Page:Justice K. S. Puttaswamy (Retd.) and Anr. vs Union of India and Ors (Right to Privacy Judgement).djvu/253

This page has been proofread, but needs to be validated.
PART S

in a manner which does not discriminate on the basis of racial or ethnic origin, political or religious beliefs, genetic or health status or sexual orientation.

179 Formulation of a regime for data protection is a complex exercise which needs to be undertaken by the State after a careful balancing of the requirements of privacy coupled with other values which the protection of data sub-serves together with the legitimate concerns of the State. One of the chief concerns which the formulation of a data protection regime has to take into account is that while the web is a source of lawful activity-both personal and commercial, concerns of national security intervene since the seamless structure of the web can be exploited by terrorists to wreak havoc and destruction on civilised societies. Cyber attacks can threaten financial systems. Richard A Posner, in an illuminating article, has observed:

“Privacy is the terrorist’s best friend, and the terrorist’s privacy has been enhanced by the same technological developments that have both made data mining feasible and elicited vast quantities of personal information from innocents: the internet, with its anonymity, and the secure encryption of digitized data which, when combined with that anonymity, make the internet a powerful tool of conspiracy. The government has a compelling need to exploit digitization in defense of national security...”[1]

Posner notes that while “people value their informational privacy”, yet “they surrender it at the drop of a hat” by readily sharing personal data in the course of simple daily transactions. The paradox, he observes, can be resolved by noting that as long as


  1. Richard A. Posner, “Privacy, Surveillance, and Law”, The University of Chicago Law Review (2008), Vol.75, at page 251

253