{"id":639,"date":"2023-08-20T07:40:17","date_gmt":"2023-08-20T07:40:17","guid":{"rendered":"https:\/\/projects-dev.itforchange.net\/online-violence-gender-and-law-guide\/?page_id=639"},"modified":"2023-10-25T19:23:52","modified_gmt":"2023-10-25T19:23:52","slug":"5-7-right-to-privacy","status":"publish","type":"page","link":"https:\/\/projects.itforchange.net\/online-violence-gender-and-law-guide\/module-5-rights-based-approach-to-online-gender-based-violence\/5-7-right-to-privacy\/","title":{"rendered":"5.7 Right to Privacy"},"content":{"rendered":"<div id=\"pl-639\"  class=\"panel-layout\" ><div id=\"pg-639-0\"  class=\"panel-grid panel-has-style\" ><div id=\"module-breadcrumbs\" class=\"panel-row-style panel-row-style-for-639-0\" ><div id=\"pgc-639-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-639-0-0-0\" class=\"so-panel widget widget_bcn_widget widget_breadcrumb_navxt panel-first-child panel-last-child\" data-index=\"0\"><div class=\"panel-widget-style panel-widget-style-for-639-0-0-0\"><div class=\"breadcrumbs\" vocab=\"https:\/\/schema.org\/\" typeof=\"BreadcrumbList\">Navigate:<span property=\"itemListElement\" typeof=\"ListItem\"><a property=\"item\" typeof=\"WebPage\" title=\"Go to Online Gender-based Violence Judicial Resource Guide.\" href=\"https:\/\/projects.itforchange.net\/online-violence-gender-and-law-guide\" class=\"home\" aria-current=\"page\"><span property=\"name\">Online Gender-based Violence Judicial Resource Guide<\/span><\/a><meta property=\"position\" content=\"1\"><\/span><\/div><\/div><\/div><\/div><\/div><\/div><div id=\"pg-639-1\"  class=\"panel-grid panel-has-style\" ><div id=\"module-heading\" class=\"panel-row-style panel-row-style-for-639-1\" ><div id=\"pgc-639-1-0\"  class=\"panel-grid-cell\" ><div id=\"panel-639-1-0-0\" class=\"so-panel widget widget_sow-headline panel-first-child panel-last-child\" data-index=\"1\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-headline so-widget-sow-headline-default-ae491fbc5056-639 so-widget-fittext-wrapper\"\n\t\t\t data-fit-text-compressor=\"0.85\"\n\t\t><div class=\"sow-headline-container \">\n\t\t\t\t\t\t\t<h1 class=\"sow-headline\">\n\t\t\t\t\t\t<img class=\"alignnone size-thumbnail\" style=\"margin-right: 10px\" src=\"https:\/\/projects.itforchange.net\/online-violence-gender-and-law-guide\/wp-content\/uploads\/2023\/10\/31-150x150.png\" alt=\"\" width=\"75\" height=\"75\" \/> 5.7 Right to Privacy\t\t\t\t\t\t<\/h1>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"decoration\">\n\t\t\t\t\t\t<div class=\"decoration-inside\"><\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><div id=\"pg-639-2\"  class=\"panel-grid panel-has-style\" ><div id=\"module-content\" class=\"panel-row-style panel-row-style-for-639-2\" ><div id=\"pgc-639-2-0\"  class=\"panel-grid-cell\" ><div id=\"panel-639-2-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child\" data-index=\"2\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p>The right to privacy means the right of a person to be left alone and be able to control their own life. In the digital age, privacy also means privacy over one\u2019s data and control over one\u2019s existence on the internet.<sup class=\"modern-footnotes-footnote modern-footnotes-footnote--hover-on-desktop \" data-mfn=\"1\" data-mfn-post-scope=\"0000000000002dcc0000000000000000_639\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-0000000000002dcc0000000000000000_639-1\">1<\/a><\/sup><span id=\"mfn-content-0000000000002dcc0000000000000000_639-1\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"1\"><em>K.S. Puttaswamy v. Union of India,<\/em> (2017) 10 SCC 1, p. 504.<\/span> While the internet allows individuals to protect their identities and activities online due to the anonymity it offers, it also poses a significant threat to privacy as any information put on it lasts forever.<sup class=\"modern-footnotes-footnote modern-footnotes-footnote--hover-on-desktop \" data-mfn=\"2\" data-mfn-post-scope=\"0000000000002dcc0000000000000000_639\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-0000000000002dcc0000000000000000_639-2\">2<\/a><\/sup><span id=\"mfn-content-0000000000002dcc0000000000000000_639-2\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"2\"><em>K.S. Puttaswamy v. Union of India<\/em>, (2017) 10 SCC 1, p. 529.<\/span><\/p>\n<p>Women and gender minorities, in particular, are subject to various forms of privacy violations on the internet, such as non-consensual intimate image distribution (NCIID), doxxing, hacking, etc. The lack of in-built privacy protections in digital technologies perpetuates online violence and can have real-life consequences for women and gender minorities. For instance, the circulation of non-consensual intimate images of a woman on social media can lead to reputational damage among friends and family, and loss of credibility in professional lives.<\/p>\n<p>Privacy entails that one\u2019s actions be free from surveillance by the state and private actors. However, digital technologies have made surveillance more pervasive by providing potent tools for large-scale data collection, continuous monitoring, and control of different aspects of an individual\u2019s life. The installation of CCTV cameras, ostensibly in the name of women\u2019s safety, ironically subjects them to constant surveillance by a state-sanctioned mechanism.<sup class=\"modern-footnotes-footnote modern-footnotes-footnote--hover-on-desktop \" data-mfn=\"3\" data-mfn-post-scope=\"0000000000002dcc0000000000000000_639\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-0000000000002dcc0000000000000000_639-3\">3<\/a><\/sup><span id=\"mfn-content-0000000000002dcc0000000000000000_639-3\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"3\">Bhandari, A. (2021). <i>Feminist Perspectives on Space, Safety and Surveillance: Improving a Woman\u2019s Right to the City<\/i>. The Wire. <a href=\"https:\/\/thewire.in\/women\/feminist-perspectives-on-space-safety-and-surveillance-improving-a-womans-right-to-the-city\">https:\/\/thewire.in\/women\/feminist-perspectives-on-space-safety-and-surveillance-improving-a-womans-right-to-the-city<\/a> <\/span> Women also face surveillance from their partners, family, and even strangers in the form of control of their usage of electronic devices, monitoring of their online activities, and tracking of their movements through GPS trackers, spy softwares, etc.<sup class=\"modern-footnotes-footnote modern-footnotes-footnote--hover-on-desktop \" data-mfn=\"4\" data-mfn-post-scope=\"0000000000002dcc0000000000000000_639\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-0000000000002dcc0000000000000000_639-4\">4<\/a><\/sup><span id=\"mfn-content-0000000000002dcc0000000000000000_639-4\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"4\"><i>International Women's Day: How surveillance is used to assert control.<\/i> (2015). Privacy International. <a href=\"https:\/\/privacyinternational.org\/news-analysis\/1483\/international-womens-day-how-surveillance-used-assert-control\">https:\/\/privacyinternational.org\/news-analysis\/1483\/international-womens-day-how-surveillance-used-assert-control<\/a> <\/span><\/p>\n<p>Further, an integral part of a woman\u2019s privacy is the right to make autonomous decisions about her own body without violence, discrimination, or coercion.<sup class=\"modern-footnotes-footnote modern-footnotes-footnote--hover-on-desktop \" data-mfn=\"5\" data-mfn-post-scope=\"0000000000002dcc0000000000000000_639\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-0000000000002dcc0000000000000000_639-5\">5<\/a><\/sup><span id=\"mfn-content-0000000000002dcc0000000000000000_639-5\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"5\">United Nations Human Rights Special Procedures Working Group. (2017). <em>Women\u2019s Autonomy, Equality, and Reproductive Health in International Human Rights: Between Recognition, Backlash, and Regressive Trends<\/em>. OHCHR. <a href=\"https:\/\/www.ohchr.org\/sites\/default\/files\/Documents\/Issues\/Women\/WG\/WomensAutonomyEqualityReproductiveHealth.pdf\">https:\/\/www.ohchr.org\/sites\/default\/files\/Documents\/Issues\/Women\/WG\/WomensAutonomyEqualityReproductiveHealth.pdf<\/a> <\/span> In digital spaces, it is the right of an individual to freely post pictures and videos of themselves, control who can view, capture, and share them, and not have to worry about the non-consensual sharing of their intimate images and videos.