<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/a2k/front-page/search_rss">
  <title>Access To Knowledge (A2K)</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 2161 to 2175.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/news/hindustan-times-zia-haq-april-12-2013-social-media-may-influence-160-lok-sabha-seats-in-2014"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/privacy-surgeon-simon-davies-april-9-2013-india-takes-its-first-serious-step-toward-privacy-regulation"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/indian-express-april-6-2013-nishant-shah-off-the-record"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/privacy-round-table-in-bangalore"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/the-hindu-april-1-2013-prashant-jha-clarify-and-define-terms-in-it-rules-panel-tells-govt"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/comments-on-it-electronic-service-delivery-rules-2011"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/wgig-8-stock-taking-mapping-and-going-forward"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/comments-on-the-it-reasonable-security-practices-and-procedures-and-sensitive-personal-data-or-information-rules-2011"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/comments-on-the-it-guidelines-for-cyber-cafe-rules-2011"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-criminal-law-amendment-bill-2013"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/march-2013-bulletin"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/indias-biometric-identification-programs-and-privacy-concerns"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/dns-singularity-of-icann-and-the-gold-rush"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/times-of-india-atul-sethi-march-30-2013-what-if-the-net-shut-down-for-a-few-days"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/news/hindustan-times-zia-haq-april-12-2013-social-media-may-influence-160-lok-sabha-seats-in-2014">
    <title>Social media may influence 160 LS seats in 2014</title>
    <link>https://cis-india.org/news/hindustan-times-zia-haq-april-12-2013-social-media-may-influence-160-lok-sabha-seats-in-2014</link>
    <description>
        &lt;b&gt;Social media is likely to influence politics and elections in 160 of India’s 543 Parliament constituencies, making Facebook and Twitter users the nation’s newest voting bloc, a new study suggests.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This article by Zia Haq was &lt;a class="external-link" href="http://www.hindustantimes.com/India-news/NewDelhi/Social-media-may-play-decisive-role-in-2014-polls/Article1-1042982.aspx"&gt;published in the Hindustan Times&lt;/a&gt; on April 12, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;In these mostly urbanizing constituencies, social-media usage is now  “sufficiently widespread” to influence the outcome of a general election  slated for 2014, the study by IRIS Knowledge Foundation and supported  by the Internet and Mobile Association of India (IAMAI), indicates.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On April 4, Congress scion Rahul Gandhi’s high-profile address to the  Confederation of Indian Industry, a leading business forum, was trending  topmost on Twitter in India that day, some posts by rivals mocking him.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A series of lectures by Gujarat chief minister Narendra Modi, a  presumptive PM, this week too garnered strong social-media attention,  with his and Gandhi’s supporters competing online to run the other down.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A deeply polarizing figure still, Modi is often accused of watching  over a carnage that killed nearly 2000 people in 2002, mostly Muslims.  Yet, he has pulled off a stunning online strategy to showcase Gujarat as  India’s Guandong, a south China province with top GDP rankings and  investment.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Research shows that social media is more persuasive than television  ads. Nearly 100 million Indians, or more than Germany’s population, use  the Internet each day. Of this, 40 million have assured broadband, the  ones most likely to have at least one social media account.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Unlike Obama, who used social media directly for votes, Indian  politicians have tended to use it more to mould public discourse,” says  Sunil Abraham, the CEO of The Centre for Internet and Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;That is likely to change in 2014. Not surprisingly, Modi became the  third politician globally, a fter Obama and Australian PM Julia Gillard,  to host a political conference on Google+ hangout.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Chief ministers in states are also leveraging social media. Bihar has  unveiled a re-branded campaign called, “Bihar ka haq” or Bihar’s  Rightful Cause, on Facebook.&lt;/p&gt;
&lt;p&gt;Social-media-impacted  constituencies, according to the study, are those where Facebook users  are more than the victory margin of the winner in the last Lok Sabha  election, or where such users account for over 10% of the voting  population.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/hindustan-times-zia-haq-april-12-2013-social-media-may-influence-160-lok-sabha-seats-in-2014'&gt;https://cis-india.org/news/hindustan-times-zia-haq-april-12-2013-social-media-may-influence-160-lok-sabha-seats-in-2014&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-04-15T07:13:52Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/privacy-surgeon-simon-davies-april-9-2013-india-takes-its-first-serious-step-toward-privacy-regulation">
    <title>India takes its first serious step toward privacy regulation – but it may be misguided </title>
    <link>https://cis-india.org/news/privacy-surgeon-simon-davies-april-9-2013-india-takes-its-first-serious-step-toward-privacy-regulation</link>
    <description>
        &lt;b&gt;The world’s second-most populous nation may be on the cusp of embracing privacy legislation. After several false starts the Indian government appears ready to accept the need for some form of regulation.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This blog post by Simon Davies was &lt;a class="external-link" href="http://www.privacysurgeon.org/blog/incision/india-takes-its-first-serious-step-toward-privacy-regulation-but-it-may-be-misguided/"&gt;published in the Privacy Surgeon&lt;/a&gt; on April 9, 2013. The Centre for Internet and Society recently published a draft Citizens privacy bill which is mentioned in this post.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Well, maybe this is a slightly optimistic view. A more accurate  portrayal might be “the Indian government appears ready to accept the &lt;i&gt;principle&lt;/i&gt; of some form of regulation”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There is actually no agreed policy position across government on the  question of privacy and data protection, but the Planning Commission  last year established an Expert Group under the chairmanship of the  former Chief Justice of the Delhi High Court, A.P.Shah. Justice Shah’s  subsequent &lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf" target="_blank" title="justice shah report"&gt;report&lt;/a&gt; is being considered and a draft Bill has been created.&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;Shah’s report provided a convincing body of evidence – both at the  domestic and the international level – for the creation of national  regulation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It called for the formation of a regulatory framework and set out nine  principles that could form a foundation for the next stage. These  principles – reflecting the basis of law in other countries – have been  generally accepted by Indian stakeholders as a sound frame of reference  for progress.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However although the nine principles are supported, the precise nature of any possible regulation is still very much in flux.&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;There’s a long way to go before consensus is established on a overall  type of regulatory framework. Having said that, India is closer than  ever to seeing real legislation – and the international community needs  to put its weight behind the activity.&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;Debate over the merits of data protection and privacy law stretch back  beyond a decade but reform was constantly hampered by perceptions that  regulation would stifle economic growth.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some industry lobbies have been as keen as government to ensure that privacy proposals are stillborn.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even with the nine principles as a bedrock the path to privacy law must overcome two extremely difficult hurdles.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The first of these is that a substantial number of Indian opinion  leaders continue to express an instinctive view that there is no  cultural history for respect of privacy in India. That is, people don’t  want or expect privacy protection and Western notions of privacy are  alien to Indian society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In support of this assertion these critics often cite an analogy about  conversation on Indian trains. It is well known that many Indians will  disclose their life story to strangers on the Indian rail network,  discussing their personal affairs with people they have never before  met. This trait is construed as evidence that Indians do not value their  privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;I spoke last week at an important &lt;a href="https://cis-india.org/news/future-of-privacy-in-india-on-april-5-2013-at-oberoi-hotel-new-delhi" target="_blank" title="India privacy meeting 2013"&gt;meeting&lt;/a&gt; in New Delhi where this exact point was repeatedly made. The meeting, organised by the Data Security &lt;a href="http://www.dsci.in/" target="_blank" title="dsci"&gt;Council&lt;/a&gt; of India and &lt;a href="http://www.i-comp.org/" target="_blank" title="icomp"&gt;ICOMP&lt;/a&gt; India was well attended by industry, government, academics and NGOs.  Speakers made constant reference to the matter of public disclosure of  personal information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In response, noted commentator Vickram Crishna expressed the view that  the train anecdote had no relevance and was a convenient ruse for people  who for their own self interest opposed privacy regulation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“In reality this circumstance is like Vegas”, he said. “What happens on  Indian trains, stays on Indian trains. People will talk about their  lives because they will never see these passengers again and there is no  record of the disclosures.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“What we are dealing with in the online world is a completely different  matter. There is no correlation between the two environments”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A substantial opinion poll &lt;a href="http://www.privacysurgeon.org/blog/incision/indias-first-major-privacy-survey-reveals-deep-concerns-over-intrusion/" target="_blank" title="India’s first major privacy survey reveals deep concern over intrusion"&gt;published&lt;/a&gt; earlier this year also debunked the myth that Indians don’t care about  privacy. Levels of concern expressed by respondents was roughly the same  as the level of concern identified in other parts of the world.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A second hurdle facing privacy legislation is the perception -   particularly prevalent in the United States – that legislation will be a  burden on industry and people do not want yet another cumbersome and  costly government structure.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are perhaps some grounds for considering this perspective, given the vast scale and complexity of India’s economy.&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;Government intervention does not enjoy a history of consistent success  in the marketplace, though in many instances intervention has been the  only means to bring industry into compliance with basic safeguards.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;I made the point at the meeting that support for a purist model of  industry self regulation was simplistic and misguided. Most systems of a  similar nature fail unless someone is mandated to ensure compliance,  transparency, enforceability and consistency. It’s a question of finding  a way to embed accountability in industry self regulation – and this is  where legislation and government could help.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Justice Shah’s report reflected this widespread concern by recommending a  co-regulatory framework in which a privacy commissioner would oversee  industry self regulation. However – as last week’s meeting exemplified –  even this compromise solution is not acceptable to many industry  players. They oppose the idea of an appointed commissioner and believe  that industry self regulation alone will be sufficient.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is an influential view that cannot be brushed aside. However in a &lt;a href="http://www.youtube.com/watch?v=W0G1jWFp0fs" target="_blank" title="RSTV davies interview youtube"&gt;special programme&lt;/a&gt; aired on19th April on India’s main parliamentary television network – &lt;a href="http://rstv.nic.in/rstv/index.asp" target="_blank" title="rstv india"&gt;RSTV&lt;/a&gt; – I repeatedly make the point that such a view, if successful, would  put Indian industry in danger of winning the battle but losing the war.  Europe is unlikely to accept a model of sole industry regulation, and  the crucial flow of data between the two regions could be imperiled.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Conscious of all these challenges the influential &lt;a href="https://cis-india.org/" target="_blank" title="cis india"&gt;NGO&lt;/a&gt; Centre for Internet and Society has published a draft Citizens privacy &lt;a href="https://cis-india.org/internet-governance/blog/privacy-protection-bill-2013-citizens-draft" target="_blank" title="cis citizens privacy bill"&gt;bill&lt;/a&gt; and has commenced a series of consultation meetings across the country.  These initiatives will provide important input for the emerging  legislation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is an important moment for privacy in India, and one that will  require careful thought and sensitive implementation. However no-one in  India should be in any doubt that the current unregulated situation is  unsustainable in a global environment where nations are expected to  protect both their citizens and the safety of data on their systems.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/privacy-surgeon-simon-davies-april-9-2013-india-takes-its-first-serious-step-toward-privacy-regulation'&gt;https://cis-india.org/news/privacy-surgeon-simon-davies-april-9-2013-india-takes-its-first-serious-step-toward-privacy-regulation&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-04-15T06:39:05Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system">
    <title>India's 'Big Brother': The Central Monitoring System (CMS)</title>
    <link>https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system</link>
    <description>
        &lt;b&gt;In this post, Maria Xynou looks at India´s Central Monitoring System (CMS) project and examines whether it can target individuals´ communications data, regardless of whether they are involved in illegal activity.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;&lt;i&gt;This research was undertaken as part of the 'SAFEGUARDS' project that CIS is undertaking with Privacy International and IDRC&lt;/i&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Starting from &lt;a href="http://www.ciol.com/ciol/news/184770/governments-central-monitoring-system-operational-soon"&gt;this month&lt;/a&gt;, all telecommunications and Internet communications in India will be analysed by the government and its agencies. What does that mean? It means that everything we say or text over the phone, write, post or browse over the Internet will be centrally monitored by Indian authorities. This totalitarian type of surveillance will be incorporated in none other than the Central Monitoring System (CMS).&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;The Central Monitoring System (CMS)&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The Central Monitoring System (CMS) may just be another step in the wrong direction, especially since India currently lacks privacy laws which can protect citizens from potential abuse. Yet, all telecommunications and Internet communications are to be monitored by Indian authorities through the CMS, despite the fact that it remains &lt;/span&gt;&lt;a href="http://www.lossofprivacy.com/index.php/2009/11/india-to-set-up-a-central-monitoring-system/"&gt;unclear how our data will be used&lt;/a&gt;&lt;span&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The CMS was prepared by the Telecom Enforcement, Resource and Monitoring (TREM) and by the Centre for Development of Telematics (C-DoT) and is being manned by the Intelligence Bureau. The CMS project is likely to start operating this month and the &lt;/span&gt;&lt;a href="http://newindianexpress.com/nation/article1300012.ece"&gt;government plans&lt;/a&gt;&lt;span&gt; on creating a platform that will include all the service providers in Delhi, Haryana and Karnataka. The &lt;/span&gt;&lt;a href="http://cactusblog.files.wordpress.com/2010/01/it_act_2008.pdf"&gt;Information Technology Amendment Act 2008&lt;/a&gt;&lt;span&gt; enables e-surveillance and central and regional databases will be created to help central and state level law enforcement agencies in interception and monitoring. Without any manual intervention from telecom service providers, the CMS will equip government agencies with Direct Electronic Provisioning, filters and alerts on the target numbers. The CMS will also enable &lt;/span&gt;&lt;a href="http://www.nextbigwhat.com/indian-government-to-setup-centralized-communication-monitor-system-297/"&gt;Call Data Records (CDR) analysis and data mining&lt;/a&gt;&lt;span&gt; to identify the personal information of the target numbers.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The estimated set up cost of the CMS is&lt;/span&gt;&lt;a href="http://www.ciol.com/ciol/news/184770/governments-central-monitoring-system-operational-soon"&gt; Rs. 4 billion&lt;/a&gt;&lt;span&gt; and it will be connected with the Telephone Call Interception System (TCIS) which will help monitor voice calls, SMS and MMS, fax communications on landlines, CDMA, video calls, GSM and 3G networks. Agencies which will have access to the CMS include the Research and Analysis Wing (R&amp;amp;AW), the Central Bureau of Investigation (CBI), the National Investigation Agency (NIA), the Central Board of Direct Taxes (CBDT), the Narcotics Control Bureau, and the Enforcement Directorate (ED). In particular, last October, &lt;/span&gt;&lt;a href="http://www.zdnet.com/in/india-agency-petitions-for-monitoring-system-7000005762/"&gt;the NIA approached the Department of Telecom&lt;/a&gt;&lt;span&gt; requesting its connection with the CMS, which would help it intercept phone calls and monitor social networking sites &lt;/span&gt;&lt;a href="http://articles.timesofindia.indiatimes.com/2012-10-15/internet/34471762_1_loknath-behera-nia-dot"&gt;without the cooperation of telcos.&lt;/a&gt;&lt;span&gt; However, the NIA is&lt;/span&gt;&lt;a href="http://newindianexpress.com/nation/article1300012.ece"&gt; currently monitoring eight out of 10,000 telephone lines &lt;/a&gt;&lt;span&gt;and if it is connected with the CMS, the NIA will also get access to e-mails and other social media platforms. Essentially, the CMS will be converging all the interception lines at one location and Indian law enforcement agencies will have access to them. The CMS will also be capable of &lt;/span&gt;&lt;a href="http://www.zdnet.com/in/india-agency-petitions-for-monitoring-system-7000005762/"&gt;intercepting our calls and analyzing our data on social networking sites&lt;/a&gt;&lt;span&gt;. Thus, even our attempts to protect our data from ubiquitous surveillance would be futile.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;In light of the CMS being installed soon, the Mumbai police took the initiative of setting up a &lt;/span&gt;&lt;a href="http://www.google.com/hostednews/afp/article/ALeqM5iVMgMkOgpXOTaon2VoLdvu2x5oyg?docId=CNG.6d8f555d3498b94bac2fb1046fc7d3a6.4a1%20,%20http://m.timesofindia.com/articleshow/19040572.cms"&gt;´social media lab´&lt;/a&gt;&lt;span&gt; last month, which aims to monitor Facebook, Twitter and other social networking sites. This lab would be staffed by 20 police officers who would keep an eye on issues being publicly discussed and track matters relating to public security. According to &lt;/span&gt;&lt;a href="http://www.google.com/hostednews/afp/article/ALeqM5iVMgMkOgpXOTaon2VoLdvu2x5oyg?docId=CNG.6d8f555d3498b94bac2fb1046fc7d3a6.4a1%20,%20http://m.timesofindia.com/articleshow/19040572.cms"&gt;police spokesman Satyanarayan Choudhary&lt;/a&gt;&lt;span&gt;, the lab will be used to identify trends among the youth and to plan law and order accordingly. However, fears have arisen that the lab may be used to stifle political debate and freedom of expression. The &lt;/span&gt;&lt;a href="http://www.bbc.co.uk/news/world-asia-india-20405457"&gt;arrest of two Indian women last November over a Facebook post&lt;/a&gt;&lt;span&gt; which criticized the shutdown of Mumbai after the death of politician Bal Thackeray was proof that the monitoring of our communications can potentially oppress our freedom and human rights. And now that all our online activity will be under the microscope...will the CMS security trade-off be worth it?&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;Surveillance in the name of Security&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;In a digitised world,&lt;/span&gt;&lt;a href="http://www.businessrevieweurope.eu/technology/software/addressing-the-cyber-security-threat"&gt; threats to security have been digitised&lt;/a&gt;&lt;span&gt;. Terrorism is considered to be a &lt;/span&gt;&lt;a href="http://www.rorg.no/Artikler/869.html"&gt;product of globalisation&lt;/a&gt;&lt;span&gt; and as such, the Internet appears to be a tool used by terrorists. Hence governments all around the world are convinced that &lt;/span&gt;&lt;a href="http://www.slate.com/blogs/future_tense/2012/12/13/national_counterterrorism_center_s_massive_new_surveillance_program_uncovered.html"&gt;surveillance is probably one of the most effective methods in detecting and prosecuting terrorists&lt;/a&gt;&lt;span&gt;, as all movement, action, interests, ideas and everything else that could define an individual are closely being monitored under the ´surveillance umbrella´ True; if everything about our existence is being closely monitored and analysed, it seems likely that we will instantly be detected and prosecuted if engaged in illegal activity. But is that the case with big data? According to &lt;/span&gt;&lt;a href="http://www.schneier.com/blog/archives/2006/03/data_mining_for.html"&gt;security expert Bruce Schneier&lt;/a&gt;&lt;span&gt;, searching for a terrorist through data mining is like looking for a needle in a haystack. Generally, the bigger the amount of data, &lt;/span&gt;&lt;a href="http://www.statsoft.com/textbook/data-mining-techniques/"&gt;the bigger the probability of an error in matching profiles&lt;/a&gt;&lt;span&gt;. Hence, when our data is being analysed through data mining of big data, the probability of us being charged for a crime we did not commit is real. Nonetheless, the CMS is going to start operating soon in an attempt to enable law enforcement agencies to tackle crime and terrorism.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;A few days ago, I had a very interesting chat with an employee at &lt;/span&gt;&lt;a href="http://www.sas.com/offices/asiapacific/india/company/index_india.html"&gt;SAS Institute (India) Pvt. Ltd.&lt;/a&gt;&lt;span&gt; in Bangalore, which is a wholly owned subsidiary of&lt;/span&gt;&lt;a href="http://www.sas.com/company/about/index.html"&gt; SAS Institute Inc&lt;/a&gt;&lt;span&gt;. SAS is a company which produces &lt;/span&gt;&lt;a href="http://www.sas.com/company/about/index.html"&gt;software solutions and services&lt;/a&gt;&lt;span&gt; to combat fraud in financial services, identify cross-sell opportunities in retail, and all the business issues it addresses are based on three capabilities: information management, analytics and business intelligence. Interestingly enough, SAS also produces&lt;/span&gt;&lt;a href="http://www.sas.com/solutions/fraud/social-network/#section=1"&gt; social network analysis&lt;/a&gt;&lt;span&gt; which ´helps institutions detect and prevent fraud by going beyond individual and account views to analyze all related activities and relationships at a network dimension´. In other words, social network analysis by SAS would mean that, through Facebook, for example, all of an individual's´ interests, activities, habits, relationships and everything else that could be, directly or indirectly, linked to an individual would be mapped out in relation to other individuals. If, for example, several individuals appear to have mutual interests and activities, there is a high probability that an individual will be associated with the same type of organization as the other individuals, which could potentially be a terrorist organization. Thus, an essential benefit of the social network analysis solution is that it &lt;/span&gt;&lt;a href="http://www.sas.com/solutions/fraud/social-network/#section=3"&gt;uncovers previously unknown network connections and relationships&lt;/a&gt;&lt;span&gt;, which significantly enables more efficient investigations.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;According to the SAS employee I spoke to, the company provides social network analysis to Indian law enforcement agencies and aims at supporting the CMS project in an attempt to tackle crime and terrorism. Furthermore, the SAS employee argued that their social network analysis solution only analyzes open source data which is either way in the public online domain, hence respecting individuals´ online privacy. In support of the Mumbai ´social media lab´, &lt;/span&gt;&lt;a href="http://m.timesofindia.com/city/mumbai/Social-media-lab-cant-keep-a-tab-on-all-social-media-users-Experts/articleshow/19027308.cms"&gt;cyber security expert, Vijay Mukhi&lt;/a&gt;&lt;span&gt;, argued:&lt;/span&gt;&lt;/p&gt;
&lt;blockquote class="italized"&gt;&lt;i&gt;´There may be around 60 lakh twitter users in the city and millions of other social media network users. The police will require a budget of around Rs 500 crore and huge resources such as complex software, unique bandwidth and manpower to keep a track of all of them. To an extent, the police can monitor select people who have criminal backgrounds or links with anti-social or anti-national elements...[...]...Even the apprehension that police is reading your tweet is wrong. The volume of networking on social media sites is beyond anybody's capacity. Deleting any user's message is humanly impossible. It is even difficult to find the origin of messages and shares. However, during the recent Delhi gangrape incident such monitoring of data in public domain helped the police gauge the mood of the people.´&lt;/i&gt;&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://m.timesofindia.com/city/mumbai/Social-media-lab-cant-keep-a-tab-on-all-social-media-users-Experts/articleshow/19027308.cms"&gt;Another cyber security expert&lt;/a&gt;&lt;span&gt; argued that the idea that the privacy of our messages and online activity would be intercepted is a misconception. The expert stated that:&lt;/span&gt;&lt;/p&gt;
&lt;blockquote class="italized"&gt;&lt;i&gt;´The police are actually looking out for open source intelligence for which information in public domain on these sites is enough. Through the lab, police can access what is in the open source and not the message you are sending to your friend.´&lt;/i&gt;&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://m.timesofindia.com/city/mumbai/Social-media-lab-cant-keep-a-tab-on-all-social-media-users-Experts/articleshow/19027308.cms"&gt;Cyber security experts&lt;/a&gt;&lt;span&gt; also argued that the purpose of the creation of the Mumbai social media lab and the CMS in general is to ensure that Indian law enforcement agencies are better informed about current public opinion and trends among the youth, which would enable them to take better decisions on a policy level. It was also argued that, apparently, there is no harm in the creation of such monitoring centres, especially since other countries, such as the U.S., are conducting the same type of surveillance, while have enacted stringent privacy regulations. In other words, the monitoring of our communications appears to be justified, as long as it is in the name of security.&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;CMS targeting individuals: myth or reality?&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The CMS is not a big deal, because it will not target us individually...or at least that is what &lt;/span&gt;&lt;a href="http://m.timesofindia.com/city/mumbai/Social-media-lab-cant-keep-a-tab-on-all-social-media-users-Experts/articleshow/19027308.cms"&gt;cyber security experts&lt;/a&gt;&lt;span&gt; in India appear to be claiming. But is that really the case? Lets look at the following hypothesis:&lt;/span&gt;&lt;/p&gt;
&lt;blockquote class="quoted"&gt;&lt;i&gt;The CMS can surveille and target individuals, if Indian law enforcement agencies have access to individuals content and non-content data and are simultaneously equipped with the necessary technology to analyse their data.&lt;/i&gt;&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The two independent variables of the hypothesis are: (1) Indian law enforcement agencies have access to individuals´ content and non-content data, (2) Indian law enforcement agencies are equipped with the necessary technology to analyse individuals´ content and non-content data. The dependent variable of the hypothesis is that the CMS can surveille and target individuals, which can only be proven once the two independent variables have been confirmed. Now lets look at the facts.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The &lt;/span&gt;&lt;a href="http://bigbrotherinc.org/v1/India/"&gt;surveillance industry in India&lt;/a&gt;&lt;span&gt; is a vivid reality. &lt;/span&gt;&lt;a href="http://www.clear-trail.com/"&gt;ClearTrail&lt;/a&gt;&lt;span&gt; is an Indian surveillance technology company which provides communication monitoring solutions to law enforcement agencies around the world and which is a regular sponsor of ISS world surveillance trade shows. In fact, ClearTrail &lt;/span&gt;&lt;a href="http://www.issworldtraining.com/iss_mea/sponsors2.html"&gt;sponsored the ISS world surveillance trade show in Dubai &lt;/a&gt;&lt;span&gt;last month - another opportunity to sell its surveillance technologies to law enforcement agencies around the world. ClearTrail´s &lt;/span&gt;&lt;a href="http://wikileaks.org/spyfiles/files/0/111_CLEARTRAIL.pdf"&gt;solutions&lt;/a&gt;&lt;span&gt; include, but are not limited to, mass monitoring of IP and voice networks, targeted IP monitoring, tactical Wi-Fi monitoring and off-the-air interception. Indian law enforcement agencies are equipped with such technologies and solutions and thus have the technical capability of targeting us individually and of monitoring our ´private´ online activity.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://www.shoghicom.com/"&gt;Shoghi Communications Ltd.&lt;/a&gt;&lt;span&gt; is just another example of an Indian surveillance technology company. WikiLeaks has published a&lt;/span&gt;&lt;a href="http://wikileaks.org/spyfiles/files/0/160_SHOGI-2006-semiactive_gsm_monitoring.pdf"&gt; brochure&lt;/a&gt;&lt;span&gt; with one of Shoghi´s solutions: the Semi Active GSM Monitoring System. This system can be used to intercept communications from any GSM service providers in the world and has a 100% target call monitor rate. The fact that the system is equipped with IMSI analysis software enables it to extract the suspect´s actual mobile number from the network without any help from the service provider. Indian law enforcement agencies are probably being equipped with such systems by Shoghi Communications, which would enable the CMS to monitor telecommunications more effectively.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;As previously mentioned, SAS provides Indian law enforcement agencies &lt;/span&gt;&lt;a href="http://www.sas.com/solutions/fraud/social-network/"&gt;social network analysis solutions&lt;/a&gt;&lt;span&gt;. In general, many companies, Indian and international, produce &lt;/span&gt;&lt;a href="http://wikileaks.org/the-spyfiles.html"&gt;surveillance products and solutions&lt;/a&gt;&lt;span&gt; which they supply to law enforcement agencies around the world. However, if such technology is used solely to analyse open source data, how do law enforcement agencies expect to detect criminals and terrorists? The probability of an individual involved in illegal activity to disclose secrets and plans in the public online sphere is most likely significantly low. So given that law enforcement agencies are equipped with the technology to analyse our data, how do they get access to our content data in order to detect criminals? In other words, how do they access our ´private´ online communications to define whether we are a terrorist or not?&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Some of the biggest online companies in the world, such as Google and Microsoft, &lt;/span&gt;&lt;a href="http://www.nytimes.com/2013/03/22/technology/microsoft-releases-report-on-law-enforcement-requests.html?_r=0"&gt;disclose our content data to law enforcement agencies&lt;/a&gt;&lt;span&gt; around the world. Sure, a lawful order is a prerequisite for the disclosure of our data...but in the end of the day, law enforcement agencies &lt;/span&gt;&lt;i&gt;can &lt;/i&gt;&lt;span&gt;and &lt;/span&gt;&lt;i&gt;do &lt;/i&gt;&lt;span&gt;have access to our content data, such as our personal emails sent to friends, our browsing habits, the photos we sent online and every other content created or communicated via the Internet. &lt;/span&gt;&lt;a href="http://www.engadget.com/tag/transparencyreport/"&gt;Law enforcement requests reports &lt;/a&gt;&lt;span&gt;published by companies, such as Google and &lt;/span&gt;&lt;a href="https://cis-india.org/internet-governance/blog/microsoft-releases-first-report-on-data-requests-by-law-enforcement-agencies"&gt;Microsoft&lt;/a&gt;&lt;span&gt;, confirm the fact that law enforcement agencies have access to both our&lt;/span&gt;&lt;a href="http://blogs.technet.com/b/microsoft_on_the_issues/archive/2013/03/21/microsoft-releases-2012-law-enforcement-requests-report.aspx"&gt; content and non-content data&lt;/a&gt;&lt;span&gt;, much of which was disclosed to Indian law enforcement agencies. Thus, having access to our ´private´ online data, all Indian law enforcement agencies need is the technology to analyse our data and match patterns. The various surveillance technology companies operating in India, such as &lt;/span&gt;&lt;a href="http://wikileaks.org/spyfiles/files/0/111_CLEARTRAIL.pdf"&gt;ClearTrail&lt;/a&gt;&lt;span&gt; and &lt;/span&gt;&lt;a href="http://wikileaks.org/spyfiles/files/0/160_SHOGI-2006-semiactive_gsm_monitoring.pdf"&gt;Shoghi Communications&lt;/a&gt;&lt;span&gt;, ensure that Indian law enforcement agencies are equipped with the necessary technology to meet these ends.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The hypothesis that the CMS can surveille and target us individually can be confirmed, since Indian law enforcement agencies have access to our content and non-content data, while simultaneously being equipped with the necessary technology to analyse our data. Thus, the arguments brought forth by cyber security experts in India appear to be weak in terms of validity and reliability and the CMS appears to be a new type of ´Big Brother´ upon us. But what does this mean in terms of our privacy and human rights?&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The &lt;/span&gt;&lt;a href="http://perry4law.org/cecsrdi/?topic=central-monitoring-system-cms-for-telephone-tapping-in-india-2"&gt;telephone tapping laws in India are weak&lt;/a&gt;&lt;span&gt; and violate constitutional protections. The Information Technology Amendment Act 2008 has enabled e-surveillance to reach its zenith, but yet &lt;/span&gt;&lt;a href="http://perry4law.org/cecsrdi/?topic=central-monitoring-system-cms-for-telephone-tapping-in-india-2"&gt;surveillance projects, such as the CMS, lack adequate legal backing&lt;/a&gt;&lt;span&gt;. No privacy legislation currently exists in India which can protect us from potential abuse. The confirmed CMS hypothesis indicates that all individuals can potentially be targeted and monitored, regardless of whether they have been involved in illegal activity. Yet, India currently &lt;/span&gt;&lt;a href="http://perry4law.org/blog/?cat=9"&gt;lacks privacy laws&lt;/a&gt;&lt;span&gt; which can protect individuals from the infringement of their privacy and other human rights. The following questions in regards to the CMS remain vague: Who can authorise the interception of telecommunications and Internet communications? Who can authorise access to intercepted data? Who can have access to data? Can data monitored by the CMS be shared between third parties and if so, under what conditions? Is data monitored by the CMS retained and if so, for how long and under what conditions? Do individuals have the right to be informed about their communications being monitored and about data retained about them?&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Immense vagueness revolves around the CMS, yet the project is due to start operating this month. In order to ensure that our right to privacy and other human rights are not breached, &lt;/span&gt;&lt;a href="http://perry4law.org/cecsrdi/?topic=central-monitoring-system-cms-for-telephone-tapping-in-india-2"&gt;parliamentary oversight of intelligence agencies in India&lt;/a&gt;&lt;span&gt; is a minimal prerequisite. E-surveillance regulations should be enacted, which would cover both policy and legal issues pertaining to the CMS project and which would ensure that human rights are not infringed. The overall function of the CMS project and its use of data collected should be thoroughly examined on a legal and policy level prior to its operation, as its current vagueness and excessive control over communications can create a potential for unprecedented abuse.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt; &lt;/span&gt;&lt;span&gt;The necessity and utility of the CMS remain unclear and thus it has not been adequately proven yet that the security trade-off is worth it. One thing, though, is clear: we are giving up a lot of our data....we are giving up the control of our lives...with the hope that crime and terrorism will be reduced. Does this make sense?&lt;/span&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;a class="external-link" href="http://www.medianama.com/2013/04/223-indian-government-plans-digital-central-monitoring-system-cis-india/"&gt;This was cross-posted in Medianama&lt;/a&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;hr /&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system'&gt;https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>maria</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-12-06T09:39:20Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/indian-express-april-6-2013-nishant-shah-off-the-record">
    <title>Off the Record</title>
    <link>https://cis-india.org/internet-governance/blog/indian-express-april-6-2013-nishant-shah-off-the-record</link>
    <description>
        &lt;b&gt;Social networks track our world but not relationships. We live in a world where things happen. And yet, with the presence of digital objects, the things that happen have increased in intensity and volume.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Nishant Shah's &lt;a class="external-link" href="http://www.indianexpress.com/news/off-the-record/1097765/0"&gt;article was published &lt;/a&gt;in the Indian Express on April 6, 2013.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Never before have we lived in a world that is so seen,documented,  archived and forgotten. Early Enlightenment philosophers had wondered,  if a tree falls in loneliness and there is nobody there to see it, does  the tree really fall? In the world of instant documentation, chances are  that if the tree falls, there is somebody there to tweet it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We live in a spectacular world. That is not to say that it is the best  or worst of all possible. I want to ponder on the fact that we create  spectacles of things that were otherwise swept under the carpet. Every  little detail of our myriad and mundane life is potentially spectacular.  From medical technologies that can decipher our chemical DNA to the  mobile phone that Instagrams the food we eat and things that we see, we  are surrounded by spectacles of everyday life. Pictures, tweets, blogs,  geolocation services, status updates, likes, shares — the texture of  living has never been this richly and overwhelmingly documented.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, the data and information that constitutes the recognition of  our life, have increased to such a scale that we have overturned the  course of human history writing. We identify ourselves as a species that  is able to document, store and relay information from one passing  generation to another. So much so that we have invested a vast amount of  our energies in creating museums, writing histories, building archives,  and obsessively collecting facts and fictions of our origins, from the  big bang to flying reptiles.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But big data has made us reach a point where we are trying to manage,  filter the onslaught of data. We have, for the first time, created  information that is no longer intelligible to the human eye or brain.  From machines that can verify god particles to artificial intelligence  which can identify patterns every day we have replaced the human being  from its central position as consumer, producer and subject of data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These are conditions of living in information societies that are  producing, archiving and reorganising information for these information  ecosystems. The multiple information streams remind us of the multitude  and diversity of human life which cannot be reduced to a generalising  theory of similarity. The rise of big data brings to focus the promise  of the World Wide Web — a reminder that there are alternatives to the  mainstream and that there are unheard, contradictory voices that deserve  to be heard. Yet, even as the burgeoning information society explodes  on our devices, there is another anxiety which we need to encounter. If  the world of information, which was once supposed to be the alternative,  becomes the central and dominant mode of viewing the world, what does  it hide?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Take friendship, for instance.You can quantify how many friends exist on  your social networks. Algorithms can work out complex proximity  principles and determine who your closer connections are.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Data mining tools are able to figure out the similarities and likelihood  of enduring conversations in your social sphere. But these are all  human actions which can be captured by the network and the big data  realities. They may be able to give us new information about what  friends do and how often, but there is still almost no way of figuring  out, which friend might call you in the middle of the night.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Friendship, like many other things, is not made of spectacles. It does  not produce information sets which can be mapped and represented as  information. Friendship cannot be reduced to pictures of being together  or dramatic stories of survival and togetherness. More often than not,  true friendships are made of things that do not happen. Or things, if  they happen, cannot be put in a tweet, captured on Instagram or shared  on Tumblr.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As we take these social networked realities as 'real' realities, it  might be worth asking what is being missed out, what remains unheard and  unrepresented in these information streams. Because if you love  somebody and there is nobody to know it, report it, record it and  convert it into a spectacle, does it make your love any less special?  Any less intense? Any less true?&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/indian-express-april-6-2013-nishant-shah-off-the-record'&gt;https://cis-india.org/internet-governance/blog/indian-express-april-6-2013-nishant-shah-off-the-record&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-04-26T05:58:47Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/privacy-round-table-in-bangalore">
    <title>A Privacy Round Table in Bangalore</title>
    <link>https://cis-india.org/internet-governance/events/privacy-round-table-in-bangalore</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society, Data Security Council of India  and the Federation of Indian Chambers of Commerce and Industry cordially invite you to a "Privacy Round Table" at Jayamahal Palace in Jayamahal Road, Bangalore on Saturday, April 20, 2013, 10.30 a.m. to 4.00 p.m.&lt;/b&gt;
        &lt;hr /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;Report of the Group of Experts on Privacy&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy-protection-bill-2013.pdf" class="external-link"&gt;The Privacy Protection Bill, 2013&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/strengthening-privacy-protection.pdf" class="internal-link"&gt;Strengthening Privacy Protection through Co-Regulation&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy-roundtable-bangalore" class="internal-link"&gt;Invitation for the Privacy Roundtable&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;To discuss, in furtherance of Internet Governance Initiatives and Dialogue in 2013, the "Report of the Group of Experts on Privacy" by the Justice AP Shah Committee, the text of the Citizens' Privacy (Protection) Bill 2013, drafted by the Centre for Internet and Society, and the paper "Strengthening Privacy Protection through Co-Regulation" by DSCI.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The discussions and recommendations from the meeting will be published  into a compilation, and presented at the Internet Governance meeting  planned for October 2013.&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Time&lt;/th&gt;&lt;th&gt;Detail&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;10.30 &lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Overview, explanation, and discussion: The Report of the Group of Experts on Privacy&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;11.30  &lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Overview, explanation, and discussion: Strengthening Privacy Protection through Co-regulation&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;12.15&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Tea&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;
&lt;p&gt;12.30&lt;/p&gt;
&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Overview, explanation, and discussion: The Citizens (Protection) Bill 2013&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;13.15&lt;/td&gt;
&lt;td&gt;Lunch&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;14.15  &lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;In depth discussions: The Citizens’ Privacy (Protection) Bill 2013 &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;16.15&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;Tea&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2&gt;Confirmations and RSVP&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Please send your email confirmations for attending the Bangalore Privacy Roundtable on &lt;b&gt;April 20, 2013&lt;/b&gt;, to &lt;b&gt;Snehashish Ghosh&lt;/b&gt; at &lt;a class="mail-link" href="mailto:snehashish@cis-india.org"&gt;snehashish@cis-india.org&lt;/a&gt;, mobile no. +91- 9902763325,latest by end-of-business 5:30 p.m. on Monday &lt;b&gt;April 15, 2013&lt;/b&gt;. As the conference is a roundtable dialogue, we request that attendees  submit a brief introduction about themselves and their interest in the  topic.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/privacy-round-table-in-bangalore'&gt;https://cis-india.org/internet-governance/events/privacy-round-table-in-bangalore&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-04-17T06:55:52Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/the-hindu-april-1-2013-prashant-jha-clarify-and-define-terms-in-it-rules-panel-tells-govt">
    <title>Clarify and define terms in IT rules, panel tells govt.</title>
    <link>https://cis-india.org/news/the-hindu-april-1-2013-prashant-jha-clarify-and-define-terms-in-it-rules-panel-tells-govt</link>
    <description>
        &lt;b&gt;In the wake of concerns that the government is increasingly using ambiguously-phrased terms in legal codes to crack down on online speech, the Parliament’s Committee on Subordinate Legislation has asked for greater clarity and definition on terms which can serve as grounds for restrictions. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;The article by Prashant Jha was &lt;a class="external-link" href="http://www.thehindu.com/news/national/parliamentary-panel-seeks-clarity-in-it-rules/article4570291.ece"&gt;published in the Hindu&lt;/a&gt; on April 1, 2013. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;In 2011, the government issued Intermediary Guidelines under Section 79  of the Information Technology (IT) Act. Rule 3 requires intermediaries –  including Internet Service Providers (ISPs), web hosts, cyber cafes,  blogging platforms, search engines and others – to inform users not to  ‘host, display, upload, modify, publish, transmit or share information’  that is ‘grossly harmful, harassing, blasphemous, defamatory, obscene,  pornographic, paedophilic, libellous, invasive of another’s privacy,  hateful, or racially, ethnically objectionable, disparaging, or  otherwise unlawful in any manner whatsoever.’ Any person aggrieved by  the content can ask intermediaries to take it down, and if they do not  do so within 36 hours, they can be legally liable.&lt;/p&gt;
&lt;p&gt;‘&lt;b&gt;Remove ambiguities’&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The committee has heeded the views of NGOs that these terms have not been defined either in the IT Act or the rules. In a report submitted on March 21, it has drawn the attention of the Ministry of Communication and IT to the ‘reported misuse’ of Section 66A of the IT Act in the absence of precise definitions, and said it was important to remove ‘ambiguities/misgivings in the minds of people.’&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In its report, the committee, chaired by MP P. Karunakaran, suggested that the definition of those terms in other laws be incorporated in one place for the ‘convenience of reference’ of intermediaries and general public. It has added that those terms not mentioned in other laws be defined in a way that ‘no new category of crimes or offences is created in the process of delegated legislation.’ The committee said it expected the Ministry to have a fresh look at the guidelines and ‘make amendments to ensure there is no ambiguity.’&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Highlighting the significance of the committee’s directive not to create new offences, Pranesh Prakash of the Centre for Internet and Society said that this was recognition that ‘many categories of speech prohibited by the Intermediary Guidelines Rules are not prohibited by the statute, and hence cannot be prohibited by the government through these rules.’&lt;/p&gt;
&lt;p&gt;‘&lt;b&gt;Conflicting picture’&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The committee has also pointed out that there was a ‘conflicting picture’ regarding the ‘legal enforceability’ of these guidelines. In its response, the Ministry told the committee that these are of ‘advisory’ nature; it is not ‘mandatory’ for the intermediary to disable information and this does not amount to ‘censorship.’ But the rules state the intermediary ‘shall act’ within 36 hours of complaint.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The committee said there was a need for ‘clarity on the aforesaid contradictions,’ particularly on the process of ‘take down of content,’ and install ‘safeguards to protect against any abuse during such process.’&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. Prakash of CIS said that this had exposed the ‘government’s Janus-faced stance on the issue of mandatory nature of these rules.’&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/the-hindu-april-1-2013-prashant-jha-clarify-and-define-terms-in-it-rules-panel-tells-govt'&gt;https://cis-india.org/news/the-hindu-april-1-2013-prashant-jha-clarify-and-define-terms-in-it-rules-panel-tells-govt&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-04-03T10:02:33Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/comments-on-it-electronic-service-delivery-rules-2011">
    <title>Comments on the Information Technology (Electronic Service Delivery) Rules, 2011</title>
    <link>https://cis-india.org/internet-governance/blog/comments-on-it-electronic-service-delivery-rules-2011</link>
    <description>
        &lt;b&gt;Bhairav Acharya on behalf of the Centre for Internet and Society prepared the following comments on the Information Technology (Electronic Services Delivery) Rules, 2011. These were submitted to the Committee on Subordinate Legislation of the 15th Lok Sabha. These were submitted to the Committee on Subordinate Legislation of the 15th Lok Sabha. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;&lt;i&gt;This research was undertaken as part of the 'SAFEGUARDS' project that CIS is undertaking with Privacy International and IDRC&lt;/i&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;I &lt;span&gt;&lt;span&gt;Preliminary&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1.1  This submission presents comments from the Centre for Internet and Society (&lt;b&gt;“CIS”&lt;/b&gt;) on the Information Technology (Electronic Service Delivery) Rules, 2011 that were notified by the Central Government in the Gazette of India vide Notification GSR 316(E) on 11 April 2011 (&lt;b&gt;“ESD Rules”&lt;/b&gt; or &lt;b&gt;“Rules”&lt;/b&gt;).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1.2  The ESD Rules were notified only eight months before the Electronic Delivery of Services Bill, 2011 was tabled in the Lok Sabha on 27 December 2011 (Bill 137 of 2011) (&lt;b&gt;“EDS Bill” &lt;/b&gt;or&lt;b&gt; “Bill”&lt;/b&gt;). Both the ESD Rules and the EDS Bill are concerned with enabling computer-based electronic delivery of government services to Indian citizens (&lt;b&gt;“electronic service delivery”&lt;/b&gt;). Both the Rules and the Bill originate from the same government department: the Department of Electronics and Information Technology of the Ministry of Communications and Information Technology. Since the EDS Bill seeks to enact a comprehensive legislative framework for mandating and enforcing electronic service delivery, the purpose of the ESD Rules are called into question.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;II &lt;span&gt;&lt;span&gt;Basic Issues Regarding Electronic Service Delivery&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2.1  CIS believes that there are significant conceptual issues regarding electronic service delivery that demand attention. The Department-related Parliamentary Standing Committee on Information Technology of the Fifteenth Lok Sabha (&lt;b&gt;“Standing Committee”&lt;/b&gt;) raised a few concerns when it submitted its 37th Report on the EDS Bill on 29 August 2012. There is a clear need for a national debate on the manner of effecting exclusive electronic service delivery to the exclusion of manual service delivery. Some of these issues are briefly summarised as follows:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) Mandatory exclusive electronic service delivery pre-supposes the ability of all Indian citizens to easily access such mechanisms. While there are no authoritative national statistics on familiarity with computer-related technologies, it is apparent that a large majority of Indians, most of whom are likely to be already marginalised and vulnerable, are totally unfamiliar with such technologies to endanger their ability to receive basic government services;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b)  Consequent upon mandatory exclusive electronic service delivery for basic government services, a large group of ‘middlemen’ will arise to facilitate access for that majority of Indians who cannot otherwise access these services. This group will control the interface between citizens and their government. As a result, citizens’ access to governance will deteriorate. This problem may be mitigated to a certain extent by creating a new class of public servants to solely facilitate access to electronic service delivery mechanisms;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(c) The issue of governmental incapacity at the citizen-government interface might be addressed by contracting private service providers to operate mandatory exclusive electronic service delivery mechanisms. However, it is difficult to see how commercialising access to essential government services serves the public interest, especially when public funds will be expended to meet the costs of private service providers. Permitting private service providers to charge a fee from the general public to allow access to essential government services is also ill advised;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(d)  All electronic service delivery, whether mandatory to the exclusion of other service delivery mechanisms or offered simultaneously with manual service delivery, must be accompanied by strong data protection measures to ensure the sanctity of sensitive personal information shared online with the state. At present, there are no specific laws that bind the state, or its agents, to the stringent requirements of privacy necessary to protect personal liberties. In the same vein, strong data security measures are necessary to prevent sensitive personal information from being compromised or lost;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(e) All electronic service delivery, whether mandatory to the exclusion of other service delivery mechanisms or offered simultaneously with manual service delivery, must ensure ease and equality of accessibility. For this reason, electronic service delivery mechanisms should conform to the National Policy on Open Standards, 2010 (or the proposed National Electronic Access Policy which is currently awaiting adoption), the Interoperability Framework for E-Governance in India and the Website Guidelines of the National Informatics Centre;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(f) Electronic service delivery requires infrastructure which India does not currently have but can develop. Only 1.44 per cent of India’s population has access to a broadband internet connection&lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt; and current daily energy demand far exceeds supply. On the other hand, the number of broadband subscribers is increasing,&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt; the annual installed capacity for electricity generation is growing&lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt; and the literacy rate is increasing.&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2.2  The ESD Rules do not address any of the issues raised in the preceding paragraph. As a result, they cannot be seen to represent the result of a national consensus on the crucial question of mandating exclusive electronic service delivery and the means of enforcing such a scheme. Further, very few of the provisions of the Rules are binding; instead, the Rules appear to be drafted to serve as a minimal model for electronic service delivery. &lt;b&gt;In this background, CIS believes that the Rules should be treated as an incomplete arrangement that prescribe the minimal standards necessary to bind private service providers before comprehensive and statutory electronic service delivery legislation is enacted, perhaps in the form of the EDS Bill or otherwise. &lt;/b&gt;Therefore, without prejudice to the issues raised in the preceding paragraph, CIS offers the following comments on the provisions of the Rules while reserving the opportunity to make substantive submissions on electronic service delivery in general to an appropriate forum at a later date.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;III &lt;span&gt;Improper Exercise of Subordinate Legislative Power&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3.1  Rule 317 of the Rules of Procedure and Conduct of Business in the Lok Sabha (Fourteenth Edition, July 2010) (&lt;b&gt;“Rules of Procedure”&lt;/b&gt;), which empowers the Committee on Subordinate Legislation to scrutinise exercises of statutory delegation of legislative powers for impropriety, states:&lt;/p&gt;
&lt;p style="text-align: justify; padding-left: 30px; "&gt;&lt;i&gt;There shall be a Committee on Subordinate Legislation to scrutinize and report to the House whether the powers to make regulations, rules, subrules, bye-laws etc., conferred by the Constitution or delegated by Parliament are being properly exercised within such delegation.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Further, the Committee on Subordinate Legislation is specifically empowered by rule 320(vii) of the Rules of Procedure to examine any provision of the ESD Rules to consider “&lt;i&gt;whether it appears to make some unusual or unexpected use of the powers conferred by the Constitution or the Act pursuant to which it is made.&lt;/i&gt;”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3.2 Accordingly, the attention of the Committee on Subordinate Legislation is called to an improper exercise of delegated power under rule 3(1) of the ESD Rules, which states:&lt;/p&gt;
&lt;p style="padding-left: 30px; "&gt;&lt;i&gt;The appropriate Government may on its own or through an agency authorised by it, deliver public services through electronically- enabled kiosks or any other electronic service delivery mechanism.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;This sub-rule (1) empowers both the Central Government and State Governments to provide electronic service delivery on their own.&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3.3 The ESD Rules are made in exercise of delegated powers conferred under section 87(2)(ca) read with section 6-A(2) of the Information Technology Act, 2000 (&lt;b&gt;“IT Act”&lt;/b&gt;). Section 87(2)(ca) of the IT Act empowers the Central Government to make rules to provide for:&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;&lt;i&gt;the manner in which the authorised service provider may collect, retain and appropriate service charges under sub-section (2) of section 6-A.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;Section 6-A(2) of the IT Act states:&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;&lt;i&gt;The appropriate Government may also authorise any service provider authorised under sub-section (1) to collect, retain and appropriate such service charges, as may be prescribed by the appropriate Government for the purpose of providing such services, from the person availing such service.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Prima facie&lt;/i&gt;, the delegated powers under section 87(2)(ca) read with section 6-A(2) of the IT Act, in exercise of which the ESD Rules are made, only permit delegated legislation to regulate private service providers, &lt;span&gt;they do not permit the executive to exercise these powers to empower itself to conduct electronic service delivery on its own&lt;/span&gt;.&lt;b&gt; Therefore, to the extent that the ESD Rules authorise the Central Government and State Governments to provide electronic service delivery on their own, such authorisation constitutes an improper exercise of delegated power and is &lt;i&gt;ultra vires&lt;/i&gt; the IT Act.&lt;/b&gt; This may be resolved by deriving the delegated legislative competence of the ESD Rules from section 87(1) of the IT Act, instead of section 87(2)(ca) read with section 6-A(2).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;IV &lt;span&gt;Clause-by-Clause Comments&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Rule 2 - Definitions&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;4.1.1     Rule 2(c) of the ESD Rules states:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;"authorised agent" means an agent of the appropriate Government or service provider and includes an operator of an electronically enabled kiosk who is permitted under these rules to deliver public services to the users with the help of a computer resource or any communication device, by following the procedure specified in the rules&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In accordance with the argument regarding improper exercise of delegated power contained in paragraphs 3.1 – 3.3 of this submission, the appropriate Government cannot undertake electronic service delivery under these Rules. Consequently, the appropriate Government cannot appoint an agent to provide electronic service delivery on behalf, and under the control, of the appropriate Government since, as the principal, the appropriate Government would be responsible for the acts of its agents. Instead, private service providers may provide electronic service delivery as contractees of the appropriate Government who might enter into such contracts as a sovereign contractor. Therefore, only a private service provider may appoint an authorised agent under these Rules.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;4.1.2 Therefore, it is proposed that rule 2(c) is amended to read as follows:&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; padding-left: 30px; "&gt;““authorised agent” means an agent of a service provider, and includes an operator of an electronically enabled kiosk, who is permitted under these rules to deliver public services with the help of a computer resource or any communication device, by following the procedure specified in these rules”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Rule 3 - &lt;span&gt;System of Electronic Service Delivery&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;4.2.1    Rule 3(3) of the ESD Rules states:&lt;/p&gt;
&lt;p style="text-align: justify; padding-left: 30px; "&gt;&lt;i&gt;The appropriate Government may determine the manner of encrypting sensitive electronic records requiring confidentiality, white they are electronically signed.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This sub-rule is supposed to prescribe stringent standards to maintain the security, confidentiality and privacy of all personal information used during electronic service delivery transactions. In the absence of transactional security, electronic service delivery will invite fraud, theft and other misuse to impugn its viability as a means of delivering public services. However, the use of the term “&lt;i&gt;may&lt;/i&gt;” leaves the prescription of security standards up to the discretion of the appropriate Government. Further, the language of the sub-rule is unclear and imprecise.&lt;/p&gt;
&lt;p&gt;4.2.2    &lt;b&gt;Therefore, it is proposed that rule 3(3) is amended to read as follows:&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; padding-left: 30px; "&gt;“The appropriate Government shall, prior to any electronic service delivery, determine the manner of encrypting electronic records and shall prescribe standards for maintaining the safety, security, confidentiality and privacy of all information collected or used in the course of electronic service delivery.”&lt;/p&gt;
&lt;p&gt;4.3.1    Rule 3(5) of the ESD Rules states:&lt;/p&gt;
&lt;p style="text-align: justify; padding-left: 30px; "&gt;&lt;i&gt;The appropriate Government may allow receipt of payments made by adopting the Electronic Service Delivery System to be a deemed receipt of payment effected in compliance with the financial code and treasury code of such Government.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Firstly&lt;/span&gt;, if these Rules enable payments to be made electronically, they must also validate the receipt of these payments. Inviting citizens to make electronic payments for government services without recognising the receipt of those payments is farcical to attract abusive and corrupt practices. Therefore, it is imperative that these Rules compulsorily recognise receipt of payments, either by deeming their receipt to be valid receipts under existing law or by specially recognising their receipt by other means including the law of evidence. Either way, electronic receipts of electronic payments must be accorded the validity in law that manual/paper receipts have; and, copies of such electronic receipts must be capable of being adduced in evidence. &lt;span&gt;Secondly&lt;/span&gt;, the use of the phrase “&lt;i&gt;financial code and treasury code&lt;/i&gt;” is avoidable since these terms are undefined.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;4.3.2 Therefore, it is proposed that rule 3(5) be amended to read as follows:&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; padding-left: 30px; "&gt;“Any receipt of payment made by electronic service delivery shall be deemed to be a valid receipt of such payment under applicable law and shall be capable of being adduced as evidence of such payment.”&lt;/p&gt;
&lt;p&gt;4.4.1    Rule 3(6) of the ESD Rules states:&lt;/p&gt;
&lt;p style="text-align: justify; padding-left: 30px; "&gt;&lt;i&gt;The appropriate Government may authorise service providers or their authorised agents to collect, retain and appropriate such service charges as may be specified by the appropriate Government for the purpose of providing such services from the person availing such services: &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; padding-left: 30px; "&gt;&lt;i&gt;Provided that the apportioned service charges shall be clearly indicated on the receipt to be given to the person availing the services.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This sub-rule is an almost verbatim reproduction of the provisions of section 6-A(2) of the IT Act which reads as follows:&lt;/p&gt;
&lt;p style="text-align: justify; padding-left: 30px; "&gt;&lt;i&gt;The appropriate Government may also authorise any service provider authorised under sub-section (1) to collect, retain and appropriate such service charges, as may be prescribed by the appropriate Government for the purpose of providing such services, from the person availing such service.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Since the IT Act specifically delegates to the appropriate Governments the power to authorise service providers to levy charges, rule 3(6) of the ESD Rules that merely copies the provisions of the parent statute is meaningless. The purpose of delegated legislation is to give effect to the provisions of a statute by specifying the manner in which statutory provisions shall be implemented. Copying and pasting statutory provisions is a absurd misuse of delegated legislative powers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;4.4.2 Therefore, it is proposed that sub-rule (6) is deleted and the remaining sub-rules of rule 3 are renumbered.&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;4.5.1 Rule 3(7) of the ESD Rules states:&lt;/p&gt;
&lt;p style="text-align: justify; padding-left: 30px; "&gt;&lt;i&gt;The appropriate Government shall by notification specify the scale of service charges which may be charged and collected by the service providers and their authorised agents for various kinds of services.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;This is an almost verbatim reproduction of the provisions of section 6-A(4) of the IT Act which reads as follows:&lt;/p&gt;
&lt;p style="text-align: justify; padding-left: 30px; "&gt;&lt;i&gt;The appropriate Government shall, by notification in the Official Gazette, specify the scale of service charges which may be charged and collected by the service providers under this section.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As noted in paragraph 4.3.1 of this submission, the purpose of delegated legislation is not to copy the provisions of the parent statute, but to amplify the scope of the delegated power and the manner of effecting its implementation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;4.5.2  Therefore, it is proposed that sub-rule (7) is deleted and the remaining sub-rules of rule 3 are renumbered.&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;4.6.1 Rule 3(8) of the ESD Rules states:&lt;/p&gt;
&lt;p style="text-align: justify; padding-left: 30px; "&gt;&lt;i&gt;The appropriate Government may also determine the norms on service levels to be complied with by the Service Provider and the authorised agents.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There is no quarrel with the power of the government to determine norms for, or directly prescribe, service levels to regulate service providers. However, without a scheme of statutory or sub-statutory penalties for contravention of the prescribed service levels, a sub-delegated service level cannot enforce any penalties. Simply put, &lt;span&gt;the state cannot enforce penalties unless authorised by law&lt;/span&gt;. Unfortunately, rule 3(8) contains no such authorisation. Service levels for service providers without a regime of penalties for non-compliance is meaningless, especially since service providers will be engaged in providing access to essential government services.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;4.6.2  Therefore, it is proposed that rule 3(8) be amended to read as follows:&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; padding-left: 30px; "&gt;“The appropriate Government shall prescribe service levels to be complied with by all service providers and their authorised agents which shall include penalties for failure to comply with such service levels.”&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. Thirty-Seventh Report of the Standing Committee on Information Technology (2011-12) on the Electronic Delivery of Services Bill, 2011 (New Delhi: Lok Sabha Secretariat, 29 August 2012) at pp. 13, 17 and 34. See also, &lt;i&gt;Telecom Sector in India: A Decadal Profile&lt;/i&gt; (New Delhi: Telecom Regulatory Authority of India, 8 June 2012).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. Annual Report (2011-12) of the Department of Telecommunications, Ministry of Communications and Information Technology, Government of India (New Delhi: Department of Telecommunications, 2012) at pp. 5 and 1-3.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. Report of the Working Group on Power of the Twelfth Plan (New Delhi: Planning Commission, Government of India, January 2012).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. Provisional Report of the Census of India 2011 (New Delhi: Registrar General and Census Commissioner, 2011) from p. 124.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/comments-on-it-electronic-service-delivery-rules-2011'&gt;https://cis-india.org/internet-governance/blog/comments-on-it-electronic-service-delivery-rules-2011&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bhairav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>SAFEGUARDS</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-12T12:12:16Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/wgig-8-stock-taking-mapping-and-going-forward">
    <title>WGIG+8: Stock-Taking, Mapping, and Going Forward</title>
    <link>https://cis-india.org/internet-governance/blog/wgig-8-stock-taking-mapping-and-going-forward</link>
    <description>
        &lt;b&gt;On February 27, 2013, the Centre for Internet and Society conducted a workshop on the Working Group on Internet Governance report, titled "WGIG+8: Stock-Taking, Mapping, and Going Forward" at the World Summit on the Information Society (WSIS) + 10 meeting at Fontenoy Building, conference room # 7, UNESCO Headquarters, Paris from 9.30 a.m. to 11.00 a.m.  &lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;Details of the event were published on the &lt;a class="external-link" href="http://www.unesco-ci.org/cmscore/es/node/111"&gt;UNESCO website&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;h2 style="text-align: justify; "&gt;Session Personnel&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Pranesh Prakash was the moderator for the session. There were about 10-15 participants along with 5 remote participants.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There were four speakers:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;William Drake&lt;/b&gt;,&lt;b&gt; &lt;/b&gt;International Fellow and Lecturer, Media Change &amp;amp; Innovation Division, IPMZ at the University of Zurich&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Carlos Afonso&lt;/b&gt;, Executive Director of the Núcleo de Pesquisas, Estudos e Formação (NUPEF) institute&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Avri Doria&lt;/b&gt;, Dotgay LLC, Association for Progressive Communications, International School for Internet Governance&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Désirée Miloshevic&lt;/b&gt;, International Affairs and Policy Adviser, Afilias&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Summary of the Discussion&lt;/h2&gt;
&lt;h3&gt;Speakers Summaries&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;William Drake:&lt;br /&gt;&lt;/b&gt;Mr. Drake argued that the WGIG process demonstrated the benefits of multistakeholder collaboration, and facilitated the WSIS negotiations, and the multistakeholder process that WGIG embodied promoted public engagement in the Internet governance debate.  The working definition of “Internet governance” that the WGIG came up with demystified the nature and scope of Internet governance.  One important outcome of the WGIG report was the proposal of the establishment of the Internet Governance Forum.  The WGIG began the holistic assessment of “horizontal issues,” including development, and made some broad but useful recommendations on key “vertical issues”.  And lastly, the WGIG offered four models for the oversight of core resources that helped to focus the global debate on the governance of the Internet’s core resources.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Carlos Afonso:&lt;br /&gt;&lt;/b&gt;Mr. Afonso commented on the issue of international interconnection costs, and pointed out that they continue to be complex and involve complicated cost accounting. Mr. Afonso then pointed out that the Number Resource Organization (NRO) and the Regional Internet Registries (RIRs) could be doing more in the context of IPv6, in the way of stimulating backbone operators to ensure IPv6 visibility of the networks below them — many are already IPv6-ready but upstream providers do not provide corresponding transit. He also drew attention to “enhanced cooperation” as an issue that had not been anticipated at the time of the report, but had since become an important issue; similarly, he identified social networking and (in response to a question) military uses of the Internet, etc., as other such issues.  He opined that the WGIG report needed to be elaborated upon in the present context.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Avri Doria:&lt;br /&gt;&lt;/b&gt;Ms. Doria argued that while the report was reluctantly accepted after having been first rejected by the governments, it has proven to be highly useful. She praised the report for its working definition of IG, as it is still being used, and because the report made a clear distinction between governments and the governance of the Internet. She then argued that the definition of roles and responsibilities of stakeholders is very loose in the WGIG report and that these definitions are something that needs further study as they do not take into account the full role and responsibilities of all stakeholders. She also argued that the National Telecommunications and Information Administration is transferring some of its oversight powers over technical governance of the domain name system, to multistakeholder processes as can be seen from the “Affirmation of Commitments” which has replaced the earlier “Memorandum of Understanding” it had with ICANN."  She argued that the Affirmation of Commitment based review teams are an important experiment that should be followed with interest.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Désirée Miloshevic: &lt;/b&gt;&lt;br /&gt;Ms. Miloshevic pointed out that outside the meta issue of keeping the Internet open for innovation, issues relating to freedom of speech and human rights were the most important challenges facing Internet governance today. She highlighted that several issues, such as economic benefits, consumer protection, freedom to connect and education are issues that have either not been addressed or have been addressed inadequately in the report. She then went on to argue that the IGF, which is an outcome of the WGIG report has had a tangible impact on IG, particularly on clarifying IG as a multi-stakeholder process rather than describing mere institutional regulation models. For example, the IGF allows for newly identified public policy issues to continue to feature as topics in the IGF as emerging issues, such as open data, etc.  Ms. Miloshevic also emphasised the need for stakeholders to increase the development of capacity in dealing with IG issues at the global level.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Summary of General Discussion&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Overall, it was agreed by all panelists that the WGIG 2005 report and the WSIS process have had a large impact on Internet Governance (IG), particularly in terms of an increase in public awareness and participation in IG as well as in framing of IG as involving multiple stakeholders and not just governments. This has in turn led to a shifting of power equations as well as an increase in openness and transparency. The report has helped create the distinction between governments and governance of the Internet, and framed, through the working definition of IG that was later incorporated in the WSIS Tunis Agenda, the  non-technical aspects of IG as a core part of IG. Further, the identification and mapping of issues associated with IG and the generation of institutional governance models were important outcomes of the report.  The report was also seen as instrumental in the creation of the Internet Governance Forum (IGF).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Panellists also noted the changed context and the progress (and in many cases, lack of progress) since the WGIG report. Issues were raised around the lack of progress in implementing the specific recommendations made by the report. Inadequate capacity-building of actors in the global South, and efforts of the Number Resource Organization (NRO) and the Regional Internet Registries (RIRs) with respect to IPv6 were used as examples. It was also pointed out that a number of concerns have materialized that had not been anticipated at the time of the report, including 'enhanced cooperation', the emergence of social networking, and military uses of the Internet.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Moderator's summary&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The WGIG and its report, the background report and the book that followed from that report, have proven to be crucial in defining the formulation and direction of Internet governance for the past 8 years, and have resulted in a multi-stakeholder governance model for the Internet and the IGF, and have set many norms that have shifted power equations. However, many significant issues that weren't central to Internet governance during the formulation of the WGIG report have since emerged, the majority of the recommendations made in the WGIG report haven't seen much progress, the capacity of actors in the global South to engage in IG issues has not increased greatly, and the IGF needs to gain greater credibility and centrality. Transnational private corporations are emerging as increasingly powerful actors in Internet governance and are slowly shifting the balance, a development that was unforeseen in 2005 when governments were seen as the most powerful actors.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Any agreed recommendations from the session&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The panelists recommended the production of an analytical report that would explore the current status of the issues and recommendations laid in the original report issues as well as identify any new concerns that have arisen since 2005. An important aspect of this report would be an emphasis on the benefits of the IGF and the role of the WGIG process and report in underscoring the significance of multi-stakeholder processes. Further recommendations included the continued advancement of Internet rights and principles and enhanced cooperation, as these are two focus areas that have emerged since the WGIG report, and the strengthening of the IGF.&lt;/p&gt;
&lt;ul&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/wgig-8-stock-taking-mapping-and-going-forward'&gt;https://cis-india.org/internet-governance/blog/wgig-8-stock-taking-mapping-and-going-forward&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-04-04T06:49:31Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/comments-on-the-it-reasonable-security-practices-and-procedures-and-sensitive-personal-data-or-information-rules-2011">
    <title>Comments on the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011</title>
    <link>https://cis-india.org/internet-governance/blog/comments-on-the-it-reasonable-security-practices-and-procedures-and-sensitive-personal-data-or-information-rules-2011</link>
    <description>
        &lt;b&gt;Bhairav Acharya on behalf of the Centre for Internet and Society prepared the following comments on the Sensitive Personal Data Rules. These were submitted to the Committee on Subordinate Legislation of the 15th Lok Sabha.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;&lt;i&gt;This research was undertaken as part of the 'SAFEGUARDS' project that CIS is undertaking with Privacy International and IDRC&lt;/i&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;b&gt;I &lt;span&gt;&lt;span&gt;Preliminary&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1.1  The Centre for Internet and Society (&lt;b&gt;“CIS”&lt;/b&gt;) is pleased to present this submission on the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011 that were notified by the Central Government in the Gazette of India vide Notification GSR 313(E) on 11 April 2011 (&lt;b&gt;“Sensitive Personal Data Rules” or “Rules”&lt;/b&gt;) to the Committee on Subordinate Legislation of the Fifteenth Lok Sabha.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1.2 The protection of personal information lies at the heart of the right to privacy; and, for this reason, it is an imperative legislative and policy concern in liberal democracies around the world. In India, although remedies for invasions of privacy exist in tort law and despite the Supreme Court of India according limited constitutional recognition to the right to privacy&lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt;, there have never been codified provisions protecting the privacy of individuals and their personal information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Sensitive Personal Data Rules represent India’s first legislative attempt to recognise that all persons have a right to protect the privacy of their personal information. However, the Rules suffer from numerous conceptual, substantive and procedural weaknesses, including drafting defects, which demand scrutiny and rectification. The interpretation and applicability of the Rules was further confused when, on 24 August 2011, the Department of Information Technology of the Ministry of Communications attempted to reinterpret the Rules through a press release oblivious to the universally accepted basic proposition that law cannot be made or reinterpreted via press releases.&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt; Therefore, the attention of the Committee on Subordinate Legislation of the Fifteenth Lok Sabha is called to the following submissions:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;II &lt;span&gt;Principles to Facilitate Appraisal&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;2.1  The Sensitive Personal Data Rules are an important step towards building a legal regime that protects the privacy of individuals whilst enabling the secure collection, use and storage of personal information by state and private entities. The Rules are to be welcomed in principle. However, at present, the Rules construct an incomplete regime that does not adequately protect privacy and, for this reason, falls short of internationally accepted data protection standards.&lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This not only harms the personal liberties of Indian citizens, it also affects the ability of Indian companies to conduct commerce in foreign countries. More importantly, the Rules offer no protection against the state.&lt;/p&gt;
&lt;p&gt;2.2  To enact a comprehensive personal information protection regime, CIS believes that the Rules should proceed on the basis of the following broad principles:&lt;/p&gt;
&lt;p&gt;(a)   &lt;span&gt;Principle of Notice / Prior Knowledge&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;All persons from whom personal information is collected have a right to know, before the personal information is collected and, where applicable, at any point thereafter: (i) of an impending collection of personal information; (ii) the content and nature of the personal information being collected; (iii) the purpose for which the personal information is being collected; (iv) the broad identities of all natural and juristic persons who will have access to the collected personal information; (v) the manner in which the collected personal information will be used; (vi) the duration for which the collected personal information will be stored; (vii) whether the collected personal information will be disclosed to third parties including the police and other law enforcement agencies; (viii) of the manner in which they may access, check, modify or withdraw their collected personal information; (ix) the security practices and safeguards that will govern the sanctity of the collected personal information; (x) of all privacy policies and other policies in relation to the collected personal information; (xi) of any breaches in the security, safety, privacy and sanctity of the collected personal information; and, (xii) the procedure for recourse, including identities and contact details of ombudsmen and grievance redress officers, in relation to any misuse of the collected personal information.&lt;/p&gt;
&lt;p&gt;(b)    &lt;span&gt;Principle of Consent&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Personal information must only be collected once the person to whom it pertains has consented to its collection. Such consent must be informed, explicit and freely given. Informed consent is conditional upon the fulfilment of the principle of notice/prior knowledge set out in the preceding paragraph. Consent must be expressly given: the person to whom the personal information to be collected pertains must grant explicit and affirmative permission to collect personal information; and, he must know, or be made aware, of any action of his that will constitute such consent. Consent that is obtained using threats or coercion, such as a threat of refusal to provide services, does not constitute valid consent. Any person whose personal information has been consensually collected may, at any time, withdraw such consent for any or no reason and, consequently, his personal information, including his identity, must be destroyed. When consent is withdrawn in this manner, the person who withdrew consent may be denied any service that requires the use of the personal information for which consent was withdrawn.&lt;/p&gt;
&lt;p&gt;(c)  &lt;span&gt;Principle of Necessity / Collection Limitation&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Personal information must only be collected when, where and to the extent necessary. Necessity cannot be established in general; there must be a specific nexus connecting the content of the personal information to the purpose of its collection. Only the minimal amount of personal information necessary to achieve the purpose should be collected. If a purpose exists that warrants a temporally specific, or an event-dependent, collection of personal information, such a collection must only take place when that specific time is reached or that event occurs. If the purpose of personal information is dependent upon, or specific to, a geographical area or location, that personal information must only be collected from that geographical area or location.&lt;/p&gt;
&lt;p&gt;(d)  &lt;span&gt;Right to be Forgotten / Principle of Purpose Limitation&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Once collected, personal information must be processed, used, stored or otherwise only for the purpose for which it was collected. If the purpose for which personal information was collected is achieved, the collected personal information must be destroyed and the person to whom that personal information pertained must be ‘forgotten.’ Similarly, collected personal information must be destroyed and the person to whom it pertained ‘forgotten’ if the purpose for which it was collected expires or ceases to exist. Personal information collected for a certain purpose cannot be used or stored for another purpose nor even used or stored for a similar purpose to arise in the future without the express and informed consent of the person from whom it was collected in accordance with the principles of notice/prior knowledge and consent.&lt;/p&gt;
&lt;p&gt;(e)    &lt;span&gt;Right of Access&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;All persons from whom personal information is collected have a right to access that personal information at any point following its collection to check its accuracy, make corrections or modifications and have destroyed that which is inaccurate. Where personal information of more than one person is held in an aggregated form such that affording one person access to it may endanger the right to privacy of another person, the entity holding the aggregated personal information must, to the best of its ability, identify the portion of the personal information that pertains to the person seeking access and make it available to him. All persons from whom personal information is collected must be given copies of their personal information upon request.&lt;/p&gt;
&lt;p&gt;(f)   &lt;span&gt;Principle­ regarding Disclosure&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Personal information, once collected, must never be disclosed. However, if the person to whom certain personal information pertains consents to its disclosure in accordance with the principle of consent after he has been made aware of the proposed disclosee and other details related to the personal information in accordance with the principle of notice/prior knowledge, the personal information may be disclosed. Consent to a disclosure of this nature may be obtained even during collection of the personal information if the person to whom it pertains expressly consents to its future disclosure. Notwithstanding the rule against disclosure and the consent exception to the rule, personal information may be disclosed to the police or other law enforcement agencies on certain absolute conditions. Since the protection of personal information is a policy imperative, the conditions permitting its disclosure must be founded on a clear and serious law enforcement need that overrides the right to privacy; and, in addition, the disclosure conditions must be strict, construed narrowly and, in the event of ambiguity, interpreted to favour the individual right to privacy. Therefore, (i) there must be a demonstrable need to access personal information in connection with a criminal offence; (ii) only that amount of personal information that is sufficient to satisfy the need must be disclosed; and, (iii), since such a disclosure is non-consensual, it must follow a minimal due process regime that at least immediately notifies the person concerned and affords him the right to protest the disclosure.&lt;/p&gt;
&lt;p&gt;(g)  &lt;span&gt;Principle of Security&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;All personal information must be protected to absolutely maintain its sanctity, confidentiality and privacy by implementing safeguards against loss, unauthorised access, destruction, use, processing, storage, modification, de-anonymisation, unauthorised disclosure and other risks. Such a level of protection must include physical, administrative and technical safeguards that are constantly and consistently audited. Protection measures must be revised to incorporate stronger measures and mechanisms as and when they arise.&lt;/p&gt;
&lt;p&gt;(h) &lt;span&gt;Principle of Transparency / ‘Open-ness’&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;All practices, procedures and policies governing personal information must be made available to the person to whom that personal information pertains in a simple and easy-to-understand manner. This includes policies relating to the privacy, security and disclosure of that personal information. If an entity that seeks to collect personal information does not have these policies, it must immediately draft, publish and display such policies in addition to making them available to the person from whom it seeks to collect personal information before the collection can begin.&lt;/p&gt;
&lt;p&gt;(i)  &lt;span&gt;Principle of Accountability&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Liability attaches to the possession of personal information of another person. Since rights and duties, such as those in relation to privacy of personal information, are predicated on accountability, this principle binds all entities that seek to possess personal information of another person. As a result, an entity seeking to collect, use, process, store or disclose personal information of another person is accountable to that person for complying with all these principles as well as the provisions of any law. The misuse of personal information causes harm to the person to whom it pertains to attract and civil and criminal penalties.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2.3 These principles are reflective of internationally accepted best practices to form the basis upon which Indian legislation to protect personal information should be drafted. The Sensitive Personal Data Rules, in their current form, fall far short of the achieving the substantive intent of these principles. &lt;b&gt;CIS submits that either (i) the Sensitive Personal Data Rules should be replaced with new and comprehensive legislation that speaks to the objectives and purpose of these principles, or (ii) the Sensitive Personal Data Rules are radically modified by amendment to bring Indian law to par with world standards.&lt;/b&gt; Nevertheless, without prejudice to the preceding submission, CIS offers the following clause-by-clause comments on the Sensitive Personal Data Rules:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;III &lt;span&gt;&lt;span&gt;Clause-by-Clause Analysis and Comments&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;span&gt;Rule 2 - Definitions&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;3.1.1    Rule 2(1)(b) of the Sensitive Personal Data Rules defines “biometrics” as follows:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;"Biometrics" means the technologies that measure and analyse human body characteristics, such as 'fingerprints', 'eye retinas and irises', 'voice patterns', "facial patterns', 'hand measurements' and 'DNA' for authentication purposes.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3.1.2   &lt;span&gt;Firstly&lt;/span&gt;, the Sensitive Personal Data Rules do not use the term “biometrics.” Instead, rule 3(vi), which defines sensitive personal data, uses the term “biometric information.” It is unclear why rule 2(1)(b) provides a definition of the technologies by which information is obtained instead of clearly identify the information that constitutes sensitive personal data. This is one of several examples of poor drafting of the Sensitive Personal Data Rules. &lt;span&gt;Secondly&lt;/span&gt;, biometric information is not used only for authentication; there are many other reasons for collecting and using biometric information. For instance, DNA is widely collected and used for medical research. Restricting the application of the definition to only that biometric information that is used for authentication is illogical to deprive the Rules of meaning.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;3.1.3    Therefore, it is proposed that rule 2(1)(b) be re-drafted to read as follows:&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; padding-left: 30px; "&gt;““Biometric information” means any information relating to the physical, physiological or behavioural characteristics of an individual which enable their unique identification including, but not limited to, fingerprints, retinas, irises, voice patterns, facial patterns, Deoxyribonucleic acid (DNA) and genetic information.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3.2.1  Rule 2(1)(c) of the Sensitive Personal Data Rules defines “body corporate” in accordance with the definition provided in clause (i) of the Explanation to section 43A of the Information Technology Act, 2000 (&lt;b&gt;“IT Act”&lt;/b&gt;) as follows:&lt;/p&gt;
&lt;p style="text-align: justify; padding-left: 30px; "&gt;&lt;i&gt;“body corporate” means any company and includes a firm, sole proprietorship or other association of individuals engaged in commercial or professional activities.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3.2.2 &lt;span&gt;Firstly&lt;/span&gt;, this definition of a body corporate is poorly drafted to extend beyond incorporated entities to bring within its ambit even unincorporated professional organisations such as societies and associations which, by their very nature, are not bodies corporate.&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is an arbitrary reinterpretation of the fundamental principles of company law. As it presently stands, this peculiar definition will extend to public and private limited companies, including incorporated public sector undertakings, ordinary and limited liability partnerships, firms, sole proprietorships, societies and associations; but, &lt;span&gt;&lt;span&gt;will exclude public and private trusts&lt;/span&gt;&lt;/span&gt;&lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt; &lt;span&gt;and unincorporated public authorities&lt;/span&gt;. Hence, whereas non-governmental organisations that are organised as societies will fall within the definition of “body corporate,” those that are organised as trusts will not. Similarly, incorporated public authorities such as Delhi Transport Corporation and even municipal corporations such as the Municipal Corporation of Delhi will fall within the definition of “body corporate” but unincorporated public authorities such as the New Delhi Municipal Council and the Delhi Development Authority will not. This is a &lt;i&gt;prima facie&lt;/i&gt; violation of the fundamental right of all persons to be treated equally under the law guaranteed by Article 14 of the Constitution of India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3.2.3  &lt;span&gt;Secondly&lt;/span&gt;, whereas state entities and public authorities often collect and use sensitive personal data, with the exception of state corporations the Sensitive Personal Data Rules do not apply to the state. This means that the procedural safeguards offered by the Rules do not bind the police and other law enforcement agencies allowing them a virtually unfettered right to collect and use, even misuse, sensitive personal data without consequence. Further, state entities such as the Unique Identification Authority of India or the various State Housing Boards which collect, handle, process, use and store sensitive personal data are not covered by the Rules and remain unregulated. It is not possible to include these unincorporated entities within the definition of a body corporate; but, in pursuance of the principles set out in paragraph 2.2 of this submission, the Rules should be expanded to all state entities, whether incorporated or not.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;3.2.4  Therefore, it is proposed that rule 2(1)(c) be re-drafted to read as follows:&lt;/b&gt;&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;““body corporate” means the body corporate defined in sub-section (7) of section 2 read with section 3 of the Companies Act, 1956 (1 of 1956) and includes those entities which the Central Government may, by notification in the Official Gazette, specify in this behalf but shall not include societies registered under the Societies Registration Act, 1860 (21 of 1860), trusts created under the Indian Trusts Act, 1882 (2 of 1882) or any other association of individuals that is not a legal entity apart from the members constituting it and which does not enjoy perpetual succession.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Further, it is proposed that the Sensitive Personal Data Rules be re-drafted to apply to societies registered under the Societies Registration Act, 1860 and trusts created under the Indian Trusts Act, 1882 in a manner reflective of their distinctiveness from bodies corporate&lt;/b&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Furthermore, it is proposed that the Sensitive Personal Data Rules be re-drafted to apply to public authorities and the state as defined in Article 12 of the Constitution of India&lt;/b&gt;.&lt;/p&gt;
&lt;p&gt;3.3.1  Rule 2(1)(d) of the Sensitive Personal Data Rules defines “cyber incidents” as follows:&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;&lt;i&gt;"Cyber incidents" means any real or suspected adverse event in relation to cyber security that violates an explicitly or implicitly applicable security policy resulting in unauthorised access, denial of service or disruption, unauthorised use of a computer resource for processing or storage of information or changes to data, information without authorisation.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3.3.2  Before examining the provisions of this clause, CIS questions the need for this definition. The term “&lt;i&gt;cyber incidents&lt;/i&gt;” is used only once in these rules: the proviso to rule 6(1) which specifies the conditions upon which personal information or sensitive personal data may be disclosed to the police or other law enforcement authorities without the prior consent of the person to whom the information pertains. An analysis of rule 6(1) is contained at paragraphs 3.11.1 – 3.11.4 of this submission. &lt;span&gt;Firstly&lt;/span&gt;, personal information and sensitive personal data should only be disclosed in connection with the prevention, investigation and prosecution of an existing offence. Offences cannot be created in the definitions clause of sub-statutory rules, they can only be created by a parent statute or another statute. &lt;span&gt;Secondly&lt;/span&gt;, the scope and content of “cyber incidents” are already covered by section 43 of the IT Act. When read with section 66 of IT Act, an offence is created that is larger than the scope of the term “cyber incidents” to render this definition redundant.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;3.3.3   Therefore, it is proposed that the definition of “cyber incidents” in rule 2(1)(d) be deleted and the remaining clauses in sub-rule (1) of rule 2 be accordingly renumbered.&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3.4.1  Rule 2(1)(g) of the Sensitive Personal Data Rules defines “intermediary” in accordance with the definition provided in section 2(1)(w) of the IT Act. However, the term “intermediary” is not used anywhere in the Sensitive Personal Data Rules and so its definition is redundant. This is another instance of careless drafting of the Sensitive Personal Data Rules.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;3.4.2   Therefore, it is proposed that the definition of “intermediary” in rule 2(1)(g) be deleted and the remaining clauses in sub-rule (1) of rule 2 be accordingly renumbered.&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Rule 3 - Sensitive Personal Data&lt;/span&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;3.5.1    Rule 3 of the Sensitive Personal Data Rules provides an aggregated definition of sensitive personal data as follows:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Sensitive personal data or information of a person means such personal information which consists of information relating to – &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(i)   password; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(ii)  financial information such as Bank account or credit card or debit card or other payment instrument details ; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(iii) physical, physiological and mental health condition; &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(iv) sexual orientation; &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(v)  medical records and history; &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(vi) Biometric information; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(vii) any detail relating to the above clauses as provided to body corporate for providing service; and &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(viii) any of the information received under above clauses by body corporate for processing, stored or processed under lawful contract or otherwise: &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;provided that, any information that is freely available or accessible in public domain or furnished under the Right to Information Act, 2005 or any other law for the time being in force shall not be regarded as sensitive personal data or information for the purposes of these rules.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3.5.2    In accordance with the principle that certain kinds of personal information are particularly sensitive, due to the intimate nature of their content in relation to the right to privacy, to invite privileged protective measures regarding the collection, handling, processing, use and storage of such sensitive personal data, it is surprising that rule 3 does not protect electronic communication records of individuals. Emails and chat logs as well as records of internet activity such as online search histories are particularly vulnerable to abuse and misuse and should be accorded privileged protection.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;3.5.3    Therefore, it is proposed that rule 3 be re-drafted to read as follows:&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;“Sensitive personal data or information of a person means personal information as to that person’s –&lt;/p&gt;
&lt;p&gt;(i)  passwords and encryption keys;&lt;/p&gt;
&lt;p&gt;(ii)  financial information including, but not limited to, information relating to his bank accounts, credit cards, debit cards, negotiable instruments, debt and other payment details;&lt;/p&gt;
&lt;p&gt;(iii) physical, physiological and mental condition;&lt;/p&gt;
&lt;p&gt;(iv)  sexual activity and sexual orientation;&lt;/p&gt;
&lt;p&gt;(v)   medical records and history;&lt;/p&gt;
&lt;p&gt;(vi)  biometric information; and&lt;/p&gt;
&lt;p&gt;(vii) electronic communication records including, but not limited to, emails, chat logs and other communications made using a computer;&lt;/p&gt;
&lt;p&gt;and shall include any data or information related to the sensitive personal data or information set out in this rule that is provided to, or received by, a body corporate.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Provided that, any information that is freely available or accessible in the public domain or furnished under the Right to Information Act, 2005 or any other law for the time being in force shall not be regarded as sensitive personal data or information for the purposes of these rules.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Rule 4 - Privacy and Disclosure Policy&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;3.6.1    Rule 4 of the Sensitive Personal Data Rules, which obligates certain bodies corporate to publish privacy and disclosure policies for personal information, states:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;Body corporate to provide policy for privacy and disclosure of information. – &lt;/i&gt;&lt;/b&gt;&lt;i&gt;(1) The body corporate or any person who on behalf of body corporate collects, receives, possess, stores, deals or handle information of provider of information, shall provide a privacy policy for handling of or dealing in personal information including sensitive personal data or information and ensure that the same are available for view by such providers of information who has provided such information under lawful contract. Such policy shall be published on website of body corporate or any person on its behalf and shall provide for –&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(i)  Clear and easily accessible statements of its practices and policies; &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(ii) type of personal or sensitive personal data or information collected under rule 3; &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(iii) purpose of collection and usage of such information; &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(iv) disclosure of information including sensitive personal data or information as provided in rule 6; &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(v)  reasonable security practices and procedures as provided under rule 8. &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3.6.2  This rule is very badly drafted, contains several discrepancies and is legally imprecise. &lt;span&gt;Firstly&lt;/span&gt;, this rule is overbroad to bind all bodies corporate that receive and use information, as opposed to “personal information” or “sensitive personal data.” All bodies corporate receive and use information, even a vegetable seller uses information relating to vegetables and prices; but, not all bodies corporate receive and use personal information and even fewer bodies corporate receive and use sensitive personal data. The application of this provision should turn on the reception and use of personal information, which includes sensitive personal data, and not simply information. &lt;span&gt;Secondly&lt;/span&gt;, although this rule only applies when a provider of information provides information, the term “provider of information” is undefined. It may mean any single individual who gives his personal information to a body corporate, or it may even mean another entity that outsources or subcontracts work that involves the handling of personal information. This lack of clarity compromises the enforceability of this rule. The government’s press release of 24 August 2011 acknowledged this error but since it is impossible, not to mention unconstitutional, for a statutory instrument like these Rules to be amended, modified, interpreted or clarified by a press release, CIS is inclined to ignore the press release altogether. It is illogical that privacy policies not be required when personal information is directly given by a single individual. This rule should bind all bodies corporate that receive and use personal information irrespective of the source of the personal information. &lt;span&gt;Thirdly&lt;/span&gt;, it is unclear whether separate privacy policies are required for personal information and for sensitive personal data. There is a distinction between personal information and sensitive personal data and since these Sensitive Personal Data Rules deal with the protection of sensitive personal data, this rule 4 should unambiguously mandate the publishing of privacy policies in relation to sensitive personal data. Any additional requirement for personal information must be set out to clearly mark its difference from sensitive personal data. &lt;span&gt;Fourthly&lt;/span&gt;, because of sloppy drafting, the publishing duties of the body corporate in respect of any sensitive personal data are unclear. For example, the phrase “&lt;i&gt;personal or sensitive personal data or information&lt;/i&gt;” used in clause (ii) is meaningless since “personal information” and “sensitive personal data or information” are defined terms.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;3.6.3  Therefore, it is proposed that rule 3 be re-drafted to read as follows:&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“&lt;b&gt;Duty to publish certain policies. – &lt;/b&gt;(1) Any body corporate that collects, receives, possesses, stores, deals with or handles personal information or sensitive personal data from any source whatsoever shall, prior to collecting, receiving, possessing, storing, dealing with or handling such personal information or sensitive personal data, publish and prominently display the policies listed in sub-rule (2) in relation to such personal information and sensitive personal data.&lt;/p&gt;
&lt;p&gt;(2) In accordance with sub-rule (1) of this rule, all bodies corporate shall publish separate policies for personal information and sensitive personal data that clearly state –&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(i) the meanings of personal information and sensitive personal data in accordance with these rules;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(ii) the practices and policies of that body corporate in relation to personal information and sensitive personal data;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iii) descriptive details of the nature and type of personal information and sensitive personal data collected, received, possessed, stored or handled by that body corporate;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iv) the purpose for which such personal information and sensitive personal data is collected, received, possessed, stored or handled by that body corporate;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(v) the manner and conditions upon which such personal information and sensitive personal data may be disclosed in accordance with rule 6 of these rules; and&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(vi) the reasonable security practices and procedures governing such personal information and sensitive personal data in accordance with rule 8 of these rules.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Rule 5 - Collection of Information&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;3.7.1    Rule 5(1) of the Sensitive Personal Data Rules lays down the requirement of consent before personal information can be collected as follows:&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;&lt;i&gt;Body corporate or any person on its behalf shall obtain consent in writing through letter or Fax or email from the provider of the sensitive personal data or information regarding purpose of usage before collection of such information.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3.7.2 &lt;span&gt;Firstly&lt;/span&gt;, the principle and requirement of consent is of overriding importance when collecting personal information, which includes sensitive personal data. Pursuant to the principles laid down in paragraph 2.2 of this submission, consent must be informed, explicit and freely given. Since sub-rule (3) of rule 5 attempts to secure the informed consent of persons giving personal information, this sub-rule must establish that all personal information can only be collected upon explicit consent that is freely given, irrespective of the medium and manner in which it is given. &lt;span&gt;Secondly&lt;/span&gt;, it may be noted that sub-rule (1) only applies to sensitive personal data and not to other personal information that is not sensitive personal data. This is ill advised.  &lt;span&gt;Thirdly&lt;/span&gt;, this sub-rule relating to actual collection of personal information should follow a provision establishing the principle of necessity before collection can begin. The principle of necessity is currently laid down in sub-rule (2) of rule 5 which should be re-numbered to precede this sub-rule relating to collection.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;3.7.3   Therefore, it is proposed that rule 5(1) be re-numbered to sub-rule (2) of rule 5 and re-drafted to read as follows:&lt;/b&gt;&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;“A body corporate seeking to collect personal information or sensitive personal data of a person shall, prior to collecting that personal information or sensitive personal data, obtain the express and informed consent of that person in any manner, and through any medium, that may be convenient but shall not obtain such consent through threat, duress or coercion.”&lt;/p&gt;
&lt;p&gt;3.8.1    Rule 5(2) of the Sensitive Personal Data Rules sets out the principle of necessity governing the collection of personal information as follows:&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Body corporate or any person on its behalf shall not collect sensitive personal data or information unless — &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(a)  the information is collected for a lawful purpose connected with a function or activity of the body corporate or any person on its behalf; and &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(b) the collection of the sensitive personal data or information is considered necessary for that purpose.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3.8.2    &lt;span&gt;Firstly&lt;/span&gt;, before allowing a body corporate to collect personal information, which includes sensitive personal data, the law should strictly ensure that the collection of such personal information is necessary. Necessity cannot be established in general, there must be a nexus connecting the personal information to the purpose for which the personal information is sought to be collected. This important sub-rule sets out the principles upon which personal information can be collected; and, should therefore be the first sub-rule of rule 5. &lt;span&gt;Secondly&lt;/span&gt;, this sub-rule only applies to sensitive personal data instead of all personal information. It is in the public interest that the principle of necessity applies to all personal information, including sensitive personal data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3.8.3 &lt;b&gt;Therefore, it is proposed that rule 5(2) be re-numbered to sub-rule (1) of rule 5 and re-drafted to read as follows:&lt;/b&gt;&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;“No body corporate shall collect any personal information or sensitive personal data of a person unless it clearly establishes that –&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;(a) the personal information or sensitive personal data is collected for a lawful purpose that is directly connected to a function or activity of the body corporate; and&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;(b) the collection of the personal information or sensitive personal data is necessary to achieve that lawful purpose.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3.9.1 Rule 5(3) of the Sensitive Personal Data Rules attempts to create an informed consent regime for the collection of personal information as follows:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;While collecting information directly from the person concerned, the body corporate or any person on its behalf snail take such steps as are, in the circumstances, reasonable to ensure that the person concerned is having the knowledge of — &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(a)  the fact that the information is being collected; &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(b)  the purpose for which the information is being collected; &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(c)  the intended recipients of the information; and &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(d)  the name and address of — &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(i)   the agency that is collecting the information; and &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(ii)  the agency that will retain the information.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3.9.2   &lt;span&gt;Firstly&lt;/span&gt;, this sub-rule (3) betrays the carelessness of its drafters by bringing within its application any and all information collected by a body corporate from a person instead of only personal information or sensitive personal data. &lt;span&gt;Secondly&lt;/span&gt;, this provision is crucial to establishing a regime of informed consent before personal information is given by a person to a body corporate. For consent to be informed, the person giving consent must be made aware of not only the collection of that personal information or sensitive personal data, but also the purpose for which it is being collected, the manner in which it will be used, the intended recipients to whom it will be sent or made accessible, the duration for which it will be stored, the conditions upon which it may be disclosed, the conditions upon which it may be destroyed as well as the identities of all persons who will collect, receive, possess, store, deal with or handle that personal information or sensitive personal data. &lt;span&gt;Thirdly&lt;/span&gt;, the use of the phrase “&lt;i&gt;take such steps as are, in the circumstances, reasonable&lt;/i&gt;” dilutes the purpose of this provision and compromises the establishment of an informed consent regime. Instead, the use of the term “reasonable efforts”, which has an understood meaning in law, will suffice to protect individuals while giving bodies corporate sufficient latitude to conduct their business.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;3.9.3    Therefore, it is proposed that rule 5(3) be re-drafted to read as follows:&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;“A body corporate seeking to collect personal information or sensitive personal data of a person shall, prior to such collection, make reasonable efforts to inform that person of the following details in respect of his personal information or sensitive personal data –&lt;/p&gt;
&lt;p&gt;(a)  the fact that it is being collected;&lt;/p&gt;
&lt;p&gt;(b)  the purpose for which it is being collected;&lt;/p&gt;
&lt;p&gt;(c)  the manner in which it will be used;&lt;/p&gt;
&lt;p&gt;(d)  the intended recipients to whom it will be sent or made available;&lt;/p&gt;
&lt;p&gt;(e)  the duration for which it will be stored;&lt;/p&gt;
&lt;p&gt;(f)   the conditions upon which it may be disclosed;&lt;/p&gt;
&lt;p&gt;(g)  the conditions upon which it may be destroyed; and&lt;/p&gt;
&lt;p&gt;(h)  the identities of all persons and bodies corporate who will collect, receive, possess, store, deal with or handle it.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3.10.1  Rule 5(4) of the Sensitive Personal Data Rules lays down temporal restrictions to the retention of personal information:&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;&lt;i&gt;Body corporate or any person on its behalf holding sensitive personal data or information shall not retain that information for longer than is required for the purposes for which the information may lawfully be used or is otherwise required under any other law for the time being in force.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3.10.2  Since this sub-rule (4) only applies to sensitive personal data instead of all personal information, bodies corporate are permitted to hold personal information of persons that is not sensitive personal data for as long as they like even after the necessity that informed the collection of that personal information expires and the purpose for which it was collected ends. This is a dangerous provision that deprives the owners of personal information of the ability to control its possession to jeopardise their right to privacy. The Sensitive Personal Data Rules should prescribe a temporal limit to the storage of all personal information by bodies corporate.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;3.10.3  Therefore, it is proposed that rule 5(4) be re-drafted to read as follows:&lt;/b&gt;&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;“No body corporate shall store, retain or hold personal information or sensitive personal data for a period longer than is required to achieve the purpose for which that personal information or sensitive personal data was collected.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Rule 6 - Disclosure of Information&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3.11.1  Rule 6(1) of the Sensitive Personal Data Rules, which deals with the crucial issue of disclosure of personal information, states:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Disclosure of sensitive personal data or information by body corporate to any third party shall require prior permission from the provider of such information, who has provided such information under lawful contract or otherwise, unless such disclosure has been agreed to in the contract between the body corporate and provider of information, or where the disclosure is necessary for compliance of a legal obligation: &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Provided that the information shall be shared, without obtaining prior consent from provider of information, with Government agencies mandated under the law to obtain information including sensitive personal data or information for the purpose of verification of identity, or for prevention, detection, investigation including cyber incidents, prosecution, and punishment of offences. The Government agency shall send a request in writing to the body corporate possessing the sensitive personal data or information stating clearly the purpose of seeking such information. The Government agency shall also state that the information so obtained shall not be published or shared with any other person.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3.11.2  In addition to errors and discrepancies in drafting, this sub-rule contains wide and vague conditions of disclosure of sensitive personal data to gravely impair the privacy rights and personal liberties of persons to whom such sensitive personal data pertains. A summary of drafting errors and discrepancies follows: &lt;span&gt;Firstly&lt;/span&gt;, this sub-rule only applies to sensitive personal data instead of all personal information. The protection of personal information that is not sensitive personal data is an essential element of the right to privacy; hence, prohibiting bodies corporate from disclosing personal information at will is an important public interest prerogative. &lt;span&gt;Secondly&lt;/span&gt;, the use of the phrase “&lt;i&gt;any third party&lt;/i&gt;” lends vagueness to this provision since the term “third party” has not been defined. &lt;span&gt;Thirdly&lt;/span&gt;, the repeated use of the undefined phrase “&lt;i&gt;provider of information&lt;/i&gt;” throughout these Rules and in this sub-rule is confusing since, as pointed out in paragraph 3.6.2 of this submission, it could mean either or both of the single individual who consents to the collection of his personal information or another entity that transfers personal information to the body corporate.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3.11.3  Further, the conditions upon which bodies corporate may disclose personal information and sensitive personal data without the consent of the person to whom it pertains are dangerously wide. &lt;span&gt;Firstly&lt;/span&gt;, the disclosure of personal information and sensitive personal data when it is “&lt;i&gt;necessary for compliance of a legal obligation&lt;/i&gt;” is an extremely low protection standard. The law must intelligently specify the exact conditions upon which disclosure sans consent is possible; since the protection of personal information is a public interest priority, the conditions upon which it may be disclosed must outweigh this priority to be significant and serious enough to imperil the nation or endanger public interest. The disclosure of personal information and sensitive personal data for mere compliance of a legal obligation, such as failure to pay an electricity bill, is farcical. &lt;span&gt;Secondly&lt;/span&gt;, the proviso sets out the conditions upon which the state, through its law enforcement agencies, may access personal information and sensitive personal data without the consent of the person to whom it pertains. Empowering the police with access to personal information can serve a public good if, and only if, it results in the prevention or resolution of crime; if not, this provision will give the police carte blanche to misuse and abuse this privilege. Hence, personal information should only be disclosed for the prevention, investigation and prosecution of an existing criminal offence. &lt;span&gt;Thirdly&lt;/span&gt;, the definition and use of the term “&lt;i&gt;cyber incidents&lt;/i&gt;” is unnecessary because section 43 of the IT Act already lists all such incidents. In addition, when read with section 66 of the IT Act, there emerges a clear list of offences to empower the police to seek non-consensual disclosure of personal information to obviate the need for any further new terminology. &lt;span&gt;In sum&lt;/span&gt;, with regard to the non-consensual disclosure of personal information for the purposes of law enforcement: a demonstrable need to access personal information to prevent, investigate or prosecute crime must exist; only that amount of personal information sufficient to satisfy the need must be disclosed; and, finally, no disclosure may be permitted without clearly laid down procedural safeguards that fulfil the requirements of a minimal due process regime.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;3.11.4  Therefore, it is proposed that rule 6(1) be re-drafted to read as follows:&lt;/b&gt;&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;“No body corporate shall disclose any personal information or sensitive personal data to anyone whosoever without the prior express consent of the person to whom the personal information or sensitive personal data to be disclosed pertains.&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;Provided that if the personal information or sensitive personal data was collected pursuant to an agreement that expressly authorises the body corporate to disclose such personal information or sensitive personal data, and if the person to whom the personal information or sensitive personal data pertains was aware of this authorisation prior to such collection, the body corporate may disclose the personal information or sensitive personal data without obtaining the consent of the person to whom it pertains in the form and manner specified in such agreement.&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;Provided further that if a reasonable threat to national security, defence or public order exists, or if the disclosure of personal information or sensitive personal data is necessary to prevent, investigate or prosecute a criminal offence, the body corporate shall, upon receiving a written request from the police or other law enforcement authority containing the particulars and details of the personal information or sensitive personal data to be disclosed, disclose such personal information or sensitive personal data to such police or other law enforcement authority without the prior consent of the person to whom it pertains.”&lt;/p&gt;
&lt;p&gt;3.12.1  Rule 6(2) of the Sensitive Personal Data Rules creates an additional disclosure mechanism:&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;&lt;i&gt;Notwithstanding anything contain in sub-rule (1), any sensitive personal data on Information shall be disclosed to any third party by an order under the law for the time being in force.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3.12.2  This sub-rule is overbroad to enable anyone’s sensitive personal data to be disclosed to any other person without the application of any standards of necessity, proportionality or due process and without the person to whom the sensitive personal data pertains having any recourse or remedy. Such provisions are the hallmarks of authoritarian and police states and have no place in a liberal democracy. For instance, the invocation of this sub-rule will enable a police constable in Delhi to exercise unfettered power to access the biometric information or credit card details of a politician in Kerala since an order of a policeman constitutes “&lt;i&gt;an order under the law&lt;/i&gt;”. Pursuant to our submission in paragraph 3.11.4, adequate measures exist to secure the disclosure of personal information or sensitive public data in the public interest. The balance of convenience between privacy and public order has already been struck. This sub-rule should be removed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;3.12.3 Therefore, it is proposed that rule 6(2) be deleted and the remaining sub-rules in rule 6 be accordingly renumbered.&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;3.13.1  Rule 6(4) of the Sensitive Personal Data Rules states:&lt;/p&gt;
&lt;p style="text-align: justify; padding-left: 30px; "&gt;&lt;i&gt;The third party receiving the sensitive personal data or information from body corporate or any person on its behalf under sub-rule (1) shall not disclose it further.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3.13.2  &lt;span&gt;Firstly&lt;/span&gt;, as mentioned elsewhere in this submission, the phrase “&lt;i&gt;third party&lt;/i&gt;” has not been defined. This is a drafting discrepancy that must be rectified. &lt;span&gt;Secondly&lt;/span&gt;, this sub-rule only encompasses sensitive personal data and not other personal information that is not sensitive personal data. &lt;span&gt;Thirdly&lt;/span&gt;, it may be necessary, in the interests of business or otherwise, for personal information or sensitive personal data that has been lawfully disclosed to a third person to be disclosed further if the person to whom that personal information consents to it.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;3.13.3  Therefore, it is proposed that rule 6(4) be re-drafted to read as follows:&lt;/b&gt;&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;“Personal information and sensitive personal data that has been lawfully disclosed by a body corporate to a person who is not the person to whom such personal information or sensitive personal data pertains in accordance with the provisions of these rules may be disclosed further upon obtaining the prior and express consent of the person to whom it pertains.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Rule 7 - Transfer of Information&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3.14.1  Rule 7 of the Sensitive Personal Data Rules sets out the conditions upon which bodies corporate may transfer personal information or sensitive personal data to other bodies corporate in pursuance of a business arrangement:&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;&lt;i&gt;A body corporate or any person on its behalf may transfer sensitive personal data or information including any information, to any other body corporate or a person in India, or located in any other country, that ensures the same level of data protection that is adhered to by the body corporate as provided for under these Rules. The transfer may be allowed only if it is necessary for the performance of the lawful contract between the body corporate or any person on its behalf and provider of information or where such person has consented to data transfer.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3.14.2  This provision allows personal information and sensitive personal data to be transferred across international borders to other bodies corporate in pursuance of a business agreement. The transfer of such information is a common feature of international commerce in which Indian information technology companies participate with significant success. Within India too, personal information and sensitive personal data is routinely transferred between companies in furtherance of an outsourced business model. Besides affecting ease of business, the sub-rule also affects the ability of persons to control their personal information and sensitive personal data. However, the sub-rule has been poorly drafted: &lt;span&gt;firstly&lt;/span&gt;, the simultaneous use of the phrases “&lt;i&gt;provider of information&lt;/i&gt;” and “&lt;i&gt;such person&lt;/i&gt;” is imprecise and misleading; &lt;span&gt;secondly&lt;/span&gt;, the person to whom any personal information or sensitive personal data pertains must pre-consent to the transfer of such information.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;3.14.3  Therefore, it is proposed that rule 7 be re-drafted to read as follows:&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; padding-left: 30px; "&gt;“A body corporate may transfer any personal information or sensitive personal data in its possession to another body corporate, whether located in India or otherwise, if the transfer is pursuant to an agreement that binds the other body corporate to same, similar or stronger measures of privacy, protection, storage, use and disclosure of personal information and sensitive personal data as are contained in these rules, and if the express and informed consent of the person to whom the personal information or sensitive personal data pertains is obtained prior to the transfer.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Rule 8 - Reasonable Security Practices&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3.15.1  Following rule 8(1) of the Sensitive Personal Data Rules that prescribes reasonable security practices and procedures necessary for protecting personal information and sensitive personal data, rule 8(2) asserts that the international standard ISO/IEC 27001 fulfils the protection standards required by rule 8(1):&lt;/p&gt;
&lt;p style="padding-left: 30px; "&gt;&lt;i&gt;The international Standard IS/ISO/IEC 27001 on "Information Technology - Security Techniques - Information Security Management System - Requirements" is one such standard referred to in sub-rule (1).&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3.15.2  ISO/IEC 27001 is an information security management system standard that is prescribed by the International Organisation for Standardisation and the International Electrotechnical Commission. CIS raises no objection to the content or quality of the ISO/IEC 27001 standard. However, to achieve ISO/IEC 27001 compliance and certification, one must first purchase a copy of the standard. A copy of the ISO/IEC 27001 standard costs approximately Rs. _____/-. The cost of putting in place the protective measures required by the ISO/IEC 27001 standard are higher: these include the cost of literature and training, the cost of external assistance, the cost of technology, the cost of employees’ time and the cost of certification.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;3.15.3  Therefore, to bring these standards within the reach of small and medium-sized Indian bodies corporate, an appropriate Indian authority, such as the Bureau of Indian Standards, should re-issue affordable standards that are equivalent to ISO/IEC 27001. &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;IV &lt;span&gt;The Press Release of 24 August 2011&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;4.1  The shoddy drafting of the Sensitive Personal Data Rules resulted in national and international confusion about its interpretation. However, instead of promptly correcting the embarrassingly numerous errors in the Rules, the Department of Information Technology of the Ministry of Communications and Information Technology chose to issue a press release on 24 August 2011 that was published on the website of the Press Information Bureau. The content of that press release is brought to the attention of the Committee of Subordinate Legislation as follows:&lt;/p&gt;
&lt;p style="text-align: justify; padding-left: 30px; "&gt;&lt;i&gt;Clarification on Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011 Under Section 43A of the Information Technology ACT, 2000.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; padding-left: 30px; "&gt;&lt;i&gt;Press Note&lt;/i&gt;&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;&lt;i&gt;The Department of Information Technology had notified Information Technology (Reasonable security practices and procedures and sensitive personal data or information) Rules, 2011 under section 43A of the Information Technology Act, 2000 on 11.4.2011 vide notification no. G.S.R. 313(E).&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;&lt;i&gt;These rules are regarding sensitive personal data or information and are applicable to the body corporate or any person located within India. Any such body corporate providing services relating to collection, storage, dealing or handling of sensitive personal data or information under contractual obligation with any legal entity located within or outside India is not subject to the requirement of Rules 5 &amp;amp; 6. Body corporate, providing services to the provider of information under a contractual obligation directly with them, as the case may be, however, is subject to Rules 5 &amp;amp; 6. Providers of information, as referred to in these Rules, are those natural persons who provide sensitive personal data or information to a body corporate. It is also clarified that privacy policy, as prescribed in Rule 4, relates to the body corporate and is not with respect to any particular obligation under any contract. Further, in Rule 5(1) consent includes consent given by any mode of electronic communication.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;&lt;i&gt;Ministry of Communications &amp;amp; Information Technology (Dept. of Information Technology) &lt;/i&gt;&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;&lt;i&gt;Press Information Bureau, Government of India, Bhadra 2, 1933, August 24, 2011&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="padding-left: 30px; "&gt;&lt;i&gt;SP/ska &lt;br /&gt; (Release ID :74990)&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;4.2  It is apparent from a plain reading of the text that this press release seeks to re-interpret the application of rules 5 and 6 of the Sensitive Personal Data Rules insofar as they apply to Indian bodies corporate receiving personal information collected by another company outside India. Also, it seeks to define the term “providers of information” to address the confusion created by the repeated use this term in the Rules. Further, it re-interprets the scope and application of rule 4 relating to duty of bodies corporate to publish certain policies. Furthermore, it seeks to amend the provisions of rule 5(1) relating to manner and medium of obtaining consent prior to collecting personal information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;4.3  At the outset, it must be understood that a press release is not valid law. According to Article 13(3) of the Constitution of India,&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;...&lt;i&gt;law&lt;/i&gt; &lt;i&gt;includes any Ordinance, order, bye law, rule, regulation, notification, custom or usages having in the territory of India the force of law.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Law includes orders made in exercise of a statutory power as also orders and notifications made in exercise of a power conferred by statutory rules.&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;[See, &lt;i&gt;Edward Mills&lt;/i&gt; AIR 1955 SC 25 at pr. 12, &lt;i&gt;Babaji Kondaji Garad&lt;/i&gt; 1984 (1) SCR 767 at pp. 779-780 and &lt;i&gt;Indramani Pyarelal Gupta&lt;/i&gt; 1963 (1) SCR 721 at pp. 73-744]&lt;/p&gt;
&lt;p&gt;Sub-delegated orders, made in exercise of a power conferred by statutory rules, cannot modify the rules.&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p style="padding-left: 30px; "&gt; &lt;span&gt;[See, &lt;i&gt;Raj Narain Singh&lt;/i&gt; AIR 1954 SC 569 and &lt;i&gt;Re Delhi Laws Act&lt;/i&gt; AIR 1951 SC 332]&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;span&gt;Therefore, press releases, which are not made or issued in exercise of a delegated or sub-delegated power are not “law” and cannot modify statutory rules.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;b&gt;V &lt;span&gt;Summary&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt;5.1&lt;span&gt; &lt;/span&gt;CIS submits that the following provisions of the Sensitive Personal Data Rules be amended or annulled&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt; &lt;/span&gt;&lt;span&gt;Rule 2(1)(b);&lt;/span&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Rule 2(1)(c);&lt;/span&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Rule 2(1)(d);&lt;/span&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Rule 2(1)(g);&lt;/span&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Rule 3;&lt;/span&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Rule 4(1);&lt;/span&gt;&lt;span&gt; &lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Rule 5(1);&lt;/span&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Rule 5(2);&lt;/span&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Rule 5(3);&lt;/span&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Rule 5(4);&lt;/span&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Rule 6(1);&lt;/span&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Rule 6(1) Proviso;&lt;/span&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Rule 6(2);&lt;/span&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Rule 6(4);&lt;/span&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Rule 7; and&lt;/span&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Rule 8.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;5.2 CIS submits that the Committee on Subordinate Legislation &lt;span&gt;should take a serious view of the press release issued by the &lt;/span&gt;&lt;span&gt;Department of Information Technology of the Ministry of Communications and Information Technology on 24 August 2011.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;5.3 CIS submits &lt;/span&gt;&lt;span&gt;that in exercise of the powers granted to the Committee on Subordinate Legislation under Rules 317 and 320 of the Lok Sabha Rules of Procedure, the provisions of the Sensitive Personal Data Rules listed in the preceding paragraph 5.1 should be annulled; and, the Committee may be pleased to consider and recommend as an alternative the amendments proposed by CIS in this submission.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;5.4 CIS thanks the Committee on Subordinate Legislation for the opportunity to present this submission and reiterates its commitment to supporting the Committee with any clarification, question or other requirement it may have.&lt;/span&gt;&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. See generally, &lt;i&gt;Kharak Singh&lt;/i&gt; AIR 1963 SC 1295, &lt;i&gt;Gobind&lt;/i&gt; (1975) 2 SCC 148, &lt;i&gt;R. Rajagopal&lt;/i&gt; (1994) 6 SCC 632, &lt;i&gt;People’s Union for Civil Liberties&lt;/i&gt; (1997) 1 SCC 301 and &lt;i&gt;Canara Bank&lt;/i&gt; (2005) 1 SCC 496.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. See &lt;i&gt;infra&lt;/i&gt; pr. 4.3.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. See, for comparison, Directive 95/46/EC of 24 October 1995 of the European Parliament and Council, the Data Protection Act, 1998 of the United Kingdom and the Proposed EU Regulation on on the protection of individuals with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation).&lt;/p&gt;
&lt;p class="MsoFootnoteText"&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;].&lt;span&gt;See generally, &lt;i&gt;Board of Trustees of Ayurvedic College&lt;/i&gt; AIR 1962 SC 458 and &lt;i&gt;S. P. Mittal&lt;/i&gt; AIR 1983 SC 1.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. &lt;span&gt;See &lt;/span&gt;&lt;span&gt;generally, &lt;i&gt;W. O. Holdsworth&lt;/i&gt; AIR 1957 SC 887 and &lt;i&gt;Duli Chand&lt;/i&gt; AIR 1984 Del 145.&lt;/span&gt;&lt;/p&gt;
&lt;div id="_mcePaste"&gt; &lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/comments-on-the-it-reasonable-security-practices-and-procedures-and-sensitive-personal-data-or-information-rules-2011'&gt;https://cis-india.org/internet-governance/blog/comments-on-the-it-reasonable-security-practices-and-procedures-and-sensitive-personal-data-or-information-rules-2011&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bhairav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>SAFEGUARDS</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-12T12:13:53Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/comments-on-the-it-guidelines-for-cyber-cafe-rules-2011">
    <title>Comments on the Information Technology (Guidelines for Cyber Cafe) Rules, 2011</title>
    <link>https://cis-india.org/internet-governance/blog/comments-on-the-it-guidelines-for-cyber-cafe-rules-2011</link>
    <description>
        &lt;b&gt;Bhairav Acharya on behalf of the Centre for Internet and Society submitted the following comments on the Information Technology (Guidelines for Cyber Cafe Rules), 2011.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;&lt;i&gt;This research was undertaken as part of the 'SAFEGUARDS' project that CIS is undertaking with Privacy International and IDRC&lt;/i&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;b&gt;I  &lt;span&gt;Preliminary&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1.1 This submission presents preliminary clause-by-clause comments from the Centre for Internet and Society (“&lt;b&gt;CIS&lt;/b&gt;”) on the Information Technology (Guidelines for Cyber Café) Rules, 2011 that were notified by the Central Government in the Gazette of India vide Notification GSR 315(E) on 11 April 2011 (“&lt;b&gt;Cyber Café Rules&lt;/b&gt;”).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1.2 This submission is for the consideration of the Committee on Subordinate Legislation of the Fifteenth Lok Sabha. In its 21&lt;sup&gt;st&lt;/sup&gt; Report, the Committee on Subordinate Legislation presciently noted that:&lt;/p&gt;
&lt;p style="text-align: justify; padding-left: 30px; "&gt;“…&lt;i&gt;statutory rules ought to be framed and notified not only in time but utmost care and caution should also be exercised in their formulation and finalization so as to get rid of any avoidable discrepancies. As far as possible, the aim should be to prevent needless litigation arising subsequently from badly framed rules.&lt;/i&gt;” [See the 21&lt;sup&gt;st&lt;/sup&gt; Report of the Lok Sabha Committee on Subordinate Legislation presented on 16 December 2011 at pr. 2.1]&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Unfortunately, the Cyber Café Rules have been poorly drafted, contain several discrepancies and, more seriously, may impinge upon constitutionally guaranteed freedoms of Indian citizens. The attention of the Committee on Subordinate Legislation is accordingly called to the following provisions of the Cyber Cafe Rules:&lt;/p&gt;
&lt;p&gt;&lt;b&gt;II  &lt;span&gt;Validity of the Cyber Cafe Rules&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2.1 The Cyber Cafe Rules are made in exercise of powers granted under section 87(2)(zg) read with section 79(2) of the Information Technology Act, 2000 (&lt;b&gt;“IT Act”&lt;/b&gt;). Read together, these delegated powers invest the executive with the power to frame rules for exempting cyber cafes from liability for any third party information, data or communication link if they comply with Central Government guidelines. The empowerment made by section 87(2)(zg) of the IT Act pertains to:&lt;/p&gt;
&lt;p&gt;“&lt;i&gt;the guidelines to be observed by the intermediaries under sub-section (2) of section 79&lt;/i&gt;”&lt;/p&gt;
&lt;p&gt;Sections 79 (1) and (2) state:&lt;/p&gt;
&lt;p&gt;“&lt;b&gt;&lt;i&gt;79. Exemption from liability of intermediary in certain cases. –&lt;/i&gt;&lt;/b&gt;&lt;i&gt; (1) Notwithstanding anything contained in any law for the time being in force but subject to the provisions of sub-sections (2) and (3), an intermediary shall not be liable for &lt;span&gt;any third party information, data, or communication link made available or hosted by him&lt;/span&gt;. &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(2) The provisions of sub-section (1) shall apply if— &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(a) the function of the intermediary is limited to providing access to a communication system over which information made available by third parties is transmitted or temporarily stored or hasted; or&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(b) the intermediary does not— &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(i)  initiate the transmission, &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(ii) select the receiver of the transmission, and &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(iii) select or modify the information contained in the transmission; &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(c) the intermediary observes due diligence while discharging his duties under this Act and also observes &lt;span&gt;such other guidelines as the Central Government may prescribe in this behalf&lt;/span&gt;.&lt;/i&gt;”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2.2 Hence, section 79(2) permits the Central Government to prescribe guidelines for cyber cafes to comply with in order to claim the general exemption from liability granted by section 79(1) of the IT Act. The Cyber Cafe Rules constitute those guidelines. However, the liability from which cyber cafes may be exempted extends only to “&lt;i&gt;any third party information, data, or communication link made available or hosted&lt;/i&gt;” by users of cyber cafes. In other words, the liability of cyber cafes (the exemption from which is supposed to be controlled by the Cyber Cafe Rules) is only in respect of the information, data or communication links of their users. No liability is assigned to cyber cafes for failing to collect identity information of their users. Therefore, the Cyber Cafe Rules made under the power granted by section 79(2)(c) of the IT Act cannot make cyber cafes liable for user identification information. In accordance with sections 79(2)(c) and 79(1) read with section 87(2)(zg) of the IT Act, the Cyber Cafe Rules may legitimately deal with the duties of cyber cafes in respect of any information, data or communication links of their users, but not in respect of user identification. However, the thrust of the Cyber Cafe Rules, and the pith of their provisions, is concerned solely with registering and identifying cyber cafe users including collecting their personal information, photographing them, storing their personal information and reporting these non-content related details to the police. There is even a foray into interior design to dictate the height limits of furniture inside cyber cafes. All of this may be a legitimate governance concern, but it cannot be undertaken by the Cyber Cafe Rules. &lt;b&gt;To the extent that the Cyber Cafe Rules deal with issues beyond those related to any information, data or communication links of cyber cafe users, the Rules exceed the permissible limit of delegated powers under section 79(2) and 87(2)(zg) of the IT Act and, consequently, are &lt;i&gt;ultra vires&lt;/i&gt; the IT Act.&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;III Clause-by-Clause Analysis and Comments&lt;/b&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Rule 2 - Definitions&lt;/span&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3.1  Rule 2(1)(c) of the Cyber Cafe Rules defines a cyber cafe in accordance with the definition provided in section 2(1)(na) of the IT Act as follows:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“&lt;i&gt;“cyber cafe” means any facility from where access to the internet is offered by any person in the ordinary course of business to the members of the public&lt;/i&gt;”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This definition of a cyber cafe is overbroad to bring within its ambit any establishment that offers internet access in the course of its business such as airports, restaurants and libraries. In addition, some State Road Transport Corporations offer wi-fi internet access on their buses; and, Indian Railways, as well as Bangalore Metro Rail Corporation Limited, plans to offer wi-fi internet access on some of its trains. These will all fall within the definition of “cyber cafe” as it is presently enacted. The definition of “cyber cafe” should be read down to only relate to commercial establishments that primarily offer internet access to the general public for a fee.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Therefore, it is proposed that rule 2(1)(c) be amended to read as follows:&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; padding-left: 30px; "&gt;“notwithstanding anything contained in clause (na) of sub-section (1) of section 2 of the Act, and for the purposes of these rules only, “cyber cafe” means, any commercial establishment which primarily offers access to the internet to members of the general public for consideration for any purpose but does not include any educational or academic institution, office or place where access to the internet is restricted to authorised persons only.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3.2 Rule 2(1)(e) of the Cyber Cafe Rules defines “data” in accordance with the definition provided in section 2(1)(o) of the IT Act. However, the term “data” is not used anywhere in the Cyber Cafe Rules and so its definition is redundant. This is one of several instances of careless drafting of the Cyber Cafe Rules.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Therefore, it is proposed that the definition of “data” in rule 2(1)(e) be deleted and the clauses in sub-rule (1) of rule 2 be accordingly renumbered.&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3.3 Rule 2(1)(g) of the Cyber Cafe Rules defines “intermediary” in accordance with the definition provided in section 2(1)(w) of the IT Act. While all cyber cafes are intermediaries, not all intermediaries are cyber cafes: there are different categories of intermediaries that are regulated by other rules under the IT Act. The Cyber Cafe Rules make no mention of any other category of intermediaries other than cyber cafes; indeed, the term “intermediary” is not used anywhere in the Cyber Cafe Rules. Its definition is therefore redundant.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Therefore, it is proposed that the definition of “intermediary” in rule 2(1)(g) be deleted and the clauses in sub-rule (1) of rule 2 be accordingly renumbered.&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Rule 3 - Agency for Registration of Cyber Cafes&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;4.1 Rule 3 of the Cyber Cafe Rules, which attempts to set out a registration regime for cyber cafes, as follows:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“&lt;b&gt;&lt;i&gt;3. Agency for registration of cyber cafe. –&lt;/i&gt;&lt;/b&gt;&lt;i&gt; (1) All cyber cafes shall be registered with a unique registration number with an agency called as registration agency as notified by the Appropriate Government in this regard. The broad terms of registration shall include: &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(i) name of establishment; &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(ii) address with contact details including email address; &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(iii) whether individual or partnership or sole properitership or society or company; &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(iv) date of incorporation; &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(v) name of owner/partner/proprietor/director; &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(vi) whether registered or not (if yes, copy of registration with Registrar of Firms or Registrar of Companies or Societies); and &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(vii) type of service to be provided from cyber cafe &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Registration of cyber cafe may be followed up with a physical visit by an officer from the registration agency. &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(2) The details of registration of cyber cafe shall be published on the website of the registration agency. &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(3) The Appropriate Government shall make an endeavour to set up on-line registration facility to enable cyber cafe to register on-line. &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(4) The detailed process of registration to be mandatorily followed by each Registration Agency notified by the Appropriate Government shall be separately notified under these rules by the central Government.&lt;/i&gt;”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS raises two unrelated and substantial objections to this provision: &lt;span&gt;firstly&lt;/span&gt;, all cyber cafes across India are already registered under applicable local and municipal laws such as the relevant State Shops and Establishments Acts and the relevant Police Acts that provide detailed information to enable the relevant government to regulate cyber cafes; and, &lt;span&gt;secondly&lt;/span&gt;, the provisions of rule 3 create an incomplete and clumsy registration regime that does not clearly establish a procedure for registration within a definite timeframe and does not address the consequences of a denial of registration.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;4.2  At the outset, it is important to understand the distinction between registration and licensing. The state may identify certain areas or fields of business, or certain industries, to be regulated by the conditions of a licence in the public interest. These may include shops selling alcohol or guns; or, industries such as telecommunications, mining or nuclear power. Licences for various activities are issued by the state for a limited term on the basis of need and public interest and licensees are permitted to operate only within the term and conditions of the licence. Failure to observe licence conditions can result in the cancellation of the licence and other penalties, sometimes even criminal proceedings.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Registration, on the other hand, is an information-gathering activity that gives no power of intervention to the state unless there is a general violation of law. The primary statutory vehicle for achieving this registration are the various Shops and Establishments Acts of each State and Union Territory and other municipal registration regulations. For example, under section 5 of the Delhi Shops and Establishments Act, 1954, an establishment, which includes shops, commercial establishments and places of public amusement and entertainment, must fulfil the following registration requirements:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“&lt;b&gt;&lt;i&gt;5. Registration of establishment. –&lt;/i&gt;&lt;/b&gt;&lt;i&gt; (1) Within the period specified in sub-section (5), the occupier of every establishment shall send to the Chief Inspector a statement in a prescribed form, together with such fees as may be prescribed, containing &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(a) the name of the employer and the manager, if any; &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(b) the postal address of the establishment; &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(c) the name, if any, of the establishment, &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(d) the category of the establishment, i.e. whether it is a shop, commercial establishment, residential hotel, restaurant eating house, theatre or other place of public amusement or entertainment; &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(e) the number of employees working about the business of the establishment; and &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(f) such other particulars as may be prescribed. &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(2) On receipt of the statement and the fees, the Chief Inspector shall, on being satisfied about the correctness of the statement, register the establishment in the Register of Establishments in such manner as may be prescribed and shall issue, in a prescribed form, a registration certificate to the occupier. &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(3) The registration certificate shall be prominently displayed at the establishment and shall be renewed at such intervals as may be prescribed in this respect. &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(4) In the event of any doubt or difference of opinion between an occupier and the Chief Inspector as to the category to which shall after such enquiry, as it may think proper, decide the category of each establishment and the decision thereto shall be final for the purpose of this Act. &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(5) Within ninety days from the date mentioned in column 2 below in respect of the establishment mentioned in column 1, the statement together with fees shall be sent to the Chief Inspector under sub-section (1).&lt;/i&gt;”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Besides the registration regime, the Shops and Establishments Acts also enact inspection regimes to verify the accuracy of all registered information, the maintenance of labour standards and other public safety requirements. These are not addressed by the Cyber Cafe Rules.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;4.3 In addition to the various Shops and Establishments Acts which prescribe registration procedures, &lt;span&gt;all premises within which cyber cafes operate are subject to a further licensing regime under the various State Police Acts&lt;/span&gt; as places of public amusement and entertainment. For example, a cyber cafe is deemed to be a “place of public amusement” under section 2(9) of the Bombay Police Act, 1951 and therefore subject to the licensing, registration and regulatory provisions of the Rules for Licensing and Controlling Places of Public (Other than Cinemas) and Performances for Public Amusement including Cabaret Performances, Discotheque, Games, Poll Game, Parlours, Amusements Parlours providing Computer Games, Virtual Reality Games, Cyber Cafes with Net Connectivity, Bowling Alleys, Cards Rooms, Social Clubs, Sports Clubs, Meals and Tamasha Rules, 1960. Similar provisions exist in Delhi.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In view of these two-fold registration requirements under the Shops and Establishments Acts and relevant Police Acts, creating yet another layer of registration is unwarranted. The Cyber Cafe Rules do not prescribe any new registration requirement that has not already been covered by the Shops and Establishments Acts and Police Acts. Multiple overlapping legislations will create confusion within the various departments of the relevant government and, more importantly, will result in non-compliance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;4.4 Without prejudice to the preceding comments relating to already existing registration requirements under the Shops and Establishments Acts and Police Acts, rule 3 of the Cyber Cafe Rules are very poorly drafted and do not fulfil the requirements of a valid registration regime. Most State governments have not notified a registration agency for cyber cafes as required by the Cyber Cafe Rules, probably because appropriate provisions under the Shops and Establishments Acts already exist. No time-limit has been specified for the registration process. This means that the (as yet non-existent) registration agency may delay, whether out of inefficiency or malice, a registration application without consequences for the delay. This not only discourages small and medium enterprises to hinder economic growth, it also encourages corruption as cyber cafe operators will be forced to pay a bribe to receive their registration.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;4.5 Furthermore, rule 3(4) of the Cyber Cafe Rules, which calls on the Central Government to notify rules made by State governments, reads as follows:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“&lt;i&gt;(4) The detailed process of registration to be mandatorily followed by each Registration Agency notified by the Appropriate Government shall be separately notified under these rules by the central Government.&lt;/i&gt;”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This nonsensical provision, which gives the Central Government the power to notify rules made by State governments, &lt;i&gt;prima facie&lt;/i&gt; violates the constitutional scheme of division of legislative powers between the Union and States. Rules that have been made by State governments, the subject matter of which is within the legislative competence of the State legislatures, are notified by those State governments for application within their States and no separate notification of these rules can be done by the Central Government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Therefore, it is proposed that rule 3 be deleted in entirety and the remaining rules be accordingly renumbered.&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Rule 4 - Identification of User&lt;/span&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;5.1 Rule 4 of the Cyber Cafe Rules attempts to establish the identity of cyber cafe users. This is a legitimate and valid exercise to prevent unlawful use of cyber cafes. Sub-rule (1) of rule 4 reads as follows:&lt;/p&gt;
&lt;p&gt;“&lt;i&gt;(1) The Cyber Cafe shall not allow any user to use its computer resource without the identity of the user being established. The intending user may establish his identify by producing a document which shall identify the users to the satisfaction of the Cyber Cafe. Such document may include any of the following:&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(i)   Identity card issued by any School or College; or &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(ii)  Photo Credit Card or debit card issued by a Bank or Post Office; or &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(iii) Passport; or &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(iv) Voter Identity Card; or &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(v)  Permanent Account Number (PAN) card issued by Income-Tax Authority; or &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(vi) Photo Identity Card issued by the employer or any Government Agency; or &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(vi) Driving License issued by the Appropriate Government; or &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(vii) Unique Identification (UID) Number issued by the Unique Identification Authority of India (UIDAI).&lt;/i&gt;”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The use of credits cards or debit cards to verify identity is specifically discouraged by the Reserve Bank of India because it directly results in identity theft, fraud and other financial crimes. Online credit card fraud results in large losses to individual card-holders and to banks. The other identity documents specified in rule 4 will suffice to accurately establish the identity of users.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Therefore, it is proposed that the use of credit or debit cards as a means of establishing identity in rule 4(1)(ii) be deleted and the remaining clauses in sub-rule (1) of rule 4 be accordingly renumbered.&lt;/b&gt;&lt;/p&gt;
&lt;p class="DefaultCxSpFirst"&gt;5.2  Rule 4(2) of the Cyber Café Rules compels the storage of photographs and other personal information of users by cyber cafés:&lt;/p&gt;
&lt;p&gt;“&lt;i&gt;The Cyber Cafe shall keep a record of the user identification document by either storing a photocopy or a scanned copy of the document duly authenticated by the user and authorised representative of cyber cafe. Such record shall be securely maintained for a period of at least one year.&lt;/i&gt;”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While this submission does not question the requirement of storing user information for the purposes of law enforcement, this rule 4(2) does not prescribe the standards of security, confidentiality and privacy that should govern the storage of photographs and other personal information by cyber cafes. Without such a prescription, cyber cafes will simply store photographs of users, including minors and women, and important personal information that can be misused, such as passport copies, in a file with no security. This is unacceptable. Besides endangering vulnerable user information, it makes identity theft and other offences easier to perpetrate. If cyber cafes are to collect, store and disclose personal information of users, they must be bound to strict standards that explicitly recognise their duties and obligations in relation to that personal information. In this regard, the attention of the Committee on Subordinate Legislation is called to CIS’ submission regarding the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Therefore, it is proposed that rule 4(2) be amended to read as follows:&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; padding-left: 30px; "&gt;“Any information of any user collected by a cyber cafe under this rule shall be collected, handled, stored and disclosed in accordance with the provisions of the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, for a period not exceeding six months from the date of collection of that information.”&lt;/p&gt;
&lt;p&gt;5.3  Sub-rule (3) of rule 4 allows cyber cafe users to be photographed:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“&lt;i&gt;(3) In addition to the identity established by an user under sub-rule (1), he may be photographed by the Cyber Cafe using a web camera installed on one of the computers in the Cyber Cafe for establishing the identity of the user. Such web camera photographs, duly authenticated by the user and authorised representative of cyber cafe, shall be part of the log register which may be maintained in physical or electronic form.&lt;/i&gt;”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Since the identity documents listed in rule 4(1) all contain a photograph of their owner, the need for further photography is unnecessary. This provision needlessly burdens cyber cafe owners, who will be required to store two sets of photographs of users – their photographic identity documents in addition to individual photographs, and invades the individual privacy rights of users who will be exposed to unnecessary photography by private cyber cafe operators. Granting a non-state entity the right to take photographs of other individuals to no apparent gain or purpose is avoidable, especially when no measures are prescribed to regulate the safe and lawful storage of such photographs. Without strict safety measures governing the taking and storing of photographs of users, including minor girls and women, the Cyber Cafe Rules leave open the possibility of gross misuse of these photographs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Therefore, it is proposed that sub-rule (3) of rule 4 be deleted and the remaining sub-rules of rule 4 be accordingly renumbered.&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;5.4  Sub-rue (4) of rule 4 reads as follows:&lt;/p&gt;
