#FactCheck - Viral Clip Not Harish Rana’s Farewell, Linked to Surat Woman’s Organ Donation
Executive Summary
Amid reports that AIIMS Delhi has initiated the process to implement the Supreme Court’s decision allowing passive euthanasia for Harish Rana, a video is being shared on social media claiming to show his emotional farewell. However, research by the CyberPeace found the viral claim to be misleading. Our research revealed that the video has no connection to the Harish Rana case. In reality, the footage is from Surat, Gujarat, where the family of a 45-year-old brain-dead woman donated her organs.
Claim:
On social media platform X (formerly Twitter), a user shared the viral video on March 16, 2026, with the caption:
“Harish Rana… struggled for life for 13 years… in the end said goodbye to the world through euthanasia… but even while leaving, gave new life to many through organ donation… eyes, liver, kidneys and several other organs will give a new life to many…”
Post link and archive link are given below:

Fact Check
We took screenshots from the viral video and conducted a reverse image search. This led us to an Instagram handle where the same video was uploaded on January 27, 2026.
- https://www.instagram.com/reels/DUAt_42k2ME/

According to the caption on the Instagram post, the video shows a brain-dead woman in Surat whose liver, both kidneys, and eyes were donated. The post also included an image of the woman. Based on clues from the viral video, we conducted a keyword search on Google and found a report on the website of News18 Gujarati.

According to the report, organ donation by Ritaben Hareshbhai Korat in Surat gave a new life to five patients. The report also carried her photograph, matching the visuals seen in the viral video.
Conclusion:
Our research found that the viral video has no connection to Harish Rana. It actually shows an incident from Surat, Gujarat, where the family of a 45-year-old brain-dead woman, Ritaben Korat, donated her organs.
Related Blogs

Biological data includes biometric information such as fingerprints, facial recognition, DNA sequences, and behavioral traits. Genetic data can be extracted from an individual’s remains long after their death and can continue to identify both that individual and an expanding pool of their living relatives. This persistent identification can significantly reduce privacy over time, revealing genetic characteristics and familial relationships across successive generations.
Key Developments in Privacy Protection for Biological Data:
Legal texts have been created relating to personal data protection and privacy broadly, and can sometimes prove to be poor adaptations specifically for ‘biometric data’ and its safety. Some examples are mentioned below:
- EU and UK- GDPR
GDPR focuses primarily on biometrics in Biological Data while deciphering the technology's immense potential. The EU describes “personal data” under the General Data Protection Regulation (GDPR) including any identifiable information about a particular person. For example, this can include names, identification numbers, location data, and other structured and unstructured data. In addition, the GDPR has more specific requirements around processing sensitive or “special categories of personal data.” These “special categories” include things like genetic and biometric data. For biometric security to work well, citizens' rights must be protected appropriately, and the data collected by private and public concerns must be managed carefully and sensibly.
- USA
California Consumer Privacy Act (CCPA) grants Californian consumers the right to protect their personal information and biometric data including the right to disclosure or access, the right to be forgotten, and data portability. The sale of personal information and the option of opt-out is also given to consumers. Additionally, it contains the right to take legal action, with penalties imposed for violations.
The California Privacy Rights Act was passed on November 3, 2020, and took effect on January 1, 2023, with a lookback period starting January 1, 2022. It introduces sensitive personal information which includes biometric data and other sensitive details.
Virginia's Consumer Data Protection Act, effective from January 1, 2023, designates genetic and biometric data as sensitive data that must be protected.
Illinois' Biometric Information Privacy Act is recognised as the most robust biometric privacy law in the United States. The significance of the Rosenbach v. Six Flags case lies in the Illinois Supreme Court's ruling that a plaintiff does not need to demonstrate additional harm to impose penalties on a BIPA violator. A mere loss of statutory biometric privacy rights is sufficient to warrant penalties.
- India
As per Rule 2(1)(b) of the SPDI Rules, Sensitive Personal Data or Information, including biometric data is included under its meaning. The term ‘biometric data’ has not been defined in the Digital Personal Data Protection Act, 2023. The need for data privacy under the DPDP Act emerges only if such data is subsequently digitised under extraction and manipulation, including notice and consent requirements and penalties.
The Biotech-PRIDE (Promotion of Research and Innovation through Data Exchange) Guidelines of 2021 are aimed at fostering an exchange of information which would thereby enhance research and innovation among various research groups nationwide. These guidelines do not deal with the generation of biological data but are a mechanism to share and exchange information and knowledge generated according to existing laws, rules, regulations and norms of the country. They will ensure data-sharing benefits, maximise use, avoid duplication, maximise integration, ownership of information, better decision-making and equity of access
How is Biological Data vulnerable?
- Biological data is often immutable, meaning it cannot be altered once compromised. Unlike other authentications that can be changed, compromised biometric data poses a permanent risk, making its protection paramount.
- The use of facial recognition technology by law enforcement agencies and the creation of databases by the same also highlights the urgent need for stringent privacy protections.
- Advances in technology, particularly AI and ML, make it easier to collect, analyse, and utilise biometric data by manipulating biometric data. This in turn is leading to new forms of identity theft and fraud that make it necessary to enhance security measures and ethical considerations to prevent abuse.
- Cross-border data transfers raise serious privacy concerns, especially as countries have varying levels and standards of data protection.
- Wearable health-related biometric devices lack the required privacy protections which ends up making the data they collect vulnerable to misuse and breaches.
Future Outlook
With the growing use of biological data, there is likely to be increased pressure on regulatory bodies to strengthen privacy protections. This necessitates a need for enhanced security measures to protect users' identities and further prevent any form of unauthorised access. Future developments should be aimed at including strict consent requirements, and enhanced data security measures, especially for wearable devices. A new legal framework specifically designed to address the challenges posed by biometric data would be welcome. Biological data protection is an emerging need in the digital environment that we live in today.
References
- https://www.cnbc.com/2024/08/17/new-privacy-battle-is-underway-as-tech-gadgets-capture-our-brain-waves.html
- https://www.snrlaw.in/sense-and-sensitivity-sensitive-information-under-indias-new-data-regime/
- https://www.thalesgroup.com/en/markets/digital-identity-and-security/government/biometrics/biometric-data
- https://www.business-standard.com/article/economy-policy/govt-releases-guideline-to-provide-framework-for-sharing-of-biological-data-121073001467_1.html
.webp)
Introduction
Language is an important part of human communication and a basic aspect of human understanding. The world is a global market and this diversity of languages has led to difficulties in engaging for effective communication and collaboration. India alone has 22 official languages and countless regional languages and dialects which change every few hundred kilometres.
AI has emerged to overcome this challenge of language barriers and has stepped into bringing about a transformative shift. It is leading the charge in breaking down traditional barriers and paving the way for more inclusive and seamless global interactions. AI’s integration into language translation has revolutionised the field, addressing longstanding challenges associated with traditional human-centric approaches. The limitations posed by reliance on human translators, such as time constraints, resource limitations, and the inability to handle the data efficiently, paved the way for the furtherance of the transformative impact of AI. However, challenges such as maintaining translation accuracy, addressing cultural nuances, and ensuring data privacy require careful attention to realize AI's full potential.
AI Technologies Bridging Language Gaps
AI tools have transformed translation, transcription, and natural language processing, providing language solutions. They can instantly translate text, transcribe audio, and analyse linguistic nuances, enabling effective cross-cultural communication. Moreover, AI's adaptive capabilities have facilitated language learning, allowing individuals to grasp new languages and adapt their communication styles to diverse cultural contexts.
AI technologies are making information and services more accessible to non-native speakers and are impacting global business, allowing effective engagement. Building on this transformative potential, various AI tools are now used to bridge language gaps in real-world applications. Some examples of AI’s role in bridging the language gap are:
- Real-time translation tools that enable instant communication by providing translations between languages on the fly. This would help in effortless conversations with clients and partners worldwide.
- Tools such as ‘speech-to-text’ and ‘text-to-speech’ like Murf AI, Lovo AI, and ElevenLabs work towards converting spoken language into written text and vice versa. These technologies have led to streamlined interactions, boosted productivity, and clarity in global business dealings. Businesses can extract important information, insights, and action points from meetings, interviews, and presentations.
- AI chatbots like MyGov Corona Helpdesk, WhatsApp Chatbot by the Government of India, Railway Food Order & Delivery by Zoop India, and Gen AI-Powered 'Elena' by Indian School of Business (ISB) are some examples that act as intelligent virtual assistants that engage in real-time conversations, by answering queries, providing information, and facilitating transactions. They offer round-the-clock support, freeing human resources and enhancing customer experience across language barriers.
Challenges and Limitations of AI Translation
While AI’s integration in combatting language barriers is commendable, there are challenges and limitations in overcoming this endeavour. These challenges and limitations are:
- AI translation systems face several challenges in handling accuracy, context, nuance, and idiomatic expressions.
- These systems may encounter struggles with complex or specialised language, along with those towards regional dialects, leading to potential misinterpretations.
- Biases within the AI models can further affect the inclusivity of translations, often favouring dominant languages and cultural norms while marginalising others.
- Ethical concerns, regarding privacy and data security, particularly when sensitive information is processed have also been arising.
- Ensuring user consent and protecting data integrity are essential to addressing these concerns. As AI continues to evolve, ongoing efforts are needed to improve fairness, transparency, and the cultural sensitivity of translation systems.
AI’s Future in Language Translation
AI technologies are moving towards improving translation accuracy and contextual understanding, allowing AI models to grasp cultural nuances and idiomatic expressions better. This can significantly enhance communication across diverse languages, fostering multilingual interactions and global collaboration in business, education, and diplomacy. Improvements in AI tech are taking place ubiquitous, and models like GPT and Google Translate are now better at capturing nuances, idioms, and cultural differences, reducing errors. AI tools like the Microsoft Translator help cross-continental teams work seamlessly by enhancing their productivity and inclusivity.
AI is capable of offering real-time translation in healthcare, education, and public services. This would enable more inclusive environments and bridging communication gaps. For example in the healthcare system, AI-powered translation tools are helping the industry to provide better care by crossing linguistic barriers. Doctors can now communicate with patients who speak different languages, ensuring equitable care even with linguistic boundaries.
Conclusion
We live in a world where diverse languages pose significant challenges to global communication, and AI has emerged as a powerful tool to bridge these gaps. AI is paving the way for more inclusive and seamless interactions by revolutionising language translation, transcription, and natural language processing. Its ability to break down barriers caused by linguistic diversity ensures effective communication in fields ranging from business to healthcare. Despite challenges like accuracy and cultural sensitivity, the potential for AI to continuously improve is undeniable. As AI technologies evolve, they stand as the key to overcoming language barriers and fostering a more connected and inclusive global community.
Notwithstanding AI's potential abilities to overcome language barriers through advances in natural language processing and translation, cybersecurity and data privacy must always come first. The same technologies that make it easier to communicate globally also put private information at risk. The likelihood of data breaches, personal information misuse, and compromised communication rises in the absence of strict cybersecurity safeguards. Thus, in order to guarantee safe and reliable international Interactions as AI develops, it is crucial to strike a balance between innovation and privacy protection.
References
- https://megasisnetwork.medium.com/ai-and-language-translation-breaking-down-language-barriers-47873cfdb13b
- https://pubmed.ncbi.nlm.nih.gov/38099504/
- https://www.linkedin.com/pulse/breaking-language-barriers-ai-era-leveraging-tools-business-a-rad
- https://www.researchgate.net/publication/373842132_Breaking_Down_Barriers_With_Artificial_Intelligence_AI_Cross-Cultural_Communication_in_Foreign_Language_Education

Introduction
Attacks by cybercriminals targeting national critical infrastructure are increasing at an unsettling rate. Such attacks have the potential to do severe damage by upsetting transportation networks, utilities, financial services, and other vital infrastructure. The physical and digital systems that underpin a nation's economy are known as critical infrastructure thus if they were to be disrupted, there would be serious risks to the economy and public health and safety. Establishing proper cybersecurity measures and protecting those digital systems from possible threats or cyberattacks is necessary. Both public and private sector assets are included in these essential infrastructure categories.
Nationwide alert:
Recently one of the biggest hacker organizations has warned of an upcoming cyberattack on the critical infrastructure and websites in India, causing a countrywide alert. A gang of hackers from Indonesia and Pakistan, celebrating 4,000 members, announced a planned “Cyber Party” on 11 December 2023. The event’s claimed goal is to compromise and disrupt India's digital infrastructure. They disclosed this information on their Telegram channel.
