Introduction

Information can be considered as one of the most valuable and most controversial tools in the modern epoch. Governmental and non-governmental organic structures hold immense measures of information about persons. Datas processing can be defined as the aggregation and use of points of informations to bring forth meaningful information. It involves assorted procedures including proof, screening, summarisation, collection, analysis and coverage of informations.

Tracing the history of the construct of informations processing, it can be seen that this pattern has been in being since a truly long clip, as can be seen from the practise of bookkeeping which fundamentally involves the recording of fiscal minutess and bring forthing studies like balance sheet and the hard currency flow statement. The pickings of nose count was another illustration of the application of the construct of informations processing. Prior to the development of computing machines, manual information processing prevailed. Later, automatic information processing started to derive popularity though applications of punched card equipment. Finally, the development in engineering and the coming of the computing machine epoch lead to the replacing of manual and automatic informations processing by the electronic information processing. Automated methods to treat informations started to derive significance, with the capacity to treat big volumes of similar information.

During the assorted phases of development of the construct of informations processing, people realized that there was a demand to protect the information collected. This was the primary inspiration behind the development of the construct of informations protection. However, the ordinance of who holds the information, how they hold it, and in what fortunes they use it or portion it with others, has been the topic of a batch of argument over the old ages. Such a argument was much more prevalent in the UK and EU than the remainder of the universe as can be seen from the assorted statute laws that have been enacted to cover with the protection of sensitive informations.

There was a world-wide acknowledgment for the demand to protect sensitive informations. But, the aims behind such demands varied from state to state. While some needed informations privateness to rectify past unfairnesss under autocratic governments, others needed it to advance electronic commercialism and many to guarantee conformity with the pan-European Torahs and to enable planetary trade. An addition in the involvement in the right to privacy sing informations can be seen during the sixtiess and 1970s with the coming of information engineering. The surveillance potency of powerful computing machine systems stimulated demands for specific regulations to regulate the aggregation and handling of personal information. The generation of modern statute law in this country can be traced to the first information protection jurisprudence in the universe, enacted in the Hesse in Germany in 1970. This was followed by national Torahs in Sweden ( 1973 ) , the United States ( 1974 ) , Germany ( 1977 ) and France ( 1978 ) .

At the international degree, there have been two international instruments that have been of some significance. They are the Council of Europe’s 1981 Convention for the Protection of Individuals with respect to the Automatic Processing of Personal Data, and the Organization for Economic Cooperation and Development’s ( OECD ) Guidelines Regulating the Protection of Privacy and Trans-border Data Flows of Personal Data. These regulations describe personal information as information that are afforded protection at every measure, from aggregation to storage and airing. The Convention for the Protection of Individuals with respect to the Automatic Processing of Personal Data extended the precautions for everyone’s rights and cardinal freedoms, peculiarly the right to privateness, taking history of the increased flow across boundary lines of personal informations undergoing automatic processing. Therefore, it can be seen that a batch of importance has been placed on the information protection worldwide.

The Undertaking focuses on the EU and UK attacks towards informations protection and analyses the demand for sui-generis statute law in India refering the same. Hence, the undermentioned pages will be chiefly focused on the methods adopted by the EU and UK refering informations protection.

Data Protection in the EU

The historical development of informations protection is rooted in the labor of assorted European states, particularly Germany, to forestall menace of improper usage of personal informations. The current province of the information protection in the EU has besides been influenced by the attempts of Organization for Economic Cooperation and Development ( OECD ) and the Council of Europe. All of these can be considered as the sires of the Data Protection Directive [ 1 ] , which presently regulates the processing of personal informations within the European Union. Therefore, to analyze the historical development of the system of informations protection in the EU, one must look into these international attacks every bit good as that of European states, peculiarly Germany.

OECD Guidelines on Data Protection:

While there was turning accent on the demand for protection of informations privateness and attempts were being made worldwide in this respect, the OECD besides examined the possibility of accomplishing uniformity in informations protection Torahs. Their attempts culminated in the preparation of voluntary guidelines for the protection of personal informations. On close observation, it can be seen that the EU Data Protection Directive is constructed in the same linguistic communication as the OECD guidelines.