<sup class=\"modern-footnotes-footnote modern-footnotes-footnote--hover-on-desktop \" data-mfn=\"6\" data-mfn-post-scope=\"0000000000002dcc0000000000000000_639\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-0000000000002dcc0000000000000000_639-6\">6<\/a><\/sup><span id=\"mfn-content-0000000000002dcc0000000000000000_639-6\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"6\">Information Technology Act, 2000, Section 66E. <\/span> One example of how this right can be violated is through the offense of voyeurism, in which intimate images or videos are captured without the knowledge and\/or consent of the survivor and then shared with third parties or disseminated on social media. This is deeply invasive as the survivor is not in a position to consent to the images being taken and spread, resulting in a violation of bodily autonomy and privacy. Such violation can also occur when a woman consents to a specific person capturing her image, but does not consent to this person sharing the same image with others.<\/p>\n<\/div>\n<\/div><\/div><div id=\"panel-639-2-0-1\" class=\"so-panel widget widget_sow-editor\" data-index=\"3\" ><div id=\"m5-571\" class=\"panel-widget-style panel-widget-style-for-639-2-0-1\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<h3>5.7.1 Constitutional source of the right<\/h3>\n<p>In the landmark <i>Justice K.S. Puttaswamy v. Union of India and Ors<\/i>. <i>(2017)<\/i> judgment,<sup class=\"modern-footnotes-footnote modern-footnotes-footnote--hover-on-desktop \" data-mfn=\"7\" data-mfn-post-scope=\"0000000000002dcc0000000000000000_639\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-0000000000002dcc0000000000000000_639-7\">7<\/a><\/sup><span id=\"mfn-content-0000000000002dcc0000000000000000_639-7\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"7\"><em>K.S. Puttaswamy v. Union of India<\/em>, (2017) 10 SCC 1.<\/span> the Supreme Court recognized the right to privacy as sacrosanct under Article 21 of the Constitution. In defining the contours of privacy, the court moved beyond the narrow construction of privacy as a right against physical intrusion or invasion, to an expansive right that covers privacy of the body and mind, including decisions, choices, information, and freedom. In fact, Justice Rohinton Nariman defined the right to privacy to include three parts: \u201c(i) privacy that involves the person i.e. when there is some invasion by the State of a person\u2019s rights relatable to his physical body, such as the right to move freely; (ii) Informational privacy; and (iii) privacy of choice.\u201d<sup class=\"modern-footnotes-footnote modern-footnotes-footnote--hover-on-desktop \" data-mfn=\"8\" data-mfn-post-scope=\"0000000000002dcc0000000000000000_639\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-0000000000002dcc0000000000000000_639-8\">8<\/a><\/sup><span id=\"mfn-content-0000000000002dcc0000000000000000_639-8\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"8\"><em>K.S. Puttaswamy<\/em> v. <em>Union of India<\/em>, (2017) 10 SCC 1, p. 99. <\/span> The court noted that any restriction on the right to privacy of an individual must meet the three-fold requirement of:<\/p>\n<ol>\n<li aria-level=\"1\">legality, which postulates the existence of law;<\/li>\n<li aria-level=\"1\">need, defined in terms of a legitimate state aim; and<\/li>\n<li aria-level=\"1\">proportionality, which ensures a rational nexus between the objects and the means adopted to achieve them.<\/li>\n<\/ol>\n<p>It is important to note that the right to dignity was the focus of the court in reading the right to privacy under Article 21 of the Constitution. Noting that the right to dignity requires the right to autonomy and to exercise one\u2019s choice, the court held that the right to bodily integrity is an important part of the right to privacy and made specific references to several judicial decisions around women\u2019s autonomy over their bodies and sexuality.<\/p>\n<p>Following the Puttaswamy case, courts began to recognize privacy as a relevant factor in cases pertaining to online violence cases. In <i>X v.<\/i> <i>HTTPS : \/\/WWW.YOUTUBE.COM\/WATCH?V=IQ6K5Z3ZYS0 and Ors (2021)<\/i> the accused shot a demonstration video of the actress with complete frontal nudity, promising her the lead role in a movie in exchange, and then published on his YouTube channel without her consent.<sup class=\"modern-footnotes-footnote modern-footnotes-footnote--hover-on-desktop \" data-mfn=\"9\" data-mfn-post-scope=\"0000000000002dcc0000000000000000_639\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-0000000000002dcc0000000000000000_639-9\">9<\/a><\/sup><span id=\"mfn-content-0000000000002dcc0000000000000000_639-9\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"9\"><i>X v. HTTPS:\/\/WWW.YOUTUBE.COM\/WATCH?V=IQ6K5Z3ZYS0 and Ors.<\/i> CS(OS) 392\/2021, I.As.10543\/2021, 10544\/2021, 10545\/2021 &amp; 10546\/2021, order dated 23 August 2021, High Court of Delhi<\/span> Relying on the precedence set by the Puttaswamy judgment, the Delhi High Court held that the plaintiff in the case is entitled to be left alone and forgotten, and upheld her right to be protected from the invasion of her privacy by strangers. Similarly, in <i>Guruvinder Singh<\/i> <i>v.<\/i> <i>State of Uttar Pradesh and Anr. (2021)<\/i>, the Allahabad High Court referred to the Puttaswamy judgment while condemning the act of the accused in capturing intimate images and videos of a woman without her consent.<sup class=\"modern-footnotes-footnote modern-footnotes-footnote--hover-on-desktop \" data-mfn=\"10\" data-mfn-post-scope=\"0000000000002dcc0000000000000000_639\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-0000000000002dcc0000000000000000_639-10\">10<\/a><\/sup><span id=\"mfn-content-0000000000002dcc0000000000000000_639-10\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"10\"><i>Guruvinder Singh v. State of Uttar Pradesh<\/i>. and Anr., (2021) SCC OnLine All 748.<\/span> The court held that the survivor has the right to seek appropriate orders to have such offensive posts erased. In <i>Subhranshu Rout v.<\/i> <i>State of Odisha (2020)<\/i>, the Orissa High Court, hearing a case where the perpetrator shared non-consensual intimate images of a woman on social media,<sup class=\"modern-footnotes-footnote modern-footnotes-footnote--hover-on-desktop \" data-mfn=\"11\" data-mfn-post-scope=\"0000000000002dcc0000000000000000_639\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-0000000000002dcc0000000000000000_639-11\">11<\/a><\/sup><span id=\"mfn-content-0000000000002dcc0000000000000000_639-11\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"11\"><i>Subhranshu Rout @ Gugul v. State Of Odisha,<\/i> BLAPL No.4592 OF 2020, judgment dated 23 November 2020, Orissa High Court.<\/span> referred to the Puttaswamy judgment and held that allowing these images to continue to exist on social media violates the survivor\u2019s modesty and her right to privacy. It also acknowledged the importance of relevant legislation to comprehensively address privacy issues. Finally, in its recent judgment in <i>Mrs X v. Union of India and Ors (2023)<\/i>,<sup class=\"modern-footnotes-footnote modern-footnotes-footnote--hover-on-desktop \" data-mfn=\"12\" data-mfn-post-scope=\"0000000000002dcc0000000000000000_639\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-0000000000002dcc0000000000000000_639-12\">12<\/a><\/sup><span id=\"mfn-content-0000000000002dcc0000000000000000_639-12\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"12\">Mrs X <i>v.<\/i> Union of India, 2023:DHC:2806, judgment dated 26 April 2023, Delhi High Court. <\/span> the Delhi High Court highlighted how the infringement of privacy lies at the core of gender-based violence.<\/p>\n<p>Six years after the Supreme Court affirmed the right to privacy in the <em data-entity-type=\"MessageEntityItalic\">Puttuswamy<\/em>\u00a0case,<sup class=\"modern-footnotes-footnote modern-footnotes-footnote--hover-on-desktop \" data-mfn=\"13\" data-mfn-post-scope=\"0000000000002dcc0000000000000000_639\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-0000000000002dcc0000000000000000_639-13\">13<\/a><\/sup><span id=\"mfn-content-0000000000002dcc0000000000000000_639-13\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"13\">KS Puttaswamy v. Union of India, (2017) 10 SCC 1.