Achieve your IAS dreams with The Core IAS – Your Gateway to Success in Civil Services

  1. Expansion of Search Powers into Digital Spaces
    The proposed bill goes beyond traditional physical search provisions (under Section 132 of the IT Act, 1961) to include digital spaces such as email accounts, WhatsApp chats, cloud storage, social media, and more. The term “other similar platforms” is undefined and open-ended, which may lead to excessive and arbitrary intrusion.
  2. Weak Justification and Disproportionate Intrusion
    The digital presence of individuals often includes personal and professional information about multiple stakeholders. Without clear limitations, digital searches could infringe upon the rights of friends, family, professional contacts, and even journalists—compromising both privacy and freedom of expression.
  3. Lack of Procedural Safeguards
    There is no mandatory requirement of prior authorisation, judicial oversight, or disclosure of “reason to believe” before digital searches. This undermines the principles of transparency and accountability. The Supreme Court in several rulings has emphasized that search and seizure is a serious invasion of privacy.
  4. Contravention of Proportionality Principle
    In Justice K.S. Puttaswamy v. Union of India (2017), the Supreme Court held that any restriction on privacy must meet a four-fold test:
  • Legitimate aim
  • Necessity
  • Proportionality
  • Least intrusive means
    The I-T Bill 2025 fails this standard by not ensuring that digital access is the last resort or least invasive method.
  1. Global Best Practices Overlooked
    Countries like the U.S. and Canada require a high threshold before allowing digital searches. For instance, the U.S. Supreme Court (Riley v. California) mandates strong protections due to the deeply personal nature of digital data.
  2. Threat to Press Freedom and Confidentiality
    The bill could jeopardize the work of journalists and whistleblowers by exposing their confidential data, sources, and communications. Even under existing law, courts have consistently interpreted such powers narrowly.
  • Clearly define what constitutes “virtual digital space”
  • Introduce prior judicial authorisation and neutral oversight
  • Require documented “reason to believe” before any digital intrusion
  • Include procedural safeguards and redressal mechanisms
  • Align provisions with global data privacy and surveillance norms
  • Maintain the balance between enforcement and citizen rights

Leave a comment

Your email address will not be published. Required fields are marked *