๐Ÿ“ง admissions@cyberlawacademy.com | ๐Ÿ“ž +91-XXXXXXXXXX
โš–๏ธ Part 2 of 5

The Constitutional Layer

Master the rights-driven approach to cyber law through Article 21 privacy jurisprudence, Article 19 expression freedoms, and the constitutional frameworks that every cyber lawyer must invoke to protect digital rights.

โฑ๏ธ ~120 minutes ๐Ÿ“– 5 Sections โš–๏ธ 8 Case Laws ๐Ÿ“ 10 Quiz Questions

2.1 Why Constitution Matters in Cyber Law

Every cyber law provision exists within the constitutional framework. The Constitution is not merely background context โ€” it is the primary weapon in a cyber lawyer's arsenal. State actions, surveillance, content restrictions, and data collection must all survive constitutional scrutiny.

"The Constitution is not a mere wisp of paper. It is a vibrant, living document that must be interpreted to meet the challenges of each generation." Justice V.R. Krishna Iyer
๐Ÿ›๏ธ Constitutional Pillars of Cyber Law
Art. 14
Right to Equality
Laws must not be arbitrary. Cyber regulations discriminating without intelligible differentia are void.
Art. 19
Freedom of Expression
Speech & expression extends to internet. Content restrictions must satisfy "reasonable restrictions" under Art.19(2).
Art. 21
Right to Life & Privacy
Privacy is fundamental. Surveillance, data collection, and profiling must satisfy Puttaswamy's three-fold test.
Art. 32
Right to Constitutional Remedies
Direct access to Supreme Court for fundamental rights violations. The "heart and soul" of the Constitution.
๐Ÿ’กStrategic Insight

Always frame cyber law arguments constitutionally. Instead of saying "Section 69 surveillance is excessive," say "Section 69, as applied, violates Article 21 by failing the Puttaswamy proportionality test." This shifts the burden to the State.

2.2 Article 21: Privacy as Fundamental Right

The landmark nine-judge bench decision in Justice K.S. Puttaswamy (Retd.) v. Union of India (2017) 10 SCC 1 unanimously held that privacy is a fundamental right intrinsic to life and liberty under Article 21. This transformed cyber law overnight.

The Journey to Puttaswamy

Before 2017, privacy's constitutional status was uncertain. Two earlier decisions had cast doubt:

M.P. Sharma v. Satish Chandra (1954) SCR 1077
Eight-judge bench held that the Indian Constitution does not contain an equivalent of the US Fourth Amendment, implying no constitutional right to privacy.
Status: Overruled by Puttaswamy โ€” the court held this was decided without considering the full scope of Article 21.
Kharak Singh v. State of U.P. (1963) 1 SCR 332
Six-judge bench (majority 5:1) held that privacy is not a guaranteed constitutional right, though domiciliary visits were struck down under Article 21.
Status: Partially overruled โ€” Puttaswamy affirmed Justice Subba Rao's minority view that privacy is part of personal liberty.

The Puttaswamy Framework

The nine-judge bench established a comprehensive privacy jurisprudence:

1

Legality

Any restriction on privacy must be sanctioned by law. Executive action alone cannot justify privacy infringement. The law must be validly enacted, not ultra vires, and provide adequate procedural safeguards.

2

Legitimate Aim

The law must pursue a legitimate state objective. Recognized aims include: national security, prevention of crime, protection of revenue, public health, and public morals. Mere administrative convenience is not a legitimate aim.

3

Proportionality

The means must be proportionate to the aim, comprising: (a) Rational connection between means and aim; (b) Necessity โ€” no less restrictive alternative; (c) Balancing โ€” benefits outweigh rights infringement.

