<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/a2k/front-page/search_rss">
  <title>Access To Knowledge (A2K)</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 2001 to 2015.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/news/india-conference-on-cyber-security-and-cyber-governance"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/computerworld-september-25-2013-john-ribeiro-indian-biometric-id-plan-faces-court-hurdle"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/the-times-of-india-september-22-2013-youths-brainstorm-at-social-summit"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/orfonline-bhairav-acharya-observer-research-foundation-cyber-security-monitor-august-2013-nsp-not-a-real-policy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cis-and-international-coalition-calls-upon-governments-to-protect-privacy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/tech-president-september-23-2013-jessica-mckenzie"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/public-law-and-jurisprudential-issues-of-privacy-talk-at-cis"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/bangalore-social-good"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/central-monitoring-system-questions-to-be-asked-in-parliament"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/national-privacy-roundtable-meetings"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/jamia-millia-islamia-new-delhi-september-18-2013-privacy-and-surveillance-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/what-google-and-facebook-tell-about-govt-data-requests"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/hindustan-times-september-9-2013-zia-haq-a-dangerous-trend"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/deccan-chronicle-september-9-2013-sunil-abraham-privacy-law-must-fit-the-bill"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/young-scholar-tutorials"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/news/india-conference-on-cyber-security-and-cyber-governance">
    <title>CYFY 2013: India Conference on Cyber Security and Cyber Governance</title>
    <link>https://cis-india.org/news/india-conference-on-cyber-security-and-cyber-governance</link>
    <description>
        &lt;b&gt;The Observer Research Foundation in collaboration with the Federation of Indian Chambers of Commerce and Industry is holding the India Conference on Cyber Security and Cyber Governance at the Oberoi Hotel in New Delhi on October 14 and 15, 2013. Sunil Abraham will participate in this event as a speaker.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Click to download the full details in the &lt;a href="https://cis-india.org/internet-governance/blog/cyfy-brochure.pdf" class="internal-link"&gt;event brochure&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Shri Kapil Sibal, Minister of Communications &amp;amp; Technology will give the inaugural address. Shri Shivshankar Menon, National Security Advisor, Government of India will give the keynote address. Shri Shashi Tharoor, Minister of State, Human Resource Development, Government of India will give the dinner table address on October 14.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On the second day, October 15, Minister Jaak Aaviksoo will give the keynote address and Shri Nehchal Sandhu, Deputy National Advisor, Government of India will give the valedictory address.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;List of Speakers&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Kapil Sibal, Minister for Communications and Information Technology, India&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Shivshankar Menon, National Security Advisor, Government of India&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Shashi Tharoor, Minister of State for Human Resource Development, India&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Nehchal Sandhu, Deputy National Security Advisor, Government of India&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;A.P. Shah, Former Chief Justice, Delhi High Court&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Arvind Gupta, Director General, Institute for Defence Studies and Analyses, India&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Ashish Chauhan, CEO, Bombay Stock Exchange&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;C. Raja Mohan, Distinguished Fellow, ORF&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Christopher Painter, Office of the Coordinator for Cyber Issues, Department Of State, USA&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Dirk Brengelmann, Commissioner for International Cyber Policy, Federal Foreign Office, Germany&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Eric H. Loeb, Vice President, International External Affairs, AT&amp;amp;T&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Gabriel Siboni, Director, Cyber Warfare Program, Institute for National Security Studies, Tel Aviv University, Israel&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Jaak Aaviksoo, Minister of Education and Research of the Republic of Estonia&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Jamie Shea, Deputy Assistant Secretary General, Emerging Security Challenges, NATO&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Joe Sullivan, CSO, Facebook&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;John Mallery, Research Scientist, MIT Computer Science &amp;amp; Artificial Intelligence Laboratory, USA&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Maurizio Martellini, Secretary General, Landau Network-Centro Volta and IWG Executive Secretary, Italy&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Michael Cheatham, Head U.S. Representative Office, Indo-US Science and. Technology Forum, USA&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;M.M.Oberoi, Indian Police Service, Joint commissioner of Police, Delhi Police, Government of India&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Oleg Demidov, The Russian Center for Policy Studies, Russia&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Peter Grabosky, Researcher, Australian National University, Australia&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Prakash Nagpal, Senior Vice President, Product Marketing and Marketing, Narus&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Rajan Mathews, Director General, Cellular Operators Association of India&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Ram Narain, Deputy Director General (Security), Department of Telecommunication (DoT), Government of India&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Sandro Gaycken, Freie Universität Berlin, Institute of Computer Science, Germany&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Sean Kanuck, National Intelligence Officer for Cyber Issues, Office of the Director of National Intelligence, USA&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Sunil Abraham, Executive Director, Centre for Internet and Society, Bangalore&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Vijay Madan, Chief Mentor, Tata Teleservices (former Director, C-DOT), India&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Vivke Lall, President &amp;amp; CEO, Reliance Industries Limited&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/india-conference-on-cyber-security-and-cyber-governance'&gt;https://cis-india.org/news/india-conference-on-cyber-security-and-cyber-governance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-09-26T06:50:15Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/computerworld-september-25-2013-john-ribeiro-indian-biometric-id-plan-faces-court-hurdle">
    <title>Indian biometric ID plan faces court hurdle</title>
    <link>https://cis-india.org/news/computerworld-september-25-2013-john-ribeiro-indian-biometric-id-plan-faces-court-hurdle</link>
    <description>
        &lt;b&gt;Supreme Court in India rules -- for now -- against plan to make biometric ID mandatory for receiving services.&lt;/b&gt;
        &lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;This article by John Ribeiro was&lt;a class="external-link" href="http://www.computerworld.com/s/article/9242654/Indian_biometric_ID_plan_faces_court_hurdle?taxonomyId=17"&gt; published in Computer World on September 25, 2013&lt;/a&gt;. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;A controversial biometric project in India, which could require people to produce their biometric IDs to collect government subsidies, has received a significant setback from the country's Supreme Court.&lt;br /&gt;&lt;br /&gt;The court ruled this week in an interim order that people cannot be required to have the controversial Aadhaar identification to collect state subsidies, even as the Unique Identification Authority of India (UIDAI), the government agency that manages the project, has been trying to promote the Aadhaar number as proof of identity for a variety of services including banking.&lt;br /&gt;&lt;br /&gt;The UIDAI has said that the scheme is voluntary, but some states and agencies have attempted to link the identification to the implementation of programs such as cash subsidies for cooking gas that benefit even the middle and richer classes.&lt;br /&gt;&lt;br /&gt;"I signed up for Aadhaar only to ensure that I continue to get a gas cylinder at reasonable rates," said an executive in Bangalore who had queued up a few months ago for an Aadhaar number. The state of Maharashtra, for example, aims to be the first state in the country to roll out Aadhaar-linked subsidy transfers to LPG (liquified petroleum gas) consumers across all the districts in the state.&lt;br /&gt;&lt;br /&gt;Pending a final order, the court ruled that "....no person should suffer for not getting the Adhaar card inspite of the fact that some authority had issued a circular making it mandatory...."&lt;br /&gt;&lt;br /&gt;UIDAI Chairman Nandan Nilekani did not immediately agree to discuss the court order.&lt;br /&gt;&lt;br /&gt;The Aadhaar project is the result of an executive order, and is not backed by a law passed by India's Parliament, so its legality can be in question, said Pavan Duggal, a cyberlaw expert who practices before India's Supreme Court. The project could be in violation of the country's Information Technology Act and rules which cover collection, handling and processing of sensitive personal data, he added.&lt;br /&gt;&lt;br /&gt;Aadhaar, though said to be voluntary, could also be in violation of fundamental rights of the Indian constitution relating to right to life and privacy, as a perception is being created that the ID will be required for subsidies and benefits, Duggal added.&lt;br /&gt;&lt;br /&gt;The government should have considered getting an enabling law passed by Parliament for the data collection as also a strong privacy law to prevent misuse of Aadhaar related data and collation of multiple databases using Aadhaar, because of the privacy issues involved and its implications on fundamental rights, said Pranesh Prakash, Policy Director at the Centre for Internet and Society in Bangalore.&lt;br /&gt;&lt;br /&gt;The biometric project, which collects 10 fingerprints, iris scan and other information such as name, date of birth and address, has been criticized by a number of privacy groups who worry that the data could at some point be misused by the government. There is also a risk that such large databases could be hacked, putting at risk information of people. It is not clear what are the measures taken by UIDAI to protect the authenticity and correctness of the biometric information, and prevent access by foreign powers, Duggal said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Aadhaar number now allows different agencies including private organizations to collect and exchange data between them, which may be useful to marketers, for example, Prakash said. Previously, it wasn't practical as the agencies would have difficulty ensuring that the information was about the same person, he added.&lt;br /&gt;&lt;br /&gt;The Supreme Court has also ruled that illegal immigrants should not be enrolled under the Aadhaar program, which is meant to facilitate subsidized services to Indian citizens. The Aadhaar, which does not collect citizenship information, is likely to be misused by illegal migrants, activists have said.&lt;br /&gt;&lt;br /&gt;One of the many challenges facing the Aadhaar program is that village-level politicians and influence peddlers cook up data to enroll under subsidy schemes people who are not eligible for benefits, or people who are nonexistent. The traditional paper ration card scheme and voter rolls are usually stuffed with nonexistent people or people who do not typically qualify for benefits.&lt;br /&gt;&lt;br /&gt;Aadhaar was expected to remove these discrepancies by more accurate collection of data on people who enrolled under the scheme. But a number of users have complained that the Aadhaar cards they have received have errors in their names, addresses and other details. One newspaper reported that an Aadhaar applicant received a card that had the face of a dog in place of his photograph.&lt;br /&gt;&lt;br /&gt;UIDAI aims to provide 600 million Aadhaar numbers to residents by 2014.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/computerworld-september-25-2013-john-ribeiro-indian-biometric-id-plan-faces-court-hurdle'&gt;https://cis-india.org/news/computerworld-september-25-2013-john-ribeiro-indian-biometric-id-plan-faces-court-hurdle&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-10-03T10:58:31Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/the-times-of-india-september-22-2013-youths-brainstorm-at-social-summit">
