<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/a2k/front-page/search_rss">
  <title>Access To Knowledge (A2K)</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 2361 to 2375.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/news/rajya-sabha-nod-to-harsh-it-rules"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/privacy/copyright-enforcement"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/livemint-january-4-2013-sanjukta-sharma-cool-jobs"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-hindu-sweta-akundi-april-8-2019-microchips-cookies-and-the-internet-privacy-authentication"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/icann-control-shift"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/control-shift"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/contestations-of-data-ecj-safe-harbor-ruling-and-lessons-for-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/content-takedown-and-users-rights-1"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/content-removal-on-facebook"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/privacy/consumer-privacy-e-commerce"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/consumer-privacy.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/consumer-care-society-silver-jubilee-year-celebrations"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/consultation-to-frame-rules-under-whistle-blowers-protection-act-2011"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/consultation-on-gendered-information-disorder-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/consultation-on-draft-e-commerce-policy"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/news/rajya-sabha-nod-to-harsh-it-rules">
    <title>Cordon tightens: Rajya Sabha nod to harsh IT rules </title>
    <link>https://cis-india.org/news/rajya-sabha-nod-to-harsh-it-rules</link>
    <description>
        &lt;b&gt;The draconian intermediaries rules of the Information Technology Act that allows the government to aggressively police the internet and social networking sites such as Facebook and Twitter will continue for some more time as a motion to annul them in the Rajya Sabha was defeated by the treasury benches on Thursday.&lt;/b&gt;
        
&lt;p&gt;&lt;a class="external-link" href="http://bit.ly/LhRU17"&gt;Sunil Abraham and Pranesh Prakash are quoted in this article by Anil Sharma &amp;amp; Aishhwariya Subramanian published in Daily News &amp;amp; Analysis on May 18, 2012&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;The draconian intermediaries rules of the Information Technology Act that allows the government to aggressively police the internet and social networking sites such as Facebook and Twitter will continue for some more time as a motion to annul them in the Rajya Sabha was defeated by the treasury benches on Thursday.&lt;br /&gt;&lt;br /&gt;The rules that came into effect last year almost became annulled after a determined push from MPs cutting across party lines in the Rajya Sabha on Thursday. However, the government barely managed to scrape through but union communications and IT minister Kapil Sibal conceded that there were problems and promised to call for a meeting to address the concerns of the MPs.&lt;br /&gt;&lt;br /&gt;CPI(M) Rajya Sabha member from Kerala P Rajeeve had moved a statutory motion demanding that these rules be annulled as they violated the constitutionally guaranteed right to freedom of expression. Rajeeve received enthusiastic support from the leader of the opposition in the Rajya Sabha, Arun Jaitley, who made a detailed argument against the existing rules. An impressed Jaitley commended Rajeeve for involving Parliament in the process of framing the rules. Jaitley also slammed the government for trying to police the internet but stressed that like other media this could not be controlled. "In fact, if the internet had been there at that time even the Emergency would have been a fiasco," he said.&lt;br /&gt;&lt;br /&gt;The members were keen that the motion be put to vote and the numbers in the Rajya Sabha were loaded against the government.&lt;br /&gt;&lt;br /&gt;However, responding to Jaitley's suggestion, Sibal assured the house that the concerns of the members would be taken on board. "I request the members to write to me with their specific suggestions. I will take up the matter at a joint meeting with all the stakeholders and arrive at a solution," he said.&lt;br /&gt;&lt;br /&gt;This pacified the members and the government ducked a potentially embarrassing situation.&lt;br /&gt;&lt;br /&gt;Expressing his dissatisfaction with the minister's reply, Rajeeve stressed that just as there is a provision for withdrawing objectionable content from the internet within 36 hours, there should be scope for restoring it if the original author can justify it.&lt;br /&gt;&lt;br /&gt;The debate was keenly followed by free speech activists who have been lobbying for months to get these draconian rules annulled. The Bangalore-based Centre for Internet &amp;amp; Society (CIS) also conducted a major sting operation to prove how absurd these rules are. They sent several fake "take-down notices" to several companies hosting internet sites. The companies went ahead and shut down some blogs and web sites without even bothering to check if the complaints had any merit.&lt;br /&gt;&lt;br /&gt;"The trouble with Indian government's proposal to address issues such as network neutrality, privacy and freedom of expression, is top-down. Unlike other countries where internet policies have always been developed with consultation with other stakeholders, here the government imposes its will," said Sunil Abraham, executive director, CIS.&lt;br /&gt;&lt;br /&gt;Netizens are concerned about India's bad track record when it comes to censorship and a policy for the internet. Delhi-based Anja Kovacks, from the Internet Democracy Project, feels that many of the concerns voiced by Indian government are justified. "Undoubtedly the internet presents a range of new challenges, in India as elsewhere, that need to be addressed. Many of the concerns the Indian government expresses are therefore also completely justified. But the ways in which it seeks to tackle these problems are not appropriate for a democratic nation." Kovacks believes that the current policy will impair the freedom of speech.&lt;br /&gt;&lt;br /&gt;Ironically, while the UPA government is busy clamping down on domestic opinion, it is planning to take a far more liberal stand at an upcoming international conference on running the internet in Geneva later this year. "It is an ironical situation where India is not following domestically what it is proposing internationally," said Pranesh Prakash of CIS.&lt;br /&gt;&lt;br /&gt;With the government holding on to its draconian rules, citizens using social networks like Twitter and Facebook or writing blogs will now have to worry about big brother watching over their shoulders.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/rajya-sabha-nod-to-harsh-it-rules'&gt;https://cis-india.org/news/rajya-sabha-nod-to-harsh-it-rules&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-05-24T08:49:10Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/privacy/copyright-enforcement">
    <title>Copyright Enforcement and Privacy in India</title>
    <link>https://cis-india.org/internet-governance/blog/privacy/copyright-enforcement</link>
    <description>
        &lt;b&gt;Copyright can function contradictorily, as both the vehicle for the preservation of privacy as well as its abuse, writes Prashant Iyengar. The research examines the various ways in which privacy has been implicated in the shifting terrain of copyright enforcement in India and concludes by examining the notion of the private that emerges from a tapestry view of the relevant sections of Copyright Act.&lt;/b&gt;
        &lt;h2&gt;Introduction&lt;/h2&gt;
&lt;p&gt;Copyright can function contradictorily, as both the vehicle for the  preservation of privacy as well as its abuse. This paper examines the  various ways in which privacy has been implicated in the shifting  terrain of copyright enforcement in India. Chiefly, there are three  kinds of situations that we will be discussing here: The first is  straightforward and deals with the physical privacy intrusion caused by  the execution of search and seizure orders during the investigation of  infringement. The second situation involves the violation of privacy  through the misappropriation of confidential information. The last  situation involves the wrongful appropriation of a person’s persona or  their ‘publicity’ – the photographs of celebrities, for instance – for  private gain. Instances of each of these situations, and the manner in  which the courts have negotiated the privacy claims that have arisen are  described in the sections that follow. In addition, Copyright law,  dealing as it does mainly with offences of the nature of unauthorised  publicity/publication putatively inscribes certain spaces and activities  as either public or private. The concluding section of this paper  examines the notion of the private that emerges from a tapestry view of  various sections of the Copyright Act.&lt;/p&gt;
&lt;h2&gt;Copyright Enforcement&lt;/h2&gt;
&lt;h3&gt;Context setting&lt;/h3&gt;
&lt;p&gt;Over the past several decades there has been an increasing awareness  globally – and within India – of the importance of 'knowledge societies'  which, in contrast to earlier industrial or agrarian societies,  leverage 'information' as the key raw material and output of  a range of  productive activity. As one UNESCO Report puts it "Knowledge is today  recognized as the object of huge economic, political and cultural  stakes"[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#1"&gt;1&lt;/a&gt;].&lt;/p&gt;
&lt;p&gt;In this new paradigm, investment in Information and Communications  Technology (ICT), the enactment of strong Intellectual Property laws,  and their strict enforcement are prescribed as imperative in  facilitating the transition away from the older economic modes. The  promise of the knowledge society is particularly alluring for developing  countries, like India, where it is viewed as a vehicle for achieving  what Ravi Sundaram has termed 'temporally-accelerative' development[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#2"&gt;2&lt;/a&gt;],  through which we would be able to transcend our "historical  disabilities", and achieve parity with the incumbent masters of the  world. &lt;span class="Apple-style-span"&gt;[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#3"&gt;3&lt;/a&gt;]&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;In their eagerness to provide the best  supportive conditions to usher in this coveted knowledge society,  nations have been tightening their Intellectual Property regimes  – including copyright law. This has entailed a two fold expansion,  firstly, in the scope of copyright to include, for instance,  ‘technological protection measures’ within their ambit and secondly, in  the powers of investigation, search and seizure put at the disposal  enforcement agencies. In addition, as we shall see, courts in India have  enthusiastically bought into this vision of a knowledge economy, and  this has fuelled their eagerness to craft innovative – if legally  unsound – orders which put tremendously intrusive powers in the hands of  copyright owners. Taken together, these developments have taken their  toll on the privacy of individuals which this section will explore in  further detail. We begin with a brief description of the statutory  mechanism for copyright enforcement – both civil and criminal - under  the Copyright Act. We then move on to the way courts have crafted new  orders that magnify the powers of copyright owners to the detriment of  the privacy of individuals. &lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span class="Apple-style-span"&gt;Civil and Criminal Enforcement under the Copyright Act&lt;/span&gt;&lt;/h3&gt;
&lt;p&gt;The Copyright Act provides for both civil and criminal remedies for  infringement. Section 55 provides for civil remedies and declares that,  upon infringement, "the owner of the copyright shall be entitled to all  such remedies by way of injunction, damages, accounts and otherwise as  are or may be conferred by law for the infringement of a right." Civil  suits are instituted at the appropriate district court having  jurisdiction – including where the plaintiff resides.&lt;/p&gt;
&lt;p&gt;Similarly, Chapter XIII (Sections 63-70) provides a range of criminal  penalties for infringing copyrights which are typically punishable with  terms of imprisonment that “may extend up to three years” along with a  fine. These offences would be taken cognizance of and tried at the court  of the Metropolitan Magistrate or Judicial Magistrate of the First  class [Sec 70], in the same manner as all cognizable offences[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#4"&gt;4&lt;/a&gt;] in  India i.e., by following the procedures under the Code of Criminal  Procedure, 1973. Section 64 of the Copyright Act dealing with police  powers was amended in 1984 to give plenary powers to police officers, of  the rank of a sub-inspector and above, to seize without warrant all  infringing copies of works “if he is satisfied” that an offence of  infringement under section 63, “has been, is being, or is likely to be,  committed”. Prior to amendment, this power could only be exercised by a  police officer when the matter had already been taken cognizance of by a  Magistrate.  Prima facie, this is a very sweeping power since its  exercise is unsupervised by the judiciary and only depends on the  “satisfaction” of a police officer. To put matters in perspective, under  the Income Tax Act, dealing with the far more sensitive issue of tax  evasion, a search and seizure can only be conducted based on information  already in the possession of the investigating authority.[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#5"&gt;5&lt;/a&gt;]&lt;/p&gt;
&lt;p&gt;In &lt;i&gt;Girish Gandhi &amp;amp; Ors. v Union of India&lt;/i&gt;[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#6"&gt;6&lt;/a&gt;],  a case before the Rajasthan High Court, the petitioner, who ran a video  cassette rental business, challenged the constitutional validity of the  wide powers granted to police officers under this section. Citing  various instances of violations of privacy that the abuse of the section  could occasion, the petitioner contended:&lt;/p&gt;
&lt;p&gt;"The provisions of section 64 itself gives arbitrary and naked powers  without any guidelines to the police officer to seize any material from  the shop and thus, drag the video owners to the litigation. He has  given instances in the petition that &lt;i&gt;police officer usually demands for video cassettes to be given to them free of charge for viewing it at their homes&lt;/i&gt; and in case, on any reason either the video cassette is not available  or it is not given free of charge, there is likelihood that police  officer shall misuse his powers and try to seize the material for  prosecution under the various provisions of the Act."&lt;/p&gt;
&lt;p&gt;Although the High Court dismissed the petition on the grounds that it  did not disclose any actual injury to the petitioner, it upheld the  constitutionality of the section by reading the word "satisfaction" to  mean that the "police officer will not act until and unless he has got  some type of information on which information he is satisfied and his  satisfaction shall be objective."&lt;/p&gt;
&lt;p&gt;[Section 64] is also not arbitrary for the reason that guidelines and  safeguards are provided under Sections 51, 52 and 52A and Section 64(2)  of the Copyright Act, coupled with the fact that &lt;i&gt;it is expected of  the police officer that he would not act arbitrarily and his  satisfaction shall always based on some material or knowledge and he  shall only proceed for action under Section 64 in a bona fide manner and  not for making a roving inquiry&lt;/i&gt;. (emphasis added)&lt;/p&gt;
&lt;p&gt;Despite the pious hopes expressed in this decision, they do not  appear to have influenced the actual behaviour of police officers. In  May 2011, the Delhi High Court struck down a notification issued by the  Commissioner of Police which had instructed all subordinate  functionaries of the police to "attend to and provide assistance"  whenever any complaint "in respect of violation of the provisions of  Copyright Act, 1957" was received from three companies: Super Cassettes  Industries Limited, Phonographic Performance Ltd and Indian Performance  Right Society Ltd.  This virtually amounted to the commandeering of the  criminal enforcement system by a few private owners for their own  private interests. In their suit, the petitioner — Event and  Entertainment Management Association — had contended that the police  machinery "cannot be made to act at the behest of certain privileged  copyright owners". Striking the notification down, as unconstitutional,  Justice Muralidhar of the Delhi High Court held:&lt;/p&gt;
&lt;p&gt;"To the extent the impugned circular privileges the complaints from  SCIL over other complaints from owners of copyright it is unsustainable  in law for the simple reason that there has to be equal protection of  the law in terms of Article 14 of the Constitution. The police are not  expected to act differently depending on who the complainant is. All  complaints under the Act require the same seriousness of response and  the promptitude with which the police will take action, &lt;i&gt;Likewise, the  caution that the Police is required to exercise by making a preliminary  inquiry and satisfying itself that prima facie there is an infringement  of copyright will be no different as regards the complaints or  information received under the Act&lt;/i&gt;[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#7"&gt;7&lt;/a&gt;]."&lt;/p&gt;
&lt;p&gt;The Judge also issued some welcome remarks on the manner in which complaints under Section 64 were to be handled:&lt;/p&gt;
&lt;p&gt;In order that the power to seize in terms of Section 64 of the Act is  not exercised in an arbitrary and whimsical manner, it has to be hedged  in with certain implied safeguards that constitute a check on such  power. Consequently, prior to exercising the power of seizure under  Section 64(1) of the Act the Police officer concerned has to necessarily  be prima facie satisfied that there is an infringement of copyright in  the manner complained of. In other words, merely on the receipt of the  information or a complaint from the owner of a copyright about the  infringement of the copyrighted work, the Police is not expected to  straightway effect seizure. Section 52 of the Act enables the person  against whom such complaint is made to show that one or more of the  circumstances outlined in that provision exists and that therefore there  is no infringement. During the preliminary inquiry by the Police, if  such a defence is taken by the person against whom the complaint is made  it will be incumbent on the Police to prima facie be satisfied that  such defence is untenable before proceeding further with the  seizure.(emphasis added)[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#8"&gt;8&lt;/a&gt;]&lt;/p&gt;
&lt;p&gt;This decision significantly tempers the severity of possible searches  and seizures conducted by the police under Copyright Law. It advances  the cause of privacy by reining in the power of the state to arbitrarily  intrude on citizens.&lt;/p&gt;
&lt;p&gt;Parallel to the attempt at ‘hedging in’ of police powers in criminal  enforcement by this High court, there has been a move to expand powers  of investigative bodies in civil suits. The next sub-section looks at  two innovations by courts – Anton Piller Orders and John Doe orders –  which are mechanisms unwarranted by civil procedural law, but crafted by  high courts specifically to deal with copyright investigation.&lt;/p&gt;
&lt;h3&gt;'Anton Piller' orders and 'John Doe' Orders&lt;/h3&gt;
&lt;p&gt;In addition to the extensive police powers under the Copyright Act  mentioned above, plaintiffs have other, equally intrusive powers at  their disposal. In the past decade it has become common for copyright  owners and owners-associations to employ civil procedure to emulate the  same kind of invasiveness. This is done via the mechanism of so-called  ‘Anton Piller’ orders  - orders obtained unilaterally ‘ex-parte’ (in the  absence of the defendant) from civil courts which permit  court-appointed officers, accompanied by representatives of the  plaintiffs themselves, to search premises and seize evidence without  prior warning to the defendant. Frequently, courts have also issued  ‘John Doe’ orders[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#9"&gt;9&lt;/a&gt;] –orders  to search and seize against unnamed/unknown defendants - which  virtually translates into untrammelled powers in the hands of the  plaintiffs, aided by court-appointed local commissioners, to raid any  premises they set their eyes on.&lt;/p&gt;
&lt;p&gt;Although the authority of the courts under Indian law to grant these orders is suspect[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#10"&gt;10&lt;/a&gt;],  they have virtually been regularized in practice over the past decade  through routine issual by the High Courts, especially the Delhi High  Court. This has led to a widespread phenomenon of powerful copyright  owning groups such as the Business Software Alliance and the Indian  Performing Right Society Limited managing to successfully assume for  themselves almost plenary powers of search and seizure as they go about  knocking on the doors of small businesses and demanding to be allowed to  audit their software. An anonymous post on the popular Indian  Intellectual Property Weblog ‘Spicy IP’ graphically conveys the  invasiveness inherent in the execution of these orders:&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Ghost Post on IP (Software) Raids: Court Sponsored Extortion?&lt;/b&gt;[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#11"&gt;11&lt;/a&gt;]&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Picture this:&lt;/i&gt;&lt;/p&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;p&gt;You are working in your office one day, when all of a sudden, a group  of people arrive unannounced brandishing a court order. The order  allows them to walk into your office and conduct an audit of all your  office computers to collect evidence of the use of unlicensed software  in your office.&lt;/p&gt;
&lt;p&gt;This group consists of a court-appointed commissioner, lawyers  representing the plaintiff, and technical persons who will carry out the  actual software audit.&lt;/p&gt;
&lt;p&gt;Knowing that to disobey the order will amount to a contempt of court, you allow the group to carry out the audit.&lt;/p&gt;
&lt;p&gt;The audit lasts several hours and continues well into the night.  Needless to say, it is physically and emotionally draining on you as  your work has come to a stand-still. Everyone around you knows there is  some court proceeding going on. You have already lost face with your  employees, and possibly even clients who have visited your office during  the audit.&lt;/p&gt;
&lt;p&gt;As you have several dozen computers purchased over a period of time,  and the audit is conducted unannounced, you may not have the time to  gather documentation and invoices demonstrating the purchase of licensed  software.&lt;/p&gt;
&lt;p&gt;While the court order allows you to back up your valuable client and  business data, the plaintiff’s lawyers don’t allow you to do so, stating  that documents/ data found on machines that contain any unlicensed  software may not be backed up.&lt;/p&gt;
&lt;p&gt;All computers found with copies of what the plaintiff’s lawyers are  calling unlicensed software are seized and sealed. You do not have the  time, presence of mind or legal representation to argue that such copies  may be backup copies allowed under the law, or that therefore several,  or all of the seized machines are not liable to be seized, or that such  copies are actually allowed under the software license.&lt;/p&gt;
&lt;p&gt;Even more importantly, your licensed servers are seized because they  are found to contain back-up copies of software, allowed under the law,  but deemed infringing by the plaintiff’s lawyers.&lt;/p&gt;
&lt;p&gt;At the end of the audit, you are informed that your computers contain  copies of unlicensed software to varying degrees. You are made to sign a  report prepared by the commissioner, along with sheets that represent  the software audit of each computer in your office.&lt;/p&gt;
&lt;p&gt;Most of your computers and servers are seized and sealed. You are  told that you cannot touch them till the court allows you to. You are  not even allowed to separate the hard drives of those machines that  contain the alleged unlicensed software, for the purpose of seizure, so  as to enable you to continue using the rest of the machine, even though  the court order clearly states that only storage media containing the  unlicensed software is to be seized.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;In a 2008 case, Autodesk Inc vs. AVT Shankardass[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#12"&gt;12&lt;/a&gt;], the Delhi High Court – which happens to be the most enthusiastic issuer of Anton Piller orders[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#13"&gt;13&lt;/a&gt;] –issued  guidelines on the considerations which judges should weigh before  granting such orders in software piracy cases. Worryingly, the  guidelines stipulate that "The test of reasonable and credible  information regarding the existence of pirated software or incriminating  evidence should not be subjected to strict proof". Instead the court  prescribes that "It has to be tested on the touchstone of pragmatism and  the natural and normal course of conduct and practice in trade."&lt;/p&gt;
&lt;p&gt;The Court also included a few guidelines meant to safeguard the  defendant. These include the possibility of requiring the plaintiff to  deposit costs in the court "so that in case pirated software or  incriminating evidence is not found then the defendant can be suitably  compensated for the obtrusion in his work or privacy." Although on the  face of it, these guidelines threatened to open up the floodgates for  the granting of Anton Pillar orders, in fact, these fears seem not to  have been realized. The privacy-invasive ambitions of IP owners have  been subverted by a combination of the security requirements stipulated  in the Autodesk guidelines above, the judiciary’s own  inefficiency/inconsistency and a greater assertiveness and defiance on  the part of defendants. The following passage from the 2011 Special 301  India Country Report on Copyright Protection and Enforcement[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#14"&gt;14&lt;/a&gt;], prepared  by the IIPA, records the industry’s frustrations in obtaining Anton  Pillar orders from the courts over the past year:&lt;/p&gt;
&lt;p&gt;Unfortunately, in 2010, such enforcement efforts have become much  less effective due to judges imposing conditions on such orders.&lt;/p&gt;
&lt;p&gt;With periodic changes to the roster of judges on the Original Side  Jurisdiction of the Delhi High Court (which is done as a matter of  routine and procedure where the roster changes every 6 months), BSA  reports: 1) the imposition of security costs on Plaintiffs; 2) the grant  of local commission orders without orders to seize and seal computer  systems containing pirated/unlicensed software; 3) granting the right to  Defendants to obtain back up copies of their proprietary data while at  the same time ensuring that the evidence of infringement is preserved in  electronic form; 4) assigning a low number of technical experts for  large inspections, making carrying out orders more time-consuming and  raising court commissioners’ fees; and 5) ineffective implementation and  lack of deterrence from contempt proceedings against defendants who  disrupt or defy Anton Pillar orders.[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#15"&gt;15&lt;/a&gt;]&lt;/p&gt;
&lt;p&gt;Notwithstanding this temporary setback, Anton Piller orders and John  Doe orders remain powerful weapons in the arsenal of large copyright  owners who continue to use it in ways that are extremely intrusive.  These orders exemplify an instance of how courts rarely reflect on the  privacy implications of the orders that they themselves issue –similar  action undertaken by the executive would have most likely invited the  court’s consideration on whether they violate privacy.&lt;/p&gt;
&lt;p&gt;In the next section we move on to private ‘technological’ measures of  enforcing copyright which are likely to receive statutory sanction.&lt;/p&gt;
&lt;h3&gt;Technological Measures&lt;/h3&gt;
&lt;p&gt;In the light of the industry’s perception of a weakening of its  enforcement options due to the judiciary’s waning enthusiasm, it remains  to be seen what new manoeuvres they would make to strengthen  enforcement.  One foreseeable arena of conflict would be the new  measures proposed to be included in the Copyright Act that criminalise  the circumvention of ‘technological protection measures’ (TPMs) built  into software by manufacturers. The proposed new Section 65A  criminalises the circumvention of “an effective technological measure  applied for the purpose of protecting any of the rights conferred by  this Act," "with the intention of infringing such rights”. This is  punishable with imprisonment up to two years and a fine. However the  section also creates a vast list of exceptions including research,  testing, national security etc which make it a comparatively soft tool  in the hands of prosecutors. Among the list of exceptions is a clause  that enables the circumvention of TPMs in order to facilitate purposes  that are 'not expressly prohibited' – including, conceivably, to  exercise fair dealing rights under Section 52. Although this is a  welcome provision, it requires, as a condition of its exercise, that the  person ‘facilitating the circumvention’ maintain a record of the  persons for whose benefit this has been done. This has led to  apprehensions of violations of privacy especially from disability rights  groups, who would potentially be the biggest users of this section as  it would enable them to make electronic content more widely accessible.  However, the lawful exercise of this right would mean that each instance  of use of electronic content – say an e-book – by a disabled person  would be recorded, which could deter them from accessing content. It  would also clearly amount to a violation of their privacy compared to  other analog users who are not required to similarly maintain logs each  time they share books, for instance.&lt;/p&gt;
&lt;p&gt;On the whole, despite the effect these measures have of diminishing  absolute control over our electronic resources, the fact that the IIPA -  which has been one the most rapid ‘defenders’ of IP - has consistently  complained about their inadequacy in its Special 301 Reports[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#16"&gt;16&lt;/a&gt;] gives us some cause for optimism that the privacy invasions it could occasion would not be too severe.&lt;/p&gt;
&lt;p&gt;Meanwhile, in a first of its kind, in 2005 the High Court of Andhra  Pradesh permitted the prosecution, under the Copyright Act, of persons  accused of having circumvented technological protection measures in  mobile devices.&lt;/p&gt;
&lt;p&gt;In Syed Asifuddin and Ors. v The State of Andhra Pradesh [&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#17"&gt;17&lt;/a&gt;] the  accused had altered the software on the mobile handsets provided by one  service provider (Reliance), so that the same handset could be used to  access the network of a rival provider (Tata Indicom). The Court  observed that "if a person alters computer programme of another person  or another computer company, the same would be infringement of the  copyright."  The matter was then relegated to the trial court to receive  evidence on whether in fact such alteration had occurred.&lt;/p&gt;
&lt;p&gt;This ruling, if correct, effectively negates the need for any  amendment to the law since circumvention of technological measures  typically involves an unauthorized alteration of copyrighted code. Of  course it would always be open to the defendant to assert his fair  dealing rights in defence, but that issue was not deliberated upon by  the High Court in this instance.&lt;/p&gt;
&lt;h3&gt;Portents&lt;/h3&gt;
&lt;p&gt;With the terrain of copyright infringement increasingly shifting from  ‘street piracy’ to online piracy, it remains to be seen how innovations  in copyright enforcement impact privacy. Three events are particularly  interesting in this context.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;In August 2007, a techie from Bangalore was arrested on charges  of having posted incendiary images of a popular folk hero on a website.  He had been traced based on the IP Address details provided by a leading  ISP. It later turned out that the IP address information was incorrect.  By the time the error was noticed, he had already been held in jail  illegally for a period of 50 days.[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#19"&gt;19&lt;/a&gt;] Shocking  as this incident is, it offers a portent of the gravity of the possible  privacy abuses that we are likely to witness in the years to come as  copyright owners begin to hunt down infringers on the Internet.&lt;/li&gt;
&lt;li&gt;In  2006, the Delhi High Court the pioneer among the Indian Judiciary in  issuing John Doe orders added another feather to its cap by permitting  the filing of a suit against an IP address. In a case of defamation by  email from an unknown sender, a company was able to successfully file a  suit against the IP address and obtain an order against the ISP to track  down the user who was later impleaded as a party to the suit. This case  and the growing number of John Doe orders issued, indicates that the  judiciary in India has been quite willing to partner with litigants in  their fishing expeditions. While it cannot be gainsaid that this has  aided the legitimate interests of litigants, this has come at the price  of a callous disregard for the interests of consumer privacy in India,  which, as the incident described above highlights, could easily descend  into a full blown human rights violation. &lt;/li&gt;
&lt;li&gt;With the arrest in  November 2010 of a four-member gang from Hyderabad for uploading media  content – including popular film titles - on Bittorrent, the popular  online file sharing tool, the industry has signalled its capacity and  willingness to take the battle over copyright to the Internet.[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#20"&gt;20&lt;/a&gt;] New  rules notified under the Information Technology Act make it mandatory  for 'intermediaries' (ISPs) to co-operate in locating and removing  ‘infringing content’ that is stored or transmitted by them.[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#21"&gt;21&lt;/a&gt;]  This will facilitate untrammelled access to users by copyright industries. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Although it is too early to predict the future for the Internet that  these developments will result in, they are definitely a source of  apprehension from the perspective of privacy.&lt;/p&gt;
&lt;h2&gt;Copyright and Confidential Information&lt;/h2&gt;
&lt;p&gt;Although the protection of 'confidential information' and 'copyright' occupy distinct realms in the law[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#22"&gt;22&lt;/a&gt;],  they converge occasionally, and copyright has been used as an  instrument by people and organisations to protect their confidential  information. In fact it has become quite routine for written pleadings  by plaintiffs in cases to assert the omnibus infringement of their  ‘copyrights, confidential information, trade secrets, trademarks designs  etc’ without specifying which of the claims is urged. For instance  in Mr. M. Sivasamy v M/S. Vestergaard Frandsen[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#23"&gt;23&lt;/a&gt;] a  case before the Delhi High Court, the plaintiffs claimed  that. "Defendants are violating the trade secrets, confidential  information and copyrights of the plaintiffs.”; Similarly in Dietrich  Engineering Consultant v Schist India &amp;amp; Ors , before the Bombay High  Court, the plaintiffs contended"..the suit is filed to prevent   unauthorized and illegal use of the plaintiffs  confidential  information and infringement of the 1st  plaintiffs Copyright".[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#24"&gt;24&lt;/a&gt;]&lt;/p&gt;
&lt;p&gt;In one of the earliest cases of this kind, Zee Telefilms Ltd. v  Sundial Communications Pvt. Ltd, the Bombay High Court delivered a  ruling in favour of the plaintiffs on both grounds of copyright  infringement and confidential information. Here the employees of the  plaintiffs – a company engaged in the business of producing television  serials - had developed the concept for a program which they had  registered with the Film Writers Association. Subsequently, they made a  confidential pitch of the concept to the representatives of the  defendants, a well known TV channel. Although initially the defendants  appeared reluctant to take the concept forward, they proceeded later on,  without the authorization of the plaintiffs, to produce a TV serial  that closely mirrored the ideas contained in the show conceived by the  plaintiff. In an action seeking to restrain the defendants from  proceeding with their production, the High Court agreed with  the plaintiff’s claims both on the count of copyright infringement and  confidentiality. Curiously, the determination of both issues turned on  the similarities between the plaintiff’s and defendant’s concepts –  which is traditionally a determination relevant only to copyright cases.  On the issue of confidentiality, the court held "Keeping in view  numerous striking similarities in two works and in the light of the  material produced on record, it is impossible to accept that the  similarities in two works were mere coincidence...the plaintiffs'  business prospect and their goodwill would seriously suffer if the  confidential information of this kind was allowed to be used against  them in competition with them by the defendants."&lt;/p&gt;
&lt;p&gt;Although a clear line is demarcated between the claims of  confidentiality and copyright in this case, this distinction is less  sharp in other cases of the same nature.&lt;/p&gt;
&lt;p&gt;In a more recent case &lt;i&gt;Diljeet Titus, Advocate v Mr. Alfred A. Adebare &amp;amp; Ors&lt;/i&gt;[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#25"&gt;25&lt;/a&gt;] four  associates of the plaintiff’s law firm quit together to start their own  practice. While leaving they took documents they had drafted including  agreements, due diligence reports and a list of clients along with them.  The plaintiff filed a suit for injunction, asserting both that this  material was confidential and that he owned the copyrights over them.  The Delhi High Court agreed and issued an injunction restraining the  defendants from “utilizing the material of the plaintiff forming subject  matter of the suit and from disseminating or otherwise exploiting the  same including the data for their own benefit.” What is interesting in  this case is the conflation of confidentiality and copyright – both in  the allegations of the plaintiff and the rebuttals of the defendant who  sought to resist claims of confidentialty on grounds that they had  themselves authored the papers in question.&lt;/p&gt;
&lt;p&gt;Curiously, where copyright and confidentiality claims coincide, it  would appear that the parameters of determining copyright infringement  end up determining the issue of confidentiality as well.&lt;/p&gt;
&lt;p&gt;In the next section we move on to the last copyright/privacy issue  that we had flagged in the introduction – the invocation of copyright in  aid of the ‘right to publicity’ of individuals which can be read as a  kind of privacy claim.&lt;/p&gt;
&lt;h2&gt;Copyright and Publicity&lt;/h2&gt;
&lt;p&gt;Do we have a copyright over our identities – our names, our  appearances, our life histories, our reputation and our bodies - so that  we have an actionable interest in preventing their deployment in public  without our express authorization?&lt;/p&gt;
&lt;p&gt;This question has arisen in a limited set of cases in India that  raise interesting questions. As with the confidentiality cases discussed  above, the lines separating ‘defamation’ actions from ‘copyright’  claims is not brightly drawn in these cases.  Neither is the line  linking copyright to the protection of privacy clearly evident. All one  can say with confidence is that copyright and privacy are two words  tossed into the plaints by the plaintiffs while asserting their claims.&lt;/p&gt;
&lt;p&gt;In one of the most high-profile cases of its kind, Phoolan Devi v Shekhar Kapoor[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#26"&gt;26&lt;/a&gt;] the  Delhi High Court was faced with the question of whether ‘public  figures’ are entitled to any degree of control over the representation  of their lives. Here the petitioner, Phoolan Devi, a reformed bandit,  had 'licensed'[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#27"&gt;27&lt;/a&gt;] the  production of a biopic on her life to the defendant, a film director of  note, who was to consult the plaintiff’s own writings and those of her  authorised biographer in making the film. However, the defendant – the  director of the biopic – had exceeded this mandate and also depicted  incidents that emerged from various newspaper accounts – including a  graphic gang rape scene where the plaintiff was the victim, and a  massacre which she had allegedly orchestrated. Although generally  well-known, neither of these incidents were either admitted to by the  plaintiff herself or mentioned in the plaintiff’s own writings and those  of her biographer. Even worse, the film had not been shown to her even  several months after it had been released to national and international  audiences.[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#28"&gt;28&lt;/a&gt;] In  Arundhati Roy’s moving words the producers of the film “[R]e-invent her  life. Her loves. Her rapes. They implicate her in the murder of  twenty-two men that she denies having committed. Then they try to  slither out of showing her the film!”[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#29"&gt;29&lt;/a&gt;]&lt;/p&gt;
&lt;p&gt;One of the contentions that the petitioner’s advocate had advanced  was that the defendant had no right “to mutilate or distort the facts as  based upon prison diaries” and that any such distortion would fall  afoul of her right under Sec 57 of the Indian Copyright Act. This  section confers certain ‘special rights’ on the author including the  right to claim authorship and to restrain any distortion/mutilation or  modification of the work that would be prejudicial to his/her honour or  reputation.[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#30"&gt;30&lt;/a&gt;]&lt;/p&gt;
&lt;p&gt;These rights survive any assignment of the copyright made by the  author i.e. they can e asserted by the author above any contract entered  into by her with third parties such as the producer in this case. The  Court framed the question it was faced with in these terms:&lt;/p&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;p&gt;[T]he question before me is whether such person like the plaintiff  has no right to defend when someone enlarges the terrible facts, enters  the realm of her private life, depicts in graphic details rape, sexual  intercourse, exhibits nudity, portrays the living person which brings  shame, humiliation and memories of events which haunts and will go on  haunting the plaintiff, more so the person is still living. Whether the  plaintiff has no right and her life can become an excuse for film makers  and audience to participate in an exercise of legitimate violence with  putting all inhibitions aside.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Ultimately, the High Court sided with the petitioner and issued an  injunction restraining the defendant from exhibiting his film.[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#31"&gt;31&lt;/a&gt;] This  decision was based more on a consideration of constitutional right to  privacy principles than an evaluation of the plaintiff’s case under  Copyright law. However, it does provide an interesting factual matrix  for the exploration of the way in which protection of copyright and  privacy might overlap.&lt;/p&gt;
&lt;p&gt;In a contrasting case before the Bombay High Court, &lt;i&gt;Manisha Koirala v Shashilal Nair &amp;amp; Ors &lt;/i&gt;[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#32"&gt;32&lt;/a&gt;] an  injunction was sought against the release of a film in which the  petitioner, a noted actress, was depicted in the nude through the device  of a ‘body double’. Here the plot was entirely fictional and the  plaintiff, a noted actress, had agreed to perform in the film with  ‘substituted shots’ during the scenes in the story that involved nudity.  Subsequently, she appears to have reconsidered this decision and  objected to the very inclusion of these scenes in its final version. In  her petition before the court, she alleged defamation and malicious  injurious falsehood, arguing that the exhibition of the film would  result in a violation her right to privacy "as the objectionable shots,  attempt to expose the body of a female which is suggested to be that of  the plaintiff". She contended that “the right to portray her on screen  can only be exercised in a manner, which is subject to the fundamental  principle that such portrayal can only be with her unconditional  consent." "The present rendition" of her part in the film, she alleged  was “an invasion of privacy as it is embarrassing and will cause  irreparable damage to her reputation which remains untarnished thereby  causing irreparable loss and injury”. Although Copyright is not invoked  in this case by the petitioner, there is an audible echo of some of the  reputational anxieties that had animated Phoolan Devi’s case mentioned  above. The difference, however, is that in this case the petitioner’s  claim was not grounded in a quest for control over her biography, but  over the image of her body. Unlike the previous case, here the Court was  unsympathetic to the petitioner’s claims. The court treated her  previous ‘consents’ as determinative of all issues and dismissed her  case holding:&lt;/p&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;p&gt;"The Court ...cannot be a moral guardian in this context. ..It is..  clear to my mind that once having agreed to act in the film it will be  too late for the plaintiff .. to hold that a case of defamation has been  made out.. To maintain a case of malicious falsehood it must be held  out that the statement was false. In the instant case what is sought to  be contended is that the scenes involving the film artist would result  in an action of malicious injurious falsehood or malicious falsehood by  associating the plaintiff's with the scenes which she had not enacted..  The plaintiff was prima facie aware as earlier held and that the scenes  formed part of the story board have been enacted by a double and  consequently it cannot be said that in the present case the plaintiff  has been able to establish a case of malicious falsehood."[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#33"&gt;33&lt;/a&gt;]&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;One of the facts that was relevant in the court’s decision was that  the defendant, as the ‘holder of the copyright in the film’, had  incurred vast expenditure in publicising its release. Here, in a  reversal of the Phoolan Devi case, copyright is held up as a shield  against a competing privacy claim. The issue of the extent of overlap  between copyright and privacy however remains unsettled in law. In April  2007, the Madras High Court granted a temporary injunction against the  publishers of an unauthorised biography of former Tamil Nadu Chief  Minister Jayalalitha. In her petition she alleged that the biography  “had been written without any verification of facts. Such a publication  would spoil her image and damage her status in politics and public  life.” Her petition contended that “No one has a right to publish  anything concerning personal private matters without consent, whether  truthful or otherwise, whether laudatory or critical.[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#34"&gt;34&lt;/a&gt;]&lt;/p&gt;
&lt;p&gt;Although it does not reference Copyright law, this case is another  illustration of the enduring relevance of the question of whether we are  entitled to the exclusive authorship of our private life-stories.&lt;/p&gt;
&lt;h2&gt;The Private under the Copyright Act&lt;/h2&gt;
&lt;p&gt;In its various sections, the Copyright Act inscribes certain spaces  and actions as either public or private. Specified activities are  labelled public even though they are conducted within the domestic  confines of one’s home. Similarly, activities that infringe copyright  are nevertheless immunised from prosecution due to the fact that they  are conducted for a ‘private’ purpose. In this concluding section of  this paper, we try to piece together a narrative of privacy and the  private domain that emerges from a combined reading of various sections  and decisions under the Copyright Act.&lt;/p&gt;
&lt;p&gt;We begin, here, by collating the Copyright Act’s various  articulations of the ‘public’ and ‘private’. By treating them as  intertwining, &lt;i&gt;mutually constitutive&lt;/i&gt; terms, we proceed to analyse  these various articulations in the Copyright Act with a view to seeing  what account of the private realm may emerge.&lt;/p&gt;
&lt;h3&gt;Public/Publish&lt;/h3&gt;
&lt;p&gt;One of the key rights that most owners of copyrights enjoy is the  exclusive right to "publish" or "communicate their work to the public".&lt;/p&gt;
&lt;p&gt;The Act defines "publication" to mean “making a work available to the  public by issue of copies or by communicating the work to the public”.  Significantly, in case of dispute, if the issue of copies or  communication to the public is “of an insignificant nature” it is deemed  not to constitute a publication [Section 6]. This signals that the  notions of publicity and publication under the Copyright Act are in some  senses moored to the magnitude of the receiving public. The ‘private’  then is constituted, reciprocally, as the ‘insignificant public’.&lt;/p&gt;
&lt;p&gt;Under the Indian Copyright Act, "communication to the public" occurs  when a person makes any work “available for being seen or heard or  otherwise enjoyed by the public directly or by any means of display or  diffusion other than by issuing copies of such work”. Such communication  occurs “regardless of whether any member of the public actually sees,  hears or otherwise enjoys the work so made available.”[Section 2(ff)][&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#35"&gt;35&lt;/a&gt;]&lt;/p&gt;
&lt;h3&gt;Private&lt;/h3&gt;
&lt;div&gt;The word ‘private’ is expressly referenced in four provisions of the Copyright Act.&lt;/div&gt;
&lt;ul&gt;
&lt;li&gt;Section 39 declares that “the making of any sound recording or  visual recording for the private use of the person making such  recording, or solely for purposes of bona fide teaching or research”  would not violate the broadcast reproduction right or performer's right;&lt;/li&gt;
&lt;li&gt;Section  51 which stipulates when copyrights are infringed declares that the  “imports into India, any infringing copies of the work” would constitute  an infringement except if it is only a single copy of any work that is  imported “for the private and domestic use of the importer”.&lt;/li&gt;
&lt;li&gt;Section 52(1) of the Copyright Act lists certain acts as not infringing of copyright. These include:&lt;/li&gt;
&lt;/ul&gt;
&lt;ol&gt;
&lt;li&gt;(a) a fair dealing with a literary, dramatic, musical or  artistic work, not being a computer programme, for the purposes of  private use, including research. A proposed amendment to this section  seeks to extend this protection to all ‘personal’ uses in addition to  ‘private uses including research[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#36"&gt;36&lt;/a&gt;]. ‘Personal use’ has been interpreted in non-copyright contexts to include the family members of the person living with him.[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#37"&gt;37&lt;/a&gt;] The  definition of ‘person’ under the General Clauses Act includes a  “company or association or body of individuals, whether incorporated or  not”. Although the case law on the point is scant[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#38"&gt;38&lt;/a&gt;], it  would be interesting to see if ‘personal use’ can be read to include  the use by companies internally, thereby casting a shroud of privacy on  corporations for the purpose of copyright.&lt;/li&gt;
&lt;li&gt;(p) the reproduction,  for the purpose of research or private study or with a view to  publication, of an unpublished literary, dramatic or musical work kept  in a library, museum or other institution to which the public has  access.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;In addition to the provisions listed above, Section 52 the Act also  shields certain spaces and occasions as immune from the charge of  copyright infringement (although they are not specially designated as  ‘private’). These include educational institutions[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#39"&gt;39&lt;/a&gt;], non-profit clubs, societies[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#40"&gt;40&lt;/a&gt;], religious institutions[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#41"&gt;41&lt;/a&gt;] and religious ceremonies including marriages.[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#42"&gt;42&lt;/a&gt;]&lt;/p&gt;
&lt;p&gt;Perhaps the most elaborate calibration of the boundaries between the  'private' and 'public' under the Indian Ccopyright Act by the judiciary  occurs in the case &lt;i&gt;Garware Plastics and Polyester vs Telelink &amp;amp; Ors&lt;/i&gt;[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#43"&gt;43&lt;/a&gt;].,  decided by the Bombay High Court in 1989. The case called for the  determination of whether films transmitted via neighbourhood cable  networks and viewed in the privacy of customers’ homes would constitute  an unauthorised ‘communication to the public’ under the Copyright Act.  Here the defendants had purchased video tapes of popular films and begun  transmitting them over cable networks owned by them. For this they  charged a monthly maintenance fee from their customers. Under the  Copyright Act then in force, ‘communication to the public’ was defined  simply as "communication to the public in whatever manner, including  communication through satellite.” After an extensive review of English  law on the subject, the court ruled that this did constitute an  unauthorised communication to the public:&lt;/p&gt;
&lt;p&gt;"Whether a communication is to the public or whether it is a private  communication depends essentially on the persons receiving the  communication. If they can be characterized as the public or a protein  of the public , the communication is to the public…From the authorities  the principal criteria which emerge for determining the issue are(1) the  character of audience and whether it can be described as a private or  domestic audience consisting of family members or members of the  household, (2) whether the audience in relation to the owner of the  copyright can be so considered…Applying the test of the character of the  audience watching these video films , can this audience be called a  Section of the public or is this audience a private or domestic audience  of the defendants ? In the present case &lt;i&gt;it cannot be said that the  audience which watches video films shown by the defendants consists of  family members and guests of the defendants. The video film may be  watched by a large Section of the public in the privacy of their  homes. But this does not make it a private communication so as to take  it our of the definition of "broadcast" under the Copyright Act, 1957&lt;/i&gt;.&lt;/p&gt;
&lt;p&gt;It is true that the network operates through the connection of a  cable to all these various apartments or houses. But this cannot in any  way affect the character of the audience. The viewers are not members of  one family or their guests. They do not have even the homogeneity of  club members of one family or their guests. They do not have even the  homogeneity of a club membership.[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#44"&gt;44&lt;/a&gt;] (emphasis added)&lt;/p&gt;
&lt;p&gt;A central feature emerging from this case that distinguishes public  form private in Copyright law is homogeneity or affiliation: that space  is marked ‘private’ where a pre-affiliated group – united either by  kinship or association in pursuit of a common goal – comes together in  pursuit of a non-commercial common interest. Conversely, ‘Public’ is  where the unaffiliated congregate. On the face, this accords with the  spirit of the various fair dealing rights under the Copyright Act which  carve out immunised spaces for institutions that correspond to these  definitions – educational institutions, religious institutions and  ceremonies, amateur clubs etc are immune from infringement actions  because, one could say, their activities are ‘private’.&lt;/p&gt;
&lt;p&gt;In 1994 the Copyright Act was amended to fortify this conclusion by  expanding the definition of ‘communication to the public’ to include  ‘communication through satellite or cable or any other means of  simultaneous communication to more than one household or place of  residence including residential rooms of any hotel or hostel shall be  deemed to be communication to the public;” (Sec 2(ff), Explanation)&lt;/p&gt;
&lt;h2&gt;Conclusion&lt;/h2&gt;
&lt;p&gt;I would like to conclude this paper with some reflections on the  assertion I made in the introduction about copyright law being both an  instrument for the protection and violation of privacy. From the  discussion in the previous sections, it follows:&lt;/p&gt;
&lt;p&gt;Firstly, that 'property' – as embodied by copyright law – is, at  best, an unreliable guarantor of privacy. It works when bussed along  with dignity claims– for instance the Phoolan Devi case where the  petitioner’s suffering underlay her property claim– but fails when  asserted as ‘property’ per se (as in Manisha Koirala’s case[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#45"&gt;45&lt;/a&gt;]).  One does not (under the Indian Copyright Act, at least) have a reliable  ‘property’ interest in one’s life story, bodily representation, name  etc. This stands in contrast with other regimes such as the US where  several states have enacted ‘Right to publicity’ statutes or have  recognised publicity rights through common law processes.[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#46"&gt;46&lt;/a&gt;]&lt;/p&gt;
&lt;p&gt;These rights can be read to offer people a 'property' means for  protecting their privacy (by preventing unauthorised publicity) in those  jurisdictions. Analogous claims are unavailable in India.&lt;/p&gt;
&lt;p&gt;Secondly, that ‘property’ operates frequently as a license for the  violation of privacy with impunity.  This emerges most clearly from the  cases of copyright investigation that we examined in Section 1.2 above.  Pecuniary copyright interests appear to completely overwhelm any regard  for competing privacy concerns.&lt;/p&gt;
&lt;p&gt;Thirdly, that, notwithstanding the preceding two points, the  copyright act does protect privacy in limited ways. Chiefly these are a)  By conferring limited copyright on 'unpublished works', it enables  authors to restrict their publication except on terms acceptable to  them. b) The Act grants a very wide “Performer’s right” to performers  and no sound or visal recording may be made of them without their  express consent. No such recording can broadcast or communicated to the  public without their consent. This gives a very powerful weapon of  control in the hands of performers to restrict the extent to which  representations of them are publicised. C) As mentioned above in the  penultimate section of this paper, various fair dealing exceptions carve  out spaces of privacy where infringing acts are granted immunity – for  instance private uses, uses in educational institutions and libraries,  etc.&lt;/p&gt;
&lt;p&gt;Lastly, with the arena of copyright infringement shifting gradually  to the internet, it is foreseeable that the IT Act will be employed with  greater frequency in the coming years to do the work of copyright  enforcement. The legal regime already supports this change through  provisions in the IT Act which preserve all existing rights available  under the Copyright Act [Section 81 (proviso) of the IT Act] and put new  powers of take-down [see Intermediary Guidelines] in the hands of  Copyright Owners. Thus on the one hand, copyright owners would be able  to lawfully hack into potential infringers’ computers while enjoying  immunity under the IT Act. On the other hand, ‘intermediaries’ would be  legally bound to co-operate in copyright enforcement including,  conceivably, handing over a number of personal details of those accused  of copyright infringement. In other jurisdictions, such as the EU, such  ‘co-operation’ is heavily policed by judicial oversight where personally  identifiable information is involved[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#47"&gt;47&lt;/a&gt;]. Contrastingly,  in India, with its diminished concerns for privacy and limited  awareness of how IP address data can seriously imperil privacy, there is  a very real threat that these provision will license the wholesale  violation of online privacy.&lt;/p&gt;
&lt;pre&gt;Notes&lt;/pre&gt;
&lt;p class="discreet"&gt;&lt;a name="1"&gt; &lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="1"&gt;[1]Anon, 2005. Towards Knowledge  Societies, Paris: UNESCO. Available at:  http://unesdoc.unesco.org/images/0014/001418/141843e.pdf [Accessed April  20, 2011].&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="2"&gt;[2]Sundaram says "Temporal acceleration  was a significant part of the imaginary of developmentalism - this was  inherent in the logic of 'catching up' with the core areas of the world  economy by privileging a certain strategy of growth that actively  delegitimized local and 'traditional' practices."&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="3"&gt;[3]This aspiration underlies several of  the policy documents prepared in India in the last decade –  Illustratively, the report submitted by the National Task Force on  Information Technology (NTFIT) in 1998 captures this sentiment well:  “For India, the rise of Information Technology is an opportunity to  overcome historical disabilities and once again become the master of  one's own national destiny. IT is a tool that will enable India to  achieve the goal of becoming a strong, prosperous and self-confident  nation. In doing so, IT promises to compress the time it would otherwise  take for India to advance rapidly in the march of development and  occupy a position of honor and pride in the comity of nations” Tiwari,  Ghanshyam et al. Government of India. Central Advisory Board of  Education, Ministry of Human Resource Development .Report of the Central  Advisory Board of Education Committee On Universalisation of Secondary  Education. New Delhi: 2005&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="4"&gt;[4]There is some ambiguity on whether  offences under the Copyright Act punishable with imprisonment “which may  extend to three years” are 'cognizable' or not. The Code of Criminal  Procedure 1973 classifies all offences which prescribe a penalty of  three years and above as cognizable and non bailable [First Schedule].  Offences which are punishable with imprisonment of less than three years  are classified as ‘non-cognizable’ and ‘bailable’. In the absence of a  definitive ruling from the Supreme Court on this issue, different High  Courts have offered conflicting interpretations. See Singh, S. &amp;amp;  Aprajita, 2008. Insight into the nature of offence of Copyright  Infringement. Journal of Intellectual Property Rights, 13(6),  pp.583-589. Available at:  http://nopr.niscair.res.in/bitstream/123456789/2433/1/JIPR%2013%286%29%20583-589.pdf  [Accessed May 12, 2011]. See also Agarwal, D.K., 2010. Arrest under the  customs act ? Bailable or non-bailable offence. Translation  Interpreting Services. Available at:  http://translation-tech.com/blog/213/arrest-under-the-customs-act-bailable-or-non-bailable-offence/  [Accessed May 12, 2011]. The determination of this issue would have  wide ranging implications since the police have a wider assortment of  powers with respect to interrogation, arrest, search and seizure in the  course of investigating cognizable offences than they have with respect  to non-cognizable offences. &lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="5"&gt;[5]"Where Director of Inspection or  Commissioner in consequence of information in his possession, has reason  to believe that any person having in possession of any money, etc.."  has not disclosed it for purposes of Income Tax.&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="6"&gt;[6]AIR 1997 Raj 78 &amp;lt; http://indiankanoon.org/doc/661363/&amp;gt;&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="7"&gt;[7]Event and Entertainment Management  Association  v. Union of India (Delhi HC) Order dated 2nd May 2011  &amp;lt;http://courtnic.nic.in/dhcorder/dhcqrydisp_o.asp?pn=84697&amp;amp;yr=2011&amp;gt;.  Harkauli, S., 2011. HC nullifies police circular on copyright issue.  The Pioneer. Available at:  http://www.dailypioneer.com/336974/HC-nullifies-police-circular-on-copyright-issue.html  [Accessed May 9, 2011].&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="8"&gt;[8]Ibid&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="9"&gt;[9]As recently as April 2011, the Delhi  high court restrained “cable operators nationwide from telecasting  matches of the Indian Premier League (IPL) without authorization from  MSM Satellite (Singapore) Pte Ltd, which owns the broadcasting rights.  See Bailay, R., 2011. Cable operators can’t telecast IPL without  authorization, says HC. Livemint. Available at:  http://www.livemint.com/articles/2011/04/27212449/Cable-operators-can8217t-te.html?atype=tp  [Accessed May 13, 2011]. For an early history of John Doe orders in  India, see Krishnamurthy, N. &amp;amp; Anand, P., 2003. India Trade marks in  a state of change. Managing Intellectual Property. Available at:  http://www.managingip.com/Article/1321770/India-Trade-marks-in-a-state-of-change.html  [Accessed May 13, 2011].&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="10"&gt;[10]These orders are granted by the  Court supposedly under Section 75 read with Order 26 of the Code of  Civil Procedure which empowers the court to appoint “Local  Commissioners” to record evidence in special cases. I have stated my  opinions elsewhere on why I believe these powers may not be invoked for  the purpose of effecting routine searches and seizures in the manner as  is currently being practiced by the higher judiciary – especially the  Delhi High Court. See Iyengar, P., 2009. BSA’s response on Spicy IP – in  perspective. Original Fakes. Available at:  http://originalfakes.wordpress.com/2009/04/04/bsas-response-on-spicy-ip-in-perspective/  [Accessed May 10, 2011].&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="11"&gt;[11]Anon, 2009. Ghost Post on IP  (Software) Raids: Court Sponsored Extortion? SPICY IP. Available at:  http://spicyipindia.blogspot.com/2009/03/ghost-post-on-ip-software-raids-court.html  [Accessed May 10, 2011].&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="12"&gt;[12]Autodesk Inc Vs. AVT Shankardass,  Available at:  http://delhicourts.nic.in/Jul08/Autodesk%20Inc%20Vs.%20AVT%20Shankardass.pdf  [Accessed May 10, 2011].&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="13"&gt;[13]The 2011 Special 301 Country Report  on India prepared by the IIPA specifically cites the Delhi High Court  in this context, statng “The industry enjoys a very high success rate  with respect to the grant of such orders at the Delhi High Court”.  According to this report, the Business Software Alliance was able to  obtain 34 such orders in 2009.&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="14"&gt;[14]Anon, 2011. Special 301 Report on  Copyright Protection and Enforcement: 2011 India Country Report,  International Intellectual Property Alliance. Available at:  http://www.iipa.com/rbc/2011/2011SPEC301INDIA.pdf [Accessed May 9,  2011].&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="15"&gt;[15]Ibid at. Pp 41-42.&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="16"&gt;[16]The 2010 Special 301 Country Report  lists the following defects of the proposed Section 65A: “(a) does not  cover access controls and is limited only to TPMs protecting the  exercise of exclusive rights; (b) covers only the “act” of circumvention  and does not also cover manufacturing, trafficking in, or distributing  circumvention devices or services; (c) does not define an “effective  technological measure”; (d) contains an exception which would appear to  permit circumvention for any purpose that would not amount to  infringement under the act (thereby almost completely eviscerating any  protection); (e) creates other overbroad exceptions; and (f) provides  for only criminal and not civil remedies."&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="17"&gt;[17]Syed Asifuddin And Ors. v The State Of Andhra Pradesh, 2005 CriLJ 4314 (Andhra Pradesh HC ).&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="18"&gt;[18]Ibid.&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="19"&gt;[19]Holla, A., 2009. Wronged, techie  gets justice 2 yrs after being jailed. Mumbai Mirror. Available at:  http://www.mumbaimirror.com/index.aspx?page=article&amp;amp;sectid=2&amp;amp;contentid=200906252009062503144578681037483  [Accessed March 23, 2011]. See also Nanjappa, V., 2008. “I have lost  everything.” Rediff.com News. Available at:  http://www.rediff.com/news/2008/jan/21inter.htm [Accessed March 23,  2011].&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="20"&gt;[20]Pahwa, N., 2010. Hyderabad Police  Arrests Torrent Uploaders - MediaNama. MediaNama. Available at:  http://www.medianama.com/2010/11/223-hyderabad-police-arrests-torrent-uploaders/  [Accessed May 12, 2011]. &lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="21"&gt;[21]GSR 314(E) Dated 11 April 2011:  Information Technology (Intermediaries guidelines) Rules, 2011  http://www.mit.gov.in/sites/upload_files/dit/files/GSR314E_10511(1).pdf  [Accessed May 12, 2011].&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="22"&gt;[22]See Zee Telefilms Ltd. v Sundial Communications Pvt. Ltd., 2003 (5) BomCR 404 (Bombay High Court 2003).&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="23"&gt;[23]Mr. M. Sivasamy v M/S. Vestergaard Frandsen (Delhi High court 2009).&amp;lt; http://indiankanoon.org/doc/916718/&amp;gt;&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="24"&gt;[24]Dietrich Engineering Consultant v  Schist India &amp;amp; Ors (Bombay High Court, 2009) &amp;lt;  http://indiankanoon.org/doc/1634545/&amp;gt;&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="25"&gt;[25]Mr. Diljeet Titus, Advocate vs Mr. Alfred A. Adebare And Ors, 130 DLT 330 (Delhi High Court 2006).&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="26"&gt;[26]Phoolan Devi v Shekhar Kapoor And  Ors. (1994). DLT (Vol. 57 (1995), p. 154). Retrieved from  http://indiankanoon.org/doc/793946/&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="27"&gt;[27]The conditions under which this  license were obtained speak eloquently to the ills of the current  copyright system. According to Phoolan Devi’s lawyer, the noted advocate  Indira Jaisingh, the contract was signed by Phoolan Devi while she was  behind prison bars. She did not speak or understand Hindi or English and  only spoke in a local dialect. The copyright contract was written  entirely in English and gave her a paltry sum or Rs. 2 lakh – which was a  pittance considering the budget and projected returns from the film.  Jaisingh, I., 2001. Supreme Court lawyer Indira Jaisingh pays tribute to  Phoolan Devi. Available at:  http://www.rediff.com/news/2001/jul/26spec.htm [Accessed June 10, 2011].  Arundhati Roy’s two superb critiques of the film and its director  movingly capture why this is not a simple case of copyright assignment.  See Roy, A., 1994. The Great Indian Rape Trick - I. Sawnet. Available  at: http://www.sawnet.org/books/writing/roy_bq1.html [Accessed June 10,  2011].; Roy, A., 1994. The Great Indian Rape Trick - II. Sawnet.  Available at: http://www.sawnet.org/books/writing/roy_bq2.html [Accessed  June 10, 2011].&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="28"&gt;[28]Ibid, Roy, A., 1994. The Great Indian Rape Trick - I. &lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="29"&gt;[29]Ibid, Roy, A., 1994. The Great Indian Rape Trick - II&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="30"&gt;[30]Section 57 of the Act reads  “Author’s Special Rights: ‘Independently of the author's copyright and  even after the assignment either wholly or partially of the said  copyright, the author of a work shall have the right-&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;(a) to claim authorship of the work; and&lt;br /&gt;&lt;span class="Apple-style-span"&gt;(b)  to restrain or claim damages in respect of any distortion, mutilation,  modification or other act in relation to the said work which is done  before the expiration of the term of copyright if such distortion,  mutilation, modification or other act would be prejudicial to his honour  or reputation:”&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;&lt;a name="31"&gt;[31]The case was later  settled out of court with Phoolan Devi being able to secure a  substantially higher compensation. Ultimately, the case was not about  the depiction of rape generally, but primarily about Phoolan Devi’s  sovereign right to decide the terms on which her own life would be  represented.&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="32"&gt;[32]Manisha Koirala v Shashilal Nair  &amp;amp; Ors. (2002). BomCR (Vol. 2003 (2), p. 136). Retrieved from  http://indiankanoon.org/doc/1913646/&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="33"&gt;[33]Ibid&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="34"&gt;[34]Anon, 2011. High Court Grants  Injunction Till June 7 Against Publishing Book on Jayalalithaa. The  Hindu, p.01. Available at:  http://www.hindu.com/2011/04/27/stories/2011042762360100.htm [Accessed  May 12, 2011].&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="35"&gt;[35]For a more dispersed account on the  concept of the ‘public’ under Indian law, See Iyengar, P, ‘Where the  private and the public collide’, iCommons Lab Report, September- October  2007, pp. 7-8, Icommons.org, &amp;lt;  http://archive.icommons.org/articles/what-is-public&amp;gt; last visited May  2011&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="36"&gt;[36]Copyright (Amendment) Bill 2010 http://prsindia.org/uploads/media/Copyright%20Act/Copyright%20Bill%202010.pdf &lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="37"&gt;[37]See Sivasubramania Iyer v. S.H.  Krishnaswamy AIR 1981 Ker 57 , a case under  Kerala Buildings (Lease  &amp;amp; Rent Control) Act 1965.&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="38"&gt;[38]Goods purchased for the private use  of a corporation would be goods purchased for the ”personal use” of the  corporation. 158 IC 703.&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="39"&gt;[39]52(1)(g), (h) and (i)&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="40"&gt;[40]52(1)(k) and (l)&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="41"&gt;[41]52(1)(l)&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="42"&gt;[42]52(1)(za)&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="43"&gt;[43]AIR 1989 Bom 331, 1989 (2) BomCR 433, (1989) 91 BOMLR 139 &amp;lt;http://indiankanoon.org/doc/858705/&amp;gt;&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="44"&gt;[44]Ibid.&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="45"&gt;[45]At first glance this distinction  may seem facile since even Manisha Koirala invoked ‘reputational harm’  as a prop to buttress her property claim. However, I believe this case  was complicated by the fact that the court had to consider whether the  display of someone else’s body could have implicated Manisha Koirala’s  privacy/dignity. Koirala was, in effect, arguing that she had absolute  ‘proprietorial’ control over all representations of her body – a  property argument which the court was unwilling to concede. &lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="46"&gt;[46]See Footnote 90 and accompanying  text in Samuelson, P., 2000. Privacy as Intellectual Property? SSRN  eLibrary; Stanford Law Review. Available at:  http://ssrn.com/paper=239412 [Accessed on June 14, 2011].&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="47"&gt;[47]Lebatard, F.-R., Copyright  Enforcement and the Protection of Privacy in France. Translegal.  Available at:  http://www.translegal.com/feature-articles/copyright-enforcement-and-the-protection-of-privacy-in-france  [Accessed June 14, 2011].&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/privacy/copyright-enforcement'&gt;https://cis-india.org/internet-governance/blog/privacy/copyright-enforcement&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Prashant Iyengar</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-12-14T10:27:12Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/livemint-january-4-2013-sanjukta-sharma-cool-jobs">
    <title>Cool Jobs | Parmesh Shahani, Head, Godrej India Culture Lab</title>
    <link>https://cis-india.org/news/livemint-january-4-2013-sanjukta-sharma-cool-jobs</link>
    <description>
        &lt;b&gt;The man behind Mumbai’s most original ideas space on being a cross-pollinator &lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The following interview was &lt;a class="external-link" href="http://www.livemint.com/Leisure/ZRt3AxEo6ZC0qqxfbpPkLJ/Cool-Jobs--Parmesh-Shahani-Head-Godrej-India-Culture-Lab.html"&gt;published in LiveMint&lt;/a&gt; on January 4, 2013.&lt;/p&gt;
&lt;hr /&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Parmesh621x414.jpg" alt="Parmesh" class="image-inline" title="Parmesh" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The Vikhroli catalyst &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span class="person"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Parmesh%20Shahani"&gt;Parmesh Shahani&lt;/a&gt;&lt;/span&gt;, a former editorial director of &lt;i&gt;Verve&lt;/i&gt; magazine, thought up the Godrej India Culture Lab, a cultural ideas  platform, after becoming a TED Fellow in 2009, realizing then that  Mumbai, or India, has no space that encourages cross-pollination of  ideas around contemporary society, anthropology and culture.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Shahani, the author of &lt;i&gt;Gay Bombay: Globalization, Love And (Be)Longing in Contemporary India, &lt;/i&gt;has earlier managed research for Massachusetts Institute of Technology (MIT) think tank related to media convergence.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ever  since Godrej’s Nisa Godrej took up his idea, the Godrej India Culture  Lab has hosted a conference called Urban (Re)imagination—which it  launched in 2011—talks by Japanese architect Tadao Ando, and MIT  economist Abhijit Banerjee, film screenings and book readings on themes  as diverse as Calcutta jazz and &lt;i&gt;jugaad&lt;/i&gt;. Shahani says he works on weekends and looks forward to Monday mornings. Edited excerpts from an interview:&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;What exactly does your work involve?&lt;/b&gt;&lt;br /&gt;My  work involves identifying interesting people and ideas and then  connecting them to each other—either through public talks, conferences,  salons or other means of interaction. There are certain themes I am  interested in exploring, such as what it means to be modern and Indian  today, what it means to be young or urban, and to be connected through  technology. My work often feeds directly into the larger Godrej group  efforts. We have a campaign called Godrej LOUD—Live Out Ur Dreams—on MBA  campuses across India with excellent results.&lt;/p&gt;
&lt;div class="p"&gt;&lt;/div&gt;
&lt;div class="p"&gt;&lt;b&gt;What is the best part of your job?&lt;/b&gt;&lt;/div&gt;
&lt;div class="p" id="U1904193494415NiD" style="text-align: justify; "&gt;It  doesn’t feel like a job. It feels like a calling, a mission, and is an  incredible adventure. Each day is different—and fun. It enables me to  use all the different aspects of my mind, and tap into my global  networks to focus on how we are looking at the changes taking place in  contemporary India. I love meeting other people who are on the same  mission—the people at Gateway House, India’s first foreign policy think  tank, or the Centre for Internet and Society in Bangalore, or people  like Rikin Gandhi from Digital Green that trains farmers to use cameras  to record their best practices and share it with each other.&lt;/div&gt;
&lt;div class="p" style="text-align: justify; "&gt;&lt;/div&gt;
&lt;div class="p"&gt;&lt;/div&gt;
&lt;div class="p"&gt;&lt;b&gt;&lt;br /&gt;What are your challenges and what more do you want to bring into the Lab?&lt;/b&gt;&lt;/div&gt;
&lt;div class="p" id="U19041934944150L" style="text-align: justify; "&gt;At  this moment we are more of a sandbox and catalyst. I’d like us to start  producing original research soon by having full-time experts on board.  We have recorded videos of all our talks of the past two years; they  will go up on our website, which is under development. Finally, I’d like  to attract more audiences to our events and efforts. We’ve already put  our Godrej campus at Vikhroli, Mumbai, on the cultural map of the city.&lt;/div&gt;
&lt;div class="p" style="text-align: justify; "&gt;&lt;/div&gt;
&lt;div class="p"&gt;&lt;/div&gt;
&lt;div class="p"&gt;&lt;b&gt;&lt;br /&gt;What has been your favourite project here? &lt;/b&gt;&lt;/div&gt;
&lt;div class="p" id="U1904193494415u0E" style="text-align: justify; "&gt;My favourite project has got to be the recent &lt;i&gt;Museum of Memories&lt;/i&gt; that I curated in an abandoned 60,000 sq. ft Godrej warehouse on 15  December 2012, in collaboration with other city organizations like  Junoon, Visual Disobedience, Brown Paper Bag, as well as loads of  performers, artists and musicians from the city. It was a pop-up one-day  only event with performances, music, theatre, tea, yoga, live art,  graffiti, videos, dance, robots, alternate reality games, and more. The  event bridged different spaces and it will remain very special.&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/livemint-january-4-2013-sanjukta-sharma-cool-jobs'&gt;https://cis-india.org/news/livemint-january-4-2013-sanjukta-sharma-cool-jobs&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-01-17T05:55:47Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-hindu-sweta-akundi-april-8-2019-microchips-cookies-and-the-internet-privacy-authentication">
    <title>Cookies, not the monster you may think</title>
    <link>https://cis-india.org/internet-governance/news/the-hindu-sweta-akundi-april-8-2019-microchips-cookies-and-the-internet-privacy-authentication</link>
    <description>
        &lt;b&gt;Follow the crumbs to a better understanding of data protection and privacy.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Sweta Akundi was &lt;a class="external-link" href="https://www.thehindu.com/sci-tech/technology/internet/microchips-cookies-and-the-internet-privacy-authentication/article26770699.ece"&gt;published in the Hindu &lt;/a&gt;on April 8, 2019. Pranav Manjesh Bidare was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;You’re window-shopping at an electronics store, looking at headphones. The sales assistant offers some help, but you politely decline. “I’m just looking,” you respond. A month later, you come back, and the sales assistant not only remembers you, but also directs you to the latest headphones they have. Creepy? Perhaps, but it’s a regular occurrence on e-commerce websites such as Amazon.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Enter cookies: small text files placed either temporarily or permanently by websites on your hard drive, which are used to monitor your activities &lt;a href="https://www.thehindu.com/tag/892-885-684/online/?utm=bodytag" target="_blank"&gt;online. &lt;/a&gt;Those annoying banners that pop up while you are opening a new website, telling you that this site uses cookies? You click okay in a huff because, let’s face it, you’re a busy wo/man? Essentially, you’ve given the websites permission to place cookies on your computer.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“HTTP cookies track user activities, save passwords, and authenticate sensitive information. For example, let’s say you make a purchase with your debit card. When you enter the OTP, you are notified to not refresh the page. That happens because when you enter sensitive information, an authentication cookie is created and stored. It helps the server verifying your transaction make sure that it is just you who is logged in, and not any other person who could try to access your data,” explains Pranav Manjesh Bidare, policy officer at Bengaluru-based The Centre for &lt;a href="https://www.thehindu.com/tag/541-428/internet/?utm=bodytag" target="_blank"&gt;Internet &lt;/a&gt;&amp;amp; Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These cookies can be placed by either first-party (the website you are primarily accessing) or third parties (any website that places content onto the primary website). YouTube embeds, sponsored ads, social media links all fall under the latter category. They send you independent cookies which, too, can track your activities.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;How safe is it?&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;“Cookies are vulnerable to interception by a malicious actor. When the cookie is being transmitted to and from your computer, there is a possibility of information like your browsing history, shopping trends, and authentication data being stolen from it,” says Pranav. “However, most of it is taken care of by the HTTPS protocol, which ensures a secure connection between servers and your computer.” Once the cookies are on your device, they can be safeguarded using proper anti-virus. “However there could also be cases where someone impersonates a website and accesses your cookies. That’s something the HTTPS protocol can’t solve alone.” You could manually delete cookies, or pay more attention to what you’re agreeing to share, when you enter a website. Moreover, the constant cookie consent pop-ups do get on the nerves.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;That said, the European Union is amending its privacy laws; under the new regulations, if such a draft is passed, users will be given the option of a blanket refusal of cookies, or of just third-party ones, presented in an easy-to-understand layout. However, cookies deemed to be ‘non-intrusive’ will not be subject to restrictions under the regulation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If there’s anything we have learnt from the Facebook and Cambridge Analytica fiasco, it’s that we need to have a better understanding of what privacy and data on the Internet means.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-hindu-sweta-akundi-april-8-2019-microchips-cookies-and-the-internet-privacy-authentication'&gt;https://cis-india.org/internet-governance/news/the-hindu-sweta-akundi-april-8-2019-microchips-cookies-and-the-internet-privacy-authentication&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Sweta Akundi</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2019-04-12T01:10:07Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/icann-control-shift">
    <title>Control Shift?</title>
    <link>https://cis-india.org/internet-governance/blog/icann-control-shift</link>
    <description>
        &lt;b&gt;The USA has ceded control of the Internet over to Icann, but only partially. (This post appeared as an article in Down to Earth, in the issue dated November 15, 2009.)&lt;/b&gt;
        
&lt;p&gt;After dominating operations of the Internet for decades Washington 
has said it will relinquish some control. On September 30, the US 
department of commerce decided to cede some of its powers to the 
Internet Corporation for Assigned Names and Numbers (ICANN), the body 
which manages the net’s phone book—the Internet’s Domain Naming System 
(dns).&lt;/p&gt;
&lt;p&gt;The system deals with online addresses: human understandable names 
(like google.com) are made to work with computer understandable names 
(81.198.166.2, for example). Managing this is critical because while 
Madras can be a city in both Tamil Nadu and Oregon, everyone wishing to 
go to madras.com must be pointed to the same place. For the Internet to 
work, everyone in the world must use the same telephone directory.&lt;/p&gt;
&lt;p&gt;The Internet is not a single network of computers, but an 
interconnected set of networks. What does it mean, then, to control the 
Internet? For those wishing to access YouTube in late February 2008, it 
seemed as though it was controlled by Pakistan Telecom—the agency had 
accidentally blocked access to YouTube to the entire world for almost a 
day. For Guangzhou residents, it seems the censor-happy Chinese 
government controls the Internet. And for a brief while in January 1998,
 it seemed the net was controlled by one Jon Postel.&lt;/p&gt;
&lt;p&gt;Postel was one of the architects of the Internet involved from the 
times of the net’s predecessor arpanet project, which the US department 
of defence funded as an attack-resilient computer network. He was 
heading the Internet Assigned Numbers Authority (iana), an informal body
 in de facto charge of technical aspects of the Internet, including the 
domain network system. But iana had no legal sanction. It was contracted
 by the department to perform its services. The US government retained 
control of the root servers that directed Internet traffic to the right 
locations.&lt;/p&gt;
&lt;p&gt;On January 28, 1998, Postel got eight of the 12 root servers 
transferred to iana control. This was when the defence department was 
ceding its powers to the commerce department. Postal soon received a 
telephone call from a furious Ira Magaziner, Bill Clinton’s senior 
science adviser, who instructed him to undo the transfer. Within a week,
 the commerce department issued a declaration of its control over the 
dns root servers—it was now in a position to direct Internet traffic all
 over the world.&lt;/p&gt;
&lt;p&gt;Soon after, the US government set up ICANN as a private non-profit 
corporation to manage the core components of the Internet. A contract 
from the department of commerce gave the organization in California the 
authority to conduct its operations. iana and other bodies (such as the 
regional Internet registries) now function under ICANN.&lt;/p&gt;
&lt;p&gt;Right from the outset, ICANN has been criticized as unaccountable, 
opaque and controlled by vested interests, especially big corporations 
which manipulated the domain name dispute resolution system to favour 
trademarks. Its lack of democratic functioning, commercial focus and 
poor-tolerance of dissent have made ICANN everyone’s target, from those 
who believe in a libertarian Internet as a place of freedom and 
self-regulation, to those (the European Union, for instance) who believe
 the critical components of the Internet should not be in the sole 
control of the US government.&lt;/p&gt;
&lt;p&gt;The department of commerce has from time to time renewed its 
agreement with ICANN, and the latest such renewal comes in the form of 
the affirmation of commitments (AoC). Through the AoC, the US government
 has sought to minimize its role. Instead of being the overseer of ICANN's working, it now holds only one permanent seat in the 
multi-stakeholder review panel that ICANN will itself have to 
constitute. But two days after the AoC, ICANN snubbed a coalition of 
civil society voices calling for representation; the root zone file 
remains in US control. It is too early to judge the AoC; it will have to
 be judged by how it is actualized.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/icann-control-shift'&gt;https://cis-india.org/internet-governance/blog/icann-control-shift&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-08-02T07:22:12Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/control-shift">
    <title>Control shift? </title>
    <link>https://cis-india.org/news/control-shift</link>
    <description>
        &lt;b&gt;USA might have ceded the control of the Internet, but only partially - An article by Pranesh Prakash in Down to Earth (Issue: Nov 15th ,2009)&lt;/b&gt;
        
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;After dominating operations of the Internet for decades Washington has said it will relinquish some control. On September 30, the US department of commerce decided to cede some of its powers to the Internet Corporation for Assigned Names and Numbers (icann), the body which manages the net’s phone book—the Internet’s Domain Naming System (dns).&lt;/p&gt;
&lt;p&gt;The system deals with online addresses: human understandable names (like google.com) are made to work with computer understandable names (81.198.166.2, for example). Managing this is critical because while Madras can be a city in both Tamil Nadu and Oregon, everyone wishing to go to madras.com must be pointed to the same place. For the Internet to work, everyone in the world must use the same telephone directory.&lt;/p&gt;
&lt;p&gt;The Internet is not a single network of computers, but an interconnected set of networks. What does it mean, then, to control the Internet? For those wishing to access YouTube in late February 2008, it seemed as though it was controlled by Pakistan Telecom—the agency had accidentally blocked access to YouTube to the entire world for almost a day. For Guangzhou residents, it seems the censor-happy Chinese government controls the Internet. And for a brief while in January 1998, it seemed the net was controlled by one Jon Postel.&lt;/p&gt;
&lt;p&gt;Postel was one of the architects of the Internet involved from the times of the net’s predecessor arpanet project, which the US department of defence funded as an attack-resilient computer network. He was heading the Internet Assigned Numbers Authority (iana), an informal body in de facto charge of technical aspects of the Internet, including the domain network system. But iana had no legal sanction. It was contracted by the department to perform its services. The US government retained control of the root servers that directed Internet traffic to the right locations.&lt;/p&gt;
&lt;p&gt;On January 28, 1998, Postel got eight of the 12 root servers transferred to iana control. This was when the defence department was ceding its powers to the commerce department. Postal soon received a telephone call from a furious Ira Magaziner, Bill Clinton’s senior science adviser, who instructed him to undo the transfer. Within a week, the commerce department issued a declaration of its control over the dns root servers—it was now in a position to direct Internet traffic all over the world.&lt;/p&gt;
&lt;p&gt;Soon after, the US government set up icann as a private non-profit corporation to manage the core components of the Internet. A contract from the department of commerce gave the organization in California the authority to conduct its operations. iana and other bodies (such as the regional Internet registries) now function under icann.&lt;/p&gt;
&lt;p&gt;Right from the outset, icann has been criticized as unaccountable, opaque and controlled by vested interests, especially big corporations which manipulated the domain name dispute resolution system to favour trademarks. Its lack of democratic functioning, commercial focus and poor-tolerance of dissent have made icann everyone’s target, from those who believe in a libertarian Internet as a place of freedom and self-regulation, to those (the European Union, for instance) who believe the critical components of the Internet should not be in the sole control of the US government.&lt;/p&gt;
&lt;p&gt;The department of commerce has from time to time renewed its agreement with icann, and the latest such renewal comes in the form of the affirmation of commitments (AoC). Through the AoC, the US government has sought to minimize its role. Instead of being the overseer of icann’s working, it now holds only one permanent seat in the multi-stakeholder review panel that icann will itself have to constitute. But two days after the AoC, icann snubbed a coalition of civil society voices calling for representation; the root zone file remains in US control. It is too early to judge the AoC; it will have to be judged by how it is actualized.&lt;/p&gt;
&lt;p&gt;Pranesh Prakash is with the Centre for Internet and Society in Bengaluru&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://74.125.153.132/search?q=cache:03uCVVwFNGAJ:www.downtoearth.org.in/full6.asp%3Ffoldername%3D20091115%26filename%3Dcroc%26sec_id%3D10%26sid%3D2+%22US+loses+grip+on+Internet%22+(by+Pranesh+Prakash)&amp;amp;cd=3&amp;amp;hl=en&amp;amp;ct=clnk&amp;amp;gl=in&amp;amp;client=firefox-a"&gt;Link to original article&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/control-shift'&gt;https://cis-india.org/news/control-shift&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>radha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-02T14:35:22Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/contestations-of-data-ecj-safe-harbor-ruling-and-lessons-for-india">
    <title>Contestations of Data, ECJ Safe Harbor Ruling and Lessons for India	</title>
    <link>https://cis-india.org/internet-governance/blog/contestations-of-data-ecj-safe-harbor-ruling-and-lessons-for-india</link>
    <description>
        &lt;b&gt;The European Court of Justice has invalidated a European Commission decision, which had previously concluded that the 'Safe Harbour Privacy Principles' provide adequate protections for European citizens’ privacy rights for the transfer of personal data between European Union and United States. The inadequacies of the framework is not news for the European Commission and action by ECJ has been a long time coming. The ruling raises important questions about how the claims of citizenship are being negotiated in the context of the internet, and how increasingly the contestations of personal data are being employed in the discourse. &lt;/b&gt;
        
&lt;p align="justify"&gt;The European Court of Justice
(ECJ) has invalidated a European Commission (EC) decision&lt;a class="sdfootnoteanc" name="sdfootnote1anc" href="#sdfootnote1sym"&gt;&lt;sup&gt;1&lt;/sup&gt;&lt;/a&gt;
which had previously concluded that the 'Safe Harbor Privacy
Principles'&lt;a class="sdfootnoteanc" name="sdfootnote2anc" href="#sdfootnote2sym"&gt;&lt;sup&gt;2&lt;/sup&gt;&lt;/a&gt;
provide adequate protections for European citizens’ privacy rights&lt;a class="sdfootnoteanc" name="sdfootnote3anc" href="#sdfootnote3sym"&gt;&lt;sup&gt;3&lt;/sup&gt;&lt;/a&gt;
for the transfer of personal data between European Union and United
States. This challenge stems from the claim that public law
enforcement authorities in America obtain personal data from
organisations in safe harbour for incompatible and disproportionate
purposes in violation of the Safe Harbour Privacy Principles. The
court's judgment follows the advice of the Advocate General of the
Court of Justice of the European Union (CJEU) who recently opined&lt;a class="sdfootnoteanc" name="sdfootnote4anc" href="#sdfootnote4sym"&gt;&lt;sup&gt;4&lt;/sup&gt;&lt;/a&gt;
that US practices allow for large-scale collection and transfer of
personal data belonging to EU citizens without them benefiting from
or having access to judicial protection under US privacy laws. The
inadequacies of the framework is not news for the Commission and
action by ECJ has been a long time coming. The ruling raises
important questions about how increasingly the contestations of
personal data are being employed in asserting claims of citizenship
in context of the internet.&lt;/p&gt;
&lt;p align="justify"&gt;
As the highest court in Europe,
the ECJ's decisions are binding on all member states. With this
ruling the ECJ has effectively restrained US firms from
indiscriminate collection and sharing of European citizens’ data on
American soil. The implications of the decision are significant,
because it shifts the onus of evaluating protections of personal data
for EU citizens from the 4,400 companies&lt;a class="sdfootnoteanc" name="sdfootnote5anc" href="#sdfootnote5sym"&gt;&lt;sup&gt;5&lt;/sup&gt;&lt;/a&gt;
subscribing to the system onto EU privacy watchdogs. Most
significantly, in addressing the rights of a citizen against an
established global brand, the judgement goes beyond political and
legal opinion to challenge the power imbalance that exists with
reference to US based firms.&lt;/p&gt;
&lt;p align="justify"&gt;
Today, the free movement of data
across borders is a critical factor in facilitating trade, financial
services, governance, manufacturing, health and development. However,
to consider the ruling as merely a clarification of transatlantic
mechanisms for data flows misstates the real issue. At the heart of
the judgment is the assessment whether US firms apply the tests of
‘necessity and proportionality’ in the collection and
surveillance of data for national security purposes. Application of
necessity and proportionality test to national security exceptions
under safe harbor has been a sticking point that has stalled the
renegotiation of the agreement that has been underway between the
Commission and the American data protection authorities.&lt;a class="sdfootnoteanc" name="sdfootnote6anc" href="#sdfootnote6sym"&gt;&lt;sup&gt;6&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
For EU citizens the stake in the
case are even higher, as while their right to privacy is enshrined
under EU law, they have no administrative or judicial means of
redress, if their data is used for reasons they did not intend. In
the EU, citizens accessing and agreeing to use of US based firms are
presented with a false choice between accessing benefits and giving
up on their fundamental right to privacy. In other words, by seeking
that governments and private companies provide better data protection
for the EU citizens and in restricting collection of personal data on
a generalised basis without objective criteria, the ruling is
effectively an assertion of ‘data sovereignty’. The term ‘data
sovereignty’, while lacking a firm definition, refers to a spectrum
of approaches adopted by different states to control data generated
in or passing through national internet infrastructure.&lt;a class="sdfootnoteanc" name="sdfootnote7anc" href="#sdfootnote7sym"&gt;&lt;sup&gt;7&lt;/sup&gt;&lt;/a&gt;
Underlying the ruling is the growing policy divide between the US and
EU privacy and data protection standards, which may lead to what is
referred to as the balkanization&lt;a class="sdfootnoteanc" name="sdfootnote8anc" href="#sdfootnote8sym"&gt;&lt;sup&gt;8&lt;/sup&gt;&lt;/a&gt;
of the internet in the future.&lt;/p&gt;
&lt;p align="justify"&gt;
&lt;em&gt;US-EU Data Protection Regime &lt;/em&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
The safe harbor pact between the
EU and US was negotiated in the late 1990s as an attempt to bridge
the different approaches to online privacy. Privacy is addressed in
the EU as a fundamental human right while in the US it is defined
under terms of consumer protection, which&lt;em&gt;&lt;strong&gt;
&lt;/strong&gt;&lt;/em&gt;allow trade-offs
and exceptions when national security seems to be under threat. In
order to address the lower standards of data protection prevalent in
the US, the pact facilitates data transfers from EU to US by
establishing certain safeguards equivalent to the requirements of the
EU data protection directive. The safe harbor provisions include
firms undertaking not to pass personal information to third parties
if the EU data protection standards are not met and giving users
right to opt out of data collection.&lt;a class="sdfootnoteanc" name="sdfootnote9anc" href="#sdfootnote9sym"&gt;&lt;sup&gt;9&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
The agreement was due to be
renewed by May 2015&lt;a class="sdfootnoteanc" name="sdfootnote10anc" href="#sdfootnote10sym"&gt;&lt;sup&gt;10&lt;/sup&gt;&lt;/a&gt;
and while negotiations have been ongoing for two years, EU discontent
on safe harbour came to the fore following the Edward Snowden
revelations of collection and monitoring facilitated by large private
companies for the PRISM program and after the announcement of the
TransAtlantic Trade and Investment Partnership (TTIP).&lt;a class="sdfootnoteanc" name="sdfootnote11anc" href="#sdfootnote11sym"&gt;&lt;sup&gt;11&lt;/sup&gt;&lt;/a&gt;
EU member states have mostly stayed silent as they run their own
surveillance programs often times, in cooperation with the NSA. EU
institutions cannot intervene in matters of national security
however, they do have authority on data protection matters. European
Union officials and Members of Parliament have expressed shock and
outrage at the surveillance programs unveiled by Snowden's 2013
revelations. Most recently, following the CJEU Advocate General’s
opinion, 50 Members of European Parliament (MEP) sent a strongly
worded letter the US Congress hitting back on claims of ‘digital
protectionism’ emanating from the US&lt;a class="sdfootnoteanc" name="sdfootnote12anc" href="#sdfootnote12sym"&gt;&lt;sup&gt;12&lt;/sup&gt;&lt;/a&gt;.
In no uncertain terms the letter clarified that the EU has different
ideas on privacy, platforms, net neutrality, encryption, Bitcoin,
zero-days, or copyright and will seek to improve and change any
proposal from the EC in the interest of our citizens and of all
people.&lt;/p&gt;
&lt;p align="justify"&gt;
&lt;em&gt;Towards Harmonization &lt;/em&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
In November 2013, as an attempt
to minimize the loss of trust following the Snowden revelations, the
European Commission (EC) published recommendations in its report on
'Rebuilding Trust is EU-US Data Flows'.&lt;a class="sdfootnoteanc" name="sdfootnote13anc" href="#sdfootnote13sym"&gt;&lt;sup&gt;13&lt;/sup&gt;&lt;/a&gt;
The recommendations revealed two critical initiatives at the EU
level—first was the revision of the EU-US safe harbor agreement&lt;a class="sdfootnoteanc" name="sdfootnote14anc" href="#sdfootnote14sym"&gt;&lt;sup&gt;14&lt;/sup&gt;&lt;/a&gt;
and second the adoption of the 'EU-US Umbrella Agreement&lt;a class="sdfootnoteanc" name="sdfootnote15anc" href="#sdfootnote15sym"&gt;&lt;sup&gt;15&lt;/sup&gt;&lt;/a&gt;'—a
framework for data transfer for the purpose of investigating,
detecting, or prosecuting a crime, including terrorism. The Umbrella
Agreement was recently initialed by EU and US negotiators and it only
addresses the exchange of personal data between law enforcement
agencies.&lt;a class="sdfootnoteanc" name="sdfootnote16anc" href="#sdfootnote16sym"&gt;&lt;sup&gt;16&lt;/sup&gt;&lt;/a&gt;
The Agreement has gained momentum in the wake of recent cases around
issues of territorial duties of providers, enforcement jurisdictions
and data localisation.&lt;a class="sdfootnoteanc" name="sdfootnote17anc" href="#sdfootnote17sym"&gt;&lt;sup&gt;17&lt;/sup&gt;&lt;/a&gt;
However, the adoption of the Umbrella Act depends on US Congress
adoption of the&lt;em&gt;&lt;strong&gt;
&lt;/strong&gt;&lt;/em&gt;Judicial Redress
Act (JRA) as law.&lt;a class="sdfootnoteanc" name="sdfootnote18anc" href="#sdfootnote18sym"&gt;&lt;sup&gt;18&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
&lt;em&gt;Judicial Redress Act &lt;/em&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
The JRA is a key reform that the
EC is pushing for in an attempt to address the gap between privacy
rights and remedies available to US citizens and those extended to EU
citizens, including allowing EU citizens to sue in American courts.
The JRA seeks to extend certain protections under the Privacy Act to
records shared by EU and other designated countries with US law
enforcement agencies for the purpose of investigating, detecting, or
prosecuting criminal offenses. The JRA protections would extend to
records shared under the Umbrella Agreement and while it does include
civil remedies for violation of data protection, as noted by the
Center for Democracy and Technology, the present framework  does not
provide citizens of EU countries with redress that is at par with
that which US persons enjoy under the Privacy Act.&lt;a class="sdfootnoteanc" name="sdfootnote19anc" href="#sdfootnote19sym"&gt;&lt;sup&gt;19&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
For example, the measures
outlined under the JRA would only be applicable to countries that
have outlined appropriate privacy protections agreements for data
sharing for investigations and ‘efficiently share’ such
information with the US. Countries that do not have agreements with
US cannot seek these protections leaving the personal data of their
citizens open for collection and misuse by US agencies. Further, the
arrangement leaves determination of 'efficiently sharing' in the
hands of US authorities and countries could lose protection if they
do not comply with information sharing requests promptly. Finally,
JRA protections do not apply to non-US persons nor to records shared
for purposes other than law enforcement such as intelligence
gathering. JRA is also weakened by allowing heads of agencies to
exercise their discretion to seek exemption from the Act and opt out
of compliance.&lt;/p&gt;
&lt;p align="justify"&gt;
Taken together the JRA, the
Umbrella Act and the renegotiation of the Safe Harbor Agreement need
considerable improvements. It is worth noting that EU’s acceptance
of the redundancy of existing agreements and in establishing the
independence of national data protection authorities in investigating
and enforcing national laws as demonstrated in the Schrems and in the
Weltimmo&lt;a class="sdfootnoteanc" name="sdfootnote20anc" href="#sdfootnote20sym"&gt;&lt;sup&gt;20&lt;/sup&gt;&lt;/a&gt;
case point to accelerated developments in the broader EU privacy
landscape.&lt;/p&gt;
&lt;p align="justify"&gt;
&lt;em&gt;Consequences  &lt;/em&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
The ECJ Safe Harbor ruling will
have far-reaching consequences for the online industry. Often, costly
government rulings solidify the market dominance of big companies. As
high regulatory costs restrict the entrance of small and medium
businesses the market, competition is gradually wiped out. Further,
complying with high standards of data protection means that US firms
handling European data will need to consider alternative legal means
of transfer of personal data. This could include evolving 'model
contracts' binding them to EU data protection standards. As Schrems
points out, “Big companies don’t only rely on safe harbour: they
also rely on binding corporate rules and standard contractual
clauses.”&lt;a class="sdfootnoteanc" name="sdfootnote21anc" href="#sdfootnote21sym"&gt;&lt;sup&gt;21&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
The ruling is good news for
European consumers, who can now approach a national regulator to
investigate suspicions of data mishandling. EU data protection
regulators may be be inundated with requests from companies seeking
authorization of new contracts and with consumer complaints. Some are
concerned that the ruling puts a dent in the globalized flow of
data&lt;a class="sdfootnoteanc" name="sdfootnote22anc" href="#sdfootnote22sym"&gt;&lt;sup&gt;22&lt;/sup&gt;&lt;/a&gt;,
effectively requiring data localization in Europe.&lt;a class="sdfootnoteanc" name="sdfootnote23anc" href="#sdfootnote23sym"&gt;&lt;sup&gt;23&lt;/sup&gt;&lt;/a&gt;
Others have pointed out that it is unclear how this decision sits
with other trade treaties such as the TPP that ban data
localisation.&lt;a class="sdfootnoteanc" name="sdfootnote24anc" href="#sdfootnote24sym"&gt;&lt;sup&gt;24&lt;/sup&gt;&lt;/a&gt;
While the implications of the decision will take some time in playing
out, what is certain is that US companies will be have  to
restructure management, storage and use of data. The ruling has
created the impetus for India to push for reforms to protect its
citizens from harms by US firms and improve trade relations with EU.&lt;/p&gt;
&lt;p align="justify"&gt;&lt;em&gt;The Opportunity for India&lt;/em&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
Multiple data flows taking place
over the internet simultaneously and that has led to ubiquity of data
transfers o ver the Internet, exposing individuals to privacy risks.
There has also been an enhanced economic importance of data
processing as businesses collect and correlate data using analytic
tools to create new demands, establish relationships and generate
revenue for their services. The primary concern of the Schrems case
may be the protection of the rights of EU citizens but by seeking to
extend these rights and ensure compliance in other jurisdictions, the
case touches upon many underlying contestations around  data and
sovereignty.&lt;/p&gt;
&lt;p align="justify"&gt;
Last year, Mr Ram Narain, India
Head of Delegation to the Working Group Plenary at ITU had stressed, “respecting the principle of sovereignty of information through
network functionality and global norms will go a long way in
increasing the trust and confidence in use of ICT.”&lt;a class="sdfootnoteanc" name="sdfootnote25anc" href="#sdfootnote25sym"&gt;&lt;sup&gt;25&lt;/sup&gt;&lt;/a&gt;
In the absence of the recognition of privacy as a right and
empowering citizens through measures or avenues to seek redressal
against misuse of data, the demand of data sovereignty rings empty.
The kind of framework which empowered an ordinary citizen in the EU
to approach the highest court seeking redressal based on presumed
overreach of a foreign government and from harms abetted by private
corporations simply does not exist in India. Securing citizen’s
data in other jurisdictions and from other governments begins with
establishing protection regimes within the country.&lt;/p&gt;
&lt;p align="justify"&gt;
The Indian government has also
stepped up efforts to restrict transfer of data from India including
pushing for private companies to open data centers in India.&lt;a class="sdfootnoteanc" name="sdfootnote26anc" href="#sdfootnote26sym"&gt;&lt;sup&gt;26&lt;/sup&gt;&lt;/a&gt;
Negotiating data localisation does not restrict the power of private
corporations from using data in a broad ways including tailoring ads
and promoting products. Also, data transfers impact any organisation
with international operations for example, global multinationals who
need to coordinate employee data and information. Companies like
Facebook, Google and Microsoft transfer and store data belonging to
Indian citizens and it is worth remembering that the National
Security Agency (NSA) would have access to this data through servers
of such private companies. With no existing measures to restrict such
indiscriminate access, the ruling purports to the need for India to
evolve strong protection mechanisms. Finally, the lack of such
measures also have an economic impact, as reported in a recent
Nasscom-Data Security Council of India (DSCI) survey&lt;a class="sdfootnoteanc" name="sdfootnote27anc" href="#sdfootnote27sym"&gt;&lt;sup&gt;27&lt;/sup&gt;&lt;/a&gt;
that pegs revenue losses incurred by the Indian IT-BPO industry at
$2-2.5 billion for a sample size of 15 companies. DSCI has further
estimated that outsourcing business can further grow by $50 billion
per annum once India is granted a “data secure” status by the
EU.&lt;a class="sdfootnoteanc" name="sdfootnote28anc" href="#sdfootnote28sym"&gt;&lt;sup&gt;28&lt;/sup&gt;&lt;/a&gt;
EU’s refusal to grant such a status is understandable given the
high standard of privacy as incorporated under the European Union
Data Protection Directive a standard to which India does not match
up, yet. The lack of this status prevents the flow of data which is
vital for Digital India vision and also affects the service industry
by restricting the flow of sensitive information to India such as
information about patient records.&lt;/p&gt;
&lt;p align="justify"&gt;
Data and information structures
are controlled and owned by private corporations and networks
transcend national borders, therefore the foremost emphasis needs to
be on improving national frameworks. While, enforcement mechanisms
such as the Mutual Legal Assistance Treaty (MLAT) process or other
methods of international cooperation may seem respectful of
international borders and principles of sovereignty,&lt;a class="sdfootnoteanc" name="sdfootnote29anc" href="#sdfootnote29sym"&gt;&lt;sup&gt;29&lt;/sup&gt;&lt;/a&gt;
 for users that live in undemocratic or oppressive regimes such
agreements are a considerable risk. Data is also increasingly being
stored across multiple jurisdictions and therefore merely applying
data location lens to protection measures may be too narrow. Further
it should be noted that when companies begin taking data storage
decisions based on legal considerations it will impact the speed and
reliability of services.&lt;a class="sdfootnoteanc" name="sdfootnote30anc" href="#sdfootnote30sym"&gt;&lt;sup&gt;30&lt;/sup&gt;&lt;/a&gt;
Any future regime must reflect the challenges of data transfers
taking place in legal and economic spaces that are not identical and
may be in opposition. Fundamentally, the protection of privacy will
always act as a barrier to the free flow of information even so, as
the Schrems case ruling points out not having adequate privacy
protections could also restrict flow of data, as has been the case
for India.&lt;/p&gt;
&lt;p align="justify"&gt;
The time is right for India to
appoint a data controller and put in place national frameworks, based
on nuanced understanding of issues of applying jurisdiction to govern
users and their data. Establishing better protection measures will
not only establish trust and enhance the ability of users to control
data about themselves it is also essential for sustaining economic
and social value generated from data generation and collection.
Suggestions for such frameworks have been considered previously by
the Group of Experts on Privacy constituted by the Planning
Commission.&lt;a class="sdfootnoteanc" name="sdfootnote31anc" href="#sdfootnote31sym"&gt;&lt;sup&gt;31&lt;/sup&gt;&lt;/a&gt;
By incorporating transparency in mechanisms for data and access
requests and premising requests on established necessity and
proportionality Indian government can lead the way in data protection
standards. This will give the Indian government more teeth to
challenge and address both the dangers of theft of data stored on
servers located outside of India and restrain indiscriminate access
arising from terms and conditions of businesses that grant such
rights to third parties.&amp;nbsp;&lt;/p&gt;
&lt;div id="sdfootnote1"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote1sym" href="#sdfootnote1anc"&gt;1&lt;/a&gt;
	Commission Decision of 26 July 2000 pursuant to Directive 95/46/EC
	of the European Parliament and of the Council on the adequacy of the
	protection provided by the safe harbour privacy principles and
	related frequently asked questions issued by the US Department of
	Commerce (notified under document number C(2000) 2441) (Text with
	EEA relevance.) &lt;em&gt;Official
	Journal L 215 , 25/08/2000 P. 0007 -0047 &lt;/em&gt;
	2000/520/EC:
	&lt;u&gt;&lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML"&gt;http&lt;/a&gt;&lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML"&gt;://&lt;/a&gt;&lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML"&gt;eur&lt;/a&gt;&lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML"&gt;-&lt;/a&gt;&lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML"&gt;lex&lt;/a&gt;&lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML"&gt;.&lt;/a&gt;&lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML"&gt;europa&lt;/a&gt;&lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML"&gt;.&lt;/a&gt;&lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML"&gt;eu&lt;/a&gt;&lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML"&gt;/&lt;/a&gt;&lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML"&gt;LexUriServ&lt;/a&gt;&lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML"&gt;/&lt;/a&gt;&lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML"&gt;LexUriServ&lt;/a&gt;&lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML"&gt;.&lt;/a&gt;&lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML"&gt;do&lt;/a&gt;&lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML"&gt;?&lt;/a&gt;&lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML"&gt;uri&lt;/a&gt;&lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML"&gt;=&lt;/a&gt;&lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML"&gt;CELEX&lt;/a&gt;&lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML"&gt;:32000&lt;/a&gt;&lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML"&gt;D&lt;/a&gt;&lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML"&gt;0520:&lt;/a&gt;&lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML"&gt;EN&lt;/a&gt;&lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML"&gt;:&lt;/a&gt;&lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML"&gt;HTML&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote2"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote2sym" href="#sdfootnote2anc"&gt;2&lt;/a&gt;
	Safe Harbour Privacy Principles Issued by the U.S. Department of
	Commerce on July 21, 2000
	&lt;u&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;http&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;://&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;www&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;.&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;export&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;.&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;gov&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;/&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;safeharbor&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;/&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;eu&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;/&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;eg&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;_&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;main&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;_018475.&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;asp&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote3"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote3sym" href="#sdfootnote3anc"&gt;3&lt;/a&gt;
	Megan Graham, &lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;Adding&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;Some&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;Nuance&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;on&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;the&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;European&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;Court&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;’&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;s&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;Safe&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;Harbor&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;Decision&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;,
	&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;Just&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;security&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;
	
	&lt;u&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;https&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;://&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;www&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;.&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;justsecurity&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;.&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;org&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;/26651/&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;adding&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;-&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;nuance&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;-&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;ecj&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;-&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;safe&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;-&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;harbor&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;-&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;decision&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;/&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote4"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote4sym" href="#sdfootnote4anc"&gt;4&lt;/a&gt;
	Advocate
	General’s Opinion in Case C-362/14 Maximillian Schrems v Data
	Protection Commissioner Court of Justice of the European Union,
	Press Release, No 106/15 Luxembourg, 23 September 2015
	&lt;u&gt;&lt;a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf"&gt;http&lt;/a&gt;&lt;a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf"&gt;://&lt;/a&gt;&lt;a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf"&gt;curia&lt;/a&gt;&lt;a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf"&gt;.&lt;/a&gt;&lt;a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf"&gt;europa&lt;/a&gt;&lt;a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf"&gt;.&lt;/a&gt;&lt;a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf"&gt;eu&lt;/a&gt;&lt;a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf"&gt;/&lt;/a&gt;&lt;a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf"&gt;jcms&lt;/a&gt;&lt;a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf"&gt;/&lt;/a&gt;&lt;a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf"&gt;upload&lt;/a&gt;&lt;a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf"&gt;/&lt;/a&gt;&lt;a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf"&gt;docs&lt;/a&gt;&lt;a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf"&gt;/&lt;/a&gt;&lt;a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf"&gt;application&lt;/a&gt;&lt;a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf"&gt;/&lt;/a&gt;&lt;a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf"&gt;pdf&lt;/a&gt;&lt;a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf"&gt;/2015-09/&lt;/a&gt;&lt;a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf"&gt;cp&lt;/a&gt;&lt;a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf"&gt;150106&lt;/a&gt;&lt;a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf"&gt;en&lt;/a&gt;&lt;a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf"&gt;.&lt;/a&gt;&lt;a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf"&gt;pdf&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote5"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote5sym" href="#sdfootnote5anc"&gt;5&lt;/a&gt;
	Jennifer Baker, ‘EU desperately pushes just-as-dodgy safe harbour
	alternatives’, The Register, October 7, 2015
	&lt;u&gt;&lt;a href="http://www.theregister.co.uk/2015/10/07/eu_pushes_safe_harbour_alternatives/"&gt;http&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/10/07/eu_pushes_safe_harbour_alternatives/"&gt;://&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/10/07/eu_pushes_safe_harbour_alternatives/"&gt;www&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/10/07/eu_pushes_safe_harbour_alternatives/"&gt;.&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/10/07/eu_pushes_safe_harbour_alternatives/"&gt;theregister&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/10/07/eu_pushes_safe_harbour_alternatives/"&gt;.&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/10/07/eu_pushes_safe_harbour_alternatives/"&gt;co&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/10/07/eu_pushes_safe_harbour_alternatives/"&gt;.&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/10/07/eu_pushes_safe_harbour_alternatives/"&gt;uk&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/10/07/eu_pushes_safe_harbour_alternatives/"&gt;/2015/10/07/&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/10/07/eu_pushes_safe_harbour_alternatives/"&gt;eu&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/10/07/eu_pushes_safe_harbour_alternatives/"&gt;_&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/10/07/eu_pushes_safe_harbour_alternatives/"&gt;pushes&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/10/07/eu_pushes_safe_harbour_alternatives/"&gt;_&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/10/07/eu_pushes_safe_harbour_alternatives/"&gt;safe&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/10/07/eu_pushes_safe_harbour_alternatives/"&gt;_&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/10/07/eu_pushes_safe_harbour_alternatives/"&gt;harbour&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/10/07/eu_pushes_safe_harbour_alternatives/"&gt;_&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/10/07/eu_pushes_safe_harbour_alternatives/"&gt;alternatives&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/10/07/eu_pushes_safe_harbour_alternatives/"&gt;/&lt;/a&gt;&lt;/u&gt;&amp;nbsp;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote6"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote6sym" href="#sdfootnote6anc"&gt;6&lt;/a&gt;
	Draft Report, General Data Protection Regulation, Committee on Civil
	Liberties, Justice and Home Affairs, European Parliament, 2009-2014
	&lt;a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf"&gt;http&lt;/a&gt;&lt;a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf"&gt;://&lt;/a&gt;&lt;a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf"&gt;www&lt;/a&gt;&lt;a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf"&gt;.&lt;/a&gt;&lt;a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf"&gt;europarl&lt;/a&gt;&lt;a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf"&gt;.&lt;/a&gt;&lt;a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf"&gt;europa&lt;/a&gt;&lt;a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf"&gt;.&lt;/a&gt;&lt;a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf"&gt;eu&lt;/a&gt;&lt;a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf"&gt;/&lt;/a&gt;&lt;a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf"&gt;meetdocs&lt;/a&gt;&lt;a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf"&gt;/2009_2014/&lt;/a&gt;&lt;a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf"&gt;documents&lt;/a&gt;&lt;a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf"&gt;/&lt;/a&gt;&lt;a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf"&gt;libe&lt;/a&gt;&lt;a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf"&gt;/&lt;/a&gt;&lt;a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf"&gt;pr&lt;/a&gt;&lt;a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf"&gt;/922/922387/922387&lt;/a&gt;&lt;a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf"&gt;en&lt;/a&gt;&lt;a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf"&gt;.&lt;/a&gt;&lt;a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf"&gt;pdf&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote7"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote7sym" href="#sdfootnote7anc"&gt;7&lt;/a&gt;
	Dana Polatin-Reuben, Joss Wright, ‘An Internet with BRICS
	Characteristics: Data Sovereignty and the Balkanisation of the
	Internet’, University of Oxford, July 7, 2014
	&lt;u&gt;&lt;a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf"&gt;https&lt;/a&gt;&lt;a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf"&gt;://&lt;/a&gt;&lt;a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf"&gt;www&lt;/a&gt;&lt;a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf"&gt;.&lt;/a&gt;&lt;a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf"&gt;usenix&lt;/a&gt;&lt;a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf"&gt;.&lt;/a&gt;&lt;a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf"&gt;org&lt;/a&gt;&lt;a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf"&gt;/&lt;/a&gt;&lt;a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf"&gt;system&lt;/a&gt;&lt;a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf"&gt;/&lt;/a&gt;&lt;a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf"&gt;files&lt;/a&gt;&lt;a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf"&gt;/&lt;/a&gt;&lt;a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf"&gt;conference&lt;/a&gt;&lt;a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf"&gt;/&lt;/a&gt;&lt;a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf"&gt;foci&lt;/a&gt;&lt;a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf"&gt;14/&lt;/a&gt;&lt;a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf"&gt;foci&lt;/a&gt;&lt;a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf"&gt;14-&lt;/a&gt;&lt;a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf"&gt;polatin&lt;/a&gt;&lt;a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf"&gt;-&lt;/a&gt;&lt;a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf"&gt;reuben&lt;/a&gt;&lt;a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf"&gt;.&lt;/a&gt;&lt;a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf"&gt;pdf&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote8"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote8sym" href="#sdfootnote8anc"&gt;8&lt;/a&gt;
	Sasha
	Meinrath, The Future of the Internet: Balkanization and Borders,
	Time, October 2013
	&lt;u&gt;&lt;a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/"&gt;http&lt;/a&gt;&lt;a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/"&gt;://&lt;/a&gt;&lt;a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/"&gt;ideas&lt;/a&gt;&lt;a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/"&gt;.&lt;/a&gt;&lt;a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/"&gt;time&lt;/a&gt;&lt;a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/"&gt;.&lt;/a&gt;&lt;a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/"&gt;com&lt;/a&gt;&lt;a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/"&gt;/2013/10/11/&lt;/a&gt;&lt;a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/"&gt;the&lt;/a&gt;&lt;a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/"&gt;-&lt;/a&gt;&lt;a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/"&gt;future&lt;/a&gt;&lt;a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/"&gt;-&lt;/a&gt;&lt;a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/"&gt;of&lt;/a&gt;&lt;a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/"&gt;-&lt;/a&gt;&lt;a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/"&gt;the&lt;/a&gt;&lt;a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/"&gt;-&lt;/a&gt;&lt;a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/"&gt;internet&lt;/a&gt;&lt;a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/"&gt;-&lt;/a&gt;&lt;a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/"&gt;balkanization&lt;/a&gt;&lt;a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/"&gt;-&lt;/a&gt;&lt;a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/"&gt;and&lt;/a&gt;&lt;a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/"&gt;-&lt;/a&gt;&lt;a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/"&gt;borders&lt;/a&gt;&lt;a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/"&gt;/&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote9"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote9sym" href="#sdfootnote9anc"&gt;9&lt;/a&gt;
	Safe Harbour Privacy Principles, Issued by the U.S. Department of
	Commerce, July 2001
	&lt;u&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;http&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;://&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;www&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;.&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;export&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;.&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;gov&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;/&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;safeharbor&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;/&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;eu&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;/&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;eg&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;_&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;main&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;_018475.&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;asp&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote10"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote10sym" href="#sdfootnote10anc"&gt;10&lt;/a&gt;
	Facebook
	case may force European firms to change data storage practices, The
	Guardian, September 23, 2015
	&lt;u&gt;&lt;a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy"&gt;http&lt;/a&gt;&lt;a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy"&gt;://&lt;/a&gt;&lt;a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy"&gt;www&lt;/a&gt;&lt;a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy"&gt;.&lt;/a&gt;&lt;a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy"&gt;theguardian&lt;/a&gt;&lt;a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy"&gt;.&lt;/a&gt;&lt;a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy"&gt;com&lt;/a&gt;&lt;a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy"&gt;/&lt;/a&gt;&lt;a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy"&gt;us&lt;/a&gt;&lt;a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy"&gt;-&lt;/a&gt;&lt;a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy"&gt;news&lt;/a&gt;&lt;a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy"&gt;/2015/&lt;/a&gt;&lt;a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy"&gt;sep&lt;/a&gt;&lt;a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy"&gt;/23/&lt;/a&gt;&lt;a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy"&gt;us&lt;/a&gt;&lt;a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy"&gt;-&lt;/a&gt;&lt;a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy"&gt;intelligence&lt;/a&gt;&lt;a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy"&gt;-&lt;/a&gt;&lt;a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy"&gt;services&lt;/a&gt;&lt;a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy"&gt;-&lt;/a&gt;&lt;a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy"&gt;surveillance&lt;/a&gt;&lt;a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy"&gt;-&lt;/a&gt;&lt;a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy"&gt;privacy&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote11"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote11sym" href="#sdfootnote11anc"&gt;11&lt;/a&gt;
	Privacy Tracker,  US-EU Safe Harbor Under Pressure, August 2, 2013
	&lt;u&gt;&lt;a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure"&gt;https&lt;/a&gt;&lt;a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure"&gt;://&lt;/a&gt;&lt;a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure"&gt;iapp&lt;/a&gt;&lt;a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure"&gt;.&lt;/a&gt;&lt;a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure"&gt;org&lt;/a&gt;&lt;a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure"&gt;/&lt;/a&gt;&lt;a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure"&gt;news&lt;/a&gt;&lt;a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure"&gt;/&lt;/a&gt;&lt;a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure"&gt;a&lt;/a&gt;&lt;a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure"&gt;/&lt;/a&gt;&lt;a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure"&gt;us&lt;/a&gt;&lt;a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure"&gt;-&lt;/a&gt;&lt;a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure"&gt;eu&lt;/a&gt;&lt;a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure"&gt;-&lt;/a&gt;&lt;a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure"&gt;safe&lt;/a&gt;&lt;a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure"&gt;-&lt;/a&gt;&lt;a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure"&gt;harbor&lt;/a&gt;&lt;a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure"&gt;-&lt;/a&gt;&lt;a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure"&gt;under&lt;/a&gt;&lt;a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure"&gt;-&lt;/a&gt;&lt;a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure"&gt;pressure&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote12"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote12sym" href="#sdfootnote12anc"&gt;12&lt;/a&gt;
	Kieren
	McCarthy, Privacy, net neutrality, security, encryption ... Europe
	tells Obama, US Congress to back off, The Register, 23 September,
	2015
	&lt;u&gt;&lt;a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/"&gt;http&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/"&gt;://&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/"&gt;www&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/"&gt;.&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/"&gt;theregister&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/"&gt;.&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/"&gt;co&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/"&gt;.&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/"&gt;uk&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/"&gt;/2015/09/23/&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/"&gt;european&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/"&gt;_&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/"&gt;politicians&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/"&gt;_&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/"&gt;to&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/"&gt;_&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/"&gt;congress&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/"&gt;_&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/"&gt;back&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/"&gt;_&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/"&gt;off&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/"&gt;/&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote13"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote13sym" href="#sdfootnote13anc"&gt;13&lt;/a&gt;
	Communication from the Commission to the European Parliament and the
	Council, Rebuilding Trust in EU-US Data Flows, European Commission,
	November 2013
	&lt;u&gt;&lt;a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf"&gt;http&lt;/a&gt;&lt;a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf"&gt;://&lt;/a&gt;&lt;a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf"&gt;ec&lt;/a&gt;&lt;a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf"&gt;.&lt;/a&gt;&lt;a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf"&gt;europa&lt;/a&gt;&lt;a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf"&gt;.&lt;/a&gt;&lt;a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf"&gt;eu&lt;/a&gt;&lt;a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf"&gt;/&lt;/a&gt;&lt;a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf"&gt;justice&lt;/a&gt;&lt;a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf"&gt;/&lt;/a&gt;&lt;a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf"&gt;data&lt;/a&gt;&lt;a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf"&gt;-&lt;/a&gt;&lt;a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf"&gt;protection&lt;/a&gt;&lt;a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf"&gt;/&lt;/a&gt;&lt;a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf"&gt;files&lt;/a&gt;&lt;a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf"&gt;/&lt;/a&gt;&lt;a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf"&gt;com&lt;/a&gt;&lt;a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf"&gt;_2013_846_&lt;/a&gt;&lt;a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf"&gt;en&lt;/a&gt;&lt;a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf"&gt;.&lt;/a&gt;&lt;a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf"&gt;pdf&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote14"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote14sym" href="#sdfootnote14anc"&gt;14&lt;/a&gt;
