IMPACT OF DATA PRIVACY AND SECURITY IN HEALTH LAW. BY - MS VARSHA. P
IMPACT OF DATA PRIVACY AND SECURITY
IN HEALTH LAW.
AUTHORED
BY - MS VARSHA. P
Research
scholar, School of Law, VISTAS, Pallavaram, Chennai
Abstract
This
paper addresses the problem of privacy from an Indian viewpoint, focusing on
the subject's legal, technological, and political facets. A framework that we
have developed addresses these issues. Technological advancements include cloud
computing, data mining, mobile (Geographic Knowledge Discovery), etc. Recent
technological advancements and the dynamic legal field have given rise to new privacy
and data protection perspectives. Privacy is the right not to infringe upon
another person's rights. Because of technological advancements, privacy has
become an issue for everyone, with a focus on data protection. Data protection
places a strong emphasis on individual liberty, which is threatened by outside
intrusion. Any new phenomenon can use the Constitution to validate its
essential legal requirements. Maintaining secrecy is essential in all fields,
including the health sciences. The interpretive method was employed in this
study because it provides a sense of in-person contact in the healthcare
setting and introduces social realities regarding the state of the health
society. As a result, patients must provide their consent for the use of their
medical information in writing or digitally. The consent form needs to be
signed by the patient's doctor, family member, and another trustworthy party.
This text delves into the challenges of upholding privacy and confidentiality
in the healthcare industry, along with an examination of its significance for
both individuals and the community. "Privacy rights are really important.
It examines how an individual's right has been affected by the intrusion of
data protection in connection with other laws.
Keywords: -
Indian Perspective, Data Protection, Healthcare Bringing, Right To Privacy, Legal
Requirement, Individual Liberty, Healthcare, Data Mining, Geographic, Maintaining Confidentiality, Cloud
Computing, Political Domain.
I.
INTRODUCTION
Human
society's fundamental and unalienable rights have been reduced to a visible and
enforceable document on a national and worldwide level. Certain rights are
mentioned explicitly in these agreements, while others are introduced through
interpretive tools since they are inextricably linked to other rights. The
right to privacy is one of the more significant and widely recognized human
rights among all of these. It gives individuals the ability to snoop on others.
The right to privacy is mentioned in the United Nations Conventions on the
Rights of the Child, the International Covenant on the Rights of Civil and
Political Persons, and the UN Declaration of Human Rights. A right to privacy
is among the most basic rights of an individual.
This
right has been recognized as a crucial component of the freedom of speech and
the right to live in freedom in India. Everyone has the right to a
"personal domain" free from arbitrary government intervention or
third-party monitoring. Despite the widespread acceptance of the need to
preserve one's privacy, worldwide protection of human rights mechanisms have
not completely defined the exact content of this right. The ambiguity
surrounding the nature of this right has made it more difficult to implement
and uphold. Since the right to privacy is a qualifying right, interpreting it
presents difficulties in defining what defines the public interest and how to organize
the private realm.
Depending
on the context and viewpoint, the word "privacy" can indicate several
things. Perhaps because of our culture and way of life, or because of our
excitement about new and rapidly developing technologies, politicians were not
compelled to incorporate the subject of privacy when drafting the country's
legal framework. We must define privacy before we can talk about e-privacy and
data protection from an Indian perspective. The Latin word
"Privatus," which means "separate from rest," is where the
term privacy originates. It can be defined as the ability of a person or group
to withhold information about themselves or themselves and thus only expose
certain aspects of oneself.
1.1 The Data Security Concept
Globally,
the idea of data protection is becoming increasingly significant. All countries
are gradually adopting laws that control the handling and mishandling of
personal information as well as adopting security of information principles.
The German word "Datenschutz" is where the term "data
protection" originates. The idea of data protection is somewhat related to
personal privacy.