    <title>Youths brainstorm at social summit</title>
    <link>https://cis-india.org/news/the-times-of-india-september-22-2013-youths-brainstorm-at-social-summit</link>
    <description>
        &lt;b&gt;This group of youngsters is in the process of developing a smartphone app that will help traffic police and civic agencies strengthen emergency services like ambulances and fire engines.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The event was hosted in CIS on September 21. The Times of India covered this and &lt;a class="external-link" href="http://timesofindia.indiatimes.com/city/bangalore/Youths-brainstorm-at-social-summit/articleshow/22877055.cms"&gt;published the story&lt;/a&gt; on September 22, 2013.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;"Digital signboards and phone alerts can sensitize road users and traffic cops about emergency vehicles ," says the team, which is working on creating prototypes to build emergency response systems for citizens in case of road accidents.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Trupti Chengalath, head of communications for Mahiti.org, Dipankar Nayak, a young architect and Gauri Prasad, a Class 12 student of Canadian International School are part of the team which came together at the Bangalore Social Good Jam on Saturday.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The event, organized at the Centre for Internet and Society, Domlur, saw the participation of schoolchildren, college goers, young professionals and social entrepreneurs , who focused on devising technological solutions to some of the most pressing problems faced by Indian cities . Members of &lt;a class="external-link" href="http://timesofindia.indiatimes.com/topic/ASHOKA"&gt;Ashoka&lt;/a&gt; India , a global association of leading social entrepreneurs , IDEX, a six-month fellowship programme on social enterprise, and the Green Lungi Movement, were part of the session.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Meera Vijayan, consultant , Framework Change, Ashoka, told STOI, "NGOs run by fellows of Ashoka and IDEX will implement these tech-based solutions in different cities and will involve government stakeholders too. These summits have become a global conversation on how to &lt;a class="external-link" href="http://timesofindia.indiatimes.com/topic/Leverage"&gt;leverage&lt;/a&gt; technology for social change. Bangalore was chosen for the first-of-its-kind event in India because IT runs in the blood of the city."&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/the-times-of-india-september-22-2013-youths-brainstorm-at-social-summit'&gt;https://cis-india.org/news/the-times-of-india-september-22-2013-youths-brainstorm-at-social-summit&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-09-25T11:08:03Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/orfonline-bhairav-acharya-observer-research-foundation-cyber-security-monitor-august-2013-nsp-not-a-real-policy">
    <title>The National Cyber Security Policy: Not a Real Policy</title>
    <link>https://cis-india.org/internet-governance/blog/orfonline-bhairav-acharya-observer-research-foundation-cyber-security-monitor-august-2013-nsp-not-a-real-policy</link>
    <description>
        &lt;b&gt;Cyber security in India is still a nascent field without an organised law and policy framework. Several actors participate in and are affected by India's still inchoate cyber security regime. The National Cyber Security Policy (NCSP) presented the government and other stakeholders with an opportune moment to understand existing legal limitations before devising a future framework. Unfortunately, the NCSP's poor drafting and meaningless provisions do not advance the field.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This article was &lt;a class="external-link" href="http://orfonline.org/cms/sites/orfonline/html/cyber/cybsec1.html"&gt;published in the Observer Research Foundation's Cyber Security Monitor Vol. I, Issue.1, August 2013&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;For some time now, law and policy observers in India have been noticing a  definite decline in the quality of national policies emanating from the  Central Government. Unlike legislation, which is notionally subject to  debate in the Parliament of India, policies face no public evaluation  before they are brought in to force. Since, unlike legislation, policies  are neither binding nor enforceable, there has been no principled  ground for demanding public deliberation of significant national  policies. While Parliament’s falling standard of competence has been  almost unanimously condemned, there has been nearly no criticism of the  corresponding failure of the Centre to invigilate the quality of the  official policies of its ministries. Luckily for the drafters of the  National Cyber Security Policy (NCSP), the rest of the country has also  mostly failed to notice its poor content.&lt;br /&gt; &lt;br /&gt;The NCSP was notified into effect on 2 July 2013 by the Department  of Electronics and Information Technology – which calls itself DeitY –  of the Ministry of Communications and Information Technology. As far as  legislation and legal drafting go, DeitY has a dubious record. In March  2013, in a parliamentary appraisal of subordinate law framed by DeitY, a  Lok Sabha committee found ambiguity, invasions of privacy and  potentially illegal clauses. Apprehensions about statutory law  administered by DeitY have also found their way to the Supreme Court of  India, where a constitutional challenge to certain provisions of the  Information Technology Act, 2000 (IT Act) continues. On more than one  occasion, owing to poor drafting, DeitY has been forced to issue  advisories and press releases to clarify the meaning of its laws.  Ironically, the legal validity of these clarifications is also  questionable.&lt;br /&gt; &lt;br /&gt;A national policy must set out, in real and quantifiable terms, the  objectives of the government in a particular field within a specified  time frame. To do that, the policy must provide the social, economic,  political and legal context prevalent at the time of its issue as well  as a normative statement of factual conditions it seeks to achieve at  the time of its expiry. Between these two points in time, the policy  must identify and explain all the particular social, economic, political  and legal measures it intends to implement to secure its success.  Albeit concerned solely with economic growth, the Five-Year Plans – the  Second and Tenth Plans in particular, without prejudice to their success  or failure, are samples of policies that are well-drafted. In this  background, the NCSP should be judged on the basis of how it addresses,  in no particular order, national security, democratic freedoms, economic  growth and knowledge development. Let us restrict ourselves to the  first two issues.&lt;br /&gt; &lt;br /&gt;There are broadly two intersections between national security and  information technology; these are: (i) the security of networked  communications used by the armed forces and intelligence services, and  (ii) the storage of civil information of national importance. While the  NCSP makes no mention of it, the adoption of the doctrine of  network-centric warfare by the three armed forces is underway.  Understanding the doctrine is simple – an intensive use of information  technology to create networks of information aids situational awareness  and enables collaboration to bestow an advantage in combat. However, the  doctrine is vulnerable to asymmetric attack using both primitive and  highly sophisticated means. Pre-empting such attacks should be a primary  policy concern; not so, apparently, for the NCSP which is completely  silent on this issue. The NCSP is slightly more forthcoming on the  protection of critical information infrastructure of a civil nature.  Critical information infrastructure, such as the national power grid or  the Aadhar database, is narrowly defined in section 70 of the IT Act  where it used to describe a protected system. Other provisions of the IT  Act also deal with the protection of critical information  infrastructure. The NCSP does not explain how these statutory provisions  have worked or failed, as the case may be, to necessitate further  mention in a policy document. For instance, section 70A of the IT Act,  inserted in 2008, enables the creation of a national nodal agency to  undertake research and development and other activities in respect of  critical information infrastructure. Despite this, five years later, the  NCSP makes a similar recommendation to operate a National Critical  Information Infrastructure Protection Centre to undertake the same  activities. In the absence of any meaningful explanation of intended  policy measures, there is no reason to expect that the NCSP will succeed  where an Act of Parliament has failed.&lt;br /&gt; &lt;br /&gt;But, putting aside the shortcomings of its piece-meal provisions,  the NCSP also fails to address high-level conceptual policy concerns. As  information repositories and governance services through information  technology become increasingly integrated and centralised, the security  of the information that is stored or distributed decreases. Whether by  intent or error, if these consolidated repositories of information are  compromised, the quantity of information susceptible to damage is  greater leading to higher insecurity. Simply put, if power transmission  is centrally controlled instead of zonally, a single attack could black  out the entire country instead of only a part of it. Or if personal data  of citizens is centrally stored, a single leak could compromise the  privacy of millions of people instead of only hundreds. Therefore, a  credible policy must, before it advocates greater centralisation of  information, examine the merits of diffused information storage to  protect national security. The NCSP utterly fails in this regard.&lt;br /&gt; &lt;br /&gt;Concerns short of national security, such as the maintenance of law  and order, are also in issue because crime is often planned and  perpetrated using information technology. The prevention of crime before  it is committed and its prosecution afterwards is a key policy concern.  While the specific context may vary depending on the nature of the  crime – the facts of terrorism are different from those of insurance  fraud – the principles of constitutional and criminal law continue to  apply. However, the NCSP neither examines the present framework of  cybersecurity-related offences nor suggests any changes in existing law.  It merely calls for a “dynamic legal framework and its periodic review  to address the cyber security challenges” (sic). This is self-evident,  there was no need for a new national policy to make this discovery; and,  ironically, it fails to conduct the very periodic review that it  envisages. This is worrying because the NCSP presented DeitY with an  opportunity to review existing laws and learn from past mistakes. There  are concerns that cybersecurity laws, especially relevant provisions of  the IT Act and its rules, betray a lack of understanding of India’s  constitutional scheme. This is exemplified by the insertion, in 2008, of  section 66A into the IT Act that criminalises the sending of annoying,  offensive and inconvenient electronic messages without regard for the  fact that free speech that is annoying is constitutionally protected.&lt;br /&gt; &lt;br /&gt;In India, cybersecurity law and policy attempts to compensate for  the state’s inability to regulate the internet by overreaching into and  encroaching upon democratic freedoms. The Central Monitoring System  (CMS) that is being assembled by the Centre is a case in point. Alarmed  at its inability to be privy to private communications, the Centre  proposes to build systems to intercept, in real time, all voice and data  traffic in India. Whereas liberal democracies around the world require  such interceptions to be judicially sanctioned, warranted and supported  by probable cause, India does not even have statutory law to regulate  such an enterprise. Given that, once completed, the CMS will represent  the largest domestic interception effort in the world, the failure of  the NCSP to examine the effect of such an exercise on daily  cybersecurity is bewildering. This is made worse by the fact that the  state does not possess the technological competence to build such a  system by itself and is currently tendering private companies for  equipment. The state’s incompetence is best portrayed by the activities  of the Indian Computer Emergency Response Team (CERT-In) that was  constituted under section 70B of the IT Act to respond to “cyber  incidents”. CERT-In has repeatedly engaged in extra-judicial censorship  and has ham-handedly responded to allegedly objectionable blogs or  websites by blocking access to entire domains. Unfortunately, the NCSP,  while reiterating the operations of CERT-In, attempts no evaluation of  its activities precluding the scope for any meaningful policy measures.&lt;br /&gt; &lt;br /&gt;The NCSP’s poor drafting, meaningless provisions, deficiency of  analysis and lack of stated measures renders it hollow. Its notification  into force adds little to the public or intellectual debate about  cybersecurity and does nothing to further the trajectory of either  national security or democratic freedoms in India. In fairness, this  problem afflicts many other national policies. There is a need to  revisit the high intellectual and practical standards set by most  national policies that were issued in the years following Independence.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/orfonline-bhairav-acharya-observer-research-foundation-cyber-security-monitor-august-2013-nsp-not-a-real-policy'&gt;https://cis-india.org/internet-governance/blog/orfonline-bhairav-acharya-observer-research-foundation-cyber-security-monitor-august-2013-nsp-not-a-real-policy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bhairav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-09-25T09:49:11Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cis-and-international-coalition-calls-upon-governments-to-protect-privacy">
