<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1351 to 1365.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/unbundling-issues-of-privacy-data-security-identity-matrics-for-financial-inclusion"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/cyber-security-summit-2015"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/kick-off-meeting-for-the-politics-of-data-project"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cis-position-on-net-neutrality"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/security-research"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/sectoral-privacy-research"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/privacy-policy-research"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/dna-research"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/uid-research"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/net-neutrality-across-south-asia"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/take-away-from-the-i-j-project-workshop-at-the-un-internet-governance-forum-2015"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-soft-copy-vivek-ananth-november-23-2015-shopping-on-apps-raise-privacy-and-security-concerns"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-wire-bhairav-acharya-humpty-dumpty-censorship-of-tv-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-short-lived-adventure-of-india2019s-encryption-policy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/predictive-policing-what-is-it-how-it-works-and-it-legal-implications"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/news/unbundling-issues-of-privacy-data-security-identity-matrics-for-financial-inclusion">
    <title>Unbundling Issues of Privacy, Data Security, Identity Matrics, for Financial Inclusion</title>
    <link>https://cis-india.org/internet-governance/news/unbundling-issues-of-privacy-data-security-identity-matrics-for-financial-inclusion</link>
    <description>
        &lt;b&gt;This event was organized by Indicus Foundation and MicroSave on December 10, 2015 at the Metropolitan Hotel and Spa, New Delhi. Sunil Abraham was a speaker.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;While the initiative towards financial inclusion has gathered new impetus with the PMJDY and the accelerated roll out of benefits, there is also a parallel narrative of concerns over the legality and fundamental constitutionality of identity verification, which is a centre piece for delivery of financial benefits and services. These divergent narratives have now reached the Supreme Court.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At one end of the spectrum are the voices that avow the power of biometric technology to irrepudiately establish biological identity; at the other, the alarmism over targeting, concentration and misuse of personal information contained in the world’s biggest personal database. There is also a third extreme position of whether Indian citizens are entitled to the right to privacy constitutionally, and whether the right to privacy includes the right to refuse a national identity number or metric altogether. That India has yet to enact a Privacy Bill and the National Identity Authority Bill on which rests the statutory basis for UIDAI and Aadhaar only adds to the quagmire.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Several issues lie intertwined in this miasma: Privacy as an absolute right; Definition and Limits of Personal Information and Sensitive Personal Information; Consent protocols over use of personal information; Data Security; Appropriate and inclusive technology platforms; and Responsibilities and Liabilities governing the use of personal information for bonafide purposes. These straddle multiple domains: data accuracy and irrepudiability; storage, security and encryption; and sharing of information for transaction processing including across national boundaries. Unfortunately, all of these tend to get lumped together in the public debate.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The aim of this workshop is to unbundle the issues and understand each of them from the perspective of financial inclusion, to be able to answer these questions:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;How essential and critical is a unified Identity metric for digital financial transactions? How essential is that such a metric be biometric?&lt;/li&gt;
&lt;li&gt;To what extent does the centralised storage of biometric data represent risks of personal safety and national security, compared to the information on election voter lists, passport offices, census data, and bank accounts?&lt;/li&gt;
&lt;li&gt;What are the possible sources of transactional risk and security breaches in data sharing, and what are the international best practices?&lt;/li&gt;
&lt;li&gt;Is the present Aadhaar architecture robust enough to: address all the genuine and reasonable concerns over leakage and misuse of sensitive personal information; and to ensure that no genuine identity holder is turned away from a service, entitlement or benefit to which (s)he has a right or claim?&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;In this direction, we have the privilege to interact in this workshop with experts from The Centre for Internet and Society, and Data Security Council of India who have been at the forefront of the discussions on privacy and data security aspects of technology based innovations including for financial inclusion.&lt;/p&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/blog/icfi-workshop" class="internal-link"&gt;Download the Workshop Schedule here&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/unbundling-issues-of-privacy-data-security-identity-matrics-for-financial-inclusion'&gt;https://cis-india.org/internet-governance/news/unbundling-issues-of-privacy-data-security-identity-matrics-for-financial-inclusion&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-01-03T10:45:19Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/cyber-security-summit-2015">
    <title>Cyber Security Summit 2015</title>
    <link>https://cis-india.org/internet-governance/news/cyber-security-summit-2015</link>
    <description>
        &lt;b&gt;The Government of Karnataka in association with Biz Wingz Production House organized this Summit on November 27, 2015 at JW Marriott, Bangalore from 10.30 a.m. to 5.30 p.m. Sunil Abraham was a panelist. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Cloud-based applications are often the darling of the CFO and the  nemesis of the CISO &amp;amp; CIOs. How can an organization migrate to the  cloud, thus relinquishing control, but still maintain &lt;span class="highlightedSearchTerm"&gt;security&lt;/span&gt;? Are we sacrificing &lt;span class="highlightedSearchTerm"&gt;security&lt;/span&gt; and robustness in exchange for other priorities? How do ‘Snowden’  disclosures change the legal and risk nature of cloud decision making  and governance? What can proactive cloud providers do to capture the  opportunity in the disruption? The panel explored these topics and more  to provide the cutting edge thinking and perspectives you need to shape  your own cloud strategies in ways that balance multiple priorities.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Panelists&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Parag Deodhar, Chief Risk Officer, Bharti AXA General Insurance &amp;amp; Chief Operational Risk Officer India&lt;/li&gt;
&lt;li&gt;Sunil Abraham, Executive Director, Centre for Internet and Society&lt;/li&gt;
&lt;li&gt;Atul kumar, GM IT, Syndicate Bank&lt;/li&gt;
&lt;li&gt;Lopa Mudra Basu, AVP &amp;amp; Head of Enterprise &lt;span class="highlightedSearchTerm"&gt;Security&lt;/span&gt; &amp;amp; Risk Governance, SLK Global&lt;/li&gt;
&lt;li&gt;Sagar Karan, Chief Information &lt;span class="highlightedSearchTerm"&gt;Security&lt;/span&gt; Officer, Fullerton India Credit Co. Ltd.&lt;/li&gt;
&lt;li&gt;R Vijay, CISO –Technology, Mahindra &amp;amp; Mahindra Financial Services Limited&lt;/li&gt;
&lt;li&gt;Sanjivan S Shirke, Senior Vice President-Information Technology, Head -Information &lt;span class="highlightedSearchTerm"&gt;Security&lt;/span&gt;, UTI Asset Management Company Limited.&lt;/li&gt;
&lt;li&gt;Sanjay Sahay, IPS, ADGP, Grievances &amp;amp; Human Rights, Police Dept, Govt of Karnataka (moderator).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a class="external-link" href="https://www.eventshigh.com/detail/Bangalore/f8cf8b1a68202dca7543ec973f7ae2c0-cyber-security-summit-2015"&gt;More information about this event&lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/cyber-security-summit-2015'&gt;https://cis-india.org/internet-governance/news/cyber-security-summit-2015&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-12-16T02:10:24Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/kick-off-meeting-for-the-politics-of-data-project">
    <title>Kick Off Meeting for the Politics of Data Project</title>
    <link>https://cis-india.org/internet-governance/news/kick-off-meeting-for-the-politics-of-data-project</link>
    <description>
        &lt;b&gt;Tactical Technology Collective (TTC) on December 7 and 8, 2015 organized this event in Phnom Penh. Amber Sinha participated in it.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The areas TTC is planning to focus on in the Politics of Data project include:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Politics of Data: exploring questions about what it means to live in a data society and how it impacts our autonomy and privacy. Me and My Shadow is one of the projects under Politics of Data that looks at the digital traces that we leave behind and how these pieces of information are created, stored and collected. It provides people with resources to learn about how these digital traces can create stories or profiles about you, and how to minimise your digital traces online.&lt;/li&gt;
&lt;li&gt;Digital Security and Privacy: through this programme, they intend to work with rights advocates, journalists, activists and others to build their digital security skills.&lt;/li&gt;
&lt;li&gt;Exposing and Shaping Issues: this part of the programme will explore new forms of finding, creating and representing evidence by advocacy and activist groups and individuals.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The meetings saw participation from a host of organisations in Asia including Bytes for All, Cambodian Center for Human Rights, OpenNet, Community Legal Education Center, Engage Media, iPlural and Mido.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/kick-off-meeting-for-the-politics-of-data-project'&gt;https://cis-india.org/internet-governance/news/kick-off-meeting-for-the-politics-of-data-project&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-01-12T16:42:29Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cis-position-on-net-neutrality">
    <title>CIS's Position on Net Neutrality</title>
    <link>https://cis-india.org/internet-governance/blog/cis-position-on-net-neutrality</link>
    <description>
        &lt;b&gt;As researchers committed to the principle of pluralism we rarely produce institutional positions. This is also because we tend to update our positions based on research outputs. But the lack of clarity around our position on network neutrality has led some stakeholders to believe that we are advocating for forbearance. Nothing can be farther from the truth. Please see below for the current articulation of our common institutional position.&lt;/b&gt;
        &lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ol style="text-align: justify;"&gt;
&lt;li&gt;Net Neutrality violations can potentially have multiple categories of harms —&lt;strong&gt; competition harms, free speech harms, privacy harms, innovation and ‘generativity’ harms, harms to consumer choice and user freedoms, and diversity harms&lt;/strong&gt; thanks to unjust discrimination and gatekeeping by Internet service providers.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;Net Neutrality violations (including some those forms of zero-rating that violate net neutrality) can also have different kinds benefits — enabling the &lt;strong&gt;right to freedom of expression&lt;/strong&gt;, and the &lt;strong&gt;freedom of association&lt;/strong&gt;, especially when access to communication and publishing technologies is increased; &lt;strong&gt;increased competition&lt;/strong&gt; [by enabling product differentiation, can potentially allow small ISPs compete against market incumbents]; &lt;strong&gt;increased access&lt;/strong&gt; [usually to a subset of the Internet] by those without any access because they cannot afford it, increased access [usually to a subset of the Internet] by those who don't see any value in the Internet, &lt;strong&gt;reduced payments&lt;/strong&gt; by those who already have access to the Internet especially if their usage is dominated by certain services and destinations.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;Given the magnitude and variety of potential harms, &lt;strong&gt;complete forbearance from all regulation is not an option&lt;/strong&gt; for regulators nor is self-regulation sufficient to address all the harms emerging from Net Neutrality violations, since incumbent telecom companies cannot be trusted to effectively self-regulate. Therefore, &lt;strong&gt;CIS calls for the immediate formulation of Net Neutrality regulation&lt;/strong&gt; by the telecom regulator [TRAI] and the notification thereof by the government [Department of Telecom of the Ministry of Information and Communication Technology]. CIS also calls for the eventual enactment of statutory law on Net Neutrality.&amp;nbsp; All such policy must be developed in a transparent fashion after proper consultation with all relevant stakeholders, and after giving citizens an opportunity to comment on draft regulations.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;Even though some of these harms may be large, CIS believes that a government cannot apply the precautionary principle in the case of Net Neutrality violations. &lt;strong&gt;Banning technical innovations and business model innovations is not an appropriate policy option. &lt;/strong&gt;The regulation must toe a careful line &lt;strong&gt;to solve the optimization problem: &lt;/strong&gt;refraining from over-regulation of ISPs and harming innovation at the carrier level (and benefits of net neutrality violations mentioned above) while preventing ISPs from harming innovation and user choice.&amp;nbsp; ISPs must be regulated to limit harms from unjust discrimination towards consumers as well as to limit harms from unjust discrimination towards the services they carry on their networks.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;Based on regulatory theory, we believe that a regulatory framework that is technologically neutral, that factors in differences in technological context, as well as market realities and existing regulation, and which is able to respond to new evidence is what is ideal.&lt;br /&gt;&lt;br /&gt;This means that we need a framework that has some bright-line rules based, but which allows for flexibility in determining the scope of exceptions and in the application of the rules.&amp;nbsp; Candidate principles to be embodied in the regulation include: &lt;strong&gt;transparency, non-exclusivity, limiting unjust discrimination&lt;/strong&gt;.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;The &lt;strong&gt;harms emerging from walled gardens can be mitigated in a number of ways&lt;/strong&gt;.&amp;nbsp; &lt;strong&gt;On zero-rating the form of regulation must depend on the specific model and the potential harms that result from that model. &lt;/strong&gt;Zero-rating can be: paid for by the end consumer or subsidized by ISPs or subsidized by content providers or subsidized by government or a combination of these; deal-based or criteria-based or government-imposed; ISP-imposed or offered by the ISP and chosen by consumers; Transparent and understood by consumers vs. non-transparent; based on content-type or agnostic to content-type; service-specific or service-class/protocol-specific or service-agnostic; available on one ISP or on all ISPs.&amp;nbsp; Zero-rating by a small ISP with 2% penetration will not have the same harms as zero-rating by the largest incumbent ISP.&amp;nbsp; For service-agnostic / content-type agnostic zero-rating, which Mozilla terms ‘&lt;strong&gt;equal rating&lt;/strong&gt;’, CIS advocates for&lt;strong&gt; no regulation.&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;CIS believes that &lt;strong&gt;Net Neutrality regulation for mobile and fixed-line access must be different&lt;/strong&gt; recognizing the fundamental differences in technologies.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;On specialized services CIS believes that there should be logical separation&lt;/strong&gt; and that all details of such specialized services and their impact on the Internet must be made transparent to consumers both individual and institutional, the general public and to the regulator.&amp;nbsp; Further, such services should be available to the user only upon request, and not without their active choice, with the requirement that the service cannot be reasonably provided with ‘best efforts’ delivery guarantee that is available over the Internet, and hence requires discriminatory treatment, or that the discriminatory treatment does not unduly harm the provision of the rest of the Internet to other customers.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;On incentives for telecom operators, CIS believes that the government should consider different models such as waiving contribution to the Universal Service Obligation Fund for prepaid consumers, and freeing up additional spectrum for telecom use without royalty using a shared spectrum paradigm, as well as freeing up more spectrum for use without a licence.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;On reasonable network management CIS still does not have a common institutional position.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;/ol&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cis-position-on-net-neutrality'&gt;https://cis-india.org/internet-governance/blog/cis-position-on-net-neutrality&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Net Neutrality</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-12-09T13:06:06Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/security-research">
    <title>Security Research</title>
    <link>https://cis-india.org/internet-governance/blog/security-research</link>
    <description>
        &lt;b&gt;The Centre Internet and Society, India has been researching privacy policy in India since the year 2010 with the following objectives.&lt;/b&gt;
        &lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Research on the issue of privacy in different sectors in India.&lt;/li&gt;
&lt;li&gt;Monitoring projects, practices, and policies around those sectors.&lt;/li&gt;
&lt;li&gt;Raising public awareness around the issue of privacy, in light of varied projects, industries, sectors and instances.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;State surveillance in India has been carried out by Government agencies for many years. Recent projects include: NATGRID, CMS, NETRA, etc. which aim to overhaul the overall security and intelligence infrastructure in the country. The purpose of such initiatives has been to maintain national security and ensure interconnectivity and interoperability between departments and agencies. Concerns regarding the structure, regulatory frameworks (or lack thereof), and technologies used in these programmes and projects have attracted criticism.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Surveillance/Security Research -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1. Central Monitoring System -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Central Monitoring System or CMS is a clandestine mass electronic surveillance data mining program installed by the Center for Development of 	Telematics (C-DOT), a part of the Indian government. It gives law enforcement agencies centralized access to India's telecommunications network and the 	ability to listen in on and record mobile, landline, satellite, Voice over Internet Protocol (VoIP) calls along with private e-mails, SMS, MMS. It also 	gives them the ability to geo-locate individuals via cell phones in real time.&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; The Central Monitoring System: Some Questions to be Raised in Parliament &lt;span&gt;http://bit.ly/1fln2vu&lt;/span&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; India´s ´Big Brother´: The Central Monitoring System (CMS) &lt;a href="http://bit.ly/1kyyzKB"&gt;http://bit.ly/1kyyzKB&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; India's Central Monitoring System (CMS): Something to Worry About? &lt;a href="http://bit.ly/1gsM4oQ"&gt;http://bit.ly/1gsM4oQ&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; C-DoT's surveillance system making enemies on internet 	&lt;a href="http://cis-india.org/news/dna-march-21-2014-krishna-bahirwani-c-dots-surveillance-system-making-enemies-on-internet"&gt; http://cis-india.org/news/dna-march-21-2014-krishna-bahirwani-c-dots-surveillance-system-making-enemies-on-internet &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;2. Surveillance Industry : Global And Domestic -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The surveillance industry is a multi-billion dollar economic sector that tracks individuals along with their actions such as e-mails and texts. With the 	cause for its existence being terrorism and the government's attempts to fight it, a network has been created that leaves no one with their privacy. All 	that an individual does in the digital world is suspect to surveillance. This included surveillance in the form of snooping where an individual's phone 	calls, text messages and e-mails are monitored or a more active kind where cameras, sensors and other devices are used to actively track the movements and 	actions of an individual. This information allows governments to bypass the privacy that an individual has in a manner that is considered unethical and 	incorrect. This information that is collected also in vulnerable to cyber-attacks that are serious risks to privacy and the individuals themselves. The 	following set of articles look into the ethics, risks, vulnerabilities and trade-offs of having a mass surveillance industry in place.&lt;/p&gt;
&lt;ol style="text-align: justify; " type="1"&gt; &lt;/ol&gt; 
&lt;ul style="text-align: justify; " type="disc"&gt;
&lt;li&gt; Surveillance Technologies http://bit.ly/14pxg74 &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;New Standard Operating Procedures for Lawful Interception and Monitoring &lt;span&gt;http://bit.ly/1mRRIo4&lt;/span&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Video Surveillance and Its Impact on the Right to Privacy 	&lt;a href="http://cis-india.org/internet-governance/blog/privacy/video-surveillance-privacy"&gt; http://cis-india.org/internet-governance/blog/privacy/video-surveillance-privacy &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;More than a Hundred Global Groups Make a Principled Stand against Surveillance 	&lt;a href="http://cis-india.org/internet-governance/blog/more-than-hundred-global-groups-make-principled-stand-against-surveillance"&gt; http://cis-india.org/internet-governance/blog/more-than-hundred-global-groups-make-principled-stand-against-surveillance &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Models for Surveillance and Interception of Communications Worldwide 	&lt;a href="http://cis-india.org/internet-governance/blog/models-for-surveillance-and-interception-of-communications-worldwide"&gt; http://cis-india.org/internet-governance/blog/models-for-surveillance-and-interception-of-communications-worldwide &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Why 'Facebook' is More Dangerous than the Government Spying on You 	&lt;a href="http://cis-india.org/internet-governance/blog/why-facebook-is-more-dangerous-than-the-government-spying-on-you"&gt; http://cis-india.org/internet-governance/blog/why-facebook-is-more-dangerous-than-the-government-spying-on-you &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; The Difficult Balance of Transparent Surveillance 		&lt;a href="http://cis-india.org/internet-governance/blog/the-difficult-balance-of-transparent-surveillance"&gt; http://cis-india.org/internet-governance/blog/the-difficult-balance-of-transparent-surveillance &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; " type="1"&gt; &lt;/ol&gt; 
&lt;ul style="text-align: justify; " type="disc"&gt;
&lt;li&gt; UK's Interception of Communications Commissioner - A Model of Accountability 		&lt;a href="http://cis-india.org/internet-governance/blog/uk-interception-of-communications-commissioner-a-model-of-accountability"&gt; http://cis-india.org/internet-governance/blog/uk-interception-of-communications-commissioner-a-model-of-accountability &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Search and Seizure and the Right to Privacy in the Digital Age: A Comparison of US and India 		&lt;a href="http://cis-india.org/internet-governance/blog/search-and-seizure-and-right-to-privacy-in-digital-age"&gt; http://cis-india.org/internet-governance/blog/search-and-seizure-and-right-to-privacy-in-digital-age &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; State Surveillance and Human Rights Camp: Summary &lt;a href="http://bit.ly/ZZNm6M"&gt;http://bit.ly/ZZNm6M&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; India Subject to NSA Dragnet Surveillance! No Longer a Hypothesis - It is Now Officially Confirmed		&lt;a href="http://bit.ly/1eqtD8g"&gt;http://bit.ly/1eqtD8g&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Spy Files 3: WikiLeaks Sheds More Light on the Global Surveillance Industry &lt;a href="http://bit.ly/1d6EmjD"&gt;http://bit.ly/1d6EmjD&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Surveillance Camp IV: Disproportionate State Surveillance - A Violation of Privacy &lt;a href="http://bit.ly/1ilTJts"&gt;http://bit.ly/1ilTJts&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Hacking without borders: The future of artificial intelligence and surveillance &lt;a href="http://bit.ly/1kWiwGv"&gt;http://bit.ly/1kWiwGv&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Driving in the Surveillance Society: Cameras, RFID tags and Black Boxes &lt;a href="http://bit.ly/1mr3KTH"&gt;http://bit.ly/1mr3KTH&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Policy Brief: Oversight Mechanisms for Surveillance 		&lt;a href="http://cis-india.org/internet-governance/blog/policy-brief-oversight-mechanisms-for-surveillance"&gt; http://cis-india.org/internet-governance/blog/policy-brief-oversight-mechanisms-for-surveillance &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;3. Judgements By the Indian Courts -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The surveillance industry in India has been brought before the court in different cases. The following articles look into the cause of action in these 	cases along with their impact on India and its citizens.&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Anvar v. Basheer and the New (Old) Law of Electronic Evidence 	&lt;a href="http://cis-india.org/internet-governance/blog/anvar-v-basheer-new-old-law-of-electronic-evidence"&gt; http://cis-india.org/internet-governance/blog/anvar-v-basheer-new-old-law-of-electronic-evidence &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;The Gujarat High Court Judgement on the Snoopgate Issue 	&lt;a href="http://cis-india.org/internet-governance/blog/gujarat-high-court-judgment-on-snoopgate-issue"&gt; http://cis-india.org/internet-governance/blog/gujarat-high-court-judgment-on-snoopgate-issue &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;4. International Privacy Laws -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Due to the universality of the internet, many questions of accountability arise and jurisdiction becomes a problem. Therefore certain treaties, agreements 	and other international legal literature was created to answer these questions. The articles listed below look into the international legal framework which 	governs the internet.&lt;/p&gt;
&lt;ol style="text-align: justify; " type="1"&gt; &lt;/ol&gt; 
&lt;ul style="text-align: justify; " type="disc"&gt;