Usually,
it is reserved for a collection of standards that support more interests than
just protecting privacy. For data protection, factors other than privacy are
taken into account. Several other, somewhat related concepts have also been
brought forth, chief among them being "autonomy,"
"liberty," & "freedom." The individual must first and
foremost determine whether they are entitled to data protection. In this arena,
the extent to which such regulations should safeguard particular people as well
as organisations is an evolving subject. In terms of safeguarding personal
data, the concept of data protection is recognized internationally. Since
"data subjects" are only defined as "living individuals,"
the protection of information through laws is also included in the scope of
data protection".
Because
an organization is not an identifiable individual and the information about it
is not personal data, a corporate entity, such as a corporation with limited
liability, does not have a right to access any data about itself. Therefore,
issues with authority relevance related to data privacy are considered
contentious. The one who, whether or not they are an official actor, will
protect it out of obligation. The two main parts of the protection of data for
non-governmental organizations are as follows: first, an additional constrained
definition based on the idea that businesses, particularly smaller ones, should
be covered by laws since information about them may inadvertently reveal
information about their controllers and owners. Second, since there is a
broader meaning, organizations are entitled to the same legal protections
regarding information kept about them as individuals are. Different countries
have different laws around the concept of data protection. The sophisticated
protection of data Law of the European Union.
1.2 Status of the Constitution
The
Indian constitution has a few clauses on "Right to Life & Personal
Liberty" or "Freedom of Speech & Expression," among other
things. These laws impact one of the fundamental rights: the right to privacy.
The right to privacy has also been demonstrated time and time again to be a
fundamental freedom. The conceptual framework of this proposal also has
connections to the newly developed discipline known as "data
protection." Data security and privacy are interdependent and tied to one
another. A person's freedom of data protection is closely related to their
"information". The reading of the country's top court's
interpretation in conjunction with the constitution's provisions to understand
how rights are expressly outlined about privacy.
It
looks at the several ways that data protection is covered by laws. Ultimately,
it presents a case for tackling data protection issues from a rights-based
perspective. According to Sir John Simmons, "Human rights are rights that
are borne by all persons [at all times and in all locations], fundamentally by
virtue of their humankind as a whole, addressing the maintenance of human
rights. “They will have the characteristics of universality, in the freedom
[from social or legal understanding], naturalness, inalienability [from social
and legal comprehension], non-forfeit ability, and imprescriptibility," he
adds. An explanation of human rights can only fully convey the notion that
everyone has the right to assert their freedoms”.
As
a result, the idea of protecting human rights includes data protection. The
independence and applicability of information security are critical to a
person. Data protection also leads to the right to privacy. The most
significant and insightful debate focuses on the differences between data
protection and privacy. Under specific regimes, a number of interconnected
domains are represented by specific connections or shadows. It includes the
right to exclude management of the access to one's own domains, just as
confidentiality does, which extends much beyond the mere description components
of seclusion, solitary living, and the influence of others. Although they are
not synonymous, solitude, isolation, and privacy are related concepts. The
court's action to establish this evolving right is likewise being highlighted
as a matter of right.
1.3 Examining the Correct Based Method
The
many laws are the only way to examine the right-based approach to the
"data protection" issue. The aim of this methodology is to examine
the current state of the "data security" framework in India. The
processing of information, business process, call center, accountancy, and
other business processes are all being outsourced at an exponential rate as a
result of the growing relevance of data protection and the development of
internet-enabled services. But as technology advances, legislation must also
change to keep up with the innovation.
As
a result, data protection examines the extent to which Indian laws,
particularly those pertaining to the Indian Constitution, safeguard personal
and corporate information and data. Since the Indian Constitution is the
"basic and ultimate source" through which all other laws get their
legitimacy and effect, emphasis is placed on the protections afforded by it. In
order to explore constitutional component concerns, these three must be brought
up,
(1)
Interest parties' privacy rights in
actual and virtual spaces.
(2)
Article 19 (1) (a) mandates of
information freedom.
(3)
Article 21 mandates the right of
people at large to know.
II.