    <title>CIS and International Coalition Calls upon Governments to Protect Privacy</title>
    <link>https://cis-india.org/internet-governance/blog/cis-and-international-coalition-calls-upon-governments-to-protect-privacy</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society (CIS) along with the International Coalition has called upon governments across the globe to protect privacy.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;On September 20 in Geneva, CIS joined a huge international coalition in calling upon countries across the globe, including India to assess whether national surveillance laws and activities are in line with their international human rights obligations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and Society has endorsed a set of international principles against unchecked surveillance. The 13 Principles set out for the first time an evaluative framework for assessing surveillance practices in the context of international human rights obligations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A group of civil society organizations officially presented the 13 Principles this past Friday in Geneva at a side event attended by Navi Pillay, the United Nations High Commissioner for Human Rights and the United Nations Special Rapporteur on Freedom of Expression and Opinion, Frank LaRue, during the 24th session of the Human Rights Council. The side event was hosted by the Permanent Missions of Austria, Germany, Liechtenstein, Norway, Switzerland and Hungary.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Elonnai Hickok, Programme Manager at the Centre for Internet and Society has noted that "the 13 Principles are an important first step towards informing governments, corporates, and individuals across jurisdictions, including India, about needed safeguards for surveillance practices and related policies to ensure that they are necessary and proportionate."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Navi Pillay, the United Nations High Commissioner for Human Rights, speaking at the Human Rights Council stated in her opening statement on September 9:&lt;/p&gt;
&lt;blockquote class="quoted" style="text-align: justify; "&gt;"Laws and policies must be adopted to address the potential for dramatic intrusion on individuals’ privacy which have been made possible by modern communications technology."&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;Navi Pillay, the United Nations High Commissioner for Human Rights, speaking at the event, said that:&lt;/p&gt;
&lt;blockquote class="quoted" style="text-align: justify; "&gt;"technological advancements have been powerful tools for democracy by giving access to all to participate in society, but increasing use of data mining by intelligence agencies blurs lines between legitimate surveillance and arbitrary mass surveillance."&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;Frank La Rue, the United Nations Special Rapporteur on Freedom of Expression and Opinion &lt;a href="http://www.google.com/url?q=http%3A%2F%2Fwww.ohchr.org%2FDocuments%2FHRBodies%2FHRCouncil%2FRegularSession%2FSession23%2FA.HRC.23.40_EN.pdf&amp;amp;sa=D&amp;amp;sntz=1&amp;amp;usg=AFQjCNEwtpzwnl_1_j_UoSnoE048kX-LYA"&gt;made clear &lt;/a&gt;the case for a direct relationship between state surveillance, privacy and freedom of expression in this latest report to the Human Rights Council:&lt;/p&gt;
&lt;blockquote class="quoted" style="text-align: justify; "&gt;"The right to privacy is often understood as an essential requirement for the realization of the right to freedom of expression. Undue interference with individuals’ privacy can both directly and indirectly limit the free development and exchange of ideas. … An infringement upon one right can be both the cause and consequence of an infringement upon the other."&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;Speaking at the event, the UN Special Rapporteur remarked that:&lt;/p&gt;
&lt;blockquote class="quoted" style="text-align: justify; "&gt;"previously surveillance was carried out on targeted basis but the Internet has changed the context by providing the possibility for carrying out mass surveillance. This is the danger."&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;Representatives of the Centre for Internet and Society, &lt;a href="https://www.privacyinternational.org"&gt;Privacy International&lt;/a&gt;, the &lt;a href="https://eff.org"&gt;Electronic Frontier Foundation&lt;/a&gt;,&lt;a href="https://accessnow.org"&gt;Access&lt;/a&gt;,&lt;a href="http://www.hrw.org/"&gt;Human Rights Watch&lt;/a&gt;,&lt;a href="http://en.rsf.org/"&gt;Reporters Without Borders&lt;/a&gt;, &lt;a href="http://www.apc.org/"&gt;Association for Progressive Communications&lt;/a&gt;, and the&lt;a href="https://www.cdt.org/"&gt;Center&lt;/a&gt;&lt;a href="https://www.cdt.org/"&gt; for Democracy and Technology &lt;/a&gt;all are taking part in the event.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Find out more about the Principles at &lt;a href="https://necessaryandproportionate.org"&gt;https://NecessaryandProportionate.org&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;Contacts&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;NGOs currently in Geneva for the 24&lt;sup&gt;th&lt;/sup&gt; Human Rights Council:&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Access&lt;/b&gt;&lt;br /&gt;Fabiola Carrion: &lt;a class="mail-link" href="mailto:fabiola@accessnow.org"&gt;fabiola@accessnow.org&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Association for Progressive Communication&lt;/b&gt;&lt;br /&gt;Shawna Finnegan: &lt;a href="mailto:shawna@apc.org"&gt;shawna@apc.org&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Center for Democracy and Technology&lt;/b&gt;&lt;br /&gt;Matthew Shears: &lt;a href="mailto:mshears@cdt.org"&gt;mshears@cdt.org&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Electronic Frontier Foundation&lt;/b&gt;&lt;br /&gt;Katitza Rodriguez:  &lt;a href="mailto:katitza@eff.org"&gt;katitza@eff.org&lt;/a&gt; - @txitua&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Human Rights Watch&lt;/b&gt;&lt;br /&gt;Cynthia Wong: &lt;a class="mail-link" href="mailto:wongc@hrw.org"&gt;wongc@hrw.org&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Privacy International&lt;/b&gt;&lt;br /&gt;Carly Nyst: &lt;a href="mailto:carly@privacy.org"&gt;carly@privacy.org&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reporters Without Borders&lt;/b&gt;&lt;br /&gt;Lucie Morillon: &lt;a href="mailto:lucie.morillon@rsf.org"&gt;lucie.morillon@rsf.org&lt;/a&gt;&lt;br /&gt;Hélène Sackstein: &lt;a href="mailto:helsack@gmail.com"&gt;helsack@gmail.com&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Signatories&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Argentina&lt;/b&gt;&lt;br /&gt;Ramiro Alvarez: &lt;a href="mailto:rugarte@adc.org.ar"&gt;rugarte@adc.org.ar&lt;/a&gt;&lt;br /&gt;Asociación por los Derechos Civiles&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;&lt;b&gt;Argentina&lt;/b&gt;&lt;br /&gt;Beatriz Busaniche&lt;b&gt;: &lt;/b&gt;&lt;a class="mail-link" href="mailto:bea@vialibre.org.ar"&gt;bea@vialibre.org.ar&lt;/a&gt;&lt;br /&gt;Fundación Via Libre&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;&lt;b&gt;Colombia&lt;/b&gt;&lt;br /&gt;Carolina Botero: &lt;a class="mail-link" href="mailto:carobotero@gmail.com"&gt;carobotero@gmail.com&lt;/a&gt;&lt;br /&gt;Fundación Karisma&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Egypt&lt;/b&gt;&lt;br /&gt;Ahmed Ezzat: &lt;a href="mailto:ahmed.ezzat@afteegypt.org"&gt;ahmed.ezzat@afteegypt.org&lt;/a&gt;&lt;br /&gt;Afteegypt&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Honduras&lt;/b&gt;&lt;br /&gt;Hedme Sierra-Castro: &lt;a href="mailto:hedme.sc@gmail.com"&gt;hedme.sc@gmail.com&lt;/a&gt;&lt;br /&gt;ACI-Participa&lt;/p&gt;
&lt;p&gt;&lt;b&gt;India&lt;/b&gt;&lt;br /&gt;Elonnai Hickok: &lt;a href="mailto:elonnai@cis-india.org"&gt;elonnai@cis-india.org&lt;/a&gt;&lt;br /&gt;Center for Internet and Society&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Korea&lt;/b&gt;&lt;br /&gt;Prof. Park:  &lt;a href="mailto:kyungsinpark@korea.ac.kr"&gt;kyungsinpark@korea.ac.kr&lt;/a&gt;&lt;br /&gt;Open Net Korea&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Macedonia&lt;/b&gt;&lt;br /&gt;Bardhyl Jashari: &lt;a href="mailto:info@metamorphosis.org.mk"&gt;info@metamorphosis.org.mk&lt;/a&gt;&lt;br /&gt;Metamorphosis Foundation for Internet and Society&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Mauritania, Senegal, Tanzania&lt;/b&gt;&lt;br /&gt;Abadacar Diop: &lt;a href="mailto:jonction_jonction@yahoo.fr"&gt;jonction_jonction@yahoo.fr&lt;/a&gt;&lt;br /&gt;Jonction&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;&lt;b&gt;Portugal&lt;/b&gt;&lt;br /&gt;Andreia Martins&lt;b&gt;: &lt;/b&gt;&lt;a class="mail-link" href="mailto:andreia@coolpolitics.pt"&gt;andreia@coolpolitics.pt&lt;/a&gt;&lt;br /&gt;ASSOCIAÇÃO COOLPOLITICS&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Peru&lt;/b&gt;&lt;br /&gt;Miguel Morachimo: &lt;a href="mailto:morachimo@gmail.com"&gt;morachimo@gmail.com&lt;/a&gt;&lt;br /&gt;Hiperderecho&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Russia&lt;/b&gt;&lt;br /&gt;Andrei Soldatov: &lt;a href="mailto:soldatov@agentura.ru"&gt;soldatov@agentura.ru&lt;/a&gt;&lt;br /&gt;Agentura.ru&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Serbia&lt;/b&gt;&lt;br /&gt;Djordje Krivokapic: &lt;a href="mailto:krivokapic@gmail.com"&gt;krivokapic@gmail.com&lt;/a&gt;&lt;br /&gt;SHARE Foundation&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Western Balkans&lt;/b&gt;&lt;br /&gt;Valentina Pellizer: &lt;a href="mailto:valentina.pellizzer@oneworldsee.org"&gt;valentina.pellizzer@oneworldsee.org&lt;/a&gt;&lt;br /&gt;Oneworldsee&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Brasil&lt;/b&gt;&lt;br /&gt;Marcelo Saldanha: &lt;a href="mailto:instituto@bemestarbrasil.org.br"&gt;instituto@bemestarbrasil.org.br&lt;/a&gt;&lt;br /&gt;IBEBrasil&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cis-and-international-coalition-calls-upon-governments-to-protect-privacy'&gt;https://cis-india.org/internet-governance/blog/cis-and-international-coalition-calls-upon-governments-to-protect-privacy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-09-25T07:21:09Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/tech-president-september-23-2013-jessica-mckenzie">
    <title>Three Years Later, IPaidABribe.com Pays Off</title>
    <link>https://cis-india.org/news/tech-president-september-23-2013-jessica-mckenzie</link>
    <description>
        &lt;b&gt;After reporting a bribe on IPaidABribe.com, one Bangalore student has had the satisfaction of seeing action taken against a corrupt public official.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This article by Jessica McKenzie was &lt;a class="external-link" href="http://techpresident.com/news/wegov/24365/three-years-later-ipaidabribecom-pays"&gt;published in TechPresident&lt;/a&gt; on September 23, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The student, Shubham Kahndelwal, was asked to give a bribe before  getting a receipt for registering for an identity card called the  AADHAAR card. He at first refused, but then gave in. In response, the  official gave him a receipt for his father's registration (which he had  submitted along with his own) but not his. He &lt;a href="http://www.ipaidabribe.com/comment-pieces/government-acts-i-paid-bribe-complaint-aadhaar-operator-blacklisted"&gt;told&lt;/a&gt; I Paid A Bribe that he “never knew a simple complaint could make such a difference.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Kahndelwal elaborated:&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;
&lt;p&gt;I was in Chennai when the incident happened and after  that I was furious and was searching all over to look for a complaint  mechanism, when I stumbled upon IPaidaBribe.com. It is a great day and  event for me and for me to share with my friends.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;IPaidABribe.com was &lt;a href="http://blogs.wsj.com/indiarealtime/2010/11/15/paid-a-bribe-in-india-vent-here/"&gt;launched in August 2010&lt;/a&gt; by the Bangalore-based nonprofit Janaagraha, which focuses on civic engagement and improving governance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When first launched, there were concerns over privacy issues and protecting the users who submit complaints. On the other hand, &lt;a href="http://techpresident.com/news/23934/how-technology-and-isnt-helping-fight-corruption-india"&gt;in an interview this May with techPresident's David Eaves&lt;/a&gt;,  Sunil Abraham, the founder of the Center for Internet &amp;amp; Society,  pointed out that in order to make a difference, I Paid A Bribe would  somehow have to close the loop.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Abraham went on:&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;
&lt;p&gt;some of the things that go on with anonymous reporting  cannot happen, and to close the loop it almost needs to become a  paralegal infrastructure. It has to talk to law enforcement and people  have to be arrested, prosecuted and put away.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;That is apparently what happened in this case. The official in  question has been blacklisted and had disciplinary action taken against  him.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To put the success in perspective, however, the bribe requested was  Rs 2000 (US$31.95) and the bribe ultimately given was only Rs 350  (US$5.59).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Abraham also pointed out to Eaves that the real problem in India is “high ticket bribes...at the top of the pyramid.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;So while complaints from people like Kahndelwal are what keep the  feeds at IPaidABribe.com constantly refreshing, they're mere drops in  the bucket when compared to the millions of dollars moving in scandals  like the &lt;a href="http://indiatoday.intoday.in/story/what-is-the-2g-scam-all-about/1/188832.html"&gt;2G spectrum scam&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Personal Democracy Media is grateful to the Omidyar Network and  the UN Foundation for their generous support of techPresident's WeGov  section.&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/tech-president-september-23-2013-jessica-mckenzie'&gt;https://cis-india.org/news/tech-president-september-23-2013-jessica-mckenzie&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-09-25T06:05:05Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/public-law-and-jurisprudential-issues-of-privacy-talk-at-cis">
    <title>Public Law and Jurisprudential Issues of Privacy: A Talk at CIS</title>
    <link>https://cis-india.org/internet-governance/events/public-law-and-jurisprudential-issues-of-privacy-talk-at-cis</link>
    <description>
        &lt;b&gt;On Friday, September 27, 2013, Abhayraj Naik will give a talk on public law and jurisprudential issues related to privacy. CIS will host the talk at its office in Bangalore from 4.30 p.m. to 6.00 p.m.&lt;/b&gt;
        
&lt;h3&gt;Abhayraj Naik&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Abhayraj Naik is a graduate of the National Law School of  India University, Bangalore, and the Yale Law School. He  previously  taught public law at the Jindal Global Law School of the OP  Jindal Global University where he also co-directed  the Centre for Public Law &amp;amp; Jurisprudence from September 2009 to  July 2012.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Abhay is actively associated with the Environment Support Group, Bangalore  (&lt;a href="http://www.esgindia.org"&gt;http://www.esgindia.org&lt;/a&gt;), and has also been associated with the  Meiklejohn Civil Liberties Institute, Berkeley, USA; Universities Allied  for Essential Medicines, USA; Culture Move, Bangalore and other  national and international advocacy, activism and research groups for  several years now.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Abhay's research interests include legal theory,  philosophy, criminal justice reform, urban governance, ecology, and  technology policy. His current research projects include interdisciplinary studies  of urban street vending, information privacy, fiduciary duties,  forgiveness, biopiracy, and criminal justice reform.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;He enjoys cycling, travel, poetry, music, and radical educational and ecological activism.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Abhay currently teaches at the Azim Premji University in Bangalore.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;VIDEO&lt;/strong&gt;&lt;/p&gt;
&lt;iframe src="//www.youtube.com/embed/eTWSXa8g0gA" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/public-law-and-jurisprudential-issues-of-privacy-talk-at-cis'&gt;https://cis-india.org/internet-governance/events/public-law-and-jurisprudential-issues-of-privacy-talk-at-cis&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-12-30T12:39:23Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/bangalore-social-good">
    <title>Bangalore + Social Good</title>
    <link>https://cis-india.org/internet-governance/events/bangalore-social-good</link>
    <description>
        &lt;b&gt;In conjunction with The Social Good Summit held in New York City on September 22 - 24, Ashoka India, IDEX + Green Lungi are partnering to host the Bangalore + Sustainability event! The Social Good Summit aims to explore creative ways that technology can be leveraged for positive social change. Green Lungi in collaboration with IDEX and Ashoka is holding the event at CIS, Bangalore on September 21.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;Sharath Chandra Ram, a researcher at CIS is one of the panelists. A brief abstract of his talk is given below:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;"Are digital networked technologies adopted or used in the same way globally across all communities? Were social networks and apps across Twitter or Facebook really that pivotal in the mass citizen uprisings of the recent past? In this session, we shall see how it is essential to consider cultural specificities while designing technological interventions. Furthermore, I shall discuss how an effective strategy for citizen activism is not that which relies solely on virtual networks, but one that bridges networks, across different mediums, to engage offline citizens as much as the online. There will be a few live demonstrations of solutions we developed at the Centre for Internet and Society which embrace openness in pervasive technologies that enable us to bridge this crucial trans-medial interface&lt;/i&gt;.&lt;i&gt;"&lt;/i&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The Bangalore + Sustainability event will focus on devising creative applications of technologies to confront sustainability challenges. We believe that young people have the power to affect change, and its time that we provide them with more opportunities to solve the challenges they see around them. This event is a first step in the direction of developing these problem-solving skills in our young people. Through an innovative Make-a-thon format, participants will engage in developing creative tech-based solutions to everyday challenges like road safety, waste management, water management, improving green cover and safer spaces for women.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Event Format and Details&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;1:45 - 2:00 -- Registration + Welcome&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;2:00 - 2:45 -- Panel Discussion + Q&amp;amp;A&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Panelists will give a brief talk (5 - 7 minutes), posing questions for participants to consider around the intersection of technology + behavioral change + sustainability + youth engagement. A panelist from each of these sectors will set the context for the Jam to follow:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Sustainability&lt;/li&gt;
&lt;li&gt;Communications/Design&lt;/li&gt;
&lt;li&gt;Technology&lt;/li&gt;
&lt;li&gt;Young Changemakers&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/bangalore-social-good.pdf" class="internal-link"&gt;Click to download the event brochure&lt;/a&gt; for details on the panelists/speakers&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/bangalore-social-good'&gt;https://cis-india.org/internet-governance/events/bangalore-social-good&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-09-25T07:43:58Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/central-monitoring-system-questions-to-be-asked-in-parliament">
    <title>The Central Monitoring System: Some Questions to be Raised in Parliament</title>
    <link>https://cis-india.org/internet-governance/blog/central-monitoring-system-questions-to-be-asked-in-parliament</link>
    <description>
        &lt;b&gt;The following are some model questions to be raised in the Parliament regarding the lack of transparency in the central monitoring system.&lt;/b&gt;
        &lt;p&gt;&lt;b&gt;&lt;span style="text-decoration: underline;"&gt;Preliminary&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;The Central Monitoring System (CMS) is a Central Government project to intercept communications, both voice and data, that is transmitted via telephones and the internet to, from and within India. Owing to the vast nature of this enterprise, the CMS cannot be succinctly described and the many issues surrounding this project are diverse. This Issue Brief will outline preliminary constitutional, legal and technical concerns that are presented by the CMS.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;At the outset, it must be clearly understood that no public documentation exists to explain the scope, functions and technical architecture of the CMS. This lack of transparency is the single-largest obstacle to understanding the Central Government’s motives in conceptualising and operationalizing the CMS. This lack of public documentation is also the chief reason for the brevity of this Issue Note. Without making public the policy, law and technical abilities of the CMS, there cannot be an informed national debate on the primary concerns posed by the CMS, i.e the extent of envisaged state surveillance upon Indian citizens and the safeguards, if any, to protect the individual right to privacy. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;&lt;span style="text-decoration: underline;"&gt;Surveillance and Privacy&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Surveillance is necessary to secure political organisation. Modern nation-states, which are theoretically organised on the basis of shared national and societal characteristics, require surveillance to detect threats to these characteristics. In democratic societies, beyond the immediate requirements of national integrity and security, surveillance must be targeted at securing the safety and rights of individual citizens. This Issue Brief does not dispute the fact that democratic countries, such as India, should conduct surveillance to secure legitimate ends. Concerns, however, arise when surveillance is conducted in a manner unrestricted and unregulated by law; these concerns are compounded when a lack of law is accompanied by a lack of transparency.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Technological advancement leads to more intrusive surveillance. The evolution of surveillance in the United States resulted, in 1967, in the first judicial recognition of the right to privacy. In &lt;i&gt;Katz&lt;/i&gt; v. &lt;i&gt;United States&lt;/i&gt; the US Supreme Court ruled that the privacy of communications had to be balanced with the need to conduct surveillance; and, therefore, wiretaps had to be warranted, judicially sanctioned and supported by probable cause. &lt;i&gt;Katz&lt;/i&gt; expanded the scope of the Fourth Amendment of the US Constitution, which protected against unreasonable searches and seizures. Most subsequent US legal developments relating to the privacy of communications from surveillance originate in the &lt;i&gt;Katz&lt;/i&gt; judgement. Other common law countries, such as the United Kingdom and Canada, have experienced similar judicial evolution to recognise that the right to privacy must be balanced with governance.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;&lt;span style="text-decoration: underline;"&gt;&lt;br /&gt;Right to Privacy in India&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Unfortunately, India does not have a persuasive jurisprudence of privacy protection. In the &lt;i&gt;Kharak Singh&lt;/i&gt; (1964) and &lt;i&gt;Gobind&lt;/i&gt; (1975) cases, the Supreme Court of India considered the question of privacy from physical surveillance by the police in and around the homes of suspects. In the latter case, the Supreme Court found that some of the Fundamental Rights “could be described as contributing to the right to privacy” which was nevertheless subject to a compelling public interest. This insipid inference held the field until 1994 when, in the &lt;i&gt;Rajagopal&lt;/i&gt; (“Auto Shankar”, 1994) case, the Supreme Court, for the first time, directly located privacy within the ambit of the right to personal liberty recognised by Article 21 of the Constitution. However, &lt;i&gt;Rajagopal&lt;/i&gt; dealt specifically with the publication of an autobiography, it did not consider the privacy of communications. In 1997, the Supreme Court considered the question of wiretaps in the &lt;i&gt;PUCL&lt;/i&gt; case. While finding that wiretaps invaded the privacy of communications, it continued to permit them subject to some procedural safeguards which continue to be routinely ignored. A more robust statement of the right to privacy was made recently by the Delhi High Court in the &lt;i&gt;Naz &lt;/i&gt;&lt;i&gt;Foundation&lt;/i&gt; case (2011) that de-criminalised consensual homosexual acts; however, this judgment has been appealed to the Supreme Court.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;&lt;span style="text-decoration: underline;"&gt;Issues Pertaining to the CMS&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;While judicial protection from physical surveillance was cursorily dealt with in the &lt;i&gt;Kharak Singh&lt;/i&gt; and &lt;i&gt;Gobind&lt;/i&gt; cases, the Supreme Court of India directly considered the issue of wiretaps in the &lt;i&gt;PUCL&lt;/i&gt; case. Wiretaps in India primarily occur on the strength of powers granted to certain authorities under section 5(2) of the Indian Telegraph Act, 1885. The Court found that the Telegraph Act, and Rules made thereunder, did not prescribe adequate procedural safeguards to create a “just and fair” mechanism to conduct wiretaps. Therefore, it laid down the following procedure to conduct wiretaps: &lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;(a) the order should be issued by the relevant Home Secretary (this power is delegable to a Joint Secretary),&lt;br /&gt; (b) the interception must be carried out exactly in terms of the order and not in excess of it,&lt;br /&gt; (c) a determination of whether the information could be reasonably secured by other means,&lt;br /&gt; (d) the interception shall cease after sixty (60) days.&lt;/p&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Therefore, prima facie, any voice interception conducted through the CMS will be in violation of this Supreme Court judgement. The CMS will enforce blanket surveillance upon the entire country without regard for reasonable cause or necessity. This movement away from targeted surveillance to blanket surveillance without cause, conducted without statutory sanction and without transparency, is worrying.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Accordingly, the following questions may be raised, in Parliament, to learn more about the CMS project: &lt;/li&gt;
&lt;/ul&gt;
&lt;ol&gt;
&lt;li&gt;Which statutes, Government Orders, notifications etc deal with the establishment and maintenance of the CMS?&lt;/li&gt;
&lt;li&gt;Which is the nodal agency in charge of implementing the CMS?&lt;/li&gt;
&lt;li&gt;What are the powers and functions of the nodal agency?&lt;/li&gt;
&lt;li&gt;What guarantees exist to protect ordinary Indian citizens from intrusive surveillance without cause?&lt;/li&gt;
&lt;li&gt;What are the technical parameters of the CMS?&lt;/li&gt;
&lt;li&gt;What are the consequences for misuse or abuse of powers by any person working in the CMS project?&lt;/li&gt;
&lt;li&gt;What recourse is available to Indian citizens against whom there is unnecessary surveillance or against whom there has been a misuse or abuse of power?&lt;/li&gt;
&lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/central-monitoring-system-questions-to-be-asked-in-parliament'&gt;https://cis-india.org/internet-governance/blog/central-monitoring-system-questions-to-be-asked-in-parliament&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bhairav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Central Monitoring System</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-09-25T10:30:10Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/national-privacy-roundtable-meetings">
    <title>The National Privacy Roundtable Meetings</title>
    <link>https://cis-india.org/internet-governance/blog/national-privacy-roundtable-meetings</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society ("CIS"), the Federation of Indian Chambers of Commerce and Industry ("FICCI"), the Data Security Council of India ("DSCI") and Privacy International are, in partnership, conducting a series of national privacy roundtable meetings across India from April to October 2013. The roundtable meetings are designed to discuss possible frameworks to privacy in India.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;&lt;i&gt;This research was undertaken as part of the 'SAFEGUARDS' project that CIS is undertaking with Privacy International and IDRC.&lt;/i&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;Background: The Roundtable Meetings and Organisers&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/"&gt;CIS&lt;/a&gt; is a Bangalore-based non-profit think-tank and research organisation with interests in, amongst other fields, the law, policy and practice of free speech and privacy in India. &lt;a href="http://www.ficci.com/"&gt;FICCI&lt;/a&gt; is a non-governmental, non-profit association of approximately 250,000 Indian bodies corporate. It is the oldest and largest organisation of businesses in India and represents a national corporate consensus on policy issues. &lt;a href="http://www.dsci.in/"&gt;DSCI&lt;/a&gt; is an initiative of the National Association of Software and Service Companies, a non-profit trade association of Indian information technology ("IT") and business process outsourcing ("BPO") concerns, which promotes data protection in India. &lt;a href="https://www.privacyinternational.org/"&gt;Privacy International&lt;/a&gt; is a London-based non-profit organisation that defends and promotes the right to privacy across the world.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Privacy in the Common Law and in India&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Because privacy is a multi-faceted concept, it has rarely been singly regulated. A taxonomy of privacy yields many types of individual and social activity to be differently regulated based on the degree of harm that may be caused by intrusions into these activities.&lt;a href="#fn1" name="fr1"&gt;[1] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The nature of the activity is significant; activities that are implicated by the state are attended by public law concerns and those conducted by private persons &lt;i&gt;inter se&lt;/i&gt; demand market-based regulation. Hence, because the principles underlying warranted police surveillance differ from those prompting consensual collections of personal data for commercial purposes, legal governance of these different fields must proceed differently. For this and other reasons, the legal conception of privacy — as opposed to its cultural construction – has historically been diverse and disparate.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Traditionally, specific legislations have dealt separately with individual aspects of privacy in tort law, constitutional law, criminal procedure and commercial data protection, amongst other fields. The common law does not admit an enforceable right to privacy.&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt; In the absence of a specific tort of privacy, various equitable remedies, administrative laws and lesser torts have been relied upon to protect the privacy of claimants.&lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The question of whether privacy is a constitutional right has been the subject of limited judicial debate in India. The early cases of &lt;i&gt;Kharak Singh&lt;/i&gt; (1964)&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt; and &lt;i&gt;Gobind&lt;/i&gt; (1975)&lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt; considered privacy in terms of physical surveillance by the police in and around the homes of suspects and, in the latter case, the Supreme Court of India found that some of the Fundamental Rights “could be described as contributing to the right to privacy” which was nevertheless subject to a compelling public interest. This inference held the field until 1994 when, in the &lt;i&gt;Rajagopal&lt;/i&gt; case (1994),&lt;a href="#fn6" name="fr6"&gt;[6]&lt;/a&gt; the Supreme Court, for the first time, directly located privacy within the ambit of the right to personal liberty guaranteed by Article 21 of the Constitution of India. However, &lt;i&gt;Rajagopal&lt;/i&gt; dealt specifically with a book, it did not consider the privacy of communications. In 1997, the Supreme Court considered the question of wiretaps in the &lt;i&gt;PUCL&lt;/i&gt; case (1996)&lt;a href="#fn7" name="fr7"&gt;[7]&lt;/a&gt; and, while finding that wiretaps invaded the privacy of communications, it continued to permit them subject to some procedural safeguards.&lt;a href="#fn8" name="fr8"&gt;[8] &lt;/a&gt;A more robust statement of the right to privacy was made recently by the Delhi High Court in the &lt;i&gt;Naz &lt;/i&gt;&lt;i&gt;Foundation&lt;/i&gt; case (2011)&lt;a href="#fn9" name="fr9"&gt;[9] &lt;/a&gt;that de-criminalised consensual homosexual acts; however, this judgment is now in appeal.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Attempts to Create a Statutory Regime&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The silence of the common law leaves the field of privacy in India open to occupation by statute. With the recent and rapid growth of the Indian IT and BPO industry, concerns regarding the protection of personal data to secure privacy have arisen. In May 2010, the European Union ("EU") commissioned an assessment of the adequacy of Indian data protection laws to evaluate the continued flow of personal data of European data subjects into India for processing. That assessment made adverse findings on the adequacy and preparedness of Indian data protection laws to safeguard personal data.&lt;a href="#fn10" name="fr10"&gt;[10]&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Conducted amidst negotiations for a free trade agreement between India and the EU, the failed assessment potentially impeded the growth of India’s outsourcing industry that is heavily reliant on European and North American business.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Consequently, the Department of Electronics and Information Technology of the Ministry of Communications and Information Technology, Government of India, issued subordinate legislation under the rule-making power of the Information Technology Act, 2000 ("IT Act"), to give effect to section 43A of that statute. These rules – the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011 ("Personal Data Rules")&lt;a href="#fn11" name="fr11"&gt;[11]&lt;/a&gt; — were subsequently reviewed by the Committee on Subordinate Legislation of the 15&lt;sup&gt;th&lt;/sup&gt; Lok Sabha.&lt;a href="#fn12" name="fr12"&gt;[12]&lt;/a&gt; The Committee found that the Personal Data Rules contained clauses that were ambiguous, invasive of privacy and potentially illegal.&lt;a href="#fn13" name="fr13"&gt;[13]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 2011, a draft privacy legislation called the ‘Right to Privacy Bill, 2011’, which was drafted within the Department of Personnel and Training ("DoPT") of the Ministry of Personnel, Public Grievances and Pensions, Government of India,  was made available on the internet along with several file notings ("First DoPT Bill"). The First DoPT Bill contained provisions for the regulation of personal data, interception of communications, visual surveillance and direct marketing. The First DoPT Bill was referred to a Committee of Secretaries chaired by the Cabinet Secretary which, on 27 May 2011, recommended several changes including re-drafts of the chapters relating to interception of communications and surveillance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Aware of the need for personal data protection laws to enable economic growth, the Planning Commission constituted a Group of Experts under the chairmanship of Justice Ajit P. Shah, a retired Chief Justice of the Delhi High Court who delivered the judgment in the &lt;i&gt;Naz Foundation&lt;/i&gt; case, to study foreign privacy laws, analyse existing Indian legal provisions and make specific proposals for incorporation into future Indian law. The Justice Shah Group of Experts submitted its Report to the Planning Commission on 16 October 2012 wherein it proposed the adoption of nine National Privacy Principles.&lt;a href="#fn14" name="fr14"&gt;[14]&lt;/a&gt; These are the principles of notice, choice and consent, collection limitation, purpose limitation, disclosure of information, security, openness, and accountability. The Report recommended the application of these principles in laws relating to interception of communications, video and audio recordings, use of personal identifiers, bodily and genetic material, and personal data.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Criminal Procedure and Special Laws Relating to Privacy&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;While the &lt;i&gt;Kharak Singh&lt;/i&gt; and &lt;i&gt;Gobind&lt;/i&gt; cases first brought the questions of permissibility and limits of police surveillance to the Supreme Court, the power to collect information and personal data of a person is firmly embedded in Indian criminal law and procedure. Surveillance is an essential condition of the nation-state; the inherent logic of its foundation requires the nation-state to perpetuate itself by interdicting threats to its peaceful existence. Surveillance is a method by which the nation-state’s agencies interdict those threats. The challenge for democratic countries such as India is to find the optimal balance between police powers of surveillance and the essential freedoms of its citizens, including the right to privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The regime governing the interception of communications is contained in section 5(2) of the Indian Telegraph Act, 1885 ("Telegraph Act") read with rule 419A of the Indian Telegraph Rules, 1951 ("Telegraph Rules"). The Telegraph Rules were amended in 2007&lt;a href="#fn15" name="fr15"&gt;[15]&lt;/a&gt; to give effect to, amongst other things, the procedural safeguards laid down by the Supreme Court in the &lt;i&gt;PUCL&lt;/i&gt; case. However, India’s federal scheme permits States to also legislate in this regard. Hence, in addition to the general law on interceptions contained in the Telegraph Act and Telegraph Rules, some States have also empowered their police forces with interception functions in certain cases.&lt;a href="#fn16" name="fr16"&gt;[16]&lt;/a&gt; Ironically, even though some of these State laws invoke heightened public order concerns to justify their invasions of privacy, they establish procedural safeguards based on the principle of probable cause that surpasses the Telegraph Rules.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In addition, further subordinate legislation issued to fulfil the provisions of sections 69(2) and 69B(3) of the IT Act permit the interception and monitoring of electronic communications — including emails — to collect traffic data and to intercept, monitor, and decrypt electronic communications.&lt;a href="#fn17" name="fr17"&gt;[17]&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The proposed Privacy (Protection) Bill, 2013 and Roundtable Meetings&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In this background, the proposed Privacy (Protection) Bill, 2013 seeks to protect privacy by regulating (i) the manner in which personal data is collected, processed, stored, transferred and destroyed — both by private persons for commercial gain and by the state for the purpose of governance; (ii) the conditions upon which, and procedure for, interceptions of communications — both voice and data communications, including both data-in-motion and data-at-rest — may be conducted and the authorities permitted to exercise those powers; and, (iii) the manner in which forms of surveillance not amounting to interceptions of communications — including the collection of intelligence from humans, signals, geospatial sources, measurements and signatures, and financial sources — may be conducted.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Previous roundtable meetings to seek comments and opinion on the proposed Privacy (Protection) Bill, 2013 took place at:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;New Delhi: April 13, 2013 (&lt;a class="external-link" href="http://bit.ly/17REl0W"&gt;http://bit.ly/17REl0W&lt;/a&gt;) with 45 participants;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Bangalore: April 20, 2013 (&lt;a class="external-link" href="http://bit.ly/162t8rU"&gt;http://bit.ly/162t8rU&lt;/a&gt;) with 45 participants;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Chennai: May 18, 2013 (&lt;a class="external-link" href="http://bit.ly/12ICGYD"&gt;http://bit.ly/12ICGYD&lt;/a&gt;) with 25 participants.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Mumbai, June 15, 2013 (&lt;a class="external-link" href="http://bit.ly/12fJSvZ"&gt;http://bit.ly/12fJSvZ&lt;/a&gt;) with 20 participants;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Kolkata: July 13, 2013 (&lt;a class="external-link" href="http://bit.ly/11dgINZ"&gt;http://bit.ly/11dgINZ&lt;/a&gt;) with 25 participants; and&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;New Delhi: August 24, 2013 (&lt;a class="external-link" href="http://bit.ly/195cWIf"&gt;http://bit.ly/195cWIf&lt;/a&gt;) with 40 participants.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;The roundtable meetings were multi-stakeholder events with participation from industry representatives, lawyers, journalists, civil society organizations and Government representatives. On an average, 75 per cent of the participants represented industry concerns, 15 per cent represented civil society and 10 per cent represented regulatory authorities. The model followed at the roundtable meetings allowed for equal participation from all participants.&lt;/p&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. See generally, Dan Solove, “A Taxonomy of Privacy” &lt;i&gt;University of Pennsylvania Law Review&lt;/i&gt; (Vol. 154, No. 3, January 2006).&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. &lt;i&gt;Wainwright&lt;/i&gt; v. &lt;i&gt;Home Office&lt;/i&gt; [2003] UKHL 53.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. See &lt;i&gt;A&lt;/i&gt; v. &lt;i&gt;B plc&lt;/i&gt; [2003] QB 195; &lt;i&gt;Wainwright&lt;/i&gt; v. &lt;i&gt;Home Office &lt;/i&gt;[2001] EWCA Civ 2081; &lt;i&gt;R (Ellis)&lt;/i&gt; v. &lt;i&gt;Chief Constable of Essex Police&lt;/i&gt; [2003] EWHC 1321 (Admin).&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. &lt;i&gt;Kharak Singh&lt;/i&gt; v. &lt;i&gt;State of Uttar Pradesh&lt;/i&gt; AIR 1963 SC 1295.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. &lt;i&gt;Gobind&lt;/i&gt; v. &lt;i&gt;State of Madhya Pradesh&lt;/i&gt; AIR 1975 SC 1378.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]. &lt;i&gt;R. Rajagopal&lt;/i&gt; v. &lt;i&gt;State of Tamil Nadu&lt;/i&gt; AIR 1995 SC 264.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;]. &lt;i&gt;People’s Union for Civil Liberties&lt;/i&gt; v. &lt;i&gt;Union of India&lt;/i&gt; (1997) 1 SCC 30.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr8" name="fn8"&gt;8&lt;/a&gt;]. A Division Bench of the Supreme Court of India comprising Kuldip Singh and Saghir Ahmad, JJ, found that the procedure set out in section 5(2) of the Indian Telegraph Act, 1885 and rule 419 of the Indian Telegraph Rules, 1951 did not meet the “just, fair and reasonable” test laid down in &lt;i&gt;Maneka Gandhi&lt;/i&gt; v. &lt;i&gt;Union of India&lt;/i&gt; AIR 1978 SC 597 requisite for the deprivation of the right to personal liberty, from whence the Division Bench found a right to privacy emanated, guaranteed under Article 21 of the Constitution of India. Therefore, Kuldip Singh, J, imposed nine additional procedural safeguards that are listed in paragraph 35 of the judgment.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr9" name="fn9"&gt;9&lt;/a&gt;]. &lt;i&gt;Naz Foundation&lt;/i&gt; v. &lt;i&gt;Government of NCT Delhi&lt;/i&gt; (2009) 160 DLT 277.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr10" name="fn10"&gt;10&lt;/a&gt;]. The 2010 data adequacy assessment of Indian data protection laws was conducted by Professor Graham Greenleaf. His account of the process and his summary of Indian law can found at Graham Greenleaf, "Promises and Illusions of Data Protection in Indian Law"&lt;i&gt; International Data Privacy Law&lt;/i&gt; (47-69, Vol. 1, No. 1, March 2011).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr11" name="fn11"&gt;11&lt;/a&gt;]. The Rules were brought into effect vide Notification GSR 313(E) on 11 April 2011. CIS submitted comments on the Rules that can be found here – &lt;a href="https://cis-india.org/internet-governance/blog/comments-on-the-it-reasonable-security-practices-and-procedures-and-sensitive-personal-data-or-information-rules-2011"&gt;http://cis-india.org/internet-governance/blog/comments-on-the-it-reasonable-security-practices-and-procedures-and-sensitive-personal-data-or-information-rules-2011&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr12" name="fn12"&gt;12&lt;/a&gt;]. The Committee on Subordinate Legislation, a parliamentary ‘watchdog’ committee, is mandated by rules 317-322 of the Rules of Procedure and Conduct of Business in the Lok Sabha (14&lt;sup&gt;th&lt;/sup&gt; edn., New Delhi: Lok Sabha Secretariat, 2010) to examine the validity of subordinate legislation.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr13" name="fn13"&gt;13&lt;/a&gt;]. See the 31&lt;sup&gt;st&lt;/sup&gt; Report of the Committee on Subordinate Legislation that was presented on 21 March 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr14" name="fn14"&gt;14&lt;/a&gt;]. See paragraphs 7.14-7.17 on pages 69-72 of the Report of the Group of Experts on Privacy, 16 October 2012, Planning Commission, Government of India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr15" name="fn15"&gt;15&lt;/a&gt;]. See, the Indian Telegraph (Amendment) Rules, 2007, which were brought into effect &lt;i&gt;vide&lt;/i&gt; Notification GSR 193(E) of the Department of Telecommunications of the Ministry of Communications and Information Technology, Government of India, dated 1 March 2007.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr16" name="fn16"&gt;16&lt;/a&gt;]. See, &lt;i&gt;inter alia&lt;/i&gt;, section 14 of the Maharashtra Control of Organised Crime Act, 1999; section 14 of the Andhra Pradesh Control of Organised Crime Act, 2001; and, section 14 of the Karnataka Control of Organised Crime Act, 2000.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr17" name="fn17"&gt;17&lt;/a&gt;]. See, the Information Technology (Procedure and Safeguards for Monitoring and Collecting Traffic Data and Information) Rules, 2009 vide GSR 782 (E) dated 27 October 2009; and, Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009 vide GSR 780 (E) dated 27 October 2009.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/national-privacy-roundtable-meetings'&gt;https://cis-india.org/internet-governance/blog/national-privacy-roundtable-meetings&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bhairav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>SAFEGUARDS</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-03-21T10:03:44Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/jamia-millia-islamia-new-delhi-september-18-2013-privacy-and-surveillance-in-india">
    <title>Privacy and Surveillance in India</title>
    <link>https://cis-india.org/news/jamia-millia-islamia-new-delhi-september-18-2013-privacy-and-surveillance-in-india</link>
    <description>
        &lt;b&gt;Sunil Abraham, Executive Director from the Centre for Internet and Society will give a talk on privacy and surveillance in India at this event organised by the Centre for Culture, Media and Governance, Jamia Millia Islamia on September 18, 2013. The talk will be held at Network Governance Lab, CCMG, Jamia Millia Islamia in New Delhi at 11.30 a.m.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy-surveillance.pdf" class="internal-link"&gt;Click to read the brochure&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h3 style="text-align: justify; "&gt;Abstract&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The talk will cover the development of privacy policy in India over the last 3 years, particularly in relation to projects such as NATGRID, CMS and UID. Special attention will be paid to the Justice A.P. Shah committee report, the last leak of the privacy bill from the DoPT and also the citizen draft of the privacy bill developed by the Centre for Internet and Society. International experiences such as Snowden's disclosures and the development of communication surveillance principles developed by EFF and others will be compared and contrasted with the Indian context.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;About the Speaker&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Sunil is the executive director of the Centre for Internet and Society (CIS), Bangalore. CIS is a 4 year old policy and academic research organisation that focuses on accessibility by the disabled, intellectual property rights policy reform, openness [Free/Open Source Software, Open Standards, Open Content, Open Access and Open Educational Resources], internet governance, telecom, digital natives and digital humanities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He is also the founder of Mahiti, a social enterprise aiming to reduce the cost and complexity of information and communication technology for the voluntary sector by using free software. Sunil continues to serve on the board of Mahiti. He is an Ashoka fellow and was elected for a Sarai FLOSS Fellowship. For three years, Sunil also managed the International Open Source Network, a project of United Nations Development Programme's Asia-Pacific Development Information Programme, serving 42 countries in the Asia-Pacific region.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sunil currently serves on the advisory boards of Open Society Foundations - Information Programme, Mahiti, Samvada and International Centre for Free/Open Source Software.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/jamia-millia-islamia-new-delhi-september-18-2013-privacy-and-surveillance-in-india'&gt;https://cis-india.org/news/jamia-millia-islamia-new-delhi-september-18-2013-privacy-and-surveillance-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-09-13T09:49:25Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/what-google-and-facebook-tell-about-govt-data-requests">
    <title>Transparency Reports — A Glance on What Google and Facebook Tell about Government Data Requests</title>
    <link>https://cis-india.org/internet-governance/blog/what-google-and-facebook-tell-about-govt-data-requests</link>
    <description>
        &lt;b&gt;Transparency Reports are a step towards greater accountability but how efficacious are they really?  &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Prachi Arya examines the transparency reports released by tech giants with a special focus on user data requests made to &lt;a class="external-link" href="https://www.google.co.in/"&gt;Google&lt;/a&gt; and &lt;a class="external-link" href="https://www.facebook.com/"&gt;Facebook&lt;/a&gt; by Indian law enforcement agencies. &lt;i&gt;&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;The research was conducted as part of the 'SAFEGUARDS' project that CIS is doing with Privacy International and IDRC.&lt;/i&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;According to a recent &lt;a class="external-link" href="http://www.comscore.com/Insights/Press_Releases/2013/8/comScore_Releases_the_2013_India_Digital_Future_in_Focus_Report"&gt;comScore Report&lt;/a&gt; India has now become the third largest internet user with nearly 74 million citizens on the Internet, falling just behind China and the United States. The report also reveals that Google is the preferred search engine for Indians and Facebook is the most popular social media website followed by &lt;a class="external-link" href="http://www.linkedin.com/"&gt;LinkedIn&lt;/a&gt; and &lt;a class="external-link" href="https://twitter.com/"&gt;Twitter&lt;/a&gt;. While users posting their photos on Facebook can limit viewership through privacy settings, there isn’t much they can do against government seeking information on their profiles. All that can be said for sure in the post-Snowden world is that large-scale surveillance is a reality and the government wants it on their citizen’s online existence. In this Orwellian scenario, transparency reports provide a trickle of information on how much our government finds out about us.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The first transparency report was released by Google three years ago to provide an insight into &lt;a class="external-link" href="http://googleblog.blogspot.in/2013/04/transparency-report-more-government.html"&gt;‘the scale and scope of government requests for censorship and data around the globe’&lt;/a&gt;. Since then the issuance of such reports is increasingly becoming a standard practice for tech giants. An &lt;a class="external-link" href="https://www.eff.org/who-has-your-back-2013"&gt;Electronic Frontier Foundation Report&lt;/a&gt; reveals that major companies that have followed Google’s lead include Dropbox, LinkedIn, Microsoft and Twitter&lt;a href="#_ftn3" name="_ftnref3"&gt;&lt;span class="MsoFootnoteReference"&gt;&lt;span class="MsoFootnoteReference"&gt; &lt;/span&gt;&lt;/span&gt;&lt;/a&gt; with Facebook and Yahoo! being the latest additions&lt;a href="#_ftn4" name="_ftnref4"&gt;&lt;span class="MsoFootnoteReference"&gt;&lt;span class="MsoFootnoteReference"&gt; &lt;/span&gt;&lt;/span&gt;&lt;/a&gt;. Requests to &lt;a class="external-link" href="https://transparency.twitter.com/"&gt;Twitter&lt;/a&gt; and &lt;a class="external-link" href="https://www.microsoft.com/about/corporatecitizenship/en-us/reporting/transparency/"&gt;Microsoft&lt;/a&gt; from Indian law enforcement agencies were significantly less than requests to Facebook and Google. Twitter revealed that Indian law enforcement agencies made less than 10 requests, none of which resulted in sharing of user information. Out of the 418 requests made to Microsoft by India (excluding Skype), 88.5 per cent were complied with for non-content user data. The &lt;a class="external-link" href="http://info.yahoo.com/transparency-report/"&gt;Yahoo! Transparency Report&lt;/a&gt; revealed that 6 countries surpassed India in terms of the number of user data requests. Indian agencies requested user data 1490 times from 2704 accounts for both content and non-content data and over 50 per cent of these requests were complied with.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The following is a compilation of what the latest transparency reports issued by Facebook and Google.&lt;/p&gt;
&lt;h3 class="external-link"&gt;&lt;a class="external-link" href="http://www.google.com/transparencyreport/"&gt;Google&lt;/a&gt;&lt;/h3&gt;
&lt;blockquote class="quoted" style="text-align: justify; "&gt;"The information we share on the Transparency Report is just a sliver of what happens on the internet"&lt;br /&gt;&lt;b&gt;Susan Infantino&lt;/b&gt;, &lt;i&gt;Legal Director for Google&lt;/i&gt;&lt;/blockquote&gt;
&lt;p class="MsoListParagraph"&gt;Beginning from December 2009, Google has published several biannual transparency reports:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;It discloses traffic data of Google services globally  and  statistics on  removal requests received from copyright owners or   governments as well  as user data requests received from government   agencies and courts. It  also lays down the legal process required to be   followed by government  agencies seeking data.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;There was a 90 per cent increment in the number of &lt;a class="external-link" href="http://www.google.com/transparencyreport/removals/government/"&gt;content removal requests&lt;/a&gt; received by Google from India. The requests complied with included:       
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Restricting videos containing clips from the controversial movie “Innocence of Muslims” from view. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Many YouTube videos and comments as well as some Blogger blog posts   being  restricted from local view for disrupting public order in   relation to  instability in North East India.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;For &lt;a class="external-link" href="http://www.google.com/transparencyreport/userdatarequests/IN/"&gt;User Data requests&lt;/a&gt;,    the Google report details the number of user data requests and    users/accounts as well as percentage of requests which were partially or    completely complied with. In India the user data requests more than    doubled from 1,061 in the July-December 2009 period to 2,431 in the    July-December 2012 period. The compliance rate decreased from 79 per   cent in the  July-December 2010 period to 66 per cent in the last   report.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Jurisdictions outside the United States can seek disclosure using   Mutual  Legal Assistance Treaties or any ‘other diplomatic and   cooperative  arrangement’. Google also provides information on a   voluntary basis if  requested following a valid legal process if the   requests are in  consonance with international norms, U.S. and the   requesting countries'  laws and Google’s policies.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;a class="external-link" href="https://www.facebook.com/about/government_requests"&gt;Facebook&lt;/a&gt;&lt;/h3&gt;
&lt;ul&gt;
&lt;blockquote class="quoted" style="text-align: justify; "&gt;"We hope this report will be useful to our users in   the ongoing debate  about the proper standards for government requests   for user information  in official investigations." &lt;br /&gt;&lt;b&gt;Colin Stretch&lt;/b&gt;, &lt;i&gt; Facebook General Counsel&lt;/i&gt;&lt;/blockquote&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Facebook inaugurated its first ever transparency report last Tuesday with a promise to continue releasing these reports.&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;The ‘Global Government Requests Report’ provides information on the     number of requests received by the social media giant for  user/account    information by country and the percentage of requests it  complied  with.   It also includes operational guidelines for law  enforcement   authorities.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;The report covers the first six months of 2013, specifically till     June 30. In this period India made 3,245 requests from 4,144     users/accounts and half of these requests were complied with. &lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Jurisdictions outside the United States can seek disclosure by way     of mutual legal assistance treaties requests or letter rogatory. Legal     requests can be in the form of search warrants, court orders or     subpoena. The requests are usually made in furtherance of criminal     investigations but no details about the nature of such investigations     are provided.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Broad or vague requests are not processed. The requests are expected     to include details of the law enforcement authority issuing the    request  and the identity of the user whose details are sought. &lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;The Indian Regime&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Section 69 and 69 B of the &lt;a class="external-link" href="http://deity.gov.in/sites/upload_files/dit/files/downloads/itact2000/it_amendment_act2008.pdf"&gt;Information Technology (Amended) Act, 2008&lt;/a&gt; prescribes the procedure and sets safeguards for the Indian   Government   to request user data from corporates. According to section   69,  authorized  officers can issue directions to intercept, monitor or    decrypt  information for the following reasons:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Sovereignty      or integrity of India,&lt;/li&gt;
&lt;li&gt;Defence      of India,&lt;/li&gt;
&lt;li&gt;Security      of the state,&lt;/li&gt;
&lt;li&gt;Friendly      relations with foreign states, &lt;/li&gt;
&lt;li&gt;Maintenance of public      order,&lt;/li&gt;
&lt;li&gt;Preventing      incitement to the commission  of any cognizable offence relating to      the above, or&lt;/li&gt;
&lt;li&gt;For      investigation of any offence.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;Section 69 B empowers authorized agencies to monitor and collect     information for cyber security purposes, including ‘for identification,     analysis and prevention of intrusion and spread of computer     contaminants’. Additionally, there are rules under section 69 and 69 B     that regulate interception under these provisions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Information can also be requested through the Controller of     Certifying Authority under section 28 of the IT Act which circumvents     the stipulated procedure. If the request is not complied with then the     intermediary may be penalized under section 44.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Indian Government has been increasingly leaning towards greater control over online communications. In 2011, &lt;a class="external-link" href="http://in.news.yahoo.com/court-stays-rs-11-lakh-fine-imposed-yahoo-163503671.html"&gt;Yahoo! was slapped with a penalty of Rs. 11 lakh&lt;/a&gt; for not complying with a section 28 request, which called for email     information of a person on the grounds of national security although     the court subsequently stayed the Controller of Certifying  Authorities'    order.&lt;a href="#_ftn7"&gt; &lt;/a&gt; In the same year the government called for &lt;a href="https://cis-india.org/internet-governance/unkindest-cut-mr-sibal" class="external-link"&gt;pre-screening user content&lt;/a&gt; by internet companies and social media sites to ensure deletion of ‘objectionable content’ before it was published.&lt;a href="#_ftn8"&gt; &lt;/a&gt; Similarly, the government has increasingly sought &lt;a class="external-link" href="http://www.hrw.org/news/2013/06/07/india-new-monitoring-system-threatens-rights"&gt;greater online censorship&lt;/a&gt;,     using the Information Technology Act to arrest citizens for social     media posts and comments and even emails criticizing the government.&lt;a href="#_ftn9"&gt; &lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;What does this mean for Privacy?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Google Transparency Report has thrown light on an increasing     trend of governmental data requests on a yearly basis. The reports     published by Google and Facebook reveal that the number of government     requests from India is second only to the United States. Further, more  than    50 per cent of the requests from India have led to disclosure by nearly all  the    companies surveyed in this post, with Twitter being the single     exception.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Undeniably, transparency reports are important  accountability    mechanisms which reaffirm the company’s dedication  towards protecting    its user’s privacy. However, basic statistics and  vague information    cannot lift the veil on the full scope of  surveillance. Even though    Google’s report has steadily moved towards a  more nuanced disclosure, it    would only be meaningful if, &lt;i&gt;inter alia&lt;/i&gt;,  it included a break-up of  the   purpose behind the requests.  Similarly, although Google has also    included a general understanding  of the legal process, more specifics    need to be disclosed. For  example, the report could provide statistics    for notifications to  indicate how often user’s under scrutiny are not    notified. Such  disclosures are important to enhance user understanding    of when their  data may be accessed and for what purposes,  particularly   without  prior or retrospective intimation of the same.  Till such time   the  report can provide comprehensive details about the  kind of    surveillance websites and internet services are subjected to,  it will  be   of very limited use. Its greatest limitation, however, may  lie  beyond   its scope.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The monitoring regime envisioned under the   Information   Technology Act effectively lays down an overly broad   system which may   easily lead to abuse of power. Further, the Indian   Government has become   infamous for their need to control websites and   social media sites.   Now, with the Indian Government’s plan for   establishing the Central   Monitoring System the need for intermediaries   to conduct the   interception may be done away with, giving the government unfettered   access to user data, potentially rendering   corporate transparency of   data requests obsolete.&lt;/p&gt;