	Safe
	Harbor on trial in the European Union, Access Blog, September 2014
	&lt;u&gt;&lt;a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union"&gt;https&lt;/a&gt;&lt;a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union"&gt;://&lt;/a&gt;&lt;a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union"&gt;www&lt;/a&gt;&lt;a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union"&gt;.&lt;/a&gt;&lt;a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union"&gt;accessnow&lt;/a&gt;&lt;a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union"&gt;.&lt;/a&gt;&lt;a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union"&gt;org&lt;/a&gt;&lt;a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union"&gt;/&lt;/a&gt;&lt;a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union"&gt;blog&lt;/a&gt;&lt;a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union"&gt;/2014/11/13/&lt;/a&gt;&lt;a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union"&gt;safe&lt;/a&gt;&lt;a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union"&gt;-&lt;/a&gt;&lt;a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union"&gt;harbor&lt;/a&gt;&lt;a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union"&gt;-&lt;/a&gt;&lt;a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union"&gt;on&lt;/a&gt;&lt;a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union"&gt;-&lt;/a&gt;&lt;a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union"&gt;trial&lt;/a&gt;&lt;a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union"&gt;-&lt;/a&gt;&lt;a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union"&gt;in&lt;/a&gt;&lt;a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union"&gt;-&lt;/a&gt;&lt;a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union"&gt;the&lt;/a&gt;&lt;a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union"&gt;-&lt;/a&gt;&lt;a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union"&gt;european&lt;/a&gt;&lt;a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union"&gt;-&lt;/a&gt;&lt;a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union"&gt;union&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote15"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote15sym" href="#sdfootnote15anc"&gt;15&lt;/a&gt;
	European
	Commission - Fact Sheet Questions and Answers on the EU-US data
	protection "Umbrella agreement", September 8, 2015
	&lt;u&gt;&lt;a href="http://europa.eu/rapid/press-release_MEMO-15-5612_en.htm"&gt;http&lt;/a&gt;&lt;a href="http://europa.eu/rapid/press-release_MEMO-15-5612_en.htm"&gt;://&lt;/a&gt;&lt;a href="http://europa.eu/rapid/press-release_MEMO-15-5612_en.htm"&gt;europa&lt;/a&gt;&lt;a href="http://europa.eu/rapid/press-release_MEMO-15-5612_en.htm"&gt;.&lt;/a&gt;&lt;a href="http://europa.eu/rapid/press-release_MEMO-15-5612_en.htm"&gt;eu&lt;/a&gt;&lt;a href="http://europa.eu/rapid/press-release_MEMO-15-5612_en.htm"&gt;/&lt;/a&gt;&lt;a href="http://europa.eu/rapid/press-release_MEMO-15-5612_en.htm"&gt;rapid&lt;/a&gt;&lt;a href="http://europa.eu/rapid/press-release_MEMO-15-5612_en.htm"&gt;/&lt;/a&gt;&lt;a href="http://europa.eu/rapid/press-release_MEMO-15-5612_en.htm"&gt;press&lt;/a&gt;&lt;a href="http://europa.eu/rapid/press-release_MEMO-15-5612_en.htm"&gt;-&lt;/a&gt;&lt;a href="http://europa.eu/rapid/press-release_MEMO-15-5612_en.htm"&gt;release&lt;/a&gt;&lt;a href="http://europa.eu/rapid/press-release_MEMO-15-5612_en.htm"&gt;_&lt;/a&gt;&lt;a href="http://europa.eu/rapid/press-release_MEMO-15-5612_en.htm"&gt;MEMO&lt;/a&gt;&lt;a href="http://europa.eu/rapid/press-release_MEMO-15-5612_en.htm"&gt;-15-5612_&lt;/a&gt;&lt;a href="http://europa.eu/rapid/press-release_MEMO-15-5612_en.htm"&gt;en&lt;/a&gt;&lt;a href="http://europa.eu/rapid/press-release_MEMO-15-5612_en.htm"&gt;.&lt;/a&gt;&lt;a href="http://europa.eu/rapid/press-release_MEMO-15-5612_en.htm"&gt;htm&lt;/a&gt;&lt;/u&gt;&amp;nbsp;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote16"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote16sym" href="#sdfootnote16anc"&gt;16&lt;/a&gt;
	McGuire Woods, ‘EU and U.S. reach “Umbrella Agreement” on data
	transfers’, Lexology, September 14, 2015
	&lt;u&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;http&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;://&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;www&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;.&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;lexology&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;.&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;com&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;/&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;library&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;/&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;detail&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;.&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;aspx&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;?&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;g&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;=422&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;bca&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;41-2&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;d&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;54-4648-&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;ae&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;57-00&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;d&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;678515&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;e&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;1&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;f&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote17"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote17sym" href="#sdfootnote17anc"&gt;17&lt;/a&gt;
	Andrew
	Woods, Lowering the Temperature on the Microsoft-Ireland Case,
	Lawfare September, 2015
	&lt;u&gt;&lt;a href="https://www.lawfareblog.com/lowering-temperature-microsoft-ireland-case"&gt;https&lt;/a&gt;&lt;a href="https://www.lawfareblog.com/lowering-temperature-microsoft-ireland-case"&gt;://&lt;/a&gt;&lt;a href="https://www.lawfareblog.com/lowering-temperature-microsoft-ireland-case"&gt;www&lt;/a&gt;&lt;a href="https://www.lawfareblog.com/lowering-temperature-microsoft-ireland-case"&gt;.&lt;/a&gt;&lt;a href="https://www.lawfareblog.com/lowering-temperature-microsoft-ireland-case"&gt;lawfareblog&lt;/a&gt;&lt;a href="https://www.lawfareblog.com/lowering-temperature-microsoft-ireland-case"&gt;.&lt;/a&gt;&lt;a href="https://www.lawfareblog.com/lowering-temperature-microsoft-ireland-case"&gt;com&lt;/a&gt;&lt;a href="https://www.lawfareblog.com/lowering-temperature-microsoft-ireland-case"&gt;/&lt;/a&gt;&lt;a href="https://www.lawfareblog.com/lowering-temperature-microsoft-ireland-case"&gt;lowering&lt;/a&gt;&lt;a href="https://www.lawfareblog.com/lowering-temperature-microsoft-ireland-case"&gt;-&lt;/a&gt;&lt;a href="https://www.lawfareblog.com/lowering-temperature-microsoft-ireland-case"&gt;temperature&lt;/a&gt;&lt;a href="https://www.lawfareblog.com/lowering-temperature-microsoft-ireland-case"&gt;-&lt;/a&gt;&lt;a href="https://www.lawfareblog.com/lowering-temperature-microsoft-ireland-case"&gt;microsoft&lt;/a&gt;&lt;a href="https://www.lawfareblog.com/lowering-temperature-microsoft-ireland-case"&gt;-&lt;/a&gt;&lt;a href="https://www.lawfareblog.com/lowering-temperature-microsoft-ireland-case"&gt;ireland&lt;/a&gt;&lt;a href="https://www.lawfareblog.com/lowering-temperature-microsoft-ireland-case"&gt;-&lt;/a&gt;&lt;a href="https://www.lawfareblog.com/lowering-temperature-microsoft-ireland-case"&gt;case&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote18"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote18sym" href="#sdfootnote18anc"&gt;18&lt;/a&gt;
	Jens-Henrik Jeppesen, Greg Nojeim, ‘The EU-US Umbrella Agreement
	and the Judicial Redress Act: Small Steps Forward for EU Citizens’
	Privacy Rights’, October 5, 2015
	&lt;u&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;https&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;://&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;cdt&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;.&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;org&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;/&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;blog&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;/&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;the&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;-&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;eu&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;-&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;us&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;-&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;umbrella&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;-&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;agreement&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;-&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;and&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;-&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;the&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;-&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;judicial&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;-&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;redress&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;-&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;act&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;-&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;small&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;-&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;steps&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;-&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;forward&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;-&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;for&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;-&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;eu&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;-&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;citizens&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;-&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;privacy&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;-&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;rights&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;/&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote19"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote19sym" href="#sdfootnote19anc"&gt;19&lt;/a&gt;
	Ibid 18.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote20"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote20sym" href="#sdfootnote20anc"&gt;20&lt;/a&gt;
	Landmark ECJ data protection ruling could impact Facebook and
	Google, The Guardian, 2 October, 2015
	&lt;u&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;http&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;://&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;www&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;.&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;theguardian&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;.&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;com&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;/&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;technology&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;/2015/&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;oct&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;/02/&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;landmark&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;-&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;ecj&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;-&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;data&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;-&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;protection&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;-&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;ruling&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;-&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;facebook&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;-&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;google&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;-&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;weltimmo&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote21"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote21sym" href="#sdfootnote21anc"&gt;21&lt;/a&gt;
	Julia Powles, Tech companies like Facebook not above the law, says
	Max Schrems, The Guardian, Octover 9, 2015
	&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;http&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;://&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;www&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;.&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;theguardian&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;.&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;com&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;/&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;technology&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;/2015/&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;oct&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;/09/&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;facebook&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;-&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;data&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;-&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;privacy&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;-&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;max&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;-&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;schrems&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;-&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;european&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;-&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;court&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;-&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;of&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;-&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;justice&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote22"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote22sym" href="#sdfootnote22anc"&gt;22&lt;/a&gt;
	Adam
	Thierer,
	Unintended
	Consequences of the EU Safe Harbor Ruling, The Technology Liberation
	Front, October 6, 2015
	&lt;u&gt;&lt;a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831"&gt;http&lt;/a&gt;&lt;a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831"&gt;://&lt;/a&gt;&lt;a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831"&gt;techliberation&lt;/a&gt;&lt;a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831"&gt;.&lt;/a&gt;&lt;a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831"&gt;com&lt;/a&gt;&lt;a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831"&gt;/2015/10/06/&lt;/a&gt;&lt;a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831"&gt;unintended&lt;/a&gt;&lt;a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831"&gt;-&lt;/a&gt;&lt;a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831"&gt;consequenses&lt;/a&gt;&lt;a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831"&gt;-&lt;/a&gt;&lt;a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831"&gt;of&lt;/a&gt;&lt;a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831"&gt;-&lt;/a&gt;&lt;a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831"&gt;the&lt;/a&gt;&lt;a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831"&gt;-&lt;/a&gt;&lt;a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831"&gt;eu&lt;/a&gt;&lt;a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831"&gt;-&lt;/a&gt;&lt;a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831"&gt;safe&lt;/a&gt;&lt;a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831"&gt;-&lt;/a&gt;&lt;a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831"&gt;harbor&lt;/a&gt;&lt;a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831"&gt;-&lt;/a&gt;&lt;a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831"&gt;ruling&lt;/a&gt;&lt;a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831"&gt;/#&lt;/a&gt;&lt;a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831"&gt;more&lt;/a&gt;&lt;a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831"&gt;-75831&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote23"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote23sym" href="#sdfootnote23anc"&gt;23&lt;/a&gt;
	Anupam
	Chander, Tweeted ECJ&lt;a href="https://twitter.com/hashtag/schrems?src=hash"&gt;
	#&lt;/a&gt;&lt;a href="https://twitter.com/hashtag/schrems?src=hash"&gt;schrems&lt;/a&gt;
	ruling may effectively require data localization within Europe,
	&lt;u&gt;&lt;a href="https://twitter.com/AnupamChander/status/651369730754801665"&gt;https&lt;/a&gt;&lt;a href="https://twitter.com/AnupamChander/status/651369730754801665"&gt;://&lt;/a&gt;&lt;a href="https://twitter.com/AnupamChander/status/651369730754801665"&gt;twitter&lt;/a&gt;&lt;a href="https://twitter.com/AnupamChander/status/651369730754801665"&gt;.&lt;/a&gt;&lt;a href="https://twitter.com/AnupamChander/status/651369730754801665"&gt;com&lt;/a&gt;&lt;a href="https://twitter.com/AnupamChander/status/651369730754801665"&gt;/&lt;/a&gt;&lt;a href="https://twitter.com/AnupamChander/status/651369730754801665"&gt;AnupamChander&lt;/a&gt;&lt;a href="https://twitter.com/AnupamChander/status/651369730754801665"&gt;/&lt;/a&gt;&lt;a href="https://twitter.com/AnupamChander/status/651369730754801665"&gt;status&lt;/a&gt;&lt;a href="https://twitter.com/AnupamChander/status/651369730754801665"&gt;/651369730754801665&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote24"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote24sym" href="#sdfootnote24anc"&gt;24&lt;/a&gt;
	Lokman Tsui, Tweeted, “If the TPP bans data localization, but the
	ECJ ruling effectively mandates it, what does that mean for the
	internet?”
	&lt;u&gt;&lt;a href="https://twitter.com/lokmantsui/status/651393867376275456"&gt;https&lt;/a&gt;&lt;a href="https://twitter.com/lokmantsui/status/651393867376275456"&gt;://&lt;/a&gt;&lt;a href="https://twitter.com/lokmantsui/status/651393867376275456"&gt;twitter&lt;/a&gt;&lt;a href="https://twitter.com/lokmantsui/status/651393867376275456"&gt;.&lt;/a&gt;&lt;a href="https://twitter.com/lokmantsui/status/651393867376275456"&gt;com&lt;/a&gt;&lt;a href="https://twitter.com/lokmantsui/status/651393867376275456"&gt;/&lt;/a&gt;&lt;a href="https://twitter.com/lokmantsui/status/651393867376275456"&gt;lokmantsui&lt;/a&gt;&lt;a href="https://twitter.com/lokmantsui/status/651393867376275456"&gt;/&lt;/a&gt;&lt;a href="https://twitter.com/lokmantsui/status/651393867376275456"&gt;status&lt;/a&gt;&lt;a href="https://twitter.com/lokmantsui/status/651393867376275456"&gt;/651393867376275456&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote25"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote25sym" href="#sdfootnote25anc"&gt;25&lt;/a&gt;
	Statement from Indian Head of Delegation, Mr Ram Narain for WGPL,
	&lt;a href="https://ccgnludelhi.wordpress.com/2014/11/04/indian-statement-on-itu-and-internet-at-the-working-group-plenary/"&gt;Indian&lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/2014/11/04/indian-statement-on-itu-and-internet-at-the-working-group-plenary/"&gt;statement&lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/2014/11/04/indian-statement-on-itu-and-internet-at-the-working-group-plenary/"&gt;on&lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/2014/11/04/indian-statement-on-itu-and-internet-at-the-working-group-plenary/"&gt;ITU&lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/2014/11/04/indian-statement-on-itu-and-internet-at-the-working-group-plenary/"&gt;and&lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/2014/11/04/indian-statement-on-itu-and-internet-at-the-working-group-plenary/"&gt;Internet&lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/2014/11/04/indian-statement-on-itu-and-internet-at-the-working-group-plenary/"&gt;at&lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/2014/11/04/indian-statement-on-itu-and-internet-at-the-working-group-plenary/"&gt;the&lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/2014/11/04/indian-statement-on-itu-and-internet-at-the-working-group-plenary/"&gt;Working&lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/2014/11/04/indian-statement-on-itu-and-internet-at-the-working-group-plenary/"&gt;Group&lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/2014/11/04/indian-statement-on-itu-and-internet-at-the-working-group-plenary/"&gt;Plenary&lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/2014/11/04/indian-statement-on-itu-and-internet-at-the-working-group-plenary/"&gt;November&lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/2014/11/04/indian-statement-on-itu-and-internet-at-the-working-group-plenary/"&gt;
	4, 2014 &lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/author/asukum87/page/2/"&gt;https&lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/author/asukum87/page/2/"&gt;://&lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/author/asukum87/page/2/"&gt;ccgnludelhi&lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/author/asukum87/page/2/"&gt;.&lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/author/asukum87/page/2/"&gt;wordpress&lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/author/asukum87/page/2/"&gt;.&lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/author/asukum87/page/2/"&gt;com&lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/author/asukum87/page/2/"&gt;/&lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/author/asukum87/page/2/"&gt;author&lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/author/asukum87/page/2/"&gt;/&lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/author/asukum87/page/2/"&gt;asukum&lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/author/asukum87/page/2/"&gt;87/&lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/author/asukum87/page/2/"&gt;page&lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/author/asukum87/page/2/"&gt;/2/&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote26"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote26sym" href="#sdfootnote26anc"&gt;26&lt;/a&gt;
	Sounak
	Mitra, Xiaomi bets big on India despite problems, Business Standard,
	December 2014
	&lt;u&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;http&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;://&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;www&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;.&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;business&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;-&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;standard&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;.&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;com&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;/&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;article&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;/&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;companies&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;/&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;xiaomi&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;-&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;bets&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;-&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;big&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;-&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;on&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;-&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;india&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;-&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;despite&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;-&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;problems&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;-114122201023_1.&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;html&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote27"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote27sym" href="#sdfootnote27anc"&gt;27&lt;/a&gt;
	Neha
	Alawadi, Ruling on data flow between EU &amp;amp; US may impact India’s
	IT sector, Economic Times,October 7, 2015
	&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;http&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;://&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;economictimes&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;.&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;indiatimes&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;.&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;com&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;/&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;articleshow&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;/49250738.&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;cms&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;?&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;utm&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;_&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;source&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;=&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;contentofinterest&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;&amp;amp;&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;utm&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;_&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;medium&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;=&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;text&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;&amp;amp;&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;utm&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;_&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;campaign&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;=&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;cppst&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote28"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote28sym" href="#sdfootnote28anc"&gt;28&lt;/a&gt;
	Pranav Menon, Data Protection Laws in India and Data Security-
	Impact on India and Data Security-Impact on India - EU Free Trade
	Agreement, CIS Access to Knowledge, 2011
	&lt;u&gt;&lt;a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf"&gt;http&lt;/a&gt;&lt;a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf"&gt;://&lt;/a&gt;&lt;a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf"&gt;cis&lt;/a&gt;&lt;a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf"&gt;-&lt;/a&gt;&lt;a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf"&gt;india&lt;/a&gt;&lt;a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf"&gt;.&lt;/a&gt;&lt;a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf"&gt;org&lt;/a&gt;&lt;a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf"&gt;/&lt;/a&gt;&lt;a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf"&gt;a&lt;/a&gt;&lt;a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf"&gt;2&lt;/a&gt;&lt;a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf"&gt;k&lt;/a&gt;&lt;a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf"&gt;/&lt;/a&gt;&lt;a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf"&gt;blogs&lt;/a&gt;&lt;a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf"&gt;/&lt;/a&gt;&lt;a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf"&gt;data&lt;/a&gt;&lt;a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf"&gt;-&lt;/a&gt;&lt;a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf"&gt;security&lt;/a&gt;&lt;a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf"&gt;-&lt;/a&gt;&lt;a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf"&gt;laws&lt;/a&gt;&lt;a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf"&gt;-&lt;/a&gt;&lt;a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf"&gt;india&lt;/a&gt;&lt;a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf"&gt;.&lt;/a&gt;&lt;a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf"&gt;pdf&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote29"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote29sym" href="#sdfootnote29anc"&gt;29&lt;/a&gt;
	Surendra
	Kumar Sinha, India wants Mutual Legal Assistance treaty with
	Bangladesh, Economic Times, October 7, 2015
	h&lt;u&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;ttp&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;://&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;economictimes&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;.&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;indiatimes&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;.&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;com&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;/&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;articleshow&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;/49262294.&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;cms&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;?&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;utm&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;_&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;source&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;=&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;contentofinterest&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;&amp;amp;&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;utm&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;_&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;medium&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;=&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;text&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;&amp;amp;&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;utm&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;_&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;campaign&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;=&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;cppst&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote30"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote30sym" href="#sdfootnote30anc"&gt;30&lt;/a&gt;
	Pablo