&lt;li&gt; Learning to Forget the ECJ's Decision on the Right to be Forgotten and its Implications 		&lt;a href="http://cis-india.org/internet-governance/blog/learning-to-forget-ecj-decision-on-the-right-to-be-forgotten-and-its-implications"&gt; http://cis-india.org/internet-governance/blog/learning-to-forget-ecj-decision-on-the-right-to-be-forgotten-and-its-implications &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Privacy and Security Can Co-exist		&lt;a href="http://cis-india.org/internet-governance/blog/privacy-and-security"&gt;http://cis-india.org/internet-governance/blog/privacy-and-security&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; European Union Draft Report Admonishes Mass Surveillance, Calls for Stricter Data Protection and Privacy Laws 		&lt;a href="http://cis-india.org/internet-governance/blog/european-union-draft-report-admonishes-mass-surveillance"&gt; http://cis-india.org/internet-governance/blog/european-union-draft-report-admonishes-mass-surveillance &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Draft International Principles on Communications Surveillance and Human Rights &lt;a href="http://bit.ly/XCsk9b"&gt;http://bit.ly/XCsk9b&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;5. Indian Surveillance Framework -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Indian government's mass surveillance systems are configured a little differently from the networks of many countries such as the USA and the UK. This 	is because of the vast difference in infrastructure both in existence and the required amount. In many ways, it is considered that the surveillance network 	in India is far worse than other countries. This is due to the present form of the legal system in existence. The articles below explore the system and its 	functioning including the various methods through which we are spied on. The ethics and vulnerabilities are also explored in these articles.&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Paper-thin Safeguards and Mass Surveillance in India - 	&lt;a href="http://cis-india.org/internet-governance/blog/paper-thin-safeguards-and-mass-surveillance-in-india"&gt; http://cis-india.org/internet-governance/blog/paper-thin-safeguards-and-mass-surveillance-in-india &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;The Surveillance Industry in India: At Least 76 Companies Aiding Our Watchers! - 	&lt;a href="http://cis-india.org/internet-governance/blog/the-surveillance-industry-in-india-at-least-76-companies-aiding-our-watchers"&gt; http://cis-india.org/internet-governance/blog/the-surveillance-industry-in-india-at-least-76-companies-aiding-our-watchers &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;The Surveillance Industry in India - An Analysis of Indian Security Expos 	&lt;a href="http://cis-india.org/internet-governance/blog/surveillance-industry-in-india-analysis-of-indian-security-expos"&gt; http://cis-india.org/internet-governance/blog/surveillance-industry-in-india-analysis-of-indian-security-expos &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;GSMA Research Outputs: different legal and regulatory aspects of security and surveillance in India	&lt;a href="http://cis-india.org/internet-governance/blog/gsma-research-outputs"&gt;http://cis-india.org/internet-governance/blog/gsma-research-outputs&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; Way to watch 		&lt;a href="http://cis-india.org/internet-governance/blog/indian-express-june-26-2013-chinmayi-arun-way-to-watch"&gt; http://cis-india.org/internet-governance/blog/indian-express-june-26-2013-chinmayi-arun-way-to-watch &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Free Speech and Surveillance 		&lt;a href="http://cis-india.org/internet-governance/blog/free-speech-and-surveillance"&gt; http://cis-india.org/internet-governance/blog/free-speech-and-surveillance &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Surveillance rises, privacy retreats 		&lt;a href="http://cis-india.org/internet-governance/news/business-standard-namrata-acharya-april-12-2015-surveillance-rises-privacy-retreats"&gt; http://cis-india.org/internet-governance/news/business-standard-namrata-acharya-april-12-2015-surveillance-rises-privacy-retreats &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Freedom from Monitoring: India Inc. should Push For Privacy Laws 	&lt;a href="http://cis-india.org/internet-governance/blog/forbesindia-article-august-21-2013-sunil-abraham-freedom-from-monitoring"&gt; http://cis-india.org/internet-governance/blog/forbesindia-article-august-21-2013-sunil-abraham-freedom-from-monitoring &lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Surat's Massive Surveillance Network Should Cause Concern, Not Celebration 	&lt;a href="http://cis-india.org/internet-governance/blog/surat-massive-surveillance-network-cause-of-concern-not-celebration"&gt; http://cis-india.org/internet-governance/blog/surat-massive-surveillance-network-cause-of-concern-not-celebration &lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Vodafone Report Explains Government Access to Customer Data 	&lt;a href="http://cis-india.org/internet-governance/blog/vodafone-report-explains-govt-access-to-customer-data"&gt; http://cis-india.org/internet-governance/blog/vodafone-report-explains-govt-access-to-customer-data &lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;A Review of the Functioning of the Cyber Appellate Tribunal and Adjudicator officers under the IT Act 	&lt;a href="http://cis-india.org/internet-governance/blog/review-of-functioning-of-cyber-appellate-tribunal-and-adjudicatory-officers-under-it-act"&gt; http://cis-india.org/internet-governance/blog/review-of-functioning-of-cyber-appellate-tribunal-and-adjudicatory-officers-under-it-act &lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;A Comparison of Indian Legislation to Draft International Principles on Surveillance of Communications	&lt;a href="http://bit.ly/U6T3xy"&gt;http://bit.ly/U6T3xy&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;SEBI and Communication Surveillance: New Rules, New Responsibilities? &lt;a href="http://bit.ly/1eqtD8g"&gt;http://bit.ly/1eqtD8g&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; Snooping Can Lead to Data Abuse		&lt;a href="http://cis-india.org/internet-governance/blog/snooping-to-data-abuse"&gt;http://cis-india.org/internet-governance/blog/snooping-to-data-abuse&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Big Brother is Watching You &lt;a href="http://bit.ly/1arbxwm"&gt;http://bit.ly/1arbxwm&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; Moving Towards a Surveillance State 		&lt;a href="http://cis-india.org/internet-governance/blog/moving-towards-surveillance-state"&gt; http://cis-india.org/internet-governance/blog/moving-towards-surveillance-state &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; How Surveillance Works in India 		&lt;a href="http://cis-india.org/internet-governance/blog/nytimes-july-10-2013-pranesh-prakash-how-surveillance-works-in-india"&gt; http://cis-india.org/internet-governance/blog/nytimes-july-10-2013-pranesh-prakash-how-surveillance-works-in-india &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; " type="1"&gt; &lt;/ol&gt; 
&lt;ul style="text-align: justify; " type="disc"&gt;
&lt;li&gt; Big Democracy, Big Surveillance: India's Surveillance State http://bit.ly/1nkg8Ho &lt;/li&gt;
&lt;li&gt; Can India Trust Its Government on Privacy? 		&lt;a href="http://cis-india.org/internet-governance/blog/new-york-times-july-11-2013-can-india-trust-its-government-on-piracy"&gt; http://cis-india.org/internet-governance/blog/new-york-times-july-11-2013-can-india-trust-its-government-on-piracy &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Indian surveillance laws &amp;amp; practices far worse than US 		&lt;a href="http://cis-india.org/internet-governance/blog/economic-times-june-13-2013-pranesh-prakash-indian-surveillance-laws-and-practices-far-worse-than-us"&gt; http://cis-india.org/internet-governance/blog/economic-times-june-13-2013-pranesh-prakash-indian-surveillance-laws-and-practices-far-worse-than-us &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Security, Surveillance and Data Sharing Schemes and Bodies in India 		&lt;a href="http://cis-india.org/internet-governance/blog/security-surveillance-and-data-sharing.pdf/view"&gt; http://cis-india.org/internet-governance/blog/security-surveillance-and-data-sharing.pdf/view &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Policy Paper on Surveillance in India 		&lt;a href="http://cis-india.org/internet-governance/blog/policy-paper-on-surveillance-in-indiahttp:/cis-india.org/internet-governance/blog/security-privacy-transparency-and-technology"&gt; http://cis-india.org/internet-governance/blog/policy-paper-on-surveillance-in-indiahttp://cis-india.org/internet-governance/blog/security-privacy-transparency-and-technology &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; The Constitutionality of Indian Surveillance Law: Public Emergency as a Condition Precedent for Intercepting Communications 		&lt;a href="http://cis-india.org/internet-governance/blog/the-constitutionality-of-indian-surveillance-law"&gt; http://cis-india.org/internet-governance/blog/the-constitutionality-of-indian-surveillance-law &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Surveillance and the Indian Constitution - Part 1: Foundations http://bit.ly/1ntqsen &lt;/li&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; " type="1"&gt; &lt;/ol&gt; 
&lt;ul style="text-align: justify; " type="disc"&gt;
&lt;li&gt; Surveillance and the Indian Constitution - Part 2: Gobind and the Compelling State Interest Test		&lt;a href="http://bit.ly/1dH3meL"&gt;http://bit.ly/1dH3meL&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; " type="1"&gt; &lt;/ol&gt; 
&lt;ul style="text-align: justify; " type="disc"&gt;
&lt;li&gt; Surveillance and the Indian Constitution - Part 3: The Public/Private Distinction and the Supreme Court's Wrong Turn		&lt;a href="http://bit.ly/1kBosnw"&gt;http://bit.ly/1kBosnw&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; " type="1"&gt; &lt;/ol&gt; 
&lt;ul style="text-align: justify; " type="disc"&gt;
&lt;li&gt; Mastering the Art of Keeping Indians Under Surveillance 		http://cis-india.org/internet-governance/blog/the-wire-may-30-2015-bhairav-acharya-mastering-the-art-of-keeping-indians-under-surveillance &lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/security-research'&gt;https://cis-india.org/internet-governance/blog/security-research&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vanya</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-01-03T09:55:27Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/sectoral-privacy-research">
    <title>Sectoral Privacy Research</title>
    <link>https://cis-india.org/internet-governance/blog/sectoral-privacy-research</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society, India has been researching privacy in India since the year 2010, with special focus on the following issues.&lt;/b&gt;
        &lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Research on the issue of privacy in different sectors in India.&lt;/li&gt;
&lt;li&gt;Monitoring projects, practices, and policies around those sectors.&lt;/li&gt;
&lt;li&gt;Raising public awareness around the issue of privacy, in light of varied projects, industries, sectors and instances.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The Right to Privacy has evolved in India since many decades, where the question of it being a Fundamental Right has been debated many times in courts of Law. With the advent of information technology and digitisation of the services, the issue of Privacy holds more relevance in sectors like Banking, Healthcare, Telecommunications, ITC, etc., The Right to Privacy is also addressed in light of the Sexual minorities, Whistle-blowers, Government services, etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sectors -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1. Consumer Privacy and other sectors -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Consumer privacy laws and regulations seek to protect any individual from loss of privacy due to failures or limitations of corporate customer privacy 	measures. The following articles deal with the current consumer privacy laws in place in India and around the world. Also, privacy concerns have been 	considered along with other sectors like Copyright law, data protection, etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Consumer Privacy - How to Enforce an Effective Protective Regime? &lt;a href="http://bit.ly/1a99P2z"&gt;http://bit.ly/1a99P2z&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Privacy and Information Technology Act: Do we have the Safeguards for Electronic Privacy? &lt;a href="http://bit.ly/10VJp1P"&gt;http://bit.ly/10VJp1P&lt;/a&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; " type="disc"&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; " type="1"&gt; &lt;/ol&gt; 
&lt;ul style="text-align: justify; " type="square"&gt;
&lt;li&gt; Limits to Privacy http://bit.ly/19mPG6I &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;§ Copyright Enforcement and Privacy in India &lt;a href="http://bit.ly/18fi9fM"&gt;http://bit.ly/18fi9fM&lt;/a&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; " type="disc"&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; " type="1"&gt; &lt;/ol&gt; 
&lt;ul style="text-align: justify; " type="square"&gt;
&lt;li&gt; Privacy in India: Country Report http://bit.ly/14pnNwl &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;§ Transparency and Privacy &lt;a href="http://bit.ly/1a9dMnC"&gt;http://bit.ly/1a9dMnC&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ The Report of the Group of Experts on Privacy (Contributed by CIS) &lt;a href="http://bit.ly/VqzKtr"&gt;http://bit.ly/VqzKtr&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ The (In) Visible Subject: Power, Privacy and Social Networking &lt;a href="http://bit.ly/15koqol"&gt;http://bit.ly/15koqol&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Privacy and the Indian Copyright Act, 1857 as Amended in 2010 &lt;a href="http://bit.ly/1euwX0r"&gt;http://bit.ly/1euwX0r&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Should Ratan Tata be afforded the Right to Privacy? &lt;a href="http://bit.ly/LRlXin"&gt;http://bit.ly/LRlXin&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Comments on Information Technology (Guidelines for Cyber Café) Rules, 2011 &lt;a href="http://bit.ly/15kojJn"&gt;http://bit.ly/15kojJn&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Broadcasting Standards Authority Censures TV9 over Privacy Violations! &lt;a href="http://bit.ly/16L4izl"&gt;http://bit.ly/16L4izl&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Is Data Protection Enough? &lt;a href="http://bit.ly/1bvaWx2"&gt;http://bit.ly/1bvaWx2&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Privacy, speech at stake in cyberspace	&lt;a href="http://cis-india.org/news/privacy-speech-at-stake-in-cyberspace-1"&gt;http://cis-india.org/news/privacy-speech-at-stake-in-cyberspace-1&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Q&amp;amp;A to the Report of the Group of Experts on Privacy &lt;a href="http://bit.ly/TPhzQQ"&gt;http://bit.ly/TPhzQQ&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Privacy worries cloud Facebook's WhatsApp Deal 	&lt;a href="http://cis-india.org/internet-governance/blog/economic-times-march-14-2014-sunil-abraham-privacy-worries-cloud-facebook-whatsapp-deal"&gt; http://cis-india.org/internet-governance/blog/economic-times-march-14-2014-sunil-abraham-privacy-worries-cloud-facebook-whatsapp-deal &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ GNI Assessment Finds ICT Companies Protect User Privacy and Freedom of Expression &lt;a href="http://bit.ly/1mjbpmL"&gt;http://bit.ly/1mjbpmL&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ A Stolen Perspective &lt;a href="http://bit.ly/1bWHyzv"&gt;http://bit.ly/1bWHyzv&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Is Data Protection enough? 	&lt;a href="http://cis-india.org/internet-governance/blog/privacy/is-data-protection-enough"&gt; http://cis-india.org/internet-governance/blog/privacy/is-data-protection-enough &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ I don't want my fingerprints taken &lt;a href="http://bit.ly/aYdMia"&gt;http://bit.ly/aYdMia&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Keeping it Private &lt;a href="http://bit.ly/15wjTVc"&gt;http://bit.ly/15wjTVc&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Personal Data, Public Profile &lt;a href="http://bit.ly/15vlFk4"&gt;http://bit.ly/15vlFk4&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Why your Facebook Stalker is Not the Real Problem &lt;a href="http://bit.ly/1bI2MSc"&gt;http://bit.ly/1bI2MSc&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ The Private Eye &lt;a href="http://bit.ly/173ypSI"&gt;http://bit.ly/173ypSI&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ How Facebook is Blatantly Abusing our Trust &lt;a href="http://bit.ly/OBXGXk"&gt;http://bit.ly/OBXGXk&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Open Secrets &lt;a href="http://bit.ly/1b5uvK0"&gt;http://bit.ly/1b5uvK0&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Big Brother is Watching You &lt;a href="http://bit.ly/1cGpg0K"&gt;http://bit.ly/1cGpg0K&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2. Banking/Finance -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Privacy in the banking and finance industry is crucial as the records and funds of one person must not be accessible by another without the due 	authorisation. The following articles deal with the current system in place that governs privacy in the financial and banking industry.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Privacy and Banking: Do Indian Banking Standards Provide Enough Privacy Protection? &lt;a href="http://bit.ly/18fhsTM"&gt;http://bit.ly/18fhsTM&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Finance and Privacy &lt;a href="http://bit.ly/15aUPh6"&gt;http://bit.ly/15aUPh6&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Making the Powerful Accountable &lt;a href="http://bit.ly/1nvzSpC"&gt;http://bit.ly/1nvzSpC&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3. Telecommunications -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The telecommunications industry is the backbone of current technology with respect to ICTs. The telecommunications industry has its own rules and 	regulations. These rules are the focal point of the following articles including criticism and acclaim.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Privacy and Telecommunications: Do We Have the Safeguards? &lt;a href="http://bit.ly/10VJp1P"&gt;http://bit.ly/10VJp1P&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Privacy and Media Law &lt;a href="http://bit.ly/18fgDfF"&gt;http://bit.ly/18fgDfF&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ IP Addresses and Expeditious Disclosure of Identity in India &lt;a href="http://bit.ly/16dBy4N"&gt;http://bit.ly/16dBy4N&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Telecommunications and Internet Privacy Read more: &lt;a href="http://bit.ly/16dEcaF"&gt;http://bit.ly/16dEcaF&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Encryption Standards and Practices &lt;a href="http://bit.ly/KT9BTy"&gt;http://bit.ly/KT9BTy&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Encryption Standards and Practices 	&lt;a href="http://cis-india.org/internet-governance/blog/privacy/privacy_encryption"&gt; http://cis-india.org/internet-governance/blog/privacy/privacy_encryption &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Security: Privacy, Transparency and Technology 	&lt;a href="http://cis-india.org/internet-governance/blog/security-privacy-transparency-and-technolog"&gt; http://cis-india.org/internet-governance/blog/security-privacy-transparency-and-technolog &lt;/a&gt; y&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;4. Sexual Minorities -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the internet is a global forum of self-expression and acceptance for most of us, it does not hold true for sexual minorities. The internet is a place 	of secrecy for those that do not conform to the typical identities set by society and therefore their privacy is more important to them than most. When 	they reveal themselves or are revealed by others, they typically face a lot of group hatred from the rest of the people and therefore value their privacy. 	The following article looks into their situation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;· Privacy and Sexual Minorities http://bit.ly/19mQUyZ&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;5. Health -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The privacy between a doctor and a patient is seen as incredibly important and so should the privacy of a person in any situation where they reveal more 	than they would to others in the sense of CT scans and other diagnoses. The following articles look into the present scenario of privacy in places like a 	hospital or diagnosis center.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Health and Privacy &lt;a href="http://bit.ly/16L1AJX"&gt;http://bit.ly/16L1AJX&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Privacy Concerns in Whole Body Imaging: A Few Questions &lt;a href="http://bit.ly/1jmvH1z"&gt;http://bit.ly/1jmvH1z&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;6. e-Governance -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The main focus of governments in ICTs is their gain for governance. There have many a multiplicity of laws and legislation passed by various countries 	including India in an effort to govern the universal space that is the internet. Surveillance is a major part of that governance and control. The articles 	listed below deal with the issues of ethics and drawbacks in the current legal scenario involving ICTs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ E-Governance and Privacy &lt;a href="http://bit.ly/18fiReX"&gt;http://bit.ly/18fiReX&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Privacy and Governmental Databases &lt;a href="http://bit.ly/18fmSy8"&gt;http://bit.ly/18fmSy8&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Killing Internet Softly with its Rules &lt;a href="http://bit.ly/1b5I7Z2"&gt;http://bit.ly/1b5I7Z2&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Cyber Crime &amp;amp; Privacy &lt;a href="http://bit.ly/17VTluv"&gt;http://bit.ly/17VTluv&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Understanding the Right to Information &lt;a href="http://bit.ly/1hojKr7"&gt;http://bit.ly/1hojKr7&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Privacy Perspectives on the 2012-2013 Goa Beach Shack Policy &lt;a href="http://bit.ly/ThAovQ"&gt;http://bit.ly/ThAovQ&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Identifying Aspects of Privacy in Islamic Law 	&lt;a href="http://cis-india.org/internet-governance/blog/identifying-aspects-of-privacy-in-islamic-law"&gt; http://cis-india.org/internet-governance/blog/identifying-aspects-of-privacy-in-islamic-law &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ What Does Facebook's Transparency Report Tell Us About the Indian Government's Record on Free Expression &amp;amp; Privacy? 	&lt;a href="http://cis-india.org/internet-governance/blog/what-does-facebook-transparency-report-tell-us-about-indian-government-record-on-free-expression-and-privacy"&gt; http://cis-india.org/internet-governance/blog/what-does-facebook-transparency-report-tell &lt;/a&gt; &lt;a href="http://cis-india.org/internet-governance/blog/what-does-facebook-transparency-report-tell-us-about-indian-government-record-on-free-expression-and-privacy"&gt; -us-about-indian-government-record-on-free-expression-and-privacy &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Search and Seizure and the Right to Privacy in the Digital Age: A Comparison of US and India 	&lt;a href="http://cis-india.org/internet-governance/blog/search-and-seizure-and-right-to-privacy-in-digital-age"&gt; http://cis-india.org/internet-governance/blog/search-and-seizure-and-right-to-privacy-in-digital-age &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Internet Privacy in India 	&lt;a href="http://cis-india.org/telecom/knowledge-repository-on-internet-access/internet-privacy-in-india"&gt; http://cis-india.org/telecom/knowledge-repository-on-internet-access/internet-privacy-in-i &lt;/a&gt; &lt;a href="http://cis-india.org/telecom/knowledge-repository-on-internet-access/internet-privacy-in-india"&gt;ndia&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Internet-driven Developments - Structural Changes and Tipping Points &lt;a href="http://bit.ly/10s8HVH"&gt;http://bit.ly/10s8HVH&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Data Retention in India &lt;a href="http://bit.ly/XR791u"&gt;http://bit.ly/XR791u&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ 2012: Privacy Highlights in India &lt;a href="http://bit.ly/1kWe3n7"&gt;http://bit.ly/1kWe3n7&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Big Dog is Watching You! The Sci-fi Future of Animal and Insect Drones &lt;a href="http://bit.ly/1kWee1W"&gt;http://bit.ly/1kWee1W&lt;/a&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; " type="disc"&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; " type="1"&gt; &lt;/ol&gt; 
&lt;ul style="text-align: justify; " type="square"&gt;
&lt;li&gt; Privacy Law in India: A Muddled Field - I 		&lt;a href="http://cis-india.org/internet-governance/blog/the-hoot-bhairav-acharya-april-15-2014-privacy-law-in-india-a-muddled-field-1"&gt; http://cis-india.org/internet-governance/blog/the-hoot-bhairav-acharya-april-15-2014-priv &lt;/a&gt; &lt;a href="http://cis-india.org/internet-governance/blog/the-hoot-bhairav-acharya-april-15-2014-privacy-law-in-india-a-muddled-field-1"&gt; acy-law-in-india-a-muddled-field-1 &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; The Four Parts of Privacy in India 		&lt;a href="http://cis-india.org/internet-governance/blog/economic-and-political-weekly-bhairav-acharya-may-30-2015-four-parts-of-privacy-in-india"&gt; http://cis-india.org/internet-governance/blog/economic-and-political-weekly-bhairav-acharya-may-30-2015-four-parts-of-privacy-in-india &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Right to Privacy in Peril 		&lt;a href="http://cis-india.org/internet-governance/blog/right-to-privacy-in-peril"&gt; http://cis-india.org/internet-governance/blog/right-to-privacy-in-peril &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Microsoft Releases its First Report on Data Requests by Law Enforcement Agencies around the World		&lt;a href="http://bit.ly/1kWjylM"&gt;http://bit.ly/1kWjylM&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; The Criminal Law Amendment Bill 2013 - Penalising 'Peeping Toms' and Other Privacy Issues &lt;a href="http://bit.ly/1dO46o5"&gt;http://bit.ly/1dO46o5&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Privacy vs. Transparency: An Attempt at Resolving the Dichotomy		&lt;a href="http://cis-india.org/openness/blog-old/privacy-v-transparency"&gt;http://cis-india.org/openness/blog-old/privacy-v-transparency&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Open Letter to "Not" Recognize India as Data Secure Nation till Enactment of Privacy Legislation		&lt;a href="http://bit.ly/1sJME9j"&gt;http://bit.ly/1sJME9j&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Open Letter to Prevent the Installation of RFID tags in Vehicles &lt;a href="http://bit.ly/1hxidzU"&gt;http://bit.ly/1hxidzU&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; The National Privacy Roundtable Meetings &lt;a href="http://bit.ly/158ayNW"&gt;http://bit.ly/158ayNW&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Transparency Reports - A Glance on What Google and Facebook Tell about Government Data Requests		&lt;a href="http://bit.ly/19NYTal"&gt;http://bit.ly/19NYTal&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; CIS and International Coalition Calls upon Governments to Protect Privacy &lt;a href="http://bit.ly/18oOTDk"&gt;http://bit.ly/18oOTDk&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; An Analysis of the Cases Filed under Section 46 of the Information Technology Act, 2000 for Adjudication in the State of Maharashtra		&lt;a href="http://bit.ly/16dKyoo"&gt;http://bit.ly/16dKyoo&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Open Letter to Members of the European Parliament of the Civil Liberties, Justice and Home Affairs Committee		&lt;a href="http://bit.ly/17eZntz"&gt;http://bit.ly/17eZntz&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; CIS Supports the UN Resolution on "The Right to Privacy in the Digital age" &lt;a href="http://bit.ly/1c2A89q"&gt;http://bit.ly/1c2A89q&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Brochures from Expos on Smart Cards, e-Security, RFID &amp;amp; Biometrics in India &lt;a href="http://bit.ly/1f714fN"&gt;http://bit.ly/1f714fN&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Electoral Databases - Privacy and Security Concerns &lt;a href="http://bit.ly/Mb4ktM"&gt;http://bit.ly/Mb4ktM&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Net Neutrality and Privacy &lt;a href="http://bit.ly/1khi1GQ"&gt;http://bit.ly/1khi1GQ&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Intermediary Liability Resources &lt;a href="http://bit.ly/1hRT8OD"&gt;http://bit.ly/1hRT8OD&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Feedback to the NIA Bill &lt;a href="http://bit.ly/1ePhUeg"&gt;http://bit.ly/1ePhUeg&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; India's Identity Crisis &lt;a href="http://bit.ly/1lTRuuz"&gt;http://bit.ly/1lTRuuz&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Facebook, Privacy, and India &lt;a href="http://bit.ly/a2HzhT"&gt;http://bit.ly/a2HzhT&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Private censorship and the Right to Hear 		&lt;a href="http://cis-india.org/internet-governance/blog/the-hoot-july-17-2014-chinmayi-arun-private-censorship-and-the-right-to-hear"&gt; http://cis-india.org/internet-governance/blog/the-hoot-july-17-2014-chinmayi-arun-private-censorship-and-the-right-to-hear &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Your Privacy is Public Property (Rules issued by a control-obsessed government have armed officials with widespread powers to pry into your private 		life. &lt;a href="http://cis-india.org/news/privacy-public-property"&gt;http://cis-india.org/news/privacy-public-property&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; The India Privacy Monitor Map &lt;a href="http://bit.ly/19A5mCZ"&gt;http://bit.ly/19A5mCZ&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Privacy and Security can Co-Exist &lt;a href="http://bit.ly/193fPXi"&gt;http://bit.ly/193fPXi&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; A Street View of the Private and The Public (&lt;a href="http://bit.ly/15VKmdf"&gt;http://bit.ly/15VKmdf&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Sense and Censorship &lt;a href="http://bit.ly/14KFwyo"&gt;http://bit.ly/14KFwyo&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Government access to private sector data &lt;a href="http://bit.ly/18rjd1X"&gt;http://bit.ly/18rjd1X&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; India: Privacy in Peril &lt;a href="http://bit.ly/1g5QbZj"&gt;http://bit.ly/1g5QbZj&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Big Democracy, Big Surveillance: India's Surveillance State &lt;a href="http://bit.ly/1nkg8Ho"&gt;http://bit.ly/1nkg8Ho&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Who Governs the Internet? Implications for Freedom and National Security &lt;a href="http://bit.ly/1hnnJ2a"&gt;http://bit.ly/1hnnJ2a&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;7. Whistle-blowers -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Whistle-blowers are always in a difficult situation when they must reveal the misdeeds of their corporations and governments due to the blowback that is 	possible if their identity is revealed to the public. As in the case of Edward Snowden and many others, a whistle-blowers identity is to be kept the most 	private to avoid the consequences of revealing the information that they did. This is the main focus of the article below.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ The Privacy Rights of Whistle-blowers &lt;a href="http://bit.ly/18GWmM3"&gt;http://bit.ly/18GWmM3&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;8. Cloud and Open Source -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Cloud computing and open source software have grown rapidly over the past few decades. Cloud computing is when an individual or company uses offsite 	hardware on a pay by usage basis provided and owned by someone else. The advantages are low costs and easy access along with decreased initial costs. Open 	source software on the other hand is software where despite the existence of proprietary elements and innovation, the software is available to the public 	at no charge. These software are based of open standards and have the obvious advantage of being compatible with many different set ups and are free. The 	following article highlights these computing solutions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Privacy, Free/Open Source, and the Cloud &lt;a href="http://bit.ly/1cTmGoI"&gt;http://bit.ly/1cTmGoI&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;9. e-Commerce -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One of the fastest growing applications of the internet is e-Commerce. This includes many facets of commerce such as online trading, the stock exchange 	etc. in these cases, just as in the financial and banking industries, privacy is very important to protect ones investments and capital. The following 	article's main focal point is the world of e-Commerce and its current privacy scenario.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Consumer Privacy in e-Commerce http://bit.ly/1dCtgTs&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/sectoral-privacy-research'&gt;https://cis-india.org/internet-governance/blog/sectoral-privacy-research&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vanya</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-01-03T09:46:20Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/privacy-policy-research">