DATA
PROTECTION AND PRIVACY
It
clearly addresses in the context of numerous points of view, the rights to
privacy, information, and knowledge as well as electronics governance, trade
secrets, and proprietary information. This research has been done to support
the relationship with rights. Furthermore, the lack of equilibrium between data
and information processing is another flaw in this study.
The
only way to justify the right-based approach is to debate it with the other
laws listed below:
2.1 Privacy Rights & Data
Protection
The
terms "right to privacy" and "data protection" are becoming
more interchangeable. Only until the invasion of privacy is ended can
"data preservation" be achieved. Technical advancement and privacy
law have long been intimately related, with the protection of information in particular.
The "instantaneously photos and publications companies that have entered
the sacred precinct of private and local life" are lamented by Warren and
Brandeis in their groundbreaking 1890 article "The Right to Privacy,"
along with the threat posed by several technological innovations that could fulfill
the prophecy that "what whispers in the closest shall be proclaiming from
the house-tops." This is when the privacy issue began. This is being
established in the field of "data protection" these days. The concept
of "data protection" includes several facets. The various facets of
safeguarding data as a right, such as the right to access data banks, the right
to verify their accuracy, the right to update and rectify them, the right to
the confidentiality of sensitive data, and the right to give permission for its
distribution, collectively make up the new right to privacy. Thus, as a
right-based strategy in this case, the relationship between "Data
Protection" and "Privacy" status is quite acceptable.
2.2 The Right to Information and Data
Protection Act of 2005
"The
practical framework of rights access to information for citizens that
safeguards info under the oversight of government agencies in order to promote
transparency and accountability... for matters concerned therewith or
incidental thereto" is the claim made in India's Right to Information
bill. This is the Act of 2005's preamble, and Section 2(j) defines the term
"right to information." The question of whether or whether the
"data" that was retained by the public authority is now relevant.
It's really unclear if the digital data described in Section 2(j) clause (iv)
is being maintained correctly or not.
In
this Act, "data protection" refers to the treatment of personal
information as a right. In Bannett Coleman's v. the Union of the Nation, the
court identified that "freedom of expression and speech involves within
its boundaries the right of all citizens to read and be informed" and that
"it is indisputable that by the freedom of the press indicated the right
of everything citizens to speak out, publish, and express their perceives."
The Court held in Indian Express Newspapers (Bombay's) v. Union of India44 that
"every member ought to be able to form their opinions and express them to
others as an essential aspect of freedom of expression and expression." In
summary, the people's right to know is the essential concept at work today”.
2.3 The Information Technology and Data
Protection (Amendment) Act of 2008
The
"Data Privacy" and "Information Technologies Act" are
specifically related to each other. The Act's objectives specifically specify
the protection of cyberspace relationship matters. It provides protection
against specific data breaches involving information from computer systems.
Sections of the previously mentioned Act prohibit the unlawful use of
computers, systems for computing, and data saved on them. A number of new
provisions pertaining to "data preservation" have been included. Data
protection is explicitly addressed in the Act's new Sections 43A and 72A. The
2008 Amendment Act is a noteworthy milestone in the fight against the plethora
of cybercrimes that exist today. The statutory regulations governing data
protection in India have been modified, ultimately giving in to the demands of
the US and European countries over the last ten years. Because the service
provider disclosed "personal information in violation of contractual
obligation," they are currently facing jail time. Furthermore, the
offender faces damages if "sensitive personal information" is made
available.
2.4 Indian Penal Code and Protection of
Data
The
Indian Penal Code originally appeared during the British period of Indian
administration. Under the chairmanship of Lord Macaulay, the first draft was
composed in the 1860s. The "Indian Penal Code's" rules for "data
protection" are unable to entirely satisfy every requirement as a result.
Indian criminal laws do not specifically address breaches of data privacy. Such
infractions will be assumed to be crimes under the Indian Penal Code associated
crimes. For example, under section 403 of the Indian Penal Code, it is illegal
to dishonestly misuse or convert "movable property" for a person's
personal gain.
2.5 National Security & Protection
of Data
In
the current global environment, "national security" and "data
protection" are extremely important concepts. Every nation's criminal
justice and national security organizations are extremely important for
"data protection." For example, in 2013 it was reported that a person
named Snowden, or Edward Snowden, had leaked United States government documents
about privacy. This story raises the question of whether or not a person has
any privacy at all. What level of privacy will be maintained if data is
accessible to the public and can be accessed by anyone?
2.6 The Intellectual Property &
Data Protection Law
When
it comes to computer-related database activity, the equality of "data
protection" and "intellectual property law" must be examined
from a rights-based perspective. It is acknowledged that the Indian Copyright
Act's section B imposes liability on anyone who knowingly uses a copy of an
infringing computer program on a computer. An individual's intellectual
property rights are determined by their "labour, skill, and judgment"
aspects. The owner's right must be protected if any literary, dramatic,
musical, artistic, or cinematographic works are sanctioned by the law. However
under the Copyright Act, it can be challenging to distinguish between the protection
of databases and data preservation.
2.7 Corporate responsibilities &
safeguarding information
The
relationship between "corporate affairs" and "data
protection" is also based on a sound foundation. The corporate world is
significantly impacted in several ways. Data processing, sharing, disclosure,
and access are all crucial. In the business world, the custody of the data
processor or controller has been crucial. Private organizations can at times be
asked to share or not share.
2.8 Protecting Consumers & Data
The
company's internal obstacles relationship with its customers are crucial to
explaining the "data protection" issue. The Calcutta High Court ruled
in Shakankarlal Agarrwalla v. State Bank of India that a banker had a duty of
secrecy. In accordance with Lord Halsbury's laws of the nation of England,
"unless the banker is required to do so by order of a court or
circumstances that give rise to a statutory obligation of communication or
safeguarding of the banker's own interest requires it, the banker will not
disclose to third person without first the express and implied permission of
the consumer either the contents of the client's account or any of his deals
with the bank or any other information relating to the customer gained through
the retention of his account.”
Personal
data may only be lawfully collected under very specific circumstances and for a
justifiable reason, according to EU law. In addition, individuals or entities
that gather and handle your data are required by EU legislation to safeguard it
against unauthorized use and to uphold the rights of data owners. The EU
countries are quite concerned about the U.S.'s lack of general privacy
legislation, which makes it unlikely that the country will guarantee a
sufficient level of protection. Despite the administration's concentrated
efforts to enact privacy laws addressing a variety of data kinds, the sheer
volume of privacy-related measures in Congress raises the possibility that the
United States may continue to pursue privacy legislation piecemeal.
AI
technology is being quickly embraced by the Indian healthcare sector in an
effort to alleviate the lack of qualified doctors and enhance the quality of
data in Electronic Health Records (EHRs). In fields like predictive modeling
and treatment, artificial intelligence has demonstrated encouraging outcomes.
However, India is still in the early phases of developing AI for healthcare
applications, and to handle the intricate issues that have not yet received
enough attention, a comprehensive healthcare strategy is required. Three major
categories can be used to group AI technologies: prescriptive predictive, and
description.
Prescriptive
AI makes recommendations for possible treatments, predictive AI forecasts
future events, and descriptive AI aids in comprehending past occurrences. AI is
also able to support human healthcare jobs like speech recognition, neural
networks, natural language processing, and catboats. The integration of AI into
Indian medical facilities represents a quantum leap in the areas of improved
diagnosis, individualized treatment regimens, and effective resource
management. AI applications have the potential to completely transform
healthcare systems in a nation with an expanding population. Examples of these
applications include image identification in diagnostics and predictive analytics
for outbreaks of illnesses.
However,
as India moves towards a digitally driven healthcare environment, the
intersection of AI, data protection, and security becomes a crucial focus
point. Protecting the privacy of health data is a major concern because
diagnostic imaging, genetic data, and patient records are all digital and hence
vulnerable to hacking. It becomes essential to use this extremely sensitive
data ethically and protect it by the law to uphold public confidence. To
guarantee the highest standards of data privacy, it is imperative to carefully
examine and strengthen the legislative framework controlling AI in healthcare.