	Chavez, Director, Public Policy and Government Affairs, 	Testifying
	before the U.S. Senate on 	transparency 	legislation, November 3,
	2013
	&lt;u&gt;&lt;a href="http://googlepublicpolicy.blogspot.in/2013/11/testifying-before-us-senate-on.html"&gt;http&lt;/a&gt;&lt;a href="http://googlepublicpolicy.blogspot.in/2013/11/testifying-before-us-senate-on.html"&gt;://&lt;/a&gt;&lt;a href="http://googlepublicpolicy.blogspot.in/2013/11/testifying-before-us-senate-on.html"&gt;googlepublicpolicy&lt;/a&gt;&lt;a href="http://googlepublicpolicy.blogspot.in/2013/11/testifying-before-us-senate-on.html"&gt;.&lt;/a&gt;&lt;a href="http://googlepublicpolicy.blogspot.in/2013/11/testifying-before-us-senate-on.html"&gt;blogspot&lt;/a&gt;&lt;a href="http://googlepublicpolicy.blogspot.in/2013/11/testifying-before-us-senate-on.html"&gt;.&lt;/a&gt;&lt;a href="http://googlepublicpolicy.blogspot.in/2013/11/testifying-before-us-senate-on.html"&gt;in&lt;/a&gt;&lt;a href="http://googlepublicpolicy.blogspot.in/2013/11/testifying-before-us-senate-on.html"&gt;/2013/11/&lt;/a&gt;&lt;a href="http://googlepublicpolicy.blogspot.in/2013/11/testifying-before-us-senate-on.html"&gt;testifying&lt;/a&gt;&lt;a href="http://googlepublicpolicy.blogspot.in/2013/11/testifying-before-us-senate-on.html"&gt;-&lt;/a&gt;&lt;a href="http://googlepublicpolicy.blogspot.in/2013/11/testifying-before-us-senate-on.html"&gt;before&lt;/a&gt;&lt;a href="http://googlepublicpolicy.blogspot.in/2013/11/testifying-before-us-senate-on.html"&gt;-&lt;/a&gt;&lt;a href="http://googlepublicpolicy.blogspot.in/2013/11/testifying-before-us-senate-on.html"&gt;us&lt;/a&gt;&lt;a href="http://googlepublicpolicy.blogspot.in/2013/11/testifying-before-us-senate-on.html"&gt;-&lt;/a&gt;&lt;a href="http://googlepublicpolicy.blogspot.in/2013/11/testifying-before-us-senate-on.html"&gt;senate&lt;/a&gt;&lt;a href="http://googlepublicpolicy.blogspot.in/2013/11/testifying-before-us-senate-on.html"&gt;-&lt;/a&gt;&lt;a href="http://googlepublicpolicy.blogspot.in/2013/11/testifying-before-us-senate-on.html"&gt;on&lt;/a&gt;&lt;a href="http://googlepublicpolicy.blogspot.in/2013/11/testifying-before-us-senate-on.html"&gt;.&lt;/a&gt;&lt;a href="http://googlepublicpolicy.blogspot.in/2013/11/testifying-before-us-senate-on.html"&gt;htm&lt;/a&gt;&lt;/u&gt;&amp;nbsp;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote31"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote31sym" href="#sdfootnote31anc"&gt;31&lt;/a&gt;
	Report
	of the Group of Experts on Privacy (Chaired by Justice A P Shah,
	Former Chief Justice, Delhi High Court), Planning Commission,
	October 2012
		&lt;u&gt;&lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;http&lt;/a&gt;&lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;://&lt;/a&gt;&lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;planningcommission&lt;/a&gt;&lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;.&lt;/a&gt;&lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;nic&lt;/a&gt;&lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;.&lt;/a&gt;&lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;in&lt;/a&gt;&lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;/&lt;/a&gt;&lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;reports&lt;/a&gt;&lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;/&lt;/a&gt;&lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;genrep&lt;/a&gt;&lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;/&lt;/a&gt;&lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;rep&lt;/a&gt;&lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;_&lt;/a&gt;&lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;privacy&lt;/a&gt;&lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;.&lt;/a&gt;&lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;pdf&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;p align="justify"&gt;&amp;nbsp;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote31"&gt;
&lt;p align="justify"&gt;&amp;nbsp;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote30"&gt;&amp;nbsp;&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/contestations-of-data-ecj-safe-harbor-ruling-and-lessons-for-india'&gt;https://cis-india.org/internet-governance/blog/contestations-of-data-ecj-safe-harbor-ruling-and-lessons-for-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>jyoti</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Digital Economy</dc:subject>
    
    
        <dc:subject>Public Accountability</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Platform Responsibility</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Accountability</dc:subject>
    
    
        <dc:subject>Digital Security</dc:subject>
    
    
        <dc:subject>Digital India</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-10-14T14:40:08Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/content-takedown-and-users-rights-1">
    <title>Content takedown and users' rights</title>
    <link>https://cis-india.org/internet-governance/blog/content-takedown-and-users-rights-1</link>
    <description>
        &lt;b&gt;After Shreya Singhal v Union of India, commentators have continued to question the constitutionality of the content takedown regime under Section 69A of the IT Act (and the Blocking Rules issued under it). There has also been considerable debate around how the judgement has changed this regime: specifically about (i) whether originators of content are entitled to a hearing, (ii) whether Rule 16 of the Blocking Rules, which mandates confidentiality of content takedown requests received by intermediaries from the Government, continues to be operative, and (iii) the effect of Rule 16 on the rights of the originator and the public to challenge executive action. In this opinion piece, we attempt to answer some of these questions.&lt;/b&gt;
        
&lt;p style="text-align: justify;" class="normal"&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;This article was first &lt;a class="external-link" href="http://https://theleaflet.in/content-takedown-and-users-rights/"&gt;published&lt;/a&gt; at the Leaflet. It has subsequently been republished by &lt;a class="external-link" href="https://scroll.in/article/953146/how-india-is-using-its-information-technology-act-to-arbitrarily-take-down-online-content"&gt;Scroll.in&lt;/a&gt;, &lt;a class="external-link" href="https://kashmirobserver.net/2020/02/15/content-takedown-and-users-rights/"&gt;Kashmir Observer&lt;/a&gt; and the &lt;a class="external-link" href="https://cyberbrics.info/content-takedown-and-users-rights/"&gt;CyberBRICS blog&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;&lt;strong&gt;Introduction&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;Last year, several Jio users from different states&amp;nbsp;&lt;a href="https://www.medianama.com/2019/03/223-indiankanoon-jio-block/"&gt;reported&lt;/a&gt;&amp;nbsp;that sites like Indian Kanoon, Reddit and Telegram were inaccessible through their connections. While attempting to access the website, the users were presented with a notice that the websites were blocked on orders from the Department of Telecommunications (DoT). When contacted by the founder of Indian Kanoon, Reliance Jio&amp;nbsp;&lt;a href="https://in.reuters.com/article/us-india-internet-idINKCN1RF14D"&gt;stated&lt;/a&gt;&amp;nbsp;that the website had been blocked on orders of the government, and that the order had been rescinded the same evening. However, in response to a Right to Information (RTI) request, the DoT&amp;nbsp;&lt;a href="https://twitter.com/indiankanoon/status/1218193372210323456"&gt;said&lt;/a&gt;&amp;nbsp;they had no information about orders relating to the blocking of Indian Kanoon.&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;Alternatively, consider that the Committee to Protect Journalists (CPJ)&amp;nbsp;&lt;a href="https://cpj.org/blog/2019/10/india-opaque-legal-process-suppress-kashmir-twitter.php"&gt;expressed concern&lt;/a&gt;&amp;nbsp;last year that the Indian government was forcing Twitter to suspend accounts or remove content relating to Kashmir. They reported that over the last two years, the Indian government suppressed a substantial amount of information coming from the area, and prevented Indians from accessing more than five thousand tweets.&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;These instances are&amp;nbsp;&lt;a href="https://www.hindustantimes.com/analysis/to-preserve-freedoms-online-amend-the-it-act/story-aC0jXUId4gpydJyuoBcJdI.html"&gt;symptomatic&lt;/a&gt;&amp;nbsp;of a larger problem of opaque and arbitrary content takedown in India, enabled by the legal framework under the Information Technology (IT) Act. The Government derives its powers to order intermediaries (entities storing or transmitting information on behalf of others, a definition which includes internet service providers and social media platforms alike) to block online resources through&amp;nbsp;&lt;a href="https://indiankanoon.org/doc/10190353/"&gt;section 69A&lt;/a&gt;&amp;nbsp;of the IT Act and the&amp;nbsp;&lt;a href="https://meity.gov.in/writereaddata/files/Information%20Technology%20%28%20Procedure%20and%20safeguards%20for%20blocking%20for%20access%20of%20information%20by%20public%29%20Rules%2C%202009.pdf"&gt;rules&lt;/a&gt;&amp;nbsp;[“the blocking rules”] notified thereunder. Apart from this,&amp;nbsp;&lt;a href="https://indiankanoon.org/doc/844026/"&gt;section 79&lt;/a&gt;&amp;nbsp;of the IT Act and its allied rules also prescribe a procedure for content removal.&amp;nbsp;&lt;a href="https://cis-india.org/internet-governance/files/a-deep-dive-into-content-takedown-frames"&gt;Conversations&lt;/a&gt;&amp;nbsp;with one popular intermediary revealed that the government usually prefers to use its powers under section 69A, possibly because of the opaque nature of the procedure that we highlight below.&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;Under section 69A, a content removal request can be sent by authorised personnel in the Central Government not below the rank of a Joint Secretary.&amp;nbsp; The grounds for issuance of blocking orders under section 69A are: “&lt;em&gt;the interest of the sovereignty and integrity of India, defence of India, the security of the state, friendly relations with foreign states or public order or for preventing incitement to the commission of any cognisable offence relating to the above.&lt;/em&gt;” Specifically, the blocking rules envisage the process of blocking to be largely executive-driven, and require strict confidentiality to be maintained around the issuance of blocking orders. This shrouds content takedown orders in a cloak of secrecy, and makes it impossible for users and content creators to ascertain the legitimacy or legality of the government action in any instance of blocking.&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;&lt;strong&gt;Issues&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;The Supreme Court had been called to determine the constitutional validity of section 69A and the allied rules in&amp;nbsp;&lt;a href="https://indiankanoon.org/doc/110813550/"&gt;&lt;em&gt;Shreya Singhal v Union of India&lt;/em&gt;&lt;/a&gt;. The petitioners had contended that as per the procedure laid down by these rules, there was no guarantee of pre-decisional hearing afforded to the originator of the information. Additionally, the petitioners pointed out that the safeguards built into section 95 and 96 of the Code of Criminal Procedure (CrPC), which allow state governments to ban publications and persons to initiate legal challenges to those actions respectively, were absent from the blocking procedures. Lastly, the petitioners assailed rule 16 of the blocking rules, which mandated confidentiality of blocking procedures, on the grounds that it was affecting their fundamental rights.&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;The Court, however, found little merit in these arguments. Specifically, the Court found that section 69A was narrowly drawn and had sufficient procedural safeguards, which included the grounds of issuance of a blocking order being specifically drawn, and mandating that the reasons of the website blocking be in writing, thus making it amenable to judicial review. Further, the Court also found that the provision of setting up of a review committee saved the law from being constitutional infirmity. In the Court’s opinion, the mere absence of additional safeguards, as the ones built into the CrPC, did not mean that the law was unconstitutional.&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;But do the ground realities align with the Court’s envisaged implementation of these principles? Apar Gupta, a counsel for the petitioners,&amp;nbsp;&lt;a href="https://indianexpress.com/article/opinion/columns/but-what-about-section-69a/"&gt;pointed&lt;/a&gt;&amp;nbsp;out that there was no recorded instance of pre-decisional hearing being granted to show that this safeguard contained in the rules was&amp;nbsp; actually being implemented. However, Gautam Bhatia&amp;nbsp;&lt;a href="https://indconlawphil.wordpress.com/2015/03/25/the-supreme-courts-it-act-judgment-and-secret-blocking/"&gt;read&lt;/a&gt;&amp;nbsp;&lt;em&gt;Shreya Singhal&amp;nbsp;&lt;/em&gt;to make an important advance: that the right of hearing be mandatorily extended to the ‘originator’, i.e. the content creator.&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;Additionally, Bhatia also noted that the Court, while upholding the constitutionality of the procedure under section 69A, held that the “&lt;em&gt;reasons have to be recorded in writing in such blocking order so that they may be assailed in a writ petition under Article 226 of the Constitution.&lt;/em&gt;”&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;There are two important takeaways from this.&amp;nbsp;&lt;em&gt;Firstly&lt;/em&gt;, he argued that the broad contours of the judgment invoke an established constitutional doctrine — that the fundamental right under Article 19(1)(a) does not merely include the right of expression, but also the&amp;nbsp;&lt;em&gt;right of access to information.&amp;nbsp;&lt;/em&gt;Accordingly, the right of challenging a blocking order was not only vested in the originator or the concerned intermediary, but may rest with the general public as well. And&amp;nbsp;&lt;em&gt;secondly&lt;/em&gt;, by the doctrine of necessary implication, it followed that for the general public to challenge any blocking order under Article 226, the blocking orders must be made public. While Bhatia concedes that public availability of blocking orders may be an over-optimistic reading of the judgment, recent events suggest that even the commonly-expected result, i.e. that the content creators having the right to a hearing, has not been implemented by the Government.&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;Consider the&amp;nbsp;&lt;a href="https://internetfreedom.in/delhi-hc-issues-notice-to-the-government-for-blocking-satirical-dowry-calculator-website/"&gt;blocking&lt;/a&gt;&amp;nbsp;of the satirical website DowryCalculator.com in September 2019 on orders from the government. The website displayed a calculator that suggests a ‘dowry’ depending on the salary and education of a prospective groom: even if someone misses the satire, the contents of the website are not immediately relatable to any grounds of removal listed under section 69A of the IT Act.&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;&amp;nbsp;Tanul Thakur, the creator of the website, was not granted a hearing despite the fact that he had publicly claimed the ownership of the website at various times and that the website had been covered widely by the press. The information associated with the domain name also publicly lists Thakur’s name and contact information. Clearly, the government made no effort to contact Thakur when passing the order. Perhaps even more worryingly, when he&amp;nbsp;&lt;a href="https://internetfreedom.in/delhi-hc-issues-notice-to-the-government-for-blocking-satirical-dowry-calculator-website/"&gt;tried&lt;/a&gt;&amp;nbsp;to access a copy of the blocking order by filing a RTI, the MeitY cited the confidentiality rule to deny him the information.&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;This incident documents a fundamental problem plaguing the rules: the confidentiality clause is still being used to deny disclosure of key information on content takedown orders. The government has also used the provision to deny citizens a list of blocked websites , as responses to RTI requests have proven&amp;nbsp;&lt;a href="https://cis-india.org/internet-governance/blog/rti-application-to-bsnl-for-the-list-of-websites-blocked-in-india"&gt;time&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a href="https://sflc.in/deity-provides-list-sites-blocked-2013-withholds-orders"&gt;again&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;Clearly, the Supreme Court’s rationale in considering Section 69A and the blocking rules as constitutional is not one that is implemented in reality. The confidentiality clause is preventing legal challenges to content blocking in totality: content creators are unable access the orders, and hence are unable to understand the executive’s reasoning in ordering their content to be blocked from public access.&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;As we noted earlier, the grounds of issuing a blocking order under section 69A pertain to certain reasonable restrictions on expression permitted by Article 19(2), which are couched in broad terms. The government’s implementation of section 69A and the rules make it impossible for any judicial review or accountability on the conformity of blocking orders &amp;nbsp;with the mentioned grounds under the rules, or any reasonable restriction at all.&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;&lt;strong&gt;The Way Forward&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;From the opacity of proceedings under the law, to the lack of information regarding the same on public domain, the Indian content takedown regime leaves a lot to be desired from both the government and intermediaries at play.&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;First, we believe the Supreme Court’s decision in&amp;nbsp;&lt;em&gt;Shreya Singhal v. Union of India&lt;/em&gt;&amp;nbsp;casts an obligation on the government to attempt to contact the content creator if they are passing a content takedown order to an intermediary.&amp;nbsp;&lt;em&gt;Second&lt;/em&gt;, even if the content creator is unavailable for a hearing at that instance, the confidentiality clause should not be used to prevent future disclosure of information to the content creator, so that affected citizens can access and challenge these orders.&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;While we wait for legal reform, intermediaries can also step up to ensure the rights of users online are upheld. On receiving formal orders, intermediaries should&amp;nbsp;&lt;a href="https://cis-india.org/internet-governance/blog/torsha-sarkar-suhan-s-and-gurshabad-grover-october-30-2019-through-the-looking-glass"&gt;assess&lt;/a&gt;&amp;nbsp;the legality of the received request. This should involve ensuring that only authorised agencies and personnel have sent the content removal orders, that the order specifically mentions what provision the government is exercising the power under, and that the content removal requests relate to the grounds of removal that are permissible under section 69A. For instance, intermediaries should refuse to entertain content removal requests under section 69A of the IT Act if they relate to obscenity, a ground not covered by the provision.&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;The representatives of the intermediary should also push for the committee to grant a hearing to the content creator. Here, the intermediary can act as a liaison between the uploader and the governmental authorities.&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;The Supreme Court’s recent decision in&amp;nbsp;&lt;a href="https://indiankanoon.org/doc/82461587/"&gt;&lt;em&gt;Anuradha Bhasin v. Union of India&lt;/em&gt;&lt;/a&gt;&lt;em&gt;&amp;nbsp;&lt;/em&gt;offers a glimmer of hope for user rights online&lt;em&gt;.&amp;nbsp;&lt;/em&gt;While the case primarily challenged the orders imposing section 144 of the CrPC and a communication blockade in Jammu and Kashmir, the final decision does affirm the fundamental principle that government-imposed restrictions on the freedom of expression and assembly must be made available to the public and affected parties to enable challenges in a court of law.&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;&amp;nbsp;The judiciary has yet another opportunity to consider the provision and the rules: late last year, Tanul Thakur&amp;nbsp;&lt;a href="https://internetfreedom.in/delhi-hc-issues-notice-to-the-government-for-blocking-satirical-dowry-calculator-website/"&gt;approached&lt;/a&gt;&amp;nbsp;the Delhi High Court to challenge the orders passed by the government to ISPs to block his website. One hopes that the future holds robust reforms to the content takedown regime.&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;&amp;nbsp;We live in an era where the ebb and flow of societal discourse is increasingly channeled through intermediaries on the internet. In the absence of a mature, balanced and robust framework that enshrines the rule of law, we risk arbitrary modulation of the marketplace of ideas by the executive.&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;&lt;em&gt;&amp;nbsp;&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;&lt;em&gt;Torsha Sakar and Gurshabad Grover are researchers at the Centre for Internet and Society.&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;&lt;em&gt;Disclosure: The Centre for Internet and Society is a recipient of research grants from Facebook and Google.&lt;/em&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/content-takedown-and-users-rights-1'&gt;https://cis-india.org/internet-governance/blog/content-takedown-and-users-rights-1&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Torsha Sarkar, Gurshabad Grover</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Freedom</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2020-02-17T05:18:25Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/content-removal-on-facebook">
    <title>Content Removal on Facebook — A Case of Privatised Censorship?</title>
    <link>https://cis-india.org/internet-governance/blog/content-removal-on-facebook</link>
    <description>
        &lt;b&gt;Any activity on Facebook, be it creating an account, posting a picture or status update or creating a group or page, is bound by Facebook’s Terms of Service and Community Guidelines. These contain a list of content that is prohibited from being published on Facebook which ranges from hate speech to pornography to violation of privacy. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Facebook removes content largely on the basis of requests either by the government or by other users. The &lt;a href="https://www.facebook.com/help/365194763546571/"&gt;Help section&lt;/a&gt; of Facebook deals with warnings and blocking of content. It says that Facebook only removes content that violates Community Guidelines and not everything that has been reported.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;I conducted an experiment to primarily look at Facebook’s process of content removal and also to analyse what kind of content they actually remove.&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt;&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;I put up a status which contained personal information of a person on my Friend List (the information was false). I then asked several people (including the person about whom the status was made) to report the status — that of  being harassed  or for violation of  privacy rights. Seven people reported the status. Within half an hour of the reports being made, I received the following notification:&lt;br /&gt;"Someone reported your &lt;a href="https://www.facebook.com/sugarquill/posts/10152265929599232" target="_blank"&gt;post&lt;/a&gt; for containing harassment and &lt;a href="https://www.facebook.com/settings?tab=support&amp;amp;item_id=10152265934819232&amp;amp;notif_t=content_reported"&gt;1 other reason&lt;/a&gt;."&lt;br /&gt;&lt;br /&gt;The notification also contained the option to delete my post and said that Facebook would look into whether it violated their Community Guidelines.&lt;br /&gt;&lt;br /&gt;A day later, all those who had reported the status received notifications stating the following:&lt;br /&gt;&lt;br /&gt;"We reviewed the post you reported for harassment and found it doesn't violate our &lt;a href="https://www.facebook.com/communitystandards" target="_blank"&gt;Community Standards&lt;/a&gt;." &lt;br /&gt;&lt;br /&gt;I received a similar notification as well.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;I, along with around thirteen others, reported a Facebook page which contained pictures of my friend and a few other women with lewd captions in various regional languages. We reported the group for harassment and bullying and also for humiliating someone we knew. The report was made on 24 March, 2014. On 30 April, 2014, I received a notification stating the following:&lt;br /&gt;&lt;br /&gt;"We reviewed the page you reported for harassment and found it doesn't violate our &lt;a href="https://www.facebook.com/communitystandards" target="_blank"&gt;Community Standards&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;Note: If you have an issue with something on the Page, make sure you report the content (e.g. a photo), not the entire Page. That way, your report will be more accurately reviewed."&lt;br /&gt;&lt;br /&gt;I then reported each picture on the page for harassment and received a series of notifications on 5 May, 2014 which stated the following:&lt;br /&gt;&lt;br /&gt;"We reviewed the photo you reported for harassment and found it doesn't violate our &lt;a href="https://www.facebook.com/communitystandards" target="_blank"&gt;Community Standards&lt;/a&gt;."&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;These incidents are in stark contrast with repeated attempts by Facebook to remove content which it finds objectionable. In 2013, a homosexual man’s picture protesting against the Supreme Court judgment in December was &lt;a href="http://www.ndtv.com/article/india/heated-debate-after-facebook-allegedly-deletes-photograph-of-gay-sikh-kissing-a-man-460219"&gt;taken down&lt;/a&gt;. In 2012, Facebook &lt;a href="http://www.blouinartinfo.com/news/story/816583/facebook-censors-pompidous-gerhard-richter-nude-fueling-fight"&gt;removed artwork&lt;/a&gt; by a French artist which featured a nude woman.  In the same year, Facebook &lt;a href="http://www.dailymail.co.uk/news/article-2146588/Heather-Patrick-Walker-Facebook-ban-pictures-baby-son-died.html"&gt;removed photographs&lt;/a&gt; of a child who was born with defect and banned the mother from accessing Facebook completely. Facebook also &lt;a href="http://www.huffingtonpost.com/2013/02/20/facebook-breast-cancer-tattoo-photo-double-mastectomy_n_2726118.html"&gt;removed a picture&lt;/a&gt; of a breast cancer survivor who posted a picture of a tattoo that she had following her mastectomy. Following this, however, Facebook issued an apology and stated that mastectomy photographs are not in violation of their Content Guidelines. Even in the sphere of political discourse and dissent, Facebook has cowered under government pressure and removed pages and content, as evidenced by the &lt;a href="http://www.firstpost.com/living/facebook-bows-to-pak-pressure-bans-rock-band-laal-anti-taliban-groups-1560009.html"&gt;ban&lt;/a&gt; on the progressive Pakistani band Laal’s Facebook page and other anti-Taliban pages. Following much social media outrage, Facebook soon &lt;a href="http://www.dawn.com/news/1111174/laals-facebook-page-now-accessible-to-pak-based-internet-users"&gt;revoked&lt;/a&gt; this ban. These are just a few examples of how harmless content has been taken down by Facebook, in a biased exercise of its powers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;After incidents of content removal have been made public through news reports and complaints, Facebook often apologises for removing content and issues statements that the removal was an “error.” In some cases, they edit their policies to address specific kinds of content after a takedown (like the &lt;a href="http://www.guardian.co.uk/media/2008/dec/30/facebook-breastfeeding-ban"&gt;reversal of the breastfeeding ban&lt;/a&gt;).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On the other hand, however, Facebook is notorious for refusing to take down content that is actually objectionable, partially evidenced by my own experiences listed above. There have been complaints about Facebook’s &lt;a href="http://www.theguardian.com/lifeandstyle/2013/feb/19/facebook-images-rape-domestic-violence"&gt;refusal to remove&lt;/a&gt; misogynistic content which glorifies rape and domestic violence through a series of violent images and jokes. One such page was removed finally, not because of the content but because the administrators had used fake profiles. When asked, a spokesperson said that censorship “was not the solution to bad online behaviour or offensive beliefs.” While this may be true, the question that needs answering is why Facebook decides to draw these lines only when it comes to certain kinds of ‘objectionable’ content and not others.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;All of these examples represent a certain kind of arbitrariness on the part of Facebook’s censorship policies. It seems that Facebook is far more concerned with removing content that will cause supposed public or governmental outrage or defy some internal morality code, rather than protecting the rights of those who may be harmed due to such content, as their Statement of Policies so clearly spells out.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are many aspects of the review and takedown process that are hazy, like who exactly reviews the content that is reported and what standards they are made to employ. In 2012, it was revealed that Facebook &lt;a href="http://gawker.com/5885714/inside-facebooks-outsourced-anti-porn-and-gore-brigade-where-camel-toes-are-more-offensive-than-crushed-heads"&gt;outsourced&lt;/a&gt; its content reviews to oDesk and provided the reviewers with a 17-page manual which listed what kind of content was appropriate and what was not. A bare reading of the leaked document gives one a sense of Facebook’s aversion to sex and nudity and its neglect of other harm-inducing content like harassment through misuse of content that is posted and what is categorised as hate speech.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the process of monitoring the acceptability of content, Facebook takes upon itself the role of a private censor with absolutely no accountability or transparency in its working. A &lt;a href="https://fbcdn-dragon-a.akamaihd.net/hphotos-ak-xpa1/t39.2178-6/851563_293317947467769_1320502878_n.png"&gt;Reporting Guide&lt;/a&gt; was published to increase transparency in its content review procedures. The Guide reveals that Facebook provides for an option where the reportee can appeal the decision to remove content in “some cases.” However, the lack of clarity on what these cases are or what the appeal process is frustrates the existence of this provision as it can be misused. Additionally, Facebook reserves the right to remove content with or without notice depending upon the severity of the violation. There is no mention of how severe is severe enough to warrant uninformed content removal. In most of the above cases, the user was not notified that their content was found offensive and would be liable for takedown. Although Facebook publishes a transparency report, it only contains a record of takedowns following government requests and not those by private users of Facebook. The unbridled nature of the power that Facebook has over our personal content, despite clearly stating that all content posted is the user’s alone, threatens the freedom of expression on the site. A proper implementation of the policies that Facebook claims to employ is required along with a systematic record of the procedure that is used to remove content that is in consonance with natural justice.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/content-removal-on-facebook'&gt;https://cis-india.org/internet-governance/blog/content-removal-on-facebook&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>jessie</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Facebook</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-06-16T05:23:09Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/privacy/consumer-privacy-e-commerce">
    <title>Consumer Privacy in e-Commerce</title>
    <link>https://cis-india.org/internet-governance/blog/privacy/consumer-privacy-e-commerce</link>
    <description>
        &lt;b&gt;Looking at the larger picture of national security versus consumer privacy, Sahana Sarkar says that though consumer privacy is important in the world of digital technology, individuals must put aside some of their civil liberties when it comes to the question of national security, as it is necessary to prevent societal damage.&lt;/b&gt;
        
&lt;h2&gt;What is Consumer Privacy?&lt;/h2&gt;
&lt;p&gt;In today’s digital economy generating consumer information is inevitable. Though some companies use the personal information they obtain to improve and provide more services to consumers, many companies use the information in an irresponsible manner.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;In countries that do provide legal protection for consumer privacy, it is never protected as an absolute right. Consumer privacy is not considered an absolute right for three reasons:&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;What constitutes consumer privacy is culturally, contextually, individually defined&lt;/li&gt;&lt;li&gt;Consumer privacy often conflicts with other market rights&amp;nbsp;&lt;/li&gt;&lt;li&gt;The ownership of a consumer's private information is debated — as consumer's believe they own the information and businesses believe they own the information.&amp;nbsp;&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;In order to understand consumer privacy it is useful to outline the privacy expectations and strategies of both consumers and businesses, and to also examine the protection measures taken by firms to safeguard consumer information. The major privacy concerns held by consumer's can be broken down into three main domains:&lt;/p&gt;
&lt;div&gt;
&lt;div&gt;
&lt;ol&gt;&lt;li&gt;Consumers want to be informed about the type of information that is being collected from them.&amp;nbsp;&lt;/li&gt;&lt;li&gt;Consumers need to know that they a certain degree of control over the personal information that is being collected.&amp;nbsp;&lt;/li&gt;&lt;li&gt;Consumers need to be assured that their personal information will be secure and will not be abused or stolen.&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;Though privacy has been defined by many as the "right to be let alone", its application in today’s modern world is not that straightforward. We live in a world where our purchasing behavior, &amp;nbsp;both online and offline, is shared and used invisibly. For instance, if an individual uses a social networking site, it is possible for a third party application to access personal information that is shared. Similarly, if an individual uses a warranty card or loyalty card during a purchase, it is possible for third parties, like data brokers, to collect and use the individuals' personal information.&amp;nbsp;&lt;/p&gt;
&lt;div&gt;
&lt;p&gt;For instance,15 consumer privacy groups have filed a complaint against Facebook for limiting user's ability to browse anonymously. The complaint was regarding the fact that users only had the choice to designate personal information as publicly linkable, or to not provide information at all. Though Facebook claims to ensure users control over their personal data by allowing users to choose their privacy settings, it does not clarify that these setting can change at any given point. &amp;nbsp;Moreover, the latest privacy embarrassment that hit Facebook proves again that Facebook does not protect users’ privacy. A few weeks ago Facebook admitted to passing personal information of its users onto different gaming applications. These gaming applications have in turn passed the information on to advertisers who otherwise could not have accessed the information.[&lt;a href="#1"&gt;1&lt;/a&gt;]&lt;/p&gt;
&lt;/div&gt;
&lt;h3&gt;Breach of Privacy in Information Collection&lt;/h3&gt;
&lt;div&gt;
&lt;p&gt;Internet users often fear the loss of personal privacy, because of the ability businesses and their websites have to collect, store, and process personal data. &amp;nbsp;For example, sites extract information from consumers through a form, and then record data about their user’s browsing habit. &amp;nbsp;After collecting user information, the sites match the data with their personal and demographic information to create a profile of the user’s preferences, which is then used to promote targeted advertisements or provide customized services. The sites might also engage in web lining through which they price a consumer according to their profiles.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Online there are two main ways in which sites collect user information:&amp;nbsp;&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;Sites collect information directly through a server software. Sites often use automatic software logs to do this. &amp;nbsp;&lt;/li&gt;&lt;li&gt;A third party extracts information from the site without the consumer’s knowledge. Sites often place cookies on websites to extract user information.&amp;nbsp;&lt;/li&gt;&lt;/ol&gt;
&lt;/div&gt;
&lt;p&gt;Automatic software logs and third party cookie placement are two overlooked aspect of information collection. &amp;nbsp;Cookies work by collecting personal information while a user surfs the net, and then feeds the information back to a Web server. Cookies are either used to remember the user, or are used by network advertising agencies to target product advertisements based on long term profiles of user’s buying and surfing habits. An example of a website that uses cookies is 'double click'. Web bugs are used by advertising networks to add information to the personal profiles stored in cookies. Web bugs are also used in junk email campaigns to see how many visits the site gets. Cookies and web bugs are just two out of hundreds of technologies used to collect personal information.&amp;nbsp;[&lt;a href="#2"&gt;2&lt;/a&gt;]&lt;/p&gt;
&lt;/div&gt;
&lt;h3&gt;Challenges Posed by Protection of Consumer Privacy&lt;/h3&gt;
&lt;div&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;In conclusion, I would like to talk about the difficulty in maintaining a balance between the legal collections of information and protecting privacy of consumers. Above I demonstrated how this conflict arises between businesses and consumers&amp;nbsp;&lt;/span&gt;—&lt;span class="Apple-style-span"&gt;&amp;nbsp;and is rooted in businesses wanting personal information for commercial reasons, and a user wanting protection and control over their own information. This conflict can also arise between consumers, businesses, and political bodies. An example that demonstrates this is the ongoing conflict between RIM (Research in Motion) and the Government of India. The Government of India has issued a warning against RIM saying that it would suspend its blackberry operations if they do not adhere to the Indian laws and regulations.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;The Ministry of Home Affairs is demanding that RIM allow access to encrypted content that flows in and out of India. In other words the Government of India wants RIM to allow the security forces to have access to &amp;nbsp;data sent using Blackberries by reducing &amp;nbsp;encryption levels, or by providing the government with the decryption keys. The demand by the government is somewhat ironic as Blackberry manufacturers have developed the Blackberry encryption key to protect the consumers’ privacy during any business deal, so that information is not compromised. On the other side of the debate, the government is demanding access to Blackberry communications, because their inability to decrypt the codes makes countering the threats to national security difficult. This is especially true for a country like India, which is constantly facing threats from Maoists, and extremist Islamic groups.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;This example highlights an important question: &amp;nbsp;what is more important&amp;nbsp;&lt;/span&gt;—&lt;span class="Apple-style-span"&gt;&amp;nbsp;national security or consumer privacy? In 2010, RIM agreed to negotiate access to consumer messages only where access requests are within local laws. Blackberry also agreed to not make any specific deals with consumers, and to make its enterprise systems security and confidentiality non-negotiable.&lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;h3&gt;Conclusion&amp;nbsp;&lt;/h3&gt;
&lt;div&gt;
&lt;p&gt;Though, consumer privacy is very important especially in a world of digital technology, however, when we speak of national security, I feel that individuals must set aside some of their civil liberties &amp;nbsp;— at least to the extent that it is necessary to prevent societal damage. For a clearer understanding of national security vs consumer privacy look at the case of RIM Vs Indian Government in the following sites:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;a class="external-link" href="http://www.zdnet.com/blog/igeneration/blackberry-encryption-too-secure-national-security-vs-consumer-privacy/5732"&gt;http://www.zdnet.com/blog/igeneration/blackberry-encryption-too-secure-national-security-vs-consumer-privacy/5732&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://mobile.blorge.com/2010/12/30/rim-vows-to-protect-corporate-clients-in-india-consumer-privacy-open-to-negotiation/"&gt;http://mobile.blorge.com/2010/12/30/rim-vows-to-protect-corporate-clients-in-india-consumer-privacy-open-to-negotiation/&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://www.zdnet.com/blog/india/rim-vs-indian-government-continues/135"&gt;http://www.zdnet.com/blog/india/rim-vs-indian-government-continues/135&amp;nbsp;&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;p class="discreet"&gt;&lt;a name="1"&gt;[1]http://www.ft.com/cms/s/0/198599e6-dc5f-11df-a0b9-00144feabdc0.html#axzz1O00LowtN&amp;nbsp;&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="2"&gt;[2]http://cyber.law.harvard.edu/olds/ecommerce/privacytext.htmlFor an overview of some of these new data-collection technologies, along with some information on privacy-enhancing technologies such as P3P, see Developing Technologies.&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/privacy/consumer-privacy-e-commerce'&gt;https://cis-india.org/internet-governance/blog/privacy/consumer-privacy-e-commerce&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sahana</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-03-28T04:53:17Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/consumer-privacy.pdf">
    <title>Consumer Privacy</title>
    <link>https://cis-india.org/internet-governance/consumer-privacy.pdf</link>
    <description>
        &lt;b&gt;This chapter will examine the present legal state of consumer privacy in India and seek to understand the gap between policy and implementation of policy. In doing so, it will look at what are the existing avenues for protection of consumer privacy in India, how is the definition of consumer privacy evolving through case law and public opinion, and what are the current challenges to consumer privacy in India. Traditionally speaking, and according to the Consumer Protection Act, 1986, in India, a consumer is a broad label for any person who buys goods or services with the intent of using them for non-commercial purposes. In the typical sense, when people think of themselves as being consumers, they think about transactions with a vendor through a physical exchange of money in a store or through an online exchange for a product or service. Certain services that consumers use put an extraordinary amount of sensitive personal information into the hands of vendors.&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/consumer-privacy.pdf'&gt;https://cis-india.org/internet-governance/consumer-privacy.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Consumer Rights</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-09-13T09:21:26Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/consumer-care-society-silver-jubilee-year-celebrations">
    <title>Consumer Care Society: Silver Jubilee Year Celebrations</title>
    <link>https://cis-india.org/internet-governance/blog/consumer-care-society-silver-jubilee-year-celebrations</link>
    <description>
        &lt;b&gt;Arindrajit Basu delivered a talk the Silver Jubilee Celebrations of the Consumer Care Society (CCS )on 'Privacy and Security in the Age of the Internet.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;CONSUMER CARE SOCIETY (CCS) is an active volunteer based not-for-profit organization involved in Consumer activities. Established as a registered society in the year 1994, CCS has for the past 3 decades functioned as the voice of consumer in many forums. Today CCS is widely recognized as an premier consumer voluntary organization (CVO) in Bangalore and Karnataka. CCS is registered with many goverenmental agencies and regulators like TRAI,BIS, Petroleum and Natural Gas Regulatory Board, DOT, ICMR at the Central Government levels and with almost all service providers at the State Level like BWSSB, BESCOM, BDA, BBMP.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Shreenivas.S. Galgali, ITS, Adviser,  TRAI Regional Office, Bangalore and Aradhana Biradar, User Education and Research Specialist, Google were the other speakers at the event held at CCS.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/consumer-care-society-silver-jubilee-year-celebrations'&gt;https://cis-india.org/internet-governance/blog/consumer-care-society-silver-jubilee-year-celebrations&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Arindrajit Basu</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-08-27T13:51:13Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/consultation-to-frame-rules-under-whistle-blowers-protection-act-2011">
    <title>Consultation to Frame Rules under the Whistle Blowers Protection Act, 2011</title>
    <link>https://cis-india.org/news/consultation-to-frame-rules-under-whistle-blowers-protection-act-2011</link>
    <description>
        &lt;b&gt;The National Campaign for People's Right to Information (NCPRI) and Centre for Communication Governance at National Law University, Delhi (CCG at NLUD) invite you to a consultation to draft rules under the Whistle Blowers Protection Act, 2011. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The consultation will bring together various stakeholders to discuss the initial stages of framing the draft rules for the legislation. It will take place from 10:00 a.m. to 5:00 p.m. on July 5, 2014 at National Law University, Delhi. Bhairav Acharya will be participating in this event.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Click to download:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/consultation-to-frame-rules-under-whistle-blowers-protection-act-2014.pdf" class="internal-link"&gt;Consultation to Frame Rules under the Whistle Blowers Protection Act, 2014&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/whistle-blowers-protection-act-2014.pdf" class="internal-link"&gt;The Whistle Blowers Protection Act, 2014&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/consultation-to-frame-rules-under-whistle-blowers-protection-act-2011'&gt;https://cis-india.org/news/consultation-to-frame-rules-under-whistle-blowers-protection-act-2011&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-07-02T08:03:55Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/consultation-on-gendered-information-disorder-in-india">
    <title>Consultation on Gendered Information Disorder in India</title>
    <link>https://cis-india.org/internet-governance/blog/consultation-on-gendered-information-disorder-in-india</link>
    <description>
        &lt;b&gt;On 14th and 15th March 2024, Centre for Internet and Society (CIS) collaborated with Point of View (POV) to organise a consultation in Mumbai to explore the phenomenon of gendered information disorder in India, spanning various aspects from healthcare and sexuality to financial literacy, and the role of digital mediums, social media platforms and AI in exacerbating these issues.&lt;/b&gt;
        
&lt;p style="text-align: justify;"&gt;The event was convened by Amrita Sengupta (Research and Programme Lead, CIS), Yesha Tshering Paul (Researcher, CIS), Bishakha Datta (Programme Lead, POV)&amp;nbsp; and Prarthana Mitra (Project Anchor, POV)..* Download the event report &lt;a href="https://cis-india.org/internet-governance/event-report-consultation-on-gendered-information-disorder-in-india-pdf" class="internal-link" title="Event Report: Consultation on Gendered Information Disorder in India pdf"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The event brought together experts, researchers and grassroots activists from Maharashtra and across the country to discuss their experiences with information disorder, and the multifaceted challenges posed by misinformation, disinformation and malinformation targeting gender and sexual identities.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Understanding Information Disorders: &lt;/strong&gt;The consultation commenced with a look at the wide spectrum of information disorder by Yesha Tshering Paul and Amrita Sengupta. Misinformation&lt;a href="#_ftn1"&gt;&lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; was highlighted as false information disseminated unintentionally, such as inaccurate COVID cures that spread rapidly during the pandemic. In contrast, disinformation involves the intentional spread of false information to cause harm, exemplified by instances like deepfake pornography. A less recognized form, malinformation, involves the deliberate misuse of accurate information to cause harm, as seen in the misleading representation of regret rates among trans individuals who have undertaken gender affirming procedures. Yesha highlighted that the definitions of these concepts are often varied, and thus the importance of moving beyond definitions to centre user experiences of this phenomenon.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The central theme of this discussion was the concept of “gendered” information disorder, referring to the targeted dissemination of false or harmful online content based on gender and sexual identity. This form of digital misogyny intersects with other societal marginalizations, disproportionately affecting marginalised genders and sexualities. The session also emphasised the critical link between information disorders and gendered violence (both online and in real life). Such disorders perpetuate stereotypes, gender-based violence, and silences victims, fostering an environment that empowers perpetrators and undermines victims' experiences. &lt;em&gt; &lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Feminist Digital Infrastructure: &lt;/strong&gt;Digital infrastructures shape our online spaces. Sneha PP (Senior Researcher, CIS) introduced the concept of &lt;a href="https://cis-india.org/Feminist_Infrastructures_Report"&gt;feminist infrastructures&lt;/a&gt; as a potential solution that helps mediate discourse around gender, sexuality, and feminism in the digital realm. Participant discussions emphasised the need for accessible, inclusive, and design-conscious digital infrastructures that consider the intersectionality and systemic inequalities impacting content creation and dissemination. Strategies were discussed to address online gender-based violence and misinformation, focusing on survivor-centric approaches and leveraging technology for storytelling.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Gendered Financial Mis-/Dis-information: &lt;/strong&gt;Garima Agrawal (Researcher, CIS) with inputs by Debarati Das (Co-Lead, Capacity Building at PoV) and Chhaya Rajput (Helpline Facilitator, &lt;a href="https://techsakhi.in/"&gt;Tech Sakhi&lt;/a&gt;) led the session by&lt;strong&gt; &lt;/strong&gt;highlighting&lt;strong&gt; &lt;/strong&gt;gender disparities in digital and financial literacy and access to digital devices and financial services in India, despite women constituting a higher percentage of new internet users. This makes marginalised users more vulnerable to financial scams. Drawing from the ongoing &lt;a href="https://cis-india.org/raw/user-experiences-of-digital-financial-risks-and-harms"&gt;financial harms project &lt;/a&gt;at CIS, Garima spoke about the diverse manifestations of financial information disorders arising from misleading information that results in financial harm, ranging from financial influencers (and in some cases deepfakes of celebrities) endorsing platforms they do not use, to fake or unregulated loan and investment services deceiving users. Breakout groups of participants then analysed several case studies of real-life financial frauds that targeted women and the queer community to identify instances of misinformation, disinformation and malinformation. Emotional manipulation and the exploitation of trust were identified as key tactics used to deceive victims, with repercussions extending beyond monetary loss to emotional, verbal, and even sexual violence against these individuals.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Fact-Checking Fake News and Stories: &lt;/strong&gt;The pervasive issue of fake news in India was discussed in depth, especially in the era of widespread social media usage. Only 41% of Indians trust the veracity of the information encountered online. Aishwarya Varma, who works at &lt;a href="https://www.thequint.com/news/webqoof"&gt;Webqoof&lt;/a&gt; (The Quint’s fact checking initiative) as a Fact Check Correspondent, led an informative session detailing the&lt;strong&gt; &lt;/strong&gt;various accessible tools that can be used to fact-check and debunk false information. Participants engaged in hands-on activities by using their smartphones for reverse image searches, emphasising the importance of verifying images and their sources. Archiving was identified as another crucial aspect to preserve accurate information and debunk misinformation.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Gendered Health Mis-/Dis-information: &lt;/strong&gt;This participant-led discussion highlighted structural gender biases in healthcare and limited knowledge about mental health and menstrual health as significant concerns, along with the discrimination and social stigma faced by the LGBTQ+ community in healthcare facilities. One participant brought up their difficulty accessing sensitive and non-judgmental healthcare, and the insensitivity and mockery faced by them and other trans individuals in healthcare facilities. Participants suggested the increased need for government-funded campaigns on sexual and reproductive health rights and menstrual health, and&amp;nbsp; the importance of involving marginalised communities in healthcare related decision-making to bring about meaningful change.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Mis-/Dis-information around Sex, Sexuality, and Sexual Orientation:&lt;/strong&gt; Paromita Vohra, Founder and Creative Director of &lt;a href="https://agentsofishq.com/"&gt;Agents of Ishq&lt;/a&gt;—a &amp;nbsp;multi-media project about sex, love and desire that uses various artistic mediums to create informational material and an inclusive, positive space for different expressions of sex and sexuality—led this session. She started with an examination of the term “disorder” and its historical implications, and highlighted how religion, law, medicine, and psychiatry had previously led to the classification of homosexuality as a “disorder”. The session delved into the misconceptions surrounding sex and sexuality in India, advocating for a broader understanding that goes beyond colonial knowledge systems and standardised sex education. She brought up the role of media in altering perspectives on factual events, and the need for more initiatives like Agents of Ishq to address the need for culturally sensitive and inclusive sexuality language and education that considers diverse experiences, emotions, and identities.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Artificial Intelligence and Mis-/Dis-information: &lt;/strong&gt;Padmini Ray Murray, Founder of &lt;a href="https://designbeku.in/5af7a99eb82f45889b682cfe9e52b3ae"&gt;Design Beku&lt;/a&gt;—a  collective that emerged from a desire to explore how technology and  design can be decolonial, local, and ethical— talked about the role of  AI in amplifying information disorder and its ethical considerations,  stemming from its biases in language representation and content  generation. Hindi and regional Indian languages remain significantly  under-represented in comparison to English content, leading to skewed  AI-generated content. Search results reflect the gendered biases in AI  and further perpetuate existing stereotypes and reinforce societal  biases. She highlighted the real-world impacts of AI on critical  decision-making processes such as loan approvals, and the influence of  AI on public opinion via media and social platforms. Participants  expressed concerns about the ethical considerations of AI, and  emphasised the need for responsible AI development, clear policies, and  collaborative efforts between tech experts, policymakers, and the public.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;* The Centre for Internet and Society undertakes interdisciplinary research on internet and digital technologies from policy and academic perspectives. Point of View focuses on sexuality, disability and technology to empower women and other marginalised genders to shape and inhabit digital spaces.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a href="#_ftnref1"&gt;&lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Claire Wardle, &lt;em&gt;Understanding Information Disorder (2020). &lt;/em&gt;&lt;a href="https://firstdraftnews.org/long-form-article/understanding-information-disorder/"&gt;https://firstdraftnews.org/long-form-article/understanding-information-disorder/&lt;/a&gt;.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/consultation-on-gendered-information-disorder-in-india'&gt;https://cis-india.org/internet-governance/blog/consultation-on-gendered-information-disorder-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Amrita Sengupta and Yesha Tshering Paul</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Gender, Welfare, and Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2024-10-15T10:57:06Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/consultation-on-draft-e-commerce-policy">
    <title>Consultation on Draft E-commerce Policy</title>
    <link>https://cis-india.org/internet-governance/news/consultation-on-draft-e-commerce-policy</link>
    <description>
        &lt;b&gt;Alternative Law Forum and IT for Change organized a public consultation on draft e-commerce policy on March 14, 2019 at Tony Hall, Ashirwad , Off St.Marks Road in Bangalore. Arindrajit Basu attended the event.&lt;/b&gt;
        &lt;p class="moz-quote-pre" style="text-align: justify; "&gt;The newly created Department Promotion of Industry and Indian Trade has published a draft e-commerce policy ( [ &lt;a class="moz-txt-link-freetext" href="https://dipp.gov.in/whats-new/draft-national-e-commerce-policy-stakeholder-comments"&gt;https://dipp.gov.in/whats-new/draft-national-e-commerce-policy-stakeholder-comments&lt;/a&gt; | &lt;a class="moz-txt-link-freetext" href="https://dipp.gov.in/whats-new/draft-national-e-commerce-policy-stakeholder-comments"&gt;https://dipp.gov.in/whats-new/draft-national-e-commerce-policy-stakeholder-comments&lt;/a&gt; ] ) inviting public comments with a deadline of March end. All actors involved in commerce – from traders, to street vendors, to vendors selling on online platforms, apart from domestic and foreign e-commerce companies are greatly impacted by this new policy. At one level, this policy would determine the relative power among these actors vying for the Indian retail space. At another level, however, the draft policy is about who should own personal, social and commercial data that is behind e-commerce – whether people and communities about whom the data is or it can entirely be owned and appropriated by the e-commerce companies, mostly foreign ones, who collect the data. EU is also examining whether data about and around products put by sellers on online platforms is owned by the these sellers or by platforms.   These are issues which need wide and deep discussions by all sections of society from traders , technology enthusiasts, lawyers, civil society and all others. However there is very little public discussions on the same. It is towards this end that we are organising this discussions. We would also like to explore possible inputs that different groups can make to the policy. The Joint Action Committee Against Foreign Retail and E-commerce is one group that has prepared some points on behalf of traders community, which are enclosed, and these too can be discussed at the meeting among others.&lt;/p&gt;
&lt;p class="moz-quote-pre" style="text-align: justify; "&gt;The discussion was a first of many more discussions. The participants of this consultation were researchers, lawyers, street vendors union representatives, traders associations representatives and others.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/consultation-on-draft-e-commerce-policy'&gt;https://cis-india.org/internet-governance/news/consultation-on-draft-e-commerce-policy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>ICT</dc:subject>
    

   <dc:date>2019-03-20T15:47:02Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