This hacker organization holds a record of launching extensive cyberattacks; in the past, it sent out a "red notice" that was intended to target 12,000 websites run by the Indian government. They have previously attacked other nations, such as Israel, Sweden, and the United States. Their reasons are varied and might include anything from assaults on certain groups to religious disagreements.
The gang has also been acclaimed for hacking into a New York City police agency, obtaining health and social media data from Israel, and exposing information from Swedish social media users. These alarming events show how urgently strong and all-encompassing cybersecurity measures are needed, not only in India but throughout the world.
Effect(s) on India
1. Central Agencies Are Alert, Expect Health Sector Attacks: The cyberinfrastructure of the health sector has been a common target of assaults, particularly in the aftermath of the COVID-19 epidemic, which has authorities particularly concerned. Relevant ministries have received notifications from central authorities advising them to take precautions against unwanted access. The security of digital infrastructure is seriously challenged by the constantly changing panorama of cyber-attacks, according to those who are aware of the warning and threat.
2. National security concerns: Because of the interconnectedness of critical national infrastructure, a cyberattack may have an impact on national security. Attacks against defense networks, intelligence organizations health infrastructure, or military systems, for instance, might make it more difficult for the nation to respond to threats from outside.
3. Concerns for Public Safety and Health: Cyberattacks on healthcare systems run the risk of compromising patient data, stopping medical procedures, and even endangering the general public's health. This might have potentially fatal results in urgent circumstances.
4. Data Breach and Privacy Issues: Stealing confidential data is a common component of cybersecurity assaults. A breach of critical infrastructure systems might result in sensitive data, including personal information, being misused and accessed without authorization, raising privacy issues.
Preventive and protective measures
1. The plan for responding to incidents: Make sure a clear incident response strategy is in place, with a focus on healthcare systems, and that it is especially designed to handle cyber-attacks on critical infrastructure.
2. Better Tracking: Observing vital networks, systems, and data flows more closely, especially in the healthcare industry. Using cutting-edge threat detection technologies to spot odd or questionable activity.
3. Critical System Isolation: Cutting off vital healthcare systems from the wider network to reduce the chance of attackers moving laterally.
4. Continual Backups: Make sure that backup copies of important data and systems are kept in a safe, isolated location by regularly backing them up. In the event of a ransomware attack or data breach, this makes recovery easier.
5. Update and patch systems: Make sure that all operating systems and apps utilized in the infrastructure of the healthcare industry are updated with the most recent security updates.
6. Protocols for Communication: In the case of a cyber-incident, establishing explicit communication mechanisms to guarantee that pertinent parties are notified as soon as possible. This covers correspondence with law enforcement, the public, and other members of the healthcare industry as needed.
Conclusion
Urgent preventative actions are essential in response to an impending cyber threat revealed by a large hacker organization that is targeting India's key infrastructure, specifically the healthcare sector. The interconnectedness of this infrastructure puts public safety, privacy, and national security in danger. A crucial defensive approach is formed by the proactive measures mentioned, which include communication protocols, system isolation, improved monitoring, incident response preparation, and frequent backups. The dangers underline the necessity of international collaboration in tackling cybersecurity issues and the requirement for shared responsibility of everyone to safeguard digital networks. To reduce risks and guarantee the resilience of vital national infrastructure in the face of changing cyber threats, authorities must continue to develop and adapt their cybersecurity tactics.
References:
- https://www.cnbctv18.com/technology/exclusive--nationwide-alert-sounded-as-hacker-group-plans-cyber-party-to-attack-indias-critical-digital-infra-18520021.htm
- https://www.the420.in/ndian-authorities-high-alert-hacker-groups-threaten-cyber-assault/
- https://www.cnbctv18.com/technology/exclusive--nationwide-alert-sounded-as-hacker-group-plans-cyber-party-to-attack-indias-critical-digital-infra-18520021.htm#:~:text=By%20News18.com%20Dec%208,%3A58%20AM%20IST%20(Published)&text=A%20nationwide%20alert%20has%20been,Indian%20websites%20and%20critical%20infrastructure
- https://verveindustrial.com/resources/blog/critical-infrastructure-cyber-security/