    <title>Privacy Policy Research</title>
    <link>https://cis-india.org/internet-governance/blog/privacy-policy-research</link>
    <description>
        &lt;b&gt;The Centre Internet and Society, India has been researching privacy policy in India since the year 2010 with the following objectives.&lt;/b&gt;
        &lt;ol&gt;
&lt;li&gt;Raising public awareness  and dialogue around privacy, &lt;/li&gt;
&lt;li&gt;Undertaking in depth research of domestic and international policy pertaining to privacy &lt;/li&gt;
&lt;li&gt;Driving comprehensive privacy legislation in India through research.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;India does not have a comprehensive legislation covering issues of privacy or establishing the right to privacy In 2010 an "Approach Paper on Privacy" was published, in 2011 the Department of Personnel and Training released a draft Right to Privacy Bill, in 2012 the Planning Commission constituted a group of experts which published The Report of the Group of Experts on Privacy, in 2013 CIS drafted the citizens Privacy Protection Bill, and in 2014 the Right to Privacy Bill was leaked. Currently the Government is in the process of drafting and finalizing the Bill.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/DraftRighttoPrivacyBill.png" alt="Draft Right to Privacy" class="image-inline" title="Draft Right to Privacy" /&gt;&lt;/p&gt;
&lt;p&gt;Privacy Research -&lt;/p&gt;
&lt;p&gt;1. Approach Paper on Privacy, 2010 -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The following article contains the reply drafted by CIS in response to the Paper on Privacy in 2010. The Paper on Privacy was a document drafted by a group 	of officers created to develop a framework for a privacy legislation that would balance the need for privacy protection, security, sectoral interests, and 	respond to the domain legislation on the subject.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; CIS Responds to Privacy Approach Paper &lt;a href="http://bit.ly/16dEPB3"&gt;http://bit.ly/16dEPB3&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;2. Report on Privacy, 2012 -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Report on Privacy, 2012 was drafted and published by a group of experts under the Planning Commission pertaining to the current legislation with 	respect to privacy. The following articles contain the responses and criticisms to the report and the current legislation.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; The National Cyber Security Policy: Not a Real Policy &lt;a href="http://bit.ly/16yLYFq"&gt;http://bit.ly/16yLYFq&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt; Privacy Law Must Fit the Bill &lt;a href="http://bit.ly/19DNYjs"&gt;http://bit.ly/19DNYjs&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;3. Privacy Protection Bill, 2013 -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Privacy Protection Bill, 2013 was a legislation that aims to formulate the rules and law that governs privacy protection. The following articles refer 	to this legislation including a citizen's draft of the legislation.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; The Privacy (Protection) Bill 2013: A Citizen's Draft &lt;a href="http://bit.ly/1bXYbL6"&gt;http://bit.ly/1bXYbL6&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt; Privacy Protection Bill, 2013 (With Amendments based on Public Feedback) &lt;a href="http://bit.ly/1efkgbe"&gt;http://bit.ly/1efkgbe&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt; Privacy (Protection) Bill, 2013: Updated Third Draft &lt;a href="http://bit.ly/14WAgI7"&gt;http://bit.ly/14WAgI7&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt; The Privacy Protection Bill, 2013 &lt;a href="http://bit.ly/1g3TwIX"&gt;http://bit.ly/1g3TwIX&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt; The New Right to Privacy Bill 2011: A Blind Man's View of the Elephant &lt;a href="http://bit.ly/17VSgCH"&gt;http://bit.ly/17VSgCH&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;4. Right to Privacy Act, 2014 (Leaked Bill) -&lt;/p&gt;
&lt;p&gt;The Right to Privacy Act, 2014 is a bill still under proposal that was leaked, linked below.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; Leaked Privacy Bill: 2014 vs. 2011 http://bit.ly/QV0Y0w &lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/privacy-policy-research'&gt;https://cis-india.org/internet-governance/blog/privacy-policy-research&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vanya</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-01-03T09:40:37Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/dna-research">
    <title>DNA Research</title>
    <link>https://cis-india.org/internet-governance/blog/dna-research</link>
    <description>
        &lt;b&gt;In 2006, the Department of Biotechnology drafted the Human DNA Profiling Bill. In 2012 a revised Bill was released and a group of Experts was constituted to finalize the Bill. In 2014, another version was released, the approval of which is pending before the Parliament. This legislation will allow the government of India to Create a National DNA Data Bank and a DNA Profiling Board for the purposes of forensic research and analysis. Here is a collection of our research on privacy and security concerns related to the Bill.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The Centre for Internet and Society, India has been researching privacy in India since the year 2010, with special focus on the following issues related to the DNA Bill:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Validity and legality of collection, usage and storage of DNA samples and information derived from the same.&lt;/li&gt;
&lt;li&gt;Monitoring projects and policies around Human DNA Profiling.&lt;/li&gt;
&lt;li&gt;Raising public awareness around issues concerning biometrics.&lt;/li&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;"&gt;In 2006, the Department of Biotechnology drafted the Human DNA Profiling Bill. In 2012 a revised Bill was released and a group of Experts was constituted to finalize the Bill. In 2014, another version was released, the approval of which is pending before the Parliament.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The Bill seeks to establish DNA Databases at the state and regional level and a national level database. The databases would store DNA profiles of suspects, offenders, missing persons, and deceased persons. The database could be used by courts, law enforcement (national and international) agencies, and other authorized persons for criminal and civil purposes. The Bill will also regulate DNA laboratories collecting DNA samples. Lack of adequate consent, the broad powers of the board, and the deletion of innocent persons profiles are just a few of the concerns voiced about the Bill.&lt;/p&gt;
&lt;img src="https://github.com/cis-india/website/raw/master/img/CIS_DNA-Profiling-Bill_Web.jpg" alt="DNA Profiling Bill - Infographic" /&gt;
&lt;h6&gt;&lt;a href="https://github.com/cis-india/website/raw/master/img/CIS_DNA-Profiling-Bill_Web.jpg" target="_blank"&gt;Download the infographic.&lt;/a&gt; Credit: &lt;a href="https://twitter.com/Scott_Mason88" target="_blank"&gt;Scott Mason&lt;/a&gt; and CIS team.&lt;/h6&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;1. DNA Bill&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;The Human DNA Profiling bill is a legislation that will allow the government of India to Create a National DNA Data Bank and a DNA Profiling Board for the 	purposes of forensic research and analysis. There have been many concerns raised about the infringement of privacy and the power that the government will 	have with such information raised by Human Rights Groups, individuals and NGOs. The bill proposes to profile people through their fingerprints and retinal 	scans which allow the government to create different unique profiles for individuals. Some of the concerns raised include the loss of privacy by such 	profiling and the manner in which they are conducted. Unless strictly controlled, monitored and protected, such a database of the citizens' fingerprints 	and retinal scans could lead to huge blowbacks in the form of security risks and privacy invasions. The following articles elaborate upon these matters.&lt;/p&gt;
&lt;ol type="1"&gt;&lt;/ol&gt;
&lt;ul type="disc"&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/blog/biometrics-an-angootha-chaap-nation"&gt;Biometrics - An 'Angootha Chaap' Nation&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/blog/re-the-human-dna-profiling-bill-2012"&gt;Re: The Human DNA Profiling Bill, 2012&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/blog/human-dna-profiling-bill-analysis"&gt;Human DNA Profiling Bill 2012 Analysis&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/indian-draft-dna-profiling-act"&gt;Overview and Concerns Regarding the Indian Draft DNA Act&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/blog/indias-biometric-identification-programs-and-privacy-concerns"&gt;India's Biometric Identification Programs and Privacy Concerns&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/blog/dna-dissent"&gt;A Dissent note to the Expert Committee for DNA Profiling&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/blog/cis-comments-and-recommendations-to-human-dna-profiling-bill-2015"&gt;CIS Comments and Recommendations to the Human DNA Profiling Bill, June 2015&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/blog/concerns-regarding-dna-law"&gt;Concerns regarding DNA Law&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/blog/human-dna-profiling-bill-2012-vs-2015"&gt;Human DNA Profiling Bill 2012 v/s 2015 Bill&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/news/the-scariest-bill-in-parliament-is-getting-no-attention-2013-here2019s-what-you-need-to-know-about-it"&gt;The scariest Bill in the Parliament is getting no attention - Here's what you need to know about it&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/news/business-standard-kanika-datta-august-1-2015-why-the-dna-bill-is-open-to-misuse-sunil-abraham"&gt;Why the DNA Bill is open to misuse&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/news/livemint-nikita-mehta-july-29-2015-regulation-misuse-concerns-still-dog-dna-profiling-bill"&gt;Regulation, misuse concerns still dog DNA Profiling Bill&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/news/open-magazine-august-7-2015-ullekh-np-genetic-profiling"&gt;Genetic profiling - Is it all in the DNA?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/blog/comparison-of-the-human-dna-profiling-bill-2012-with-cis-recommendations-sub-committee-recommendations-expert-committee-recommendations-and-the-human-dna-profiling-bill-2015"&gt;Comparison of the Human DNA Profiling Bill 2012 with - CIS Recommendations, Sub-Committee Recommendations, Expert Committee Recommendations, and the Human DNA Profiling Bill 2015&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/blog/council-for-responsible-genetics-april-2014-sunil-abraham-very-big-brother"&gt;Very Big Brother&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;2. Comparative Analysis with other Legislatures&lt;/h2&gt;
&lt;p&gt;Human DNA Profiling is a system that isn't proposed only in India. This system of identification has been proposed and implemented in many nations. Each of 	these systems differs from the other on bases dependent on the nation's and society's needs. The risks and criticisms that DNA profiling has faced may be 	the same but the manner in which solutions to such issues are varying. The following articles look into the different systems in place in different 	countries and create a comparison with the proposed system in India to give us a better understanding of the risks and implications of such a system being 	implemented.&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/blog/comparative-analysis-of-dna-profiling-legislations-across-the-world"&gt;Comparative Analysis of DNA Profiling Legislations from Across the World&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/blog/comparision-of-draft-human-dna-profiling-bill-and-identification-act-revised-statute-of-canada-provisions"&gt;Comparison of Section 35(1) of the Draft Human DNA Profiling Bill and Section 4 of the Identification Act Revised Statute of Canada&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/blog/comparison-of-draft-dna-profiling-bills"&gt;A Comparison of the Draft DNA Profiling Bill 2007 and the Draft Human DNA Profiling Bill 2012&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/dna-research'&gt;https://cis-india.org/internet-governance/blog/dna-research&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vanya</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-07-21T11:02:29Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/uid-research">
    <title>UID Research</title>
    <link>https://cis-india.org/internet-governance/blog/uid-research</link>
    <description>
        &lt;b&gt;The Centre Internet and Society, India has been researching privacy policy in India since the year 2010 with the following objectives. &lt;/b&gt;
        &lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Researching the vision and implementation of the UID Scheme - both from a technical and regulatory perspective.&lt;/li&gt;
&lt;li&gt;Understanding the validity and legality of collection, usage and storage of Biometric information for this scheme.&lt;/li&gt;
&lt;li&gt;Raising public awareness around issues concerning privacy, data security and the objectives of the UID Scheme.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The UID scheme seeks to provide all residents of India an identity number based on their biometrics that can be used to authenticate individuals for the purpose of Government benefits and services. A 2015 Supreme Court ruling has clarified that the UID can only be used in the PDS and LPG Schemes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Concerns with the scheme include the broad consent taken at the time of enrolment, the lack of clarity as to what happens with transactional metadata, the centralized storage of the biometric information in the CIDR, the seeding of the aadhaar number into service providers’ databases, and the possibility of function creep. Also, there are concerns due to absence of a legislation to look into the privacy and security concerns.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;UID Research -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1. Ramifications of Aadhar and UID schemes -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The UID and Aadhar systems have been bombarded with criticisms and plagued with issues ranging from privacy concerns to security risks. The following 	articles deal with the many problems and drawbacks of these systems.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ UID and NPR: Towards Common Ground 	&lt;a href="http://cis-india.org/internet-governance/blog/uid-npr-towards-common-ground"&gt; http://cis-india.org/internet-governance/blog/uid-npr-towards-common-ground &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Public Statement to Final Draft of UID Bill &lt;a href="http://bit.ly/1aGf1NN"&gt;http://bit.ly/1aGf1NN&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ UID Project in India - Some Possible Ramifications	&lt;a href="http://cis-india.org/internet-governance/blog/uid-in-india"&gt;http://cis-india.org/internet-governance/blog/uid-in-india&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Aadhaar Number vs the Social Security Number 	&lt;a href="http://cis-india.org/internet-governance/blog/aadhaar-vs-social-security-number"&gt; http://cis-india.org/internet-governance/blog/aadhaar-vs-social-security-number &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Feedback to the NIA Bill	&lt;a href="http://cis-india.org/internet-governance/blog/cis-feedback-to-nia-bill"&gt;http://cis-india.org/internet-governance/blog/cis-feedback-to-nia-bill&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Unique ID System: Pros and Cons &lt;a href="http://bit.ly/1jmxbZS"&gt;http://bit.ly/1jmxbZS&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Submitted seven open letters to the Parliamentary Finance Committee on the UID covering the following aspects: SCOSTA Standards 	(http://bit.ly/1hq5Rqd), Centralized Database (http://bit.ly/1hsHJDg), Biometrics (http://bit.ly/196drke), UID Budget (http://bit.ly/1e4c2Op), Operational 	Design (http://bit.ly/JXR61S), UID and Transactions (http://bit.ly/1gY6B8r), and Deduplication (http://bit.ly/1c9TkSg)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Comments on Finance Committee Statements to Open Letters on Unique Identity: The Parliamentary Finance Committee responded to the open letters sent by CIS through an email on 12 October 2011. CIS has commented on the points raised by the Committee:	&lt;a href="http://bit.ly/1kz4H0F"&gt;http://bit.ly/1kz4H0F&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Unique Identification Scheme (UID) &amp;amp; National Population Register (NPR), and Governance 	&lt;a href="http://cis-india.org/internet-governance/blog/uid-and-npr-a-background-note"&gt; http://cis-india.org/internet-governance/blog/uid-and-npr-a-background-note &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Financial Inclusion and the UID	&lt;a href="http://cis-india.org/internet-governance/privacy_uidfinancialinclusion"&gt;http://cis-india.org/internet-governance/privacy_uidfinancialinclusion&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ The Aadhaar Case	&lt;a href="http://cis-india.org/internet-governance/blog/the-aadhaar-case"&gt;http://cis-india.org/internet-governance/blog/the-aadhaar-case&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Do we need the Aadhaar scheme &lt;a href="http://bit.ly/1850wAz"&gt;http://bit.ly/1850wAz&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ 4 Popular Myths about UID &lt;a href="http://bit.ly/1bWFoQg"&gt;http://bit.ly/1bWFoQg&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Does the UID Reflect India? 	&lt;a href="http://cis-india.org/internet-governance/blog/privacy/uid-reflects-india"&gt; http://cis-india.org/internet-governance/blog/privacy/uid-reflects-india &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Would it be a unique identity crisis?	&lt;a href="http://cis-india.org/news/unique-identity-crisis"&gt;http://cis-india.org/news/unique-identity-crisis&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ UID: Nothing to Hide, Nothing to Fear? 	&lt;a href="http://cis-india.org/internet-governance/blog/privacy/uid-nothing-to-hide-fear"&gt; http://cis-india.org/internet-governance/blog/privacy/uid-nothing-to-hide-fear &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2. Right to Privacy and UID -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The UID system has been hit by many privacy concerns from NGOs, private individuals and others. The sharing of one's information, especially fingerprints 	and retinal scans to a system that is controlled by the government and is not vetted as having good security irks most people. These issues are dealt with 	the in the following articles.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ India Fears of Privacy Loss Pursue Ambitious ID Project	&lt;a href="http://cis-india.org/news/india-fears-of-privacy-loss"&gt;http://cis-india.org/news/india-fears-of-privacy-loss&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Analysing the Right to Privacy and Dignity with Respect to the UID &lt;a href="http://bit.ly/1bWFoQg"&gt;http://bit.ly/1bWFoQg&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Analysing the Right to Privacy and Dignity with Respect to the UID 	&lt;a href="http://cis-india.org/internet-governance/blog/privacy/privacy-uiddevaprasad"&gt; http://cis-india.org/internet-governance/blog/privacy/privacy-uiddevaprasad &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Supreme Court order is a good start, but is seeding necessary? 	&lt;a href="http://cis-india.org/internet-governance/blog/supreme-court-order-is-a-good-start-but-is-seeding-necessary"&gt; http://cis-india.org/internet-governance/blog/supreme-court-order-is-a-good-start-but-is-seeding-necessary &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Right to Privacy in Peril 	&lt;a href="http://cis-india.org/internet-governance/blog/right-to-privacy-in-peril"&gt; http://cis-india.org/internet-governance/blog/right-to-privacy-in-peril &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3. Data Flow in the UID -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The articles below deal with the manner in which data is moved around and handled in the UID system in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ UIDAI Practices and the Information Technology Act, Section 43A and Subsequent Rules 	&lt;a href="http://cis-india.org/internet-governance/blog/uid-practices-and-it-act-sec-43-a-and-subsequent-rules"&gt; http://cis-india.org/internet-governance/blog/uid-practices-and-it-act-sec-43-a-and-subsequent-rules &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Data flow in the Unique Identification Scheme of India 	&lt;a href="http://cis-india.org/internet-governance/blog/data-flow-in-unique-identification-scheme-of-india"&gt; http://cis-india.org/internet-governance/blog/data-flow-in-unique-identification-scheme-of-india &lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/uid-research'&gt;https://cis-india.org/internet-governance/blog/uid-research&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vanya</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-01-03T09:59:27Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/net-neutrality-across-south-asia">
    <title>Net Neutrality across South Asia</title>
    <link>https://cis-india.org/internet-governance/events/net-neutrality-across-south-asia</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society (CIS) and the Observer Research Foundation in association with Centre for Global Communication Studies, Annenberg School for Communication, University of Pennnsylvania and Internet Policy Observatory is organizing this event at the Observer Research Foundation's office in New Delhi from 10 a.m. to 5 p.m., on December 12, 2015.&lt;/b&gt;
        &lt;h3&gt;Context&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Net neutrality can broadly be understood as the principle of non-discrimination which in practice allows the internet to be free and open by preventing service providers from slowing or interfering with the transfer of data. Net neutrality has risen as a global policy issue, yet cultural, political, commercial, and economical factors influence how net neutrality is understood and addressed in a particular context. Indeed, the factors driving the net neutrality debate, the way in which governments are addressing net neutrality, the role and response of industry, the public response, and the role of civil society has been varied across contexts. The topic of net neutrality is not limited to a technical debate and brings together a number of issues including the right to access, the right to freedom of expression, fair competition practices, and privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This conference seeks to bring together domain experts, industry, government, and civil society across South Asia to understand how net neutrality is understood in different contexts, how it is being addressed from a policy point of view, what the varying public dialogues around net neutrality are, and what role civil society can play in influencing the debate.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;div style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/concept-note-network-neutrality-in-south-asia" class="internal-link"&gt;&lt;strong&gt;Download the Concept Note&lt;/strong&gt;&lt;/a&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/blog/NN_Conference%20Report.pdf" class="internal-link"&gt;&lt;b&gt;Download Event Report &lt;/b&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/net-neutrality-across-south-asia'&gt;https://cis-india.org/internet-governance/events/net-neutrality-across-south-asia&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-02-27T08:09:29Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/take-away-from-the-i-j-project-workshop-at-the-un-internet-governance-forum-2015">
    <title>Take-away from the I&amp;J Project Workshop at the UN Internet Governance Forum 2015</title>
    <link>https://cis-india.org/internet-governance/news/take-away-from-the-i-j-project-workshop-at-the-un-internet-governance-forum-2015</link>
    <description>
        &lt;b&gt;The Internet &amp; Jurisdiction Project organized the workshop “Transnational due process: A case study in multi-stakeholder cooperation” at the Internet Governance Forum convened by the United Nations on November 13, 2015.&lt;/b&gt;
        &lt;p&gt;This was published on &lt;a class="external-link" href="http://www.internetjurisdiction.net/take-away-from-the-ij-project-workshop-at-the-un-internet-governance-forum-2015/"&gt;Internet &amp;amp; Jurisdiction&lt;/a&gt; website.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The 4-day conference convened over 2000 high-level participants from states, major global Internet companies, technical Internet operators, international organizations, civil society groups and academia.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Video&lt;/h3&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="315" src="https://www.youtube.com/embed/mJvYYVohxV8" width="560"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The workshop organized by the I&amp;amp;J Project discussed how to address the tension between the cross-border nature of the Internet and a patchwork of national jurisdictions by enabling multi-stakeholder cooperation. Sunil Abraham, the Director of  CIS India, stressed the limits of traditional modes of inter-state legal cooperation on the Internet:&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;The MLAT system is completely broken […] both from the demand side and also from the supply side.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The US Cyber Coordinator of the State Department, Christopher Painter, stated the need to streamline procedures of Mutual Legal Assistance Treaties, but also highlighted the importance of pursuing in parallel more innovative approaches, such as the Internet &amp;amp; Jurisdiction process:&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;MLATS are not always the right answer.  There are other answers between law enforcement channels in terms of joint investigations and there are also creative solutions that might take some of the burden off that MLAT process and I think that those are worthy of exploration.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Representing the Canadian ccTLD .ca, Mark Bull reflected upon how to develop such solutions to maintain the global nature of the Internet.&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;We are talking about incredibly complex issues here and I believe that complexity necessitates a multi-stakeholder process to identify solutions.  And that is what I think the beauty of the Internet &amp;amp; Jurisdiction Project is. And it’s why because of the multi-stakeholder structure, that’s why we believe it is the best and the most effective form for discussing issues this complex.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Panelist Eileen Donahoe, the Director of Global Affairs at Human Rights Watch applauded the progress the Internet &amp;amp; Jurisdiction process made since 2012:&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;Let me say that the work of the I&amp;amp;J Project has been relentless and it is really important. This is one of the most complex spaces in Internet governance&lt;/p&gt;
&lt;p&gt;The jurisdiction topic has become one of the most pressing Internet governance challenges, as  I&amp;amp;J Project Director and Co-Founder Bertrand de La Chapelle pointed out:&lt;/p&gt;
&lt;p class="callout"&gt;There is a real element of urgency. The jurisdiction issue is at the core of many Internet governance problems. And it has been said in many workshops here in the IGF, but also outside of it. The problem is really getting worse. The jurisdiction problem is probably one of the biggest threats to the fabric of the Internet as we know it.&lt;/p&gt;
&lt;p&gt;The objective of the workshop was to gather participants in the global Internet &amp;amp; Jurisdiction process from different stakeholder groups to report on progress and achievements. Furthermore, the workshop deepened the understanding of how to address jurisdictional tensions around the Internet and establish innovative legal cooperation mechanisms to prevent its fragmentation along national territorial boundaries.Council of Europe’s Elvana Thaci reminded participants of the importance to develop harmonized procedures across borders, as&lt;/p&gt;
&lt;p class="callout"&gt;Harmonization of substance is very difficult because the understanding of unlawfulness of content is very diverse.&lt;/p&gt;