<\/span> India enacted Digital Personal Data Protection Act, 2023 to safeguard the privacy of digital personal data of citizens. The Act, however, has received criticisms from various quarters on grounds of inadequate protection of individual personal data, exemptions given to private actors, excessive power given to state actors, and lack of meaningful safeguards against overbroad surveillance.<sup class=\"modern-footnotes-footnote modern-footnotes-footnote--hover-on-desktop \" data-mfn=\"14\" data-mfn-post-scope=\"0000000000002dcc0000000000000000_639\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-0000000000002dcc0000000000000000_639-14\">14<\/a><\/sup><span id=\"mfn-content-0000000000002dcc0000000000000000_639-14\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"14\">Mathi, S. (2020). <em>Fifteen major concerns with India\u2019s Digital Personal Data Protection Bill, 2023<\/em>. Medianama. <a href=\"https:\/\/www.medianama.com\/2023\/08\/223-major-concerns-india-data-protection-bill-2023\/\">https:\/\/www.medianama.com\/2023\/08\/223-major-concerns-india-data-protection-bill-2023\/<\/a> ; Malhotra, G. (2023). <em>India\u2019s data protection law does little for privacy while bolstering the state\u2019s surveillance powers<\/em>. Scroll.in. <a href=\"https:\/\/scroll.in\/article\/1054722\/indias-data-protection-law-does-little-for-privacy-while-bolstering-the-states-surveillance-powers\">https:\/\/scroll.in\/article\/1054722\/indias-data-protection-law-does-little-for-privacy-while-bolstering-the-states-surveillance-powers<\/a> <\/span><\/p>\n<\/div>\n<\/div><\/div><\/div><div id=\"panel-639-2-0-2\" class=\"so-panel widget widget_sow-editor\" data-index=\"4\" ><div id=\"m5-572\" class=\"panel-widget-style panel-widget-style-for-639-2-0-2\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<h3>5.7.2 International sources of the right<\/h3>\n<h4>5.7.2.1 Conventions<\/h4>\n<ol>\n<li>Universal Declaration of Human Rights (UDHR)<sup class=\"modern-footnotes-footnote modern-footnotes-footnote--hover-on-desktop \" data-mfn=\"15\" data-mfn-post-scope=\"0000000000002dcc0000000000000000_639\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-0000000000002dcc0000000000000000_639-15\">15<\/a><\/sup><span id=\"mfn-content-0000000000002dcc0000000000000000_639-15\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"15\"><em>Universal Declaration of Human Rights<\/em> (entered into force 1948).<\/span> and International Covenant on Civil and Political Rights (ICCPR)<sup class=\"modern-footnotes-footnote modern-footnotes-footnote--hover-on-desktop \" data-mfn=\"16\" data-mfn-post-scope=\"0000000000002dcc0000000000000000_639\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-0000000000002dcc0000000000000000_639-16\">16<\/a><\/sup><span id=\"mfn-content-0000000000002dcc0000000000000000_639-16\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"16\"><em>International Covenant on Civil and Political Rights<\/em>, opened for signature 1966 (entered into force 23 March 1976).<\/span>:<br \/>\nArticle 12 of the UDHR declares that everyone has the right to legal protection against interference in one\u2019s privacy, family, home, and correspondence, and attacks on one\u2019s honor and reputation. Article 17 of the ICCPR also guarantees the right to privacy in similar terms.<\/li>\n<li>European Convention on Human Rights<sup class=\"modern-footnotes-footnote modern-footnotes-footnote--hover-on-desktop \" data-mfn=\"17\" data-mfn-post-scope=\"0000000000002dcc0000000000000000_639\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-0000000000002dcc0000000000000000_639-17\">17<\/a><\/sup><span id=\"mfn-content-0000000000002dcc0000000000000000_639-17\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"17\"><em>European Convention on Human Rights<\/em>, opened for signature 1950 (entered into force 3 September 1953).<\/span>:<br \/>\nArticle 8 of the Convention recognizes everyone\u2019s right to respect for their private and family life, and their home and correspondence. Interference with this right can only be in accordance with law and if it is necessary in a democratic society in the interests of national security, public safety, prevention of disorder and crime, or protection of health or morals. The Supreme Court referred to this Article repeatedly in the Puttaswamy case.<\/li>\n<li>American Convention on Human Rights<sup class=\"modern-footnotes-footnote modern-footnotes-footnote--hover-on-desktop \" data-mfn=\"18\" data-mfn-post-scope=\"0000000000002dcc0000000000000000_639\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-0000000000002dcc0000000000000000_639-18\">18<\/a><\/sup><span id=\"mfn-content-0000000000002dcc0000000000000000_639-18\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"18\"><em>American Convention on Human Rights: Pact of San Jos\u00e9, Costa Rica<\/em>, (entered into force on 22 November 1969). <a href=\"https:\/\/treaties.un.org\/doc\/publication\/unts\/volume%201144\/volume-1144-i-17955-english.pdf\">https:\/\/treaties.un.org\/doc\/publication\/unts\/volume%201144\/volume-1144-i-17955-english.pdf<\/a><\/span>:<br \/>\nAccording to Article 11 of the Convention, no one shall be subjected to arbitrary or abusive interference in their private life, family, home, or correspondence, or to unlawful attacks on their honor or reputation. Everyone has the right to the protection of law against such interference or attacks. This Article and the decisions of the American Court of Human Rights related to it were also referred to by the Supreme Court in the Puttaswamy case.<\/li>\n<li>Asia Pacific Economic Cooperation Privacy Framework<sup class=\"modern-footnotes-footnote modern-footnotes-footnote--hover-on-desktop \" data-mfn=\"19\" data-mfn-post-scope=\"0000000000002dcc0000000000000000_639\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-0000000000002dcc0000000000000000_639-19\">19<\/a><\/sup><span id=\"mfn-content-0000000000002dcc0000000000000000_639-19\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"19\">Privacy Framework, APEC. ISBN 981-05-4471-5. <a href=\"https:\/\/www.apec.org\/docs\/default-source\/Publications\/2005\/12\/APEC-Privacy-Framework\/05_ecsg_privacyframewk.pdf\">https:\/\/www.apec.org\/docs\/default-source\/Publications\/2005\/12\/APEC-Privacy-Framework\/05_ecsg_privacyframewk.pdf<\/a> <\/span>:<br \/>\nThe objective is to prevent the misuse of personal information and the consequent harm to individuals, while upholding their right to privacy of personal information.<sup class=\"modern-footnotes-footnote modern-footnotes-footnote--hover-on-desktop \" data-mfn=\"20\" data-mfn-post-scope=\"0000000000002dcc0000000000000000_639\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-0000000000002dcc0000000000000000_639-20\">20<\/a><\/sup><span id=\"mfn-content-0000000000002dcc0000000000000000_639-20\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"20\">Principle I. Privacy Framework, APEC. ISBN 981-05-4471-5. <a href=\"https:\/\/www.apec.org\/docs\/default-source\/Publications\/2005\/12\/APEC-Privacy-Framework\/05_ecsg_privacyframewk.pdf\">https:\/\/www.apec.org\/docs\/default-source\/Publications\/2005\/12\/APEC-Privacy-Framework\/05_ecsg_privacyframewk.pdf<\/a> <\/span> To that end, it calls for privacy protections, including self-regulatory efforts, education and awareness campaigns, laws, regulations, and enforcement mechanisms, that safeguard individuals from the wrongful collection and misuse of their personal information.<sup class=\"modern-footnotes-footnote modern-footnotes-footnote--hover-on-desktop \" data-mfn=\"21\" data-mfn-post-scope=\"0000000000002dcc0000000000000000_639\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-0000000000002dcc0000000000000000_639-21\">21<\/a><\/sup><span id=\"mfn-content-0000000000002dcc0000000000000000_639-21\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"21\">Principle I. Privacy Framework, APEC. ISBN 981-05-4471-5. <a href=\"https:\/\/www.apec.org\/docs\/default-source\/Publications\/2005\/12\/APEC-Privacy-Framework\/05_ecsg_privacyframewk.pdf\">https:\/\/www.apec.org\/docs\/default-source\/Publications\/2005\/12\/APEC-Privacy-Framework\/05_ecsg_privacyframewk.pdf<\/a> <\/span> Further, it calls upon personal information controllers, such as technology companies, to protect the personal information they hold against risks such as loss, unauthorized access, destruction, use, modification, and disclosure.