top of page

Growing Threats To Internet Privacy




Supriya Verma, B.A LL.B (H) from Christ (Deemed to be University), Delhi


ABSTRACT


Data can be broadly classified into two types: personal and non-personal data. Personal data refers to characteristics, traits and attributes of someone, which can be used to identify the individual whereas non-personal data includes aggregated data through which individuals cannot be identified. These data are collected for welfare purposes by companies. For example, information derived from multiple drivers’ locations, which is often used to analyse traffic flow, is non-personal data1. Such collection of data is no threat to anyone and can be used for welfare purposes freely. Whereas the collection of personal data by various companies and in some cases by the government itself is a huge threat for everyone.


The 21st century is an era of cyberwars where data is an ultimate weapon. Data is the ultimate power and it is possible for the smallest of businesses and even for individuals (for example through networking sites) to collect and analyse detailed information about identifiable individuals almost anywhere in the world.2 Various laws are being formed against such collection of data by the judiciary, be it by recognising privacy as a fundamental right or by giving various guidelines in different cases but there still exist certain lacunas. India has no proper data protection Act, there have been various instances where Aadhar Data was leaked and the recent issue with Pegasus software compels every citizen of the country to take charge of their privacy and VPN is a step towards that direction. This paper analyses what is VPN and why is it important for the proper implementation of the right to privacy.

Indian Journal of Law and Legal Research

Abbreviation: IJLLR

ISSN: 2582-8878

Website: www.ijllr.com

Accessibility: Open Access

License: Creative Commons 4.0

Submit Manuscript: Click here

Open Access Logo

Licensing:

​All research articles published in The Indian Journal of Law and Legal Research are fully open access. i.e. immediately freely available to read, download and share. Articles are published under the terms of a Creative Commons license which permits use, distribution and reproduction in any medium, provided the original work is properly cited.

Disclaimer:

The opinions expressed in this publication are those of the authors. They do not purport to reflect the opinions or views of the IJLLR or its members. The designations employed in this publication and the presentation of material therein do not imply the expression of any opinion whatsoever on the part of the IJLLR.

bottom of page