{"id":12200,"date":"2021-07-24T00:00:00","date_gmt":"2021-07-24T00:00:00","guid":{"rendered":"https:\/\/www.nextias.com\/current_affairs\/uncategorized\/24-07-2021\/right-to-be-forgotten\/"},"modified":"2025-07-25T16:04:11","modified_gmt":"2025-07-25T10:34:11","slug":"right-to-be-forgotten","status":"publish","type":"post","link":"https:\/\/www.nextias.com\/ca\/current-affairs\/24-07-2021\/right-to-be-forgotten","title":{"rendered":"Right to be Forgotten"},"content":{"rendered":"<p><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong><u>In News<\/u><\/strong><\/span><\/span><\/span><\/p>\n<p><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">Recently, a plea has been filed in Delhi High Court to exercise the Right of Being Forgotten.<\/span><\/span><\/span><\/p>\n<p><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong><u>Demands of Plea<\/u><\/strong><\/span><\/span><\/span><\/p>\n<ul>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">The plea maintains that the <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>Right to be Forgotten goes in sync with the Right to Privacy<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">, which is an integral part of <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>Article 21 <\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">of the Constitution, which concerns the <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>Right to Life<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">.<\/span><\/span><\/span><\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">It also mentions that the posts and videos on internet related to the petitioner have caused them <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>psychological pain for his diminutive acts<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">, which were erroneously committed a decade ago as the recorded videos, photos, articles of the same are available on various search engines\/online platforms.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">It also states that the petitioner\u2019s <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>mistakes<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> in his personal life become and <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>remain in public knowledge<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> for generations to come.\u00a0<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">Consequently, the values enshrined under <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>Article 21<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> of the Indian Constitution and the emergent jurisprudential concept of the Right to be Forgotten becomes extremely relevant in the present case.<\/span><\/span><\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong><u>Right to be Forgotten in India<\/u><\/strong><\/span><\/span><\/span><\/p>\n<ul>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">It is the right to have personal information removed from publicly available sources, including the internet and search engines, databases, websites etc. once the personal information in question is no longer necessary, or relevant<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">The Right to be Forgotten falls under the purview of an <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>individual\u2019s right to privacy<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">, which is governed by the <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>Personal Data Protection Bill<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> that is yet to be passed by Parliament.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">In <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>2017<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">, the <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>Right to Privacy<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> was declared a <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>Fundamental Right<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> by the Supreme Court in its landmark verdict.<\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type: circle;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">At that time, the court held that the right to privacy is protected as an intrinsic part of the right to life and personal liberty under Article 21 and as a part of the freedoms guaranteed by <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>Part III of the Constitution<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">.<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong><u>Personal Data Protection Bill<\/u><\/strong><\/span><\/span><\/span><\/p>\n<ul>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">It was introduced in <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>Lok Sabha<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> on <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>11<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong><sup>th<\/sup><\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong> December 2019<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">Its <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>aim<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> is to set out provisions meant for the protection of the personal data of individuals.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>Clause 20 under Chapter V<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> of this draft bill titled <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>\u201cRights of Data Principal\u201d<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> mentions the \u201cRight to be Forgotten.\u201d\u00a0<\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type: circle;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">It states that the data principal (the person to whom the data is related) shall have the right to restrict or prevent the continuing disclosure of his personal data by a data fiduciary.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: circle;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">It gives an <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>individual the right to restrict or prevent the continuing disclosure of their personal data<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> when such data\u00a0<\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type: square;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">Has served the purpose for which It was collected, or is no longer necessary for said purpose.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: square;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">Was made with the consent of an individual, whose consent has since been withdrawn.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: square;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">Was made contrary to the PDP Bill or any law in force.<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"list-style-type: circle;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">While <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>assessing the data principal\u2019s request<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">, this <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>officer will need to examine<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> the:<\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type: square;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">Sensitivity of the personal data.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: square;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">Scale of disclosure.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: square;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">Degree of accessibility sought to be restricted.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: square;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">Role of the data principal in public life.