Please Wait! Your file will start to download within 10 seconds automatically. Otherwise click here Download

Privacy Protection Legislative Scenario in Select Countries: An Exploratory Study.


Dr. Madan Lal Bhasin ,

Download Full PDF Pages: 14-32 | Views: 404 | Downloads: 125 | DOI: 10.5281/zenodo.3466150

Volume 5 - October 2016 (10)


The right of privacy is well established in international law. In fact, consumer privacy has attracted the widespread attention of regulators across the globe. Of course, privacy laws vary throughout the globe but, unfortunately, it has turned out to be the subject of legal contention between the European Union (EU) and the United States (US). Protection of personal data privacy under the law has been shaped by the interests of multiple constituencies: individuals, commercial organizations, government agencies, law enforcement, and national security services. For corporations that collect and use personal information, now ignoring privacy legislative and regulatory warning signs can prove to be a costly mistake. One of the greatest challenges faced by privacy and data protection professionals is demonstrating that their organizations have complied with the requirements of the various laws governing the handling of personal data. The freshly revised BS10012 can help organizations to meet their privacy management obligations. This is an exploratory, descriptive and qualitative study using secondary sources of data. Here, an attempt has been made to briefly acquaint the readers’ with the privacy laws prevalent in select countries. It is expected that a growing number of countries will adopt privacy laws to foster e-commerce. Undoubtedly, accountability for privacy and personal data protection needs to be a joint-effort among governments, privacy commissioners, organizations and individuals themselves. Legislators all over the world have taken notice and tried to minimize invasion of privacy but without much success. 


Privacy protection, e-business, trust seals, government regulations, select countries.