<sup class=\"modern-footnotes-footnote modern-footnotes-footnote--hover-on-desktop \" data-mfn=\"22\" data-mfn-post-scope=\"0000000000002dcc0000000000000000_639\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-0000000000002dcc0000000000000000_639-22\">22<\/a><\/sup><span id=\"mfn-content-0000000000002dcc0000000000000000_639-22\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"22\">Principle VII. Privacy Framework, APEC. ISBN 981-05-4471-5. <a href=\"https:\/\/www.apec.org\/docs\/default-source\/Publications\/2005\/12\/APEC-Privacy-Framework\/05_ecsg_privacyframewk.pdf\">https:\/\/www.apec.org\/docs\/default-source\/Publications\/2005\/12\/APEC-Privacy-Framework\/05_ecsg_privacyframewk.pdf<\/a> <\/span><\/li>\n<\/ol>\n<h4>5.7.2.2 UN resolutions<\/h4>\n<ol>\n<li aria-level=\"1\">The Promotion, Protection, and Enjoyment of Human Rights on the Internet: Resolution adopted by the Human Rights Council on 13 July 2021 A\/HRC\/RES\/47\/16<sup class=\"modern-footnotes-footnote modern-footnotes-footnote--hover-on-desktop \" data-mfn=\"23\" data-mfn-post-scope=\"0000000000002dcc0000000000000000_639\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-0000000000002dcc0000000000000000_639-23\">23<\/a><\/sup><span id=\"mfn-content-0000000000002dcc0000000000000000_639-23\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"23\">The promotion, protection and enjoyment of human rights on the Internet : Resolution. (2021). Human Rights Council A\/HRC\/RES\/47\/16. <a href=\"https:\/\/digitallibrary.un.org\/record\/3937534?ln=en\">https:\/\/digitallibrary.un.org\/record\/3937534?ln=en<\/a> <\/span><\/li>\n<li aria-level=\"1\">Resolution adopted by the Human Rights Council on 26 September 2019 on the Right to Privacy in the Digital Age A\/HRC\/RES\/42\/15<sup class=\"modern-footnotes-footnote modern-footnotes-footnote--hover-on-desktop \" data-mfn=\"24\" data-mfn-post-scope=\"0000000000002dcc0000000000000000_639\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-0000000000002dcc0000000000000000_639-24\">24<\/a><\/sup><span id=\"mfn-content-0000000000002dcc0000000000000000_639-24\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"24\">The Right to Privacy in the Digital Age: Resolution. (2019). Human Rights Council. A\/HRC\/RES\/42\/15. <a href=\"https:\/\/digitallibrary.un.org\/record\/3837297?ln=en\">https:\/\/digitallibrary.un.org\/record\/3837297?ln=en<\/a><\/span><\/li>\n<li aria-level=\"1\">Resolution adopted by the General Assembly on 16 December 2015 on the Outcome document of the high-level meeting of the General Assembly on the overall review of the implementation of the outcomes of the World Summit on the Information Society A\/RES\/70\/125.<sup class=\"modern-footnotes-footnote modern-footnotes-footnote--hover-on-desktop \" data-mfn=\"25\" data-mfn-post-scope=\"0000000000002dcc0000000000000000_639\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-0000000000002dcc0000000000000000_639-25\">25<\/a><\/sup><span id=\"mfn-content-0000000000002dcc0000000000000000_639-25\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"25\">Outcome document of the high-level meeting of the General Assembly on the overall review of the implementation of the outcomes of the World Summit on the Information Society. (2016). Human Rights Council. A\/RES\/70\/125.<a href=\"https:\/\/unctad.org\/system\/files\/official-document\/ares70d125_en.pdf\"> https:\/\/unctad.org\/system\/files\/official-document\/ares70d125_en.pdf<\/a><\/span> This resolution calls upon states to take appropriate measures against arbitrary or unlawful interference with privacy.<\/li>\n<li aria-level=\"1\">Resolution adopted by the General Assembly on 16 December 2020 on the Right to Privacy in the Digital Age A\/RES\/75\/176<sup class=\"modern-footnotes-footnote modern-footnotes-footnote--hover-on-desktop \" data-mfn=\"26\" data-mfn-post-scope=\"0000000000002dcc0000000000000000_639\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-0000000000002dcc0000000000000000_639-26\">26<\/a><\/sup><span id=\"mfn-content-0000000000002dcc0000000000000000_639-26\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"26\">The Right to Privacy in the Digital Age: Resolution. (2019). Human Rights Council. A\/HRC\/RES\/42\/15. <a href=\"https:\/\/digitallibrary.un.org\/record\/3837297?ln=en\">https:\/\/digitallibrary.un.org\/record\/3837297?ln=en<\/a><\/span><\/li>\n<\/ol>\n<h4>5.7.2.3 Declarations<\/h4>\n<ol>\n<li>The European Declaration on Digital Rights and Principles for the Digital Decade<sup class=\"modern-footnotes-footnote modern-footnotes-footnote--hover-on-desktop \" data-mfn=\"27\" data-mfn-post-scope=\"0000000000002dcc0000000000000000_639\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-0000000000002dcc0000000000000000_639-27\">27<\/a><\/sup><span id=\"mfn-content-0000000000002dcc0000000000000000_639-27\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"27\"><em>Declaration on European Digital Rights and Principles<\/em>. (2022). European Commission. <a href=\"https:\/\/digital-strategy.ec.europa.eu\/en\/library\/european-declaration-digital-rights-and-principles\">https:\/\/digital-strategy.ec.europa.eu\/en\/library\/european-declaration-digital-rights-and-principles<\/a> <\/span>:<br \/>\nThis Declaration proclaims that everyone has the right to privacy and protection of personal data, which includes the ability to control how their personal data is used and with whom it is shared.<sup class=\"modern-footnotes-footnote modern-footnotes-footnote--hover-on-desktop \" data-mfn=\"28\" data-mfn-post-scope=\"0000000000002dcc0000000000000000_639\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-0000000000002dcc0000000000000000_639-28\">28<\/a><\/sup><span id=\"mfn-content-0000000000002dcc0000000000000000_639-28\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"28\"><em>Declaration on European Digital Rights and Principles<\/em>. (2022). European Commission, Para 17. <a href=\"https:\/\/digital-strategy.ec.europa.eu\/en\/library\/european-declaration-digital-rights-and-principles\">https:\/\/digital-strategy.ec.europa.eu\/en\/library\/european-declaration-digital-rights-and-principles<\/a> <\/span> Further, it also declares the right of an individual to confidentiality of their communication and the information on their electronic devices and the right to not be subjected to unlawful online surveillance, pervasive tracking, or interception measures.<sup class=\"modern-footnotes-footnote modern-footnotes-footnote--hover-on-desktop \" data-mfn=\"29\" data-mfn-post-scope=\"0000000000002dcc0000000000000000_639\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-0000000000002dcc0000000000000000_639-29\">29<\/a><\/sup><span id=\"mfn-content-0000000000002dcc0000000000000000_639-29\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"29\"><em>Declaration on European Digital Rights and Principles<\/em>. (2022). European Commission, Para 17. <a href=\"https:\/\/digital-strategy.ec.europa.eu\/en\/library\/european-declaration-digital-rights-and-principles\">https:\/\/digital-strategy.ec.europa.eu\/en\/library\/european-declaration-digital-rights-and-principles<\/a> <\/span>To realize and secure these rights, the Declaration calls upon member states to take measures to ensure that everyone has effective control over their personal and non-personal data, protect communication from unauthorized third party access, prohibit unlawful identification and unlawful retention of activity records, etc.<sup class=\"modern-footnotes-footnote modern-footnotes-footnote--hover-on-desktop \" data-mfn=\"30\" data-mfn-post-scope=\"0000000000002dcc0000000000000000_639\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-0000000000002dcc0000000000000000_639-30\">30<\/a><\/sup><span id=\"mfn-content-0000000000002dcc0000000000000000_639-30\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"30\"><em>Declaration on European Digital Rights and Principles<\/em>. (2022). European Commission, Para 19.a-d.