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: square;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">Nature of the disclosure among some other variables.<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">Therefore, broadly, under the Right to be Forgotten, users can <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>de-link, limit, delete or correct the disclosure<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> of their personal information held by data fiduciaries.<\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type: circle;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">A <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>data fiduciary<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> means any person, including the State, a company, any juristic entity or any individual who alone or in conjunction with others determines the purpose and means of processing of personal data.<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">Even so, the sensitivity of the personal data and information cannot be determined independently by the person concerned, but will be overseen by the <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>Data Protection Authority (DPA)<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">.\u00a0<\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type: circle;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">This means that while the draft bill gives some provisions under which a data principal can seek that his data be removed, his or her rights are subject to authorisation by the Adjudicating Officer who works for the DPA.<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">In the meantime, the <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>Information Technology Rules, 2011<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">, which is the current regime governing digital data, does not have any provisions relating to the right to be forgotten.<\/span><\/span><\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong><u>Global Scenario<\/u><\/strong><\/span><\/span><\/span><\/p>\n<ul>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>European Union<\/strong><\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type: circle;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">The <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>Center for Internet and Society<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> notes that the Right to be Forgotten gained prominence when the matter was referred to the <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>Court of Justice of European Union<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> (CJEC) in 2014 by a Spanish Court.\u00a0<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: circle;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">It was a case between search engine <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>Google<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> and a <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>person<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> whose<\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong> data was shown<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> in the search engine.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: circle;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">This ruling was considered an important <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>victory for Google<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> and laid down that the online privacy law cannot be used to regulate the internet in countries such as India, which are outside the European Union (EU).<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: circle;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">In the EU, the right to be forgotten <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>empowers individuals<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> to ask organisations to delete their personal data.\u00a0<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: circle;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">It is provided by the <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>EU\u2019s General Data Protection Regulation<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> (GDPR), a law passed by the 28-member bloc in 2018.<\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type: square;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>GDPR<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> is the toughest privacy and security law in the world.\u00a0<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: square;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">Though it was drafted and passed by the EU, it <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>imposes obligations onto organizations anywhere<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">, so long as they target or collect data related to people in the EU.<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"list-style-type: circle;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">In its landmark ruling, the EU\u2019s highest court ruled in 2019 that the \u2018Right to be Forgotten\u2019 under European law <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>would not apply beyond the borders<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> of EU member states.<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p style=\"text-align: center;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong><u><img decoding=\"async\" style=\"height: 380px; width: 575px;\" src=\"https:\/\/lh5.googleusercontent.com\/JyIFoKGrEs89c1onrVHsjrqYLZvABuvCIrw5k2vj_M1vEgccVsUlyi6jh4I3kzy9B7HqrcwztXvQXpN8hpNi6PncL7x-BBm2Azf58uK2g_9YX0dWg_ZlZCwvhQGLYbL984ydwa14\" \/><\/u><\/strong><\/span><\/span><\/span><\/p>\n<p style=\"text-align: center;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">(Image Courtesy: <\/span><\/span><\/span><a style=\"text-decoration: none;\" href=\"https:\/\/www.business-standard.com\/article\/opinion\/right-to-be-forgotten-will-be-arduous-as-india-frames-data-protection-law-119092900741_1.html\" target=\"_blank\" rel=\"noopener\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #1155cc;\"><u>BS<\/u><\/span><\/span><\/span><\/a><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">)<\/span><\/span><\/span><\/p>\n<p><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong><u>Challenges<\/u><\/strong><\/span><\/span><\/span><\/p>\n<ul>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>Enforcement Challenge<\/strong><\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type: circle;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">There are many<\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong> legal and technical challenges<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> in the enforcement of the right to be forgotten.\u00a0<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: circle;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">The <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>success rate<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> of governments across the world in banning or removing pornographic websites or torrent sites from the Internet <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>has not been great<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">, since there are various ways of circumventing such bans.\u00a0<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: circle;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">Further, the <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>blocking or delinking<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> of URLs by search engines <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>does not guarantee<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> that such <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>information has been blocked or deleted<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> from the Internet.