send mail to support@abhimanu.com mentioning your email id and mobileno registered with us! if details not recieved
Resend Opt after 60 Sec.
By Loging in you agree to Terms of Services and Privacy Policy
Claim your free MCQ
Please specify
Sorry for the inconvenience but we’re performing some maintenance at the moment. Website can be slow during this phase..
Please verify your mobile number
Login not allowed, Please logout from existing browser
Please update your name
Subscribe to Notifications
Stay updated with the latest Current affairs and other important updates regarding video Lectures, Test Schedules, live sessions etc..
Your Free user account at abhipedia has been created.
Remember, success is a journey, not a destination. Stay motivated and keep moving forward!
Refer & Earn
Enquire Now
My Abhipedia Earning
Kindly Login to view your earning
Support
Context:
The government order is based on:
Section 69 (1) of the Information Technology Act, 2000, and Rule 4 of the Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009, which enables government agencies to intercept personal information of citizens under certain conditions.
The problem of present Surveillance Framework:
There are three features about the current regime.
The illusion of a trade-off:
Way Forward:
Under these parameters, there is little doubt that on the three counts described above:
To start with, it is crucial to acknowledge that every act of surveillance, whether justified or not, involves a serious violation of individual privacy; Further, a system of government surveillance has a chilling effect upon the exercise of rights, across the board, in society.
The Right Parameters can be as follows:
Given the seriousness of the issue, a surveillance regime cannot have the executive sitting in judgment over the executive: there must be parliamentary oversight over the agencies that conduct surveillance.
There must exist, consequently, a lawyer to present the case on behalf of the target of surveillance even though, of course, the target herself cannot know of the proceedings.
Conclusion:
By: Priyank Kishore ProfileResourcesReport error
Access to prime resources
New Courses