4) Trace the evolution of privacy in India from primitives to Puttaswamy. Discuss the challenges posed by spread of Internet with suitable examples and suggest a balanced approach to internet takedowns.(250 words)

Topic: Government policies and interventions for development in various sectors and issues arising out of their design and implementation. Important aspects of governance, transparency and accountability, e-governance- applications, models, successes, limitations, and potential; citizens charters, transparency & accountability and institutional and other measures.

4) Trace the evolution of privacy in India from primitives to Puttaswamy. Discuss the challenges posed by spread of Internet with suitable examples and suggest a balanced approach to internet takedowns.(250 words)

Livemint

Why this question:

The article highlights the fact that Our courts should observe restraint while ordering the removal of offensive internet content.

Key demand of the question:

The answer should trace in detail the evolution of privacy laws and norms in India from primitives to Puttaswamy. Elucidate upon the challenges posed by the spread of internet.

Directive:

DiscussThis is an all-encompassing directive – you have to debate on paper by going through the details of the issues concerned by examining each one of them. You have to give reasons for both for and against arguments.

Structure of the answer:

Introduction: 

In brief discuss importance of privacy.

Body:

Explain that as much as the internet is a blessing, the fact that it can be accessed from everywhere gives rise to conflicts between national laws that are hard to reconcile. The very concept of an international network, through which data flows unimpeded between countries, threatens traditional notions of sovereignty, challenging courts and governments to find new ways in which to enforce local laws while still availing themselves of the benefits of the network. As the stakes have grown higher, governments have allowed their frustration to show, imposing regulations such as data localization and requiring decryption of encrypted traffic to wrest back some control.

Conclusion:

Conclude with way forward.

CategoriesINSIGHTS