Four Dimensions of Privacy

DimensionDescriptionCyber Law Application
Bodily Privacy Protection against physical intrusion into the body Mandatory biometric collection (Aadhaar), DNA databases
Spatial Privacy Protection of private spaces including home Device searches, remote access tools, home network surveillance
Informational Privacy Control over personal data and information Data collection, processing, profiling, DPDPA compliance
Decisional Privacy Autonomy to make intimate personal choices Online anonymity, pseudonymity, choice of platforms
โš–๏ธCourtroom Application

When challenging surveillance orders under Section 69 IT Act, structure your argument as: "The impugned order fails the Puttaswamy test because: (1) [if applicable] no valid law authorizes this specific surveillance; OR (2) the stated aim of 'investigation' is pretextual and not legitimate; OR (3) bulk surveillance of all citizens fails proportionality as targeted surveillance would achieve the same aim with less rights infringement."

Post-Puttaswamy Developments

K.S. Puttaswamy v. Union of India (Aadhaar) (2019) 1 SCC 1
Five-judge bench applied the Puttaswamy framework to uphold Aadhaar's core but struck down: (1) Section 57 allowing private entities to demand Aadhaar; (2) Mandatory linking for bank accounts and mobile phones; (3) Authentication for school admissions.
Principle: Even valid schemes must satisfy proportionality. Purpose limitation is constitutionally mandated โ€” data collected for subsidies cannot be used for general surveillance.
Anuradha Bhasin v. Union of India (2020) 3 SCC 637
Internet shutdowns must satisfy proportionality. Indefinite suspension is impermissible. Orders must be published and subject to judicial review. Internet access is part of Article 19(1)(a) and Article 21.
Application: Challenge prolonged internet shutdowns by demanding production of the order and arguing disproportionality. The State must justify each extension.

2.3 Article 19: Freedom of Expression Online

Article 19(1)(a) guarantees freedom of speech and expression. The Supreme Court has consistently held that this extends to the internet. However, this right is subject to "reasonable restrictions" under Article 19(2).

The Shreya Singhal Legacy

Shreya Singhal v. Union of India (2015) 5 SCC 1
Section 66A IT Act struck down as unconstitutional for: (1) Vagueness โ€” terms like "grossly offensive" and "menacing" undefined; (2) Overbreadth โ€” criminalizing speech far beyond Article 19(2) grounds; (3) Chilling effect โ€” deterring legitimate speech due to fear of prosecution.
Lasting Impact: Established that online speech enjoys same constitutional protection as offline speech. The "reasonable restrictions" test applies equally to digital expression.

Article 19(2): Permissible Restrictions

The State may impose restrictions on Article 19(1)(a) only on the following grounds:

  1. Sovereignty and integrity of India โ€” Sedition, territorial integrity threats
  2. Security of the State โ€” Not mere "public order" but serious threats to State existence
  3. Friendly relations with foreign States โ€” Diplomatic relations protection
  4. Public order โ€” Must show proximate nexus to disorder, not remote possibility
  5. Decency or morality โ€” Community standards, obscenity (Miller test)
  6. Contempt of court โ€” Scandalizing courts, prejudicing proceedings
  7. Defamation โ€” Civil and criminal, reputation protection
  8. Incitement to an offence โ€” Direct incitement, not mere advocacy
โš ๏ธCritical Limitation

The grounds in Article 19(2) are exhaustive, not illustrative. The State cannot restrict speech on grounds outside this list. "Hurting religious sentiments" or "causing annoyance" are NOT valid grounds โ€” this is precisely why Section 66A was struck down.

The "Reasonable Restrictions" Test

Even when a restriction falls within Article 19(2) grounds, it must be "reasonable." Courts assess:

  • Procedural Reasonableness: Adequate safeguards, right to hearing, appellate mechanisms
  • Substantive Reasonableness: Proportionate to the aim, not excessive
  • Nexus Requirement: Direct and proximate connection between speech and harm
  • Less Restrictive Alternative: If a less intrusive measure achieves the same goal, the broader restriction fails
โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”
โ”‚              ARTICLE 19(1)(a) CHALLENGE FLOWCHART               โ”‚
โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜
                              โ”‚
                              โ–ผ
              โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”
              โ”‚ Is the activity "expression"? โ”‚
              โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜
                     โ”‚                โ”‚
                    YES              NO
                     โ”‚                โ”‚
                     โ–ผ                โ–ผ
        โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”    Not protected
        โ”‚ Art.19(1)(a) PRIMA โ”‚    under Art.19
        โ”‚   FACIE APPLIES    โ”‚
        โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜
                     โ”‚
                     โ–ผ
        โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”
        โ”‚ Does restriction fall under one of โ”‚
        โ”‚ the 8 grounds in Art.19(2)?        โ”‚
        โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜
                     โ”‚                โ”‚
                    YES              NO
                     โ”‚                โ”‚
                     โ–ผ                โ–ผ
        โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”    UNCONSTITUTIONAL
        โ”‚ Is restriction  โ”‚    (e.g., Shreya Singhal)
        โ”‚  "reasonable"?  โ”‚
        โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜
              โ”‚         โ”‚
             YES       NO
              โ”‚         โ”‚
              โ–ผ         โ–ผ
         VALID    UNCONSTITUTIONAL
                    

Key Article 19 Cyber Law Cases

S. Rangarajan v. P. Jagjivan Ram (1989) 2 SCC 574
"The effect of the words must be judged from the standards of reasonable, strong-minded, firm and courageous men, and not those of weak and vacillating minds, nor of those who scent danger in every hostile point of view."
Application: Online content cannot be restricted merely because some may find it offensive. Apply the "reasonable person" standard, not the "most sensitive person" standard.
Sakal Papers v. Union of India (1962) 3 SCR 842
Freedom of press includes freedom of circulation. Restrictions on medium affect the message.
Digital Application: Platform bans, domain blocking, and app prohibitions restrict not just content but the medium of expression โ€” heightened scrutiny required.

2.4 Constitutional Violations Matrix

This practical reference maps common cyber law scenarios to constitutional violations, helping you identify which fundamental rights arguments apply to your case.

Scenario Primary Article Constitutional Argument Key Case
FIR under Section 66A Art. 19(1)(a), 21 Provision declared void; FIR is nullity Shreya Singhal
Bulk surveillance without targeting Art. 21 Fails proportionality โ€” no necessity for mass collection Puttaswamy
Internet shutdown (indefinite) Art. 19(1)(a), 21 Disproportionate; must be time-bound with review Anuradha Bhasin
Mandatory Aadhaar for private services Art. 21 Unconstitutional post Section 57 strike-down Puttaswamy (Aadhaar)
Website blocking without reasons Art. 19(1)(a), 14 Arbitrary; reasons must be communicated Shreya Singhal (S.69A reading)
Arrest for social media post (opinion) Art. 19(1)(a) Unless falls under Art.19(2), expression protected Kedar Nath Singh, Shreya Singhal
Data retention without consent Art. 21 Informational privacy violated; purpose limitation breached Puttaswamy
VPN ban / encryption restrictions Art. 19(1)(a), 21 Privacy & expression implicated; overbroad restriction Puttaswamy, Anuradha Bhasin
Facial recognition without law Art. 21 No legal framework = fails legality prong Puttaswamy
Compelled decryption / password disclosure Art. 20(3), 21 Self-incrimination concerns; privacy of thought Selvi v. State of Karnataka
๐Ÿ‘จโ€โš–๏ธHow Judges See It

High Courts and the Supreme Court are increasingly receptive to constitutional challenges in cyber cases. The key is proper framing. Don't argue "this law is bad" โ€” argue "this law/action violates Article [X] because it fails the [specific test] as established in [landmark case]." Judges want you to do the constitutional heavy-lifting for them.

2.5 Constitutional Challenge Framework

This section provides a step-by-step framework for mounting constitutional challenges in cyber law cases. Whether you're filing a writ petition or arguing bail, constitutional arguments strengthen your position.

Step 1: Identify the State Action

Constitutional rights operate against the State (Article 12). Identify:

  • Direct State Action: Police, CBI, NIA, CERT-In, MeitY orders
  • Statutory Authority: RBI, SEBI, TRAI exercising regulatory powers
  • Private Bodies with Public Character: NPCI (UPI), CAs (Digital Signatures)
  • Private Parties Acting Under State Direction: Intermediaries complying with government takedown orders

Step 2: Identify Applicable Rights

If the Issue Involves...Invoke...Standard of Review
Content removal / speech restrictionArticle 19(1)(a)Reasonable restrictions under Art.19(2)
Surveillance / data collectionArticle 21Puttaswamy three-fold test
Discriminatory applicationArticle 14Intelligible differentia + rational nexus
Compelled disclosureArticle 20(3)Self-incrimination protection
Arbitrary actionArticle 14 + 21Procedure established by law must be fair

Step 3: Apply the Appropriate Test

For Article 19 Challenges:

  1. Establish that the activity is "speech and expression"
  2. Show the restriction does NOT fall under Article 19(2) grounds, OR
  3. Even if it falls under 19(2), demonstrate it's NOT "reasonable"

For Article 21 (Privacy) Challenges:

  1. Legality: Is there a valid law? Is it ultra vires?
  2. Legitimate Aim: What is the stated purpose? Is it genuinely legitimate?
  3. Proportionality: Is there a less restrictive alternative? Do benefits outweigh costs?

Step 4: Choose Your Forum

ForumWhen to UseRemedy
High Court (Art. 226)State-level violations; first instance constitutional challengeWrits: Habeas Corpus, Mandamus, Certiorari, Prohibition, Quo Warranto
Supreme Court (Art. 32)Fundamental rights violation; pan-India issue; High Court inadequateSame writs; binding precedent
Trial CourtCollateral constitutional argument in criminal proceedingsQuashing FIR; exclusion of evidence; bail
โœ…Pro Tip: Interim Relief

Constitutional challenges take time. Always seek interim relief โ€” stay of FIR investigation, injunction against data processing, restoration of internet services. Courts are more likely to grant interim relief when constitutional rights are prima facie engaged.

Sample Constitutional Prayer Clause

PRAYER:

In the premises, it is most respectfully prayed that this Hon'ble 
Court may graciously be pleased to:

(a) ISSUE a Writ of Certiorari or any other appropriate writ, 
    order or direction quashing the FIR No. [X] dated [Y] 
    registered at [Z] Police Station as being violative of 
    Article 19(1)(a) and Article 21 of the Constitution;

(b) DECLARE that Section [X] of the [Act], as applied to the 
    Petitioner, is unconstitutional being violative of 
    Articles 14, 19(1)(a), and 21 of the Constitution;

(c) DIRECT the Respondents to produce before this Hon'ble Court 
    the surveillance/interception order dated [X] for scrutiny 
    of its compliance with the Puttaswamy proportionality test;

(d) GRANT interim stay of all proceedings pursuant to the 
    impugned FIR pending final disposal of this petition;

(e) GRANT such other and further relief as this Hon'ble Court 
    may deem fit and proper in the facts and circumstances 
    of the case.
                    

๐ŸŽฏ Key Takeaways

  • Puttaswamy established privacy as fundamental right โ€” three-fold test is your primary weapon
  • Shreya Singhal killed Section 66A โ€” any FIR under it is void ab initio
  • Article 19(2) grounds are exhaustive โ€” "annoying" or "offensive" is NOT valid
  • Internet access is now recognized under Article 19(1)(a) and Article 21
  • Always demand production of surveillance orders โ€” they must satisfy proportionality
  • Frame arguments constitutionally: "violates Article [X] per [case]" shifts burden to State
  • Seek interim relief โ€” constitutional cases take time but rights need immediate protection

๐Ÿ“ Part 2 Assessment Quiz

Test your understanding of the constitutional layer in cyber law.