The OECD established as restrictions on the aggregation of personal informations that such informations should be collected legitimately with the cognition and consent of the informations topic. [ 2 ] The informations collected should be of certain quality, i.e. they should be accurate, complete, and updated. [ 3 ] The informations aggregator must stipulate the intent for which the information is collected. [ 4 ] That being said, the guidelines are ill-defined as to whom this revelation should be made. Once such a specification has been made, the collected informations may non be used for a different intent without the informations subject’s consent or authorization of jurisprudence. [ 5 ] It is the responsibility of the informations gatherer to protect the stored informations from unauthorised entree, devastation, usage, alteration, or airing. [ 6 ]

The OECD Guidelines besides clearly stipulates the rights of the informations topic. It provides that a information topic has the right to ask what types of informations the information gatherer has collected about the person. [ 7 ] On such question, the informations assemblage entity must supply the person with such information within a sensible clip of the enquiry at a sensible charge and in a signifier that is apprehensible to the person doing the petition. [ 8 ] In instances where the day of the month collected the person is incorrect, he has the right to hold such wrong informations erased or corrected. [ 9 ] These form portion of the single engagement rule laid down in the Guidelines.

The OECD Guidelines besides provide that the free flow of information across national boundary lines should non be restricted unless the receiver state “does non yet well detect these Guidelines or where the re-export of such informations would besiege its domestic privateness legislation.” [ 10 ] Thus it can be said that the OECD Guidelines have expressed an equivalency criterion, which requires the recipient state of a multinational information flow to hold informations protection Torahs that protect personal privateness to the same extent as the states from which it receives informations.

These are some of the basic rules laid down by the OECD Guidelines on Data Protection. One can clearly see that the linguistic communication in which the guidelines have been laid down was rather wide. However, it must be appreciated that the OECD guidelines represent the first attempt to harmonise protection of personal informations on a planetary footing.

European Convention for the Protection of Individuals with respect to the Automatic Processing of Personal Data:

The European enterprise for regulations of jurisprudence associating to data protection took flight through the corporate attempts of the single European states. The procedure was initiated by the Council of Europe in 1968 to analyze possible classs of informations protection with particular accent on the free flow of informations and the protection of persons, which eventually resulted in the passing of a declaration concerning stored personal informations in 1974. The rules laid down in the declaration include:

  1. Information about an individual’s private life should non be disseminated.
  2. Data gatherers should merely hive away relevant information.
  3. Rules should be implemented sing aggregation, storage and airing of informations.
  4. Persons should hold the right to cognize what informations are stored and for what grounds.
  5. Persons should hold the right to hold wrong information corrected or deleted.
  6. Merely those entities or persons with a valid intent should hold entree to personal informations.

The declaration formed the footing for the Council of Europe’s 1981 European Convention for the Protection of Individuals with respect to the Automatic Processing of Personal Data. It should be noted that the Convention encompasses both the private and public sectors [ 11 ] and establishes quality criterions [ 12 ] which data gatherers must stay to in order to protect all persons with respect to processed informations. [ 13 ]

Art. 5 of the European Convention requires that the informations should be accurate and up to day of the month and should be obtained and processed reasonably and lawfully, stored and used for legal intents, and maintained merely every bit long every bit required to accomplish their intent. [ 14 ] There are certain types of information which the Convention has prohibited from being collected, unless the domestic jurisprudence of a state provides equal precautions against unauthorised usage. Such informations include information associating to race, political sentiment, spiritual and other beliefs, wellness, sexual wonts and condemnable strong beliefs. [ 15 ]

Besides prescribing criterions associating to informations quality, the European Convention provides certain extra rights to persons [ 16 ] , which have been derived from the German Federal Data Protection Act of 1977. As per these rights, persons may:

  1. Inquire to any informations assemblage entity as to the being of a personal information file.
  2. Obtain a transcript of the informations kept in moderately legible signifier.
  3. Obtain rectification or erasure of false or otherwise improperly kept informations.
  4. Request that the personal informations be erased if the informations gatherer does non supply single entree to or a transcript of his informations.

These rights have been constructed on the same lines as that of the OECD Guidelines every bit good. The States are besides precluded from doing exclusions to the quality of informations criterions and the single rights created under the European Convention with the exclusion of issues to associating to national security and public safety. [ 17 ]

Though the European Convention covered about all the indispensable facets of information protection, it failed to accomplish its coveted aim of harmonisation of informations protection Torahs within the EU chiefly due to a defect that was built-in in it every bit good as many other international legal instruments. The fact that the Convention failed to supply definitions and was non self-executing meant that single states could supply their ain definitions in their implementing statute law. As a consequence of the lack of definitions and the built-in differences in the municipal Torahs, the European states failed to accomplish uniformity in informations protection Torahs. The deficiency of uniformity of Torahs has farther resulted in the limitation of informations flow across national boundaries if the recipient state did non run into the equivalency criterion as mentioned in Art. 12 ( 3 ) , rather similar to the 1 mentioned in the OECD Guidelines. The lone other circumstance under which the Convention permitted ordinance of trans-border informations flows, as illustrated in Art. 12, remained in the instance of transportation through an intermediary party with the intent of besieging informations protection guidelines.

National Approaches to Data Protection within the EU: