Moot Court Memorial of Appellate
Moot Court Memorial of Appellate
Moot Court Memorial of Appellate
The Supreme Court of India deduced the Right to Privacy from Article 21
wherein the court held that personal liberty means life free from any
encroachments that are unsustainable in law.” The court in a landmark
judgment held that “the concept of liberty in Article 21 was comprehensive
enough to include privacy and an unauthorized intrusion into an individual’s
home and thus disturbance caused violates his personal liberty.” “In People’s
Union for Civil Liberties (PUCL) v Union of India,2 the court explained the
right to privacy to be under Article 21 in consonance with Article 17 of
International Covenant on Civil and Political Rights, 1968. The gross violations
of the right to privacy encouraged the Judiciary to take a proactive role in
protecting the right and providing the affected person adequate compensation
and damages.”
1
Judicial interpretation of data protection and privacy in India - iPleaders
2
People’s Union for Civil Liberties (PUCL) v. Union of India and others: AIR 1982, SC 1473.
3
M.P. Sharma v. Satish Chandra, (1954) SCR 1077.
4
Kharak Singh v. State of Uttar Pradesh, (1964) 1 SCR 332
5
For illustrative examples see, Gobind v. State of Madhya Pradesh, (1975) 2 SCC 148; R. Rajagopal v. State of Tamil Nadu, (1994) 6
SCC 632; People‟s Union for Civil Liberties v. Union of India, (1997) 1 SCC 301.
privacy. A majority decision by an eight-judge Constitution bench observed that
the right to privacy was not a fundamental right under the Constitution.
Following this approach of Justice Subba Rao, the nine-judge bench of the
Supreme Court in Puttaswamy recognised the right to privacy as an intrinsic
part of the fundamental right to life and personal liberty under Article 21 of the
Constitution of India in particular, and in all fundamental rights in Part III
which protect freedoms in general, and overruled the aforementioned
judgments to this extent.7
6
Kharak Singh v. State of Uttar Pradesh, (1964) 1 SCR 332. Also discussed: Per S.A. Bobde, J. at paragraph 6; Per Chelameswar, J.
at paragraph 9; Per D.Y. Chandrachud, J. at paragraph 27.
7
Per S.A. Bobde, J. at paragraph 6; Per Chelameswar, J. at paragraph 9; Per D.Y. Chandrachud, J. at paragraph 27.
8
Full text of Supreme Court’s judgment on Right to Privacy | Latest News India - Hindustan Times
6. The privacy of the home must protect the family, marriage, procreation and
sexual orientation which are all important aspects of dignity.
7. ...in a country like ours which prides itself on its diversity, privacy is one of
the most important rights to be protected both against State and non-State
actors and be recognized as a fundamental right.
8. ...right of privacy cannot be denied, even if there is a miniscule fraction of
the population which is affected. The majoritarian concept does not apply to
Constitutional rights...
The right to privacy was grounded in rights to freedom under both Article 21
and Article 19 of the Constitution of India encompassing freedom of the body
as well as the mind. It was held that ― “privacy facilitates freedom and is
intrinsic to the exercise of liberty” 9, and examples of the freedoms enshrined
under Article 25, Article 26 and Article 28(3) of the Constitution of India were
given to show how the right to privacy was necessary to exercise all the
aforementioned rights.10 The approach of the Supreme Court in Kharak Singh
and A.K. Gopalan v. State of Madras11 of putting the freedoms given under Part
III of the Constitution of India under distinct compartments was also rejected.
Instead, it was held that that these rights are overlapping and the restriction of
one freedom affects the other, as was also held previously in the Maneka12 and
Cooper13 judgments. Therefore, a law restricting a freedom under Article 21 of
the Constitution of India would also have to meet the reasonableness
requirements under Article 19 and Article 14 of the Constitution of India.
In the instant matter, the research cell of the local university headed by Prof.
Suryakanth Shinde shared the agreement with the Think Data as per the
agreement without the knowledge and consent of the people being surveyed.
The data collected include the personality traits, locations, taste and
preferences, habits and their political affiliations of the users which is
considered as the sensitive personal data [1.2.1].
9
Per D.Y. Chandrachud, J. at paragraph 169
10
Per S.A. Bobde, J. at paragraph 32
11
A.K. Gopalan v. State of Madras, AIR 1950 SC 27
12
Maneka Gandhi v. Union of India, (1978) 1 SCC 248.
13
Rustom Cavasji Cooper v. Union of India, (1970) 1 SCC 248.
Thus, apart from the harm of intrusion of one ‘s privacy, as pointed out
by the Supreme Court, such data, if revealed, may also be the basis of
discriminatory action.14
14
See also Article 29 Data Protection Working Party, ‘Advice paper on Special Categories of Data (“sensitive data”)‘, European
Commission (20 April 2011), available at: http://ec.europa.eu/justice/data-protection/article-29/documentation/other-
document/files/2011/2011_04_20_letter_artwp_mme_le_bail_directive_9546ec_annex1_en.pdf (last accessed 2 November
2017); ICO, ‘Guidance note on Special Categories of Data‘, available at: https://ico.org.uk/fororganisations/guide-to-data-
protection/key-definitions/, (last accessed 2 November 2017), ‘The presumption is that, because information about these
matters could be used in a discriminatory way, and is likely to be of a private nature, it needs to be treated with greater care than
other personal data.‘
15
The Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules,
2011 (indiankanoon.org)
16
Regulation EU 2016/679 of the European Parliament and of the Council on the protection of natural persons with regard to the
processing of personal data and on the free movement of such data.
vital interest, public interest, and legitimate interest pursued by the
controller.17
2. United Kingdom
The UK DPA also requires the data subject to provide consent for the
processing of her personal data.18 The UK DPA follows the EU GDPR
approach by making consent only one of the six grounds for lawful
processing.
3. South Africa
The POPI Act also recognises that processing of personal data should only
takes place with the consent of the data subject. It follows the EU GDPR
and the UK DPA approach by making consent one of the other grounds for
lawful processing of personal data.19
4. Canada
Under Canada’s PIPEDA, organisations are required to obtain an
individual‘s valid consent to lawfully collect, use and disclose personal
information in the course of commercial activity.20
5. USA
legislations such as the GLB Act21, which governs the financial services
industry, places certain obligations on financial institutions to seek the
consent of consumer prior to collecting non-public financial institution and
does not permit the disclosure of any non-public financial information to a
third party in the absence of the consumer‘s consent (obtained by way of
notice).22
The idea of ‘Data Protection’ has its different aspects. The different aspects of
data protection as a right like, the right of access to data banks, the right to
check their exactness, the right to bring them up to date and to correct them, the
right to the secrecy of sensitive data, the right to authorize their dissemination:
17
Article 6(1)(a), EU GDPR provides with respect to consent that: ―Processing shall be lawful only if and to the extent that at
least one of the following applies- the data subject has given consent to the processing of his or her personal data for one or
more specific purposes.
18
Section 4, read with Schedule 1 (Principle 1), Schedule 2 (Condition 1) and Schedule III (Condition 1) of the UK DPA
19
Section 11(1)(a)-(f), POPI Act.
20
Principle 4.3, Schedule 1, PIPEDA
21
15 U.S.C. Sections 6801-6827.
22
Section 502, GLB Act.
23
Graham Greenleaf and Sinta Dewi Rosadi, “Indonesia’s data protection Regulation 2012: A brief code with data breach
notification,” Privacy Laws & Business International Report, Issue 122, (2013): 24-27.
all these rights together today constitute the new right to privacy.24 Hence in
this matter the linkage of ‘Data Protection’ and ‘Privacy’ status are very much
appropriate as a right based approach.
In another landmark case25, the Supreme Court of India further developed the
law of privacy by holding that domiciliary visit of the police and disclosure of
the information. This disclosure of the information approaching the modern
data protection concern. In R Rajagopal v. State of Tamil Nādu26 the petitioner
was the editor, printer and publisher of a Tamil weekly magazine published in
Madras who sought an order restraining the State of Tamil Nādu from
interfering with the authorized publication of the autobiography of Auto
Shankar, a condemned prisoner awaiting the death penalty which was based on
public records. In this case Jeevan Reddy, J reaffirmed that the right to privacy
is implicit in the right to life and liberty guaranteed in Article 21 of the
Constitution. The Court also affirmed that the ‘right to be let alone’ for every
citizen of this country to safeguard their privacy.
Therefore the ‘right to privacy’ has its own way to develop the matter of ‘data
protection’. In the same way both the idea has been come under the matter of
right under the Constitution of India.
Therefore, here the sensitive personal data is shared as per agreement without
the knowledge and consent of the user is infringement of right of privacy.
ISSUE 2:
2. Whether the accused are guilty of criminal breach of trust r/w section 34 of
Indian Penal code, 1860?
It is humbly submitted before this Hon’ble High Court that to constitute a
criminal breach of trust three essential ingredients are required:
1. The accused must be entrusted with the property or with dominion over it,
2. The person so entrusted must use that property, or;
3. The accused must dishonestly use or dispose of that property or wilfully
suffer any other person to do so in violation,
a. of any direction of law prescribing the mode in which such trust is to be
discharged, or;
b. of any legal contract made touching the discharge of such trust.