&lt;p&gt;Facebook’s Head of Policy Development, Matt Perault, talked about the need for appropriate procedures:&lt;/p&gt;
&lt;p class="callout"&gt;I am here because I believe the I&amp;amp;J Project is devoted to figuring out how to think about mechanisms for a race to the top on the issue of jurisdiction.&lt;/p&gt;
&lt;p&gt;The pioneering Internet &amp;amp; Jurisdiction process has engaged more than 100 key entities around the world, creating a unique neutral space to build trust and catalyze operational solutions. As Will Hudson, Google’s Senior Advisor for International Policy, said:&lt;/p&gt;
&lt;p class="callout"&gt;We need to find solutions that work for all parties. It is one of the great strengths of the I&amp;amp;J Project, that it is looking at this challenge head on. We need to do things in this multi-stakeholder manner, and talk as a community because everyone has a stake in this and we cannot do this alone.&lt;/p&gt;
&lt;h3&gt;Participants&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;ANNE CARBLANC, Head of Division, Directorate for Science, Technology and Industry, OECD&lt;/li&gt;
&lt;li&gt;BYRON HOLLAND, President and CEO, CIRA (Canadian ccTLD)&lt;/li&gt;
&lt;li&gt;CHRISTOPHER PAINTER, Coordinator for Cyber Issues, US Department of State&lt;/li&gt;
&lt;li&gt;EILEEN DONAHOE, Director Global Affairs, Human Rights Watch&lt;/li&gt;
&lt;li&gt;EVANA THACI, Administrator, Council of Europe&lt;/li&gt;
&lt;li&gt;MATT PERAULT, Head of Policy Development, Facebook&lt;/li&gt;
&lt;li&gt;SUNIL ABRAHAM, Executive Director, CIS India&lt;/li&gt;
&lt;li&gt;WILL HUDSEN, Senior Advisor for International Policy, Google&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/take-away-from-the-i-j-project-workshop-at-the-un-internet-governance-forum-2015'&gt;https://cis-india.org/internet-governance/news/take-away-from-the-i-j-project-workshop-at-the-un-internet-governance-forum-2015&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance Forum</dc:subject>
    
    
        <dc:subject>Video</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-11-30T14:09:57Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-soft-copy-vivek-ananth-november-23-2015-shopping-on-apps-raise-privacy-and-security-concerns">
    <title>Shopping on apps raise privacy and security concerns</title>
    <link>https://cis-india.org/internet-governance/news/the-soft-copy-vivek-ananth-november-23-2015-shopping-on-apps-raise-privacy-and-security-concerns</link>
    <description>
        &lt;b&gt;The recently concluded online Diwali sales frequently offered consumers hefty discounts on merchandise if they shopped via store app, a move that experts say increases security risks for internet users.&lt;/b&gt;
        &lt;p&gt;The article by Vivek Ananth was &lt;a class="external-link" href="http://www.thesoftcopy.in/23_11_15_shopping_on_apps_raise_concerns.html"&gt;published by the Softcopy, an IIJNM Web Publication&lt;/a&gt; on November 23, 2015. Sunil Abraham gave inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;“It makes the security much worse because of  increased complexity from  the user perspective,” said Sunil Abraham, executive  director at Centre  for Internet and Society.&lt;br /&gt; &lt;br /&gt; “User will have to install  multiple apps and then  worry about the security implications arising from each  app. From the  e-commerce corporation perspective it might reduce effort but for  users  this is a nightmare.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Do  apps increase security risks? &lt;br /&gt; &lt;br /&gt; The degree of risk depends on the specific app and   can only be determined after a detailed security audit, Abraham said.&lt;br /&gt; &lt;br /&gt; “Unfortunately there aren't many organisations doing   such audits and making their results available to the public,” he added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are some users who say that privacy on the  internet isn’t an option.&lt;br /&gt; &lt;br /&gt; “Once you are online your privacy is kind of gone,”   said Hasmit Trivedi of Mumbai. “I mean you are vulnerable.”&lt;br /&gt; &lt;br /&gt; “That (browsing history being used to target   advertisements) does concern me, but not to the extent that I'll stop  using  these websites,” said Sweta Rajan, a lawyer from Mumbai.&lt;br /&gt; &lt;br /&gt; “Google has done this forever," said Dinoo Muthappa.“I  don't even care if they use my search to place advertisements of what  they  think I need while browsing.”&lt;b&gt;&lt;/b&gt;&lt;br /&gt; &lt;b&gt;&lt;br /&gt; Comfort  and Convenience trumps privacy&lt;/b&gt;&lt;br /&gt; &lt;br /&gt; “I don't really shop for things I'm not comfortable   allowing the world to know. I'm ok with them using this (usage pattern  and  browsing information) for commercial reasons,” Rajan said.&lt;br /&gt; &lt;br /&gt; “We live in a world where the cost of convenience is   our privacy. Take my user preferences,” said Dinoo Muthappa, a lawyer  from  Delhi.“If it means you'll make money and somehow reflect as a  discount to me  later, that's fine,” she added.&lt;br /&gt; &lt;br /&gt; “I frankly don't have a problem with it in   principle,” said Akshara Kumar Chitoor, a lawyer from Bengaluru, about   companies mining data to target advertisements at her. “I don't think  it's very  different from how certain TV channels carry certain  advertisements because  they know the audiences.I mean,  you get Rin and  Horlicks ads on Zee and Sony but not Romedy Now or Comedy  Central.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The convenience of having it come home  when I want  and not having to face the guy who I know is ripping me  off; these guys can use  and sell my information,” Muthappa said.&lt;br /&gt; &lt;br /&gt; “With my work timings I literally do not find time  to go to a store and  shop,”Rajan said. “I buy everything online. It's very  convenient and  time saving.”&lt;br /&gt; &lt;br /&gt; “Personally, I think just browsing stuff to buy is  much easier on your  computer,” said Sreenath Unnikrishnan, a product developer  from  Singapore. “However, I do think apps are more convenient for payment. As   in your card information is normally stored and can be accessed  without having  to log in and all. I can do that on a computer too, but  it's less secure. At  least that's what I think.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/GoogleandFacebook.png" alt="Google and Facebook" class="image-inline" title="Google and Facebook" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="style24" href="https://www.google.com/policies/technologies/ads/"&gt;Google&lt;/a&gt; and &lt;a class="external-link" href="https://www.facebook.com/help/516147308587266/?helpref=hc_fnav"&gt;Facebook&lt;/a&gt; have their advertisement norms disclosed.&lt;br /&gt; &lt;br /&gt; Twitter also follows a&lt;a class="style23" href="https://support.twitter.com/articles/20170405"&gt; similar model &lt;/a&gt;using the email ids that their users have associated with their twitter  handles.&lt;br /&gt; &lt;br /&gt; “If the service is free - then as many have said  before - you are the  product, said Sunil Abraham executive director at Centre  for Internet  and Society. “Your personal information is being sold to marketers  and  advertisers. As Bruce Schneier puts it ‘surveillance is the business  model  of the Internet’".&lt;br /&gt; &lt;br /&gt; The terms and conditions are sometimes very long and  use difficult language.&lt;br /&gt; &lt;br /&gt; “Transparency and Informed Consent are principles in  most jurisdictions that have data protection law modelled on the &lt;a class="style24" href="http://ec.europa.eu/justice/data-protection/index_en.htm"&gt;EU  Data Protection Directive&lt;/a&gt;,” Abraham said.“Part of the transparency  principle is the accessibility of the language.”&lt;br /&gt; &lt;br /&gt; The user though still has an option to opt out of  the above process where their data is collected by these companies.&lt;br /&gt; Privacy policies of internet companies are legal  documents. These are  required under data protection laws. This makes them  complicated, said  Abraham. &lt;br /&gt; &lt;br /&gt; The users don’t care that their usage data is being  mined by businesses  till they have a bad experience, Abraham said.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-soft-copy-vivek-ananth-november-23-2015-shopping-on-apps-raise-privacy-and-security-concerns'&gt;https://cis-india.org/internet-governance/news/the-soft-copy-vivek-ananth-november-23-2015-shopping-on-apps-raise-privacy-and-security-concerns&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-03-21T14:56:26Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-wire-bhairav-acharya-humpty-dumpty-censorship-of-tv-in-india">
    <title>The Humpty-Dumpty Censorship of Television in India</title>
    <link>https://cis-india.org/internet-governance/blog/the-wire-bhairav-acharya-humpty-dumpty-censorship-of-tv-in-india</link>
    <description>
        &lt;b&gt;The Modi government’s attack on Sathiyam TV is another manifestation of the Indian state’s paranoia of the medium of film and television, and consequently, the irrational controlling impulse of the law.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article originally published in the Wire on September 8, 2015 was also mirrored on the website &lt;a class="external-link" href="http://notacoda.net/2015/09/09/the-humpty-dumpty-censorship-of-television-in-india/"&gt;Free Speech/Privacy/Technology&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;It is tempting to think of the Ministry of Information and Broadcasting’s (MIB) &lt;a href="http://www.livelaw.in/i-b-ministrys-warning-to-channel-for-comments-on-pm-modi-delhi-hc-seeks-reply/" target="_blank"&gt;attack on Sathiyam TV&lt;/a&gt; solely as another authoritarian exhibition of Prime Minister Narendra  Modi’s government’s intolerance of criticism and dissent. It certainly  is. But it is also another manifestation of the Indian state’s paranoia  of the medium of film and television, and consequently, the irrational  controlling impulse of the law.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Sathiyam TV’s transgressions&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sathiyam’s transgressions began more than a year ago, on May 9, 2014,  when it broadcast a preacher saying of an unnamed person: “Oh Lord!  Remove this satanic person from the world!” The preacher also allegedly  claimed this “dreadful person” was threatening Christianity. This, the  MIB reticently claims, “appeared to be targeting a political leader”,  referring presumably to Prime Minister Modi, to “potentially give rise  to a communally sensitive situation and incite the public to violent  tendencies.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The MIB was also offended by a “senior journalist” who, on the same  day, participated in a non-religious news discussion to allegedly claim  Modi “engineered crowds at his rallies” and used “his oratorical skills  to make people believe his false statements”. According to the MIB, this  was defamatory and “appeared to malign and slander the Prime Minister  which was repugnant to (his) esteemed office”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For these two incidents, Sathiyam was served a show-cause notice on  16 December 2014 which it responded to the next day, denying the MIB’s  claims. Sathiyam was heard in-person by a committee of bureaucrats on 6  February 2015. On 12 May 2015, the MIB handed Sathiyam an official &lt;a href="http://www.scribd.com/doc/277493911/Warning-Sathiyam-TV-Channel-12th-May-2015" target="_blank"&gt;an official “Warning”&lt;/a&gt; which appears to be unsupported by law. Sathiyam moved the Delhi High Court to challenge this.&lt;/p&gt;
&lt;p&gt;As Sathiyam sought judicial protection, the MIB issued the channel a &lt;a href="http://www.catchnews.com/india-news/now-airing-the-hounding-of-a-tv-channel-for-showing-modi-in-bad-light-1441303238.html" target="_blank"&gt;second warning&lt;/a&gt; August  26, 2016 citing three more objectionable news broadcasts of: a child  being subjected to cruelty by a traditional healer in &lt;a href="http://www.ndtv.com/india-news/newborn-forced-to-walk-by-witch-doctor-in-assam-village-as-fever-cure-764554" target="_blank"&gt;Assam&lt;/a&gt;; a gun murder inside a government hospital in &lt;a href="https://www.youtube.com/watch?v=m2V4B2elMjo" target="_blank"&gt;Madhya Pradesh&lt;/a&gt;; and, a self-immolating man rushing the dais at a BJP rally in &lt;a href="https://www.youtube.com/watch?v=ECDV5AieD4g" target="_blank"&gt;Telangana&lt;/a&gt;. All three news items were carried by other news channels and websites.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Governing communications&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Most news providers use multiple media to transmit their content  and suffer from complex and confusing regulation. Cable television is  one such medium, so is the Internet; both media swiftly evolve to follow  technological change. As the law struggles to keep up, governmental  anxiety at the inability to perfectly control this vast field of speech  and expression frequently expresses itself through acts of overreach and  censorship.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the newly-liberalised media landscape of the early 1990s, cable  television sprang up in a legal vacuum. Doordarshan, the sole  broadcaster, flourished in the Centre’s constitutionally-sanctioned  monopoly of broadcasting which was only broken by the Supreme Court in  1995. The same year, Parliament enacted the Cable Television Networks  (Regulation) Act, 1995 (“Cable TV Act”) to create a licence regime to  control cable television channels. The Cable TV Act is supplemented by  the Cable Television Network Rules, 1994 (“Cable Rules”).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The state’s disquiet with communications technology is a recurring  motif in modern Indian history. When the first telegraph line was laid  in India, the colonial state was quick to recognize its potential for  transmitting subversive speech and responded with strict controls. The  fourth iteration of the telegraph law represents the colonial  government’s perfection of the architecture of control. This law is the  Indian Telegraph Act, 1885, which continues to dominate communications  governance in India today including, following a directive in 2004,  broadcasting.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Vague and arbitrary law&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Cable TV Act requires cable news channels such as Sathiyam to  obey a list of restrictions on content that is contained in the Cable  Rules (“&lt;a href="http://mib.nic.in/WriteReadData/documents/pc1.pdf" target="_blank"&gt;Programme Code&lt;/a&gt;“).  Failure to conform to the Programme Code can result in seizure of  equipment and imprisonment; but, more importantly, creates the momentum  necessary to invoke the broad powers of censorship to ban a programme,  channel, or even the cable operator. But the Programme Code is littered  with vague phrases and undefined terms that can mean anything the  government wants them to mean.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;By its first warning of May 12, 2015, the MIB claimed Sathiyam  violated four rules in the Programme Code. These include rule 6(1)(c)  which bans visuals or words “which promote communal attitudes”; rule  6(1)(d) which bans “deliberate, false and suggestive innuendos and  half-truths”; rule 6(1)(e) which bans anything “which promotes  anti-national attitudes”; and, rule 6(1)(i) which bans anything that  “criticises, maligns or slanders any…person or…groups, segments of  social, public and moral life of the country” &lt;i&gt;(sic).&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The rest of the Programme Code is no less imprecise. It proscribes  content that “offends against good taste” and “reflects a slandering,  ironical and snobbish attitude” against communities. On the face of it,  several provisions of the Programme Code travel beyond the permissible  restrictions on free speech listed in Article 19(2) of the Constitution  to question their validity. The fiasco of implementing the vague  provisions of the erstwhile section 66A of the Information Technology  Act, 2000 is a recent reminder of the dangers presented by  poorly-drafted censorship law – which is why it was struck down by the  Supreme Court for infringing the right to free speech. The Programme  Code is an older creation, it has simply evaded scrutiny for two  decades.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The arbitrariness of the Programme Code is amplified manifold by the  authorities responsible for interpreting and implementing it. An  Inter-Ministerial Committee (IMC) of bureaucrats, supposedly a  recommendatory body, interprets the Programme Code before the MIB takes  action against channels. This is an executive power of censorship that  must survive legal and constitutional scrutiny, but has never been  subjected to it. Curiously, the courts have shied away from a proper  analysis of the Programme Code and the IMC.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Judicial challenges&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 2011, a single judge of the Delhi High Court in the &lt;a href="http://indiankanoon.org/doc/132453/" target="_blank"&gt;&lt;i&gt;Star India&lt;/i&gt;&lt;/a&gt; case (2011) was asked to examine the legitimacy of the IMC as well as  four separate clauses of the Programme Code including rule 6(1)(i),  which has been invoked against Sathiyam. But the judge neatly  sidestepped the issues. This feat of judicial adroitness was made  possible by the crass indecency of the content in question, which could  be reasonably restricted. Since the show clearly attracted at least one  ground of legitimate censorship, the judge saw no cause to examine the  other provisions of the Programme Code or even the composition of the  IMC.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This judicial restraint has proved detrimental. In May 2013, another  single judge of the Delhi High Court, who was asked by Comedy Central to  adjudge the validity of the IMC’s decision-making process, relied on &lt;i&gt;Star India&lt;/i&gt; (2011) to uphold the MIB’s action against the channel. The channel’s  appeal to the Supreme Court is currently pending. If the Supreme Court  decides to examine the validity of the IMC, the Delhi High Court may put  aside Sathiyam’s petition to wait for legal clarity.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As it happens, in the &lt;a href="http://indiankanoon.org/doc/110813550/"&gt;&lt;i&gt;Shreya Singhal&lt;/i&gt;&lt;/a&gt; case (2015) that struck down section 66A of the IT Act, the Supreme  Court has an excellent precedent to follow to demand clarity and  precision from the Programme Code, perhaps even strike it down, as well  as due process from the MIB. On the accusation of defaming the Prime  Minister, probably the only clearly stated objection by the MIB, the  Supreme Court’s past law is clear: public servants cannot, for  non-personal acts, claim defamation.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Censorship by blunt force&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Beyond the IMC’s advisories and warnings, the Cable TV Act contains  two broad powers of censorship. The first empowerment in section 19  enables a government official to ban any programme or channel if it  fails to comply with the Programme Code or, “if it is likely to promote,  on grounds of religion, race, language, caste or community or any other  ground whatsoever, disharmony or feelings of enmity, hatred or ill-will  between different religious, racial, linguistic or regional groups or  castes or communities or which is likely to disturb the public  tranquility.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The second empowerment is much wider. Section 20 of the Cable TV Act  permits the Central Government to ban an entire cable television  operator, as opposed to a single channel or programmes within channels,  if it “thinks it necessary or expedient so to do in public interest”. No  reasons need be given and no grounds need be considered. Such a blunt  use of force creates an overwhelming power of censorship. It is not a  coincidence that section 20 resembles some provisions of  nineteenth-century telegraph laws, which were designed to enable the  colonial state to control the flow of information to its native  subjects.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;A manual for television bans&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://www.frontline.in/arts-and-culture/cinema/cut-and-thrust/article5185915.ece" target="_blank"&gt;Film&lt;/a&gt; and television have &lt;a href="http://thebigindianpicture.com/2013/03/the-heart-of-censorship/" target="_blank"&gt;always&lt;/a&gt; attracted political attention and state censorship. In 1970, &lt;a href="http://indiankanoon.org/doc/1719619/" target="_blank"&gt;Justice Hidayatullah&lt;/a&gt; of the Supreme Court explained why: “It has been almost universally  recognised that the treatment of motion pictures must be different from  that of other forms of art and expression. This arises from the instant  appeal of the motion picture… The motion picture is able to stir up  emotions more deeply than any other product of art.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Within this historical narrative of censorship, television regulation is relatively new. &lt;a href="http://www.indiantelevision.com/television/programming/tv-channels/regulations/ib-ministry-dictates-channels-to-follow-the-programme" target="_blank"&gt;Past governments&lt;/a&gt; have also been quick to threaten censorship for attacking an incumbent  Prime Minister. There seems to be a pan-governmental consensus that  senior political leaders ought to be beyond reproach, irrespective of  their words and deeds.&lt;/p&gt;
&lt;p&gt;But on what grounds could the state justify these bans? Lord Atkins’ celebrated war-time dissent in &lt;a href="https://en.wikipedia.org/wiki/Liversidge_v_Anderson" target="_blank"&gt;&lt;i&gt;Liversidge&lt;/i&gt;&lt;/a&gt; (1941) offers an unlikely answer:&lt;/p&gt;
&lt;p&gt;“When I use a word,’ Humpty Dumpty said in rather a scornful tone,  ‘it means just what I choose it to mean – neither more nor less.’”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-wire-bhairav-acharya-humpty-dumpty-censorship-of-tv-in-india'&gt;https://cis-india.org/internet-governance/blog/the-wire-bhairav-acharya-humpty-dumpty-censorship-of-tv-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bhairav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2015-11-29T08:37:53Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-short-lived-adventure-of-india2019s-encryption-policy">
    <title>The Short-lived Adventure of India’s Encryption Policy</title>
    <link>https://cis-india.org/internet-governance/blog/the-short-lived-adventure-of-india2019s-encryption-policy</link>
    <description>
        &lt;b&gt;Written for the Berkeley Information Privacy Law Association (BIPLA). &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;During his recent visit to Silicon Valley, Indian Prime Minister Narendra Modi &lt;a href="http://www.thehindu.com/news/resources/full-text-of-narendra-modis-speech-at-san-jose/article7694680.ece" target="_blank"&gt;said&lt;/a&gt; his government was “giving the highest importance to data privacy and  security, intellectual property rights and cyber security”. But a  proposed &lt;a href="http://www.scribd.com/doc/282239916/DRAFT-NATIONAL-ENCRYPTION-POLICY" target="_blank"&gt;national encryption policy&lt;/a&gt; circulated in September 2015 would have achieved the opposite effect.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The policy was comically short-lived. After its poorly-drafted provisions invited ridicule, it was swiftly &lt;a href="http://www.cnn.com/2015/09/23/asia/india-withdraws-encryption-policy/" target="_blank"&gt;withdrawn&lt;/a&gt;.  But the government has promised to return with a fresh attempt to  regulate encryption soon. The incident highlights the worrying assault  on &lt;a href="http://www.frontline.in/cover-story/india-privacy-in-peril/article4849211.ece?homepage=true" target="_blank"&gt;communications privacy&lt;/a&gt; and &lt;a href="https://www.washingtonpost.com/world/asia_pacific/indias-modi-wants-to-woo-silicon-valley-but-censorship-and-privacy-fears-grow-at-home/2015/09/23/2ab28f86-6174-11e5-8475-781cc9851652_story.html" target="_blank"&gt;free speech&lt;/a&gt; in India, a concern compounded by the enormous scale of the telecommunications and Internet market.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even with only around &lt;a href="http://www.livemint.com/Politics/BvW1QKrvU0zKeH23fvKAoK/India-Internet-userbase-crosses-350-million-milestone-in-Jun.html" target="_blank"&gt;26 percent&lt;/a&gt; of its population online, India is already the world’s &lt;a href="https://en.wikipedia.org/wiki/List_of_countries_by_number_of_Internet_users" target="_blank"&gt;second-largest&lt;/a&gt; Internet user, recently overtaking the United States. The number of  Internet users in India is set to grow exponentially, spurred by  ambitious governmental schemes to build a ‘&lt;a href="http://www.digitalindia.gov.in/" target="_blank"&gt;Digital India&lt;/a&gt;’ and a country-wide &lt;a href="http://www.wsj.com/articles/SB10001424052702304870304577490442561089140" target="_blank"&gt;fiber-optic backbone&lt;/a&gt;. There will be a corresponding &lt;a href="http://www.nytimes.com/2015/09/28/technology/india-replaces-china-as-next-big-frontier-for-us-tech-companies.html?_r=0" target="_blank"&gt;increase&lt;/a&gt; in the use of the Internet for communicating and conducting commerce.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Encryption on the Internet&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Encryption protects the security of  Internet users from invasions of privacy, theft of data, and other  attacks. By applying an algorithmic cipher (key), ordinary data  (plaintext) is encoded into an unintelligible form (ciphertext), which  is decrypted using the key. The ciphertext can be intercepted but will  remain unintelligible without the key. The key is secret.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are several methods of encryption. &lt;a href="https://en.wikipedia.org/wiki/Transport_Layer_Security" target="_blank"&gt;SSL/TLS&lt;/a&gt;,  a family of encryption protocols, is commonly used by major websites.  But while some companies encrypt sensitive data, such as passwords and  financial information, during its &lt;a href="https://www.schneier.com/blog/archives/2010/06/data_at_rest_vs.html" target="_blank"&gt;transit&lt;/a&gt; through the Internet, most data at rest on servers is largely &lt;a href="http://www.wired.com/2014/04/https/" target="_blank"&gt;unencrypted&lt;/a&gt;. For instance, &lt;a href="http://www.forbes.com/sites/hollieslade/2014/05/19/the-only-email-system-the-nsa-cant-access/"&gt;email providers&lt;/a&gt; regularly store plaintext messages on their servers. As a result, governments simply demand and receive &lt;a href="https://www.schneier.com/blog/archives/2015/07/the_risks_of_ma.html" target="_blank"&gt;backdoor&lt;/a&gt; access to information directly from the companies that provide these services. However, governments have long insisted on &lt;a href="https://www.eff.org/issues/calea" target="_blank"&gt;blanket backdoor access&lt;/a&gt; to all communications data, both encrypted and unencrypted, and whether at rest or in transit.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On the other hand, proper &lt;a href="http://www.wired.com/2014/11/hacker-lexicon-end-to-end-encryption/" target="_blank"&gt;end-to-end encryption&lt;/a&gt; – full encryption from the sender to recipient, where the service  provider simply passes on the ciphertext without storing it, and deletes  the &lt;a href="https://www.privacyinternational.org/node/53" target="_blank"&gt;metadata&lt;/a&gt; – will defeat backdoors and protect privacy, but may not be &lt;a href="http://www.thenation.com/article/privacy-and-profit-motive/" target="_blank"&gt;profitable&lt;/a&gt;. End-to-end encryption alarms the &lt;a href="https://www.fbi.gov/news/speeches/going-dark-are-technology-privacy-and-public-safety-on-a-collision-course" target="_blank"&gt;surveillance establishment&lt;/a&gt;, which is why British Prime Minister David Cameron wants to &lt;a href="http://www.theguardian.com/commentisfree/2015/jan/13/cameron-ban-encryption-digital-britain-online-shopping-banking-messaging-terror" target="_blank"&gt;ban&lt;/a&gt; it, and many in the US government want Silicon Valley companies to &lt;a href="http://www.nytimes.com/2015/09/08/us/politics/apple-and-other-tech-companies-tangle-with-us-over-access-to-data.html" target="_blank"&gt;stop using it&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Communications privacy&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Instead of relying on a company to secure  communications, the surest way to achieve end-to-end encryption is for  the sender to encrypt the message before it leaves her computer. Since  only the sender and intended recipient have the key, even if the data is  intercepted in transit or obtained through a backdoor, only the  ciphertext will be visible.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For almost all of human history,  encryption relied on a single shared key; that is, both the sender and  recipient used a pre-determined key. But, like all secrets, the more who  know it, the less secure the key becomes. From the 1970s onwards,  revolutionary advances in cryptography enabled the generation of a pair  of dissimilar keys, one public and one private, which are uniquely and  mathematically linked. This is asymmetric or &lt;a href="https://en.wikipedia.org/wiki/Public-key_cryptography" target="_blank"&gt;public key cryptography&lt;/a&gt;, where the private key remains an exclusive secret. It offers the strongest &lt;a href="http://www.newyorker.com/tech/elements/hard-to-crack-the-governments-encryption-conundrum" target="_blank"&gt;protection&lt;/a&gt; for communications privacy because it returns &lt;a href="http://www.wired.com/2015/09/apple-fighting-privacy-imessage-still-problems/" target="_blank"&gt;autonomy&lt;/a&gt; to the individual and is immune to backdoors.