Skip to main content

Criminal Procedure (Identification) Bill, 2022: ALL YOU NEED TO KNOW



This bill was presented in the Lok Sabha & Rajya Sabha in March 2022 & received its consent on April 4, 2022 from both the houses of the parliament. This bill will replace the Identifications of Prisoners Act, 1920. The main motive of this bill is to ensure more efficient & speedy investigation by the use of technology. However, this bill is raising some serious privacy issues & concerns on Right to Privacy of an individual.

Prominent Features of this Bill

  • This bill gives the power to the police & other investigating agency to collect, store & analyze the fingerprints, iris & other biological samples of the prisoners.
  • The NCRB (National Crime Record Bureau) will act as the central repository where all these samples along with handwriting & signatures samples will be stored for 75 years
  • It further broaden the scope by allowing the Police to even take the body measurements from convicts, habitual offenders and ‘other persons’ However, the existing law only allows the fingerprint & footprint of a limited category of convicted person.
  • They have included the ‘other persons’ as it will help the investigating agency to gather legally admissible evidences & establish the crime in the eye of law.
  • It is expected that this bill will act as an obstacle for those who are experts in identity theft & frauds & will minimize the crime rate as well.

Issues related to this Bill

  • With the advancement in technology, it’s a welcoming step that a century old act will be replaced by the upcoming bill that will give preference to the use of modern technology However, this bill is the biggest danger to the “Right to Privacy” of the individuals as it is allowing the police to collect the measurements of the ‘other persons’ as well.
  • The bill is even allowing the samples from the protesters engaged in political protests.  It is also considering Narco Analysis & Brain Mapping in the case when the force is being applied to collect the biological information which leads to the violation of “Right against Self Incrimination.”
  • Apart from it, the storage & handle of the personal sensitive data for 75 years is another concern.
  • This bill gives the rights to the detainees (not accused of any offence against a woman or a child) that they can refuse. Although, due to the lack of knowledge of their rights, they won’t be able to do so & in that case the investigating agency will entitle to absolute power which can be harmful.
Conclusion
So, there shall be clear scrutiny of some provisions as the data privacy concern is utmost as it consists of sensitive personal data. This kind of law can be only introduced when the country has a strong data protection law that imposes serious fines & imprisonment in case of any breach. To handle, store & preserve the data, more precautionary steps and measures needs to be taken for better implementation of the law. Apart from it, proper training shall be given to the investigating agencies along with judicial officers to deal with such types of cases swiftly. 


By: Pakhi Garg (Advisor. WCSF)


Stay connected with us: www.worldcybersecurities.com
To get latest updates on various cyber related events & other things, you can join our Whatsapp group/Telegram Channel


 

Comments

Popular posts from this blog

Dark Web: Safe or unsafe? Truth Revealed!

  The dark web is the part of the internet that is not visible to search engines. With the advancement in technology, digitization has resulted in different types of attacks. We can talk to anyone as long as we have an internet connection. The main concern is with privacy and anonymity in mind.  A team of computer scientists and mathematicians working for one branch of the US navy which is known as the Naval Research laboratory (NRL), developed a new technology known as Onion Routing. It allows anonymous communication where the source and destination cannot be determined by the third party. A network using the Onion Routing technique is classified as Darknet. The NRL released the Onion Routing Technique and it became The Onion Router, also known as TOR. Advantages of Dark Web  Humans are allowed to hold privacy and express their views freely. Privacy is considered to be critical for honest persons through the different criminals and stalkers.  The growing tendency of...

Famous Cyber crimes That Targeted People Instead Of Money

  With the emergence in the field of technology, the number of cyber crimes have also emerged. Different types of cyber crimes daily take place such as phishing, email spoofing, data theft, identity theft, bullying, harassment, cyber extortion, ransomware attacks, etc. The majority of the people would opine that the Cyber criminals engage in these activities for the sake of money but there are numerous examples where money wasn’t the only target of the Cyber criminals, rather they targeted people.  The intent of cyber criminals,  targeting the people can differ from case to case. Sometimes it may target a single person or sometimes a large number of persons. Various examples show the instances where the target of the cyber crimes were people, be it belonging to specific religion or age group or sometimes a sole person. Various examples of such crimes are discussed below: Bulli Bai App - This app was created over the platform namely GitHub which is an open software develop...

New Privacy Policy of Twitter

  Twitter is one of the most commonly used social media networking platforms and is very popular amongst celebrities as well. People enjoy uploading tweets and retweets over Twitter. It is a good platform for social messaging, news and marketing, etc. But recently twitter has been in the news for a change in its privacy policy. Just a few weeks after the announcement that Elon Musk was going to acquire that social media platform, Twitter had revamped its privacy policy. Everyone was expecting something big after that announcement and many were curious to know if there will be any changes in that micro-blogging platform. Later on, Twitter introduced the privacy policy to their users by creating a video guide for users so that they can understand the privacy policy. Also, Twitter has said that its new privacy policy is much more simplified and organized under three new heads namely data use, data sharing, and data collection. The new version of twitter’s privacy policy will take effe...