A research cell led by Prof. Suryakanth Sindhe collected data for the research
using the platform known as DOST with the consent and knowledge of the user
in the present case. However, all of the information was eventually shared with
the company known as Think Data without the consent and knowledge of the
user, resulting in a breach of trust.
24
I. N. Walden and R. N. Savage, “Data Protection and Privacy Laws: Should Organizations Be Protected? “The International and
Comparative Law Quarterly, Vol. 37, No. 2 (1988): 337-347
25
Govind v. State of Madhya Pradesh, AIR 1975 SC 1378
26
(1994) 6 SCC 632.
2.1 That the personal data is considered as the property
The new Personal Data Protection Bill, 2022 ("PDP Bill") proposed to
replace the SPDI Rules defines 'personal data' as data about or relating
to a natural person who is directly or indirectly identifiable, having
regard to any characteristic, trait, attribute or any other feature of the
identity of such natural person, whether online or offline, or any
combination of such features with any other information, and shall
include any inference drawn from such data for the purpose of
profiling. To summarize, any information, personal to a person,
including name, which identifies a person, is personal data.32
2.2 That the accused has dishonestly used the personal information
I humbly submit to the Hon'ble High Court that the information gathered by
users of the DOST platform is intended for research and has been dishonestly
sold to Think Data, thereby violating the law since one cannot use information
for any other purpose without the consent of the information owner, and it was
also a violation of the contract between DOST and the information provider
that they will take all necessary steps to secure the information's privacy. It is
here where the criminal breach of trust can be found.
33
Chandrakant Manilal Shah And Anr vs Commissioner Of Income Tax, ... on 24 October, 1991 (indiankanoon.org)
34
Exploring Property Rights In Personal Data - Privacy Protection - India (mondaq.com)
The Information Technology (Reasonable Security Practices and
Procedures and Sensitive Personal Data or Information) Rules, 2011.35
These rules are applicable to body corporate or any person located in
India and rules lay out specific provisions related to SPDI.
The Research cell also fails to comply with the duties of the
intermediaries as mentioned in the Information Technology
(Intermediaries Guidelines) Rules, 201136
In Major E.G. Barsay v. The State of Bombay41 it was held that an agreement to
break the law constitutes the gist of the offence of criminal conspiracy under
Section 120A IPC.
38
Intermediaries Under The Information Technology (Amendment) Act 2008 - Telecoms, Mobile & Cable Communications - India
(mondaq.com)
39
R. Venkatakrishnan vs Central Bureau Of Investigation on 7 August, 2009 (indiankanoon.org)
40
1988 AIR 18843
41
AIR 1961 SC 1762
I humbly submit to the Hon'ble High Court that firstly there is an agreement
between Think Data and Prof Suraykanth Sindhe, according to which the
information was sold to Think Data. As for the second point, the agreement
may have been made for a lawful purpose, but it is illegal to share the personal
information of individuals with other parties without their consent.
It is humbly submitted before the Honourable High Court that this case strongly
comes under the horizons of the new words which were introduced into the
section 34 in 1870 and intention of the accused must be studied very carefully
as stated in facts.
In Babulal Bhagwan Khandare v State of Maharashtra45, held that the acts may
be different in character, but must have been actuated by one and the same
common intention in order to attract the provision.
In Barendra Kumar Ghosh v King Emperor46, stated the true purport of section
34 as:
The words of s.34 are not to be eviscerated by reading them in this exceedingly
limited sense. By s.33 a criminal act in s.34 includes a series of acts and,
further “act” includes an omission to act, for example, an omission to interfere
in order to prevent a murder being done before one’s very eyes.
42
Ratanlal & Dhirajlal, “The Indian Penal Code”, 36th Edition, 2019.
43
Queen vs. Gora Chand Gope & Ors (1866) 5 South WR (Cri) 45.
44
Ashok Kumar v State of Punjab, AIR 1977 SC 109: (1977)1 SCC 746
45
Babulal Bhagwan Khandare v State of Maharashtra AIR 2005 SC 1460 : (2005) 10 SCC 404.
46
Barendra Kumar Ghosh v King Emperor, AIR 1925 PC 1
Under section 34 of the Indian penal act, a crime is considered a crime if three
essential conditions are met. In this case, the breach of trust is criminal in
nature, secondly, it is committed by several individuals, and thirdly, it must be
committed with the same intent, which both where Suryakanth Sindhe and
Company Think Data wish to profit from information obtained from academic
research.
ISSUE 3:
3. Whether there exists the common intention amongst the accused?
It is humbly submitted before the Hon’ble High Court that there is existence of
common intention between the company Think Data and the Prof. Suryakanth
Sindhe as per the Section 34 of the IPC, 1860.
This provision is only a rule of evidence and does not create a substantive
offence. It lays down the principle of joint liability. To charge a person under
this section, it must be shown that he shared a common intention with another
person or persons to commit a crime and subsequently the crime was
perpetrated.50 The Apex Court held in a case51, that in the case of section 34 it is
well establish that a common intention presupposes prior concert. It requires a
pre-arranged plan because before a man can be vicariously convicted for the
criminal act of another, the act must have been done in furtherance of the
common intention of them all.
47
Section 34, Indian Penal Code
48
Mepa Dana, (1959) Bom LR 269.
49
Shaik China Brahmam v. State of A.P., AIR 2008 SC 610.
50
Garib Singh v State of Punjab, 1972 Cr LJ 1286
51
Pandurang v. State of Hyderabad, AIR 1955 SC 216
To constitute common intention, it is necessary that the intention of each one of
the accused was known to the rest of them and was shared by them. The test to
decide if the intention of one of them is common is to see whether the intention
of one of them is common is to see whether the intention of one was known to
the other and was shared by that other. In drawing the inference, the true rule of
law which is to be applied is the rule which requires that guilt is not to inferred
unless that is the only inference which follows from the circumstances of the
case and no other innocuous inference can be drawn. 52
Each can individually cause a separate cause a separate fatal blow. Yet, there
may not exist a common intention if there was no prior meeting of the mind. In
such a case, each would be individually liable for the injuries, he causes. 53
Before a court can convict a person for any offence read with section 34, it
should come to a definite conclusion that the said person had a prior concert
with one or more persons, named or unnamed, for committing the said the
offence.57
52
Oswal Danji v State. (1960) 1 Guj LR 145.
53
Nandu & Dhaneshwar Naik v. The State, 1976 CriLJ 250
54
Parasa Raja Manikyala Rao v State of A.P, (2003) 12 SC 306 : AIR 2004 SC 132 : 2004 Cr Lj 390, citing Shankarlal Kacharabhai,
AIR 1965 SC 1260 : 1965 (2) Cr LJ 226.
55
AIR 2010 SC 686 : (2010) 2 SCC 91
56
Maqsoodan v State of Up, 1983 Cr LJ 218 : AIR 1983 SC 126 : (1983) 1 SCC 218; Aizaz v State of UP, (2008) 12 SCC 198 : 2008 Cr
LJ 4374, Lala Ram v State of Rajasthan, (2007) 10 SCC 225 : (2007) 3 SCC Cr 634, Harbans Kaur v State of Haryana, AIR 2005 SC
2989 : 2005 Cr LJ 2199 (SC), Dani Singh v State of Bihar, 2004 (13) SCC 203 : 2004 Cr LJ 3328 (SC)
57
Krishna Govind Patil v State of Maharashtra, AIR 1963 SC 1413 : 1964 (1) SCR 678 : 1963 Cr LJ 351 (SC); State of Maharashtra v
Jagmohan Singh Kuldip Singh Anand, (2004) 7 SCC 659 : AIR 2004 SC 4412, the prosecution is not required to prove in every case
a pre-arranged plan or prior concert. Preetam Singh v State of Rajasthan, (2003) 12 SCC 594, prior concert can be indered,
common intention can develop on the spot.
3.1.2 Act is done in furtherance of common intention
In view of the phraseology of section 34 existence of common intention is not
enough, the criminal act impugned to attract section 34 must be committed in
furtherance of common intention. The section operates only when it is found
that the criminal act done by an individual is in furtherance of the common
intention and not without it.58 The words ‘in furtherance of the common
intention of all’ in section 34, IPC do not require that in order that the section
may apply, all participants in the joint acts must either have common intention
of committing the same offence or the common intention of producing the same
result by their joint act be performed.
58
State of Bihar v Lala Mahto A.I.R 1955 pat. 161.
59
Dharam Pal v State of Haryana, AIR 1978 SC 1492
Information Technology Act, 2000 (“IT Act”) was amended in the year 2008 to
bring in new provisions such as Section 43-A and Section 72-A. Section 43-A
of the IT Act primarily deals with the compensation for negligence in
implementing and maintaining ‘reasonable security practices and procedures’ in
relation to ‘sensitive personal data or information’ (“SPDI”) while Section 72-A
of the IT Act mandates punishment for disclosure of ‘personal information’ in
breach of lawful contract or without the information provider’s consent.60
Under rule 562, a body corporate is required to obtain prior consent from the
information provider regarding the purpose of usage of the SPDI. Here in this
case the information collected by the user of the dost platform is obtained by
saying that the particular information is for the academic purpose but eventually
sold to the third party without even taking consent or giving information
regarding the third party agreement.
The SPDI Rules further mandate that a body corporate handling SPDI shall
provide a comprehensive privacy policy containing details such as the type of
information collected, the purpose for collection of information, the disclosure
policy, the security practices, and procedures followed etc. The privacy policy is
required to be clearly published on the website of the body corporate and made
readily available to the information providers.
Hence, it is humbly submitted that here the information collected from the
information provider is sensitive in nature hence the Information Technology
(Reasonable Security Practices and Procedures and Sensitive Personal Data or
Information) Rules, 2011 (“SPDI Rules”) is applicable.
2. It is mandatory for the corporate bodies to declare their privacy policy to the
user and obtain their consent to the same.66
63
A2000-21_0.pdf (legislative.gov.in)
64
The Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules,
2011 (indiankanoon.org)
65
Based on the information sourced from India Telecommunications Privacy Report referred on
https://www.privacyinternational.org/reports.
66
Section 43A of the Act and Rule 4 of the Information Technology (Reasonable security practices and procedures and sensitive
personal data or information) Rules, 2011
67
Section 43A of the Act and Rule 5(1) of the Information Technology (Reasonable security practices and procedures and
sensitive personal data or information) Rules, 2011
4. It is also provided that any failure on the part of corporate body in this regard
shall attract a penalty in the form of compensation to the person affected by any
such failure and may also result in incurring a criminal liability if the
consequence of any such failure is wrongful loss or gain.68
Mphasis BPO Fraud: 2005 In December 2004, four call centre employees,
working at an outsourcing facility operated by MphasiS in India, obtained PIN
codes from four customers of MphasiS’ client, Citi Group. These employees
were not authorized to obtain the PINs. In association with others, the call
centre employees opened new accounts at Indian banks using false identities.
Within two months, they used the PINs and account information gleaned during
their employment at MphasiS to transfer money from the bank accounts of
CitiGroup customers to the new accounts at Indian banks.
By April 2005, the Indian police had tipped off to the scam by a U.S. bank, and
quickly identified the individuals involved in the scam. Arrests were made when
those individuals attempted to withdraw cash from the falsified accounts,
$426,000 was stolen; the amount recovered was $230,000.
Verdict: Court held that Section 43(a) was applicable here due to the nature of
unauthorized access involved to commit transactions.69
Hence, it is submitted before the honourable HC that the accused are liable
under section 43A of the Information Technology Act, 2000 as firstly the
information was sold to Think Data without the consent and knowledge of the
user of Dost platform.
In R. Rajagopal v. State of T.N71, the Supreme Court held that the petitioners
have a right to publish what they got as information regarding the concerned
person, from the public records or public domain. This may be without his
consent or authorization. But if they go beyond that and publish his life story,
they may be invading his right to privacy.
Hence, doing something beyond the consent or the agreement between the user
is infringement of right of privacy of the user.
This bill mentions some obligation of data fiduciaries and grounds for data processing:
1. Purpose and Collection Limitation:
Personal data may only be processed in a fair and reasonable manner that
will ensure the privacy of data principals. It can be collected only to the
extent necessary for the purposes of processing.
2. Privacy Notice:
Data fiduciaries are required to provide data principals with a notice that
details specific information, including purposes of processing, nature and
categories of personal data being collected, and the basis of processing. This
notice must be clear, precise, and easily comprehensible to an individual and
in multiple languages to the extent necessary and practicable. Notably, no
notice is required where the provision of such notice would prejudice the
processing of personal data for Public Interest
71
R. Rajagopal @ R.R. Gopal v/s State of Tamil Nadu Writ Petition (C) No. 422 of 1994 Decided On, 07 October 1994
72
A Guide To The Data Protection Bill, 2021 - Privacy Protection - India (mondaq.com)
a. Personal data can only be processed by a data principal providing free,
informed, specific, and clear consent that is capable of being withdrawn, at the
commencement of processing.
b. Sensitive personal data can only be processed with the explicit consent of data
principals.
c. The burden of proving if consent of a data principal has been sought vests with
data fiduciaries.
d. Data fiduciaries can only process personal data for purposes that are consented
to by the data principal or purposes which are incidental to or connected to such
purpose and where the data principal would reasonably expect the processing in
regard to the purpose, and in the context and circumstances in which the
personal data was collected.