Advertisement

“Can we trust the Indians with our data?” An examination of the emergence of information privacy laws in India

  • Ramesh Subramanian
Part of the IFIP — The International Federation for Information Processing book series (IFIPAICT, volume 241)

Abstract

This paper looks at the nature and current state of evolution of privacy laws in India. India is an emerging economy, but the Indian ITeS environment has already emerged into a mature and highly competitive destination to outsource a variety of business processes from technically advanced nations. There is, however, a tension that exists between the IT industry’s needs and the Indian societal needs in general. One of the causes of such tension pertains to the issue of privacy. An important facet of the IT industry is information privacy — an aspect demanded and expected by its global customers. But the notion of privacy is hardly global. Different countries have different notions of privacy, often based on cultural norms, resulting in widely differing privacy laws. This paper studies the evolution and development of privacy laws from the context of four main players, namely, the law and legal environment, governmental policies, the IT industry and the citizenry of India. The study shows that while India has made several strides in matching the privacy needs of its global clientele, there are several areas which require further work. To some extent, the democratic structure in India, as well as its security needs have made it difficult and cumbersome to enact privacy laws, and more work is required in this area.

Keywords

Business Process Data Security ITeS Arena Advanced Nation Privacy Standard 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    NASSCOM Industry Trends (2003–2004). Para 2. Retrieved April 17, 2006 from http://www.nasscom.org/artdisplay.asp?catid=795
  2. 2.
    NASSCOM-McKinsey Report, December 12, 2005. Para 7. Retrieved April 17, 2006 from http://www.nasscom.org/artdisplay.asp?Art_id=4782
  3. 3.
    Jaikumar Vijayan, 2005. “Alleged data theft in India grabs security spotlight,” CIO Asia, June, 2005. Retrieved April 10, 2006 from http://www.cioasia.com/ShowPage.aspx?pagetype=2&articleid=1803&pubid=5&issueid=52
  4. 4.
    Rediff.com, April 8, 2005. “Call Center theft may bust India’s BPO boom,” Rediff.com., Retrieved April 17, 2006 from http://www.rediff.com/money/2005/apr/08bpo.htm
  5. 5.
    Human Rights Watch report, 1999. “Selected Articles of the Indian Constitution.” Retrieved on April 17, 2006 from http://www.hrw.org/reports/1999/india/India994-15.htm
  6. 6.
    Agarwala, B.D. 1996. “Right to privacy: A case-by-case development.” Practical Lawyer, Eastern Book Company. Retrieved on April 17, 2006 from http://www.ebc-india.com/lawyer/articles/96v3a2.htm
  7. 7.
    Subramanian, Ramesh, 2006. “Indian and Information Technology: An Historical and Critical Perspective,” in the Journal of Global Information Technology Management (JGITM), Vol. 9, No. 4, 2006.Google Scholar
  8. 8.
    Privacy International, 2003. “Privacy and Human Rights Report, 2003,” Excerpted from Information Technology Action Plan, Special Web site on National Taskforce on Information Technology and Software Development, 1998. Retrieved on April 17, 2006 from http://it-taskforce.nic.in/index.html
  9. 9.
    Privacy International, 2003. “Privacy and Human Rights Report, 2003,” Excerpted from-IT for all-2008, Special Web site on National Taskforce on Information Technology and Software Development, 1998. Retrievd on April 17, 2006 from http://it-taskforce.nic.in/it2008.htm
  10. 10.
    Privacy International, 2003. “Privacy and Human Rights Report —Republic of India, 2003. Para 7. Retrieved April 17, 2006 from http://www.privacyinternational.org/survey/phr2003/countries/india.htm
  11. 11.
    Agrawal, Rachika, 2004. “Privacy and emerging technology: Are Indian laws catching up?” Lawyers Collective, February 2004. Retrieved April 17, 2006 from http://www.nwmindia.org/Law/Commentary/privacy.htm
  12. 12.
    NASSCOM, 2006. “Information Security and Privacy —Overview.” Retrieved on April 17, 2006 from http://www.nasscom.org/artdisplay.asp?cat_id=678
  13. 13.
    Indian Express, 2005. “Need for an effective privacy policy,” Indian Express, May 30, 2005. Retrieved on April 17, 2006 from http://www.nasscom.org/artdisplay.asp?Artid=4358
  14. 14.
    Stone, Christopher, 1975. Where the Law Ends: The Social Control of Corporate Behavior. New York: Harper and Row.Google Scholar
  15. 15.
    Yolande Chan, Mary Culnan, Kathleen Greenaway, Gary Laden and H. Jeff Smith, 2005. “Information Privacy: Management, marketplace, and legal challenges,” Communications of the Association for Information Systems, Volume 16, 2005.Google Scholar

Copyright information

© International Federation for Information Processing 2007

Authors and Affiliations

  • Ramesh Subramanian
    • 1
  1. 1.Information Systems Management, School of BusinessQuinnipiac UniversityUSA

Personalised recommendations