India is currently struggling to formulate strong data protection regulations.
A large attack surface is created by the integration of AI algorithms and the
interconnection of healthcare networks, making it vulnerable to cyber assaults.
Breach
of cybersecurity puts patient privacy at risk, medical data integrity is
compromised, and the accuracy of AI-assisted diagnosis is hampered. The security
of these systems is critical as India advances towards the introduction of
electronic health records and a Digital Health Mission.
Article
21 of the Indian Constitution defines private as freedom of speech.
"Protection of Life and Personal Liberty" states that no one may be
deprived of their life or freedom unless a legally prescribed process is
followed. One of the essential rights guaranteed by the document known as the Constitution
is the right to privacy.
Internationally,
privacy is acknowledged in the same way as human rights in a variety of
contexts:
·
Personal confidentiality
·
Personal conduct privacy
·
Personal communication privacy
·
Personal confidentiality of data
The
phrases privacy and confidentiality are not interchangeable. Despite the
frequent confusion between the phrases confidentiality, confidentiality,
privacy, and information security, each has a distinct meaning and set of uses.
Only "discretion when maintaining secret information" is the
definition of secrecy."
III.
CONFIDENTIALITY
OF HEALTH AMID THE COVID-19 EMERGENCY
The
privacy of another person was harmed in India by tracking contacts,
surveillance, and technical instruments. The pandemic was fully contained via
the application of technology. Digital devices are being used for patient
databases, tracking, testing, vaccination registering, and tracking efforts.
These technologies contain highly confidential data about our movements and
health, including telephone numbers, social security numbers, residential
addresses, and vaccination status. A person's long medical history has been
disclosed in the middle of the corona. Sharing personal information compromises
privacy and has unfavorable outcomes.
It
is easy to identify and recognize an individual using personal data because the
information or data obtained in this regard by governmental and commercial
institutions is widely distributed through social media networks. Maintaining
private medical records requires medical privacy above all else. Personal
health data should be collected, stored, and distributed with appropriate care
to ensure the least amount of interference feasible. Privacy and health go hand
in hand in contemporary society. The state should set up appropriate
guidelines, rules, and legislation to protect health information. When doing
scientific research and producing scientific discoveries, data, and current
technology tools should preserve an individual's interests.
IV.
CHALLENGES
4.1 Regulatory Challenges
It
is very difficult to guarantee the protection of privacy rights in the Indian
environment due to the absence of a suitable model for privacy legislation.
However, the government uses a few event safeguards or proxy laws in the
absence of formal legislation to protect privacy. Several laws, including
Article 21 of the Indian Constitution, the IT Act of 2000, the Indian Contract
Act of 1872, the Indian Penal Code, the Indian Copyright Act, the Consumer
Protection Bill of 1986, the Specific Relief Act of 1963, and the Indian
Telegraph Act, indirectly support concerns regarding privacy in India.
The
current Indian legislative framework for privacy has the following flaws:
·
There is no comprehensive law and
the privacy issue is still handled by some proxies; there is no convergence on
the subject.
·
The data is never categorized as
sensitive, private, or publicly available data.
·
Absence of a legislative framework
discussing who owns sensitive and private data and information.
·
There is no set process for
generating, processing, sending, and storing the data.
·
There are no rules defining data
transparency, proportionality, or quality.
·
no structure addresses the problem
of cross-border information flow.
Such
a legal framework gap cannot be ignored in the information age, as it can
seriously degrade both individuals and the country.
4.2 Problems with technology
The
Indian ICT revolution and globalization have fundamentally altered the nature
of information. Information became easier to obtain, carry, and use. These
days, being nimble and intelligent is desired not only by the government but
also by the corporate and individual sectors. Even though it has accelerated,
eased, and improved our lives, it has also revealed some unexpected chaos and
exposed our personal lives.
