Moreover, in Justice K.S. Puttaswamy v. Union of
India AIR 2017 SC 4161 : (2017) 10 SCC 1, the
Supreme Court, in a petition that questioned the
constitutional legality of the Aadhar-based biometric
system, unanimously held that the right to privacy is
a fundamental right protected by the Constitution.
The Court widened the scope of Article 21 and
declared that the right to privacy is included in the
purview of right to life and liberty.
3 CONSUMER PRIVACY IN E-
COMMERCE
Right to privacy in E-commerce means protection of
personal information and personal data of a person in
E-commerce. The exchange of personal information
and data is inevitable for a successful transaction in
E-commerce thereby resulting in the consumer
information ending up in the hands of people who
take advantage of this sensitive personal information
for their own selfish intentions which results in
violation of privacy in E-commerce.
Consumer privacy is concerned with how the
manufacturer or service provider uses and collects the
information the consumer provides to him. There is a
betrayal of consumer trust in the seller when there is
a misuse of information provided by him. There are
various modes in which this information may be
misused.
Increasingly, data that is collected from
consumers is stored in databanks which is then used
for both legitimate purposes (such as marketing,
research etc.) and illegitimate extraneous purposes (as
when this data is sold in bulk to third parties).
4 REASONS FOR VIOLATION OF
PRIVACY IN E-COMMERCE
Lack of Awareness: There has been a growing trend
among customers to sacrifice convenience for the
demand for privacy. Thus, the consumers puts a large
amount of trust on the organisations and they do not
think twice about sharing their personal information
with them without any regards to basic precautions
that should be taken by any consumer.
Jurisdiction: In most of the cases, privacy breach in
E-Commerce is a trans-border occurrence. Thus, the
victim of the breach i.e. the consumer is in one
country while the person responsible for the breach
may well be thousands of miles away in other
country. This creates a huge problem of jurisdiction
when the time comes to bring action against the
perpetrator.
Lack of uniformity in legislation in various countries:
International norms are created for the data protection
by UNCITRAL (UNCITRAL Model Law on
Electronic Commerce, 1996), OECD (OECD, et, al,
2016), European Union (REGULATION (EU)
2016/679 General Data Protection Regulation) and
other international organisations. However, these
international norms are either adopted partially or are
not adopted at all.
Occurrence of cybercrimes: Invasion of privacy of the
consumers is a huge concern as it violates the basic
fundamental rights of the consumers. However, a
bigger concern is the occurrence of cybercrimes like
identity theft, internet fraud, bank fraud,
cyberstalking, extortion etc. One common factor in all
these crimes is the stealing of sensitive personal
information of the consumers and using it for
furtherance of the offences.
5 LEGISLATIVE FRAMEWORK
India’s sole legislation dealing law relating to
Information Technology is Information Technology
Act, 2000 which deals with cybercrimes and
electronic commerce. The Act was enacted keeping
in mind the provisions of United Nations Model Law
on Electronic Commerce, 1996 (UNCITRAL
Model).
Information Technology Act, 2000: The primary law
in India that controls how information technology is
used and establishes a framework for the protection
of personal data is the Information Technology (IT)
Act, 2000. The legislation and its regulations are
intended to control how digital information is used,
encourage the development of the digital economy,
and guarantee the preservation of people's rights to
their personal data.
Explanation (iii), Section 43A of IT Act, 2000 defines
"sensitive personal data" as data related to an
individual's financial, health, sexual orientation,
biometric, or religious information. The Act requires
organizations to obtain written consent from
individuals before collecting, processing, or storing
sensitive personal data.
The Act requires organizations to implement
reasonable security practices and procedures to
protect personal data from unauthorized access,
alteration, destruction, or disclosure. Furthermore,
the Act also requires organizations to notify
individuals in the event of a data breach that results in