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For those using public key encryption, Edward Snowden’s revelation that the NSA had &lt;a href="http://www.newyorker.com/tech/elements/how-the-n-s-a-cracked-the-web" target="_blank"&gt;cracked&lt;/a&gt; several encryption protocols including SSL/TLS was worrying. &lt;a href="https://www.schneier.com/blog/archives/2013/09/the_nsas_crypto_1.html" target="_blank"&gt;Brute-force decryption&lt;/a&gt; (the use of supercomputers to mathematically attack keys) questions the  integrity of public key encryption. But, since the difficulty of  code-breaking is directly proportional to &lt;a href="https://en.wikipedia.org/wiki/Key_size" target="_blank"&gt;key size&lt;/a&gt;, notionally, generating longer keys will thwart the NSA, for now.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The crypto-wars in India&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Where does India’s withdrawn encryption  policy lie in this landscape of encryption and surveillance? It is  difficult to say. Because it was so badly drafted, understanding the  policy was a challenge. It could have been a ham-handed response to  commercial end-to-end encryption, which many major providers such as &lt;a href="http://www.washingtonpost.com/business/technology/2014/09/25/68c4e08e-4344-11e4-9a15-137aa0153527_story.html" target="_blank"&gt;Apple&lt;/a&gt; and &lt;a href="http://www.wired.com/2014/11/whatsapp-encrypted-messaging/" target="_blank"&gt;WhatsApp&lt;/a&gt; are adopting following consumer demand. But curiously, this did not  appear to be the case, because the government later exempted &lt;a href="http://indianexpress.com/article/explained/whatsapp-might-be-out-but-the-encryption-policy-is-still-ambiguous/" target="_blank"&gt;WhatsApp&lt;/a&gt; and other “mass use encryption products”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Indian establishment has a history of battling commercial encryption. From 2008, it fought &lt;a href="https://www.schneier.com/blog/archives/2008/05/blackberry_givi_1.html" target="_blank"&gt;Blackberry&lt;/a&gt; for backdoor access to its encrypted communications, coming close to &lt;a href="http://www.bbc.com/news/technology-10951607" target="_blank"&gt;banning&lt;/a&gt; the service, which &lt;a href="http://www.theregister.co.uk/2012/02/21/rim_india_bbn_server/" target="_blank"&gt;dissipated&lt;/a&gt; only once the company lost its market share. There have been similar  attempts to force Voice over Internet Protocol providers to fall in  line, including &lt;a href="http://timesofindia.indiatimes.com/india/Spooks-want-govt-to-block-Skype/articleshow/5082066.cms" target="_blank"&gt;Skype&lt;/a&gt; and &lt;a href="http://www.bbc.com/news/technology-11137647" target="_blank"&gt;Google&lt;/a&gt;. And there is a new thrust underway to regulate &lt;a href="http://www.trai.gov.in/WriteReaddata/ConsultationPaper/Document/OTT-CP-27032015.pdf" target="_blank"&gt;over-the-top&lt;/a&gt; content providers, including US companies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The policy could represent a new phase in India’s &lt;a href="http://arstechnica.co.uk/tech-policy/2015/09/india-joins-war-on-crypto-wants-everyone-to-keep-plaintext-copies-of-all-encrypted-data-for-90-days/" target="_blank"&gt;crypto-wars&lt;/a&gt;.  The government, emboldened by the sheer scale of the country’s market,  might press an unyielding demand for communications backdoors. The  policy made no bones of this desire: it sought to bind communications  companies by mandatory contracts, regulate key-size and algorithms,  compel surrender of encryption products including “working copies” of  software (the key generation mechanism), and more.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The motives of regulation&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The policy’s deeply intrusive provisions manifest a &lt;a href="http://thewire.in/2015/05/30/mastering-the-art-of-keeping-indians-under-surveillance-2756/" target="_blank"&gt;long-standing effort&lt;/a&gt; of the Indian state to dominate communications technology unimpeded by  privacy concerns. From wiretaps to Internet metadata, intrusive  surveillance is not judicially warranted, does not require the  demonstration of probable cause, suffers no external oversight, and is  secret. These shortcomings are enabling the creation of a sophisticated &lt;a href="http://www.thehoot.org/media-watch/digital-media/turning-india-into-a-surveillance-state-i-7149" target="_blank"&gt;surveillance state&lt;/a&gt; that sits ill with India’s constitutional values.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Those values are being steadily besieged.  India’s Supreme Court is entertaining a surge of clamorous litigation  to check an increasingly intrusive state. Only a few months ago, the  Attorney-General – the government’s foremost lawyer – argued in court  that Indians &lt;a href="http://thewire.in/2015/08/02/the-battle-for-a-right-to-privacy-still-has-a-long-way-to-go-7685/" target="_blank"&gt;did not have&lt;/a&gt; a right to privacy, relying on 1950s case law which permitted invasive  surveillance. Encryption which can inexpensively lock the state out of  private communications alarms the Indian government, which is why it has  skirmished with commercially-available encryption in the past.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On the other hand, the conflict over encryption is fueled by irregular laws. Telecoms licensing regulations restrict &lt;a href="http://dot.gov.in/sites/default/files/Internet%20Service%20Guideline%2024-08-07.doc" target="_blank"&gt;Internet Service Providers&lt;/a&gt; to 40-bit symmetric keys, a primitively low standard; higher encryption  requires permission and presumably surrender of the shared key to the  government. &lt;a href="http://www.sebi.gov.in/cms/sebi_data/commondocs/anncir2_p.pdf" target="_blank"&gt;Securities trading&lt;/a&gt; on the Internet requires 128-bit SSL/TLS encryption while the country’s &lt;a href="https://www.rbi.org.in/scripts/BS_ViewMasCirculardetails.aspx?id=8992" target="_blank"&gt;central bank&lt;/a&gt; is pushing for end-to-end encryption for mobile banking. Seen in this  light, the policy could simply be an attempt to rationalize an uneven  field.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Encryption and freedom&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Perhaps the government was trying to restrict the use of public key encryption and Internet anonymization services, such as &lt;a href="https://www.torproject.org/" target="_blank"&gt;Tor&lt;/a&gt; or &lt;a href="https://geti2p.net/en/" target="_blank"&gt;I2P&lt;/a&gt;, by individuals. India’s telecoms minister &lt;a href="http://indianexpress.com/article/india/india-others/government-withdraws-draft-national-encryption-policy-after-furore/" target="_blank"&gt;stated&lt;/a&gt;:  “The purport of this encryption policy relates only to those who  encrypt.” This was not particularly illuminating. If the government  wants to pre-empt terrorism – a legitimate duty, this approach is flawed  since regardless of the law’s command arguably no terrorist will  disclose her key to the government. Besides, since there are &lt;a href="http://geography.oii.ox.ac.uk/?page=tor" target="_blank"&gt;very few&lt;/a&gt; Internet anonymizers in India who are anyway &lt;a href="https://www.washingtonpost.com/world/national-security/secret-nsa-documents-show-campaign-against-tor-encrypted-network/2013/10/04/610f08b6-2d05-11e3-8ade-a1f23cda135e_story.html" target="_blank"&gt;targeted&lt;/a&gt; for special &lt;a href="http://www.cnet.com/news/nsa-likely-targets-anybody-whos-tor-curious/" target="_blank"&gt;monitoring&lt;/a&gt;, it would be more productive for the surveillance establishment to maintain the status quo.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This leaves harmless encrypters –  businesses, journalists, whistle blowers, and innocent privacy  enthusiasts. For this group, impediments to encryption interferes with  their ability to freely communicate. There is a proportionate link  between encryption and the freedom of speech and expression, a fact  acknowledged by &lt;a href="http://www.ohchr.org/EN/Issues/FreedomOpinion/Pages/OpinionIndex.aspx" target="_blank"&gt;Special Rapporteur&lt;/a&gt; David Kaye of the UN Human Rights Council, where &lt;a href="http://www.ohchr.org/EN/HRBodies/HRC/Pages/MembersByGroup.aspx" target="_blank"&gt;India&lt;/a&gt; is a participating member. Kaye &lt;a href="http://www.ohchr.org/EN/HRBodies/HRC/RegularSessions/Session29/Documents/A.HRC.29.32_AEV.doc" target="_blank"&gt;notes&lt;/a&gt;:  “Encryption and anonymity are especially useful for the development and  sharing of opinions, which often occur through online correspondence  such as e-mail, text messaging, and other online interactions.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is because encryption affords privacy which promotes free speech, a relationship &lt;a href="http://www.ohchr.org/Documents/HRBodies/HRCouncil/RegularSession/Session23/A.HRC.23.40_EN.pdf" target="_blank"&gt;reiterated&lt;/a&gt; by the previous UN Special Rapporteur, Frank La Rue. On the other hand, surveillance has a “&lt;a href="http://scholarship.law.wm.edu/cgi/viewcontent.cgi?article=2010&amp;amp;context=facpubs" target="_blank"&gt;chilling effect&lt;/a&gt;” on speech. In 1962, Justice Subba Rao’s &lt;a href="http://liiofindia.org/in/cases/cen/INSC/1962/377.html" target="_blank"&gt;famous dissent&lt;/a&gt; in the Indian Supreme Court presciently connected privacy and free speech:&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;
&lt;p&gt;The act of surveillance is certainly a  restriction on the [freedom of speech]. It cannot be suggested that the  said freedom…will sustain only the mechanics of speech and expression.  An illustration will make our point clear. A visitor, whether a wife,  son or friend, is allowed to be received by a prisoner in the presence  of a guard. The prisoner can speak with the visitor; but, can it be  suggested that he is fully enjoying the said freedom? It is impossible  for him to express his real and intimate thoughts to the visitor as  fully as he would like. To extend the analogy to the present case is to  treat the man under surveillance as a prisoner within the confines of  our country and the authorities enforcing surveillance as guards. So  understood, it must be held that the petitioner’s freedom under [the  right to free speech under the Indian] Constitution is also infringed.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Kharak Singh&lt;/i&gt; v. &lt;i&gt;State of Uttar Pradesh&lt;/i&gt; (1964) 1 SCR 332, pr. 30.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Perhaps the policy expressed the  government’s discomfort at individual encrypters escaping surveillance,  like free agents evading the state’s control. How should the law respond  to this problem? Daniel Solove &lt;a href="http://yalepress.yale.edu/book.asp?isbn=9780300172317" target="_blank"&gt;says&lt;/a&gt; the security of the state need not compromise individual privacy. On the other hand, as Ronald Dworkin &lt;a href="http://www.hup.harvard.edu/catalog.php?isbn=9780674867116" target="_blank"&gt;influentially maintained&lt;/a&gt;, the freedoms of the individual precede the interests of the state.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Security and trade interests&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, even when assessed from the  perspective of India’s security imperatives, the policy would have had  harmful consequences. It required users of encryption, including  businesses and consumers, to store plaintext versions of their  communications for ninety days to surrender to the government upon  demand. This outrageously ill-conceived provision would have created  real ‘&lt;a href="https://en.wikipedia.org/wiki/Honeypot_%28computing%29" target="_blank"&gt;honeypots&lt;/a&gt;’ (originally, honeypots are &lt;a href="http://time.com/3094404/defcon-hackers-robocalls-honeypot/" target="_blank"&gt;decoy&lt;/a&gt; servers to lure hackers) of unencrypted data, ripe for theft. Note that India does not have a data breach law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The policy’s demand for encryption  companies to register their products and give working copies of their  software and encryption mechanisms to the Indian government would have  flown in the face of trade secrecy and intellectual property protection.  The policy’s hurried withdrawal was a &lt;a href="http://www.reuters.com/article/2015/09/22/us-india-encryption-law-idUSKCN0RM1CO20150922" target="_blank"&gt;public relations&lt;/a&gt; exercise on the eve of Prime Minister Modi’s visit to Silicon Valley. It was &lt;a href="http://www.zdnet.com/article/indian-pm-modi-visits-us-tech-chiefs-in-wake-of-draconian-encryption-policy-debacle/" target="_blank"&gt;successful&lt;/a&gt;. Modi encountered no &lt;a href="https://www.hrw.org/mk/node/281554" target="_blank"&gt;criticism&lt;/a&gt; of his government’s &lt;a href="http://thewire.in/2015/08/02/the-battle-for-a-right-to-privacy-still-has-a-long-way-to-go-7685/" target="_blank"&gt;visceral opposition&lt;/a&gt; to privacy, even though the policy would have severely disrupted the  business practices of US communications providers operating in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Encryption invites a convergence of state interests between India and US as well: both countries want to &lt;a href="https://www.eff.org/document/crypto-wars-governments-working-undermine-encryption" target="_blank"&gt;control&lt;/a&gt; it. Last month’s &lt;a href="http://www.state.gov/r/pa/prs/ps/2015/09/247192.htm" target="_blank"&gt;joint statement&lt;/a&gt; from the US-India Strategic and Commercial &lt;a href="http://www.state.gov/p/sca/ci/in/strategicdialgue/" target="_blank"&gt;Dialogue&lt;/a&gt; pledges “further cooperation on internet and cyber issues”. This innocuous statement masks a &lt;a href="http://www.state.gov/r/pa/prs/ps/2014/09/232330.htm" target="_blank"&gt;robust&lt;/a&gt; information-gathering and -sharing regime. There is no guarantee  against the sharing of any encryption mechanisms or intercepted  communications by India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government has promised to return with a &lt;a href="http://indianexpress.com/article/india/india-others/government-withdraws-draft-national-encryption-policy-after-furore/" target="_blank"&gt;reworked&lt;/a&gt; proposal. It would be in India’s interest for this to be preceded by a  broad-based national discussion on encryption and its links to free  speech, privacy, security, and commerce.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;Click to read the post published on &lt;a class="external-link" href="http://notacoda.net/2015/10/10/the-short-lived-adventure-of-indias-encryption-policy/"&gt;Free Speech / Privacy / Technology website&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-short-lived-adventure-of-india2019s-encryption-policy'&gt;https://cis-india.org/internet-governance/blog/the-short-lived-adventure-of-india2019s-encryption-policy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bhairav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Encryption Policy</dc:subject>
    

   <dc:date>2015-11-29T09:03:42Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/predictive-policing-what-is-it-how-it-works-and-it-legal-implications">
    <title>Predictive Policing: What is it, How it works, and its Legal Implications</title>
    <link>https://cis-india.org/internet-governance/blog/predictive-policing-what-is-it-how-it-works-and-it-legal-implications</link>
    <description>
        &lt;b&gt;This article reviews literature surrounding big data and predictive policing and provides an analysis of the legal implications of using predictive policing techniques in the Indian context.&lt;/b&gt;
        &lt;h2 style="text-align: justify; "&gt;Introduction&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;For the longest time, humans have been obsessed with prediction. Perhaps the most well-known oracle in history, Pythia, the infallible Oracle of Delphi was 	said to predict future events in hysterical outbursts on the seventh day of the month, inspired by the god Apollo himself. This fascination with informing 	ourselves about future events has hardly subsided in us humans. What has changed however is the methods we employ to do so. The development of Big data 	technologies for one, has seen radical applications into many parts of life as we know it, including enhancing our ability to make accurate predictions 	about the future.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One notable application of Big data into prediction caters to another basic need since the dawn of human civilisation, the need to protect our communities 	and cities. The word 'police' itself originates from the Greek word '&lt;i&gt;polis'&lt;/i&gt;, which means city. The melding of these two concepts prediction and 	policing has come together in the practice of Predictive policing, which is the application of computer modelling to historical crime data and metadata to 	predict future criminal activity&lt;a href="#_ftn1" name="_ftnref1"&gt;[1]&lt;/a&gt;&lt;b&gt;. &lt;/b&gt;In the subsequent sections, I will attempt an 	introduction of predictive policing and explain some of the main methods within the domain of predictive policing. Because of the disruptive nature of 	these technologies, it will also be prudent to expand on the implications predictive technologies have for justice, privacy protections and protections 	against discrimination among others.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In introducing the concept of predictive policing, my first step is to give a short explanation about current predictive analytics techniques, because 	these techniques are the ones which are applied into a law enforcement context as predictive policing.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;What is predictive analysis&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Facilitated by the availability of big data, predictive analytics uses algorithms to recognise data patterns and predict future outcomes&lt;a href="#_ftn2" name="_ftnref2"&gt;[2]&lt;/a&gt;. Predictive analytics encompasses data mining, predictive modeling, machine learning, and forecasting&lt;a href="#_ftn3" name="_ftnref3"&gt;[3]&lt;/a&gt;. Predictive analytics also relies heavily on machine learning and artificial intelligence approaches	&lt;a href="#_ftn4" name="_ftnref4"&gt;[4]&lt;/a&gt;. The aim of such analysis is to identify relationships among variables that may not be immediately 	apparent using hypothesis-driven methods.&lt;a href="#_ftn5" name="_ftnref5"&gt;[5]&lt;/a&gt; In the mainstream media, one of the most infamous stories about the use of predictive analysis comes from USA, regarding a department store Target and their data analytics practices	&lt;a href="#_ftn6" name="_ftnref6"&gt;[6]&lt;/a&gt;. Target mined data from purchasing patterns of people who signed onto their baby registry. From this they 	were able to predict approximately when customers may be due and target advertisements accordingly. In the noted story, they were so successful that they 	predicted pregnancy before the pregnant girl's father knew she was pregnant. &lt;a href="#_ftn7" name="_ftnref7"&gt;[7]&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Examples of predictive analytics&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Predicting the success of a movie based on its online ratings&lt;a href="#_ftn8" name="_ftnref8"&gt;[8]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Many universities, sometimes in partnership with other firms use predictive analytics to provide course recommendations to students, track student 	performance, personalize curriculum to individual students and foster networking between students.&lt;a href="#_ftn9" name="_ftnref9"&gt;[9]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Predictive Analysis of Corporate Bond Indices Returns&lt;a href="#_ftn10" name="_ftnref10"&gt;[10]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style="text-align: justify; "&gt;Relationship between predictive analytics and predictive policing&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The same techniques used in many of the predictive methods mentioned above find application into some predictive policing methods. However two important 	points need to be raised:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;First, predictive analytics is actually a subset of predictive policing. This is because while the steps in creating a predictive model, of defining a target variable, exposing your model to training data, selecting appropriate features and finally running predictive analysis	&lt;a href="#_ftn11" name="_ftnref11"&gt;[11]&lt;/a&gt; maybe the same in a policing context, there are other methods which may be used to predict crime, but 	which do not rely on data mining. These techniques may instead use other methods, such as some of those detailed below along with data about historical 	crime to generate predictions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In her article "Policing by Numbers: Big Data and the Fourth Amendment"&lt;a href="#_ftn12" name="_ftnref12"&gt;[12]&lt;/a&gt;, Joh categorises 3 main 	applications of Big data into policing. These are Predictive Policing, Domain Awareness systems and Genetic Data Banks. Genetic data banks refer to 	maintaining large databases of DNA that was collected as part of the justice system. Issues arise when the DNA collected is repurposed in order to conduct 	familial searches, instead of being used for corroborating identity. Familial searches may have disproportionate impacts on minority races. Domain Awareness systems use various computer software and other digital surveillance tools such as Geographical Information Systems	&lt;a href="#_ftn13" name="_ftnref13"&gt;[13]&lt;/a&gt; or more illicit ones such as Black Rooms&lt;a href="#_ftn14" name="_ftnref14"&gt;[14]&lt;/a&gt; to "help police create a software-enhanced picture of the present, using thousands of data points from multiple sources within a city"	&lt;a href="#_ftn15" name="_ftnref15"&gt;[15]&lt;/a&gt;. I believe Joh was very accurate in separating Predictive Policing from Domain Awareness systems, 	especially when it comes to analysing the implications of the various applications of Big data into policing.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In such an analysis of the implications of using predictive policing methods, the issues surrounding predictive technologies often get conflated with 	larger issues about the application of big data into law enforcement. That opens the debate up to questions about overly intrusive evidence gathering and 	mass surveillance systems, which though used along with predictive technology, are not themselves predictive in nature. In this article, I aim to 	concentrate on the specific implications that arise due to predictive methods.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One important point regarding the impact of predictive policing is how the insights that predictive policing methods offer are used. There is much support 	for the idea that predictive policing does not replace policing methods, but actually augments them. The RAND report specifically cites one myth about 	predictive policing as "the computer will do everything for you&lt;a href="#_ftn16" name="_ftnref16"&gt;[16]&lt;/a&gt;". In reality police officers need to 	act on the recommendations provided by the technologies.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;What is Predictive policing?&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Predictive policing is the "application of analytical techniques-particularly quantitative techniques-to identify likely targets for police intervention 	and prevent crime or solve past crimes by making statistical predictions".&lt;a href="#_ftn17" name="_ftnref17"&gt;[17]&lt;/a&gt; It is important to note that 	the use of data and statistics to inform policing is not new. Indeed, even twenty years ago, before the deluge of big data we have today, law enforcement 	regimes such as the New York Police Department (NYPD) were already using crime data in a major way. In order to keep track of crime trends, NYPD used the 	software CompStat&lt;a href="#_ftn18" name="_ftnref18"&gt;[18]&lt;/a&gt; to map "crime statistics along with other indicators of problems, such as the 	locations of crime victims and gun arrests"&lt;a href="#_ftn19" name="_ftnref19"&gt;[19]&lt;/a&gt;. The senior officers used the information provided by CompStat to monitor trends of crimes on a daily basis and such monitoring became an instrumental way to track the performance of police agencies&lt;a href="#_ftn20" name="_ftnref20"&gt;[20]&lt;/a&gt;. CompStat has since seen application in many other jurisdictions	&lt;a href="#_ftn21" name="_ftnref21"&gt;[21]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But what is new is the amount of data available for collection, as well as the ease with which organisations can analyse and draw insightful results from 	that data. Specifically, new technologies allow for far more rigorous interrogation of data and wide-ranging applications, including adding greater 	accuracy to the prediction of future incidence of crime.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Predictive Policing methods&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Some methods of predictive policing involve application of known standard statistical methods, while other methods involve modifying these standard 	techniques. Predictive techniques that forecast future criminal activities can be framed around six analytic categories. They all may overlap in the sense 	that multiple techniques are used to create actual predictive policing software and in fact it is similar theories of criminology which undergird many of 	these methods, but the categorisation in such a way helps clarify the concept of predictive policing. The basis for the categorisation below comes from a RAND Corporation report entitled 'Predictive Policing: The Role of Crime Forecasting in Law Enforcement Operations'	&lt;a href="#_ftn22" name="_ftnref22"&gt;[22]&lt;/a&gt;, which is a comprehensive and detailed contribution to scholarship in this nascent area.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Hot spot analysis: Methods involving hot spot analysis attempt to "predict areas of increased crime risk based on historical crime data"&lt;a href="#_ftn23" name="_ftnref23"&gt;[23]&lt;/a&gt;. The premise behind such methods lies in the adage that "crime tends to be lumpy"	&lt;a href="#_ftn24" name="_ftnref24"&gt;[24]&lt;/a&gt;. Hot Spot analysis seeks to map out these previous incidences of crime in order to inform potential 	future crime.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Regression methods: A regression aims to find relationships between independent variables (factors that may influence criminal activity) and certain 	variables that one aims to predict. Hence, this method would track more variables than just crime history.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Data mining techniques: Data mining attempts to recognise patterns in data and use it to make predictions about the future. One important variant in the 	various types of data mining methods used in policing are different types of algorithms that are used to mine data in different ways. These are dependent 	on the nature of the data the predictive model was trained on and will be used to interrogate in the future. Two broad categories of algorithms commonly 	used are clustering algorithms and classification algorithms:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;· Clustering algorithms "form a class of data mining approaches that seek to group data into clusters with similar attributes"	&lt;a href="#_ftn25" name="_ftnref25"&gt;[25]&lt;/a&gt;. One example of clustering algorithms is spatial clustering algorithms, which use geospatial crime 	incident data to predict future hot spots for crime&lt;a href="#_ftn26" name="_ftnref26"&gt;[26]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;· Classification algorithms "seek to establish rules assigning a class or label to events"&lt;a href="#_ftn27" name="_ftnref27"&gt;[27]&lt;/a&gt;. These 	algorithms use training data sets "to learn the patterns that determine the class of an observation"&lt;a href="#_ftn28" name="_ftnref28"&gt;[28]&lt;/a&gt; The patterns identified by the algorithm will be applied to future data, and where applicable, the algorithm will recognise similar patterns in the data. 	This can be used to make predictions about future criminal activity for example.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Near-repeat methods: Near-repeat methods work off the assumption that future crimes will take place close to timing and location of current crimes. Hence, 	it could be postulated that areas of high crime will experience more crime in the near future&lt;a href="#_ftn29" name="_ftnref29"&gt;[29]&lt;/a&gt;. This involves the use of a 'self-exciting' algorithm, very similar to algorithms modelling earthquake aftershocks	&lt;a href="#_ftn30" name="_ftnref30"&gt;[30]&lt;/a&gt;. The premise undergirding such methods is very similar to that of hot spot analysis.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Spatiotemporal analysis&lt;b&gt;: &lt;/b&gt;Using "environmental and temporal features of the crime location"	&lt;a href="#_ftn31" name="_ftnref31"&gt;[31]&lt;/a&gt; as the basis for predicting future crime. By combining the spatiotemporal features of the crime area 	with crime incident data, police could use the resultant information to predict the location and time of future crimes. Examples of factors that may be 	considered include timing of crimes, weather, distance from highways, time from payday and many more.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Risk terrain analysis: Analyses other factors that are useful in predicting crimes. Examples of such factors include "the social, physical, and behavioural 	factors that make certain areas more likely to be affected by crime"&lt;a href="#_ftn32" name="_ftnref32"&gt;[32]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Various methods listed above are used, often together, to predict the where and when a crime may take place or even potential victims. The unifying thread 	which relates these methods is their dependence on historical crime data.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Examples of predictive policing:&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Most uses of predictive policing that have been studied and reviewed in scholarly work come from the USA, though I will detail one case study from 	Derbyshire, UK. Below is a collation of various methods that are a practical application of the methods raised above.