&lt;p&gt;“&lt;i&gt;(4) A minor without photo Identity card shall be accompanied by an adult with any of the documents as required under sub-rule (1).&lt;/i&gt;”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Regulating a minor’s access and use of the internet may serve a public good but it cannot be achieved by law. Information deemed unsuitable for minors that is available via other media, such as video, television or magazines, is not legally proscribed for minors. The law cannot and does not regulate their availability to minors. The protection of minors is an overriding public and jurisprudential concern, but law alone cannot achieve this end. Most minors do not possess photographic identity documents and rule 4(4) will, if implemented, result in internet access being taken away from minors. Restricting a minor’s ability to access useful, educational and other harmless content available on the internet is harmful to the public interest as it discourages education and awareness.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Therefore, it is proposed that rule 4(4) be amended to read as follows:&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“A minor who does not possess any of the identity documents listed under sub-rule (1) of this rule may provide the name and address of his parent or guardian prior to using the cyber cafe.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;5.5  Rule 4(5) of the Cyber Cafe Rules states that a user “&lt;i&gt;shall be allowed to enter the cyber cafe after he has established his identity&lt;/i&gt;.” However, since rule 4(1) already addresses identity verification by specifically preventing a cyber cafe from “&lt;i&gt;allow[ing] any user to use its computer resource without the identity of the user of the user being established&lt;/i&gt;,” this rule 4(5) is redundant.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Therefore, it is proposed that rule 4(4) be deleted and the remaining sub-rules of rule 4 be accordingly renumbered.&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;5.6  Rule 4(6) of the Cyber Cafe Rules states:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“&lt;i&gt;(6) The Cyber cafe shall immediately report to the concerned police, if they have reasonable doubt or suspicion regarding any user.&lt;/i&gt;”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This provision is legally imprecise, poorly drafted and impossible to enforce. The nature of doubt or suspicion that is necessary before contacting the police is unclear. A cyber cafe may doubt whether a customer is able to pay the bill for his internet usage, or be suspicious because of the length of a person’s beard. Requiring the police to be called because someone is doubtful is ridiculous. Furthermore, reasonableness in law is a well-established concept of rationality; it is not open to interpretation. “Reasonable doubt” is a criminal law threshold that must be reached in order to secure a conviction. Reporting requirements must be clear and unambiguous.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Therefore, it is proposed that rule 4(6) be deleted.&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Rule 5 - Log Register&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;6.1  Rule 5(3) of the Cyber Cafe Rules states:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“&lt;i&gt;(3) Cyber Cafe shall prepare a monthly report of the log register showing date- wise details on the usage of the computer resource and submit a hard and soft copy of the same to the person or agency as directed by the registration agency by the 5th day of next month.&lt;/i&gt;”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This provision is akin to telephone tapping. If phone companies are not required to report the call histories of each of their users and cable television providers not required to report individual viewing preferences, there is no reason for cyber cafes to report the internet usage of users. There may be instances where public interest may be served by monitoring the internet history of specific individuals, just as it is possible to tap an individual’s telephone if it is judicially determined that such a need exists. However, in the absence of such protective provisions to safeguard individual liberties, this sub-rule (3) is grossly violative of the individual right to privacy and should be removed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Therefore, it is proposed that rule 5(3) be deleted and the remaining sub-rules of rule 5 be accordingly renumbered.&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Rule 7&lt;b&gt; - &lt;/b&gt;Inspection of Cyber Cafe&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;7.1  Rule 7 of the Cyber Cafe Rules provides for an inspection regime:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“&lt;i&gt;An officer autnorised by the registration agency, is authorised to check or inspect cyber cafe and the computer resource of network established therein, at any time for the compliance of these rules. The cyber cafe owner shall provide every related document, registers and any necessary information to the inspecting officer on demand.&lt;/i&gt;”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The corollary of a registration regime is an inspection regime. This is necessary to determine that the information provided during registration is accurate and remains updated. However, as stated in paragraphs 3.2 – 3.4 of this submission, a comprehensive and more easily enforceable registration and inspection regime already exists in the form of the various Shops and Establishments Acts in force across the country. Those provisions also provide for the consequences of an inspection, which the Cyber Cafe Rules do not.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Therefore, it is proposed that rule 7 be deleted.&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;IV &lt;span&gt;Summary&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;8.1  In sum:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) Under the delegated powers contained in section 87(2)(zg) read with section 79(2) of the IT Act, the Central Government does not have the competence to make rules for identifying cyber cafe users including collecting, storing and disclosing personal information of cyber cafe users nor for prescribing the interior design of cyber cafes and, to the extent that the Rules do so, they are &lt;i&gt;ultra vires&lt;/i&gt; the parent statute;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) The attention of the Committee on Subordinate Legislation is invited to the following provisions of the Cyber Cafe Rules which require amendment or annulment:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Rule 2(1)(c);&lt;/li&gt;
&lt;li&gt;Rule 2(1)(e);&lt;/li&gt;
&lt;li&gt;Rule 2(1)(g);&lt;/li&gt;
&lt;li&gt;Rule 3(1);&lt;/li&gt;
&lt;li&gt;Rule 3(4);&lt;/li&gt;
&lt;li&gt;Rule 4(1);&lt;/li&gt;
&lt;li&gt;Rule 4(2);&lt;/li&gt;
&lt;li&gt;Rule 4(3);&lt;/li&gt;
&lt;li&gt;Rule 4(4);&lt;/li&gt;
&lt;li&gt;Rule 4(5);&lt;/li&gt;
&lt;li&gt;Rule 4(6);&lt;/li&gt;
&lt;li&gt;Rule 5(3); and&lt;/li&gt;
&lt;li&gt;Rule 7.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;(c)  The Cyber Cafe Rules are extremely poorly framed, rife with discrepancies and will give rise to litigation. They should be selectively annulled and, to prevent a repeat of the same mistakes, new rules may be framed in concert with experts, professional organisations and civil society in a democratic manner.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;8.2 CIS would like to conclude by taking this opportunity to present its compliments to the Committee on Subordinate Legislation and to offer the Committee any assistance or support it may require.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/comments-on-the-it-guidelines-for-cyber-cafe-rules-2011'&gt;https://cis-india.org/internet-governance/blog/comments-on-the-it-guidelines-for-cyber-cafe-rules-2011&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bhairav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>SAFEGUARDS</dc:subject>
    

   <dc:date>2013-07-12T12:15:30Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-criminal-law-amendment-bill-2013">
    <title>The Criminal Law Amendment Bill 2013 — Penalising 'Peeping Toms' and Other Privacy Issues </title>
    <link>https://cis-india.org/internet-governance/blog/the-criminal-law-amendment-bill-2013</link>
    <description>
        &lt;b&gt;The pending amendments to the Indian Penal Code, if passed in their current format, would be a huge boost for individual physical privacy by criminalising stalking and sexually-tinted voyeurism and removing the ambiguities in Indian law which threaten the privacy and dignity of individuals.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;The author, Divij Joshi is a law student at NLS and is interning with CIS for its privacy project. &lt;i&gt;This research was undertaken as part of the 'SAFEGUARDS' project that CIS is undertaking with Privacy International and IDRC&lt;/i&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;What is the Criminal Law (Amendment) Bill, 2013? What will it change?&lt;/b&gt;&lt;br /&gt;The Criminal Law (Amendment) Bill is a bill which is to be introduced in the Indian Parliament, which will replace the Criminal Law (Amendment) Ordinance, 2013&lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt; currently in force, and aims at amending the existing provisions in criminal law in order to improve the safety of women. The Bill seeks to make changes to the Indian Penal Code, the Code of Criminal Procedure, and the Indian Evidence Act. The Bill will introduce unprecedented provisions in the Indian Penal Code which would criminalise sexual voyeurism and stalking and would amend legal provisions to protect the privacy of individuals, such as discontinuing the practice of examination of the sexual history of the victim of a sexual assault for evidence. With instances of threats to individual privacy on the rise in India, &lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt; it is high time that the criminal law expands its scope to deal with offences which violate physical privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;What threats to privacy will the Act address?&lt;/b&gt;&lt;br /&gt;The Act will address the following violations of physical privacy:&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;&lt;span&gt;&lt;b&gt;Stalking&lt;/b&gt;&lt;/span&gt;&lt;b&gt;&lt;br /&gt;Draft provision&lt;/b&gt;: The ordinance introduces the offence of stalking under Section 345D of the Indian Penal Code, and makes it punishable by imprisonment of not less than one year, which may extend to three years, and a fine. The provision prescribes that ‘&lt;i&gt;Whoever follows a person and contacts, or attempts to contact such person to foster personal interaction repeatedly, despite a clear indication of disinterest by such person, or whoever monitors the use by a person of the internet, email or any other form of electronic communication, or watches or spies on a person in a manner that results in a fear of violence or serious alarm or distress in the mind of such person, or interferes with the mental peace of such person.’ &lt;/i&gt;Hence, under the new law, constant, unwanted interaction of any one person with another, for any reason, can be made punishable, if the actions results in fear of violence or distress in any person, or interferes with their mental peace.&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;&lt;b&gt;Current law and need for amendment&lt;/b&gt;: Stalking is generally characterized by unwanted and obsessive harassment or persecution of one person by another. Stalking can be a physical act such as constantly following a person, or can be done through electronic means — usually the internet (known as cyberstalking). Stalking may or may not be an act which physically threatens the security of an individual; however, it can cause mental trauma and fear to the person being stalked. Stalking is a blatant intrusion into an individual’s privacy, where the stalker attempts to establish relationships with their victim which the victim does not consent to and is not comfortable with. The stalker also intrudes into the victim’s private life by collecting or attempting to collect personal information the victim may not want to disclose, such as phone numbers or addresses, and misusing it. If the stalker is left undeterred to continue such actions, it can even lead to a threat to the safety of the victim. Cyber-stalking is a phenomenon which can prove to be even more invasive and detrimental to privacy, as most cyber-stalkers attempt to gain access to private information of the victims so that they can misuse it. Stalking, in any form, degrades the privacy of the victim by taking away their choice to use their personal information in ways they deem fit. &lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt; Recognizing stalking as an offence would not only protect the physical privacy rights of the victims, but also nip potentially violent crimes in the bud.&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;Many nations including Australia, the United States of America and Japan have penal provisions which criminalise stalking. &lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt; In India however, there is no appropriate response to stalking as an offence — either in its physical or electronic forms. The Information Technology Act, the legislation purported to deal with instances of cyber-crimes, overlooks instances of breach of online privacy and stalking which does not lead to publication of obscene images or other obvious manifestations of physical or mental threat. The general provision under which victims of stalking can file complaints is Section 509 of the Indian Penal Code (IPC), which states that — ‘&lt;i&gt;Whoever, intending to insult the modesty of any woman, utters any word, makes any sound or gesture, or exhibits any object, intending that such word or sound shall be heard, or that such gesture or object shall be seen, by such woman, or intrudes upon the privacy of such woman, shall be punished with simple imprisonment for a term which may extend to one year, or with fine, or with both.’&lt;/i&gt;There are several problems with using this section as a response to stalking. Without a particular definition of what comes under the scope of ‘intrusion of privacy’ under this section, there is reluctance both for the victim to approach the police and for the police to file the complaint. Usually the offence is coupled with some other form of harassment or violence, and the breach of privacy and trauma is not considered as a separate offence. For example, if a person is continuously following or trying to contact you without your consent or approval, but does not physically threaten or insult you, there is no protection in law against such a person. Hence, as pointed out, there is a need to recognize the breach of privacy as a separate ground of offence, notwithstanding other physical or mental grounds. Secondly, the provisions of this section require the criminal to have the ‘intent of insulting the modesty of a woman’. Aside from the difficulties in adjudging the ‘modesty’ of a woman, the provision limits the scope of harassment to only that which intends to insult the modesty of a woman and excludes any other intention as criminal behaviour. The present law amends these problems by disregarding the reason or intent for the behaviour, and by clearly defining the elements of the offence and making stalking as a stand-alone, punishable offence.&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;&lt;b&gt;&lt;span&gt;Sexual Voyeurism&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;&lt;b&gt;Draft provision&lt;/b&gt;: The Act will add Section 345D to the Indian Penal Code, which reads as follows — ‘&lt;i&gt;Whoever watches, or captures the image of, a woman engaging in a private act in circumstances where she would usually have the expectation of not being observed either by the perpetrator or by any other person at the behest of the perpetrator shall be punished on first conviction with imprisonment of either description for a term which shall not be less than one year, but which may extend to three years, and shall also be liable to fine, and be punished on a second or subsequent conviction, with imprisonment of either description for a term which shall not be less than three years, but which may extend to seven years, and shall also be liable to fine.&lt;/i&gt;&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;&lt;i&gt;Explanation 1.–– For the purposes of this section, “private act” includes an act carried out in a place which, in the circumstances, would reasonably be expected to provide privacy, and where the victim's genitals, buttocks or breasts are exposed or covered only in underwear; or the victim is using a lavatory; or the person is doing a sexual act that is not of a kind ordinarily done in public.&lt;/i&gt;&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;&lt;i&gt;Explanation 2.–– Where the victim consents to the capture of images or any act, but not to their dissemination to third persons and where such image or act is disseminated, such dissemination shall be considered an offence under this section.’&lt;/i&gt;&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;The provision seeks to protect victims of voyeurism, who have been watched, or recorded, without their consent and under circumstances where the victim could reasonably expect privacy, and where the victim’s genitals, buttocks or breasts have been exposed. A reasonable expectation of privacy means that in the circumstances, whether in a public or a private place, the victim has a reasonable expectation that she is not being observed engaging in private acts such as disrobing or sexual acts. The test of reasonable expectation of privacy can be derived from similar provisions in voyeurism laws across the world, and also section 66E of the Information Technology Act.&lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt; It is particularly important because voyeurism does not necessarily take place in private places like the victims home, but also in public spaces where there is generally an expectation that exposed parts of one’s body are not viewed by anyone.&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;&lt;b&gt;Current law and need for amendment&lt;/b&gt;: A ‘voyeur’ is generally defined as "a person who derives sexual gratification from the covert observation of others as they undress or engage in sexual activities." &lt;a href="#fn6" name="fr6"&gt;[6]&lt;/a&gt; Voyeurism is the act of a person who, usually for sexual gratification, observes, captures or distributes the images of another person without their consent or knowledge. With the development in video and image capturing technologies, observation of individuals engaged in private acts in both public and private places, through surreptitious means, has become both easier and more common. Cameras or viewing holes may be placed in changing rooms or public toilets, which are public spaces where individuals generally expect a reasonable degree of privacy, and where their body may be exposed. Voyeurism is an act which blatantly defies reasonable expectations of privacy that individuals have about their bodies, such as controlling its exposure to others.&lt;a href="#fn7" name="fr7"&gt;[7]&lt;/a&gt; Voyeurism is an offence to both the privacy as well as the dignity of a person, by infringing upon the right of individuals to control the exposure of their bodies without their consent or knowledge, either through unwarranted observation of the individual, or through distribution of images or videos against the wishes or without the knowledge of the victim.&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;Voyeurism is a criminal offence in many jurisdictions across the world such as Australia,&lt;a href="#fn8" name="fr8"&gt;[8]&lt;/a&gt; the United States,&lt;a href="#fn9" name="fr9"&gt;[9]&lt;/a&gt; Canada,&lt;a href="#fn10" name="fr10"&gt;[10]&lt;/a&gt; and the UK,&lt;a href="#fn11" name="fr11"&gt;[11]&lt;/a&gt; which criminalise either the capturing of certain images, or observation of individuals, or both. In India, the capturing, distribution and transferring of images of ‘private areas’ of a person’s body, under circumstances where the person would have a reasonable expectation of privacy that their body would not be exposed to public view, is punishable with imprisonment which may extend to three years or with fine not exceeding two lakh rupees, or with both. However, this does not cover instances where a person observes another in places and situations where they do not consent to being observed. The inclusion of voyeurism as an offence in the IPC would close several loopholes in the voyeurism law and hopefully be a precedent for the state to better work towards securing the bodily privacy of its citizens.&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;&lt;span&gt;&lt;b&gt;Examination of Sexual History and Privacy&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;Draft provision: &lt;i&gt; &lt;/i&gt;The amendment to Section 53A of the Indian Evidence Act in the Bill reads, &lt;i&gt;“In a prosecution for an offence under section 354, section 354A, section 354B, section 354C, sub-section (1) or sub-section (2) of section 376, section 376A, section 376B, section 376C, section 376D or section 376E of the Indian Penal Code or for attempt to commit any such offence, where the question of consent is in issue, evidence of the character of the victim or of such person’s previous sexual experience with any person shall not be relevant on the issue of such consent or the quality of consent.”&lt;/i&gt;&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;A similar proviso is added to Section 376 of the Indian Evidence Act.&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;According to the above provision, in a trial for sexual assault or rape the evidence supplied of a victim’s previous sexual experience or her ‘character’ would not be admissible as relevant evidence to determine the fact of the consent or the quality of the consent.&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;Current law and need for amendment: The Indian Evidence Act is the legislation which governs the admissibility of evidence in the different courts. In cases of rape or sexual assault and related crimes, the evidence of consent often considered is not just that of the consent of the woman in the act at that time itself, but rather her previous sexual experience and “promiscuous character”. Even though it has been widely censured by the highest court,&lt;a href="#fn12" name="fr12"&gt;[12]&lt;/a&gt; such practices continue to dominate and prejudice the justice of victims of sexual assault and harassment.&lt;a href="#fn13" name="fr13"&gt;[13]&lt;/a&gt; The examination of the victim’s sexual history in court is an unwarranted intrusion into their privacy through public disclosure of the sexual history and details of her sexual life, which causes potential embarrassment and sexual stereotyping of the victim, especially in a conservative, patriarchal society like in India. With the new amendments, such evidence will not be permitted in a court of law, hence, it will act as a safeguards against defendants attempting to influence the court's decision through disparaging the ‘character’ of the victim, and will protect the disclosure of intimate, personal details like previous sexual encounters of the victim.&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;&lt;b&gt;Conclusion&lt;br /&gt;&lt;/b&gt;Privacy, crime, and safety of women are intricately linked in any legal system. An essential part of the security of citizens is the safety of their privacy and personal information. If any legal system does not protect the privacy — both of body and of information — of its people, there will always be insecurity in such a system. With the recent debates on women’s safety, several crucial privacy and security issues have been raised, such as the criminalization of voyeurism and stalking, which is a huge boost for privacy rights of citizens in India, and it is hopeful that the government will continue the trend of considering privacy issues along when addressing security concerns for the state.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Update to the Criminal Law Amendment Bill 2013 - Penalising Peeping Toms and other privacy issues&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Criminal Law (Amendment) Bill, 2013, was made into law on April 3, 2013. Several provisions under the Act differ from the provisions in the ordinance. Under the Act, unlike in the Ordinance, the terms or watches or spies on a person in a manner that results in a fear of violence or serious  alarm or distress in the mind of such person, or interferes with the mental peace of such person are not included as a part of the offence  of stalking. Hence, the offence is limited to the physical act of  following or contacting a person, provided that there has been a clear  sign of disinterest, or to monitoring the use by a woman of the internet, email or any other forms of electronic communication.  &lt;br /&gt;&lt;br /&gt;Hence, from the confusing language of the provision, it would seem that the offence of stalking related to monitoring of activities of a woman is restricted to the monitoring of online communications, and not physical acts. The caveat of such monitoring having to cause serious alarm, distress or interference with the mental peace of the victim is also removed. The removal of unwaranted intrusion through watching or spying of a person, and indeed, the removal of any subjective test to determine the effect of stalking is a departure from stalking provisions accross the world, and is a setback for individual privacy, because stalking per se is a privacy offence, relating not only to the physical interference but also the mental harassment it causes to the victims.&lt;br /&gt;&lt;br /&gt;The provision has also increased the puinishment for the crime in the first offence to upto three years, and subsequently to upto five years. Further, the provisions sought to be included within Section 53A and Section 376 of the Indian Evidence Act are now included in Section 146 of the Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="http://mha.nic.in/pdfs/TheCrimnalLaw030413.pdf"&gt;Link to the Criminal Law (Amendment) Act, 2013&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. Criminal Law (Amendment) Ordinance, 2013, &lt;i&gt;available at &lt;/i&gt;&lt;a class="external-link" href="http://mha.nic.in/pdfs/criminalLawAmndmt-040213.pdf"&gt;http://mha.nic.in/pdfs/criminalLawAmndmt-040213.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. &lt;a class="external-link" href="http://bit.ly/10nMSTT"&gt;http://bit.ly/10nMSTT&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. Anita Gurumurthy and Nivedita Menon, &lt;i&gt;Violence against Women via Cyberspace, &lt;/i&gt;Economic and Political Weekly, 44 (40), 19, (October, 2009).&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. For example, see laws listed &lt;a class="external-link" href="http://bit.ly/126hBpO"&gt;http://bit.ly/126hBpO&lt;/a&gt;&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. Section 66E, The Information Technology Act, 2000: ‘&lt;i&gt;66E. Punishment for violation of privacy.-&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;Whoever, intentionally or knowingly captures, publishes or transmits the image of a private area of any person without his or her consent, under circumstances violating the privacy of that person, shall be punished with imprisonment which may extend to three years or with fine not exceeding two lakh rupees, or with both.&lt;/i&gt;&lt;/p&gt;
&lt;p class="normal"&gt;&lt;i&gt;Explanation - For the purposes of this section--&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(a) “transmit” means to electronically send a visual image with the intent that it be viewed by a person or persons;&lt;br /&gt;&lt;/i&gt;&lt;i&gt;(b) “capture”, with respect to an image, means to videotape, photograph, film or record by any means;&lt;/i&gt;&lt;i&gt;&lt;br /&gt;(c) “private area” means the naked or undergarment clad genitals, pubic area, buttocks or female breast;&lt;br /&gt;&lt;/i&gt;&lt;i&gt;(d) “publishes” means reproduction in the printed or electronic form and making it available for public;&lt;/i&gt;&lt;i&gt;&lt;br /&gt;(e) “under circumstances violating privacy” means circumstances in which a person can have a reasonable expectation that--&lt;/i&gt;&lt;i&gt;(i) he or she could disrobe in privacy, without being concerned that an image of his private area was being captured; or&lt;br /&gt;(ii) any part of his or her private area would not be visible to the public, regardless of whether that person is in a public or private place.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]. Oxford English Dictionary, available at &lt;a class="external-link" href="http://bit.ly/YN2ZvI"&gt;http://bit.ly/YN2ZvI&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;]. Lance Rothenberg, &lt;i&gt;Rethinking Privacy: Peeping Toms, Video Voyeurs, and the failure of criminal law to recognize a reasonable expectation of privacy in the public space, &lt;/i&gt;American University Law Review, 49, 1127, (1999).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr8" name="fn8"&gt;8&lt;/a&gt;]. Section 91J, Crimes Act, 1910: "&lt;i&gt;A person who, for the purpose of obtaining sexual arousal or sexual gratification, observes a person who is engaged in a private act without the consent of the person being observed to being observed for that purpose, and knowing that the person being observed does not consent to being observed for that purpose, is guilty of an offence."&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr9" name="fn9"&gt;9&lt;/a&gt;]. Video Voyeurism Protection Act, 2004.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr10" name="fn10"&gt;10&lt;/a&gt;]. Section 162, Criminal Code of Canada: " (1) Every one commits an offence who, surreptitiously, observes — including by mechanical or electronic means — or makes a visual recording of a person who is in circumstances that give rise to a reasonable expectation of privacy, if&lt;br /&gt;(a) the person is in a place in which a person can reasonably be expected to be nude, to expose his or her genital organs or anal region or her breasts, or to be engaged in explicit sexual activity;&lt;br /&gt;(b) the person is nude, is exposing his or her genital organs or anal region or her breasts, or is engaged in explicit sexual activity, and the observation or recording is done for the purpose of observing or recording a person in such a state or engaged in such an activity; or&lt;br /&gt;(c) the observation or recording is done for a sexual purpose.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr11" name="fn11"&gt;11&lt;/a&gt;]. Section 67, Sexual Offences Act, 2003.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr12" name="fn12"&gt;12&lt;/a&gt;]. &lt;a class="external-link" href="http://bit.ly/10nNDwg"&gt;http://bit.ly/10nNDwg&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr13" name="fn13"&gt;13&lt;/a&gt;]. &lt;a class="external-link" href="http://reut.rs/13CIDXU"&gt;http://reut.rs/13CIDXU&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-criminal-law-amendment-bill-2013'&gt;https://cis-india.org/internet-governance/blog/the-criminal-law-amendment-bill-2013&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>divij</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-12T12:17:06Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/march-2013-bulletin">
    <title>March 2013 Bulletin</title>
    <link>https://cis-india.org/about/newsletters/march-2013-bulletin</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society (CIS) welcomes you to the third issue of its newsletter for the year 2013. In this issue we bring you an overview of our research programs, updates of events organised by us, events we participated in, news and media coverage, and videos of some of our recent events.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;b&gt;Jobs&lt;/b&gt;&lt;br /&gt;CIS invites applications for the posts of &lt;a href="https://cis-india.org/jobs/vacancy-for-developer"&gt;Developer&lt;/a&gt; (NVDA Screen Reader Project), &lt;a href="https://cis-india.org/jobs/programme-officer-access-to-knowledge-and-openness"&gt;Programme Officer&lt;/a&gt; (Access to Knowledge and Openness), and &lt;a href="https://cis-india.org/jobs/programme-officer-internet-governance"&gt;Programme Officer&lt;/a&gt; (Internet Governance). To apply send your resume to &lt;a href="mailto:sunil@cis-india.org"&gt;sunil@cis-india.org&lt;/a&gt; and &lt;a href="mailto:pranesh@cis-india.org"&gt;pranesh@cis-india.org&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;a href="https://cis-india.org/accessibility"&gt;Accessibility&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;CIS is doing two projects in partnership with the &lt;b&gt;Hans Foundation&lt;/b&gt;. One of this is to create a national resource kit of state-wise laws, policies and programmes on issues relating to persons with disabilities in India and another is for developing a screen reader and text-to- speech synthesizer for Indian languages. CIS is also working with the World Blind Union and many other organisations to develop a Treaty for the Visually Impaired helped by the WIPO:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;National Resource Kit for Persons with Disabilities&lt;/b&gt;&lt;br /&gt;Anandhi Viswanathan from CIS and Manojna Yeluri from the Centre for Law and Policy Research are working in this project. Draft chapters have been published. Feedback and comments are invited from readers for the chapters on Lakshadweep, Meghalaya and Uttar Pradesh:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/accessibility/blog/national-resource-lakshadweep-chapter-call-for-comments"&gt;The Lakshadweep Chapter&lt;/a&gt; (by Anandhi Viswanathan, March 25, 2013): The union territory of Lakshadweep has not passed any legislation for persons with disabilities, but implements the provisions under the central laws. The benefits currently available to persons with disabilities in Lakshadweep include disability pension, unemployment allowance and grant for setting up kiosks.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/accessibility/blog/national-resource-kit-the-meghalaya-chapter-call-for-comments"&gt;The Meghalaya Chapter&lt;/a&gt; (by Manojna Yeluri, March 25, 2013): Meghalaya is one of the few north-eastern states, which has appointed a Commissioner for Disabilities. Most of the schemes and benefits given to persons with disabilities in Meghalaya are under centrally sponsored schemes. Very few schemes are initiated by the state government. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/accessibility/blog/national-resource-uttar-pradesh-chapter-call-for-comments"&gt;The Uttar Pradesh Chapter&lt;/a&gt; (by Manojna Yeluri, March 31, 2013): The Government of Uttar Pradesh has established shelter homes and vocational training centres in several parts of the states — most recently in Meerut, Bareilly and Gorakhpur. It has also undertaken to finance nearly 4340 corrective surgeries for polio across nine cities of Uttar Pradesh. It also intends to start several projects in 2013. These include the establishment of a Braille Press in order to produce Braille books, magazines and other study material.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Resources&lt;br /&gt;&lt;/b&gt;We now have a new section on our website which contains all government notifications, RTI applications, and accessibility related resources: cases, statutes, etc. The following were published earlier this month:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/accessibility/resources/information-about-schemes-for-disabled-haryana"&gt;Information about Schemes for Disabled Persons in Haryana&lt;/a&gt; We received this notification on schemes and policies for persons with disabilities from the Government of Haryana.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/accessibility/resources/haryana-notification"&gt;Haryana Government Notification&lt;/a&gt; (Hindi version): The notification that we received from the state government was in Hindi. We will put up the English translation soon.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/accessibility/resources/west-bengal-govt-notifications"&gt;West Bengal (Govt) Notifications&lt;/a&gt;: We received a series of notifications from the West Bengal Government from its various departments such as finance, higher education, transport, health and family welfare, labour, land and land reforms, panchayats and rural development, etc. &lt;a href="https://cis-india.org/accessibility/resources/west-bengal-notifications.zip"&gt;OCR versions&lt;/a&gt; of the same have been published.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/accessibility/resources/lakshadweep-govt-notifications"&gt;Lakshadweep (Govt) Notifications&lt;/a&gt;: Notifications received from the Lakshadweep Government including guidelines for functioning of KIOSKS, grant of unemployment allowance and special jobs to persons with disabilities, issuing identity card to persons with disabilities for availing government benefits, etc., are published. &lt;a href="https://cis-india.org/accessibility/resources/lakshadweep-ocr-notifications"&gt;OCR versions&lt;/a&gt; have also been put up.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Event Participated In&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/accessibility/blog/discussion-on-intercept-between-uncrpd-and-cedaw"&gt;A Discussion on Intercept between UNCRPD &amp;amp; CEDAW&lt;/a&gt; (organized by the Shanta Memorial Institute of Rehabilitation – Odisha, CBR Network and Mitra Jyoti, Bangalore, Karnataka, February 4, 2013): Anandhi Viswanathan participated in this event. &lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;a href="https://cis-india.org/about/a2k"&gt;Access to Knowledge&lt;/a&gt; and &lt;a href="https://cis-india.org/openness"&gt;Openness&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The Wikimedia Foundation &lt;a href="https://cis-india.org/a2k/access-to-knowledge-program-plan"&gt;awarded&lt;/a&gt; CIS a two year grant of INR 26,000,000 to support and develop the growth of Indic language communities and projects by community collaborations and partnerships. This is being carried out by the Access to Knowledge team based in Delhi. CIS is also doing a project (Pervasive Technologies) on examining the relationship between production of pervasive technologies and intellectual property. CIS also promotes openness including open government data, open standards, open access, and free/libre/open source software through its Openness programme.&lt;/p&gt;
&lt;h3&gt;&lt;a href="https://cis-india.org/a2k/access-to-knowledge-program-plan"&gt;&lt;b&gt;Wikipedia&lt;/b&gt;&lt;/a&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Beginning from September 1, 2012, Wikimedia Foundation &lt;a href="https://cis-india.org/a2k/access-to-knowledge-program-plan"&gt;awarded&lt;/a&gt; CIS a two-year grant of INR 26,000,000 to support and develop free knowledge in India. The &lt;a href="http://meta.wikimedia.org/wiki/Access_To_Knowledge/Team" title="Access To Knowledge/Team"&gt;A2K team&lt;/a&gt; consists of four members based in Delhi: &lt;a href="https://cis-india.org/about/people/our-team"&gt;T. Vishnu Vardhan&lt;/a&gt;, &lt;a href="https://cis-india.org/about/newsletters/people/our-team"&gt;Nitika Tandon&lt;/a&gt;, &lt;a href="https://cis-india.org/about/newsletters/people/our-team"&gt;Subhashish Panigrahi&lt;/a&gt; and &lt;a href="https://cis-india.org/about/newsletters/people/our-team"&gt;Noopur Raval&lt;/a&gt;, and one team member &lt;a href="https://cis-india.org/about/people/our-team"&gt;Dr. U.B. Pavanaja&lt;/a&gt; who is working from Bangalore office.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Indic Wikipedia Visualisation Project&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog/indic-wikipedia-visualisation-project-visualising-basic-parameters"&gt;Visualising Basic Parameters&lt;/a&gt; (by Sajjad Anwar and Sumandro Chattapadhyay, March 26, 2013): Sajjad and Sumandro bring you a visualisation of the growth of Indic Wikipedia in this first post on Indic Wikipedia Visualisation project. They look into the different aspects of the past and present activities of Indic Wikipedias, and divide the visualisation into three different focus areas: (1) basic parameters, (2) geographic patterns of edits, and (3) exploring the topics that receives the greatest number of edits. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Events Organised&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog/wikipedia-session-at-bits-goa"&gt;Introductory Wikipedia session at BITS Goa&lt;/a&gt; (organised by CIS, Birla Institute of Technology &amp;amp; Science, Pilani, Goa, March 7, 2013). The Access to Knowledge team was invited by Nikhil Dixit from BITS to organise a Wikipedia editing session. Nitika Tandon led the session on IP editing. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/events/kannada-wikipedia-workshop"&gt;Kannada Wikipedia Workshop&lt;/a&gt; (organised by CIS, Institution of Engineers, JLB Road, Mysore, March 24, 2013). Dr. U.B. Pavanaja led this workshop.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Events Co-organised&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog/wiki-womens-day-in-goa"&gt;Wiki Women's Day in Goa&lt;/a&gt; (organised by the Wikimedia India Chapter and CIS, Nirmala Institute of Education, Panaji, Goa, March 8, 2013). Nitika Tandon participated in this workshop held on International Working Women's Day, and shares the developments in this report.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/events/wikipedia-workshop-for-kannada-science-writers"&gt;Wikipedia Workshop for Kannada Science Writers&lt;/a&gt; (organised by Wikimedia India Chapter, Karnataka Rajya Vijnana Parishath and CIS, Karnataka Rajya Vijnana Parishath Conference Hall, Banashankari 2nd Stage, Bangalore, March 17, 2013). Dr. U.B. Pavanaja participated in the event.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Upcoming Event&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/events/telegu-wiki-mahotsavam-2013"&gt;Telugu Wiki Mahotsavam 2013&lt;/a&gt; (co-organised with the Telegu Wikipedia community, Hyderabad, April 9 to 11, 2013). Vishnu Vardhan is participating in this event as a speaker. A public event will be held on April 11 from 5.00 p.m. to 8.00 p.m. at Golden Threshold (Sarojini Naidu's house) in Hyderabad. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Events Participated&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/wikipedia-womens-workshop-bangalore-2013"&gt;Wikipedia Women's Workshop Bangalore 2013&lt;/a&gt; (organised by Wikimedia India, Servelots Infotech, Jayanagar, Bangalore, March 8, 2013). The event was covered by Kannada Prabha on March 9, 2013. Dr. U.B. Pavanaja participated in the event.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/wikipedia-at-avenir"&gt;Wikipedia at Avenir&lt;/a&gt; (organised by the Wikipedia community, Netaji Subhash Engineering College, Kolkata, West Bengal, March 11, 2013). CIS supported this event. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Event Report from Other Organisations&lt;/b&gt;&lt;br /&gt;Wikipedia Community members helped the Higher Education Innovation and Research Applications Programme (HEIRA) of CSCS Bangalore to organize a day-long workshop on ‘Digital Literacy’ at Ahmednagar College, Ahmednagar, Maharasthra on January 17, 2013. Tanveer Hasan of HEIRA shares with us the developments in &lt;a href="https://cis-india.org/openness/blog/ahmednagar-marathi-wikipedia-workshop-report"&gt;this report&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;Other &lt;/b&gt;&lt;a href="https://cis-india.org/openness"&gt;&lt;b&gt;Openness&lt;/b&gt;&lt;/a&gt;&lt;b&gt; Updates&lt;/b&gt;&lt;/h3&gt;
&lt;p&gt;&lt;b&gt;Event Report&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog/iraqi-public-data-scenario-workshop"&gt;Iraqi Public Data Scenario Workshop: A Summary&lt;/a&gt; (by Sumandro Chattapadhyay, March 26, 2013): A workshop on public data was conducted by Sunil Abraham and Sumandro Chattapadhyay for the officials of the Government of Iraq. It was organized by UNDP Iraq in Amman, Jordan from October 18 to 23, 2012. Sumandro Chattapadhyay shares with us the developments from the workshop held over five days. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Event Participated&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/open-data-camp-2013"&gt;Open DataCamp - 2013&lt;/a&gt; (organized by Open Data Camp, Dharmaram Vidya Kshetram (inside Christ University Campus), Dairy Circle, Bangalore, March 2 and 3, 2013): Sunil Abraham was a panelist.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;HasGeek&lt;/b&gt;&lt;br /&gt;HasGeek creates discussion spaces for geeks and has organised conferences like the &lt;a href="http://fifthelephant.in/2012/"&gt;Fifth Elephant&lt;/a&gt;, &lt;a href="http://droidcon.in/2011"&gt;Droidcon India 2011&lt;/a&gt;, &lt;a href="http://androidcamp.hasgeek.com/"&gt;Android Camp&lt;/a&gt;, etc. HasGeek is supported by CIS and works from the CIS office in Bengaluru.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Upcoming Events&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://pigworkshop.fifthelephant.in/"&gt;Pig Workshop&lt;/a&gt; (organized by HasGeek, Alchemy Solutions, Domlur, Bangalore, 9.00 a.m. to 6.00 p.m.): A workshop on how to use Pig for mining useful information from data. It is open to programmers who have a background in Java programming, some familiarity with Hadoop and MapReduce algorithms, and have worked with large chunks of data.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/fifth-elephant-2013"&gt;The Fifth Elephant 2013&lt;/a&gt; (organized by HasGeek, July 11 to 13, 2013, NIMHANS Convention Centre, Bangalore). &lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;a href="https://cis-india.org/about/internet-governance"&gt;Internet Governance&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The Internet Governance programme conducts research around the various social, technical, and political underpinnings of global and national Internet governance, and includes online privacy, freedom of speech, and Internet governance mechanisms and processes. Currently, CIS is doing a project with &lt;b&gt;Privacy International&lt;/b&gt;, London to facilitate research and events around surveillance, and freedom of speech and expression.&lt;/p&gt;
&lt;h3&gt;Privacy&lt;/h3&gt;
&lt;p&gt;&lt;b&gt;Policy&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/draft-human-dna-profiling-bill-april-2012"&gt;Draft Human DNA Profiling Bill&lt;/a&gt; (April 2012): High Level Concerns (by Elonnai Hickok, March 12, 2013). The post examines the high level concerns that CIS has with the April 2012 draft of the Bill.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/human-dna-profiling-bill-analysis"&gt;Human DNA Profiling Bill 2012 Analysis&lt;/a&gt; (by Jeremy Gruber, Council for Responsible Genetics, US, March 19, 2013). Jeremy provides an analysis of the Human DNA Profiling Bill, 2012. He says that India’s updated 2012 Human DNA Profiling Bill offers largely superficial changes from its predecessor, the Draft DNA Profiling Bill, 2007.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy-protection-bill-2013-citizens-draft"&gt;The Privacy (Protection) Bill 2013: A Citizen's Draft&lt;/a&gt; (by Bhairav Acharya, March 26, 2013).  Bhairav Acharya has drafted the Privacy (Protection) Bill 2013. It contains provisions that speak to data protection, interception, and surveillance and also establishes the powers and functions of the Privacy Commissioner, and lays out offenses and penalties for contravention of the Bill. The Bill represents a citizen's version of possible privacy legislation for India, and will be shared with key stakeholders including civil society, industry, and government.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Upcoming Events&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/events/privacy-round-table"&gt;A Privacy Round Table in Delhi&lt;/a&gt; (organized by CIS and Federation of Indian Chambers of Commerce and Industry, FICCI Federation House, Tansen Marg, New Delhi, April 3, 2013). &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/events/privacy-round-table-in-bangalore"&gt;A Privacy Round Table in Bangalore&lt;/a&gt; (organized by CIS and Federation of Indian Chambers of Commerce and Industry, Jayamahal Palace, Jayamahal Road, Bangalore, April 20, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Event Organized&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/events/analyzing-draft-human-dna-profiling-bill"&gt;Analyzing the Draft Human DNA Profiling Bill 2012&lt;/a&gt; (organized by the Centre for Internet and Society, Bangalore, March 1, 2013): Maria Xynou shares &lt;a href="https://cis-india.org/internet-governance/blog/summary-of-cis-workshop-on-dna-profiling-bill-2012"&gt;a summary of the workshop&lt;/a&gt; in this report.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Events Participated In&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/global-partners-meeting-london"&gt;Global Partners Meeting @ London&lt;/a&gt; (organized by Privacy International, London School of Economics and Political Science, March 22 – 25, 2013). Sunil Abraham and Malavika Jayaram participated in the event.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/global-asc-upenn-events-indias-civil-liberties-crisis"&gt;India’s Civil Liberties Crisis: Of Bans, Blocks, Bullying and Biometrics&lt;/a&gt; (organized by the Center for Global Communication Studies, Annenberg School of Communication, University of Pennsylvania, Philadelphia, March 28, 2013). Malavika Jayaram participated as a speaker.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/future-of-privacy-in-india-on-april-5-2013-at-oberoi-hotel-new-delhi"&gt;Future of Privacy in India&lt;/a&gt; (organized by DSCI and ICOMP, Oberoi Hotel, New Delhi, April 5, 2013). Sunil Abraham is a speaker at this event.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Blog Posts&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/hacking-without-borders-the-future-of-artificial-intelligence-and-surveillance"&gt;Hacking without borders: The future of artificial intelligence and surveillance&lt;/a&gt; (by Maria Xynou, March 15, 2013). In this post, Maria looks at some of DARPA´s artificial intelligence surveillance technologies in regards to the right to privacy and their potential future use in India.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/driving-in-the-surveillance-society-cameras-rfid-black-boxes"&gt;Driving in the Surveillance Society: Cameras, RFID tags and Black Boxes...&lt;/a&gt; (by Maria Xynou, March 26, 2013). Maria examines red light cameras, RFID tags and black boxes used to monitor vehicles in India.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/microsoft-releases-first-report-on-data-requests-by-law-enforcement-agencies"&gt;Microsoft Releases its First Report on Data Requests by Law Enforcement Agencies around the World&lt;/a&gt; (by Maria Xynou, March 27, 2013). CIS presents Microsoft´s report on law enforcement requests, with a focus on data requested by Indian law enforcement agencies.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/the-criminal-law-amendment-bill-2013"&gt;The Criminal Law Amendment Bill 2013 — Penalising 'Peeping Toms' and Other Privacy Issues&lt;/a&gt; (by Divij Joshi, March 31, 2013). The pending amendments to the Indian Penal Code, if passed in their current format, would be a huge boost for individual physical privacy by criminalising stalking and sexually-tinted voyeurism and removing the ambiguities in Indian law which threaten the privacy and dignity of individuals.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;IT Act&lt;/h3&gt;
&lt;p&gt;&lt;b&gt;Featured Blog Post&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/cis-welcomes-standing-committee-report-on-it-rules"&gt;CIS Welcomes Standing Committee Report on IT Rules&lt;/a&gt; (by Pranesh Prakash, March 27, 2013). CIS welcomes the report by the Standing Committee on Subordinate Legislation, in which it has lambasted the government and has recommended that the government amend the Rules it passed in April 2011 under section 79 of the Information Technology Act. The post was quoted in: &lt;a href="http://articles.timesofindia.indiatimes.com/2013-03-28/internet/38098800_1_rules-self-regulation-pranesh-prakash"&gt;The Times of India&lt;/a&gt; (March 28, 2013), &lt;a href="http://www.thestatesman.net/index.php?option=com_content&amp;amp;view=article&amp;amp;id=449591&amp;amp;catid=73"&gt;The Statesman&lt;/a&gt; (March 28, 2013), &lt;a href="http://articles.economictimes.indiatimes.com/2013-03-28/news/38099676_1_google-chairman-eric-schmidt-government-pranesh-prakash"&gt;Economic Times&lt;/a&gt; (March 28, 2013),  &lt;a href="http://www.dqindia.com/dataquest/news/186012/cis-welcomes-panels-anti-govt-stand-it-rules"&gt;Data Quest&lt;/a&gt; (March 28, 2013),  and &lt;a href="http://www.thehindu.com/news/national/clarify-and-define-terms-in-it-rules-panel-tells-govt/article4570291.ece"&gt;The Hindu&lt;/a&gt; (April 1, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Submissions&lt;br /&gt;&lt;/b&gt;Bhairav Acharya, on behalf of CIS submitted comments to the Committee on Subordinate Legislation of the 15&lt;sup&gt;th&lt;/sup&gt; Lok Sabha for the following rules:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/comments-on-it-electronic-service-delivery-rules-2011"&gt;Comments on the Information Technology (Electronic Service Delivery) Rules, 2011&lt;/a&gt;. The Rules were notified by the Central Government in the Gazette of India vide Notification GSR 316(E) on April 11, 2011.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/comments-on-the-it-reasonable-security-practices-and-procedures-and-sensitive-personal-data-or-information-rules-2011"&gt;Comments on the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011&lt;/a&gt;. The Rules were notified by the Central Government in the Gazette of India vide Notification GSR 313(E) on April 11, 2011.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/comments-on-the-it-guidelines-for-cyber-cafe-rules-2011"&gt;Comments on the Information Technology (Guidelines for Cyber Cafe) Rules, 2011&lt;/a&gt;. The Rules were notified by the Central Government in the Gazette of India vide Notification GSR 315(E) on April 11, 2011.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Note: &lt;i&gt;The above rules were submitted earlier but published on our website only recently&lt;/i&gt;.&lt;/p&gt;
&lt;h3&gt;Unique ID Project&lt;/h3&gt;
&lt;p&gt;&lt;b&gt;Event Organized&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/events/uid-and-npr"&gt;Unique Identity Number (UID), National Population Register (NPR), and Governance&lt;/a&gt; (organized by CIS and Say No to UID Campaign, TERI, Bangalore, March 2, 2013):  CIS interviewed Usha Ramanathan and Anant Maringanti. Watch the &lt;a href="https://cis-india.org/internet-governance/blog/workshop-on-the-uid-and-npr"&gt;videos&lt;/a&gt; uploaded in this blog post by Maria Xynou. This was covered in &lt;a href="https://cis-india.org/news/newzfirst-march-3-2013-people-should-resist-enforcement-of-uid-scheme-say-experts"&gt;newzfirst&lt;/a&gt; on March 3, 2013 and in the &lt;a href="https://cis-india.org/news/the-hindu-march-3-2013-uid-has-no-legal-sanctity"&gt;Hindu&lt;/a&gt; on March 3, 2013.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Interview&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/uid-and-npr-a-background-note"&gt;Unique Identification Scheme (UID) &amp;amp; National Population Register (NPR), and Governance&lt;/a&gt; (by Elonnai Hickok, March 14, 2013). The post examines the UID, NPR and Governance as it exists in India. A video on the UID interview Questions and Answers is published.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;News and Media&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/zdnet-mahesh-sharma-march-14-2013-indian-id-crisis-unveils-aadhar-doubts"&gt;Indian ID crisis unveils Aadhaar doubts&lt;/a&gt; (ZDNet, March 14, 2013). Sunil Abraham is quoted. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/aeg-india-march-16-2013-new-dollar-one-billion-ric-project-casts-doubts-on-aadhar"&gt;New $1 Billion RIC Project Casts Doubts on Aadhaar&lt;/a&gt; (AEG India, March 16, 2013). Sunil Abraham is quoted. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Blog Entry&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-biometric-identification-programs-and-privacy-concerns"&gt;India's Biometric Identification Programs and Privacy Concerns&lt;/a&gt; (by Divij Joshi, March 31, 2013). &lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Free Speech and Expression&lt;/h3&gt;
&lt;p&gt;&lt;b&gt;News and Media&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/openmagazine-article-business-prashant-reddy-march-2-2013-foreign-funding-of-ngos"&gt;Foreign Funding of NGOs&lt;/a&gt; (by Prashant Reddy, Open Magazine, March 2, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/rt-march-1-2013-icelands-proposed-porn-ban"&gt;Iceland’s proposed porn ban ‘like repression in Iran, N. Korea’ – activists&lt;/a&gt; (RT, March 1, 2013). Sunil Abraham is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/wsj-march-4-2013-dhanya-ann-thoppil-chidambaram-to-talk-budget-on-google-hangout"&gt;Chidambaram to Talk Budget on Google+ Hangout&lt;/a&gt; (by Dhanya Ann Thoppil, Wall Street Journal, March 4, 2013). Sunil Abraham is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/livemint-ruchita-saxena-march-13-2013-responding-to-govt-requests-is-a-challenge-for-online-firms"&gt;Responding to govt requests is a challenge for online firms: Colin Maclay&lt;/a&gt; (LiveMint, March 13, 2013). Colin M. Maclay, managing director of Berkman Center for Internet and Society at Harvard mentioned CIS.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/afp-march-18-2013-indian-police-set-up-lab-to-monitor-social-media"&gt;Indian police set up lab to monitor social media&lt;/a&gt; (originally published by &lt;a href="http://www.google.com/hostednews/afp/article/ALeqM5iVMgMkOgpXOTaon2VoLdvu2x5oyg?docId=CNG.6d8f555d3498b94bac2fb1046fc7d3a6.4a1"&gt;AFP&lt;/a&gt;, March 18, 2013, and also carried in &lt;a href="http://www.globalpost.com/dispatch/news/afp/130318/indian-police-set-lab-monitor-social-media"&gt;Global Post&lt;/a&gt; on the same day). Sunil Abraham is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/wsj-r-jai-krishna-march-20-2013-namaste-mr-eric-schmidt"&gt;Namaste, Mr. Eric Schmidt&lt;/a&gt; (by R. Jai Krishna, Wall Street Journal, March 20, 2013). Sunil Abraham is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/times-of-india-ishan-srivastava-march-28-2013-parliament-panel-blasts-govt-over-ambiguous-internet-laws"&gt;Parliament panel blasts govt over ambiguous internet laws&lt;/a&gt; (by Ishan Srivastava, The Times of India, March 28, 2013). Pranesh Prakash is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/times-of-india-atul-sethi-march-30-2013-what-if-the-net-shut-down-for-a-few-days"&gt;What if the Net shut down for a few days&lt;/a&gt; (by Atul Sethi, The Times of India, March 30, 2013). Sunil Abraham is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/the-times-uk-jerome-starkey-francis-elliott-david-brown-march-21-2013-press-controls-send-wrong-message-to-rest-of-world"&gt;Press controls ‘send wrong message to rest of world’&lt;/a&gt; (by Jerome Starkey from Johannesburg, Francis Elliott from Delhi and David Brown, The Times, UK). &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Event Organized&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/events/freedom-song-film-screening-and-discussion"&gt;Freedom Song: Film Screening and Discussion&lt;/a&gt; (IIHS Bangalore City Campus, March 21, 2013). Freedom Song, a documentary film produced by the Public Service Broadcasting Trust and directed by Paranjoy Guha Thakurta and Subi Chaturvedi was screened. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Events Participated In&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://www.iijnm.org/iijnmnews-rept.html"&gt;Is Social Media Incredible?&lt;/a&gt; (organized by Indian Institute of Journalism &amp;amp; New Media, Bangalore, March 2, 2013). Snehashish Ghosh participated in a panel discussion. The New Indian Express &lt;a href="https://cis-india.org/news/new-indian-express-march-4-2013-social-media-undermining-journalistic-credibility"&gt;published a post-event report&lt;/a&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/rethinking-the-internet"&gt;Rethinking the Internet: The Way Forward&lt;/a&gt; (organized by Telecom Italia and Financial iTimes, Telecom Italia Future Centre, Italy, March 21 – 22, 2013). Pranesh Prakash participated in this event.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Others&lt;/h3&gt;
&lt;p&gt;&lt;b&gt;Events Organised&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/dml-hub-net-dml-2013"&gt;DML 2013: Fourth Annual Conference&lt;/a&gt; (co-organised by CIS and Digital Media &amp;amp; Learning Research Hub Central, Sheraton Chicago Hotel &amp;amp; Towers - Chicago, Illinois, March 14 – 16, 2013). We had a special track that ran through the conference on "Whose Change Is It Anyway? Futures, Youth, Technology And Citizen Action In The Global South (And The Rest Of The World)". Noopur Raval was one of the 16 presenters that we had selected on the tracks. Nishant Shah was one of the members in the &lt;a href="http://http/dml2013.dmlhub.net/"&gt;Conference Committee&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Blog Posts&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/wgig-8-stock-taking-mapping-and-going-forward"&gt;WGIG+8: Stock-Taking, Mapping, and Going Forward&lt;/a&gt; (Fontenoy Building, conference room # 7, UNESCO Headquarters, Paris, February 27, 2013). Pranesh Prakash was the moderator for the session. A summary of the discussion has been published.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/dns-singularity-of-icann-and-the-gold-rush"&gt;What’s In a Name? — DNS Singularity of ICANN and the Gold Rush&lt;/a&gt; (by Sharath Chandra Ram, March 31, 2013). March 2013 being the 28th birthday of the first ever registered Internet domain as well as the exigent launch of the Trademark Clearing House disguised as a milestone in rights protection by ICANN for its new gTLD program, Sharath Chandra Ram, dissects the transitory role of ICANN from being a technical outfit to the Boardroom Big Brother of Internet Governance.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/bensonsamuel-an-introduction-to-bitfilm-and-bitcoin-in-bangalore"&gt;An Introduction to Bitfilm &amp;amp; Bitcoin in Bangalore, India&lt;/a&gt; (by Benson Samuel, March 12, 2013). Video of the event organized by CIS on January 23, 2013 is published in this blog post.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a href="https://cis-india.org/telecom/knowledge-repository-on-internet-access"&gt;Knowledge Repository on Internet Access&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;CIS in partnership with the Ford Foundation is executing a project on Internet Access. It covers the history of the internet, technologies involved, principle and values of internet access, broadband market and universal access and will touch upon various polices and regulations which has an impact on internet access and bodies and mechanism which are responsible for formulation policies related to internet access. The blog posts and modules will be published in a new website: &lt;a href="http://www.internet-institute.in"&gt;www.internet-institute.in&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Upcoming Event&lt;/b&gt;&lt;br /&gt;We are hosting an “Institute on Internet and Society” in collaboration with the Ford Foundation India, which is to be held from June 8, 2013 to June 14, 2013. Call for registration and relevant details will be announced soon on our website.&lt;/p&gt;
&lt;p&gt;The following units have been published:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/telecom/knowledge-repository-on-internet-access/internet-protocols"&gt;Internet Protocols&lt;/a&gt; (by Srividya Vaidyanathan, March 18, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/telecom/knowledge-repository-on-internet-access/how-email-works"&gt;How email works, how do you get your email? Email Protocols&lt;/a&gt; (SMTP, POP, IMAP), SPAM/Phishing (by Srividya Vaidyanathan, March 19, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/telecom/knowledge-repository-on-internet-access/internet-corporation-for-assigned-names-and-numbers"&gt;Internet Corporation for Assigned Names and Numbers&lt;/a&gt; (by Snehashish Ghosh, March 19, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/telecom/knowledge-repository-on-internet-access/international-telecommunication-union"&gt;ITU sectors — ITU-R, ITU-T, ITU-D, etc&lt;/a&gt;. (by Snehashish Ghosh, March 27, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/telecom/knowledge-repository-on-internet-access/wcit-2012"&gt;World Conference on International Telecommunications 2012&lt;/a&gt; (by Snehashish Ghosh, March 29, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;a href="https://cis-india.org/about/telecom"&gt;Telecom&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;CIS is involved in promoting access and accessibility of telecommunications services and resources and has provided inputs to ongoing policy discussions and consultation papers published by TRAI. It has prepared reports on unlicensed spectrum and accessibility of mobile phones for persons with disabilities and also works with the USOF to include funding projects for persons with disabilities in its mandate:&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Newspaper Column&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/telecom/blog/organizing-india-blogspot-shyam-ponappa-march-8-2013-are-indias-glory-days-over"&gt;Are India's Glory Days Over?&lt;/a&gt; (by Shyam Ponappa, &lt;a href="http://organizing-india.blogspot.in/2013/03/are-indias-glory-days-over.html"&gt;Organizing India Blogspot&lt;/a&gt;, March 8, 2013, originally published in the &lt;a href="http://www.business-standard.com/article/opinion/are-india-s-glory-days-over-113030600625_1.html"&gt;Business Standard&lt;/a&gt;, March 6, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;a href="https://cis-india.org/digital-natives"&gt;Digital Natives&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Digital Natives with a Cause? examines the changing landscape of social change and political participation in light of the role that young people play through digital and Internet technologies, in emerging information societies. Consolidating knowledge from Asia, Africa and Latin America, it builds a global network of knowledge partners who critically engage with discourse on youth, technology and social change, and look at alternative practices and ideas in the Global South:&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Events Participated In&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/video-vortex-9-net-re-assemblies-of-video"&gt;Video Vortex # 9 Re:assemblies of Video&lt;/a&gt; (organized by the Institute of Network Cultures, Post Media Lab, Moving Image Lab, Leuphana, et.al, February 28 – March 2, 2013). Nishant Shah gave the &lt;a href="http://videovortex9.net/ai1ec_event/reassemblies/?instance_id=292"&gt;key note&lt;/a&gt;. Videos of the event are published.&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;a href="https://cis-india.org/raw/digital-humanities"&gt;Digital Humanities&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;From 2012 to 2015, the Researchers @ Work series is focusing on building research clusters in the field of Digital Humanities. We organised the first Habits of Living workshops in Bangalore last year. The next workshop is being held in Brown University&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Event Co-organised&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/raw/digital-humanities/blogs/habits-of-living/habits-of-living-networked-affects-glocal-effects"&gt;Habits of Living: Networked Affects, Glocal Effects&lt;/a&gt; (co-organised with Brown University, March 21 – 23, 2013, Brown University, Rhode Island). Nishant Shah was a &lt;a href="http://www.brown.edu/Conference/Habits/"&gt;speaker&lt;/a&gt; at this event. He made a presentation on network ontologies.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Event Participated&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/trans-review-korean-trans-cine-media-in-global-contexts"&gt;Korean Trans Cine-Media in Global Contexts: Asia and the World&lt;/a&gt; (organized by Trans-Asia Screen Culture Institute, Cinema Studies, Korean National University of Arts, Korean Film Archive and Tsubouchi Memorial Theatre Museum, Waseda University, Seoul, March 27 – 29, 2013). Nishant Shah was a speaker at this event. He spoke on "The Asian Intercourse: Reimagining the Inter-Asia moment through ‘net-porn’ in networks".&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;a href="http://cis-india.org/about/newsletters/"&gt;About CIS&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and Society is a non-profit research organization that works on policy issues relating to freedom of expression, privacy, accessibility for persons with disabilities, access to knowledge and IPR reform, and openness (including open government, FOSS, open standards, etc.), and engages in academic research on digital natives and digital humanities.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Follow us elsewhere&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Get short, timely messages from us on &lt;a href="https://twitter.com/cis_india"&gt;Twitter&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Join the CIS group on &lt;a href="http://www.facebook.com/groups/28535315687/"&gt;Facebook&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Visit us at &lt;a href="https://cis-india.org/"&gt;http://cis-india.org&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Support Us&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Please help us defend consumer / citizen rights on the Internet! Write a cheque in favour of ‘The Centre for Internet and Society’ and mail it to us at No. 194, 2nd ‘C’ Cross, Domlur, 2nd Stage, Bengaluru – 5600 71.&lt;/p&gt;
&lt;h3&gt;Request for Collaboration&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;We invite researchers, practitioners, and theoreticians, both organisationally and as individuals, to collaboratively engage with Internet and society and improve our understanding of this new field. To discuss the research collaborations, write to Sunil Abraham, Executive Director, at &lt;a href="mailto:sunil@cis-india.org"&gt;sunil@cis-india.org&lt;/a&gt; or Nishant Shah, Director – Research, at &lt;a href="mailto:nishant@cis-india.org"&gt;nishant@cis-india.org&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;CIS is grateful to its donors, Wikimedia Foundation, Ford Foundation, Privacy International, UK, Hans Foundation and the Kusuma Trust which was founded by Anurag Dikshit and Soma Pujari, philanthropists of Indian origin, for its core funding and support for most of its projects.&lt;/i&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/march-2013-bulletin'&gt;https://cis-india.org/about/newsletters/march-2013-bulletin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital Humanities</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2013-04-14T11:45:29Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/indias-biometric-identification-programs-and-privacy-concerns">
    <title>India's Biometric Identification Programs and Privacy Concerns</title>
    <link>https://cis-india.org/internet-governance/blog/indias-biometric-identification-programs-and-privacy-concerns</link>
    <description>
        &lt;b&gt;The invasiveness of individual identification coupled with the fallibility of managing big data which biometric identification presents poses a huge risk to individual privacy in India.
&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;Divij Joshi is a 2nd year at NLS. He is interning with the Centre for Internet and Society for the privacy project. &lt;em&gt;This research was undertaken as part of the 'SAFEGUARDS' project that CIS is undertaking with Privacy International and IDRC&lt;/em&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;Introduction&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Biometric technology looks to be the way ahead for the Indian government in its initiatives towards identification. From the Unique Identity Scheme (Aadhaar) to the National Population Register and now to Election ID’s, [1] biometric identification seems to have become the government’s new go-to solution for all kinds of problems. Biometrics prove to be an obvious choice in individual identification schemes – it’s easiest to identify different individuals by their faces and fingerprints, unique and integral aspects of individuals – yet, the unflinching optimism in the use of biometric technology and the collection of biometric data on a massive scale masks several concerns regarding compromises of individual privacy.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;‘Big Data’ and Privacy Issues&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Biometric data is going to be collected under several existing and proposed identification schemes of the government, from the Centralized Identities Data Register of the UID to the draft DNA Profiling Bill which seeks to improve criminal forensics and identification. With the completion of the biometric profiling under the UID, the Indian government will have the largest database of personal biometric data in the world. [3] With plans for the UID to be used for several different purposes — as a ration card, for opening a banking account, for social security and healthcare and several new proposed uses emerging everyday,&lt;a name="fr1" href="#fn1"&gt;[1]&lt;/a&gt; the creation of ‘Big Data’ becomes possible. ‘Big Data’ is characterized by the volume of information that is produced, the velocity by which data is produced, the variety of data produced and the ability to draw new conclusions from an analysis of the data.&lt;a name="fr2" href="#fn2"&gt;[2]&lt;/a&gt; The UID will generate “Big Data” as it is envisioned that the number will be used in every transaction for any platform that adopts it — for all of the 1.2 billion citizens of India. In this way the UID is different any other identity scheme in India, where the identifier is used for a specific purpose at a specific point of time, by a specific platform, and generates data only in connection to that service. Though the creation of “Big Data” through the UID could be beneficial through analysing data trends to target improved services, for example, at the same time it can be problematic in case of a compromise or breach, or if generated information is analyzed to draw new and unintended conclusions about individuals without their consent, and using information for purposes the individuals did not mean for it to be used.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Biometric ID and Theft of Private Data&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The government has touted identification schemes such as the UID and NPR as a tool to tackle rural poverty, illegal immigration and national security issues and with this as the premise, the concerns about privacy seem to have been left in the lurch. The optimism driving the programmes also means that its potential fallibility is often overlooked in the process. Biometric technology has been proven time and again to be just as easily jeopardized as any other and the threat of biometric identity theft is as real and common as something like credit card fraud, with fingerprints and iris scans being easily capable of replication and theft without the individual owners consent. [2] In fact, compromise or theft of biometric identity data presents an even greater difficulty than other forms of ID because of the fact that it is unique and intrinsic, and hence, once lost cannot be re-issued or reclaimed like traditional identification like a PIN, leaving the individual victim with no alternative system for identification or authentication. This would also defeat the entire purpose behind any authentication and identification schemes. With the amount of personal data that the government plans to store in databases using biometrics, and without adequate safeguards which can be publicly scrutinized, using this technology would be a premature and unsafe move.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Biometric data and Potential Misuse&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Centralised data storage is problematic not only for the issues with data compromise and identity theft, but the problems of potential third-party misuse in the absence of an adequate legal framework for protecting such personal data, and proper technical safeguards for the same, as has been pointed out by the Standing Committee on Finance in its report on the UIDAI project.&lt;a name="fr4" href="#fn4"&gt;[4]&lt;/a&gt; The threat to privacy which these massive centralized databases pose has led to the shelving of similar programmes in England as well as France. [4] Further, concerns have been voiced about data sharing and access to the information contained in the biometric database. The biometric database is to be managed by several contracting companies based in the US. These same companies have legal obligations to share any data with the US government and Homeland Security. [5]&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;A second, growing concern over biometric identification schemes is over the use of biometrics for state surveillance purposes. While the UID’s chief concern on paper has been development, poverty, and corruption alleviation, there is no defined law or mandate which restricts the number from being used for other purposes, hence giving rise to concerns of a function creep - a shift in the use of the UID from its original intended purpose. For example, the Kerala government has recently proposed a scheme whereby the UID would be used to track school children.&lt;a name="fr5" href="#fn5"&gt;[5]&lt;/a&gt; Other schemes such as the National Population Register and the DNA Profiling Bill have been specifically set up with security of the State as the mandate and aim.&lt;a name="fr6" href="#fn6"&gt;[6]&lt;/a&gt; With the precise and accurate identification which biometrics offers, it also means that individuals are that much easier to continuously survey and track, for example, by using CCTV cameras with facial recognition software, the state could have real-time surveillance over any activities of any individual.&lt;a name="fr7" href="#fn7"&gt;[7]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;With all kinds of information about individuals connected by a single identifier, from bank accounts to residential and voter information, the threat of increased state surveillance, and misuse of information becomes more and more pronounced. By using personal identifiers like fingerprints or iris scans, agencies can potentially converge data collected across databases, and use it for different purposes. It also means that individuals can potentially be profiled through the information provided from their various databases, accessed through identifiers, which leads to concerns about surveillance and tracking, without the individuals knowledge. There are no Indian laws or policies under data collection schemes which address concerns of using personal identifiers for tracking and surveillance.&lt;a name="fr8" href="#fn8"&gt;[8]&lt;/a&gt; Even if such such use is essential for increased national security, the implementation of biometrics for constant surveillance under the present regime ,where individuals are not notified about the kind of data being collected and for what its being used, would be a huge affront on civil liberties, as well as the Right to Privacy, and prove to be a powerful and destructive weapon in the hands of a police state. Without these concerns being addressed by a suitable, publicly available policy, it could pose a huge threat to individual privacy in the country. As was noted by the Deputy Prime Minister of the UK, Nick Clegg, in a speech where he denounced the Identity Scheme of the British government, saying that “This government will end the culture of spying on its citizens. It is outrageous that decent, law-abiding people are regularly treated as if they have something to hide. It has to stop. So there will be no ID card scheme. No national identity register, a halt to second generation biometric passports.” [6]&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Biometric technology has been useful in several programmes and policies where its use has been open to scrutiny and restricted to a specific function, for example, the recent use of facial recognition in Goa to tackle voter fraud, and similar schemes being taken up by the Election Commission. [7] However, with lack of any guidelines or specific legal framework covering the implementation and collection of biometric data schemes, such schemes can quickly turn into ‘biohazards’ for personal liberty and individual privacy, as has been highlighted above and these issues must be brought to light and adequately addressed before the Government progresses on biometric frontiers.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;[&lt;a name="fn1" href="#fr1"&gt;1&lt;/a&gt;]. &lt;a href="http://www.goacom.com/goa-news-highlights/3520-biometric-scanners-to-be-used-for-elections"&gt;http://www.goacom.com/goa-news-highlights/3520-biometric-scanners-to-be-used-for-elections&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn2" href="#fr2"&gt;2&lt;/a&gt;]. &lt;a href="http://www.wired.com/threatlevel/2008/03/hackers-publish"&gt;http://www.wired.com/threatlevel/2008/03/hackers-publish&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn3" href="#fr3"&gt;3&lt;/a&gt;].&lt;a href="https://www.eff.org/deeplinks/2012/09/indias-gargantuan-biometric-database-raises-big-questions"&gt;https://www.eff.org/deeplinks/2012/09/indias-gargantuan-biometric-database-raises-big-questions&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn4" href="#fr4"&gt;4&lt;/a&gt;]. &lt;a href="http://www.informationweek.com/security/privacy/britain-scraps-biometric-national-id-car/228801001"&gt;http://www.informationweek.com/security/privacy/britain-scraps-biometric-national-id-car/228801001&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn5" href="#fr5"&gt;5&lt;/a&gt;]. &lt;a href="http://www.thehindu.com/opinion/op-ed/questions-for-mr-nilekani/article4382953.ece"&gt;http://www.thehindu.com/opinion/op-ed/questions-for-mr-nilekani/article4382953.ece&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn6" href="#fr6"&gt;6&lt;/a&gt;]. &lt;a href="http://news.bbc.co.uk/2/hi/8691753.stm"&gt;http://news.bbc.co.uk/2/hi/8691753.stm&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn7" href="#fr7"&gt;7&lt;/a&gt;]. Supra note 1.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/indias-biometric-identification-programs-and-privacy-concerns'&gt;https://cis-india.org/internet-governance/blog/indias-biometric-identification-programs-and-privacy-concerns&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>divij</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>SAFEGUARDS</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-07-21T10:51:42Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/dns-singularity-of-icann-and-the-gold-rush">
    <title>What’s In a Name? — DNS Singularity of ICANN and The Gold Rush</title>
    <link>https://cis-india.org/internet-governance/blog/dns-singularity-of-icann-and-the-gold-rush</link>
    <description>
        &lt;b&gt;March 2013 being the 28th birthday of the first ever registered Internet domain as well as the exigent launch of the Trademark Clearing House disguised as a milestone in rights protection by the Internet Corporation for Assigned Names and Numbers (ICANN) for it’s new gTLD program, Sharath Chandra Ram, dissects the transitory role of ICANN from being a technical outfit to the Boardroom Big Brother of Internet Governance.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;&lt;a class="external-link" href="http://trademark-clearinghouse.com/"&gt;Click to read&lt;/a&gt; more about the &lt;b&gt;Trademark Clearing House&lt;/b&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;As a non-profit organization, established in agreement with the US Department of Commerce in 1998, the current arrangement of ICANN has come under serious questions in recent years, with the United Nations wanting the ITU to oversee Internet Governance while Europe seeking more public participation in the decision making process that currently comprises a majority of private stakeholders as ICANN board members with vested interests. In this post we shall look at a few instances that give room for thought about the regulatory powers and methods adopted by ICANN as well as reparatory measures taken to reaffirm it’s image as an able governing body amidst disputes over trademarks and fair competition that might actually call for a wider and objective inclusion in future. An outline of functional and structural arrangements of ICANN maybe found at the &lt;a class="external-link" href="http://goo.gl/FijE7"&gt;CIS Knowledge Repository page&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The Business Model&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Earlier this month, (March 15, 2013) was the 28&lt;sup&gt;th&lt;/sup&gt; birthday of &lt;a href="http://www.symbolics.com"&gt;symbolics.com&lt;/a&gt;, the first ever domain name registered in 1985 through the formal ICANN process. (&lt;a class="external-link" href="http://www.nordu.net/ndnweb/home.html"&gt;nordu.net&lt;/a&gt; being the first domain name created by the registry on January 1, 1985 for the first  root server, nic.nordu.net) Symbolics, that spun-off the MIT AI Lab and specialized in building workstations running LISP finally sold the domain for an undisclosed amount to XY.com, an Internet investment firm that has been proudly boasting about their acquired relic for over three years now. The golden days of fancy one word domain name resale at exorbitant prices are over, as Google’s page ranking crawler now really looks at unique content and backlinks. Nevertheless, those with the same archaic view of a real estate agent still believe that a good domain name does have a high ROI and have managed to find naïve takers who will offer ridiculous amounts. One of many such examples is the plain looking &lt;a href="http://www.business.com"&gt;www.business.com&lt;/a&gt; that was bought initially for $1,50,000 and changed hands twice from $7.5 million to an absurd $345 million of R.H. Donnelley Inc., that soon filed for bankruptcy!&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The top level domain market however, is consistently lucrative. A TLD registry on an average receives $5 - $7 per domain registered under it. So the .COM registry run by VeriSign which, as of 2013 has over a 100 million registered domains, receives a revenue of $500 to $700 million per year of which a fraction is paid to ICANN periodically on a per-registration or per-renewal basis. Competing registrars and registries across TLDs, their revenue generation practices as well as the application process for new TLDs gradually began to be regulated by ICANN in mysterious ways, as we will see in the following legal case studies.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;VeriSign vs. ICANN&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;VeriSign began to operate the .COM and .NET TLD after taking over Network Solutions Inc. and entering into a contractual agreement with ICANN in 2001. Let’s take a look at some methods used by VeriSign to garner internet traffic and registrant revenue, that were clamped down by the ICANN, which resulted in a lawsuit by plaintiff VeriSign claiming prevention of fair competition and revenue by impeding innovation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Clamping of Site Finder &amp;amp; WLS&lt;/i&gt;: In September 2003, VeriSign introduced a Wild Card DNS Service called Site Finder for all .com and .net domains. This meant that any user trying to access a non-existent domain name no longer received the 404 Error but were instead redirected to the VeriSign website with adverts and links to affiliate registrars. Often a result of a misspelled domain, in ICANN’s view, the redirection by VeriSign amounted to typo squatting internet users as within a month VeriSign’s traffic rose dramatically moving it to the top 20 most visited websites on the web. As seen below in this archived image of Alexa’s 2003 traffic statistic (Courtesy: &lt;a class="external-link" href="http://cyber.law.harvard.edu/"&gt;cyber.law.harvard.edu&lt;/a&gt;).&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th style="text-align: center; "&gt;&lt;img src="https://cis-india.org/home-images/copy_of_DailyTraffic.png" alt="Daily Traffic" class="image-inline" title="Daily Traffic" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Shortly, in October 2003, ICANN issued a suspension ultimatum pointing Site Finder in violation of the 2001 .Com agreement. This was not the first time ICANN clamped down on VeriSign’s ‘profiteering’ methods. In 2001, ICANN prevented VeriSign’s WLS (Wait Listing Service) that allowed a registrant (through selected participating affiliate registrars of VeriSign) to apply to register an already registered domain in the event that the registration is deleted – a nifty scheme considering the fact that about 25000 domains are deleted everyday!&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Remarks and Submissions&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The long drawn case of VeriSign Vs. ICANN ended on a reconciliatory note, with ICANN bringing the Site Finder service to a halt at the cost of VeriSign walking away happier with a free 5 year extension on the .COM domain (2007 extended to 2012).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the ingenious Site Finder service did pose a huge problem to spam filters, both the WLS and yet another service that VeriSign launched to allow registration of non-English language SLDs were also met with a cringe by ICANN.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;However looking closer, one may realize that the act of ICANN permitting a DNS root redirect service such as Site Finder for all TLD operators (with an acceptable template that also carried information about the 404 error besides other marketing options) meant the first step towards paving the way towards a plausible scenario of multiple competing DNS roots across TLDs being able to interact with each other  — a system often argued by network theorists to be the most efficient and competitive model that would reduce the disjoint between the demand and supply of TLDs in a decentralized infrastructure, and that definitely was not in the best interest of ICANN’s monopolistic plan. Hence, this could be seen as a move by ICANN to nip the Site Finder bud while still young&lt;/b&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Finally, as brought to public notice in more than one instance (name.Space Vs. ICANN, IOD Vs. ICANN), the vested interests of ICANN board members has come under glaring light. &lt;b&gt;Can the ICANN leadership consisting of members from the very same domain name business industry be able to objectively deal with competing registry services and legal issues?&lt;/b&gt; Conspicuous targets have been chairperson Steve Crocker who owns a consulting firm Shinkuro, whose subtle investor is infact AFILIAS INC which runs the .INFO and .MOBI TLDs, provides backend services to numerous TLDs (.ORG, .ASIA, .AERO (aviation)), has applied for a further 31 new TLDs and has it’s CTO Ram Mohan on the Board of Directors of ICANN. Also ICANN Vice Chariman, Bruce Tonkin is Senior Executive at Australia’s largest domain name provider Melbourne IT, and Peter Thrush former chairman of the ICANN Board of Directors is Executive Chairman of Top Level Domain Holdings,Inc which filed 92 gTLD applications in 2012.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Trademark Protection and Domain Names&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Image Online Design (IOD) is a company that since 1996 has been providing Internet registry services using the trademark .WEB (trademark #3,177,334 including computer accessories) registered with the US Patents and Trademarks Office (USPTO).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It’s registry services however, were not through the primary DNS root server maintained by ICANN, but through an alternate DNS root that required prospective users to manually make changes in their browser settings in order to resolve .WEB domains registered through IOD. Despite not running the primary DNS root server for. WEB, by the year 2000 IOD had acquired about 20,000 registered .WEB customers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The beacon of ‘hope’ arrived upon IOD in mid-2000 as ICANN (on advise of supporting organization GNSO) opened a call for proposals for registrations of new TLDs, with a non-refundable deposit of $50,000 for an application to be considered. By then the importance of the .WEB TLD for e-commerce was well known amongst ICANN board members with Louis Touton lobbying for his preferred applicant AFILIAS INC to be given the .WEB TLD, with others raising concerns about IOD’s preregistration of .WEB domains. One of the founding fathers of the internet, Vinton Cerf, the then Chairman of ICANN took a benevolent stance-- &lt;i&gt;"I'm still interested in IOD," he repeated over Touton's objections. "They've worked with .WEB for some time. To assign that to someone else given that they're actually functioning makes me uneasy," he said, prompting board member Linda Wilson to chime in, "I agree with Vint."&lt;/i&gt; (&lt;a href="http://goo.gl/d1v6X"&gt;http://goo.gl/d1v6X&lt;/a&gt; , &lt;a href="http://goo.gl/eV9Jd"&gt;http://goo.gl/eV9Jd&lt;/a&gt;).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Finally amidst all the contention, no one was offered the .WEB domain and ICANN announced that all applications not selected will remain pending and those who submitted will have the option of being re-considered when additional TLD selections are made in future. And the future being, 2012, when ICANN invited a new round of TLD applicants, this time with the non-refundable deposit of whopping $185,000 for a single application (1 TLD/application as opposed to the $50,000 in the year 2000 that allowed multiple TLD requests within the same application) to be considered. While 7 new applicants for the .WEB TLD registered their interest, IOD considered their application to be still pending and did not join the new pool that included AFILIAS INC. and GOOGLE.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The litigation of IOD Vs ICANN ended in Feb 2013, with IOD claiming weak causes of action under “Trademark Infringement” and “Breach of Contract” &amp;amp;“Fair Dealing” hinging on the fact that the initial $50,000 application was still pending and never was officially rejected by ICANN. Further, there was not enough room to make a valid trademark infringement, as there was no substantial room for consumer confusion in the .WEB case.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Remarks and Submissions&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The IOD Vs. ICANN case not only increased concerns globally, over the uncertainty associated with the ICANN application process for generic TLDs along with questions regarding the objectivity of its board members, but at the same time has alerted ICANN to take the necessary big sister steps to ensure that it’s well in the game.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The fact of the matter is that the USPTO does not provide trademark protection services for the Top level Domain industry citing the reason that TLDs trademarks do not provide a distinct service mark that can identify or differentiate the service of an applicant from others, and further cannot be used to ascertain the source of an applicant’s services.  This view is flawed, as by looking at a TLD, say BBC.com, an informed person can easily say that VeriSign INC manages the service of directing a user to a correct location on the .COM registry. With introduction of new gTLDs, perhaps BBC would shift it’s content to BBC.news, where the source may be an abstracted Registrar and the nature of service being quite evident. And to those registered trademarks, especially those that shall result in substantial brand confusion to the customer if infringed, granting a TLD like .ibm or .bbc may well be granted to the owner of the trademark who may then outsource registry services to a service provider. This shall invert the current model by relegating the role of a TLD registry holder to that of a contracted service provider.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;So the question is, should have the US Department of Commerce, who contracted ICANN in the first place, mediated with USPTO to place the business of a registrar on par with other trades and businesses, and modify it’s trademark infringement policies? And more importantly, will ICANN view this as introducing yet another key stakeholder to the gTLD assignment process?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The answer to the latter is already clear as ICANN being in the top of it’s game decided to take matters into its own hands and on March 26, 2013) launched&lt;/b&gt; &lt;a href="http://trademark-clearinghouse.com/"&gt;&lt;b&gt;http://trademark-clearinghouse.com/&lt;/b&gt;&lt;/a&gt;&lt;b&gt; with a new set of guidelines for accepted trademarks and a mechanism that allows trademark holders to submit their application to a central repository.&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Accepted trademark holders shall be given priority to register gTLDs during the ‘sunrise’ period. Deloitte Enterprise Risk Services have been assigned the responsibility of evaluating submitted trademarks while IBM shall maintain the actual database of trademarks by the later half of 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The tip of the iceberg is well in scope of view. ICANN46 is currently being hosted in Beijing, at the China Internet Network Information Centre (CINIC) from April 7 to 11, 2013 while hopefully parallel discussions will happen on all other global forums to hopefully re-consider a future of multiple competing DNS root servers towards healthy competition that is decentralized.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;b&gt; Key References&lt;/b&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;a href="http://www.icann.org/en/news/litigation"&gt;http://www.icann.org/en/news/litigation&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cyber.law.harvard.edu/tlds/"&gt;http://cyber.law.harvard.edu/tlds/&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Lynn, S. [2001] “Discussion Draft: A Unique, Authoritative Root for the DNS” Internet Corporation for Assigned Names and Numbers, 28 May, 2001.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Internet Architecture Board [2000] “IAB Technical Comment on the Unique DNS Root.” RFC 2826, Internet Society, May 2000.&lt;/li&gt;
&lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/dns-singularity-of-icann-and-the-gold-rush'&gt;https://cis-india.org/internet-governance/blog/dns-singularity-of-icann-and-the-gold-rush&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sharath</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-03-31T05:35:33Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/times-of-india-atul-sethi-march-30-2013-what-if-the-net-shut-down-for-a-few-days">
    <title>What if the Net shut down for a few days</title>
    <link>https://cis-india.org/news/times-of-india-atul-sethi-march-30-2013-what-if-the-net-shut-down-for-a-few-days</link>
    <description>
        &lt;b&gt;When spammers attacked Spamhaus, a European spam-fighting group in what was billed as the "biggest cyber attack in history", they managed to temporarily slow down the internet. But what if dedicated attackers succeeded in shutting down the internet for a longer time, maybe a few days? What would be the potential impact of such a scenario in a world where crucial data is stored on emails, most financial transactions have shifted online and an entire generation has grown up not realising what life without the web could be like?&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;The article by Atul Sethi was &lt;a class="external-link" href="http://articles.timesofindia.indiatimes.com/2013-03-30/internet/38144585_1_internet-blackout-cyber-attack-internet-and-society"&gt;published in the Times of India&lt;/a&gt; on March 30, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;"The thought itself is frightening," says Vijay Mukhi, president of the  Foundation of Information Security and Technology and co-founder of the  Internet Users Community of India. "Most people use their email or cloud  computing to store their data. What happens when you can't access your  crucial information? Also, financial activity in the absence of the  internet will come to a standstill since there would be no money flow  happening between banks or transactions in the stock market. The  implications are huge. And I'm not even thinking of the withdrawal  symptoms that many youngsters are going to go through when they can't  log on. "&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, contrary to the horror that this situation might elicit  from those whose lives revolve around the web, the impact on India, at  least, should not be much, says Sunil Abraham, director of the  Bangalore-based Centre for Internet and Society. "An internet blackout  in India can at most be compared to a bandh. Life becomes uncomfortable  but it still goes on. This is because in India, the internet is used by  just about 20% of the population. At the most, one can argue that since  this 20% also constitutes the elite of the country - bureaucrats,  politicians, businessmen, media, etc, any disruption in their work could  also affect the remaining 80% of the country indirectly."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even  though complete shutdown of the internet is believed to be virtually  impossible - since it is made up of thousands of interconnections which  ensure its infallibility - hackers haven't stopped trying as the latest  cyber attack shows. Internet security consultant Ankit Fadia points out  that the only way somebody can bring down the internet is if a few  million hackers combine together as part of a sustained project. "Even  then, it's a remote possibility that they can pull it off," he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If it does happen, though, remember to polish up your letter-writing  skills and go over to your friend's house if you want to chat.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/times-of-india-atul-sethi-march-30-2013-what-if-the-net-shut-down-for-a-few-days'&gt;https://cis-india.org/news/times-of-india-atul-sethi-march-30-2013-what-if-the-net-shut-down-for-a-few-days&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2013-04-03T11:01:38Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