<a href=\"https:\/\/digital-strategy.ec.europa.eu\/en\/library\/european-declaration-digital-rights-and-principles\"> https:\/\/digital-strategy.ec.europa.eu\/en\/library\/european-declaration-digital-rights-and-principles<\/a> <\/span><\/li>\n<\/ol>\n<h4>5.7.2.4 International advocacy efforts<\/h4>\n<ol>\n<li>Feminist Principles on the Internet<sup class=\"modern-footnotes-footnote modern-footnotes-footnote--hover-on-desktop \" data-mfn=\"31\" data-mfn-post-scope=\"0000000000002dcc0000000000000000_639\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-0000000000002dcc0000000000000000_639-31\">31<\/a><\/sup><span id=\"mfn-content-0000000000002dcc0000000000000000_639-31\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"31\"><i>Feminist Principles of the Internet<\/i>. (2016). Association for Progressive Communications. <a href=\"https:\/\/feministinternet.org\/en\/principles\">https:\/\/feministinternet.org\/en\/principles<\/a><\/span>:<br \/>\nThis document lays down certain important principles in relation to privacy and data protection for a feminist internet. The privacy and data principle affirms the right to privacy and the right to full control over personal data and information online at all levels. It also calls upon states and private companies to refrain from using data for profit and manipulating online behavior.<sup class=\"modern-footnotes-footnote modern-footnotes-footnote--hover-on-desktop \" data-mfn=\"32\" data-mfn-post-scope=\"0000000000002dcc0000000000000000_639\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-0000000000002dcc0000000000000000_639-32\">32<\/a><\/sup><span id=\"mfn-content-0000000000002dcc0000000000000000_639-32\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"32\"><i>Privacy and Data, Feminist Principles of the Internet<\/i>. (2016). Association for Progressive Communications. <a href=\"https:\/\/feministinternet.org\/en\/principle\/privacy-data\">https:\/\/feministinternet.org\/en\/principles <\/a><\/span> The consent principle affirms women\u2019s agency and their right to make informed decisions on what aspects of their public or private lives to share online.<sup class=\"modern-footnotes-footnote modern-footnotes-footnote--hover-on-desktop \" data-mfn=\"33\" data-mfn-post-scope=\"0000000000002dcc0000000000000000_639\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-0000000000002dcc0000000000000000_639-33\">33<\/a><\/sup><span id=\"mfn-content-0000000000002dcc0000000000000000_639-33\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"33\"><i>Consent, Feminist Principles of the Internet<\/i>. (2016). Association for Progressive Communications. <a href=\"https:\/\/feministinternet.org\/en\/principle\/consent\">https:\/\/feministinternet.org\/en\/principles<\/a><\/span> Further, the anonymity principle recognizes and affirms the right to be anonymous and its importance in enabling freedom of expression online and safety for women and queer persons affected by discrimination.<sup class=\"modern-footnotes-footnote modern-footnotes-footnote--hover-on-desktop \" data-mfn=\"34\" data-mfn-post-scope=\"0000000000002dcc0000000000000000_639\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-0000000000002dcc0000000000000000_639-34\">34<\/a><\/sup><span id=\"mfn-content-0000000000002dcc0000000000000000_639-34\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"34\"><i>Anonymity, Feminist Principles of the Internet<\/i>. (2016). Association for Progressive Communications. <a href=\"https:\/\/feministinternet.org\/en\/principle\/anonymity\">https:\/\/feministinternet.org\/en\/principles<\/a><\/span><\/li>\n<li>United Nations Population Fund: Bodyright<sup class=\"modern-footnotes-footnote modern-footnotes-footnote--hover-on-desktop \" data-mfn=\"35\" data-mfn-post-scope=\"0000000000002dcc0000000000000000_639\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-0000000000002dcc0000000000000000_639-35\">35<\/a><\/sup><span id=\"mfn-content-0000000000002dcc0000000000000000_639-35\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"35\"><em>A Copyright for the Human Body, Body Right<\/em>. (n.d.). UNFPA. <a href=\"https:\/\/www.unfpa.org\/bodyright\">https:\/\/www.unfpa.org\/bodyright<\/a><\/span>:<br \/>\nThe United Nations Population Fund recognizes that the non-consensual sharing of intimate images violates the privacy, dignity, and autonomy of individuals, and leads them to experience fear, anxiety, loss of self-esteem, and a sense of powerlessness. It proposes the concept of bodyright, urging that the images of our bodies be given the same respect and protection online as the copyright protection provided to intellectual property.<\/li>\n<\/ol>\n<\/div>\n<\/div><\/div><\/div><div id=\"panel-639-2-0-3\" class=\"so-panel widget widget_sow-editor panel-last-child\" data-index=\"5\" ><div id=\"module-footnotes\" class=\"panel-widget-style panel-widget-style-for-639-2-0-3\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t><h3 class=\"widget-title\">Footnotes<\/h3>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<ul class=\"modern-footnotes-list \"><li><span>1<\/span><div><em>K.S. Puttaswamy v. Union of India,<\/em> (2017) 10 SCC 1, p. 504.<\/div><\/li><li><span>2<\/span><div><em>K.S. Puttaswamy v. Union of India<\/em>, (2017) 10 SCC 1, p. 529.<\/div><\/li><li><span>3<\/span><div>Bhandari, A. (2021). <i>Feminist Perspectives on Space, Safety and Surveillance: Improving a Woman\u2019s Right to the City<\/i>. The Wire. <a href=\"https:\/\/thewire.in\/women\/feminist-perspectives-on-space-safety-and-surveillance-improving-a-womans-right-to-the-city\">https:\/\/thewire.in\/women\/feminist-perspectives-on-space-safety-and-surveillance-improving-a-womans-right-to-the-city<\/a> <\/div><\/li><li><span>4<\/span><div><i>International Women's Day: How surveillance is used to assert control.<\/i> (2015). Privacy International. <a href=\"https:\/\/privacyinternational.org\/news-analysis\/1483\/international-womens-day-how-surveillance-used-assert-control\">https:\/\/privacyinternational.org\/news-analysis\/1483\/international-womens-day-how-surveillance-used-assert-control<\/a> <\/div><\/li><li><span>5<\/span><div>United Nations Human Rights Special Procedures Working Group. (2017). <em>Women\u2019s Autonomy, Equality, and Reproductive Health in International Human Rights: Between Recognition, Backlash, and Regressive Trends<\/em>. OHCHR. <a href=\"https:\/\/www.ohchr.org\/sites\/default\/files\/Documents\/Issues\/Women\/WG\/WomensAutonomyEqualityReproductiveHealth.pdf\">https:\/\/www.ohchr.org\/sites\/default\/files\/Documents\/Issues\/Women\/WG\/WomensAutonomyEqualityReproductiveHealth.pdf<\/a> <\/div><\/li><li><span>6<\/span><div>Information Technology Act, 2000, Section 66E. <\/div><\/li><li><span>7<\/span><div><em>K.S. Puttaswamy v. Union of India<\/em>, (2017) 10 SCC 1.<\/div><\/li><li><span>8<\/span><div><em>K.S. Puttaswamy<\/em> v. <em>Union of India<\/em>, (2017) 10 SCC 1, p. 99. <\/div><\/li><li><span>9<\/span><div><i>X v. HTTPS:\/\/WWW.YOUTUBE.COM\/WATCH?V=IQ6K5Z3ZYS0 and Ors.<\/i> CS(OS) 392\/2021, I.As.10543\/2021, 10544\/2021, 10545\/2021 &amp; 10546\/2021, order dated 23 August 2021, High Court of Delhi<\/div><\/li><li><span>10<\/span><div><i>Guruvinder Singh v. State of Uttar Pradesh<\/i>. and Anr., (2021) SCC OnLine All 748.<\/div><\/li><li><span>11<\/span><div><i>Subhranshu Rout @ Gugul v. State Of Odisha,<\/i> BLAPL No.4592 OF 2020, judgment dated 23 November 2020, Orissa High Court.<\/div><\/li><li><span>12<\/span><div>Mrs X <i>v.<\/i> Union of India, 2023:DHC:2806, judgment dated 26 April 2023, Delhi High Court. <\/div><\/li><li><span>13<\/span><div>KS Puttaswamy v. Union of India, (2017) 10 SCC 1.<\/div><\/li><li><span>14<\/span><div>Mathi, S. (2020). <em>Fifteen major concerns with India\u2019s Digital Personal Data Protection Bill, 2023<\/em>. Medianama. <a href=\"https:\/\/www.medianama.com\/2023\/08\/223-major-concerns-india-data-protection-bill-2023\/\">https:\/\/www.medianama.com\/2023\/08\/223-major-concerns-india-data-protection-bill-2023\/<\/a> ; Malhotra, G. (2023). <em>India\u2019s data protection law does little for privacy while bolstering the state\u2019s surveillance powers<\/em>. Scroll.in. <a href=\"https:\/\/scroll.in\/article\/1054722\/indias-data-protection-law-does-little-for-privacy-while-bolstering-the-states-surveillance-powers\">https:\/\/scroll.in\/article\/1054722\/indias-data-protection-law-does-little-for-privacy-while-bolstering-the-states-surveillance-powers<\/a> <\/div><\/li><li><span>15<\/span><div><em>Universal Declaration of Human Rights<\/em> (entered into force 1948).<\/div><\/li><li><span>16<\/span><div><em>International Covenant on Civil and Political Rights<\/em>, opened for signature 1966 (entered into force 23 March 1976).<\/div><\/li><li><span>17<\/span><div><em>European Convention on Human Rights<\/em>, opened for signature 1950 (entered into force 3 September 1953).<\/div><\/li><li><span>18<\/span><div><em>American Convention on Human Rights: Pact of San Jos\u00e9, Costa Rica<\/em>, (entered into force on 22 November 1969). <a href=\"https:\/\/treaties.un.org\/doc\/publication\/unts\/volume%201144\/volume-1144-i-17955-english.pdf\">https:\/\/treaties.un.org\/doc\/publication\/unts\/volume%201144\/volume-1144-i-17955-english.pdf<\/a><\/div><\/li><li><span>19<\/span><div>Privacy Framework, APEC. ISBN 981-05-4471-5. <a href=\"https:\/\/www.apec.org\/docs\/default-source\/Publications\/2005\/12\/APEC-Privacy-Framework\/05_ecsg_privacyframewk.pdf\">https:\/\/www.apec.org\/docs\/default-source\/Publications\/2005\/12\/APEC-Privacy-Framework\/05_ecsg_privacyframewk.pdf<\/a> <\/div><\/li><li><span>20<\/span><div>Principle I. Privacy Framework, APEC. ISBN 981-05-4471-5. <a href=\"https:\/\/www.apec.org\/docs\/default-source\/Publications\/2005\/12\/APEC-Privacy-Framework\/05_ecsg_privacyframewk.pdf\">https:\/\/www.apec.org\/docs\/default-source\/Publications\/2005\/12\/APEC-Privacy-Framework\/05_ecsg_privacyframewk.pdf<\/a> <\/div><\/li><li><span>21<\/span><div>Principle I. Privacy Framework, APEC. ISBN 981-05-4471-5. <a href=\"https:\/\/www.apec.org\/docs\/default-source\/Publications\/2005\/12\/APEC-Privacy-Framework\/05_ecsg_privacyframewk.pdf\">https:\/\/www.apec.org\/docs\/default-source\/Publications\/2005\/12\/APEC-Privacy-Framework\/05_ecsg_privacyframewk.pdf<\/a> <\/div><\/li><li><span>22<\/span><div>Principle VII. Privacy Framework, APEC. ISBN 981-05-4471-5. <a href=\"https:\/\/www.apec.org\/docs\/default-source\/Publications\/2005\/12\/APEC-Privacy-Framework\/05_ecsg_privacyframewk.pdf\">https:\/\/www.apec.org\/docs\/default-source\/Publications\/2005\/12\/APEC-Privacy-Framework\/05_ecsg_privacyframewk.pdf<\/a> <\/div><\/li><li><span>23<\/span><div>The promotion, protection and enjoyment of human rights on the Internet : Resolution. (2021). Human Rights Council A\/HRC\/RES\/47\/16. <a href=\"https:\/\/digitallibrary.un.org\/record\/3937534?ln=en\">https:\/\/digitallibrary.un.org\/record\/3937534?ln=en<\/a> <\/div><\/li><li><span>24<\/span><div>The Right to Privacy in the Digital Age: Resolution. (2019). Human Rights Council. A\/HRC\/RES\/42\/15. <a href=\"https:\/\/digitallibrary.un.org\/record\/3837297?ln=en\">https:\/\/digitallibrary.un.org\/record\/3837297?ln=en<\/a><\/div><\/li><li><span>25<\/span><div>Outcome document of the high-level meeting of the General Assembly on the overall review of the implementation of the outcomes of the World Summit on the Information Society. (2016). Human Rights Council. A\/RES\/70\/125.<a href=\"https:\/\/unctad.org\/system\/files\/official-document\/ares70d125_en.pdf\"> https:\/\/unctad.org\/system\/files\/official-document\/ares70d125_en.pdf<\/a><\/div><\/li><li><span>26<\/span><div>The Right to Privacy in the Digital Age: Resolution. (2019). Human Rights Council. A\/HRC\/RES\/42\/15. <a href=\"https:\/\/digitallibrary.un.org\/record\/3837297?ln=en\">https:\/\/digitallibrary.un.org\/record\/3837297?ln=en<\/a><\/div><\/li><li><span>27<\/span><div><em>Declaration on European Digital Rights and Principles<\/em>. (2022). European Commission. <a href=\"https:\/\/digital-strategy.ec.europa.eu\/en\/library\/european-declaration-digital-rights-and-principles\">https:\/\/digital-strategy.ec.europa.eu\/en\/library\/european-declaration-digital-rights-and-principles<\/a> <\/div><\/li><li><span>28<\/span><div><em>Declaration on European Digital Rights and Principles<\/em>. (2022). European Commission, Para 17. <a href=\"https:\/\/digital-strategy.ec.europa.eu\/en\/library\/european-declaration-digital-rights-and-principles\">https:\/\/digital-strategy.ec.europa.eu\/en\/library\/european-declaration-digital-rights-and-principles<\/a> <\/div><\/li><li><span>29<\/span><div><em>Declaration on European Digital Rights and Principles<\/em>. (2022). European Commission, Para 17. <a href=\"https:\/\/digital-strategy.ec.europa.eu\/en\/library\/european-declaration-digital-rights-and-principles\">https:\/\/digital-strategy.ec.europa.eu\/en\/library\/european-declaration-digital-rights-and-principles<\/a> <\/div><\/li><li><span>30<\/span><div><em>Declaration on European Digital Rights and Principles<\/em>. (2022). European Commission, Para 19.a-d.<a href=\"https:\/\/digital-strategy.ec.europa.eu\/en\/library\/european-declaration-digital-rights-and-principles\"> https:\/\/digital-strategy.ec.europa.eu\/en\/library\/european-declaration-digital-rights-and-principles<\/a> <\/div><\/li><li><span>31<\/span><div><i>Feminist Principles of the Internet<\/i>. (2016). Association for Progressive Communications. <a href=\"https:\/\/feministinternet.org\/en\/principles\">https:\/\/feministinternet.org\/en\/principles<\/a><\/div><\/li><li><span>32<\/span><div><i>Privacy and Data, Feminist Principles of the Internet<\/i>. (2016). Association for Progressive Communications. <a href=\"https:\/\/feministinternet.org\/en\/principle\/privacy-data\">https:\/\/feministinternet.org\/en\/principles <\/a><\/div><\/li><li><span>33<\/span><div><i>Consent, Feminist Principles of the Internet<\/i>. (2016). Association for Progressive Communications. <a href=\"https:\/\/feministinternet.org\/en\/principle\/consent\">https:\/\/feministinternet.org\/en\/principles<\/a><\/div><\/li><li><span>34<\/span><div><i>Anonymity, Feminist Principles of the Internet<\/i>. (2016). Association for Progressive Communications. <a href=\"https:\/\/feministinternet.org\/en\/principle\/anonymity\">https:\/\/feministinternet.org\/en\/principles<\/a><\/div><\/li><li><span>35<\/span><div><em>A Copyright for the Human Body, Body Right<\/em>. (n.d.). UNFPA. <a href=\"https:\/\/www.unfpa.org\/bodyright\">https:\/\/www.unfpa.org\/bodyright<\/a><\/div><\/li><\/ul>\n<\/div>\n<\/div><\/div><\/div><\/div><div id=\"pgc-639-2-1\"  class=\"panel-grid-cell\" ><div id=\"panel-639-2-1-0\" class=\"so-panel widget widget_sow-editor panel-first-child\" data-index=\"6\" ><div id=\"module-page-nav\" class=\"panel-widget-style panel-widget-style-for-639-2-1-0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p><strong>Sub-sections on this page:<\/strong><\/p>\n<ul>\n<li><a href=\"#m5-571\">5.7.1 Constitutional source of the right<\/a><\/li>\n<li><a href=\"#m5-572\">5.7.2 International sources of the right<\/a><\/li>\n<li><a href=\"#module-footnotes\">Footnotes<\/a><\/li>\n<\/ul>\n<\/div>\n<\/div><\/div><\/div><div id=\"panel-639-2-1-1\" class=\"so-panel widget widget_so-multi-button panel-last-child\" data-index=\"7\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-so-multi-button so-widget-so-multi-button-base\"\n\t\t\t\n\t\t><div class=\"sp-btn-parent\" id=\"multi-484e62b5\">\n  <a class=\"sp-btn sp-floating-btn\" data-toggle='sow-modal' href=\"#module-page-nav-mobile\" data-popup=\"module-content\"><span class=\"fa fa-bars\"><\/span> Sections<\/a>\n<\/div>\n\n<style media=\"screen\">\n  #multi-484e62b5 a[href].sp-btn{\n    border: 1px solid #000000;\n    color: #ffffff;\n    background: #000000;\n  }\n  #multi-484e62b5 a[href].sp-btn:hover{\n    border-color: #000000;\n    background: #ffffff;\n    color: #000000;\n  }\n\n  #multi-484e62b5 a[href].sp-floating-btn{\n    background: #000000;\n    color: #ffffff;\n  }\n\n  #multi-484e62b5 a[href].sp-floating-btn:hover{\n    border-color: #000000;\n    background: #ffffff;\n    color: #000000;\n  }\n<\/style>\n\n<!