissa Attack,1,Gas Price,23,GATT,1,Gaza,13,GCC,11,GDP,14,GDPR,1,Gender Studies,3,Geneal Management,1,General Management,1,Generative AI,7,Genetics,1,Geo Politics,105,Geography,2,Geoint,14,Geopolitics,9,Georgia,11,Georgian,1,geospatial,9,Geothermal,2,Germany,70,Ghana,3,Gibratar,1,Gig economy,1,Global Perception,1,Global Trade,96,Global Warming,1,Global Water Crisis,11,Globalization,3,Gold,2,Google,20,Gorkhaland,1,Government,128,Government Analytics,1,GPS,1,Greater Asia,174,Greece,14,Green Bonds,1,Green Energy,3,Greenland,1,Gross Domestic Product,1,GST,1,Gujarat,6,Gulf of Tonkin,1,Gun Control,4,Hacking,4,Haiti,2,Hamas,10,Hasan,1,Health,8,Healthcare,72,Heatwave,1,Helicopter,12,Heliport,1,Hezbollah,3,High Altitude Warfare,1,High Speed Railway System,1,Hillary 2016,1,Hillary Clinton,1,Himalaya,1,Hinduism,2,Hindutva,4,History,10,Home Security,1,Honduras,2,Hong Kong,7,Horn of Africa,5,Housing,16,Houthi,12,Howitzer,1,Human Development,32,Human Resource Management,5,Human Rights,7,Humanitarian,3,Hungary,3,Hunger,3,Hydrocarbon,3,Hydrogen,4,IAEA,2,ICBM,1,Iceland,2,ICO,1,Identification,2,IDF,1,Imaging,2,IMEEC,2,IMF,76,Immigration,19,Impeachment,1,Imran Khan,1,Independent Media,72,India,662,India's,1,Indian Air Force,19,Indian Army,7,Indian Nationalism,1,Indian Navy,27,Indian Ocean,24,Indices,1,Indigenous rights,1,Indo-Pacific,6,Indonesia,19,IndraStra,1,Industrial Accidents,4,Industrial Automation,2,Industrial Safety,4,Inflation,10,Infographic,1,Information Leaks,1,Infrastructure,3,Innovations,22,Insider Trading,1,Insurance,3,Intellectual Property,3,Intelligence,5,Intelligence Analysis,8,Interest Rate,3,International Business,13,International Law,11,International Relations,9,Internet,53,Internet of Things,34,Interview,8,Intra-Government,5,Investigative Journalism,4,Investment,33,Investor Relations,1,IPEF,1,iPhone,1,IPO,4,Iran,205,Iraq,54,IRGC,1,Iron & Steel,4,ISAF,1,ISIL,9,ISIS,33,Islam,12,Islamic Banking,1,Islamic State,86,Israel,145,ISRO,1,IT ITeS,136,Italy,10,Ivory Coast,1,Jabhat al-Nusra,1,Jack Ma,1,Jamaica,3,Japan,91,JASDF,1,Jihad,1,JMSDF,1,Joe Biden,8,Joint Strike Fighter,5,Jordan,7,Journalism,6,Judicial,4,Justice System,3,Kanchin,1,Kashmir,8,Kaspersky,1,Kazakhstan,26,Kenya,5,Khalistan,2,Kiev,1,Kindle,700,Knowledge Management,4,Korean Conflict,1,Kosovo,2,Kubernetes,1,Kurdistan,8,Kurds,10,Kuwait,7,Kyrgyzstan,9,Labor Laws,10,Labor Market,4,Land Reforms,3,Land Warfare,21,Languages,1,Laos,2,Large language models,1,Laser Defense Systems,1,Latin America,82,Law,6,Leadership,3,Lebanon,10,Legal,11,LGBTQ,2,Li Keqiang,1,Liberalism,1,Library Science,1,Libya,14,Liechtenstein,1,Lifestyle,1,Light Battle Tank,1,Linkedin,1,Lithuania,1,Littoral Warfare,2,Livelihood,3,Loans,9,Lockdown,1,Lone Wolf Attacks,2,Lugansk,2,Macedonia,1,Machine Learning,7,Madagascar,1,Mahmoud,1,Main Battle Tank,3,Malaysia,12,Maldives,13,Mali,7,Malware,2,Management Consulting,6,Manpower,1,Manto,1,Manufacturing,15,Marijuana,1,Marine Engineering,3,Maritime,50,Market Research,2,Marketing,38,Mars,2,Martech,10,Mass Media,29,Mass Shooting,1,Material Science,2,Mauritania,1,Mauritius,2,MDGs,1,Mechatronics,2,Media War,1,MediaWiki,1,Medicare,1,Mediterranean,12,MENA,6,Mental Health,4,Mercosur,2,Mergers and Acquisitions,18,Meta,2,Metadata,2,Metals,3,Mexico,14,Micro-finance,4,Microsoft,12,Migration,19,Mike Pence,1,Military,112,Military Exercise,10,Military Service,2,Military-Industrial Complex,3,Mining,15,Missile Launching Facilities,6,Missile Systems,56,Mobile Apps,3,Mobile Communications,11,Mobility,4,Modi,8,Moldova,1,Monaco,1,Monetary Policy,6,Money Market,2,Mongolia,11,Monkeypox,1,Monsoon,1,Montreux Convention,1,Moon,4,Morocco,2,Morsi,1,Mortgage,3,Moscow,2,Motivation,1,Mozambique,1,Mubarak,1,Multilateralism,2,Mumbai,1,Muslim Brotherhood,2,Mutual Funds,1,Myanmar,30,NAFTA,3,NAM,2,Namibia,1,Nanotechnology,4,Narendra Modi,2,NASA,13,National Identification Card,1,National Security,5,Nationalism,2,NATO,34,Natural Disasters,15,Natural Gas,33,Natural Language Processing,1,Nauru,1,Naval Base,5,Naval Engineering,24,Naval Intelligence,2,Naval Postgraduate School,2,Naval Warfare,50,Navigation,2,Navy,23,NBC Warfare,2,NDC,1,Nearshoring,1,Negotiations,2,Nepal,12,Netflix,1,Neurosciences,7,New Delhi,4,New Normal,1,New York,5,New Zealand,7,News,1268,News Publishers,1,Newspaper,1,NFT,1,NGO,1,Nicaragua,1,Niger,3,Nigeria,10,Nikki Haley,1,Nirbhaya,1,Non Aligned Movement,1,Non Government Organization,4,Nonproliferation,2,North Africa,23,North America,53,North Korea,58,Norway,5,NSA,1,NSG,2,Nuclear,41,Nuclear Agreement,32,Nuclear Doctrine,2,Nuclear Energy,4,Nuclear Fussion,1,Nuclear Propulsion,2,Nuclear Security,47,Nuclear Submarine,1,NYSE,1,Obama,3,ObamaCare,2,OBOR,15,Ocean Engineering,1,Oceania,2,OECD,5,OFID,5,Oil & Gas,382,Oil Gas,7,Oil Price,73,Olympics,2,Oman,25,Omicron,1,Oncology,1,Online Education,5,Online Reputation Management,1,OPEC,129,Open Access,1,Open Journal Systems,1,Open Letter,1,Open Source,4,OpenAI,2,Operation Unified Protector,1,Operational Research,4,Opinion,693,Opinon Poll,1,Optical Communications,1,Pacific,5,Pakistan,181,Pakistan Air Force,3,Pakistan Army,1,Pakistan Navy,3,Palestine,24,Palm Oil,1,Pandemic,84,Papal,1,Paper,3,Papers,110,Papua New Guinea,2,Paracels,1,Partition,1,Partnership,1,Party Congress,1,Passport,1,Patents,2,PATRIOT Act,1,Peace Deal,6,Peacekeeping Mission,1,Pension,1,People Management,1,Persian Gulf,19,Peru,5,Petrochemicals,1,Petroleum,19,Pharmaceuticals,14,Philippines,19,Philosophy,2,Photos,3,Physics,1,Pipelines,5,PLA,2,PLAN,4,Plastic Industry,2,Poland,8,Polar,1,Policing,1,Policy,8,Policy Brief,6,Political Studies,1,Politics,53,Polynesia,3,Pope,1,Population,6,Portugal,1,Poverty,8,Power Transmission,6,President APJ Abdul Kalam,2,Presidential Election,30,Press Release,158,Prison System,1,Privacy,18,Private Equity,2,Private Military