\u00a0<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: circle;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">There is also no way to ensure that such information is not uploaded again.<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>Right to Privacy v\/s Information of Public Interest<\/strong><\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type: circle;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">Google has created a mechanism through which an individual can make a request for taking down or delinking a specific search result bearing an individual\u2019s name.\u00a0<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: circle;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">Google <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>evaluates such requests on various parameters<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> like whether these results are an infringement on his right to privacy or whether such information is of public interest.\u00a0<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: circle;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">In the case of the former, the individual\u2019s right to be forgotten trumps the public\u2019s right to access information.\u00a0<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: circle;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">However, <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>if the information is of public interest<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">, the right to information of the public <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>prevails over privacy rights<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: circle;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">This squarely makes Google the decision maker of the relevance, adequacy, and need for data to be available online for public access or not.<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>Scrutinization of Requests<\/strong><\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type: circle;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">With the growing recognition of the right to be forgotten, the <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>number of requests <\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">that search engines receive for taking down or delinking is only <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>likely to increase<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">, making it extremely difficult and cumbersome to scrutinize such requests manually.\u00a0<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: circle;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">According to <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>Google\u2019s Transparency Report<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">, as in <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>2016<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">, Google had received 565,412 requests for the removal of URLs. The Report further states that it has already evaluated 1,717,714 URLs since May, 2014. The Report shows that Google has removed 56.8% of the URLs from the requests received.\u00a0<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: circle;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">With a substantial increase in the number of requests, search engines may even <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>consider using algorithms<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> to deal with such requests instead of manually evaluating the privacy rights vis-\u00e0-vis public interest.<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>Misuse of Right by Individuals<\/strong><\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type: circle;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">This right may be misused by individuals as it will lead to<\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong> artificial alteration of the content available online<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> which may result in the delinking of pertinent information.<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>No Turning Back for Information in Public Domain<\/strong><\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type: circle;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">Information in the public domain is like toothpaste, once it is out of the tube one cannot get it back in and once the information is in the public domain it will never go away.<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong><u>Way Forward<\/u><\/strong><\/span><\/span><\/span><\/p>\n<ul>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">The Right to be Forgotten <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>needs to be established statutorily<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> in Indian jurisprudence and <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>must extend to cover private persons<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> as well as the State, as proposed in the Personal Data Protection Bill, 2019.\u00a0<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">The Right is necessary to enable individuals to have <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>more and better control of their personal information online<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">The countries need to <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>think in terms of designing the right constitutive rules <\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">of the logical space of online information.\u00a0<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">The Right to be Forgotten could be a <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>remedy for victims of sexually explicit videos\/pictures<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> often posted on social media platforms by culprits to intimidate and harass women.<\/span><\/span><\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">Source: <\/span><\/span><\/span><a style=\"text-decoration: none;\" href=\"https:\/\/indianexpress.com\/article\/explained\/the-right-to-be-forgotten-india-explained-7418661\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #1155cc;\"><u>IE<\/u><\/span><\/span><\/span><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In News Recently, a plea has been filed in Delhi High Court to exercise the Right of Being Forgotten. Demands of Plea The plea maintains that the Right to be Forgotten goes in sync with the Right to Privacy, which is an integral part of Article 21 of the Constitution, which concerns the Right to [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":12201,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[21],"tags":[30,49],"class_list":["post-12200","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-current-affairs","tag-gs-2","tag-indian-constitution"],"acf":[],"jetpack_featured_media_url":"https:\/\/wp-images.nextias.com\/cdn-cgi\/image\/format=auto\/ca\/uploads\/2023\/07\/3705986Current-Affairs.jpg","_links":{"self":[{"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/posts\/12200","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/comments?post=12200"}],"version-history":[{"count":1,"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/posts\/12200\/revisions"}],"predecessor-version":[{"id":49206,"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/posts\/12200\/revisions\/49206"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/media\/12201"}],"wp:attachment":[{"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/media?parent=12200"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/categories?post=12200"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/tags?post=12200"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}