Question 1 of 10
Scenario
The government issues an order blocking a website that published criticism of a Minister, citing "public order" concerns. No specific threat to public order is demonstrated.
What is the strongest constitutional challenge?
Explanation

Website blocking for criticism is a speech restriction. Under Article 19, "public order" restrictions require a proximate nexus between the speech and public disorder โ€” mere possibility of annoyance is insufficient (S. Rangarajan). The restriction fails the reasonableness test.

Question 2 of 10
Which case established that privacy is a fundamental right under Article 21?
Explanation

The nine-judge bench in Puttaswamy (2017) unanimously held that privacy is a fundamental right intrinsic to Article 21. This overruled the contrary observations in M.P. Sharma and Kharak Singh (majority).

Question 3 of 10
The three-fold test under Puttaswamy comprises:
Explanation

The Puttaswamy three-fold test requires: (1) Legality โ€” a valid law must exist; (2) Legitimate Aim โ€” pursuing a valid state objective; (3) Proportionality โ€” means proportionate to the aim, with no less restrictive alternative.

Question 4 of 10
Scenario
Police arrest a journalist for a tweet criticizing government policy, registering FIR under Section 66A IT Act.
What is the immediate legal remedy?
Explanation

Section 66A was struck down by the Supreme Court in Shreya Singhal (2015). Any FIR registered under this provision is a nullity. The appropriate remedy is a quashing petition under Section 482 CrPC / Section 528 BNSS citing the Supreme Court's declaration.

Question 5 of 10
Article 19(2) grounds for restricting free speech are:
Explanation

Article 19(2) grounds are exhaustive, not illustrative. The State cannot restrict speech on grounds outside the eight specified: sovereignty & integrity, security of State, friendly relations, public order, decency/morality, contempt of court, defamation, incitement to offence.

Question 6 of 10
Scenario
Internet services in an entire state are suspended indefinitely following protests. No specific order is published and no review mechanism exists.
Which case provides the strongest precedent to challenge this?
Explanation

Anuradha Bhasin v. Union of India (2020) specifically addressed internet shutdowns, holding that: (1) orders must be published; (2) indefinite suspension is impermissible; (3) proportionality applies; (4) periodic review is mandatory. Internet access was recognized as part of Article 19(1)(a) and Article 21.

Question 7 of 10
Which dimension of privacy under Puttaswamy is most directly engaged by data collection and profiling?
Explanation

Informational Privacy concerns control over personal data and information โ€” including collection, processing, and profiling. This is the dimension most relevant to data protection law and forms the constitutional foundation for DPDPA 2023.

Question 8 of 10
In the Aadhaar judgment (Puttaswamy 2019), the Supreme Court struck down:
Explanation

The Court upheld Aadhaar's core but struck down: (1) Section 57 enabling private entities to demand Aadhaar; (2) Mandatory linking for bank accounts and mobile phones; (3) Authentication for school admissions. PAN-Aadhaar linking was upheld.

Question 9 of 10
The "chilling effect" doctrine, as applied in Shreya Singhal, means:
Explanation

The chilling effect refers to the deterrence of legitimate speech due to fear of prosecution under vague laws. Section 66A's undefined terms like "grossly offensive" and "menacing" caused citizens to self-censor legitimate expression, violating Article 19(1)(a).

Question 10 of 10
Scenario
A government agency deploys facial recognition technology at public places without any specific legislation authorizing it.
Applying Puttaswamy, which prong of the three-fold test does this fail?
Explanation

Without specific legislation authorizing facial recognition, the first prong โ€” Legality โ€” fails. Puttaswamy requires a valid law to exist; executive action or administrative convenience cannot justify privacy infringement. The challenge need not even reach proportionality if legality fails.