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Hot Spot analysis in Sacramento: In February 2011, Sacramento Police Department began using hot spot analysis along with research on optimal patrol 	time to act as a sufficient deterrent to inform how they patrol high-risk areas. This policy was aimed at preventing serious crimes by patrolling these 	predicted hot spots. In places where there was such patrolling, serious crimes reduced by a quarter with no significant increases such crimes in 	surrounding areas&lt;a href="#_ftn33" name="_ftnref33"&gt;[33]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Data Mining and Hot Spot Mapping in Derbyshire, UK: The Safer Derbyshire Partnership, a group of law enforcement agencies and municipal authorities 	sought to identify juvenile crime hotspots&lt;a href="#_ftn34" name="_ftnref34"&gt;[34]&lt;/a&gt;. They used MapInfo software to combine "multiple discrete data sets to create detailed maps and visualisations of criminal activity, including temporal and spatial hotspots"	&lt;a href="#_ftn35" name="_ftnref35"&gt;[35]&lt;/a&gt;. This information informed law enforcement about how to optimally deploy their resources.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Regression models in Pittsburgh: Researchers used reports from Pittsburgh Bureau of Police about violent crimes and "leading indicator"	&lt;a href="#_ftn36" name="_ftnref36"&gt;[36]&lt;/a&gt; crimes, crimes that were relatively minor but which could be a sign of potential future violent 	offences. The researcher ran analysis of areas with violent crimes, which were used as the dependent variable in analysing whether violent crimes in 	certain areas could be predicted by the leading indicator data. From the 93 significant violent crime areas that were studied, 19 areas were successfully 	predicted by the leading indicator data.&lt;a href="#_ftn37" name="_ftnref37"&gt;[37]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Risk terrain modelling analysis in Morris County, New Jersey: Police in Morris County, used risk terrain analysis to tackle violent crimes and 	burglaries. They considered five inputs in their model: "past burglaries, the address of individuals recently arrested for property crimes, proximity to major highways, the geographic concentration of young men and the location of apartment complexes and hotels."	&lt;a href="#_ftn38" name="_ftnref38"&gt;[38]&lt;/a&gt; The Morris County law enforcement officials linked the significant reductions in violent and property 	crime to their use of risk terrain modelling&lt;a href="#_ftn39" name="_ftnref39"&gt;[39]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Near-repeat &amp;amp; hot spot analysis used by Santa Cruz Police Department: Uses PredPol software that applies the Mohler's algorithm	&lt;a href="#_ftn40" name="_ftnref40"&gt;[40]&lt;/a&gt; to a database with five years' worth of crime data to assess the likelihood of future crime occurring 	in the geographic areas within the city. Before going on shift, officers receive information identifying 15 such areas with the highest probability of 	crime&lt;a href="#_ftn41" name="_ftnref41"&gt;[41]&lt;/a&gt;. The initiative has been cited as being very successful at reducing burglaries, and was used in 	Los Angeles and Richmond, Virginia&lt;a href="#_ftn42" name="_ftnref42"&gt;[42]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Data Mining and Spatiotemporal analysis to predict future criminal activities in Chicago: Officers in Chicago Police Department made visits to 	people their software predicted were likely to be involved in violent crimes&lt;a href="#_ftn43" name="_ftnref43"&gt;[43]&lt;/a&gt;, guided by an 	algorithm-generated "Heat List"&lt;a href="#_ftn44" name="_ftnref44"&gt;[44]&lt;/a&gt;. Some of the inputs used in the predictions include some types of 	arrest records, gun ownership, social networks&lt;a href="#_ftn45" name="_ftnref45"&gt;[45]&lt;/a&gt; (police analysis of social networking is also a rising trend in predictive policing&lt;a href="#_ftn46" name="_ftnref46"&gt;[46]&lt;/a&gt;) and generally type of people you are acquainted with	&lt;a href="#_ftn47" name="_ftnref47"&gt;[47]&lt;/a&gt; among others, but the full list of the factors are not public. The list sends police officers (or 	sometimes mails letters) to peoples' homes to offer social services or deliver warnings about the consequences for offending. Based in part on the 	information provided by the algorithm, officers may provide people on the Heat List information about vocational training programs or warnings about how 	Federal Law provides harsher punishments for reoffending&lt;a href="#_ftn48" name="_ftnref48"&gt;[48]&lt;/a&gt;.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Predictive policing in India&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;In this section, I map out some of the developments in the field of predictive policing within India. On the whole, predictive policing is still very new 	in India, with Jharkhand being the only state that appears to already have concrete plans in place to introduce predictive policing.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Jharkhand Police&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Jharkhand police began developing their IT infrastructure such as a Geographic Information System (GIS) and Server room when they received funding for 	Rs. 18.5 crore from the Ministry of Home Affairs&lt;a href="#_ftn49" name="_ftnref49"&gt;[49]&lt;/a&gt;. The Open Group on E-governance (OGE), founded as a 	collaboration between the Jharkhand Police and National Informatics Centre&lt;a href="#_ftn50" name="_ftnref50"&gt;[50]&lt;/a&gt;, is now a multi-disciplinary 	group which takes on different projects related to IT&lt;a href="#_ftn51" name="_ftnref51"&gt;[51]&lt;/a&gt;. With regards to predictive policing, some 	members of OGE began development in 2013 of data mining software which will scan online records that are digitised. The emerging crime trends "can be a 	building block in the predictive policing project that the state police want to try."&lt;a href="#_ftn52" name="_ftnref52"&gt;[52]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Jharkhand Police was also reported in 2012 to be in the final stages of forming a partnership with IIM-Ranchi&lt;a href="#_ftn53" name="_ftnref53"&gt;[53]&lt;/a&gt;. It was alleged the Jharkhand police aimed to tap into IIM's advanced business analytics skills	&lt;a href="#_ftn54" name="_ftnref54"&gt;[54]&lt;/a&gt;, skills that can be very useful in a predictive policing context. Mr Pradhan suggested that 	"predictive policing was based on intelligence-based patrol and rapid response"&lt;a href="#_ftn55" name="_ftnref55"&gt;[55]&lt;/a&gt; and that it could go a 	long way to dealing with the threat of Naxalism in Jharkhand&lt;a href="#_ftn56" name="_ftnref56"&gt;[56]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, in Jharkhand, the emphasis appears to be targeted at developing a massive Domain Awareness system, collecting data and creating new ways to 	present that data to officers on the ground, instead of architecting and using predictive policing software. For example, the Jharkhand police now have in 	place "a Naxal Information System, Crime Criminal Information System (to be integrated with the CCTNS) and a GIS that supplies customised maps that are vital to operations against Maoist groups"&lt;a href="#_ftn57" name="_ftnref57"&gt;[57]&lt;/a&gt;. The Jharkhand police's "Crime Analytics Dashboard"	&lt;a href="#_ftn58" name="_ftnref58"&gt;[58]&lt;/a&gt; shows the incidence of crime according to type, location and presents it in an accessible portal, 	providing up-to-date information and undoubtedly raises the situational awareness of the officers. Arguably, the domain awareness systems that are taking 	shape in Jharkhand would pave the way for predictive policing methods to be applied in the future. These systems and hot spot maps seem to be the start of 	a new age of policing in Jharkhand.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Predictive Policing Research&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;One promising idea for predictive policing in India comes from the research conducted by Lavanya Gupta and others entitled "Predicting Crime Rates for 	Predictive Policing"&lt;a href="#_ftn59" name="_ftnref59"&gt;[59]&lt;/a&gt;, which was a submission for the Gandhian Young Technological Innovation Award. The 	research uses regression modelling to predict future crime rates. Drawing from First Information Reports (FIRs) of violent crimes (murder, rape, kidnapping 	etc.) from Chandigarh Police, the team attempted "to extrapolate annual crime rate trends developed through time series models. This approach also involves correlating past crime trends with factors that will influence the future scope of crime, in particular demographic and macro-economic variables"	&lt;a href="#_ftn60" name="_ftnref60"&gt;[60]&lt;/a&gt;. The researchers used early crime data as the training data for their model, which after some testing, 	eventually turned out to have an accuracy of around 88.2%.&lt;a href="#_ftn61" name="_ftnref61"&gt;[61]&lt;/a&gt; On the face of it, ideas like this could be 	the starting point for the introduction of predictive policing into India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The rest of India's law enforcement bodies do not appear to be lagging behind. In the 44&lt;sup&gt;th&lt;/sup&gt; All India police science congress, held in 	Gandhinagar, Gujarat in March this year, one of the Themes for discussion was the "Role of Preventive Forensics and latest developments in Voice 	Identification, Tele-forensics and Cyber Forensics"&lt;a href="#_ftn62" name="_ftnref62"&gt;[62]&lt;/a&gt;.Mr A K Singh, (Additional Director General of 	Police, Administration) the chairman of the event also said in an interview that there was to be a round-table DGs (Director General of Police) held at the 	conference to discuss predictive policing&lt;a href="#_ftn63" name="_ftnref63"&gt;[63]&lt;/a&gt;. Perhaps predictive policing in India may not be that far 	away from reality.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;CCTNS and the building blocks of Predictive policing&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Ministry of Home Affairs conceived of a Crime and Criminals Tracking and Network System (CCTNS) as part of national e-Governance plans. According to 	the website of the National Crime Records Bureau (NCRB), CCTNS aims to develop "a nationwide networked infrastructure for evolution of IT-enabled state-of-the-art tracking system around 'investigation of crime and detection of criminals' in real time"	&lt;a href="#_ftn64" name="_ftnref64"&gt;[64]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The plans for predictive policing seem in the works, but first steps that are needed in India across police forces involve digitizing data collection by 	the police, as well as connecting law enforcement agencies. The NCRB's website described the current possibility of exchange of information between 	neighbouring police stations, districts or states as being "next to impossible"&lt;a href="#_ftn65" name="_ftnref65"&gt;[65]&lt;/a&gt;. The aim of CCTNS is 	precisely to address this gap and integrate and connect the segregated law enforcement arms of the state in India, which would be a foundational step in 	any initiatives to apply predictive methods.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;What are the implications of using predictive policing? Lessons from USA&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Despite the moves by law enforcement agencies to adopt predictive policing, one reality is that the implications of predictive policing methods are far 	from clear. This section will examine these implications on the carriage of justice and its use in law, as well as how it impacts privacy concerns for the 	individual. It frames the existing debates surrounding these issues with predictive policing, and aims to apply these principles into an Indian context.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Justice, Privacy &amp;amp; IV Amendment&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Two key concerns about how predictive policing methods may be used by law enforcement relate to how insights from predictive policing methods are acted 	upon and how courts interpret them. In the USA, this issue may finds its place under the scope of IV Amendment jurisprudence. The IV amendment states that 	all citizens are "secure from unreasonable searches and seizures of property by the government"&lt;a href="#_ftn66" name="_ftnref66"&gt;[66]&lt;/a&gt;. In 	this sense, the IV amendment forms the basis for search and surveillance law in the USA.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A central aspect of the IV Amendment jurisprudence is drawn from &lt;i&gt;United States v. Katz&lt;/i&gt;. In &lt;i&gt;Katz&lt;/i&gt;, the FBI attached a microphone to the 	outside of a public phone booth to record the conversations of Charles Katz, who was making phone calls related to illegal gambling. The court ruled that 	such actions constituted a search within the auspices of the 4&lt;sup&gt;th&lt;/sup&gt; amendment. The ruling affirmed constitutional protection of all areas where 	someone has a "reasonable expectation of privacy"&lt;a href="#_ftn67" name="_ftnref67"&gt;[67]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Later cases have provided useful tests for situations where government surveillance tactics may or may not be lawful, depending on whether it violates 	one's reasonable expectation of privacy. For example, in &lt;i&gt;United States v. Knotts&lt;/i&gt;, the court held that "police use of an electronic beeper to 	follow a suspect surreptitiously did not constitute a Fourth Amendment search"&lt;a href="#_ftn68" name="_ftnref68"&gt;[68]&lt;/a&gt;. In fact, some argue 	that that the Supreme Court's reasoning in such cases suggests " any 'scientific enhancement' of the senses used by the police to watch activity falls 	outside of the Fourth Amendment's protections if the activity takes place in public"&lt;a href="#_ftn69" name="_ftnref69"&gt;[69]&lt;/a&gt;. This reasoning is 	based on the third party doctrine which holds that "if you voluntarily provide information to a third party, the IV Amendment does not preclude the 	government from accessing it without a warrant"&lt;a href="#_ftn70" name="_ftnref70"&gt;[70]&lt;/a&gt;. The clearest exposition of this reasoning was in Smith 	v. Maryland, where the presiding judges noted that "this Court consistently has held that a person has no legitimate expectation of privacy in information 	he voluntarily turns over to third parties"&lt;a href="#_ftn71" name="_ftnref71"&gt;[71]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, the third party has seen some challenge in recent time. In &lt;i&gt;United States v. Jones&lt;/i&gt;, it was ruled that the government's warrantless GPS 	tracking of his vehicle 24 hours a day for 28 days violated his Fourth Amendment rights&lt;a href="#_ftn72" name="_ftnref72"&gt;[72]&lt;/a&gt;. Though the 	majority ruling was that warrantless GPS tracking constituted a search, it was in a concurring opinion written by Justice Sonya Sotomayor that such 	intrusive warrantless surveillance was said to infringe one's reasonable expectation of privacy. As Newell reflected on Sotomayor's opinion,&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Justice Sotomayor stated that the time had come for Fourth Amendment jurisprudence to discard the premise that legitimate expectations of privacy could 	only be found in situations of near or complete secrecy. Sotomayor argued that people should be able to maintain reasonable expectations of privacy in some 	information voluntarily disclosed to third parties"&lt;a href="#_ftn73" name="_ftnref73"&gt;[73]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;She said that the court's current reasoning on what constitutes reasonable expectations of privacy in information disclosed to third parties, such as email 	or phone records or even purchase histories, is "ill-suited to the digital age, in which people reveal a great deal of information about themselves to 	third parties in the course of carrying out mundane tasks"&lt;a href="#_ftn74" name="_ftnref74"&gt;[74]&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Predictive policing vs. Mass surveillance and Domain Awareness Systems&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;However, there is an important distinction to be drawn between these cases and evidence from predictive policing. This has to do with the difference in 	nature of the evidence collection. Arguably, from Jones and others, what we see is that use of mass surveillance and domain awareness systems, drawing from 	Joh's categorisation of domain awareness systems as being distinct from predictive policing mentioned above, could potentially encroach on one's reasonable 	expectation of privacy. However, I think that predictive policing, and the possible implications for justice associated with it, its predictive harms, are 	quite distinct from what has been heard by courts thus far.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The reason for distinct risks between predictive harms and privacy harms originating from information gathering is related to the nature of predictive 	policing technologies, and how they are used. It is highly unlikely that the evidence submitted by the State to indict an offender will be mainly 	predictive in nature. For example, would it be possible to convict an accused person solely on the premise that he was predicted to be highly likely to commit a crime, and that subsequently he did? The legal standard of proving guilt beyond a reasonable doubt	&lt;a href="#_ftn75" name="_ftnref75"&gt;[75]&lt;/a&gt; can hardly be met solely on predictive evidence for a multitude of reasons. Predictive policing 	methods could at most, be said to inform police about the risk of someone committing a crime or of crime happening at a certain location, as demonstrated 	above.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;Predictive policing and Criminal Procedure&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;It may therefore pay to analyse how predictive policing may be used across the various processes within the criminal justice system. In fact, in an 	analysis of the various stages of criminal procedure, from opening an investigation to gathering evidence, followed by arrest, trial, conviction and 	sentencing, we see that as the individual gets subject to more serious incursions or sanctions by the state, it takes a higher standard of certainty about 	wrongdoing and a higher burden of proof, in order to legitimize that particular action.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Hence, at more advanced stages of the criminal justice process such as seeking arrest warrants or trial, it is very unlikely that predictive policing on 	its own can have a tangible impact, because the nature of predictive evidence is probability based. It aims to calculate the risk of future crime occurring 	based on statistical analysis of past crime data&lt;a href="#_ftn76" name="_ftnref76"&gt;[76]&lt;/a&gt;. While extremely useful, probabilities on their own 	will not come remotely close meet the legal standards of proving 'guilt beyond reasonable doubt'. It may be at the earlier stages of the criminal justice 	process that evidence predictive policing might see more widespread application, in terms of applying for search warrants and searching suspicious people 	while on patrol.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In fact, in the law enforcement context, prediction as a concept is not new to justice. Both courts and law enforcement officials already make predictions 	about future likelihood of crimes. In the case of issuing warrants, the IV amendment makes provisions that law enforcement officials show that the potential search is based "upon probable cause"&lt;a href="#_ftn77" name="_ftnref77"&gt;[77]&lt;/a&gt; in order for a judge to grant a warrant. In	&lt;i&gt;US v. Brinegar&lt;/i&gt;, probable cause was defined as existing "where the facts and circumstances within the officers' knowledge, and of which they have reasonably trustworthy information, are sufficient in themselves to warrant a belief by a man of reasonable caution that a crime is being committed"	&lt;a href="#_ftn78" name="_ftnref78"&gt;[78]&lt;/a&gt;. Again, this legal standard seems too high for predictive evidence meet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, the police also have an important role to play in preventing crimes by looking out for potential crimes while on patrol or while doing 	surveillance. When the police stop a civilian on the road to search him, reasonable suspicion must be established. This standard of reasonable suspicion 	was defined in most clearly in &lt;i&gt;Terry v. Ohio&lt;/i&gt;, which required police to "be able to point to specific and articulable facts which, taken together 	with rational inferences from those facts, reasonably warrant that intrusion"&lt;a href="#_ftn79" name="_ftnref79"&gt;[79]&lt;/a&gt;. Therefore, "reasonable 	suspicion that 'criminal activity may be afoot' is at base a prediction that the facts and circumstances warrant the reasonable prediction that a crime is 	occurring or will occur"&lt;a href="#_ftn80" name="_ftnref80"&gt;[80]&lt;/a&gt;. Despite the assertion that "there are as of yet no reported cases on 	predictive policing in the Fourth Amendment context"&lt;a href="#_ftn81" name="_ftnref81"&gt;[81]&lt;/a&gt;, examining the impact of predictive policing on the doctrine of reasonable suspicion could be very instructive in understanding the implications for justice and privacy	&lt;a href="#_ftn82" name="_ftnref82"&gt;[82]&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Predictive Policing and Reasonable Suspicion&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Ferguson's insightful contribution to this area of scholarship involves the identification of existing areas where prediction already takes place in 	policing, and analogising them into a predictive policing context&lt;a href="#_ftn83" name="_ftnref83"&gt;[83]&lt;/a&gt;. These three areas are: responding to 	tips, profiling, and high crime areas (hot spots).&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;Tips&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Tips are pieces of information shared with the police by members of the public. Often tips, either anonymous or from known police informants, may predict 	future actions of certain people, and require the police to act on this information. The precedent for understanding the role of tips in probable cause 	comes from &lt;i&gt;Illinois v. Gates&lt;/i&gt;&lt;a href="#_ftn84" name="_ftnref84"&gt;[84]&lt;/a&gt;. It was held that "an informant's 'veracity,' 'reliability,' and 	'basis of knowledge'-remain 'highly relevant in determining the value'"&lt;a href="#_ftn85" name="_ftnref85"&gt;[85]&lt;/a&gt; of the said tip. Anonymous tips need to be detailed, timely and individualised enough&lt;a href="#_ftn86" name="_ftnref86"&gt;[86]&lt;/a&gt; to justify reasonable suspicion	&lt;a href="#_ftn87" name="_ftnref87"&gt;[87]&lt;/a&gt;. And when the informant is known to be reliable, then his prior reliability may justify reasonable 	suspicion despite lacking a basis in knowledge&lt;a href="#_ftn88" name="_ftnref88"&gt;[88]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ferguson argues that whereas predictive policing cannot provide individualised tips, it is possible to consider reliable tips about certain areas as a 	parallel to predictive policing&lt;a href="#_ftn89" name="_ftnref89"&gt;[89]&lt;/a&gt;. And since the courts had shown a preference for reliability even in the face of a weak basis in knowledge, it is possible to see the reasonable suspicion standard change in its application&lt;a href="#_ftn90" name="_ftnref90"&gt;[90]&lt;/a&gt;. It also implies that IV protections may be different in places where crime is predicted to occur	&lt;a href="#_ftn91" name="_ftnref91"&gt;[91]&lt;/a&gt;.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;Profiling&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Despite the negative connotations and controversial overtones at the mere sound of the word, profiling is already a method commonly used by law 	enforcement. For example, after a crime has been committed and general features of the suspect identified by witnesses, police often stop civilians who fit 	this description. Another example of profiling is common in combating drug trafficking&lt;a href="#_ftn92" name="_ftnref92"&gt;[92]&lt;/a&gt;, where agents 	keep track of travellers at airports to watch for suspicious behaviour. Based on their experience of common traits which distinguish drug traffickers from regular travellers (a profile), agents may search travellers if they fit the profile&lt;a href="#_ftn93" name="_ftnref93"&gt;[93]&lt;/a&gt;. In the case of	&lt;i&gt;United States v. Sokolow&lt;/i&gt;&lt;a href="#_ftn94" name="_ftnref94"&gt;[94]&lt;/a&gt;, the courts "recognized that a drug courier profile is not an irrelevant or inappropriate consideration that, taken in the totality of circumstances, can be considered in a reasonable suspicion determination"	&lt;a href="#_ftn95" name="_ftnref95"&gt;[95]&lt;/a&gt;. Similar lines of thinking could be employed in observing people exchanging small amounts of money in 	an area known for high levels of drug activity, conceiving predictive actions as a form of profile&lt;a href="#_ftn96" name="_ftnref96"&gt;[96]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is valid to consider predictive policing as a form of profiling&lt;a href="#_ftn97" name="_ftnref97"&gt;[97]&lt;/a&gt;, but Ferguson argues that the 	predictive policing context means this 'new form' of profiling could change IV analysis. The premise behind such an argument lies in the fact that a 	prediction made by some algorithm about potential high risk of crime in a certain area, could be taken in conjunction observations of ordinarily innocuous events. Read in the totality of circumstances, these two threads may justify individual reasonable suspicion	&lt;a href="#_ftn98" name="_ftnref98"&gt;[98]&lt;/a&gt;. For example, a man looking into cars at a parking lot may not by itself justify reasonable suspicion, 	but taken together with a prediction of high risk of car theft at that locality, it may well justify reasonable suspicion. It is this impact of predictive 	policing, which influences the analysis of reasonable suspicion in a totality of circumstances that may represent new implications for courts looking at IV 	amendment protections.&lt;/p&gt;
&lt;h5 style="text-align: justify; "&gt;Profiling, Predictive Policing and Discrimination&lt;/h5&gt;
&lt;p style="text-align: justify; "&gt;The above sections have already brought up the point that law enforcement agencies already utilize profiling methods in their operations. Also, as the 	sections on how predictive analytics works and on methods of predictive policing make clear, predictive policing definitely incorporates the development of 	profiles for predicting future criminal activity. Concerns about predictive models generate potentially discriminatory predictions therefore are very 	serious, and need addressing. Potential discrimination may be either overt, though far less likely, or unintended. A valuable case study of which sheds 	light on such discriminatory data mining practices can be found in US Labour law. It was shown how predictive models could be discriminatory at various stages, from conceptualising the model and training it with training data, to eventually selecting inappropriate features to search for	&lt;a href="#_ftn99" name="_ftnref99"&gt;[99]&lt;/a&gt;. It is also possible for data scientists to (intentionally or not) use proxies for identifiers like 	race, income level, health condition and religion. Barocas and Selbst argue that "the current distribution of relevant attributes-attributes that can and should be taken into consideration in apportioning opportunities fairly-are demonstrably correlated with sensitive attributes"	&lt;a href="#_ftn100" name="_ftnref100"&gt;[100]&lt;/a&gt;. Hence, what may result is unintended discrimination, as predictive models and their subjective and 	implicit biases are reflected in predicted decisions, or that the discrimination is not even accounted for in the first place. While I have not found any 	case law where courts have examined such situations in a criminal context, at the very least, law enforcement agencies need to be aware of these 	possibilities and guard against any forms of discriminatory profiling.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, Ferguson argues that "the precision of the technology may in fact provide more protection for citizens in broadly defined high crime areas"	&lt;a href="#_ftn101" name="_ftnref101"&gt;[101]&lt;/a&gt;. This is because the label of a 'high-crime area' may no longer apply to large areas but instead to 	very specific areas of criminal activity. This implies that previously defined areas of high crime, like entire neighbourhoods may not be scrutinised in 	such detail. Instead, police now may be more precise in locating and policing areas of high crime, such as an individual street corner or a particular 	block of flats instead of an entire locality.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;Hot Spots&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Courts have also considered the existence of notoriously 'high-crime areas as part of considering reasonable suspicion&lt;a href="#_ftn102" name="_ftnref102"&gt;[102]&lt;/a&gt;. This was seen in &lt;i&gt;Illinois v. Wardlow&lt;/i&gt; &lt;a href="#_ftn103" name="_ftnref103"&gt;[103]&lt;/a&gt;, where the "high crime nature of an area can be considered in evaluating the officer's objective 	suspicion"&lt;a href="#_ftn104" name="_ftnref104"&gt;[104]&lt;/a&gt;. Many cases have since applied this reasoning without scrutinising the predictive value 	of such a label. In fact, Ferguson asserts that such labelling has questionable evidential value&lt;a href="#_ftn105" name="_ftnref105"&gt;[105]&lt;/a&gt;. He 	uses the facts of the &lt;i&gt;Wardlow &lt;/i&gt;case itself to challenge the 'high crime area' factor. Ferguson cites the reasoning of one of the judges in the 	case:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"While the area in question-Chicago's District 11-was a low-income area known for violent crimes, how that information factored into a predictive judgment 	about a man holding a bag in the afternoon is not immediately clear."&lt;a href="#_ftn106" name="_ftnref106"&gt;[106]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Especially because "the most basic models of predictive policing rely on past crimes"&lt;a href="#_ftn107" name="_ftnref107"&gt;[107]&lt;/a&gt;, it is likely 	that the predictive policing methods like hot spot or spatiotemporal analysis and risk terrain modelling may help to gather or build data models about high 	crime areas. Furthermore, the mathematical rigour of the predictive modelling could help clarify the term 'high crime area'. As Ferguson argues, "courts may no longer need to rely on the generalized high crime area terminology when more particularized and more relevant information is available"	&lt;a href="#_ftn108" name="_ftnref108"&gt;[108]&lt;/a&gt;.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;Summary&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Ferguson synthesises four themes to which encapsulate reasonable suspicion analysis:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt; Predictive information is not enough on its own. Instead, it is "considered relevant to the totality of circumstances, but must be corroborated by 	direct police observation"&lt;a href="#_ftn109" name="_ftnref109"&gt;[109]&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;The prediction must also "be particularized to a person, a profile, or a place, in a way that directly connects the suspected crime to the suspected 	person, profile, or place"&lt;a href="#_ftn110" name="_ftnref110"&gt;[110]&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;It must also be detailed enough to distinguish a person or place from others not the focus of the prediction	&lt;a href="#_ftn111" name="_ftnref111"&gt;[111]&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Finally, predicted information becomes less valuable over time. Hence it must be acted on quickly or be lost	&lt;a href="#_ftn112" name="_ftnref112"&gt;[112]&lt;/a&gt;.&lt;/li&gt;
&lt;/ol&gt;
&lt;h4 style="text-align: justify; "&gt;Conclusions from America&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;The main conclusion to draw from the analysis of the parallels between existing predictions in IV amendment law and predictive policing is that "predictive policing will impact the reasonable suspicion calculus by becoming a factor within the totality of circumstances test"&lt;a href="#_ftn113" name="_ftnref113"&gt;[113]&lt;/a&gt;. Naturally, it reaffirms the imperative for predictive techniques to collect reliable data	&lt;a href="#_ftn114" name="_ftnref114"&gt;[114]&lt;/a&gt; and analyse it transparently&lt;a href="#_ftn115" name="_ftnref115"&gt;[115]&lt;/a&gt;. Moreover, in 	order for courts to evaluate the reliability of the data and the processes used (since predictive methods become part of the reasonable suspicion 	calculus), courts need to be able to analyse the predictive process. This has implications for the how hearings may be conducted, for how legal 	adjudicators may require training and many more. Another important concern is that the model of predictive information and police corroboration or direct 	observation&lt;a href="#_ftn116" name="_ftnref116"&gt;[116]&lt;/a&gt; may mean that in areas which were predicted to have low risk of crime, the reasonable 	suspicion doctrine works against law enforcement. There may be less effort paid to patrolling these other areas as a result of predictions.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Implications for India&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;While there have been no cases directly involving predictive policing methods, it would be prudent to examine the parts of Indian law which would inform 	the calculus on the lawfulness of using predictive policing methods. A useful lens to examine this might be found in the observation that prediction is not 	in itself a novel concept in justice, and is already used by courts and law enforcement in numerous circumstances.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Criminal Procedure in Non-Warrant Contexts&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The most logical way to begin analysing the legal implications of predictive policing in India may probably involve identifying parallels between American 	and Indian criminal procedure, specifically searching for instances where 'reasonable suspicion' or some analogous requirement exists for justifying police 	searches.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In non-warrant scenarios, we find conditions for officers to conduct such a warrantless search in Section 165 of the Criminal Procedure Code (Cr PC). For 	clarity purposes I have stated section 165 (1) in full:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Whenever an officer in charge of a police station or a police officer making an investigation &lt;b&gt;has reasonable grounds&lt;/b&gt; for believing that 	anything necessary for the purposes of an investigation into any offence which he is authorised to investigate may be found in any place with the limits of 	the police station of which he is in charge, or to which he is attached, and that such thing cannot in his opinion be otherwise obtained without undue 	delay, such officer may, after recording in writing the grounds of his belief and specifying in such writing, so far as possible, the thing for which search is to be made, search, or cause search to be made, for such thing in any place within the limits of such station."	&lt;a href="#_ftn117" name="_ftnref117"&gt;[117]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, India differs from the USA in that its Cr PC allows for police to arrest individuals without a warrant as well. As observed in	&lt;i&gt;Gulab Chand Upadhyaya vs State Of U.P&lt;/i&gt;, "Section 41 Cr PC gives the power to the police to arrest without warrant in cognizable offences, in cases enumerated in that Section. One such case is of receipt of a 'reasonable complaint' or 'credible information' or 'reasonable suspicion'"	&lt;a href="#_ftn118" name="_ftnref118"&gt;[118]&lt;/a&gt; Like above, I have stated section 41 (1) and subsection (a) in full:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"41. When police may arrest without warrant.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://indiankanoon.org/doc/507354/"&gt;(1)&lt;/a&gt; Any police officer may without an order from a Magistrate and without a warrant, arrest any person-&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://indiankanoon.org/doc/1315149/"&gt;(a)&lt;/a&gt; who has been concerned in any cognizable offence, or against whom a	&lt;b&gt;reasonable complaint has been made, or credible information has been received, or a reasonable suspicion exists&lt;/b&gt;, of his having been so 	concerned"&lt;a href="#_ftn119" name="_ftnref119"&gt;[119]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In analysing the above sections of Indian criminal procedure from a predictive policing angle, one may find both similarities and differences between the 	proposed American approach and possible Indian approaches to interpreting or incorporating predictive policing evidence.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;Similarity of 'reasonable suspicion' requirement&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;For one, the requirement for "reasonable grounds" or "reasonable suspicion" seems to be analogous to the American doctrine of reasonable suspicion. This 	suggests that the concepts used in forming reasonable suspicion, for the police to "be able to point to specific and articulable facts which, taken 	together with rational inferences from those facts, reasonably warrant that intrusion"&lt;a href="#_ftn120" name="_ftnref120"&gt;[120]&lt;/a&gt; may also be 	useful in the Indian context.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One case which sheds light on an Indian interpretation of reasonable suspicion or grounds is	&lt;i&gt;State of Punjab v. Balbir Singh&lt;a href="#_ftn121" name="_ftnref121"&gt;&lt;b&gt;[121]&lt;/b&gt;&lt;/a&gt;&lt;/i&gt;. In that case, the court observes a 	requirement for "reason to believe that such an offence under Chapter IV has been committed and, therefore, an arrest or search was necessary as 	contemplated under these provisions"&lt;a href="#_ftn122" name="_ftnref122"&gt;[122]&lt;/a&gt; in the context of Section 41 and 42 in The Narcotic Drugs and 	Psychotropic Substances Act, 1985&lt;a href="#_ftn123" name="_ftnref123"&gt;[123]&lt;/a&gt;. In examining the requirement of having "reason to believe", the court draws on &lt;i&gt;Partap Singh (Dr)&lt;/i&gt; v.	&lt;i&gt;Director of Enforcement, Foreign Exchange Regulation Act&lt;a href="#_ftn124" name="_ftnref124"&gt;&lt;b&gt;[124]&lt;/b&gt;&lt;/a&gt;&lt;/i&gt;, where the judge 	observed that "the expression 'reason to believe' is not synonymous with subjective satisfaction of the officer. The belief must be held in good faith; it 	cannot be merely a pretence….."&lt;a href="#_ftn125" name="_ftnref125"&gt;[125]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In light of this, the judge in &lt;i&gt;Balbir Singh &lt;/i&gt;remarked that "whether there was such reason to believe and whether the officer empowered acted in a bona fide manner, depends upon the facts and circumstances of the case and will have a bearing in appreciation of the evidence"	&lt;a href="#_ftn126" name="_ftnref126"&gt;[126]&lt;/a&gt;. The standard considered by the court in &lt;i&gt;Balbir Singh &lt;/i&gt;and &lt;i&gt;Partap Singh&lt;/i&gt; is 	different from the 'reasonable suspicion' or 'reasonable grounds' standard as per Section 41 and 165 of Cr PC. But I think the discussion can help to 	inform our analysis of the idea of reasonableness in law enforcement actions. Of importance was the court requirement of something more than mere 	"pretence" as well as a belief held in good faith. This could suggest that in fact the reasoning in American jurisprudence about reasonable suspicion might 	be at least somewhat similar to how Indian courts view reasonable suspicion or grounds in the context of predictive policing, and therefore how we could 	similarly conjecture that predictive evidence could form part of the reasonable suspicion calculus in India as well.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;Difference in judicial treatment of illegally obtained evidence - Indian lack of exclusionary rules&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;However, the apparent similarity of how police in America and India may act in non-warrant situations - guided by the idea of reasonable suspicion - is 	only veneered by linguistic parallels. Despite the existence of such conditions which govern the searches without a warrant, I believe that Indian courts 	currently may provide far less protection against unlawful use of predictive technologies. The main premise behind this argument is that Indian courts 	refuse to exclude evidence that was obtained in breaches of the conditions of sections of the Cr PC. What exists in place of evidentiary safeguards is a 	line of cases in which courts routinely admit unlawfully or illegally obtained evidence. Without protections against unlawfully gathered evidence being 	considered relevant by courts, any regulations on search or conditions to be met before a search is lawful become ineffective. Evidence may simply enter 	the courtroom through a backdoor.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the USA, this is by and large, not the case. Although there are exceptions to these rules, exclusionary rules are set out to prevent admission of 	evidence which violates the constitution&lt;a href="#_ftn127" name="_ftnref127"&gt;[127]&lt;/a&gt;. "The exclusionary rule applies to evidence gained from an unreasonable search or seizure in violation of the Fourth Amendment "&lt;a href="#_ftn128" name="_ftnref128"&gt;[128]&lt;/a&gt;. Mapp v. Ohio	&lt;a href="#_ftn129" name="_ftnref129"&gt;[129]&lt;/a&gt; set the precedent for excluding unconstitutionally gathered evidence, where the court ruled that "all evidence obtained by searches and seizures in violation of the Federal Constitution is inadmissible in a criminal trial in a state court"	&lt;a href="#_ftn130" name="_ftnref130"&gt;[130]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Any such evidence which then leads law enforcement to collect new information may also be excluded, as part of the "fruit of the poisonous tree" doctrine&lt;a href="#_ftn131" name="_ftnref131"&gt;[131]&lt;/a&gt;, established in Silverthorne Lumber Co. v. United States	&lt;a href="#_ftn132" name="_ftnref132"&gt;[132]&lt;/a&gt;. The doctrine is a metaphor which suggests that if the source of certain evidence is tainted, so is 'fruit' or derivatives from that unconstitutional evidence. One such application was in	&lt;i&gt;Beck v. Ohio&lt;a href="#_ftn133" name="_ftnref133"&gt;&lt;b&gt;[133]&lt;/b&gt;&lt;/a&gt;&lt;/i&gt;, where the courts overturned a petitioner's conviction 	because the evidence used to convict him was obtained via an unlawful arrest.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However in India's context, there is very little protection against the admission and use of unlawfully gathered evidence. In fact, there are a line of 	cases which lay out the extent of consideration given to unlawfully gathered evidence - both cases that specifically deal with the rules as per the Indian 	Cr PC as well as cases from other contexts - which follow and develop this line of reasoning of allowing illegally obtained evidence.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One case to pay attention to is &lt;i&gt;State of Maharastra v. Natwarlal Damodardas Soni&lt;/i&gt; - in this case, the Anti-Corruption Bureau searched the house of 	the accused after receiving certain information as a tip. The police "had powers under the Code of Criminal Procedure to search and seize this gold if they 	had reason to believe that a cognizable offence had been committed in respect thereof"&lt;a href="#_ftn134" name="_ftnref134"&gt;[134]&lt;/a&gt;. Justice 	Sarkaria, in delivering his judgement, observed that for argument's sake, even if the search was illegal, "then also, it will not affect the validity of the seizure and further investigation"&lt;a href="#_ftn135" name="_ftnref135"&gt;[135]&lt;/a&gt;. The judge drew reasoning from	&lt;i&gt;Radhakishan v. State of U.P&lt;/i&gt;&lt;a href="#_ftn136" name="_ftnref136"&gt;[136]&lt;/a&gt;. This which was a case involving a postman who had certain 	postal items that were undelivered recovered from his house. As the judge in &lt;i&gt;Radhakishan&lt;/i&gt; noted:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"So far as the alleged illegality of the search is concerned, it is sufficient to say that even assuming that the search was illegal the seizure of the 	articles is not vitiated. It may be that where the provisions of Sections 103 and 165 of the Code of Criminal Procedure, are contravened the search could 	be resisted by the person whose premises are sought to be searched. It may also be that because of the illegality of the search the court may be inclined to examine carefully the evidence regarding the seizure. But beyond these two consequences no further consequence ensues."	&lt;a href="#_ftn137" name="_ftnref137"&gt;[137]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Shyam Lal Sharma&lt;/i&gt; v. &lt;i&gt;State of M.P.&lt;a href="#_ftn138" name="_ftnref138"&gt;&lt;b&gt;[138]&lt;/b&gt;&lt;/a&gt;&lt;/i&gt; was also drawn upon, where it was held that "even if the 	search is illegal being in contravention with the requirements of Section 165 of the Criminal Procedure Code, 1898, that provision ceases to have any 	application to the subsequent steps in the investigation"&lt;a href="#_ftn139" name="_ftnref139"&gt;[139]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even in &lt;i&gt;Gulab Chand &lt;/i&gt;&lt;i&gt;Upadhyay&lt;/i&gt;, mentioned above, the presiding judge contended that even "if arrest is made, it does not require any, much 	less strong, reasons to be recorded or reported by the police. Thus so long as the information or suspicion of cognizable offence is "reasonable" or 	"credible", the police officer is not accountable for the discretion of arresting or no arresting"&lt;a href="#_ftn140" name="_ftnref140"&gt;[140]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A more complete articulation of the receptiveness of Indian courts to admit illegally gathered evidence can be seen in the aforementioned	&lt;i&gt;Balbir Singh. &lt;/i&gt;The judgement aimed to:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"dispose of one of the contentions that failure to comply with the provisions of Cr PC in respect of search and seizure even up to that stage would also 	vitiate the trial. This aspect has been considered in a number of cases and it has been held that the violation of the provisions particularly that of 	Sections 100, 102, 103 or 165 Cr PC strictly per se does not vitiate the prosecution case. If there is such violation, what the courts have to see is 	whether any prejudice was caused to the accused and in appreciating the evidence and other relevant factors, the courts should bear in mind that there was 	such a violation and from that point of view evaluate the evidence on record."&lt;a href="#_ftn141" name="_ftnref141"&gt;[141]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The judges then consulted a series of authorities on the failure to comply with provisions of the Cr PC:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;i&gt;State of Punjab&lt;/i&gt; v. &lt;i&gt;Wassan Singh&lt;/i&gt;&lt;a href="#_ftn142" name="_ftnref142"&gt;[142]&lt;/a&gt;&lt;i&gt;:&lt;/i&gt; "irregularity in a search cannot vitiate the seizure of the articles"&lt;a href="#_ftn143" name="_ftnref143"&gt;[143]&lt;/a&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;Sunder Singh&lt;/i&gt; v. &lt;i&gt;State of U.P&lt;/i&gt;&lt;a href="#_ftn144" name="_ftnref144"&gt;[144]&lt;/a&gt;&lt;i&gt;:&lt;/i&gt; 'irregularity 	cannot vitiate the trial unless the accused has been prejudiced by the defect and it is also held that if reliable local witnesses are not available the 	search would not be vitiated."&lt;a href="#_ftn145" name="_ftnref145"&gt;[145]&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;Matajog Dobey&lt;/i&gt; v.&lt;i&gt;H.C. Bhari&lt;/i&gt;&lt;a href="#_ftn146" name="_ftnref146"&gt;[146]&lt;/a&gt;&lt;i&gt;:&lt;/i&gt; "when the 	salutory provisions have not been complied with, it may, however, affect the weight of the evidence in support of the search or may furnish a reason for 	disbelieving the evidence produced by the prosecution unless the prosecution properly explains such circumstance which made it impossible for it to comply 	with these provisions."&lt;a href="#_ftn147" name="_ftnref147"&gt;[147]&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;R&lt;/i&gt; v. &lt;i&gt;Sang&lt;/i&gt;&lt;a href="#_ftn148" name="_ftnref148"&gt;[148]&lt;/a&gt;: "reiterated the same principle that if 	evidence was admissible it matters not how it was obtained."&lt;a href="#_ftn149" name="_ftnref149"&gt;[149]&lt;/a&gt; Lord Diplock, one of the Lords 	adjudicating the case, observed that "however much the judge may dislike the way in which a particular piece of evidence was obtained before proceedings were commenced, if it is admissible evidence probative of the accused's guilt "it is no part of his judicial function to exclude it for this reason".	&lt;a href="#_ftn150" name="_ftnref150"&gt;[150]&lt;/a&gt; As the judge in &lt;i&gt;Balbir Singh&lt;/i&gt; quoted from Lord Diplock, a judge "has no discretion to 	refuse to admit relevant admissible evidence on the ground that it was obtained by improper or unfair means. The court is not concerned with how it was 	obtained."&lt;a href="#_ftn151" name="_ftnref151"&gt;[151]&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The vast body of case law presented above provides observers with a clear image of the courts willingness to admit and consider illegally obtained 	evidence. The lack of safeguards against admission of unlawful evidence are important from the standpoint of preventing the excessive or unlawful use of 	predictive policing methods. The affronts to justice and privacy, as well as the risks of profiling, seem to become magnified when law enforcement use 	predictive methods more than just to augment their policing techniques but to replace some of them. The efficacy and expediency offered by using predictive 	policing needs to be balanced against the competing interest of ensuring rule of law and due process. In the Indian context, it seems courts sparsely 	consider this competing interest.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Naturally, weighing in on which approach is better depends on a multitude of criteria like context, practicality, societal norms and many more. It also 	draws on existing debates in administrative law about the role of courts, which may emphasise protecting individuals and preventing excessive state power (red light theory) or emphasise efficiency in the governing process with courts assisting the state to achieve policy objectives (green light theory)	&lt;a href="#_ftn152" name="_ftnref152"&gt;[152]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A practical response may be that India should aim to embrace both elements and balance them appropriately, although what an appropriate balance again may vary. There are some who claim that this balance already exists in India. Evidence for such a claim may come from	&lt;i&gt;R.M. Malkani v. State of Maharashtra&lt;/i&gt;&lt;a href="#_ftn153" name="_ftnref153"&gt;[153]&lt;/a&gt;, where the court considered whether an illegally tape-recorded conversation&lt;i&gt; &lt;/i&gt;could be admissible. In its reasoning, the court drew from &lt;i&gt;Kuruma, Son of Kanju v. R.&lt;/i&gt; &lt;a href="#_ftn154" name="_ftnref154"&gt;[154]&lt;/a&gt;&lt;i&gt;, &lt;/i&gt;noting that&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;"&lt;/i&gt; if evidence was admissible it matters not how it was obtained. There is of course always a word of caution. It is that the Judge has a discretion to 	disallow evidence in a criminal case if the strict rules of admissibility would operate unfairly against the accused. That caution is the golden rule in 	criminal jurisprudence"&lt;a href="#_ftn155" name="_ftnref155"&gt;[155]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While this discretion exists at least principally in India, in practice the cases presented above show that judges rarely exercise that discretion to 	prevent or bar the admission of illegally obtained evidence or evidence that was obtained in a manner that infringed the provisions governing search or 	arrest in the Cr PC. Indeed, the concern is that perhaps the necessary safeguards required to keep law enforcement practices, including predictive policing 	techniques, in check would be better served by a greater focus on reconsidering the legality of unlawfully gathered evidence. If not, evidence which should 	otherwise be inadmissible may find its way into consideration by existing legal backdoors.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Risk of discriminatory predictive analysis&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Regarding the risk of discriminatory profiling, Article 15 of India's Constitution&lt;a href="#_ftn156" name="_ftnref156"&gt;[156]&lt;/a&gt; states that "the State shall not discriminate against any citizen on grounds only of religion, race, caste, sex, place of birth or any of them"	&lt;a href="#_ftn157" name="_ftnref157"&gt;[157]&lt;/a&gt;. The existence of constitutional protection for such forms of discrimination suggests that India 	will be able to guard against discriminatory predictive policing. However, as mentioned before, predictive analytics often discriminates institutionally, 	"whereby unconscious implicit biases and inertia within society's institutions account for a large part of the disparate effects observed, rather than 	intentional choices"&lt;a href="#_ftn158" name="_ftnref158"&gt;[158]&lt;/a&gt;. As in most jurisdictions, preventing these forms of discrimination are much 	harder. Especially in a jurisdiction whose courts are already receptive to allowing admission of illegally obtained evidence, the risk of discriminatory 	data mining or prejudiced algorithms being used by police becomes magnified. Because the discrimination may be unintentional, it may be even harder for 	evidence from discriminatory predictive methods to be scrutinised or when applicable, dismissed by the courts.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Conclusion for India&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;One thing which is eminently clear from the analysis of possible interpretations of predictive evidence is that Indian Courts have had no experience with 	any predictive policing cases, because the technology itself is still at a nascent stage. There is in fact a long way to go before predictive policing will 	become used on a scale similar to that of USA for example.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But, even in places where predictive policing is used much more prominently, there is no precedent to observe how courts may view predictive policing. 	Ferguson's method of locating analogous situations to predictive policing which courts have already considered is one notable approach, but even this does 	not provide complete answer. One of his main conclusions that predictive policing will affect the reasonable suspicion calculus, or in India's case, 	contribute to 'reasonable grounds' in some ways, is perhaps the most valid one.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, what provides more cause for concern in India's context are the limited protections against use of unlawfully gathered evidence. The lack of 	'exclusionary rules' unlike those present in the US amplifies the various risks of predictive policing because individuals have little means of redress in 	such situations where predictive policing may be used unjustly against them.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Yet, the promise of predictive policing remains undeniably attractive for India. The successes predictive policing methods seem to have had In the US and 	UK coupled with the more efficient allocation of law enforcement's resources as a consequence of adapting predictive policing evidence this point. The 	government recognises this and seems to be laying the foundation and basic digital infrastructure required to utilize predictive policing optimally. One 	ought also to ask whether it is the even within the court's purview to decide what kind of policing methods are to be permissible through evaluating the 	nature of evidence. There is a case to be made for the legislative arm of the state to provide direction on how predictive policing is to be used in India. 	Perhaps the law must also evolve with the changes in technology, especially if courts are to scrutinise the predictive policing methods themselves.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;
&lt;hr /&gt;
&lt;div id="ftn1"&gt;
&lt;p&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;[1]&lt;/a&gt; Joh, Elizabeth E. "Policing by Numbers: Big Data and the Fourth Amendment." SSRN Scholarly Paper. Rochester, NY: Social Science Research Network, 			February 1, 2014. http://papers.ssrn.com/abstract=2403028. 			&lt;br /&gt; &lt;br /&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn2"&gt;
&lt;p&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;[2]&lt;/a&gt; Tene, Omer, and Jules Polonetsky. "Big Data for All: Privacy and User Control in the Age of Analytics." Northwestern Journal of Technology and 			Intellectual Property 11, no. 5 (April 17, 2013): 239.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn3"&gt;
&lt;p&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;[3]&lt;/a&gt; Datta, Rajbir Singh. "Predictive Analytics: The Use and Constitutionality of Technology in Combating Homegrown Terrorist Threats." SSRN Scholarly 			Paper. Rochester, NY: Social Science Research Network, May 1, 2013. http://papers.ssrn.com/abstract=2320160.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn4"&gt;
&lt;p&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;[4]&lt;/a&gt; Johnson, Jeffrey Alan. "Ethics of Data Mining and Predictive Analytics in Higher Education." SSRN Scholarly Paper. Rochester, NY: Social Science 			Research Network, May 8, 2013. http://papers.ssrn.com/abstract=2156058.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn5"&gt;
&lt;p&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;[5]&lt;/a&gt; Ibid.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn6"&gt;
&lt;p&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;[6]&lt;/a&gt; Duhigg, Charles. "How Companies Learn Your Secrets." The New York Times, February 16, 2012. 			http://www.nytimes.com/2012/02/19/magazine/shopping-habits.html.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn7"&gt;
&lt;p&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;[7]&lt;/a&gt; Ibid.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn8"&gt;
&lt;p&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;[8]&lt;/a&gt; Lijaya, A, M Pranav, P B Sarath Babu, and V R Nithin. "Predicting Movie Success Based on IMDB Data." International Journal of Data Mining 			Techniques and Applications 3 (June 2014): 365-68.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn9"&gt;
&lt;p&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[9] Johnson, Jeffrey Alan. "Ethics of Data Mining and Predictive Analytics in Higher Education." SSRN Scholarly Paper. Rochester, NY: Social 			Science Research Network, May 8, 2013. http://papers.ssrn.com/abstract=2156058.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn10"&gt;
&lt;p&gt;&lt;a href="#_ftnref10" name="_ftn10"&gt;[10]&lt;/a&gt; Sangvinatsos, Antonios A. "Explanatory and Predictive Analysis of Corporate Bond Indices Returns." SSRN Scholarly Paper. Rochester, NY: Social 			Science Research Network, June 1, 2005. http://papers.ssrn.com/abstract=891641.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn11"&gt;
&lt;p&gt;&lt;a href="#_ftnref11" name="_ftn11"&gt;[11]&lt;/a&gt; Barocas, Solon, and Andrew D. Selbst. "Big Data's Disparate Impact." SSRN Scholarly Paper. Rochester, NY: Social Science Research Network, February 			13, 2015. http://papers.ssrn.com/abstract=2477899.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn12"&gt;
&lt;p&gt;&lt;a href="#_ftnref12" name="_ftn12"&gt;[12]&lt;/a&gt; Joh, supra note 1.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn13"&gt;
&lt;p&gt;&lt;a href="#_ftnref13" name="_ftn13"&gt;[13]&lt;/a&gt; US Environmental Protection Agency. "How We Use Data in the Mid-Atlantic Region." US EPA. Accessed November 6, 2015. 			http://archive.epa.gov/reg3esd1/data/web/html/.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn14"&gt;
&lt;p&gt;&lt;a href="#_ftnref14" name="_ftn14"&gt;[14]&lt;/a&gt; See &lt;a href="http://web.archive.org/web/20060603014844/http:/blog.wired.com/27BStroke6/att_klein_wired.pdf"&gt;here&lt;/a&gt; for details of blackroom.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn15"&gt;
&lt;p&gt;&lt;a href="#_ftnref15" name="_ftn15"&gt;[15]&lt;/a&gt; Joh, supra note 1, at pg 48.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn16"&gt;
&lt;p&gt;&lt;a href="#_ftnref16" name="_ftn16"&gt;[16]&lt;/a&gt; Perry, Walter L., Brian McInnis, Carter C. Price, Susan Smith and John S. Hollywood. Predictive Policing: The Role of Crime Forecasting in Law 			Enforcement Operations. Santa Monica, CA: RAND Corporation, 2013. http://www.rand.org/pubs/research_reports/RR233. Also available in print form.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn17"&gt;
&lt;p&gt;&lt;a href="#_ftnref17" name="_ftn17"&gt;[17]&lt;/a&gt; Ibid, at pg 2.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn18"&gt;
&lt;p&gt;&lt;a href="#_ftnref18" name="_ftn18"&gt;[18]&lt;/a&gt; Chan, Sewell. "Why Did Crime Fall in New York City?" City Room. Accessed November 6, 2015. 			http://cityroom.blogs.nytimes.com/2007/08/13/why-did-crime-fall-in-new-york-city/.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn19"&gt;
&lt;p&gt;&lt;a href="#_ftnref19" name="_ftn19"&gt;[19]&lt;/a&gt; Bureau of Justice Assistance. "COMPSTAT: ITS ORIGINS, EVOLUTION, AND FUTURE IN LAW ENFORCEMENT AGENCIES," 2013. 			http://www.policeforum.org/assets/docs/Free_Online_Documents/Compstat/compstat%20-%20its%20origins%20evolution%20and%20future%20in%20law%20enforcement%20agencies%202013.pdf.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn20"&gt;
&lt;p&gt;&lt;a href="#_ftnref20" name="_ftn20"&gt;[20]&lt;/a&gt; 1996 internal NYPD article "Managing for Results: Building a Police Organization that Dramatically Reduces Crime, Disorder, and Fear."&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn21"&gt;
&lt;p&gt;&lt;a href="#_ftnref21" name="_ftn21"&gt;[21]&lt;/a&gt; Bratton, William. "Crime by the Numbers." The New York Times, February 17, 2010. http://www.nytimes.com/2010/02/17/opinion/17bratton.html.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn22"&gt;
&lt;p&gt;&lt;a href="#_ftnref22" name="_ftn22"&gt;[22]&lt;/a&gt; RAND CORP, supra note 16.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn23"&gt;
&lt;p&gt;&lt;a href="#_ftnref23" name="_ftn23"&gt;[23]&lt;/a&gt; RAND CORP, supra note 16, at pg 19.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn24"&gt;
&lt;p&gt;&lt;a href="#_ftnref24" name="_ftn24"&gt;[24]&lt;/a&gt; Joh, supra note 1, at pg 44.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn25"&gt;
&lt;p&gt;&lt;a href="#_ftnref25" name="_ftn25"&gt;[25]&lt;/a&gt; RAND CORP, supra note 16, pg 38.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn26"&gt;
&lt;p&gt;&lt;a href="#_ftnref26" name="_ftn26"&gt;[26]&lt;/a&gt; Ibid.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn27"&gt;
&lt;p&gt;&lt;a href="#_ftnref27" name="_ftn27"&gt;[27]&lt;/a&gt; RAND CORP, supra note 16, at pg 39.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn28"&gt;
&lt;p&gt;&lt;a href="#_ftnref28" name="_ftn28"&gt;[28]&lt;/a&gt; Ibid.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn29"&gt;
&lt;p&gt;&lt;a href="#_ftnref29" name="_ftn29"&gt;[29]&lt;/a&gt; RAND CORP, supra note 16, at pg 41.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn30"&gt;
&lt;p&gt;&lt;a href="#_ftnref30" name="_ftn30"&gt;[30]&lt;/a&gt; Data-Smart City Solutions. "Dr. George Mohler: Mathematician and Crime Fighter." Data-Smart City Solutions, May 8, 2013. 			http://datasmart.ash.harvard.edu/news/article/dr.-george-mohler-mathematician-and-crime-fighter-166.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn31"&gt;
&lt;p&gt;&lt;a href="#_ftnref31" name="_ftn31"&gt;[31]&lt;/a&gt; RAND CORP, supra note 16, at pg 44.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn32"&gt;
&lt;p&gt;&lt;a href="#_ftnref32" name="_ftn32"&gt;[32]&lt;/a&gt; Joh, supra note 1, at pg 45.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn33"&gt;
&lt;p&gt;&lt;a href="#_ftnref33" name="_ftn33"&gt;[33]&lt;/a&gt; Ouellette, Danielle. "Dispatch - A Hot Spots Experiment: Sacramento Police Department," June 2012. 			http://cops.usdoj.gov/html/dispatch/06-2012/hot-spots-and-sacramento-pd.asp.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn34"&gt;
&lt;p&gt;&lt;a href="#_ftnref34" name="_ftn34"&gt;[34]&lt;/a&gt; Pitney Bowes Business Insight. "The Safer Derbyshire Partnership." Derbyshire, 2013. 			http://www.mapinfo.com/wp-content/uploads/2013/05/safer-derbyshire-casestudy.pdf.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn35"&gt;
&lt;p&gt;&lt;a href="#_ftnref35" name="_ftn35"&gt;[35]&lt;/a&gt; Ibid.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn36"&gt;
&lt;p&gt;&lt;a href="#_ftnref36" name="_ftn36"&gt;[36]&lt;/a&gt; Daniel B Neill, Wilpen L. Gorr. "Detecting and Preventing Emerging Epidemics of Crime," 2007.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn37"&gt;
&lt;p&gt;&lt;a href="#_ftnref37" name="_ftn37"&gt;[37]&lt;/a&gt; RAND CORP, supra note 16, at pg 33.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn38"&gt;
&lt;p&gt;&lt;a href="#_ftnref38" name="_ftn38"&gt;[38]&lt;/a&gt; Joh, supra note 1, at pg 46.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn39"&gt;
&lt;p&gt;&lt;a href="#_ftnref39" name="_ftn39"&gt;[39]&lt;/a&gt; Paul, Jeffery S, and Thomas M. Joiner. "Integration of Centralized Intelligence with Geographic Information Systems: A Countywide Initiative." 			Geography and Public Safety 3, no. 1 (October 2011): 5-7.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn40"&gt;
&lt;p&gt;&lt;a href="#_ftnref40" name="_ftn40"&gt;[40]&lt;/a&gt; Mohler, supra note 30.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn41"&gt;
&lt;p&gt;&lt;a href="#_ftnref41" name="_ftn41"&gt;[41]&lt;/a&gt; Ibid.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn42"&gt;
&lt;p&gt;&lt;a href="#_ftnref42" name="_ftn42"&gt;[42]&lt;/a&gt; Moses, B., Lyria, &amp;amp; Chan, J. (2014). Using Big Data for Legal and Law Enforcement 			&lt;br /&gt; Decisions: Testing the New Tools (SSRN Scholarly Paper No. ID 2513564). Rochester, NY: Social Science Research Network. Retrieved from 			http://papers.ssrn.com/abstract=2513564&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn43"&gt;
&lt;p&gt;&lt;a href="#_ftnref43" name="_ftn43"&gt;[43]&lt;/a&gt; Gorner, Jeremy. "Chicago Police Use Heat List as Strategy to Prevent Violence." Chicago Tribune. August 21, 2013. 			http://articles.chicagotribune.com/2013-08-21/news/ct-met-heat-list-20130821_1_chicago-police-commander-andrew-papachristos-heat-list.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn44"&gt;
&lt;p&gt;&lt;a href="#_ftnref44" name="_ftn44"&gt;[44]&lt;/a&gt; Stroud, Matt. "The Minority Report: Chicago's New Police Computer Predicts Crimes, but Is It Racist?" The Verge. Accessed November 13, 2015. 			http://www.theverge.com/2014/2/19/5419854/the-minority-report-this-computer-predicts-crime-but-is-it-racist.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn45"&gt;
&lt;p&gt;&lt;a href="#_ftnref45" name="_ftn45"&gt;[45]&lt;/a&gt; Moser, Whet. "The Small Social Networks at the Heart of Chicago Violence." Chicago Magazine, December 9, 2013. 			http://www.chicagomag.com/city-life/December-2013/The-Small-Social-Networks-at-the-Heart-of-Chicago-Violence/.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn46"&gt;
&lt;p&gt;&lt;a href="#_ftnref46" name="_ftn46"&gt;[46]&lt;/a&gt; Lester, Aaron. "Police Clicking into Crimes Using New Software." Boston Globe, March 18, 2013. 			https://www.bostonglobe.com/business/2013/03/17/police-intelligence-one-click-away/DzzDbrwdiNkjNMA1159ybM/story.html.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn47"&gt;
&lt;p&gt;&lt;a href="#_ftnref47" name="_ftn47"&gt;[47]&lt;/a&gt; Stanley, Jay. "Chicago Police 'Heat List' Renews Old Fears About Government Flagging and Tagging." American Civil Liberties Union, February 25, 			2014. https://www.aclu.org/blog/chicago-police-heat-list-renews-old-fears-about-government-flagging-and-tagging.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn48"&gt;
&lt;p&gt;&lt;a href="#_ftnref48" name="_ftn48"&gt;[48]&lt;/a&gt; Rieke, Aaron, David Robinson, and Harlan Yu. "Civil Rights, Big Data, and Our Algorithmic Future," September 2014. 			https://bigdata.fairness.io/wp-content/uploads/2015/04/2015-04-20-Civil-Rights-Big-Data-and-Our-Algorithmic-Future-v1.2.pdf.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn49"&gt;
&lt;p&gt;&lt;a href="#_ftnref49" name="_ftn49"&gt;[49]&lt;/a&gt; Edmond, Deepu Sebastian. "Jhakhand's Digital Leap." Indian Express, September 15, 2013. 			http://www.jhpolice.gov.in/news/jhakhands-digital-leap-indian-express-15092013-18219-1379316969.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn50"&gt;
&lt;p&gt;&lt;a href="#_ftnref50" name="_ftn50"&gt;[50]&lt;/a&gt; Jharkhand Police. "Jharkhand Police IT Vision 2020 - Effective Shared Open E-Governance." 2012. http://jhpolice.gov.in/vision2020. See slide 2&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref51" name="_ftn51"&gt;[51]&lt;/a&gt; Edmond, supra note 49.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn52"&gt;
&lt;p&gt;&lt;a href="#_ftnref52" name="_ftn52"&gt;[52]&lt;/a&gt; Edmond, supra note 49.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn53"&gt;
&lt;p&gt;&lt;a href="#_ftnref53" name="_ftn53"&gt;[53]&lt;/a&gt; Kumar, Raj. "Enter, the Future of Policing - Cops to Team up with IIM Analysts to Predict &amp;amp; Prevent Incidents." The Telegraph. August 28, 2012. 			http://www.telegraphindia.com/1120828/jsp/jharkhand/story_15905662.jsp#.VkXwxvnhDWK.&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref54" name="_ftn54"&gt;[54]&lt;/a&gt; Ibid.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn54"&gt;&lt;/div&gt;
&lt;div id="ftn55"&gt;
&lt;p&gt;&lt;a href="#_ftnref55" name="_ftn55"&gt;[55]&lt;/a&gt; Ibid.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn56"&gt;
&lt;p&gt;&lt;a href="#_ftnref56" name="_ftn56"&gt;[56]&lt;/a&gt; Ibid.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn57"&gt;
&lt;p&gt;&lt;a href="#_ftnref57" name="_ftn57"&gt;[57]&lt;/a&gt; See supra note 49.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn58"&gt;
&lt;p&gt;&lt;a href="#_ftnref58" name="_ftn58"&gt;[58]&lt;/a&gt; See &lt;a href="http://dashboard.jhpolice.gov.in/"&gt;here&lt;/a&gt; for Jharkhand Police crime dashboard.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn59"&gt;
&lt;p&gt;&lt;a href="#_ftnref59" name="_ftn59"&gt;[59]&lt;/a&gt; Lavanya Gupta, and Selva Priya. "Predicting Crime Rates for Predictive Policing." Gandhian Young Technological Innovation Award, December 29, 2014. 			http://gyti.techpedia.in/project-detail/predicting-crime-rates-for-predictive-policing/3545.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn60"&gt;
&lt;p&gt;&lt;a href="#_ftnref60" name="_ftn60"&gt;[60]&lt;/a&gt; Gupta, Lavanya. "Minority Report: Minority Report." Accessed November 13, 2015. http://cmuws2014.blogspot.in/2015/01/minority-report.html.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn61"&gt;
&lt;p&gt;&lt;a href="#_ftnref61" name="_ftn61"&gt;[61]&lt;/a&gt; See supra note 59.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn62"&gt;
&lt;p&gt;&lt;a href="#_ftnref62" name="_ftn62"&gt;[62]&lt;/a&gt; See &lt;a href="http://bprd.nic.in/showfile.asp?lid=1224"&gt;here&lt;/a&gt; for details about 44th All India Police Science Congress.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn63"&gt;
&lt;p&gt;&lt;a href="#_ftnref63" name="_ftn63"&gt;[63]&lt;/a&gt; India, Press Trust of. "Police Science Congress in Gujarat to Have DRDO Exhibition." Business Standard India, March 10, 2015. 			http://www.business-standard.com/article/pti-stories/police-science-congress-in-gujarat-to-have-drdo-exhibition-115031001310_1.html.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn64"&gt;
&lt;p&gt;&lt;a href="#_ftnref64" name="_ftn64"&gt;[64]&lt;/a&gt; National Crime Records Bureau. "About Crime and Criminal Tracking Network &amp;amp; Systems - CCTNS." Accessed November 13, 2015. 			http://ncrb.gov.in/cctns.htm.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn65"&gt;
&lt;p&gt;&lt;a href="#_ftnref65" name="_ftn65"&gt;[65]&lt;/a&gt; Ibid. (See index page)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn66"&gt;
&lt;p&gt;&lt;a href="#_ftnref66" name="_ftn66"&gt;[66]&lt;/a&gt; U.S. Const. amend. IV, available &lt;a href="https://www.law.cornell.edu/constitution/fourth_amendment"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn67"&gt;
&lt;p&gt;&lt;a href="#_ftnref67" name="_ftn67"&gt;[67]&lt;/a&gt; United States v Katz, 389 U.S. 347 (1967) , see &lt;a href="https://supreme.justia.com/cases/federal/us/389/347/case.html"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn68"&gt;
&lt;p&gt;&lt;a href="#_ftnref68" name="_ftn68"&gt;[68]&lt;/a&gt; See supra note 1, at pg 60.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn69"&gt;
&lt;p&gt;&lt;a href="#_ftnref69" name="_ftn69"&gt;[69]&lt;/a&gt; See supra note 1, at pg 60.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn70"&gt;
&lt;p&gt;&lt;a href="#_ftnref70" name="_ftn70"&gt;[70]&lt;/a&gt; Villasenor, John. "What You Need to Know about the Third-Party Doctrine." The Atlantic, December 30, 2013. 			http://www.theatlantic.com/technology/archive/2013/12/what-you-need-to-know-about-the-third-party-doctrine/282721/.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn71"&gt;
&lt;p&gt;&lt;a href="#_ftnref71" name="_ftn71"&gt;[71]&lt;/a&gt; Smith v Maryland, 442 U.S. 735 (1979), see &lt;a href="https://supreme.justia.com/cases/federal/us/442/735/case.html"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn72"&gt;
&lt;p&gt;&lt;a href="#_ftnref72" name="_ftn72"&gt;[72]&lt;/a&gt; United States v Jones, 565 U.S. ___ (2012), see &lt;a href="https://supreme.justia.com/cases/federal/us/565/10-1259/"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn73"&gt;
&lt;p&gt;&lt;a href="#_ftnref73" name="_ftn73"&gt;[73]&lt;/a&gt; Newell, Bryce Clayton. "Local Law Enforcement Jumps on the Big Data Bandwagon: Automated License Plate Recognition Systems, Information Privacy, 			and Access to Government Information." SSRN Scholarly Paper. Rochester, NY: Social Science Research Network, October 16, 2013. 			http://papers.ssrn.com/abstract=2341182, at pg 24.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn74"&gt;
&lt;p&gt;&lt;a href="#_ftnref74" name="_ftn74"&gt;[74]&lt;/a&gt; See supra note 72.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn75"&gt;
&lt;p&gt;&lt;a href="#_ftnref75" name="_ftn75"&gt;[75]&lt;/a&gt; Dahyabhai Chhaganbhai Thakker vs State Of Gujarat, 1964 AIR 1563&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn76"&gt;
&lt;p&gt;&lt;a href="#_ftnref76" name="_ftn76"&gt;[76]&lt;/a&gt; See supra note 16.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn77"&gt;
&lt;p&gt;&lt;a href="#_ftnref77" name="_ftn77"&gt;[77]&lt;/a&gt; See supra note 66.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn78"&gt;
&lt;p&gt;&lt;a href="#_ftnref78" name="_ftn78"&gt;[78]&lt;/a&gt; Brinegar v. United States, 338 U.S. 160 (1949), see &lt;a href="https://supreme.justia.com/cases/federal/us/338/160/case.html"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn79"&gt;
&lt;p&gt;&lt;a href="#_ftnref79" name="_ftn79"&gt;[79]&lt;/a&gt; Terry v. Ohio, 392 U.S. 1 (1968), see &lt;a href="https://supreme.justia.com/cases/federal/us/392/1/case.html"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn80"&gt;
&lt;p&gt;&lt;a href="#_ftnref80" name="_ftn80"&gt;[80]&lt;/a&gt; Ferguson, Andrew Guthrie. "Big Data and Predictive Reasonable Suspicion." SSRN Scholarly Paper. Rochester, NY: Social Science Research Network, 			April 4, 2014. http://papers.ssrn.com/abstract=2394683, at pg 287. See also supra note 79.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn81"&gt;
&lt;p&gt;&lt;a href="#_ftnref81" name="_ftn81"&gt;[81]&lt;/a&gt; See supra note 80.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn82"&gt;
&lt;p&gt;&lt;a href="#_ftnref82" name="_ftn82"&gt;[82]&lt;/a&gt; See supra note 80.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn83"&gt;
&lt;p&gt;&lt;a href="#_ftnref83" name="_ftn83"&gt;[83]&lt;/a&gt; See supra note 80.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn84"&gt;
&lt;p&gt;&lt;a href="#_ftnref84" name="_ftn84"&gt;[84]&lt;/a&gt; See supra note 80, at pg 289.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn85"&gt;
&lt;p&gt;&lt;a href="#_ftnref85" name="_ftn85"&gt;[85]&lt;/a&gt; Illinois v. Gates, 462 U.S. 213 (1983). See &lt;a href="https://supreme.justia.com/cases/federal/us/462/213/case.html"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn86"&gt;
&lt;p&gt;&lt;a href="#_ftnref86" name="_ftn86"&gt;[86]&lt;/a&gt; See Alabama v. White, 496 U.S. 325 (1990). See &lt;a href="https://supreme.justia.com/cases/federal/us/496/325/"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn87"&gt;
&lt;p&gt;&lt;a href="#_ftnref87" name="_ftn87"&gt;[87]&lt;/a&gt; See supra note 80, at pg 291.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn88"&gt;
&lt;p&gt;&lt;a href="#_ftnref88" name="_ftn88"&gt;[88]&lt;/a&gt; See supra note 80, at pg 293.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn89"&gt;
&lt;p&gt;&lt;a href="#_ftnref89" name="_ftn89"&gt;[89]&lt;/a&gt; See supra note 80, at pg 308.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn90"&gt;
&lt;p&gt;&lt;a href="#_ftnref90" name="_ftn90"&gt;[90]&lt;/a&gt; Ibid.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn91"&gt;
&lt;p&gt;&lt;a href="#_ftnref91" name="_ftn91"&gt;[91]&lt;/a&gt; Ibid.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn92"&gt;
&lt;p&gt;&lt;a href="#_ftnref92" name="_ftn92"&gt;[92]&lt;/a&gt; Larissa Cespedes-Yaffar, Shayona Dhanak, and Amy Stephenson. "U.S. v. Mendenhall, U.S. v. Sokolow, and the Drug Courier Profile Evidence 			Controversy." Accessed July 6, 2015. http://courses2.cit.cornell.edu/sociallaw/student_projects/drugcourier.html.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn93"&gt;
&lt;p&gt;&lt;a href="#_ftnref93" name="_ftn93"&gt;[93]&lt;/a&gt; Ibid.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn94"&gt;
&lt;p&gt;&lt;a href="#_ftnref94" name="_ftn94"&gt;[94]&lt;/a&gt; United States v. Sokolow, 490 U.S. 1 (1989), see &lt;a href="https://supreme.justia.com/cases/federal/us/490/1/"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn95"&gt;
&lt;p&gt;&lt;a href="#_ftnref95" name="_ftn95"&gt;[95]&lt;/a&gt; See supra note 80, at pg 295.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn96"&gt;
&lt;p&gt;&lt;a href="#_ftnref96" name="_ftn96"&gt;[96]&lt;/a&gt; See supra note 80, at pg 297.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn97"&gt;
&lt;p&gt;&lt;a href="#_ftnref97" name="_ftn97"&gt;[97]&lt;/a&gt; See supra note 80, at pg 308.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn98"&gt;
&lt;p&gt;&lt;a href="#_ftnref98" name="_ftn98"&gt;[98]&lt;/a&gt; See supra note 80, at pg 310.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn99"&gt;
&lt;p&gt;&lt;a href="#_ftnref99" name="_ftn99"&gt;[99]&lt;/a&gt; See supra note 11.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn100"&gt;
&lt;p&gt;&lt;a href="#_ftnref100" name="_ftn100"&gt;[100]&lt;/a&gt; See supra note 11.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn101"&gt;
&lt;p&gt;&lt;a href="#_ftnref101" name="_ftn101"&gt;&lt;sup&gt;&lt;sup&gt;[101]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;sup&gt; &lt;/sup&gt; See supra note 80, at pg 303.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn102"&gt;
&lt;p&gt;&lt;a href="#_ftnref102" name="_ftn102"&gt;[102]&lt;/a&gt; See supra note 80, at pg 300.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn103"&gt;
&lt;p&gt;&lt;a href="#_ftnref103" name="_ftn103"&gt;[103]&lt;/a&gt; Illinois v. Wardlow, 528 U.S. 119 (2000), see &lt;a href="https://supreme.justia.com/cases/federal/us/528/119/case.html"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn104"&gt;
&lt;p&gt;&lt;a href="#_ftnref104" name="_ftn104"&gt;[104]&lt;/a&gt; Ibid.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn105"&gt;
&lt;p&gt;&lt;a href="#_ftnref105" name="_ftn105"&gt;[105]&lt;/a&gt; See supra note 80, at pg 301.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn106"&gt;
&lt;p&gt;&lt;a href="#_ftnref106" name="_ftn106"&gt;[106]&lt;/a&gt; Ibid.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn107"&gt;
&lt;p&gt;&lt;a href="#_ftnref107" name="_ftn107"&gt;[107]&lt;/a&gt; See supra note 1, at pg 42.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn108"&gt;
&lt;p&gt;&lt;a href="#_ftnref108" name="_ftn108"&gt;[108]&lt;/a&gt; See supra note 80, at pg 303.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn109"&gt;
&lt;p&gt;&lt;a href="#_ftnref109" name="_ftn109"&gt;[109]&lt;/a&gt; See supra note 80, at pg 303.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn110"&gt;
&lt;p&gt;&lt;a href="#_ftnref110" name="_ftn110"&gt;[110]&lt;/a&gt; Ibid.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn111"&gt;
&lt;p&gt;&lt;a href="#_ftnref111" name="_ftn111"&gt;[111]&lt;/a&gt; Ibid.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn112"&gt;
&lt;p&gt;&lt;a href="#_ftnref112" name="_ftn112"&gt;[112]&lt;/a&gt; Ibid.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn113"&gt;
&lt;p&gt;&lt;a href="#_ftnref113" name="_ftn113"&gt;[113]&lt;/a&gt; See supra note 80, at pg 312.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn114"&gt;
&lt;p&gt;&lt;a href="#_ftnref114" name="_ftn114"&gt;[114]&lt;/a&gt; See supra note 80, at pg 317.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn115"&gt;
&lt;p&gt;&lt;a href="#_ftnref115" name="_ftn115"&gt;[115]&lt;/a&gt; See supra note 80, at pg 319.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn116"&gt;
&lt;p&gt;&lt;a href="#_ftnref116" name="_ftn116"&gt;[116]&lt;/a&gt; See supra note 80, at pg 321.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn117"&gt;
&lt;p&gt;&lt;a href="#_ftnref117" name="_ftn117"&gt;[117]&lt;/a&gt; Section 165 Indian Criminal Procedure Code, see &lt;a href="http://indiankanoon.org/doc/996365/"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn118"&gt;
&lt;p&gt;&lt;a href="#_ftnref118" name="_ftn118"&gt;[118]&lt;/a&gt; Gulab Chand Upadhyaya vs State Of U.P, 2002 CriLJ 2907&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn119"&gt;
&lt;p&gt;&lt;a href="#_ftnref119" name="_ftn119"&gt;[119]&lt;/a&gt; Section 41 Indian Criminal Procedure Code&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn120"&gt;
&lt;p&gt;&lt;a href="#_ftnref120" name="_ftn120"&gt;[120]&lt;/a&gt; See supra note 79&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn121"&gt;
&lt;p&gt;&lt;a href="#_ftnref121" name="_ftn121"&gt;[121]&lt;/a&gt; State of Punjab v. Balbir Singh. (1994) 3 SCC 299&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn122"&gt;
&lt;p&gt;&lt;a href="#_ftnref122" name="_ftn122"&gt;[122]&lt;/a&gt; Ibid.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn123"&gt;
&lt;p&gt;&lt;a href="#_ftnref123" name="_ftn123"&gt;[123]&lt;/a&gt; Section 41 and 42 in The Narcotic Drugs and Psychotropic Substances Act 1985, see &lt;a href="http://indiankanoon.org/doc/1727139/"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn124"&gt;
&lt;p&gt;&lt;a href="#_ftnref124" name="_ftn124"&gt;[124]&lt;/a&gt; &lt;i&gt;Partap Singh (Dr)&lt;/i&gt; v. &lt;i&gt;Director of Enforcement, Foreign Exchange Regulation Act. &lt;/i&gt;(1985) 3 SCC 72 : 1985 SCC (Cri) 312 : 1985 SCC (Tax) 352 : AIR 1985 SC 989&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn125"&gt;
&lt;p&gt;&lt;a href="#_ftnref125" name="_ftn125"&gt;[125]&lt;/a&gt; Ibid, at SCC pg 77-78.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn126"&gt;
&lt;p&gt;&lt;a href="#_ftnref126" name="_ftn126"&gt;[126]&lt;/a&gt; See supra note 121, at pg 313.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn127"&gt;
&lt;p&gt;&lt;a href="#_ftnref127" name="_ftn127"&gt;[127]&lt;/a&gt; Carlson, Mr David. "Exclusionary Rule." LII / Legal Information Institute, June 10, 2009. https://www.law.cornell.edu/wex/exclusionary_rule.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn128"&gt;
&lt;p&gt;&lt;a href="#_ftnref128" name="_ftn128"&gt;[128]&lt;/a&gt; Ibid.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn129"&gt;
&lt;p&gt;&lt;a href="#_ftnref129" name="_ftn129"&gt;[129]&lt;/a&gt; Mapp v Ohio, 367 U.S. 643 (1961), see &lt;a href="https://supreme.justia.com/cases/federal/us/367/643/case.html"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn130"&gt;
&lt;p&gt;&lt;a href="#_ftnref130" name="_ftn130"&gt;[130]&lt;/a&gt; Ibid.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn131"&gt;
&lt;p&gt;&lt;a href="#_ftnref131" name="_ftn131"&gt;[131]&lt;/a&gt; Busby, John C. "Fruit of the Poisonous Tree." LII / Legal Information Institute, September 21, 2009. 			https://www.law.cornell.edu/wex/fruit_of_the_poisonous_tree.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn132"&gt;
&lt;p&gt;&lt;a href="#_ftnref132" name="_ftn132"&gt;[132]&lt;/a&gt; Silverthorne Lumber Co., Inc. v. United States, 251 U.S. 385 (1920), see			&lt;a href="https://supreme.justia.com/cases/federal/us/251/385/case.html"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn133"&gt;
&lt;p&gt;&lt;a href="#_ftnref133" name="_ftn133"&gt;[133]&lt;/a&gt; Beck v. Ohio, 379 U.S. 89 (1964), see &lt;a href="https://supreme.justia.com/cases/federal/us/379/89/case.html"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn134"&gt;
&lt;p&gt;&lt;a href="#_ftnref134" name="_ftn134"&gt;[134]&lt;/a&gt; State of Maharashtra v. Natwarlal Damodardas Soni, (1980) 4 SCC 669, at 673.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn135"&gt;
&lt;p&gt;&lt;a href="#_ftnref135" name="_ftn135"&gt;[135]&lt;/a&gt; Ibid.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn136"&gt;
&lt;p&gt;&lt;a href="#_ftnref136" name="_ftn136"&gt;[136]&lt;/a&gt; Radhakishan v. State of U.P. [AIR 1963 SC 822 : 1963 Supp 1 SCR 408, 411, 412 : (1963) 1 Cri LJ 809]&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn137"&gt;
&lt;p&gt;&lt;a href="#_ftnref137" name="_ftn137"&gt;[137]&lt;/a&gt; Ibid, at SCR pg 411-12.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn138"&gt;
&lt;p&gt;&lt;a href="#_ftnref138" name="_ftn138"&gt;[138]&lt;/a&gt; &lt;i&gt;Shyam Lal Sharma&lt;/i&gt; v. &lt;i&gt;State of M.P&lt;/i&gt;. (1972) 1 SCC 764 : 1974 SCC (Cri) 470 : AIR 1972 SC 886&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn139"&gt;
&lt;p&gt;&lt;a href="#_ftnref139" name="_ftn139"&gt;[139]&lt;/a&gt; See supra note 135, at page 674.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn140"&gt;
&lt;p&gt;&lt;a href="#_ftnref140" name="_ftn140"&gt;[140]&lt;/a&gt; See supra note 119, at para. 10.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn141"&gt;
&lt;p&gt;&lt;a href="#_ftnref141" name="_ftn141"&gt;[141]&lt;/a&gt; See supra note 121, at pg 309.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn142"&gt;
&lt;p&gt;&lt;a href="#_ftnref142" name="_ftn142"&gt;[142]&lt;/a&gt; State of Punjab v. Wassan Singh, (1981) 2 SCC 1 : 1981 SCC (Cri) 292&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn143"&gt;
&lt;p&gt;&lt;a href="#_ftnref143" name="_ftn143"&gt;[143]&lt;/a&gt; See supra note 121, at pg 309.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn144"&gt;
&lt;p&gt;&lt;a href="#_ftnref144" name="_ftn144"&gt;[144]&lt;/a&gt; Sunder Singh v. State of U.P, AIR 1956 SC 411 : 1956 Cri LJ 801&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn145"&gt;
&lt;p&gt;&lt;a href="#_ftnref145" name="_ftn145"&gt;[145]&lt;/a&gt; See supra note 121, at pg 309.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn146"&gt;
&lt;p&gt;&lt;a href="#_ftnref146" name="_ftn146"&gt;[146]&lt;/a&gt; Matajog Dobey v.H.C. Bhari, AIR 1956 SC 44 : (1955) 2 SCR 925 : 1956 Cri LJ 140&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn147"&gt;
&lt;p&gt;&lt;a href="#_ftnref147" name="_ftn147"&gt;[147]&lt;/a&gt; See supra note 121, at pg 309.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn148"&gt;
&lt;p&gt;&lt;a href="#_ftnref148" name="_ftn148"&gt;[148]&lt;/a&gt; R v. Sang, (1979) 2 All ER 1222, 1230-31&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn149"&gt;
&lt;p&gt;&lt;a href="#_ftnref149" name="_ftn149"&gt;[149]&lt;/a&gt; See supra note 121, at pg 309.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn150"&gt;
&lt;p&gt;&lt;a href="#_ftnref150" name="_ftn150"&gt;[150]&lt;/a&gt; Ibid.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn151"&gt;
&lt;p&gt;&lt;a href="#_ftnref151" name="_ftn151"&gt;[151]&lt;/a&gt; Ibid.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn152"&gt;
&lt;p&gt;&lt;a href="#_ftnref152" name="_ftn152"&gt;[152]&lt;/a&gt; Harlow, Carol, and Richard Rawlings. &lt;i&gt;Law and Administration&lt;/i&gt;. 3rd ed. Law in Context. Cambridge University Press, 2009.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn153"&gt;
&lt;p&gt;&lt;a href="#_ftnref153" name="_ftn153"&gt;[153]&lt;/a&gt; &lt;i&gt;R.M. Malkani v. State of Maharashtra,&lt;/i&gt; (1973) 1 SCC 471&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn154"&gt;
&lt;p&gt;&lt;a href="#_ftnref154" name="_ftn154"&gt;[154]&lt;/a&gt; Kuruma, Son of Kanju v. R., (1955) AC 197&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn155"&gt;
&lt;p&gt;&lt;a href="#_ftnref155" name="_ftn155"&gt;[155]&lt;/a&gt; See supra note 154, at 477.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn156"&gt;
&lt;p&gt;&lt;a href="#_ftnref156" name="_ftn156"&gt;[156]&lt;/a&gt; Indian Const. Art 15, see &lt;a href="http://indiankanoon.org/doc/609295/"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn157"&gt;
&lt;p&gt;&lt;a href="#_ftnref157" name="_ftn157"&gt;[157]&lt;/a&gt; Ibid.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn158"&gt;
&lt;p&gt;&lt;a href="#_ftnref158" name="_ftn158"&gt;[158]&lt;/a&gt; See supra note 11.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/predictive-policing-what-is-it-how-it-works-and-it-legal-implications'&gt;https://cis-india.org/internet-governance/blog/predictive-policing-what-is-it-how-it-works-and-it-legal-implications&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Rohan George</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-11-24T16:31:41Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