4.3 Social and Political
Difficulties
For
any technology to be implemented successfully, human resources must provide
solid support. We discuss the human element in political problems while
discussing stakeholders for a certain technology. People are the most
vulnerable element in information security, according to the information
technology principle. In the Indian context, humans are essential since they
set policies and choose the course that whatever technology will take. Although
there isn't a scam that directly affects privacy at this time, and people don't
care as much about it as they used to, the adage "prevention is better than
cure" applies here.
The
majority of BPO's offshore work comes from nations that have codified laws or
established legislative frameworks, such as the United States' ECPA and all of
Europe's DPA 1998. The reason they conduct business in India is the extremely
low cost of investing. They take proper care of their data by international
non-governmental organizations like ITIL, ISO, and others. Due to privacy
breaches resulting from a breach of trust between two parties, the majority of
cases in the family court system are still pending. The media is crucial to
democracy because it informs people about government policies and public
grievances. However, in today's world, the media intrudes on public life and no
one's personal information is kept private for their own gain.
In
India, the current regulatory and legal structure about digital health is
disjointed and unclear. Furthermore, India has a dearth of legal scholarship
about digital health. This is especially difficult because digital health
encompasses so many different areas, including business models, data gathering
and processing, care delivery, and technology breakthroughs that cause the
regulatory framework to become fragmented. It should come as no surprise that
there is concern regarding the extensive digitization of medical services in
India given the possibility of data leaks, improper use, and insufficient
oversight by private sector entities. Supporters of privacy have taken issue
with government-sponsored initiatives. The legal director of the online civil
rights organization SLFC.in, Prasanth Sugathan, said, "The lack of data
protection legislation should not be an excuse for performing such exercises
affecting the freedoms of citizens."
In
this article, I critically analyze the ethical and legal concerns related to
digital health legislation. I highlight these challenges with India's
healthcare digitization project by referencing recent studies, legislation, and
policies that the state has adopted.
V.
CONCLUSION
The
examination of several subjects revealed that diverse viewpoints have seen data
protection as a right. The protection of data as a right was acknowledged by
all subjects, including the right to security, the right to data, technological
advances, the Indian Penal Code, business affairs, and consumer protection. The
goal of the issue is to make data protection seem more legitimate in this era
of technological liberalization. The protection of individual liberty is being
threatened by the ever-expanding scope of technology, which calls for a
stronger data protection system. The purpose of this research project is to
prove that the right to safeguard data and privacy is a fundamental right that
may be treated as such after careful consideration and examination. Only the complete
legal need as a right to protect information can be achieved by others
interfering with or violating an individual's liberty. A general approach to
data protection might be provided by the organizational status of data
protection. The various aspects of data protection, such as gathering,
processing, storing, protecting, and granting access, should be integrated into
a legal framework to grant specific status to safeguarding information as a
right. Global knowledge of the proper foundational approach to privacy and data
protection must grow to unanimity.
VI.
REFERENCES
Blau, B. The adult client's conception of confidentiality in
the therapeutic relationship. Professional Psychology: Research and Practice,
16 (3), 375-384.
Briere, J. Trauma Symptom Checklist for Children.
Cheng TL., Savageau JA. Sattler AL., DeWitt TG. (2016). A
survey of knowledge, perceptions, and attitudes among high school students.
Daniel Masys& M.D. (2014). It’s Only Sensitive If It
Hurts When You Touch It
David C. Kibbe, MD &MBA (April 2005). 10 Steps to HIPAA Security.
Retrieved from
Donna Cryer, J.D., CEO of CryerHealth and patient advocate,
DC Patient. Patients Hold The Ultimate Responsibility Of Selecting The Right
Team Member
Dr. Tony Iton. (2013). The California Endowment Health
Journalism Fellowships
Edward L.Deci. & Richard M.Ryan (2014). A motivational
approach to self-integration in personality. P.45 University of Rochester.
Edward Snowden. (2014). US government spied on human rights
workers.
Fr Gemalto. (20 September 2016). Data breach statistics 2016:
The first half results are posted on 20 September 2016.Articles: The Importance
of Health Care IT Security and Privacy.