&lt;ul&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/what-google-and-facebook-tell-about-govt-data-requests'&gt;https://cis-india.org/internet-governance/blog/what-google-and-facebook-tell-about-govt-data-requests&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>prachi</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-09-13T09:44:53Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/hindustan-times-september-9-2013-zia-haq-a-dangerous-trend">
    <title>A dangerous trend: social media adds fire to Muzaffarnagar clashes</title>
    <link>https://cis-india.org/news/hindustan-times-september-9-2013-zia-haq-a-dangerous-trend</link>
    <description>
        &lt;b&gt;As access to the Internet grows, especially in small Indian towns and cities, social media has revealed a darker side as a hatred-mongering tool capable of setting off serious violence. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This article by Zia Haq was &lt;a class="external-link" href="http://www.hindustantimes.com/India-news/UttarPradesh/A-dangerous-trend-social-media-adds-fire-to-Muzaffarnagar-clashes/Article1-1119655.aspx?htsw0023"&gt;published in the Hindustan Times&lt;/a&gt; on September 9, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Malicious content, such as fake YouTube videos and morphed photographs, are usually spread rapidly to trigger rioting.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In UP’s Muzzafarnagar, a video clip purportedly showing a Muslim mob lynching two boys, which police now suspect is from neighboring Pakistan or Afghanistan, was used to stir unease, deepening hatred between Muslims and Hindus.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A series of rioting in western UP district has left at least 41 dead. The circulation of the video had led to violence spreading to new areas. The fake video that escalated clashes portends a new trend in India’s discordant politics.&lt;br /&gt;&lt;br /&gt;“From word of mouth, communal polarization, especially by Hindutva organisations, is now moving online. This is a dangerous trend since the Internet is very potent,” said Prof Badri Narayan of the GB Pant Social Science Institute, Allahabad.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Research shows social media sites, including sites like Facebook, Twitter and YouTube, are more persuasive than television ads. Nearly 100 million Indians use the Internet each day, more than Germany’s population. Of this, 40 million have assured broadband, the ones who mostly subscribe to social-media accounts.&lt;br /&gt;&lt;br /&gt;The country also has about 87 million mobile-Internet users, according to Internet and Mobile Association of India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;UP’s police have blocked the video, invoking sections under 420 (forgery), 153-A (promoting enmity on religious grounds) and 120-B (conspiracy) of the Indian Penal Code, along with section 66 of the Information Technology Act.&lt;br /&gt; &lt;br /&gt;Section 66, however, is the heart of a free-speech debate. Activists say section 66 has been used at the drop of a hat.&lt;br /&gt;&lt;br /&gt;Last November, two Mumbai girls faced arrests for questioning the city’s shutdown for Shiv Sena leader Bal Thackeray’s funeral. The arrests were declared illegal after being roundly criticised, including by the Supreme Court.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“In this case, the government has a legitimate reason to censor speech. However, this requires the authorities to very focused and action should be targeted, rather than sweeping,” said Sunil Abraham of the Bangalore-based The Centre for Internet and Society.&lt;br /&gt; &lt;br /&gt;The government’s action, Abraham said, tended to be broad-based. He said in such situations, the government could use public-service messaging to present the alternate view.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Legal provisions could be made whereby Twitter users from India, for example, (compulsorily) see the public service message by default when they log in,” Abraham said.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/hindustan-times-september-9-2013-zia-haq-a-dangerous-trend'&gt;https://cis-india.org/news/hindustan-times-september-9-2013-zia-haq-a-dangerous-trend&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2013-09-12T10:50:26Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/deccan-chronicle-september-9-2013-sunil-abraham-privacy-law-must-fit-the-bill">
    <title>Privacy Law Must Fit the Bill </title>
    <link>https://cis-india.org/internet-governance/blog/deccan-chronicle-september-9-2013-sunil-abraham-privacy-law-must-fit-the-bill</link>
    <description>
        &lt;b&gt;The process of updating Indian privacy policy has gained momentum ever since the launch of the UID project and also the leak of the Radia tapes. The Department of Personnel and Training has lead the drafting of privacy bill for the last three years. This bill will ideally articulate privacy principles and establish the office of the privacy commissioner and most importantly have an over-riding effect over 50 odd existing laws, rules and policies with privacy implications.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://www.dc-epaper.com/PUBLICATIONS/DC/DCB/2013/09/09/ArticleHtmls/Privacy-law-must-fit-the-bill-09092013013016.shtml?Mode=1"&gt;published in the Deccan Chronicle&lt;/a&gt; on September 9, 2013.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;Given the harmonizing impact of the proposed privacy bill, we must ensure that rigorous debate and discussion happens before the bill is finalized otherwise there may be terrible consequences.&lt;/p&gt;
&lt;p&gt;Here is a short list of what can possibly go wrong:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One, the privacy bill ignores the massive power asymmetry in Indian societies undermining the right to information – in other jurisdictions referred to as freedom of information and access to information. The power asymmetry is addressed via a public interest test. The right to privacy would be the same for everyone except when public interest is at stake. This enables protection of the right to privacy to be inversely proportionate to power and almost conversely the requirement of transparency to be directly proportionate to power. In other words, the poor would have greater privacy than a middle-class citizens who in turn would have greater privacy than political and economic elites. And transparency requirements would be greatest for economic and political elites and lower for middle-class citizens and lowest for the poor.  If this is not properly addressed in the language of the bill – privacy activists would have undone the significant accomplishments of the right to information or transparency movement in India over the last decade.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Two, the privacy bill has chilling effect on free speech. This can happen either by denying the speaker privacy, or by affording those who are spoken about too much privacy. For the speaker - Know Your Customer (KYC) and data retention requirements for telecom and internet infrastructure necessary to participate in the networked public sphere can result in the death of anonymous and pseudonymous speech. Anonymous and pseudonymous speech must be protected as it is a necessary for good governance, free media, robust civil society, and vibrant art and culture in a democracy.  For those spoken about - privacy is clearly required in certain cases to protect the victims of certain categories of crimes. However, the right to privacy could be abused by those occupying public office and those in public life to censor speech that is in the public interest. If for example a sport person does not publicly drink the aerated drink that he or she endorses in advertisements then the public has a right to know.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Three, the privacy bill has a limited scope. Jurisprudence in India derives the right to privacy from the right to life and liberty through several key judgments including &lt;i&gt;Naz Foundation v. Govt. of NCT of Delhi&lt;/i&gt; decided by the Delhi High Court. The right to life and liberty or Article 21 unlike other constitutionally guaranteed fundamental rights does not distinguish between citizens and non-citizens. As a consequence the privacy bill must also protect residents, visitors and other persons who may never visit India, but whose personal information may travel to India as part of the global outsourcing phenomena. Also the obligations and safeguards under the privacy bill must equally apply to both the state and the private sector entities that could potentially infringe upon the individual's right to privacy. Different levels of protection may be afforded to citizens, residents, visitors and everybody else. Government and private sector data controllers may be subject to different regulations – for ex. an intelligence agency may not require 'consent' of the data subject to collect personal information and may only provide 'notice' after the investigation has cleared the suspect of all charges.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Four, the privacy bill is expected to fix poorly designed technology. There are two diametrically opposite definitions of projects like NATGRID, CMS and UID. The government definition is that all these systems will allow only for targeted interception and surveillance, however the majority of civil society believes that these system will be used for blanket surveillance. If these systems are indeed built in a manner that supports blanket surveillance then legal band-aid in the form of a new law or provision that prohibits blanket surveillance will be a complete failure. The principle of 'privacy by design' is the only way to address this. For ex. shutters of digital cameras are silent and this allows for a particular form of voyeurism called upskirt. Almost a decade ago, the Korean government enacted a law that requires camera and mobile phone manufacturers to ensure that audio recording of a mechanical shutter is played every time the camera function is used. It is also illegal for the user to circumvent or disable this feature. In this example, the principle of notice is hardwired within the technology itself. To remix Spiderman's motto – with great power comes great temptation. We know that a rogue NTRO official installed a spy camera in the office toilet to make recording female colleagues and most recently that NSA officers confessed to spying on their love interests. If the technology can be abused it will be abused. Therefore legal safeguards are a poor substitute for technological safeguards. We need both simultaneously.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Five, the bill does not require compliance with internationally accepted privacy principles including the ones discussed so far 'consent', 'notice' and 'privacy by design'. Apart from human rights considerations – the most important imperative to modernize India privacy laws is trade. We have a vibrant ITES, BPO and KPO sector which handles personal information of foreigners mostly from the North American and European continents.  The Justice AP Shah committee in October 2012 identified privacy principle that required for India - notice, choice and consent, collection limitation, purpose limitation, access and correction, disclosure of information, security, openness and accountability. A privacy bill that does include all these principles will increase the regulatory compliance overhead for Indian enterprise with foreign clients and for multinationals operating in India. There is also the risk that privacy regulators in these jurisdictions will ban outsourcing to Indian firms because our privacy laws are not adequate by their standards.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To conclude, it is not sufficient for India to enact a privacy law it is essential that we get it right so that there are no unintended consequences on other equally important rights and dimensions of our democracy.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/deccan-chronicle-september-9-2013-sunil-abraham-privacy-law-must-fit-the-bill'&gt;https://cis-india.org/internet-governance/blog/deccan-chronicle-september-9-2013-sunil-abraham-privacy-law-must-fit-the-bill&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-09-12T06:25:35Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/young-scholar-tutorials">
    <title>Young Scholar Tutorials</title>
    <link>https://cis-india.org/news/young-scholar-tutorials</link>
    <description>
        &lt;b&gt;Communication Policy Research South organised this workshop on September 3 and 4, 2013. Nehaa Chaudhari participated in the event organised by CPR South.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Rohan Samarajiva, Christoph Stork, Marcio Aranha, Ang Peng Hwa, and Sujata Gamage were the speakers. Unedited notes from the workshop can be accessed by clicking on the links below:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/cpr-south-1" class="internal-link"&gt;CPR South Tutorial Note&lt;/a&gt; (1)&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/cpr-south-2" class="internal-link"&gt;CPR South Tutorial Note&lt;/a&gt; (2)&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;Click to &lt;a class="external-link" href="http://www.cprsouth.org/tutorials-2/"&gt;read the original here&lt;/a&gt;.&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/young-scholar-tutorials'&gt;https://cis-india.org/news/young-scholar-tutorials&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-09-30T11:21:25Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