-- MODALS FROM THE INLINE POSTS -->\n    <div id=\"module-page-nav-mobile\" class=\"inline-modal\" data-behaviour=\"inline-modal\">\n  \t\t<div class=\"inline-overlay\"><\/div>\n  \t\t<button type=\"button\" class=\"close\">&times;<\/button>\n  \t\t<div class=\"inline-modal-dialog\" style=\"max-width:90%\" role=\"document\"><div id=\"pl-wmodule-page-nav-mobile\"  class=\"panel-layout\" ><div id=\"pg-wmodule-page-nav-mobile-0\"  class=\"panel-grid panel-has-style\" ><div class=\"panel-row-style panel-row-style-for-wmodule-page-nav-mobile-0\" ><div id=\"pgc-wmodule-page-nav-mobile-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-wmodule-page-nav-mobile-0-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"0\" ><div id=\"module-page-nav\" class=\"panel-widget-style panel-widget-style-for-wmodule-page-nav-mobile-0-0-0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p><strong>Sub-sections on this page:<\/strong><\/p>\n<ul>\n<li><a href=\"#module-footnotes\">Footnotes<\/a><\/li>\n<\/ul>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n  \t<\/div>\n    <!-- END OF MODALS -->\n<\/div><\/div><\/div><\/div><\/div><div id=\"pg-639-3\"  class=\"panel-grid panel-has-style\" ><div class=\"panel-row-style panel-row-style-for-639-3\" ><div id=\"pgc-639-3-0\"  class=\"panel-grid-cell panel-grid-cell-mobile-last\" ><div id=\"panel-639-3-0-0\" class=\"so-panel widget widget_siteorigin-panels-builder panel-first-child panel-last-child\" data-index=\"8\" ><div id=\"pl-w64e1c529c20ec\"  class=\"panel-layout\" ><div id=\"pg-w64e1c529c20ec-0\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-w64e1c529c20ec-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-w64e1c529c20ec-0-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child\" data-index=\"0\" ><div class=\"panel-widget-style panel-widget-style-for-w64e1c529c20ec-0-0-0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p><strong>PREVIOUS SECTION<\/strong><\/p>\n<\/div>\n<\/div><\/div><\/div><div id=\"panel-w64e1c529c20ec-0-0-1\" class=\"so-panel widget widget_sow-headline panel-last-child\" data-index=\"1\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-headline so-widget-sow-headline-default-852507278c70\"\n\t\t\t\n\t\t><div class=\"sow-headline-container \">\n\t\t\t\t\t\t\t<h2 class=\"sow-headline\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/projects.itforchange.net\/online-violence-gender-and-law-guide\/module-5-rights-based-approach-to-online-gender-based-violence\/5-6-right-to-equality-and-non-discrimination\/\" >\n\t\t\t\t\t\t\t\t5.6 Right To Equality and Non-Discrimination<\/a>\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><div id=\"pgc-639-3-1\"  class=\"panel-grid-cell panel-grid-cell-empty\" ><\/div><\/div><\/div><div id=\"pg-639-4\"  class=\"panel-grid panel-has-style\" ><div class=\"panel-row-style panel-row-style-for-639-4\" ><div id=\"pgc-639-4-0\"  class=\"panel-grid-cell panel-grid-cell-mobile-last\" ><div id=\"panel-639-4-0-0\" class=\"so-panel widget widget_siteorigin-panels-builder panel-first-child panel-last-child\" data-index=\"9\" ><div id=\"pl-w64e1e0fa9a15c\"  class=\"panel-layout\" ><div id=\"pg-w64e1e0fa9a15c-0\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-w64e1e0fa9a15c-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-w64e1e0fa9a15c-0-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child\" data-index=\"0\" ><div class=\"panel-widget-style panel-widget-style-for-w64e1e0fa9a15c-0-0-0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p><strong>PREVIOUS MODULE<\/strong><\/p>\n<\/div>\n<\/div><\/div><\/div><div id=\"panel-w64e1e0fa9a15c-0-0-1\" class=\"so-panel widget widget_siteorigin-panels-builder panel-last-child\" data-index=\"1\" ><div class=\"module-footer-nav panel-widget-style panel-widget-style-for-w64e1e0fa9a15c-0-0-1\" ><div id=\"pl-w64e1df9616bae\"  class=\"panel-layout\" ><div id=\"pg-w64e1df9616bae-0\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-w64e1df9616bae-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-w64e1df9616bae-0-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"0\" ><div class=\"panel-widget-style panel-widget-style-for-w64e1df9616bae-0-0-0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p><span class=\"module-title module-title-green\">4<\/span><\/p>\n<\/div>\n<\/div><\/div><\/div><\/div><div id=\"pgc-w64e1df9616bae-0-1\"  class=\"panel-grid-cell\" ><div id=\"panel-w64e1df9616bae-0-1-0\" class=\"so-panel widget widget_sow-headline panel-first-child panel-last-child\" data-index=\"1\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-headline so-widget-sow-headline-default-852507278c70\"\n\t\t\t\n\t\t><div class=\"sow-headline-container \">\n\t\t\t\t\t\t\t<h2 class=\"sow-headline\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/projects.itforchange.net\/online-violence-gender-and-law-guide\/module-4-contours-and-intersectionality\/\" >\n\t\t\t\t\t\t\t\tContours and Intersectionality<\/a>\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><a href=\"\/online-violence-gender-and-law-guide\/module-4-contours-and-intersectionality\/\" class=\"so-premium-link-overlay\">&nbsp;<\/a><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div id=\"pgc-639-4-1\"  class=\"panel-grid-cell panel-grid-cell-empty\" ><\/div><\/div><\/div><\/div><ul class=\"modern-footnotes-list modern-footnotes-list--show-only-for-print\"><li><span>1<\/span><div><em>K.S. Puttaswamy v. Union of India,<\/em> (2017) 10 SCC 1, p. 504.<\/div><\/li><li><span>2<\/span><div><em>K.S. Puttaswamy v. Union of India<\/em>, (2017) 10 SCC 1, p. 529.<\/div><\/li><li><span>3<\/span><div>Bhandari, A. (2021). <i>Feminist Perspectives on Space, Safety and Surveillance: Improving a Woman\u2019s Right to the City<\/i>. The Wire. <a href=\"https:\/\/thewire.in\/women\/feminist-perspectives-on-space-safety-and-surveillance-improving-a-womans-right-to-the-city\">https:\/\/thewire.in\/women\/feminist-perspectives-on-space-safety-and-surveillance-improving-a-womans-right-to-the-city<\/a> <\/div><\/li><li><span>4<\/span><div><i>International Women's Day: How surveillance is used to assert control.<\/i> (2015). Privacy International. <a href=\"https:\/\/privacyinternational.org\/news-analysis\/1483\/international-womens-day-how-surveillance-used-assert-control\">https:\/\/privacyinternational.org\/news-analysis\/1483\/international-womens-day-how-surveillance-used-assert-control<\/a> <\/div><\/li><li><span>5<\/span><div>United Nations Human Rights Special Procedures Working Group. (2017). <em>Women\u2019s Autonomy, Equality, and Reproductive Health in International Human Rights: Between Recognition, Backlash, and Regressive Trends<\/em>. OHCHR. <a href=\"https:\/\/www.ohchr.org\/sites\/default\/files\/Documents\/Issues\/Women\/WG\/WomensAutonomyEqualityReproductiveHealth.pdf\">https:\/\/www.ohchr.org\/sites\/default\/files\/Documents\/Issues\/Women\/WG\/WomensAutonomyEqualityReproductiveHealth.pdf<\/a> <\/div><\/li><li><span>6<\/span><div>Information Technology Act, 2000, Section 66E. <\/div><\/li><li><span>7<\/span><div><em>K.S. Puttaswamy v. Union of India<\/em>, (2017) 10 SCC 1.<\/div><\/li><li><span>8<\/span><div><em>K.S. Puttaswamy<\/em> v. <em>Union of India<\/em>, (2017) 10 SCC 1, p. 99. <\/div><\/li><li><span>9<\/span><div><i>X v. HTTPS:\/\/WWW.YOUTUBE.COM\/WATCH?V=IQ6K5Z3ZYS0 and Ors.<\/i> CS(OS) 392\/2021, I.As.10543\/2021, 10544\/2021, 10545\/2021 &amp; 10546\/2021, order dated 23 August 2021, High Court of Delhi<\/div><\/li><li><span>10<\/span><div><i>Guruvinder Singh v. State of Uttar Pradesh<\/i>. and Anr., (2021) SCC OnLine All 748.<\/div><\/li><li><span>11<\/span><div><i>Subhranshu Rout @ Gugul v. State Of Odisha,<\/i> BLAPL No.4592 OF 2020, judgment dated 23 November 2020, Orissa High Court.<\/div><\/li><li><span>12<\/span><div>Mrs X <i>v.<\/i> Union of India, 2023:DHC:2806, judgment dated 26 April 2023, Delhi High Court. <\/div><\/li><li><span>13<\/span><div>KS Puttaswamy v. Union of India, (2017) 10 SCC 1.<\/div><\/li><li><span>14<\/span><div>Mathi, S. (2020). <em>Fifteen major concerns with India\u2019s Digital Personal Data Protection Bill, 2023<\/em>. Medianama. <a href=\"https:\/\/www.medianama.com\/2023\/08\/223-major-concerns-india-data-protection-bill-2023\/\">https:\/\/www.medianama.com\/2023\/08\/223-major-concerns-india-data-protection-bill-2023\/<\/a> ; Malhotra, G. (2023). <em>India\u2019s data protection law does little for privacy while bolstering the state\u2019s surveillance powers<\/em>. Scroll.in. <a href=\"https:\/\/scroll.in\/article\/1054722\/indias-data-protection-law-does-little-for-privacy-while-bolstering-the-states-surveillance-powers\">https:\/\/scroll.in\/article\/1054722\/indias-data-protection-law-does-little-for-privacy-while-bolstering-the-states-surveillance-powers<\/a> <\/div><\/li><li><span>15<\/span><div><em>Universal Declaration of Human Rights<\/em> (entered into force 1948).<\/div><\/li><li><span>16<\/span><div><em>International Covenant on Civil and Political Rights<\/em>, opened for signature 1966 (entered into force 23 March 1976).<\/div><\/li><li><span>17<\/span><div><em>European Convention on Human Rights<\/em>, opened for signature 1950 (entered into force 3 September 1953).<\/div><\/li><li><span>18<\/span><div><em>American Convention on Human Rights: Pact of San Jos\u00e9, Costa Rica<\/em>, (entered into force on 22 November 1969). <a href=\"https:\/\/treaties.un.org\/doc\/publication\/unts\/volume%201144\/volume-1144-i-17955-english.pdf\">https:\/\/treaties.un.org\/doc\/publication\/unts\/volume%201144\/volume-1144-i-17955-english.pdf<\/a><\/div><\/li><li><span>19<\/span><div>Privacy Framework, APEC. ISBN 981-05-4471-5. <a href=\"https:\/\/www.apec.org\/docs\/default-source\/Publications\/2005\/12\/APEC-Privacy-Framework\/05_ecsg_privacyframewk.pdf\">https:\/\/www.apec.org\/docs\/default-source\/Publications\/2005\/12\/APEC-Privacy-Framework\/05_ecsg_privacyframewk.pdf<\/a> <\/div><\/li><li><span>20<\/span><div>Principle I. Privacy Framework, APEC. ISBN 981-05-4471-5. <a href=\"https:\/\/www.apec.org\/docs\/default-source\/Publications\/2005\/12\/APEC-Privacy-Framework\/05_ecsg_privacyframewk.pdf\">https:\/\/www.apec.org\/docs\/default-source\/Publications\/2005\/12\/APEC-Privacy-Framework\/05_ecsg_privacyframewk.pdf<\/a> <\/div><\/li><li><span>21<\/span><div>Principle I. Privacy Framework, APEC. ISBN 981-05-4471-5. <a href=\"https:\/\/www.apec.org\/docs\/default-source\/Publications\/2005\/12\/APEC-Privacy-Framework\/05_ecsg_privacyframewk.pdf\">https:\/\/www.apec.org\/docs\/default-source\/Publications\/2005\/12\/APEC-Privacy-Framework\/05_ecsg_privacyframewk.pdf<\/a> <\/div><\/li><li><span>22<\/span><div>Principle VII. Privacy Framework, APEC. ISBN 981-05-4471-5. <a href=\"https:\/\/www.apec.org\/docs\/default-source\/Publications\/2005\/12\/APEC-Privacy-Framework\/05_ecsg_privacyframewk.pdf\">https:\/\/www.apec.org\/docs\/default-source\/Publications\/2005\/12\/APEC-Privacy-Framework\/05_ecsg_privacyframewk.pdf<\/a> <\/div><\/li><li><span>23<\/span><div>The promotion, protection and enjoyment of human rights on the Internet : Resolution. (2021). Human Rights Council A\/HRC\/RES\/47\/16. <a href=\"https:\/\/digitallibrary.un.org\/record\/3937534?ln=en\">https:\/\/digitallibrary.un.org\/record\/3937534?ln=en<\/a> <\/div><\/li><li><span>24<\/span><div>The Right to Privacy in the Digital Age: Resolution. (2019). Human Rights Council. A\/HRC\/RES\/42\/15. <a href=\"https:\/\/digitallibrary.un.org\/record\/3837297?ln=en\">https:\/\/digitallibrary.un.org\/record\/3837297?ln=en<\/a><\/div><\/li><li><span>25<\/span><div>Outcome document of the high-level meeting of the General Assembly on the overall review of the implementation of the outcomes of the World Summit on the Information Society. (2016). Human Rights Council. A\/RES\/70\/125.<a href=\"https:\/\/unctad.org\/system\/files\/official-document\/ares70d125_en.pdf\"> https:\/\/unctad.org\/system\/files\/official-document\/ares70d125_en.pdf<\/a><\/div><\/li><li><span>26<\/span><div>The Right to Privacy in the Digital Age: Resolution. (2019). Human Rights Council. A\/HRC\/RES\/42\/15. <a href=\"https:\/\/digitallibrary.un.org\/record\/3837297?ln=en\">https:\/\/digitallibrary.un.org\/record\/3837297?ln=en<\/a><\/div><\/li><li><span>27<\/span><div><em>Declaration on European Digital Rights and Principles<\/em>. (2022). European Commission. <a href=\"https:\/\/digital-strategy.ec.europa.eu\/en\/library\/european-declaration-digital-rights-and-principles\">https:\/\/digital-strategy.ec.europa.eu\/en\/library\/european-declaration-digital-rights-and-principles<\/a> <\/div><\/li><li><span>28<\/span><div><em>Declaration on European Digital Rights and Principles<\/em>. (2022). European Commission, Para 17. <a href=\"https:\/\/digital-strategy.ec.europa.eu\/en\/library\/european-declaration-digital-rights-and-principles\">https:\/\/digital-strategy.ec.europa.eu\/en\/library\/european-declaration-digital-rights-and-principles<\/a> <\/div><\/li><li><span>29<\/span><div><em>Declaration on European Digital Rights and Principles<\/em>. (2022). European Commission, Para 17. <a href=\"https:\/\/digital-strategy.ec.europa.eu\/en\/library\/european-declaration-digital-rights-and-principles\">https:\/\/digital-strategy.ec.europa.eu\/en\/library\/european-declaration-digital-rights-and-principles<\/a> <\/div><\/li><li><span>30<\/span><div><em>Declaration on European Digital Rights and Principles<\/em>. (2022). European Commission, Para 19.a-d.<a href=\"https:\/\/digital-strategy.ec.europa.eu\/en\/library\/european-declaration-digital-rights-and-principles\"> https:\/\/digital-strategy.ec.europa.eu\/en\/library\/european-declaration-digital-rights-and-principles<\/a> <\/div><\/li><li><span>31<\/span><div><i>Feminist Principles of the Internet<\/i>. (2016). Association for Progressive Communications. <a href=\"https:\/\/feministinternet.org\/en\/principles\">https:\/\/feministinternet.org\/en\/principles<\/a><\/div><\/li><li><span>32<\/span><div><i>Privacy and Data, Feminist Principles of the Internet<\/i>. (2016). Association for Progressive Communications. <a href=\"https:\/\/feministinternet.org\/en\/principle\/privacy-data\">https:\/\/feministinternet.org\/en\/principles <\/a><\/div><\/li><li><span>33<\/span><div><i>Consent, Feminist Principles of the Internet<\/i>. (2016). Association for Progressive Communications. <a href=\"https:\/\/feministinternet.org\/en\/principle\/consent\">https:\/\/feministinternet.org\/en\/principles<\/a><\/div><\/li><li><span>34<\/span><div><i>Anonymity, Feminist Principles of the Internet<\/i>. (2016). Association for Progressive Communications. <a href=\"https:\/\/feministinternet.org\/en\/principle\/anonymity\">https:\/\/feministinternet.org\/en\/principles<\/a><\/div><\/li><li><span>35<\/span><div><em>A Copyright for the Human Body, Body Right<\/em>. (n.d.). UNFPA. <a href=\"https:\/\/www.unfpa.org\/bodyright\">https:\/\/www.unfpa.org\/bodyright<\/a><\/div><\/li><\/ul>","protected":false},"excerpt":{"rendered":"<p>Navigate:Online Gender-based Violence Judicial Resource Guide 5.7 Right to Privacy The right to privacy means the right of a person to be left alone and be able to control their own life. In the digital age, privacy also means privacy over one\u2019s data and control over one\u2019s existence on the internet.1K.S. Puttaswamy v. Union of [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"parent":384,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/projects.itforchange.net\/online-violence-gender-and-law-guide\/wp-json\/wp\/v2\/pages\/639"}],"collection":[{"href":"https:\/\/projects.itforchange.net\/online-violence-gender-and-law-guide\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/projects.itforchange.net\/online-violence-gender-and-law-guide\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/projects.itforchange.net\/online-violence-gender-and-law-guide\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/projects.itforchange.net\/online-violence-gender-and-law-guide\/wp-json\/wp\/v2\/comments?post=639"}],"version-history":[{"count":46,"href":"https:\/\/projects.itforchange.net\/online-violence-gender-and-law-guide\/wp-json\/wp\/v2\/pages\/639\/revisions"}],"predecessor-version":[{"id":2012,"href":"https:\/\/projects.itforchange.net\/online-violence-gender-and-law-guide\/wp-json\/wp\/v2\/pages\/639\/revisions\/2012"}],"up":[{"embeddable":true,"href":"https:\/\/projects.itforchange.net\/online-violence-gender-and-law-guide\/wp-json\/wp\/v2\/pages\/384"}],"wp:attachment":[{"href":"https:\/\/projects.itforchange.net\/online-violence-gender-and-law-guide\/wp-json\/wp\/v2\/media?parent=639"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}