Bajpai, Nirupam, and Manisha Wadhwa. “Artificial Intelligence
and Healthcare in India.” No. 43. ICT India Working Paper, (2021).
Dossetor, J.B. “Beyond the Hippocratic Oath: A Memoire on the
Rise of Modern Medical Ethics. Canada:” The University of Alberta Press, 301 p
(2005).
Ferrer-Roca, O., and Sosa-Iudicissa, “Handbook of
Telemedicine (Third printing). The Netherlands: IOS Press”, 297 p. (2002).
Vijai, C., and Worakamol Wisetsri. "Rise of artificial
intelligence in healthcare start-ups in India." Advances in Management 14,
no. 1 (2021): 48-52.
Yaqoob, Ibrar, Khaled Salah, Raja Jayaraman, and Yousof
Al-Hammadi. "Blockchain for healthcare data management: opportunities,
challenges, and future recommendations." Neural Computing and Applications
(2021): 1-16.
Pandey, Neena, and Abhipsa Pal. "Impact of digital surge
during Covid-19 pandemic: A viewpoint on research and practice."
International journal of information management 55 (2020): 102171.
Vijai, C., and Worakamol Wisetsri. "Rise of artificial
intelligence in healthcare start-ups in India." Advances In Management 14,
no. 1 (2021): 48-52.
Swati Sinha, “Data Protection Law in India-Needs and
Position,” Accessed February 21, 2015.
Mr. K.J. Doraisamy v. The Assistant General Manager, State
Bank of India and others, (2007) 136 Comp Cases 568 (Mad).
M M S Karki, “Personal Data Privacy & Intellectual
Property,” Journal of Intellectual Property Rights, Vol 10. (2005): 59-63.
Vaishali Sharma, “You Have Zero Privacy, Get Over It :( Data
Protection Law In India, Analysed In A Comparative Framework)”, Accessed October
21, 2016.
Maria Grazia Porcedda “Data Protection and the Prevention of
Cybercrime: The EU as An Area Of Security? European University Institute,
Florence Department of Law,” Accessed October 21, 2016.
Dan Jerker B. Svantesson, “Systematic Government Access to
Private Sector Data in Australia,” 2/4 International Data Privacy Law, (2012).
Denis O'Brien, “The Right of Privacy,” Columbia Law Review,
Vol. 2, No. 7 (1902): 437-448.
Daniel J. Solove & Paul M. Schwartz, “Privacy,
Information and Technology,” Wolter Kluwer Law & Business Publisher in New
York, (2011), 79-256.
I. N. Walden and R. N. Savage, “Data Protection and Privacy
Laws: Should Organizations Be Protected?” The International and Comparative Law
Quarterly, Vol. 37, No. 2 (1988): 337-347.
Dr. Amit Ludri, Law on the protection of personal &
official information in India, the Bright Law House, New Delhi, 1st Edition,
(2010).
Graham Greenleaf and Sinta Dewi Rosadi, “Indonesia’s data
protection Regulation 2012: A brief code with data breach notification,”
Privacy Laws & Business International Report, Issue 122, (2013): 24-27.
H L A Hart, “Are There Any Natural Rights?” The Philosophical
Review Vol 64, NO 2 (1955): 175-191.
Rebecca Vesely “Cop-friendly Approach to Handling Medical
Data,” Wired News 12 (September 1997) Accessed March 20, 2014.
Lutha R Nair, “Data Protection Efforts in India: Blind
leading the Blind?” The Indian Journal of Law & Technology VOL 4 (2008).
S.K. Sharma, Privacy Law: A Comparative Study (Atlantic
Publishers & Distributors: 1994).
Austin, Lisa Michelle, “Privacy law and the question of
technology.” Ph.D. Thesis, University of Toronto; 2005, ProQuest Dissertations
and Theses.
David Flaherty, "Protecting Privacy in Surveillance
Societies", University of North Carolina Press, (1989).