Contractors,2,Privatization,1,Programming,1,Project Management,4,Propaganda,5,Protests,12,Psychology,3,Public Policy,55,Public Relations,1,Public Safety,7,Publications,1,Publishing,7,Purchasing Managers' Index,1,Putin,7,Q&A,1,Qatar,114,QC/QA,1,Qods Force,1,Quad,1,Quantum Computing,3,Quantum Physics,4,Quarter Results,2,Racial Justice,2,RADAR,2,Rahul Guhathakurta,4,Railway,9,Raj,1,Ranking,4,Rape,1,RBI,1,RCEP,2,Real Estate,6,Recall,4,Recession,2,Red Sea,5,Referendum,5,Reforms,18,Refugee,23,Regional,4,Regulations,2,Rehabilitation,1,Religion & Spirituality,9,Renewable,18,Report,4,Reports,49,Repository,1,Republicans,3,Rescue Operation,2,Research,5,Research and Development,24,Restructuring,1,Retail,36,Revenue Management,1,Rice,1,Risk Management,5,Robotics,8,Rohingya,5,Romania,2,Royal Canadian Air Force,1,Rupee,1,Russia,317,Russian Navy,5,Saab,1,Saadat,1,SAARC,6,Safety,1,SAFTA,1,SAM,2,Samoa,1,Sanctions,5,SAR,1,SAT,1,Satellite,14,Saudi Arabia,130,Scandinavia,6,Science & Technology,392,Science Fiction,1,SCO,5,Scotland,6,Scud Missile,1,Sea Lanes of Communications,4,SEBI,3,Securities,2,Security,6,Semiconductor,18,Senate,4,Senegal,1,SEO,5,Serbia,4,Services Sector,1,Seychelles,2,SEZ,1,Shadow Bank,1,Shale Gas,4,Shanghai,1,Sharjah,12,Shia,6,Shinzo Abe,1,Shipping,11,Shutdown,2,Siachen,1,Sierra Leone,1,Signal Intelligence,1,Sikkim,5,Silicon Valley,1,Silk Route,6,Simulations,2,Sinai,1,Singapore,17,Situational Awareness,20,Small Modular Nuclear Reactors,1,Smart Cities,7,Social Media,1,Social Media Intelligence,40,Social Policy,40,Social Science,1,Social Security,1,Socialism,1,Soft Power,1,Software,7,Solar Energy,16,Somalia,5,South Africa,20,South America,47,South Asia,472,South China Sea,36,South East Asia,76,South Korea,62,South Sudan,4,Sovereign Wealth Funds,1,Soviet,2,Soviet Union,9,Space,46,Space Station,2,Spain,9,Special Forces,1,Sports,3,Sports Diplomacy,1,Spratlys,1,Sri Lanka,24,Stablecoin,1,Stamps,1,Startups,43,State of the Union,1,Statistics,1,STEM,1,Stephen Harper,1,Stock Markets,23,Storm,2,Strategy Games,5,Strike,1,Sub-Sahara,4,Submarine,16,Sudan,5,Sunni,6,Super computing,1,Supply Chain Management,48,Surveillance,13,Survey,5,Sustainable Development,18,Swami Vivekananda,1,Sweden,4,Switzerland,6,Syria,112,Taiwan,32,Tajikistan,12,Taliban,17,Tamar Gas Fields,1,Tamil,1,Tanzania,4,Tariff,4,Tata,3,Taxation,25,Tech Fest,1,Technology,13,Tel-Aviv,1,Telecom,24,Telematics,1,Territorial Disputes,1,Terrorism,77,Testing,2,Texas,3,Thailand,11,The Middle East,653,Think Tank,317,Tibet,3,TikTok,1,Tobacco,1,Tonga,1,Total Quality Management,2,Town Planning,3,TPP,2,Trade Agreements,14,Trade War,10,Trademarks,1,Trainging and Development,1,Transcaucasus,19,Transcript,4,Transpacific,2,Transportation,47,Travel and Tourism,15,Tsar,1,Tunisia,7,Turkey,74,Turkmenistan,10,U.S. Air Force,3,U.S. Dollar,2,UAE,139,UAV,23,UCAV,1,Udwains,1,Uganda,1,Ukraine,113,Ukraine War,25,Ummah,1,UNCLOS,7,Unemployment,2,UNESCO,1,UNHCR,1,UNIDO,2,United Kingdom,82,United Nations,28,United States,760,University and Colleges,4,Uranium,2,Urban Planning,10,US Army,12,US Army Aviation,1,US Congress,1,US FDA,1,US Navy,18,US Postal Service,1,US Senate,1,US Space Force,2,USA,16,USAF,21,USV,1,UUV,1,Uyghur,3,Uzbekistan,13,Valuation,1,Vatican,3,Vedant,1,Venezuela,19,Venture Capital,4,Vibrant Gujarat,1,Victim,1,Videogames,1,Vietnam,25,Virtual Reality,7,Vision 2030,1,VPN,1,Wahhabism,3,War,1,War Games,1,Warfare,1,Water,17,Water Politics,7,Weapons,11,Wearable,2,Weather,2,Webinar,1,WeChat,1,WEF,3,Welfare,1,West,2,West Africa,19,West Bengal,2,Western Sahara,2,White House,1,Whitepaper,2,WHO,3,Wholesale Price Index,1,Wikileaks,1,Wikipedia,3,Wildfire,1,Wildlife,3,Wind Energy,1,Windows,1,Wireless Security,1,Wisconsin,1,Women,10,Women's Right,14,Workers Union,1,Workshop,1,World Bank,38,World Economy,32,World Peace,10,World War I,1,World War II,3,WTO,6,Wyoming,1,Xi Jinping,9,Xinjiang,2,Yemen,28,Yevgeny Prigozhin,1,Zbigniew Brzezinski,1,Zimbabwe,2,
ltr
item
IndraStra Global: An Analysis of Puttaswamy: The Supreme Court's Privacy Verdict
An Analysis of Puttaswamy: The Supreme Court's Privacy Verdict
By Vrinda Bhandari, Amba Kak, Smriti Parsheera and Faiza Rahman
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhXFiGrVxY9rG7GJfnMUoKHxkn_QZy0kJW2ES72tsSWsp5uLNSy9t8STQlq8zvSULA2cUtGFMxyE-mUX9LptndhwINSCFA7s56A_xc10sN3E7C1L4TciSoKaMiAYL9MWPFxYoMQM_8NLI70/s640/supreme_court_scba1.jpg
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhXFiGrVxY9rG7GJfnMUoKHxkn_QZy0kJW2ES72tsSWsp5uLNSy9t8STQlq8zvSULA2cUtGFMxyE-mUX9LptndhwINSCFA7s56A_xc10sN3E7C1L4TciSoKaMiAYL9MWPFxYoMQM_8NLI70/s72-c/supreme_court_scba1.jpg
IndraStra Global
https://www.indrastra.com/2017/11/An-Analysis-of-Puttaswamy-Supreme-Court-s-Privacy-Verdict-003-11-2017-0004.html
https://www.indrastra.com/
https://www.indrastra.com/
https://www.indrastra.com/2017/11/An-Analysis-of-Puttaswamy-Supreme-Court-s-Privacy-Verdict-003-11-2017-0004.html
true
1461303524738926686
UTF-8
Loaded All Posts Not found any posts VIEW ALL Readmore Reply Cancel reply Delete By Home PAGES POSTS View All RECOMMENDED FOR YOU LABEL ARCHIVE SEARCH ALL POSTS Not found any post match with your request Back Home Sunday Monday Tuesday Wednesday Thursday Friday Saturday Sun Mon Tue Wed Thu Fri Sat January February March April May June July August September October November December Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec just now 1 minute ago $$1$$ minutes ago 1 hour ago $$1$$ hours ago Yesterday $$1$$ days ago $$1$$ weeks ago more than 5 weeks ago Followers Follow THIS PREMIUM CONTENT IS LOCKED STEP 1: Share to a social network STEP 2: Click the link on your social network Copy All Code Select All Code All codes were copied to your clipboard Can not copy the codes / texts, please press [CTRL]+[C] (or CMD+C with Mac) to copy Table of Content