{"id":21356,"date":"2024-01-06T08:58:13","date_gmt":"2024-01-06T08:58:13","guid":{"rendered":"https:\/\/edukemy.com\/blog\/?p=21356"},"modified":"2024-01-29T06:56:35","modified_gmt":"2024-01-29T06:56:35","slug":"data-security-has-assumed-significant-importance-in-the-digitized-world-due-to-rising-cyber-crimes-the-justice-b-n-srikrishna-committee-report-addresses-issues-related-to-data-security-what-in-yo","status":"publish","type":"post","link":"https:\/\/edukemy.com\/blog\/data-security-has-assumed-significant-importance-in-the-digitized-world-due-to-rising-cyber-crimes-the-justice-b-n-srikrishna-committee-report-addresses-issues-related-to-data-security-what-in-yo\/","title":{"rendered":"Data security has assumed significant importance in the digitized world due to rising cyber crimes. The Justice B. N. Srikrishna Committee Report addresses issues related to data security. What, in your view, are the strengths and weaknesses of the Report relating to the protection of personal data in cyberspace? (250 Words 15 Marks)"},"content":{"rendered":"<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a href=\"https:\/\/edukemy.com\/upsc\/upsc-gs-advance-and-mentorship-program-ampcsat?utm_source=Blog&amp;utm_medium=Link&amp;utm_campaign=GS+Advanced\" target=\"_blank\" rel=\"noreferrer noopener\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1280\" height=\"300\" src=\"https:\/\/edukemy.com\/blog\/wp-content\/uploads\/2024\/07\/Attempt-our-Daily-Weekly-Current-Affairs-Quiz-now-8.png\" alt=\"\" class=\"wp-image-43397\" srcset=\"https:\/\/edukemy.com\/blog\/wp-content\/uploads\/2024\/07\/Attempt-our-Daily-Weekly-Current-Affairs-Quiz-now-8.png 1280w, https:\/\/edukemy.com\/blog\/wp-content\/uploads\/2024\/07\/Attempt-our-Daily-Weekly-Current-Affairs-Quiz-now-8-1170x274.png 1170w, https:\/\/edukemy.com\/blog\/wp-content\/uploads\/2024\/07\/Attempt-our-Daily-Weekly-Current-Affairs-Quiz-now-8-585x137.png 585w\" sizes=\"(max-width: 1280px) 100vw, 1280px\" \/><\/a><\/figure><\/div>\n\n\n<p>In an era dominated by rapid digitalization, the paramount concern of safeguarding sensitive information has propelled data security to the forefront of global discourse. The escalating prevalence of cyber crimes has accentuated the need for robust frameworks to ensure the protection of personal data in cyberspace. The Justice B. N. Srikrishna Committee Report stands as a seminal document that meticulously scrutinizes and addresses various facets of data security. One of the report&#8217;s notable strengths lies in its comprehensive approach, encompassing legal, technological, and ethical dimensions of personal data protection. The report acknowledges the dynamic nature of technology and proposes a regulatory framework adaptable to the evolving cyber landscape. Additionally, the emphasis on user consent and the Right to be Forgotten reflects a commitment to individual privacy rights. However, the report is not without its shortcomings. One notable weakness is the potential for regulatory overreach, as the proposed Data Protection Authority might face challenges in balancing privacy protection with fostering innovation. Furthermore, there is a concern regarding the enforceability of certain recommendations and the feasibility of implementation in a diverse and complex digital environment. Striking the delicate balance between safeguarding personal data and fostering innovation remains a challenge, and the report&#8217;s efficacy in achieving this equilibrium requires continuous scrutiny and adaptation to the ever-changing cyber-threat landscape.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p><strong>Tag: <\/strong>Basic of cyber security. Challenges to internal security through communication network, role of media and social networking sites in internal security challenges. &nbsp;<\/p><\/blockquote>\n\n\n\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_73 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<label for=\"ez-toc-cssicon-toggle-item-69e1d798425d1\" class=\"ez-toc-cssicon-toggle-label\"><p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-cssicon\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/label><input type=\"checkbox\"  id=\"ez-toc-cssicon-toggle-item-69e1d798425d1\"  \/><nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/edukemy.com\/blog\/data-security-has-assumed-significant-importance-in-the-digitized-world-due-to-rising-cyber-crimes-the-justice-b-n-srikrishna-committee-report-addresses-issues-related-to-data-security-what-in-yo\/#Decoding_the_Question\" title=\"Decoding the Question: &nbsp;&nbsp;\">Decoding the Question: &nbsp;&nbsp;<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/edukemy.com\/blog\/data-security-has-assumed-significant-importance-in-the-digitized-world-due-to-rising-cyber-crimes-the-justice-b-n-srikrishna-committee-report-addresses-issues-related-to-data-security-what-in-yo\/#Answer\" title=\"Answer:&nbsp; &nbsp;&nbsp;\">Answer:&nbsp; &nbsp;&nbsp;<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/edukemy.com\/blog\/data-security-has-assumed-significant-importance-in-the-digitized-world-due-to-rising-cyber-crimes-the-justice-b-n-srikrishna-committee-report-addresses-issues-related-to-data-security-what-in-yo\/#Shri_Krishna_Committees_recommendations\" title=\"Shri Krishna Committee\u2019s recommendations: &nbsp;\">Shri Krishna Committee\u2019s recommendations: &nbsp;<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/edukemy.com\/blog\/data-security-has-assumed-significant-importance-in-the-digitized-world-due-to-rising-cyber-crimes-the-justice-b-n-srikrishna-committee-report-addresses-issues-related-to-data-security-what-in-yo\/#Strengths_of_Data_Protection_Report\" title=\"Strengths of Data Protection Report:&nbsp;&nbsp;\">Strengths of Data Protection Report:&nbsp;&nbsp;<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/edukemy.com\/blog\/data-security-has-assumed-significant-importance-in-the-digitized-world-due-to-rising-cyber-crimes-the-justice-b-n-srikrishna-committee-report-addresses-issues-related-to-data-security-what-in-yo\/#Weaknesses_of_data_protection_report\" title=\"Weaknesses of data protection report:&nbsp;&nbsp;\">Weaknesses of data protection report:&nbsp;&nbsp;<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/edukemy.com\/blog\/data-security-has-assumed-significant-importance-in-the-digitized-world-due-to-rising-cyber-crimes-the-justice-b-n-srikrishna-committee-report-addresses-issues-related-to-data-security-what-in-yo\/#Conclusion\" title=\"Conclusion\">Conclusion<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/edukemy.com\/blog\/data-security-has-assumed-significant-importance-in-the-digitized-world-due-to-rising-cyber-crimes-the-justice-b-n-srikrishna-committee-report-addresses-issues-related-to-data-security-what-in-yo\/#In_case_you_still_have_your_doubts_contact_us_on_9811333901\" title=\"In case you still have your doubts, contact us on 9811333901.&nbsp;\">In case you still have your doubts, contact us on 9811333901.&nbsp;<\/a><ul class='ez-toc-list-level-4' ><li class='ez-toc-heading-level-4'><ul class='ez-toc-list-level-4' ><li class='ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/edukemy.com\/blog\/data-security-has-assumed-significant-importance-in-the-digitized-world-due-to-rising-cyber-crimes-the-justice-b-n-srikrishna-committee-report-addresses-issues-related-to-data-security-what-in-yo\/#Visit_our_YouTube_Channel_%E2%80%93_here\" title=\"Visit our YouTube Channel &#8211;&nbsp;here\">Visit our YouTube Channel &#8211;&nbsp;here<\/a><\/li><\/ul><\/li><\/ul><\/li><\/ul><\/nav><\/div>\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Decoding_the_Question\"><\/span><strong>Decoding the Question: <\/strong>&nbsp;&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>In Introduction, write of significance of data.<\/strong> &nbsp;<\/li><li><strong>In Body, <\/strong>&nbsp;&nbsp;<ul><li><strong>Justify significance of data security due to rising cybercrimes.<\/strong> &nbsp;<\/li><li><strong>Discuss recommendations given by Justice SriKrishna Committee and critically analyze (strength and weakness) the report with respect to personal data in cyberspace.<\/strong> &nbsp;<\/li><\/ul><\/li><li><strong>Conclude your answer underlining the importance of data protection from cyber-attacks.<\/strong> &nbsp;<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Answer\"><\/span><strong>Answer:&nbsp; <\/strong>&nbsp;&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Data is very significant in any country\u2019s economy and social development and the Supreme Court (SC) called data as<strong> \u201cNEW OIL\u201d. <\/strong>Data is the collection of facts related to an individual or a group or organization. Personal Data can be understood by personal footprint in the digital world. It means what a person likes, his dislike etc. This generates an immense amount of data which is used by various companies (like, recent WhatsApp issue) or state for their benefit.&nbsp;<\/p>\n\n\n\n<p>The Committee under the chairmanship of <strong>Justice B. N. Srikrishna <\/strong>was constituted to examine issues related to data protection, recommend methods to address them, and draft a data protection law. The objective was to ensure growth of the digital economy while keeping personal data of citizens secure and protected. &nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/edukemy.com\/upsc\/upsc-essay?utm_source=Blog&amp;utm_medium=Banner&amp;utm_campaign=Essay\" target=\"_blank\" rel=\"noreferrer noopener\"><img decoding=\"async\" width=\"1280\" height=\"300\" data-src=\"https:\/\/edukemy.com\/blog\/wp-content\/uploads\/2024\/06\/10.png\" alt=\"\" class=\"wp-image-42412 lazyload\" data-srcset=\"https:\/\/edukemy.com\/blog\/wp-content\/uploads\/2024\/06\/10.png 1280w, https:\/\/edukemy.com\/blog\/wp-content\/uploads\/2024\/06\/10-1170x274.png 1170w, https:\/\/edukemy.com\/blog\/wp-content\/uploads\/2024\/06\/10-585x137.png 585w\" data-sizes=\"(max-width: 1280px) 100vw, 1280px\" src=\"data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" style=\"--smush-placeholder-width: 1280px; --smush-placeholder-aspect-ratio: 1280\/300;\" \/><\/a><figcaption><a href=\"https:\/\/edukemy.com\/upsc\/upsc-essay?utm_source=Blog&amp;utm_medium=Link&amp;utm_campaign=Essay\">UPSC Essay Course<\/a><\/figcaption><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Shri_Krishna_Committees_recommendations\"><\/span><strong>Shri Krishna Committee\u2019s recommendations: <\/strong>&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>The processing (collection, recording, analysis, disclosure, etc) of personal data should be done only for \u201cclear, specific and lawful\u201d purposes.&nbsp;&nbsp;<\/li><li>Processing personal data for function of state.&nbsp;&nbsp;<\/li><li>The committee recommends the \u2018right to be forgotten\u2019.&nbsp;&nbsp;<\/li><li>Personal data will need to be stored on servers located within India, and transfers outside the country will need to be subject to safeguards.&nbsp;&nbsp;<\/li><li>The \u201csensitive\u201d personal data (such as passwords, financial data, sexual orientation, biometric data) processed only with explicit consent.&nbsp;&nbsp;<\/li><li>A Data Protection Authority which is supposed to \u201cprotect the interests of data principals\u201d, prevent misuse of personal data and ensure compliance with the safeguards and obligations under the data protection framework by corporations, governments, or anyone else.&nbsp;&nbsp;<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Strengths_of_Data_Protection_Report\"><\/span><strong>Strengths of Data Protection Report:<\/strong>&nbsp;&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>The Committee noted that consent is treated as one of the grounds for processing personal data.&nbsp;<\/li><li>One in three internet users across the world is children under the age of 18. A data protection law must sufficiently protect their interests, while considering their vulnerability, and exposure to risks online.&nbsp;<\/li><li>It discussed the principle where personal data must be collected for a specified purpose only.&nbsp;<\/li><li>One of the principles of data protection is that a person whose data is being processed should be able to influence the processing. This includes the right to confirm, access, and rectify the data.&nbsp;<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Weaknesses_of_data_protection_report\"><\/span><strong>Weaknesses of data protection report:<\/strong>&nbsp;&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>Though the draft bill addresses various issues facing the data ecosystem in India, it falls short on key principles that are at the core of a robust data protection framework.&nbsp;&nbsp;<\/li><li>The committee recommended personal data of individuals can be processed for the exercise of any functions of the state. This can be done without the consent of the individual when it comes to provide service or any benefits to the individuals. This recommendation countering what the SC said in <em>Puttaswamy Case<\/em> regarding informed consent.&nbsp;&nbsp;<\/li><li>One key subject is missing from the draft report reforms in privacy concern with surveillance laws.&nbsp;&nbsp;<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span><strong>Conclusion<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>India\u2019s rising internet users and generation of immense data needs strong data protection laws and enforcement of the same to protect personal data from cyber-attacks. In order to achieve Digital India targets and reap the benefits of the digital economy, a strong regime of data protection is needed.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><a href=\"https:\/\/edukemy.com\/upsc\/upsc-essay?utm_source=Blog&amp;utm_medium=Banner&amp;utm_campaign=Essay\" target=\"_blank\" rel=\"noreferrer noopener\"><img decoding=\"async\" data-src=\"https:\/\/edukemy.com\/blog\/wp-content\/uploads\/2024\/06\/UPSC-Essay-Course-1280\u00d7300-1-3.svg\" alt=\"\" class=\"wp-image-42688 lazyload\" width=\"781\" height=\"182\" src=\"data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" style=\"--smush-placeholder-width: 781px; --smush-placeholder-aspect-ratio: 781\/182;\" \/><\/a><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"In_case_you_still_have_your_doubts_contact_us_on_9811333901\"><\/span><strong>In case you still have your doubts, contact us on 9811333901.<\/strong>&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>For UPSC Prelims Resources,&nbsp;<a href=\"https:\/\/edukemy.com\/upsc-cse-prelims-resource-centre\" target=\"_blank\" rel=\"noreferrer noopener\">Click here<\/a><\/p>\n\n\n\n<p>For Daily Updates and Study Material:<\/p>\n\n\n\n<p>Join our Telegram Channel &#8211;&nbsp;<a href=\"https:\/\/t.me\/WithEdukemy4IAS\" target=\"_blank\" rel=\"noreferrer noopener\">Edukemy for IAS<\/a><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>1. Learn through Videos &#8211;&nbsp;<a href=\"https:\/\/bit.ly\/3vOD8sU\" target=\"_blank\" rel=\"noreferrer noopener\">here<\/a><\/li><li>2. Be Exam Ready by Practicing Daily MCQs &#8211;&nbsp;<a href=\"https:\/\/bit.ly\/3Q9z2nF\" target=\"_blank\" rel=\"noreferrer noopener\">here<\/a><\/li><li>3. Daily Newsletter &#8211; Get all your Current Affairs Covered &#8211;&nbsp;<a href=\"https:\/\/bit.ly\/3bE2y5J\" target=\"_blank\" rel=\"noreferrer noopener\">here<\/a><\/li><li>4. Mains Answer Writing Practice &#8211;&nbsp;<a href=\"https:\/\/bit.ly\/3mZuVxl\" target=\"_blank\" rel=\"noreferrer noopener\">here<\/a><\/li><\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Visit_our_YouTube_Channel_%E2%80%93_here\"><\/span>Visit our YouTube Channel &#8211;&nbsp;<a href=\"https:\/\/www.youtube.com\/@ShabbirsEduKemyforIAS\" target=\"_blank\" rel=\"noreferrer noopener\">here<\/a><span class=\"ez-toc-section-end\"><\/span><\/h4>\n","protected":false},"excerpt":{"rendered":"<p>The escalating prevalence of cyber crimes has accentuated the need for robust frameworks to ensure the protection of personal data in cyberspace. <\/p>\n","protected":false},"author":17,"featured_media":21357,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_eb_attr":"","om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[1524],"tags":[1308,177,142,232,145,140],"class_list":["post-21356","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-upsc-mains-solved-paper-gs-3","tag-cyber-crimes","tag-general-studies-3","tag-previous_year_questions","tag-upsc","tag-upsc-mains-question-paper","tag-upsc_preparation_strategy"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/edukemy.com\/blog\/wp-json\/wp\/v2\/posts\/21356","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/edukemy.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/edukemy.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/edukemy.com\/blog\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/edukemy.com\/blog\/wp-json\/wp\/v2\/comments?post=21356"}],"version-history":[{"count":3,"href":"https:\/\/edukemy.com\/blog\/wp-json\/wp\/v2\/posts\/21356\/revisions"}],"predecessor-version":[{"id":24007,"href":"https:\/\/edukemy.com\/blog\/wp-json\/wp\/v2\/posts\/21356\/revisions\/24007"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/edukemy.com\/blog\/wp-json\/wp\/v2\/media\/21357"}],"wp:attachment":[{"href":"https:\/\/edukemy.com\/blog\/wp-json\/wp\/v2\/media?parent=21356"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/edukemy.com\/blog\/wp-json\/wp\/v2\/categories?post=21356"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/edukemy.com\/blog\/wp-json\/wp\/v2\/tags?post=21356"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}