wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Privacy LAWs in IT

profile
37_Deepesh _Poojary
Oct 20, 2021
0 Likes
0 Discussions
71 Reads

Data is an asset in the 21st century where 
information rules the world. In this modern age, data is 
the driving force behind the growth of the world. Since 
many gigabytes of data are transported around the 
world every second, it becomes necessary to regulate the 
the flow of data.  
The information that surrounds us in our everyday 
life with every action we take, even a single written 
word, is a kind of information, whether we are 
traveling, ordering a meal, or using a means of 
transport, we hold on consciously or unconsciously. 
Data use growth, Data have become immensely 
valuable. 
Section 2(1)(o) of the information technology Act, 
2000 (referred to as “IT Act”) has described “data” 
as “a representation of information, knowledge, 
Data, concepts, or instructions which are being 
organized or were prepared in a formalized way, and 
is intended to be processed, is being processed, or has 
been processed in a computer system or computer 
network, and can be in any form
Data or information that relate to a specific person 
or makes this identifiable with a person is personal 
data concerning a specific natural person.
Over the years the amount of user-generated data has 
grown exponentially, the current business generates 
great value in analyzing the data we generate, but the 
the main problem that we have before us is whether we 
are in control of the data generated by us. Which we 
generate and how it should be accessed and 
processed. Privacy is the right to be alone or free 
from abuse or abuse of one's personality. 
Data theft occurs when data is illegally transferred 
from one computer to another for profit or to access 
people's private and sensitive information. It is 
viewed as a serious breach of privacy and data.
DATA PROCESSING AND PROTECTION 
RULES IN INDIA
So far, the current framework for data protection has 
been laid down in the Information Technology Act 
2000 (IT Act) and the rules issued in 2011 ("IT 
Rules") within the framework of the IT standards 
(security practices and procedures, appropriate and 
confidential data or information). )IT Act states that the provisions of the IT Act shall 
apply to any criminal offense committed by a person outside of India if the act or 
conduct constitutes such offense and uses a computer, computer 
system or concerns a computer network in India.
Personal Data Protection Bill 2019 This bill aims to regulate 
the processing of personal data of individuals by 
government organizations and private bodies based 
in India Data stored by private institutions The draft 
the law provides for exceptions to certain types of data 
processing,g in the interests of 
national security, legal procedures, etc.
Analysis of the Data Protection Bill 2019
While the bill provides a basic framework for data 
protection and seeks to protect it, it has significant 
loopholes. 
across the world 
Article 12 of the Universal Declaration of Human 
Rights states, “No one shall be subjected to arbitrary
interference along with his privacy, family, home or 
correspondence, nor to attacks upon his honor and 
reputation. Everybody has the correct protection of 
the law against such interference or attacks.
Analysis
The need for data protection laws is recognized by 
everyone around the world. People want the security 
of their sensitive personal information. That is why 
data protection laws are gaining importance 
worldwide. Data is going to become a lot of valuable day by day 
with the exponential increase in the manner 
individuals consume and generate data around the 
world. With knowledge fuelling growth it'll be quiet 
vital to shield the data of the voters`


Comments ()


Sign in

Read Next

The Essential Guide to Dynamic Arrays vs. Linked Lists: Which to Use and When ?

Blog banner

WORKFRONT SOFTWARE

Blog banner

Virtual machine.

Blog banner

Denial-of-Service and Distributed Denial-of-Service Attack Techniques

Blog banner

Technical Challenges and Directions for Digital Forensics

Blog banner

I/O Buffering

Blog banner

DATA VAULT

Blog banner

Process and Threading

Blog banner

Zomato (Income Sources)

Blog banner

A-B-C of Networking: Part-2 (Components)

Blog banner

My First Trek - Sondai, Karjat - Shoaib Malik

Blog banner

Big O Notation

Blog banner

Deadlocks

Blog banner

A Heartfelt Act of Kindness

Blog banner

VPN

Blog banner

PROCESS STATES OF OPERATING SYSTEM

Blog banner

History of ITIL

Blog banner

TOP 5 GAMING GADGETS (2024)

Blog banner

PHISHING

Blog banner

VIRTUAL MACHINES

Blog banner

Types of Hackers.

Blog banner

Linux 94

Blog banner

Why Consistency in Eating Habits Matters and How Meal Maharaj Makes It Easy

Blog banner

How Running Changed My Life

Blog banner

Tools to support CSI activities

Blog banner

“CONSISTENCY” in Social Media Marketing

Blog banner

WINDOWS I/ O

Blog banner

Threads in OS

Blog banner

Real Time Scheduling

Blog banner

Stay Close To Adventure In Arcadia, Florida At Oak Tree Hotel

Blog banner

Types of Hackers

Blog banner

DEVELOPMENTS LEADING TO MODERN OPERATING SYSTEMS

Blog banner

What is Internet

Blog banner

Different types of scam frauds

Blog banner

Cache Memory

Blog banner

File management In Operating System

Blog banner

Types of Malware in Cyber Security

Blog banner

Top 5 Benefits of Artificial Intelligence

Blog banner

The Art Of Getting What You Want In Life....

Blog banner

Understanding Univariate, Bivariate, and Multivariate Analysis in Data Science

Blog banner

What is online marketing and why do you need to know about it ?

Blog banner

Self-love: Being the reason of your own smile

Blog banner