  1. Ashford, W. (2016), Slow response to Privacy Shield EU-US data transfer program, ComputerWeekly.Com. 15 August.
  2. Ahmad, T. (2009). Right of Privacy: Constitutional Issues and Judicial Responses in USA and India, particularly in Cyber age, available at
  3. Bauer, C., Korunovska, J., & Spiekermann, S., (2012). On the value of information - what Facebook users are willing to pay? ECIS 2012 Proceedings. Paper 197. Available at:
  4. Basu, S. (2010), Policy-Making, Technology and Privacy in India, The Indian Journal of Law and Technology, 6(1), 65-88.
  5. Bayardo and Srikant (2003), Technological Solutions for Protecting Privacy, Web Technologies, Sept. 115-118.
  6. Bhasin, M.L. (2005). Challenges of Guarding Privacy—Practices Prevalent in Major Countries, The Chartered Accountant, January, 735-745.
  7. Bhasin, M.L. (2006). Guarding Privacy on the Internet, Global Business Review, 7(1), January-June, 137-156.
  8. Bhasin, M. L. (2006a). Data Mining: A Competitive Tool for Banking and Retail Industries, The Chartered Accountant, October, 588- 594.
  9. Bhasin, M.L. (2006b). Privacy Protection on the Internet: Privacy Policy, Government Regulation and Technology Solutions, Amity Business Review, July-December, 44-59.
  10. Bhasin, M. L. (2007). Mitigating Cyber Threats to Banking Industry, The Chartered Accountant, April, 50(10), 1618-1624.
  11. Bhasin, M.L. (2008). Guarding Privacy on the Internet: Privacy Policy, Government Regulations and Technology Solutions, International Journal of Internet Marketing and Advertising, 4(2/3), Special Issue on SME‘s, 213-240.
  12. Bhasin, M. L. (2012). Online Privacy Protection: Privacy Seals and Government Regulations in Select Countries, International Journal of Finance and Accounting, 1(6), Nov., 148-161.
  13. Bhasin, M. L. (2012a). Guarding Online Privacy: Privacy Seals and Government Regulations, European Journal of Business and Social Sciences, 1(9), Dec. 2012, 1-20.
  14. Bhasin, M.L. (2015). Menace of Frauds in Banking Industry: Experience of a Developing Country, Australian Journal of Business and Management Research, 4(12), April 21-33.
  15. Bhasin, M.L. (2016). Integration of Technology to Combat Bank Frauds: Experience of a Developing Country, Wulfenia Journal, Feb., 23(2), 201-233.
  16. Bhasin, M.L. (2016a). Online Privacy Protection: Privacy Seals, Government Regulations and Technological Solutions, International Journal of Management Sciences and Business Research, 5(7), July, 86-116.
  17. Bowman, L.M. (2010). House Pulls Carnivore into the Light. ZDNet News (23 July).
  18. Chaffey, D. and White, G. (2011). Business Information Management. Prentice-Hall, Financial Times, 2nd edition.
  19. Chew, K.Y. (2015), Data Protection Compliance in Malaysia Set to Cause Headaches to Businesses, Baker & McKenzie. Available at
  20. Chan, M. and Allison, D. (2015), Hong Kong: Law prohibiting the transfer of personal data soon to come into Force, 16 Jan. Available at
  21. Cobb, S. (2016), Data privacy and data protection: US law and legislation, An ESET White Paper, 1-15. Available at
  22. Council of Europe (2014), Handbook on European data protection law. Available at
  23. Culnan, M. (2002). Georgetown Internet Privacy Policy Study. McDonough School of Business, Georgetown University, see
  24. European Organization for Security (EOS)-Privacy & Data Protection Task Force (2010). EU policies on privacy and data protection and their impact on the implementation of security solutions. Sept., 1-17.
  25. European Commission (2011). Workshop on Privacy protection and ICT: Research ideas. Workshop Report, Sept.21, Brussels.
  26. European Commission & Union (1998), Directive on Data Protection (Directive 95), available at
  27. E&Y (2014) Privacy Trends 2014: Privacy Protection in the age of Technology. Available at 1-24.
  28. Federal Trade Commission (2010). Protecting Consumer Privacy in an Era of Rapid Change: A proposed framework for business and policymakers. December. Available at
  29. Fuchs, C. (2011). The political economy of privacy on Facebook. The Internet & Surveillance, Research paper 9 series, Vienna, Australia. Available at
  30. Geller, T. (2016). In Privacy Law, It is the U.S. vs. the World, Communications of the ACM, 59(2), 21-23.
  31. Goldfarb, A., & Tucker, C. E. (2011). Privacy regulation and online advertising. Management Science, 57(1), 57-71.
  32. Greenleaf, G. (2015b). Global Data Privacy Laws 2015: 109 Countries, with European Laws Now a Minority, 33 Privacy Laws & Business International Report, February, UNSW Law Research Paper No. 2015-21.
  33. Greenleaf, G. (2015). Hong Kong data privacy 2015: Cautious enforcement, strong principles, Privacy Laws & Business International Report, 21-23, December, 1-5.
  34. Greenleaf, G. (2015a). Confusion as Indian Supreme Court Compromises on Data Privacy and ID Number, 28 Sept. Privacy Laws & Business International Report, 24-26, Sept. UNSW Law Research Paper No. 2016-06. Available at
  35. Internet Policy Task Force Report (2010), Commercial Data Privacy and Innovation in the Internet Economy: A Dynamic Policy Framework, Department of Commerce and Internet Policy Task Force Report. Available at
  36. Kolekar, Y.P. (2015), Protection of Data under Information Technology Law in India, 27 April, 1-12. Available at SSRN:
  37. Krill, P. (2002). DoubleClick Discontinues Web Tracking Service. InfoWorld, 9 January. Available at:
  38. Kugler, L. (2015). Online Privacy: Regional Differences, Communications of the ACM, Feb., 58(2), 18-20.
  39. Laudon, K.C & Traver, C.G. (2014). E-commerce 10th edition, Addison Wesley, NY.
  40. Laudon, K.C. and Laudon, J.P. (2016) Management Information Systems: Managing the digital firm. Pearson, 14th edition.
  41. Majid, A. (2016), Malaysia: Personal Data Protection Standards - 12 Jan. Available at
  42. Mantelero, A. (2012), Cloud computing, trans-border data flows and the European Directive 95/46/EC: applicable law and task distribution‘, European Journal for Law and Technology, 3(2).
  43. Morando, F., Iemma, R., & Raiteri, R. (2014). Privacy evaluation: what empirical research on users‘ valuation of personal data tells us, Internet Policy Review, 3(2), May, available at
  44. Office of the Privacy Commissioner of Canada (2016). The Internet of Things: An introduction to privacy issues with a focus on the retail and home environments, available at
  45. Organization for Economic Co-operation and Development (1980). OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data. Available at
  46. Parsons, M. and Colegate, P. (2015), The Turning Point for Data Privacy Regulation in Asia? Chronicle of Data Protection, 18 Feb. Available at
  47. Pfeifle, S. (2015), The Regulators‘ View of the Singapore Privacy Law, The Privacy Advisor, 12 May, available at
  48. Pierce, L. (2013), Protection of Personal Information Act: Are you compliant? Mail & Guardian, Dec. 2. Available at
  49. Robert, J. (2011), Five Solutions To The Privacy Problem: Why They Work And Why They Don't. Available at
  50. Sotto, L.J. and Hydak, C.D. (2016), The EU-US Privacy Shield: A How-To Guide, Law360, July 19, 1-4.
  51. Srinivas, B.V. (2015), A Concise Guide to Various Australian Laws Related to Privacy and Cyber Security Domains, SANS Institute InfoSec Reading Room Site, 1-30. Available at
  52. Srivas, A. (2016), Cross-Border Data Flows Debate Hits India as TRAI Issues Paper on Cloud Services, The Wire, 11 June, available at
  53. Shah, A. and Zacharias, N. (2010), Right to privacy and data protection, Nitin Desai Associates, Mumbai.
  54. Slyke, C.V., & Belanger, F. (2012). E-Business Technologies: Supporting the Net-Enhanced Organization. John Wiley & Sons.
  55. Stevens, Toby (2016), Data Protection: Objectives or Outcomes? 14 Sept. Available at
  56. Stevens, G. (2011). Privacy protections for personal information online, April, Congressional Research Service Report 7-5700, available at
  57. Swire, P., Hemmings, J. & Kirkland, A. (2016). Online Privacy and ISPS, working paper of The Institute for Information Security & Privacy, Feb. 29. Available at
  58. Thiel, S. and Biggs, C. (2016), Singapore‘s enforcement of data protection law on the rise, 23 Aug. DLA Piper, available at
  59. Thiel, S. and Biggs, C. (2016a), Hong Kong‘s Privacy Commissioner addresses privacy compliance and best practice for BYOD, 21 Sept. available at
  60. UNESCO (2012). Preserving Privacy in the Information Society. Available at electronically at
  61. Weiss, M.A. & Archick, K. (2016), U.S.-EU Data Privacy: From Safe Harbor to Privacy Shield, Congressional Research Service, 7- 5700. 1-16. Available at
  62. Wirtz, J., Lewin, M.O. & Williams, J.D. (2007). Causes and Consequences of consumer online privacy concern. International Journal of Service Industry Management, 18(4), 326-348.
  63. World Privacy Forum Report (2011), Many Failures: A Brief History of Privacy Self-Regulation. 14 Oct. Available at
  64. Yadav, Y. (2015), Centre Giving Final Touches to Right to Privacy Bill, 17 March, Indian Express, New Delhi.

Cite this Article: